| 1. |
Explain The Messages Exchange Between The Peers In Ike/isakmp? |
|
Answer» Phase 1 - MAIN Mode MESSAGE 1: Initiator offers Policy proposal which includes encryption, authentication, hashing algorithms (like AES or 3DES, PSK or PKI, MD5 or RSA). MESSAGE 2: Responder presents policy ACCEPTANCE (or not). MESSAGE 3: Initiator sends the Diffie-Helman key and nonce. MESSAGE 4: Responder sends the Diffie-Helman key and nonce. MESSAGE 5: Initiator sends ID, preshare key or certificate exchange for authentication. MESSAGE 6: Responder sends ID, preshare key or certificate exchange for authentication. Only FIRST Four messages were exchanged in clear text. After that all messages are ENCRYPTED. Phase 2 - Quick Mode: MESSAGE 7: Initiator sends Hash, IPSec Proposal, ID, nonce. MESSAGE 8: Responder sends Hash, IPSec Proposal, ID, nonce. MESSAGE 9: Initiator sends signature, hash, ID. All messages in Quick mode are encrypted. Phase 1 - Main Mode MESSAGE 1: Initiator offers Policy proposal which includes encryption, authentication, hashing algorithms (like AES or 3DES, PSK or PKI, MD5 or RSA). MESSAGE 2: Responder presents policy acceptance (or not). MESSAGE 3: Initiator sends the Diffie-Helman key and nonce. MESSAGE 4: Responder sends the Diffie-Helman key and nonce. MESSAGE 5: Initiator sends ID, preshare key or certificate exchange for authentication. MESSAGE 6: Responder sends ID, preshare key or certificate exchange for authentication. Only First Four messages were exchanged in clear text. After that all messages are encrypted. Phase 2 - Quick Mode: MESSAGE 7: Initiator sends Hash, IPSec Proposal, ID, nonce. MESSAGE 8: Responder sends Hash, IPSec Proposal, ID, nonce. MESSAGE 9: Initiator sends signature, hash, ID. All messages in Quick mode are encrypted. |
|