At 11:22 AM +0530 7/1/09, Mohini Kaur wrote:
>I have a doubt regarding the value of Responder cookie in ISAKMP protocol.
>
>When I read RFC 2408, Sec 2.5.3, it tells that the initiator and responder 
>cookie must be set to a random value.

That section does not say that at all. It says "The details of cookie 
generation are implementation dependent". That is followed by suggestions.

>What I understand from this is, the responder cookie can have any value 
>disregard to the cookie value from initiator.

Correct.

>But when I verify this in a Cisco device (initiator), it generates ISAKMP main 
>mode message with initiator cookie (let it be X).
>
>When I send an ISAKMP main mode message, with responder cookie same as Cisco 
>device (X) or incrementing it by one (X+1), it is discarding. (However it is 
>processing the message with other values).
>
>Again when I do the same in a Linux machine as in Cisco, it is discarding the 
>responder cookie with same value (X), however processing responder cookie with 
>value incremented by one (X+1).
>
>1. Could someone explain me why Cisco and Linux validates ISAKMP main mode 
>message with responder cookie differently? And which is the right validation?

You need to talk to the particular vendors about your question. This mailing 
list is not appropriate for that.

>2. Is there any other RFCs where I can get more information about validation 
>of ISAKMP main mode message with responder cookie?

I believe that RFC 2408 is the correct RFC, but it doesn't cover what a system 
can and cannot do to validate a cookie.

--Paul Hoffman, Director
--VPN Consortium
_______________________________________________
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec

Reply via email to