HP-UX IPSec Version A.03.00 Administrator's Guide

Uses the values in the selected IKEv1 policy to evaluate the IKE SA proposals sent by the
initiator as described in “IKE and IPsec SA Proposals” (page 183).
Uses the initiator's Diffie-Hellman public value and its Diffie-Hellman private value (from
the group specified by the group value in its IKEv1 policy) to calculate a shared secret value.
This shared secret value is used as keying material.
Responder Sends Message 2
The responder sends message 2 in the AM exchange. This message includes the following
information from the configuration:
ltype and lid values from the authentication record.
The selected IKEv1 proposal.
The responder's Diffie-Hellman public value from the group specified by the group value
in the IKEv1 policy.
If the local_method value in the authentication record is PSK, the message includes a hash
value calculated from the preshared key.
If the local_method value is RSASIG, the message includes a digital signature calculated
using the certificate private key. If the initiator included a certificate request in message 1,
the message also includes the local certificate.
Initiator Receives Message 2
When the initiator receives message 2, the IKE daemon:
Verifies that the ID payload sent by the responder matches the rtype and rid values in
the authentication record.
If the IKE authentication method is RSASIG (the remote_method is RSASIG), the daemon
verifies that the ID payload matches the appropriate field (subjectName or
subjectAlternativeName) in the responder's certificate.
Uses the responder's Diffie-Hellman public value and its Diffie-Hellman private value to
calculate a shared secret value. This value matches the value calculated on the responder.
Verifies the authentication data. If the remote_method value in the authentication record
is PSK, it verifies the hash value using the preshared key. If the value is RSASIG, it verifies
the digital signature using the public key from the responder's certificate.
Initiator Sends Message 3
The initiator sends message 3 in the AM exchange. This message includes a hash value generated
using a key derived from the shared Diffie-Hellman value.
IKEv1 Negotiations for IPsec SAs
After the IKE SA is established, the IKE daemon uses the secure channel to establish IPsec SAs
with its peer. On pair of IPsec SAs is established: an inbound SA for packets to the local system
from the remote system, and an outbound SA for packets to the remote system from the local
system.
For the IPsec SAs to be successfully established, both systems must agree on the type of transform
(AH, ESP), including the authentication or encryption algorithm used. They must also negotiate
SA lifetimes.
The negotiations for the IPsec SAs also referred to phase II negotiations or a Quick Mode (QM)
exchange.
HP-UX IPSec Operation 179