IKEv1
Phase 1
During
this phase, both peers negotiate parameters (integrity and encryption
algorithms, authentication methods) to set up a secure and authenticated tunnel.
This is also called a management channel because no user data is flowing through
it (and it is actually a bidirectional IKE SA). It is called bidirectional
because both peers use only one session key to secure both incoming and
outgoing traffic. Peer authentication can be carried out by one of the
following methods:
Pre-shared keys
Digital certificates
IKEv1
uses either IKEv1 Main mode or IKEv1 Aggressive mode in Phase 1 to carry out the
actions required to build a bidirectional tunnel. It then uses IKEv1 Quick mode
for phase 2 operations.
IKEv1
Main mode (Phase 1) uses three pairs of messages (making six in total) between peers:
Pair 1 consists of the IKEv1 security
policies configured on the device:
One
peer (initiator) begins by sending one or more IKEv1 policies, and the
receiving peer responds (responder) with its choice from the policies.
Pair 2 includes DH public key exchange:
DH
creates shared secret keys using the agreed upon DH group/algorithm exchanged
in pair 1 and encrypts nonces (a randomly generated number) that begin life by
first being exchanged between peers. They are then encrypted by the receiving
peer and sent back to the sender and decrypted using the generated keys.
Pair 3 is used for ISAKMP authentication:
Each
peer is authenticated and their identity validated by the other using
pre-shared keys or digital certificates. These
packets
and all others exchanged from now on during the negotiations are encrypted and
authenticated using the policies exchanged and agreed upon in pair
IKEv1
Aggressive mode (Phase 1) uses just three messages rather than the six used
with Main mode. The same information is exchanged between peers. However, the
process is abbreviated by carrying out the following actions:
The initiator sends DH groups signed
nonces (randomly generated numbers), identity information, IKEv1 policies, and
so on.
The responder authenticates the packet and
sends back accepted IKEv1 policies, nonces, key material, and an identification
hash that are required to complete the exchange.
The initiator authenticates the
responder’s packet and sends the authentication hash.