Jump to content

Cookie exchange

From Wikipedia, the free encyclopedia

This is the current revision of this page, as edited by Matthewrb (talk | contribs) at 18:50, 30 September 2020 (Reverted edits by 73.131.227.72 (talk) (HG) (3.4.9)). The present address (URL) is a permanent link to this version.

(diff) ← Previous revision | Latest revision (diff) | Newer revision → (diff)

The cookie exchange in IPsec comes under the Oakley protocol, which is a protocol of key management. The cookie exchange requires that each side send a pseudorandom number, the cookie, in the initial message, which the other side acknowledges. This acknowledgement must be repeated in the first message of the Diffie–Hellman key exchange. If the source address was forged, the opponent gets no answer. Thus, an opponent can only force a user to generate acknowledgements and not to perform the Diffie–Hellman calculation. Note that "cookies" in the sense of IPsec are unrelated to HTTP cookies used by web browsers.[1]

The recommended method for creating the cookie is to perform a fast hash (e.g. MD5) over the IP source and destination addresses, the UDP source and destination ports, and a locally generated secret value.[1]


References

[edit]
  1. ^ a b Stallings, William (2017). Network Security Essentials - Applications and Standards. England: Pearson. p. 327. ISBN 978-0-134-52733-8.