Title

  Test IKEv2.EN.I.1.1.6.1: Cryptographic Algorithm Negotiation for IKE_SA
  Part E: D-H Group Group 14 (ADVANCED)


Purpose

  To verify an IKEv2 device properly handles the Initial Exchanges using Pre-Shared key.


References

  * [RFC 4306] - Sections 2.7 and 3.3


Test Setup

  * Network Topology
      Connect the devices according to the Common Topology.
  * Configuration
      From part A to part E, configure the devices according to the Common
      Configuration except for Italic parameters.
IKE_SA_INIT exchanges Algorithms
Encryption PRF Integrity D-H Group
Part ENCR_3DES PRF_HMAC_SHA1 AUTH_HMAC_SHA1_96 Group 14
  * Pre-Sequence and Cleanup Sequence
      IKEv2 on the NUT is disabled after each part.


Procedure

   NUT                  TN1
(End-Node)           (End-Node)
    |                    |
    |------------------->| IKE_SA_INIT request (HDR, SAi1, KEi, Ni)
    |                    | (Judgement #1)
    |<-------------------| IKE_SA_INIT Response (HDR, SAr1, KEr, Nr)
    |                    | (Packet #1)
    |                    |
    |------------------->| IKE_AUTH request (HDR, SK {IDi, AUTH, N, SAi2, TSi, TSr})
    |                    | (Judgement #2)
    |                    |
    V                    V
    
 N: USE_TRANSPORT_MODE
Packet #1 See Common Packet #2
  Part E: D-H Group Group 14 (ADVANCED)
      17. NUT starts to negotiate with TN1 by sending IKE_SA_INIT request.
      18. Observe the messages transmitted on Link A.
      19. TN1 responds with an IKE_SA_INIT response to the NUT.
      20. Observe the messages transmitted on Link A.


Observable Result

  Part E
    Step 18: Judgment #1
      The NUT transmits an IKE_SA_INIT request including "ENCR_3DES",
      "PRF_HMAC_SHA1", "AUTH_HMAC_SHA1_96" and "D-H group 14" as proposed
      algorithms.
  
    Step 20: Judgment #2
      The NUT transmits an IKE_AUTH request which is cryptographically protected by the
      proposed algorithms in Step 17.


Possible Problems

  * None.