rfc2409.txt

来自「中、英文RFC文档大全打包下载完全版 .」· 文本 代码 · 共 1,489 行 · 第 1/5 页

TXT
1,489
字号
   prime and generator. This group is assigned id 2 (two).   The prime is 2^1024 - 2^960 - 1 + 2^64 * { [2^894 pi] + 129093 }.   Its hexadecimal value is         FFFFFFFF FFFFFFFF C90FDAA2 2168C234 C4C6628B 80DC1CD1         29024E08 8A67CC74 020BBEA6 3B139B22 514A0879 8E3404DD         EF9519B3 CD3A431B 302B0A6D F25F1437 4FE1356D 6D51C245         E485B576 625E7EC6 F44C42E9 A637ED6B 0BFF5CB6 F406B7ED         EE386BFB 5A899FA5 AE9F2411 7C4B1FE6 49286651 ECE65381         FFFFFFFF FFFFFFFF   The generator is 2 (decimal)6.3 Third Oakley Group   IKE implementations SHOULD support a EC2N group with the following   characteristics. This group is assigned id 3 (three). The curve is   based on the Galois Field GF[2^155]. The field size is 155. The   irreducible polynomial for the field is:          u^155 + u^62 + 1.   The equation for the elliptic curve is:           y^2 + xy = x^3 + ax^2 + b.   Field Size:                         155   Group Prime/Irreducible Polynomial:                    0x0800000000000000000000004000000000000001   Group Generator One:                0x7b   Group Curve A:                      0x0   Group Curve B:                      0x07338f   Group Order: 0X0800000000000000000057db5698537193aef944   The data in the KE payload when using this group is the value x from   the solution (x,y), the point on the curve chosen by taking the   randomly chosen secret Ka and computing Ka*P, where * is the   repetition of the group addition and double operations, P is the   curve point with x coordinate equal to generator 1 and the yHarkins & Carrel            Standards Track                    [Page 22]RFC 2409                          IKE                      November 1998   coordinate determined from the defining equation. The equation of   curve is implicitly known by the Group Type and the A and B   coefficients. There are two possible values for the y coordinate;   either one can be used successfully (the two parties need not agree   on the selection).6.4 Fourth Oakley Group   IKE implementations SHOULD support a EC2N group with the following   characteristics. This group is assigned id 4 (four). The curve is   based on the Galois Field GF[2^185]. The field size is 185. The   irreducible polynomial for the field is:           u^185 + u^69 + 1. The   equation for the elliptic curve is:           y^2 + xy = x^3 + ax^2 + b.   Field Size:                         185   Group Prime/Irreducible Polynomial:                    0x020000000000000000000000000000200000000000000001   Group Generator One:                0x18   Group Curve A:                      0x0   Group Curve B:                      0x1ee9   Group Order: 0X01ffffffffffffffffffffffdbf2f889b73e484175f94ebc   The data in the KE payload when using this group will be identical to   that as when using Oakley Group 3 (three).   Other groups can be defined using New Group Mode. These default   groups were generated by Richard Schroeppel at the University of   Arizona.  Properties of these primes are described in [Orm96].7. Payload Explosion for a Complete IKE Exchange   This section illustrates how the IKE protocol is used to:      - establish a secure and authenticated channel between ISAKMP      processes (phase 1); and      - generate key material for, and negotiate, an IPsec SA (phase 2).7.1 Phase 1 using Main Mode   The following diagram illustrates the payloads exchanged between the   two parties in the first round trip exchange. The initiator MAY   propose several proposals; the responder MUST reply with one.Harkins & Carrel            Standards Track                    [Page 23]RFC 2409                          IKE                      November 1998       0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+      ~             ISAKMP Header with XCHG of Main Mode,             ~      ~                  and Next Payload of ISA_SA                   ~      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+      !       0       !    RESERVED   !        Payload Length         !      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+      !                  Domain of Interpretation                     !      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+      !                          Situation                            !      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+      !       0       !    RESERVED   !        Payload Length         !      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+      !  Proposal #1  ! PROTO_ISAKMP  ! SPI size = 0  | # Transforms  !      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+      !    ISA_TRANS  !    RESERVED   !        Payload Length         !      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+      !  Transform #1 !  KEY_OAKLEY   |          RESERVED2            !      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+      ~                   prefered SA attributes                      ~      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+      !       0       !    RESERVED   !        Payload Length         !      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+      !  Transform #2 !  KEY_OAKLEY   |          RESERVED2            !      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+      ~                   alternate SA attributes                     ~      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+   The responder replies in kind but selects, and returns, one transform   proposal (the ISAKMP SA attributes).   The second exchange consists of the following payloads:       0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+      ~             ISAKMP Header with XCHG of Main Mode,             ~      ~                  and Next Payload of ISA_KE                   ~      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+      !    ISA_NONCE  !    RESERVED   !        Payload Length         !      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+      ~   D-H Public Value  (g^xi from initiator g^xr from responder) ~      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+      !       0       !    RESERVED   !        Payload Length         !      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+      ~         Ni (from initiator) or  Nr (from responder)           ~      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+Harkins & Carrel            Standards Track                    [Page 24]RFC 2409                          IKE                      November 1998   The shared keys, SKEYID_e and SKEYID_a, are now used to protect and   authenticate all further communication. Note that both SKEYID_e and   SKEYID_a are unauthenticated.       0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+      ~            ISAKMP Header with XCHG of Main Mode,              ~      ~     and Next Payload of ISA_ID and the encryption bit set     ~      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+      !    ISA_SIG    !    RESERVED   !        Payload Length         !      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+      ~        Identification Data of the ISAKMP negotiator           ~      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+      !       0       !    RESERVED   !        Payload Length         !      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+      ~       signature verified by the public key of the ID above    ~      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+   The key exchange is authenticated over a signed hash as described in   section 5.1. Once the signature has been verified using the   authentication algorithm negotiated as part of the ISAKMP SA, the   shared keys, SKEYID_e and SKEYID_a can be marked as authenticated.   (For brevity, certificate payloads were not exchanged).7.2 Phase 2 using Quick Mode   The following payloads are exchanged in the first round of Quick Mode   with ISAKMP SA negotiation. In this hypothetical exchange, the ISAKMP   negotiators are proxies for other parties which have requested   authentication.       0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+      ~            ISAKMP Header with XCHG of Quick Mode,             ~      ~   Next Payload of ISA_HASH and the encryption bit set         ~      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+      !     ISA_SA    !    RESERVED   !        Payload Length         !      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+      ~                 keyed hash of message                         ~      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+      !   ISA_NONCE   !    RESERVED   !         Payload Length        !      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+      !                 Domain Of Interpretation                      !      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+      !                          Situation                            !      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+      !       0       !    RESERVED   !        Payload Length         !      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+Harkins & Carrel            Standards Track                    [Page 25]RFC 2409                          IKE                      November 1998      !  Proposal #1  ! PROTO_IPSEC_AH! SPI size = 4  | # Transforms  !      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+      ~                        SPI (4 octets)                         ~      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+      !    ISA_TRANS  !    RESERVED   !        Payload Length         !      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+      !  Transform #1 !     AH_SHA    |          RESERVED2            !      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+      !                       other SA attributes                     !      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+      !       0       !    RESERVED   !        Payload Length         !      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+      !  Transform #2 !     AH_MD5    |          RESERVED2            !      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+      !                       other SA attributes                     !      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+      !    ISA_ID     !    RESERVED   !        Payload Length         !      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+      ~                            nonce                              ~      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+      !    ISA_ID     !    RESERVED   !        Payload Length         !      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+      ~              ID of source for which ISAKMP is a client        ~      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+      !      0        !    RESERVED   !        Payload Length         !      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+      ~           ID of destination for which ISAKMP is a client      ~      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+   where the contents of the hash are described in 5.5 above. The   responder replies with a similar message which only contains one   transform-- the selected AH transform. Upon receipt, the initiator   can provide the key engine with the negotiated security association   and the keying material.  As a check against replay attacks, the   responder waits until receipt of the next message.       0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+      ~          ISAKMP Header with XCHG of Quick Mode,               ~      ~   Next Payload of ISA_HASH and the encryption bit set         ~      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+      !       0       !    RESERVED   !        Payload Length         !      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+      ~                         hash data                             ~      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+   where the contents of the hash are described in 5.5 above.Harkins & Carrel            Standards Track                    [Page 26]RFC 2409                          IKE                      November 19988. Perfect Forward Secrecy Example   This protocol can provide PFS of both keys and identities. The   identies of both the ISAKMP negotiating peer and, if applicable, the   identities for whom the peers are negotiating can be protected with   PFS.   To provide Perfect Forward Secrecy of both keys and all identities,   two parties would perform the following:      o A Main Mode Exchange to protect the identities of the ISAKMP        peers.        This establishes an ISAKMP SA.      o A Quick Mode Exchange to negotiate other security protocol        protection.        This establishes a SA on each end for this protocol.      o Delete the ISAKMP SA and its associated state.   Since the key for use in the non-ISAKMP SA was derived from the   single ephemeral Diffie-Hellman exchange PFS is preserved.   To provide Perfect Forward Secrecy of merely the keys of a non-ISAKMP   security association, it in not necessary to do a phase 1 exchange if   an ISAKMP SA exists between the two peers. A single Quick Mode in   which the optional KE payload is passed, and an additional Diffie-   Hellman exchange is performed, is all that is required. At this point   the state derived from this Quick Mode must be deleted from 

⌨️ 快捷键说明

复制代码Ctrl + C
搜索代码Ctrl + F
全屏模式F11
增大字号Ctrl + =
减小字号Ctrl + -
显示快捷键?