Hi

I know we don't like IKEv1 questions, but RFC 4754 does mention it, so here 
goes. And sorry if this has been discussed before. I couldn't find it.

In IKEv1 the authentication method is negotiated as an SA parameter. So 
presumably the Initiator proposes RSA signatures, ECDSA with the P-256 curve, 
etc, and the Responder chooses one of them. This happens in packets #1 and #2.

Later the certificate to actually present (in packets #5 and #6) is chosen 
based on a Certificate Request payload, and availability. This is different 
from IKEv2, where authentication method is implied by the certificates rather 
than negotiated.

So two questions:
1. Is it impossible to have one peer authenticate with RSA while the other 
authenticates with ECDSA, or even to mix curves?  Or am I missing something?
2. What if an IKE endpoint has >1 certificates, but the one best-suited for the 
certificate request has a different type key than the one agreed to in packet 
#2?

If I'm not missing something, it seems like IKEv1 is the wrong vehicle for the 
gradual introduction of ECDSA.  I'm not proposing to fix it, just trying to 
understand.

Yoav

_______________________________________________
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec

Reply via email to