Paul Hoffman writes:
>    In the first case, if the receiving node has an active IKE SA to the
>    IP address from whence the packet came, it MAY send an INVALID_SPI
>    notification of the wayward packet over that IKE SA in an
>    Informational exchange.  The Notification Data contains the SPI of
>    the invalid packet.  The recipient of this notification cannot tell
>    whether the SPI is for AH or ESP, but this is not important because
>    the SPIs are supposed to be different for the two.  If no suitable
>    IKE SA exists, the node MAY send an informational message without
>    cryptographic protection to the source IP address, using the source
>    UDP port as the destination port if the packet was UDP (IKE or UDP-
                                                             ^^^^^^^
>    encapsulated ESP or AH).

Remove the "IKE or" part, as we are still talking about ESP/AH packet
which has unknow SPI. It cannot be IKE packet. Perhaps better to
change the whole sentence to:

    If no suitable IKE SA exists, the node MAY send an informational
    message without cryptographic protection to the source IP address.
    If the incoming ESP or AH packet was UDP-encapsulated, then node
    needs to use NAT-T IKE format and IP addresses and UDP ports from
    the headers are reversed and used for return informational
    message.


>                          In this case, it should only be used by the
>    recipient as a hint that something might be wrong (because it could
>    easily be forged).  This message is not part of an Informational
>    exchange, and the receiving node MUST NOT respond to it because doing
>    so could cause a message loop.  The message is constructed as
>    follows: There are no IKE SPI values that would be meaningful to the
>    recipient of such a notification; using zero values or random values
>    are both acceptable, this being the exception to the rule in
>    Section 3.1 that prohibits zero IKE Initiator SPIs.  The Initiator
>    flag is set, the Response bit is set to 0, and the version flags are
>    set in the normal fashion.

I think we should explictly mention that Exchange Type of that messge
is set to "INFORMATIONAL". 

>    In the second and third cases, the message is always sent without
>    cryptographic protection (outside of an IKE SA), and includes either
>    an INVALID_IKE_SPI or an INVALID_MAJOR_VERSION notification (with no
>    notification data).  The message is a response message, and thus it
>    is sent to the IP address and port from whence it came with the same
>    IKE SPIs and the Message ID and Exchange Type are copied from the
>    request.  The Response bit is set to 1, and the version flags are set
>    in the normal fashion.
-- 
kivi...@iki.fi
_______________________________________________
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec

Reply via email to