Select Page

ISAKMP IKE Phase 1 Details

by | 27-Feb-2021 | Cisco, Security, VPN

(1) ISAKMP and IKE Overview

ISAKMP and IKE background

  • Manual keying presents many challenges and disadvantages
  • November 1998, IETF specified a framework to address these issues
    • ISAKMP was officially standardised by IETF in RFC 2407, 2408
    • IKE was officially standardised by IETF in RFC 2409
    • The vast majority of IPsec leverage the scalability features provided by ISAKMP and IKE
  • IKE/ISAKMP key functions
    • Dynamically and securely exchange keys
    • Negotiate security parameters

 

ISAKMP and IKE Overview

ISAKMP “Internet Security Association and Key Management Protocol”

  • Protocol framework for establishing security context, defines the procedures for:
    • Payload formats of communication
    • The mechanics of implementing a key exchange protocol
    • The negotiation of a security association
  • Protocol used for key exchange and SA negotiation: IKE, Oakley, SKEME
    • IKE protocol is being used for IPsec VPN
    • IKE is hybrid protocol, combines the strengths of Oakley and SKEME protocols

 

IKE “Internet Key Exchange”

  • Protocol that is used by IPsec for establishing security context, and defines the actual mechanics for the process:
    • Authentication of the IPSec peers
    • Negotiates IPSec keys
    • Negotiates IPSec security associations

 

* ISAKMP/IKE occurs in 2 phases: Phase-1 and Phase-2.

(2) ISAKMP/IKE Phase 1:

Phase 1

  • Authenticates and protects the identities of the IPSec peers (identities protection only available in Main mode)
  • Negotiates a matching IKE SA policy between peers to protect the IKE exchange
  • Performs an authenticated Diffie-Hellman exchange with the end result of having matching shared secret keys
  • Establishes IKE SA
    • Sets up a bidirectional (2-ways) secure tunnel to negotiate IKE phase 2 parameters

 

*Phase-1 has 2 modes: Main mode, Aggressive mode.

 

Main Mode

  • Main mode has three “two-way exchanges” (6 messages in total)
  • Offers identity protection (through encryption)

 

  • 1st exchange (negotiate policy)
    • Encryption algorithm (DES / 3DES / AES)
    • HMAC function (MD5 / SHA)
    • Crypto peer authentication type (PSK / RSA Certificate)
    • Diffie-Hellman key group
    • SA lifetime
  • 2nd exchange (exchange DH public values and ancillary data)
    • Public keys, Nonces are sent for a Diffie-Hellman exchange
    • Nonces: random numbers each party must sign and return to prove their identities
  • 3rd exchange (authenticate the DH Exchange)
    • Encrypted identity exchange
    • Identity verification confirmation (hash payload)

 

Aggressive Mode

  • Aggresive mode has two exchanges (3 messages in total)
  • Offers speed and lightweight (no identity protection)
    • It’s possible to “sniff” the wire and discover who formed the new SA. However, it is faster than main mode.

 

  • 1st exchange
    • Encryption algorithm, HMAC function, Device authentication type
    • Diffie-Hellman key group, SA lifetime
    • Public key, nonces are sent for a Diffie-Hellman exchange
    • Identity exchange
  • 2nd exchange
    • Identity verification confirmation (hash payload)

0 Comments

Submit a Comment

Your email address will not be published. Required fields are marked *