Test IKEv2.EN.I.1.1.2.3: Retransmissions of IKE_AUTH requests Part A: (BASIC)
To verify an IKEv2 device retransmits IKE_AUTH request using properly Header and Payloads format
* [RFC 4306] - Sections 2.1, 2.2 and 2.4
* Network Topology Connect the devices according to the Common Topology. * Configuration In each part, configure the devices according to the Common Configuration. In addition, set retransmission timer to 1 second. * Pre-Sequence and Cleanup Sequence IKEv2 on the NUT is disabled after each part.
NUT TN1 (End-Node) (End-Node) | | |------------------->| IKE_SA_INIT request (HDR, SAi1, KEi, Ni) | | (Judgement #1) |<-------------------| IKE_SA_INIT Response (HDR, SAr1, KEr, Nr) | | (Packet #1) | | |------------------->| IKE_AUTH request (HDR, SK {IDi, AUTH, N, SAi2, TSi, TSr}) | | (Judgement #2) | | | * wait for the event of a timeout | | |------------------->| IKE_AUTH request (HDR, SK {IDi, AUTH, N, SAi2, TSi, TSr}) | | (Judgement #3) | | V V
N: USE_TRANSPORT_MODE
Packet #1 See Common Packet #2
Part A: (BASIC) 1. NUT starts to negotiate with TN1 by sending IKE_SA_INIT request. 2. Observe the messages transmitted on Link A. 3. TN1 responds with an IKE_SA_INIT response to the NUT. 4. Observe the messages transmitted on Link A. 5. TN1 waits for the event of a timeout on NUT. 6. Observe the messages transmitted on Link A.
Part A Step 2: Judgment #1 The NUT transmits an IKE_SA_INIT request including "ENCR_3DES", "PRF_HMAC_SHA1", "AUTH_HMAC_SHA1_96" and "D-H group 2" as proposed algorithms. Step 4: Judgment #2 The NUT transmits an IKE_AUTH request including "ENCR_3DES", "AUTH_HMAC_SHA1_96" and "No Extended Sequence Numbers" as proposed algorithms. Step 6: Judgment #3 The NUT retransmits an IKE_AUTH request which has the same Message ID value as the previous IKE_AUTH request's Message ID value in IKE Header.
* Each NUT has the different retransmission timers. If it is imposibble to configure the retransmission timer, modifying tester is required.