Scott C Moonen writes:
> Tero, I don't understand.  Two weeks ago you said:
> > If you use that kind of halfway up IKE SA for sending INFORMATIONAL
> > message to other end (who thinks the IKE SA is up and valid), then I
> > agree that sending both N(AUTHENTICATION_FAILED) and DELETE would be
> > the correct way to do it. DELETE only would also be ok.
> 
> Now I think you are suggesting that DELETE is improper in this case, which 
> directly contradicts your earlier note.

You can either send N(AUTHENTICATION_FAILED) or you can send DELETE,
sending them both does not really help (if you send both you just say
twice that delete this SA). Or you can simply log the situation to the
local end and ask user to take corrective actions (for example if you
are VPN client software) and assume that next connection with
INITIAL_CONTACT or DPD will take care of the old IKE SA.

The reason sending both of them might make sense is that it should be
complatible with almost any implementation, i.e. those who consider
N(AUTHENTICATION_FAILED) fatal will delete IKE SA because of that and
those who do not, still delete the IKE SA because of the DELETE
payload.

As this is very small corner case which do not affect the
interoperability, and in most situations it does not even have any
perceivable effect on the whole system, I do not really have strong
opinion in either way.

It also depends what kind of other text we have. In my suggested text
it is clear that N(AUTHENTICATION_FAILED) causes IKE SA to be deleted,
so in that case sending delete would be unnecessary (i.e.
N(AUTHENTICATION_FAILED) would be enough). With the RFC4306 text
sending delete might be helpful (but not required).
-- 
kivi...@iki.fi
_______________________________________________
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec

Reply via email to