Test IKEv2.EN.I.1.1.6.1: Cryptographic Algorithm Negotiation for IKE_SA Part E: D-H Group Group 14 (ADVANCED)
To verify an IKEv2 device properly handles the Initial Exchanges using Pre-Shared key.
* [RFC 4306] - Sections 2.7 and 3.3
* Network Topology Connect the devices according to the Common Topology. * Configuration From part A to part E, configure the devices according to the Common Configuration except for Italic parameters.
IKE_SA_INIT exchanges Algorithms Encryption PRF Integrity D-H Group Part ENCR_3DES PRF_HMAC_SHA1 AUTH_HMAC_SHA1_96 Group 14
* Pre-Sequence and Cleanup Sequence IKEv2 on the NUT is disabled after each part.
NUT TN1 (End-Node) (End-Node) | | |------------------->| IKE_SA_INIT request (HDR, SAi1, KEi, Ni) | | (Judgement #1) |<-------------------| IKE_SA_INIT Response (HDR, SAr1, KEr, Nr) | | (Packet #1) | | |------------------->| IKE_AUTH request (HDR, SK {IDi, AUTH, N, SAi2, TSi, TSr}) | | (Judgement #2) | | V V N: USE_TRANSPORT_MODE
Packet #1 See Common Packet #2
Part E: D-H Group Group 14 (ADVANCED) 17. NUT starts to negotiate with TN1 by sending IKE_SA_INIT request. 18. Observe the messages transmitted on Link A. 19. TN1 responds with an IKE_SA_INIT response to the NUT. 20. Observe the messages transmitted on Link A.
Part E Step 18: Judgment #1 The NUT transmits an IKE_SA_INIT request including "ENCR_3DES", "PRF_HMAC_SHA1", "AUTH_HMAC_SHA1_96" and "D-H group 14" as proposed algorithms. Step 20: Judgment #2 The NUT transmits an IKE_AUTH request which is cryptographically protected by the proposed algorithms in Step 17.
* None.