Test IKEv2.SGW.R.1.1.10.3: RSA Digital Signature Part A: (ADVANCED)
To verify an IKEv2 device authenticates the corresponding node by RSA Digital Signature.
* [RFC 4306] - Sections 1.2 and 3.8
* Network Topology Connect the devices according to the Common Topology. * Configuration In each part, configure the devices according to the following IKE peer configuration.
Authentication Method Local X.509 Certificate - Signature
* Pre-Sequence and Cleanup Sequence IKEv2 on the NUT is disabled after each part.
NUT TN1 (End-node) (End-Node) | | |<------------| IKE_SA_INIT request (HDR, SAi1, KEi, Ni) | | (Packet #1) |------------>| IKE_SA_INIT Response (HDR, SAr1, KEr, Nr, CERTREQ) | | (Judgement #1) | | |<------------| IKE_AUTH request (HDR, SK {IDi, CERT, AUTH, N, SAi2, TSi, TSr}) | | (Packet #2) |------------>| IKE_AUTH Response (HDR, SK {IDr, AUTH, N, SAr2, TSi, TSr}) | | (Judgement #2) | | |<------------| IPSec {Echo Request} | | (Packet #3) |------------>| IPSec {Echo Reply} | | (Judgement #3) | | V V
Packet #1 See Common Packet #1 Packet #2 See below Packet #3 See Common Packet #19
Packet #2: IKE_AUTH request
IPv6 Header Same as the common packet #3 UDP Header Same as the common packet #3 IKEv2 Header Same as the common packet #3 E Payload Same as the common packet #3 IDi Payload Next Payload 37 (CERT) Oter fields are same as the Common Packet #3 CERT Payload See below AUTH Payload Same as the Common Packet #3 N Payload Same as the Common Packet #3 SA Payload Same as the Common Packet #3 TSi Payload Same as the Common Packet #3 TSr Payload Same as the Common Packet #3
CERT Payload Next Payload 39 (AUTH) Critical 0 Reserved 0 Payload Length Any Certificate Encoding 4 (X.509 Certificate - Signature) Certificate Authority Any
Part A: (ADVANCED) 1. TN1 starts to negotiate with NUT by sending IKE_SA_INIT request. 2. Observe the messages transmitted on Link A. 3. After reception of IKE_SA_INIT response from the NUT, TN1 transmits an IKE_AUTH request with a CERT payload to the NUT. 4. Observe the messages transmitted on Link A. 5. After reception of IKE_AUTH response from the NUT, TN1 transmits an Echo Request with IPsec ESP using corresponding algorithms to NUT. 6. Observe the messages transmitted on Link A.
Part A Step 2: Judgment #1 The NUT transmits an IKE_SA_INIT response including "ENCR_3DES", "PRF_HMAC_SHA1", "AUTH_HMAC_SHA1_96" and "D-H group 2" as accepted algorithms.
Step 4: Judgment #2 The NUT transmits an IKE_AUTH response including "ENCR_3DES", "AUTH_HMAC_SHA1_96" and "No Extended Sequence Numbers" as accepted algorithms.
Step 6: Judgment #3 The NUT transmits an Echo Reply with IPsec ESP using corresponding algorithms.
* None.