pasi.ero...@nokia.com writes:
> - Section 1.5: I noticed the 1st paragraph nowadays (well, since -00
> of the WG draft) allows sending INVALID_IKE_SPI notification inside an
> existing IKE_SA. This contradicts a MUST NOT in RFC 4306, and I'm not
> sure if it really brings any benefits?

There is no way to send INVALID_IKE_SPI inside IKE SA, as the section
3.10 says that the IKE SPI is never sent inside the notification
payload (For a notification concerning the IKE SA, the SPI Size MUST
be zero and the field must be empty.) and the IKE SPI is taken from
the packet. Sending INVALID_IKE_SPI inside IKE SA would mean that the
IKE SA you are sending the packet inside is invalid...

The section 2.21.4 is very clear that INVALID_IKE_SPI MUST NOT be
cryptographically protected, i.e. it is sent outside the IKE SA.

I think the 1st paragraph is quite wrong and the

  If the receiving node has an active IKE SA to the IP address from
  whence the packet came, it MAY send a notification of the wayward
  packet over that IKE SA in an INFORMATIONAL exchange.

part should be removed.
-- 
kivi...@iki.fi
_______________________________________________
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec

Reply via email to