Tero,

I agree with your analysis (I hadn't noticed that this 
doesn't even work).

Best regards,
Pasi

> -----Original Message-----
> From: ext Tero Kivinen [mailto:kivi...@iki.fi]
> Sent: 19 January, 2010 11:25
> To: Eronen Pasi (Nokia-NRC/Helsinki)
> Cc: ipsec@ietf.org
> Subject: INVALID_IKE_SPI inside IKE SA (was: [IPsec] IKEv2bis, comments
> about sections 1-2)
> 
> pasi.ero...@nokia.com writes:
> > - Section 1.5: I noticed the 1st paragraph nowadays (well, since -00
> > of the WG draft) allows sending INVALID_IKE_SPI notification inside
> > an
> > existing IKE_SA. This contradicts a MUST NOT in RFC 4306, and I'm not
> > sure if it really brings any benefits?
> 
> There is no way to send INVALID_IKE_SPI inside IKE SA, as the section
> 3.10 says that the IKE SPI is never sent inside the notification
> payload (For a notification concerning the IKE SA, the SPI Size MUST
> be zero and the field must be empty.) and the IKE SPI is taken from
> the packet. Sending INVALID_IKE_SPI inside IKE SA would mean that the
> IKE SA you are sending the packet inside is invalid...
> 
> The section 2.21.4 is very clear that INVALID_IKE_SPI MUST NOT be
> cryptographically protected, i.e. it is sent outside the IKE SA.
> 
> I think the 1st paragraph is quite wrong and the
> 
>   If the receiving node has an active IKE SA to the IP address from
>   whence the packet came, it MAY send a notification of the wayward
>   packet over that IKE SA in an INFORMATIONAL exchange.
> 
> part should be removed.
> --
> kivi...@iki.fi
_______________________________________________
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec

Reply via email to