Hi Prashant,

As per RFC 5996, Initiator sending AUTHENTICATION_FAILED would be sufficient
in case of peer's authentication failure:

Sec. 2.21.2 Error Handling in IKE_AUTH

...

If the error occurs on the initiator, the notification MAY be
returned in a separate INFORMATIONAL exchange, usually with no other
payloads.  This is an exception for the general rule of not starting
new exchanges based on errors in responses.

...

In an IKE_AUTH exchange, or in the INFORMATIONAL exchange immediately
following it (in case an error happened when processing a response to
IKE_AUTH), the UNSUPPORTED_CRITICAL_PAYLOAD, INVALID_SYNTAX, and
AUTHENTICATION_FAILED notifications are the only ones to cause the
IKE SA to be deleted or not created, without a Delete payload.

...


Regards,
Raj



On Wed, Apr 27, 2011 at 7:09 PM, Prashant Batra (prbatra) <prba...@cisco.com
> wrote:

>  Thanks Scott,
>
>
>
>  I also prefer sending the AUTHENTICATION FAILED and a DELETE PAYLOAD, so
> as to ensure that the peer deletes the ipsec tunnel from the SADB (as it
> would have already added the tunnel in SADB, after sending the
> AUTH_RESPONSE).
>
> But, to second you, most implementations would delete the same on receiving
> AUTHENTICATION FAILED alone.
>
>
>
> Regards,
>
> Prashant
>
>
>
>
>
> *From:* Scott C Moonen [mailto:smoo...@us.ibm.com]
> *Sent:* Wednesday, April 27, 2011 5:54 PM
> *To:* Prashant Batra (prbatra)
> *Cc:* ipsec@ietf.org; ipsec-boun...@ietf.org
> *Subject:* Re: [IPsec] Query regarding IKE_SA_AUTH response
>
>
>
> Hi Prashant.
>
> > 1) If in IKE_AUTH request message initiator sends a ID_R
> > payload(optional) specifying a particular peer identity, and the
> > responder
> > sends some different identity in the ID_R payload, what should be the
> > behavior? Should we send a AUTHENTICATION failure message,
> > or except this new identity of the peer and mark the SA established, if
> > the other things are fine.
>
> This is an implementation decision. In general, you should not
> automatically reject the negotiation because the optional IDr is intended
> only as a hint. Instead, you should (1) check whether your peer
> authorization database (PAD) allows you to converse with the new identity at
> the given IP address and to protect the given traffic, and (2) be sure to
> verify that any earlier decisions, such as the use of a particular
> pre-shared key or the choice of IKE SA cryptographic algorithms, are still
> correct given that you are talking to a different identity than you first
> suspected.
>
> > 2) If we were to send a AUTHENTICATION failure, then this should be sent
> > as a INFORMATIONAL exchange message (as the message received
> > is a response and not request). What should be the message Id used?
>
> Yes, if you were to determine that the peer identity is not permitted by
> your PAD, then you would initiate a new informational exchange on the IKE
> SA. Since the IKE_AUTH exchange has a message id of 1, this exchange would
> have a message id of 2. My own preference would be to send both an
> AUTHENTICATION_FAILED payload and a delete payload for the IKE SA, for
> maximum clarity. But I think that sending only AUTHENTICATION_FAILED is
> sufficient and would be the preference of others on this list.
>
>
> Scott Moonen (smoo...@us.ibm.com)
> z/OS Communications Server TCP/IP Development
> http://www.linkedin.com/in/smoonen
>
> [image: Inactive hide details for "Prashant Batra (prbatra)" ---04/27/2011
> 08:06:01 AM---Hi, I have 2 doubts regarding IKEv2,]"Prashant Batra
> (prbatra)" ---04/27/2011 08:06:01 AM---Hi, I have 2 doubts regarding IKEv2,
>
> From: "Prashant Batra (prbatra)" <prba...@cisco.com>
> To: <ipsec@ietf.org>
> Date: 04/27/2011 08:06 AM
> Subject: [IPsec] Query regarding IKE_SA_AUTH response
> Sent by: ipsec-boun...@ietf.org
>  ------------------------------
>
>
>
>
> Hi,
>
> I have 2 doubts regarding IKEv2,
>
> 1) If in IKE_AUTH request message initiator sends a ID_R
> payload(optional) specifying a particular peer identity, and the
> responder
> sends some different identity in the ID_R payload, what should be the
> behavior? Should we send a AUTHENTICATION failure message,
> or except this new identity of the peer and mark the SA established, if
> the other things are fine.
>
> 2) If we were to send a AUTHENTICATION failure, then this should be sent
> as a INFORMATIONAL exchange message (as the message received
> is a response and not request). What should be the message Id used?
>
> Regards,
> Prashant
>
>
>
> _______________________________________________
> IPsec mailing list
> IPsec@ietf.org
> https://www.ietf.org/mailman/listinfo/ipsec
>
> _______________________________________________
> IPsec mailing list
> IPsec@ietf.org
> https://www.ietf.org/mailman/listinfo/ipsec
>
>
_______________________________________________
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec

Reply via email to