RFC 6290-2011

A Quick Crash Detection Method for the Internet Key Exchange Protocol (IKE)


 

 

非常抱歉,我们暂时无法提供预览,您可以试试: 免费下载 RFC 6290-2011 前三页,或者稍后再访问。

如果您需要购买此标准的全文,请联系:

点击下载后,生成下载文件时间比较长,请耐心等待......

 

标准号
RFC 6290-2011
发布日期
2011年06月01日
实施日期
2011年07月07日
废止日期
中国标准分类号
/
国际标准分类号
/
发布单位
IETF - Internet Engineering Task Force
引用标准
22
适用范围
"Introduction IKEv2@ as described in [RFC5996] and its predecessor RFC 4306@ has a method for recovering from a reboot of one peer. As long as traffic flows in both directions@ the rebooted peer should re-establish the tunnels immediately. However@ in many cases@ the rebooted peer is a VPN gateway that protects only servers@ so all traffic is inbound. In other cases@ the non-rebooted peer has a dynamic IP address@ so the rebooted peer cannot initiate IKE because its current IP address is unknown. In such cases@ the rebooted peer will not be able to re-establish the tunnels. Section 2 describes how recovery works under RFC 5996@ and explains why it may take several minutes. The method proposed here is to send an octet string@ called a ""QCD token""@ in the IKE_AUTH exchange that establishes the tunnel. That token can be stored on the peer as part of the IKE SA. After a reboot@ the rebooted implementation can re-generate the token and send it to the peer@ so as to delete the IKE SA. Deleting the IKE SA results in a quick establishment of new IPsec tunnels. This is described in Section 3. Conventions Used in This Document The key words ""MUST""@ ""MUST NOT""@ ""REQUIRED""@ ""SHALL""@ ""SHALL NOT""@ ""SHOULD""@ ""SHOULD NOT""@ ""RECOMMENDED""@ ""MAY""@ and ""OPTIONAL"" in this document are to be interpreted as described in [RFC2119]. The term ""token"" refers to an octet string that an implementation can generate using only the properties of a protected IKE message (such as IKE Security Parameter Indexes (SPIs)) as input. A conforming implementation MUST be able to generate the same token from the same input even after rebooting. The term ""token maker"" refers to an implementation that generates a token and sends it to the peer as specified in this document. The term ""token taker"" refers to an implementation that stores such a token or a digest thereof@ in order to verify that a new token it receives is identical to the old token it has stored. The term ""non-volatile storage"" in this document refers to a data storage module that persists across restarts of the token maker. Examples of such a storage module include an internal disk@ an internal flash memory module@ an external disk@ and an external database. A small non-volatile storage module is required for a token maker@ but a larger one can be used to enhance performance@ as described in Section 8.2."




Copyright ©2007-2022 ANTPEDIA, All Rights Reserved
京ICP备07018254号 京公网安备1101085018 电信与信息服务业务经营许可证:京ICP证110310号