Title

  Test IKEv2.SGW.R.1.1.10.3: RSA Digital Signature
  Part A: (ADVANCED)


Purpose

  To verify an IKEv2 device authenticates the corresponding node by RSA Digital Signature.


References

  * [RFC 4306] - Sections 1.2 and 3.8


Test Setup

  * Network Topology
      Connect the devices according to the Common Topology.
  * Configuration
      In each part, configure the devices according to the following IKE peer configuration.
Authentication Method
Local X.509 Certificate - Signature
  * Pre-Sequence and Cleanup Sequence
      IKEv2 on the NUT is disabled after each part.


Procedure


   NUT           TN1
(End-node)    (End-Node)
    |             |
    |<------------| IKE_SA_INIT request (HDR, SAi1, KEi, Ni)
    |             | (Packet #1)
    |------------>| IKE_SA_INIT Response (HDR, SAr1, KEr, Nr, CERTREQ)
    |             | (Judgement #1)
    |             |
    |<------------| IKE_AUTH request (HDR, SK {IDi, CERT, AUTH, N, SAi2, TSi, TSr})
    |             | (Packet #2)
    |------------>| IKE_AUTH Response (HDR, SK {IDr, AUTH, N, SAr2, TSi, TSr})
    |             | (Judgement #2)
    |             |
    |<------------| IPSec {Echo Request}
    |             | (Packet #3)
    |------------>| IPSec {Echo Reply}
    |             | (Judgement #3)
    |             |
    V             V 
Packet #1 See Common Packet #1
Packet #2 See below
Packet #3 See Common Packet #19
Packet #2: IKE_AUTH request
IPv6 Header Same as the common packet #3
UDP Header Same as the common packet #3
IKEv2 Header Same as the common packet #3
E Payload Same as the common packet #3
IDi Payload Next Payload 37 (CERT)
Oter fields are same as the Common Packet #3
CERT Payload See below
AUTH Payload Same as the Common Packet #3
N Payload Same as the Common Packet #3
SA Payload Same as the Common Packet #3
TSi Payload Same as the Common Packet #3
TSr Payload Same as the Common Packet #3
CERT Payload Next Payload 39 (AUTH)
Critical 0
Reserved 0
Payload Length Any
Certificate Encoding 4 (X.509 Certificate - Signature)
Certificate Authority Any
  Part A: (ADVANCED)
     1. TN1 starts to negotiate with NUT by sending IKE_SA_INIT request.
     2. Observe the messages transmitted on Link A.
     3. After reception of IKE_SA_INIT response from the NUT, TN1 transmits an IKE_AUTH
        request with a CERT payload to the NUT.
     4. Observe the messages transmitted on Link A.
     5. After reception of IKE_AUTH response from the NUT, TN1 transmits an Echo Request
        with IPsec ESP using corresponding algorithms to NUT.
     6. Observe the messages transmitted on Link A.


Observable Result


  Part A
       Step 2: Judgment #1
       The NUT transmits an IKE_SA_INIT response including "ENCR_3DES",
       "PRF_HMAC_SHA1", "AUTH_HMAC_SHA1_96" and "D-H group 2" as accepted
       algorithms.
       Step 4: Judgment #2
       The NUT transmits an IKE_AUTH response including "ENCR_3DES",
       "AUTH_HMAC_SHA1_96" and "No Extended Sequence Numbers" as accepted algorithms.
       Step 6: Judgment #3
       The NUT transmits an Echo Reply with IPsec ESP using corresponding algorithms.


Possible Problems

  * None.