2010/2/8 Tero Kivinen <kivi...@iki.fi>

> Raj Singh writes:
> > One clear change is that updating the address, port info is changed from
> > authenticated packet
> > to integrity protected packet.
>
> In this case that does not really matter.
>
> > Does this change is to allow recovery from NAT mapping removal
> > during establishment of IKEv2 SA e.g. with EAP authentication,
> > during retransmission of IKE_AUTH exchange ? If Yes, can we have a
> > explicit say for it?
>
> This is not necessarely needed, as the IKE_AUTH replies are IKE
> packets, which are always sent back with their addresses reversed,
> thus those replies will go back anyways, and there cannot be any other
> packets (IKE or ESP) before the IKE_AUTH finishes, and that last
> IKE_AUTH packet is already also authenticated (in addition to the
> integrity protected), thus the last IKE_AUTH packet will already cause
> the mappings to be updated.
>
> So either wording is fine. What is not fine is to do the changes if
> the packet is replayed.
>

Suppose responder got IKE_AUTH request (NIP1, NP1), and now mapping got
removed at NAT box.
If responder will send packet to packet to last integrity protected packet
i.e. IKE_AUTH request.
It will send IKE_AUTH packet to (NIP1, NP1), but now NAT mappings are
removed, so it will not reach to the initiator.
If we are using EAP authentication then first IKE_AUTH will not contain AUTH
payload, so its NOT authenticated packet.
Its only integrity protected. Thats was the thought behind the question.


--
> kivi...@iki.fi
>
_______________________________________________
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec

Reply via email to