Roman Danyliw writes: > ** Section 3.2.4. > > The responder MUST handle this > situation gracefully and delete the associated state if it does not > receive the next expected IKE_FOLLOWUP_KE request after some > reasonable period of time. > > Is there a guidance on the timeout value? > > IKEv2 traditionally does not mandate exact timeouts. For example, the same > situation happens if the initiator completes IKE_SA_INIT and never starts > IKE_AUTH. The responder should eventually delete the incomplete IKE SA, but > RFC 7296 does not specify how long the waiting time is. > > FWIW, our implementations waits 5 seconds by default (which is adjustable > value). > > Do you think we should recommend (but not mandate) to wait for 5-10 seconds? > > [Roman] A recommended value would help if you are comfortable giving it, or > explaining why it’s hard to give one. This is a common question that comes > from transport review during IETC LC or IESG review.
Suitable values can be between few seconds up to few minutes. For example timeout between IKE_SA_INIT and IKE_AUTH might require user interaction, thus it might be up to minutes if PIN code to unlock user auth device is required etc. Because the timeouts are so different depending on the environment and usage scenario we do not give them in the IKEv2 document. -- kivi...@iki.fi _______________________________________________ IPsec mailing list IPsec@ietf.org https://www.ietf.org/mailman/listinfo/ipsec