[strongSwan] Reg: 16 unknown bytes in ESp packet(IPSEC)

Andreas Steffen andreas.steffen at strongswan.org
Thu Apr 26 19:44:54 CEST 2012


Hi Mukesh,

please be aware that AES in Cipher Block Chaining (CBC) mode inserts
into each ESP packet a 16 byte (128 bit) Initialization Vector (IV)
right after the sequence number and in front of the encrypted payload.

Regards

Andreas

On 26.04.2012 19:29, Mukesh Yadav wrote:
> Hi,
> 
> Not able to understand 16 byetes in ESP packet present after sequence
> no and before Original IP header while doing tunnel mode Ipsec with
> ESP.
> Details are as below.
> 
> I am trying to achieve Ipsec functionality using fast-path application
> which will do encryption/decryption using some hardware(Cavium)
> specific API.
> This application will by-pass the IP layer of kernel..
> Keys for start-up are pre-shared.
> 
> Communication is done between two machine A and B.
> On Machine A running i386 linux, SA/SP database are updated using
> setkey utility and packets is encrypted/decrypted using kernel Ipsec.
> On Machine B Cavium h/w, keys are pre-shared to application performing
> Ipsec functionlity...
> 
> Example:
> M/c A configuration:
> add 50.50.50.51 50.50.50.53 esp 15701 -E aes-cbc "0123456789abcdef";
> spdadd 10.10.10.20 10.10.10.21 any -P out ipsec
>            esp/tunnel/50.50.50.51 50.50.50.53/require
> 
> 
> I am able to decrypt received packets on machine B send by M/c A and
> send encrypted packet to M/c A.
> Issue:
> 1. Not able to find what are 16 bytes present after sequence no in ESP
> header and before original IP header representing...
> 
> Decrypted  Packet on machine B is like below
> Ethernet header  14 bytes
> Outer Ip header   20 bytes
> ESP header    SPI 4 bytes      Seq no 4 bytes
> Some data         16 bytes       ???????
> Original IP header  20 bytes
> UDP header
> Payload data
> Padding
> Pad lenght
> Next Ip header
> 
> 2. Packets send from machine B are encrypted and received as ESP
> packet on machine A..
>     Not sure if decryption is happening fine...Seems packets are
> dropped at IP layer.. Is there way to confirm if packet are decrypted
> fine by kernel IPSEC...
>     Encrypted packet send by Machine B is having encrypted payload(of
> original IP header plus data) after Sequence number of ESP header...
>     Seems 16 bytes mentioned above play role for successful decryption
> at machine A running Linux IPSEC
> Any Inputs for same will be appreciated for same
> 
> Cheers
> Mukesh

======================================================================
Andreas Steffen                         andreas.steffen at strongswan.org
strongSwan - the Linux VPN Solution!                www.strongswan.org
Institute for Internet Technologies and Applications
University of Applied Sciences Rapperswil
CH-8640 Rapperswil (Switzerland)
===========================================================[ITA-HSR]==

-------------- next part --------------
A non-text attachment was scrubbed...
Name: smime.p7s
Type: application/pkcs7-signature
Size: 4489 bytes
Desc: S/MIME Cryptographic Signature
URL: <http://lists.strongswan.org/pipermail/users/attachments/20120426/35b3451c/attachment.bin>


More information about the Users mailing list