IPsec - IKEv2 Flashcards
(9 cards)
Reasons to use IKEv1
RADIUS or LDAP auth of a FGT device acting as a dial-up clients needs IKEv1
Can be needed for multiple stages of authentication (related to the RADIUS/LDAP need)
IKEv1 is still widely used and FortiOS has more than 20 years of exposure to it
Ikev2 Advantages
Actively being worked on by the IPsec Maintenance and Extensions (ipsecme) working group
Requires fewer messages and fewer round trips for negotiation
Reliable request/response protocol
Fragmentation is standardized, has configurable MTU, and begin frags with first message
Defines rekey logic for IKE/IPsec SA more accurately
Includes DoS protection
IKEv2 specs advantages
Uses EAP auth methods
Uses asymmetric auth
Has traffic selector flexibility
Has overlay network ID
Requires matching dial-up phase 1 by ID
Requires IKE SA session resumption (RFC 5723)
Requires IKE quick crash detection method (RFC 6290) with other vendors
IKEv2 - A Request and Response Protocol
Does not have an aggresive or main mode. Only one that has total of four messages
Two initial phases of negotiation:
IKE_SA_INIT exchange
IKE_AUTH exchange
Later exchanges:
Create_Child_SA exchange
IKEv2 Negotiation Steps
Phase 1: settings for the negotiation of IKEv2 SA
Phase 2: settings for the negotiation of a child (IPsec) SA
Exchanges are the initial, create child, and informational
IKE_SA_INIT
Message 0:
State:INIT_REQUEST
sends over proposal
State:WAIT_INIT_REQUEST until proposal is received.
Message 1:
State: SEND_INIT_RESPONSE
Responds proposal with DH key pair select and DH secret and a nonce
State:WAIT_INIT_RESPONSE
IKE_AUTH
Message 2:
State:SEND_AUTH_REQUEST
Calculates DH secret and keying material. Sends Identity and Auth and parameters for Child SA
State:WAIT_AUTH_REQUEST
Message 3:
State: SEND_AUTH_RESPONSE
Authenticates the initiator
Accepts Child proposal
Install traffic protection
Send Child SA parameters
State:WAIT_AUTH_RESPONSE
CREATE_CHILD_SA
Message 4:
State: SEND_CHILD_SA_REQUEST
Request rekey of SPI
Calculate DH Key
Send new nonce
State: WAIT_CHILD_SA_REQUEST
Message 5:
State: SEND_CHILD_SA_RESPONSE
Identify SPI to be rekeyed
Generate new keying material
create new nonce
Send CHILD_SA parameters
State: WAIT_CHILD_SA_RESPONSE
state: START_IPSEC_SA_PROTECTION
Calculate new keying material
Install new SA
Information Exchange
Used for peers to convey control messages to each other for errors or notifications. Only occurs after initial exchanges and are encrypted through existing SAs