Test IKEv2.EN.I.1.1.6.1: Cryptographic Algorithm Negotiation for IKE_SA
Part C: PRF PRF_AES128_CBC (ADVANCED)
To verify an IKEv2 device properly handles the Initial Exchanges using Pre-Shared key.
* [RFC 4306] - Sections 2.7 and 3.3
* Network Topology
Connect the devices according to the Common Topology.
* Configuration
From part A to part E, configure the devices according to the Common
Configuration except for Italic parameters.
|
IKE_SA_INIT exchanges Algorithms |
| Encryption |
PRF |
Integrity |
D-H Group |
| Part C |
ENCR_3DES |
PRF_AES128_CBC |
AUTH_HMAC_SHA1_96 |
Group 2 |
* Pre-Sequence and Cleanup Sequence
IKEv2 on the NUT is disabled after each part.
NUT TN1
(End-Node) (End-Node)
| |
|------------------->| IKE_SA_INIT request (HDR, SAi1, KEi, Ni)
| | (Judgement #1)
|<-------------------| IKE_SA_INIT Response (HDR, SAr1, KEr, Nr)
| | (Packet #1)
| |
|------------------->| IKE_AUTH request (HDR, SK {IDi, AUTH, N, SAi2, TSi, TSr})
| | (Judgement #2)
| |
V V
N: USE_TRANSPORT_MODE
| Packet #1 |
See Common Packet #2 |
Part C: PRF PRF_AES128_CBC (ADVANCED)
9. NUT starts to negotiate with TN1 by sending IKE_SA_INIT request.
10. Observe the messages transmitted on Link A.
11. TN1 responds with an IKE_SA_INIT response to the NUT.
12. Observe the messages transmitted on Link A.
Part C
Step 10: Judgment #1
The NUT transmits an IKE_SA_INIT request including "ENCR_3DES",
"PRF_AES128_CBC", "AUTH_HMAC_SHA1_96" and "D-H group 2" as proposed
algorithms.
Step 12: Judgment #2
The NUT transmits an IKE_AUTH request which is cryptographically protected by the
proposed algorithms in Step 9.
* None.