diff options
author | Thomas Voss <mail@thomasvoss.com> | 2024-11-27 20:54:24 +0100 |
---|---|---|
committer | Thomas Voss <mail@thomasvoss.com> | 2024-11-27 20:54:24 +0100 |
commit | 4bfd864f10b68b71482b35c818559068ef8d5797 (patch) | |
tree | e3989f47a7994642eb325063d46e8f08ffa681dc /doc/rfc/rfc3193.txt | |
parent | ea76e11061bda059ae9f9ad130a9895cc85607db (diff) |
doc: Add RFC documents
Diffstat (limited to 'doc/rfc/rfc3193.txt')
-rw-r--r-- | doc/rfc/rfc3193.txt | 1571 |
1 files changed, 1571 insertions, 0 deletions
diff --git a/doc/rfc/rfc3193.txt b/doc/rfc/rfc3193.txt new file mode 100644 index 0000000..a021389 --- /dev/null +++ b/doc/rfc/rfc3193.txt @@ -0,0 +1,1571 @@ + + + + + + +Network Working Group B. Patel +Request for Comments: 3193 Intel +Category: Standards Track B. Aboba + W. Dixon + Microsoft + G. Zorn + S. Booth + Cisco Systems + November 2001 + + + Securing L2TP using IPsec + +Status of this Memo + + This document specifies an Internet standards track protocol for the + Internet community, and requests discussion and suggestions for + improvements. Please refer to the current edition of the "Internet + Official Protocol Standards" (STD 1) for the standardization state + and status of this protocol. Distribution of this memo is unlimited. + +Copyright Notice + + Copyright (C) The Internet Society (2001). All Rights Reserved. + +Abstract + + This document discusses how L2TP (Layer Two Tunneling Protocol) may + utilize IPsec to provide for tunnel authentication, privacy + protection, integrity checking and replay protection. Both the + voluntary and compulsory tunneling cases are discussed. + + + + + + + + + + + + + + + + + + + + +Patel, et al. Standards Track [Page 1] + +RFC 3193 Securing L2TP using IPsec November 2001 + + +Table of Contents + + 1. Introduction .................................................. 2 + 1.1 Terminology .................................................. 3 + 1.2 Requirements language ........................................ 3 + 2. L2TP security requirements ................................... 4 + 2.1 L2TP security protocol ....................................... 5 + 2.2 Stateless compression and encryption ......................... 5 + 3. L2TP/IPsec inter-operability guidelines ....................... 6 + 3.1. L2TP tunnel and Phase 1 and 2 SA teardown ................... 6 + 3.2. Fragmentation Issues ........................................ 6 + 3.3. Per-packet security checks .................................. 7 + 4. IPsec Filtering details when protecting L2TP .................. 7 + 4.1. IKE Phase 1 Negotiations .................................... 8 + 4.2. IKE Phase 2 Negotiations .................................... 8 + 5. Security Considerations ....................................... 15 + 5.1 Authentication issues ........................................ 15 + 5.2 IPsec and PPP interactions ................................... 18 + 6. References .................................................... 21 + Acknowledgments .................................................. 22 + Authors' Addresses ............................................... 23 + Appendix A: Example IPsec Filter sets ............................ 24 + Intellectual Property Statement .................................. 27 + Full Copyright Statement ......................................... 28 + +1. Introduction + + L2TP [1] is a protocol that tunnels PPP traffic over variety of + networks (e.g., IP, SONET, ATM). Since the protocol encapsulates + PPP, L2TP inherits PPP authentication, as well as the PPP Encryption + Control Protocol (ECP) (described in [10]), and the Compression + Control Protocol (CCP) (described in [9]). L2TP also includes + support for tunnel authentication, which can be used to mutually + authenticate the tunnel endpoints. However, L2TP does not define + tunnel protection mechanisms. + + IPsec is a protocol suite which is used to secure communication at + the network layer between two peers. This protocol is comprised of + IP Security Architecture document [6], IKE, described in [7], IPsec + AH, described in [3] and IPsec ESP, described in [4]. IKE is the key + management protocol while AH and ESP are used to protect IP traffic. + + This document proposes use of the IPsec protocol suite for protecting + L2TP traffic over IP networks, and discusses how IPsec and L2TP + should be used together. This document does not attempt to + + + + + + +Patel, et al. Standards Track [Page 2] + +RFC 3193 Securing L2TP using IPsec November 2001 + + + standardize end-to-end security. When end-to-end security is + required, it is recommended that additional security mechanisms (such + as IPsec or TLS [14]) be used inside the tunnel, in addition to L2TP + tunnel security. + + Although L2TP does not mandate the use of IP/UDP for its transport + mechanism, the scope of this document is limited to L2TP over IP + networks. The exact mechanisms for enabling security for non-IP + networks must be addressed in appropriate standards for L2TP over + specific non-IP networks. + +1.1. Terminology + + Voluntary Tunneling + In voluntary tunneling, a tunnel is created by the user, + typically via use of a tunneling client. As a result, the + client will send L2TP packets to the NAS which will forward + them on to the LNS. In voluntary tunneling, the NAS does + not need to support L2TP, and the LAC resides on the same + machine as the client. Another example of voluntary + tunneling is the gateway to gateway scenario. In this case + the tunnel is created by a network device, typically a + router or network appliance. In this scenario either side + may start the tunnel on demand. + + Compulsory Tunneling + In compulsory tunneling, a tunnel is created without any + action from the client and without allowing the client any + choice. As a result, the client will send PPP packets to + the NAS/LAC, which will encapsulate them in L2TP and tunnel + them to the LNS. In the compulsory tunneling case, the + NAS/LAC must be L2TP-capable. + + Initiator The initiator can be the LAC or the LNS and is the device + which sends the SCCRQ and receives the SCCRP. + + Responder The responder can be the LAC or the LNS and is the device + which receives the SCCRQ and replies with a SCCRP. + +1.2. Requirements language + + In this document, the key words "MAY", "MUST, "MUST NOT", "OPTIONAL", + "RECOMMENDED", "SHOULD", and "SHOULD NOT", are to be interpreted as + described in [2]. + + + + + + + +Patel, et al. Standards Track [Page 3] + +RFC 3193 Securing L2TP using IPsec November 2001 + + +2. L2TP security requirements + + L2TP tunnels PPP traffic over the IP and non-IP public networks. + Therefore, both the control and data packets of L2TP protocol are + vulnerable to attack. Examples of attacks include: + + [1] An adversary may try to discover user identities by snooping data + packets. + + [2] An adversary may try to modify packets (both control and data). + + [3] An adversary may try to hijack the L2TP tunnel or the PPP + connection inside the tunnel. + + [4] An adversary can launch denial of service attacks by terminating + PPP connections, or L2TP tunnels. + + [5] An adversary may attempt to disrupt the PPP ECP negotiation in + order to weaken or remove confidentiality protection. + Alternatively, an adversary may wish to disrupt the PPP LCP + authentication negotiation so as to weaken the PPP authentication + process or gain access to user passwords. + + To address these threats, the L2TP security protocol MUST be able to + provide authentication, integrity and replay protection for control + packets. In addition, it SHOULD be able to protect confidentiality + for control packets. It MUST be able to provide integrity and replay + protection of data packets, and MAY be able to protect + confidentiality of data packets. An L2TP security protocol MUST also + provide a scalable approach to key management. + + The L2TP protocol, and PPP authentication and encryption do not meet + the security requirements for L2TP. L2TP tunnel authentication + provides mutual authentication between the LAC and the LNS at tunnel + origination. Therefore, it does not protect control and data traffic + on a per packet basis. Thus, L2TP tunnel authentication leaves the + L2TP tunnel vulnerable to attacks. PPP authenticates the client to + the LNS, but also does not provide per-packet authentication, + integrity, or replay protection. PPP encryption meets + confidentiality requirements for PPP traffic but does not address + authentication, integrity, replay protection and key management + requirements. In addition, PPP ECP negotiation, outlined in [10] + does not provide for a protected ciphersuite negotiation. Therefore, + PPP encryption provides a weak security solution, and in addition + does not assist in securing L2TP control channel. + + + + + + +Patel, et al. Standards Track [Page 4] + +RFC 3193 Securing L2TP using IPsec November 2001 + + + Key management facilities are not provided by the L2TP protocol. + However, where L2TP tunnel authentication is desired, it is necessary + to distribute tunnel passwords. + + Note that several of the attacks outlined above can be carried out on + PPP packets sent over the link between the client and the NAS/LAC, + prior to encapsulation of the packets within an L2TP tunnel. While + strictly speaking these attacks are outside the scope of L2TP + security, in order to protect against them, the client SHOULD provide + for confidentiality, authentication, replay and integrity protection + for PPP packets sent over the dial-up link. Authentication, replay + and integrity protection are not currently supported by PPP + encryption methods, described in [11]-[13]. + +2.1. L2TP Security Protocol + + The L2TP security protocol MUST provide authentication, integrity and + replay protection for control packets. In addition, it SHOULD + protect confidentiality of control packets. It MUST provide + integrity and replay protection of data packets, and MAY protect + confidentiality of data packets. An L2TP security protocol MUST also + provide a scalable approach to key management. + + To meet the above requirements, all L2TP security compliant + implementations MUST implement IPsec ESP for securing both L2TP + control and data packets. Transport mode MUST be supported; tunnel + mode MAY be supported. All the IPsec-mandated ciphersuites + (described in RFC 2406 [4] and RFC 2402 [3]), including NULL + encryption MUST be supported. Note that although an implementation + MUST support all IPsec ciphersuites, it is an operator choice which + ones will be used. If confidentiality is not required (e.g., L2TP + data traffic), ESP with NULL encryption may be used. The + implementations MUST implement replay protection mechanisms of IPsec. + + L2TP security MUST meet the key management requirements of the IPsec + protocol suite. IKE SHOULD be supported for authentication, security + association negotiation, and key management using the IPsec DOI [5]. + +2.2. Stateless compression and encryption + + Stateless encryption and/or compression is highly desirable when L2TP + is run over IP. Since L2TP is a connection-oriented protocol, use of + stateful compression/encryption is feasible, but when run over IP, + this is not desirable. While providing better compression, when used + without an underlying reliable delivery mechanism, stateful methods + magnify packet losses. As a result, they are problematic when used + over the Internet where packet loss can be significant. Although + L2TP [1] is connection oriented, packet ordering is not mandatory, + + + +Patel, et al. Standards Track [Page 5] + +RFC 3193 Securing L2TP using IPsec November 2001 + + + which can create difficulties in implementation of stateful + compression/encryption schemes. These considerations are not as + important when L2TP is run over non-IP media such as IEEE 802, ATM, + X.25, or Frame Relay, since these media guarantee ordering, and + packet losses are typically low. + +3. L2TP/IPsec inter-operability guidelines + + The following guidelines are established to meet L2TP security + requirements using IPsec in practical situations. + +3.1. L2TP tunnel and Phase 1 and 2 SA teardown + + Mechanisms within PPP and L2TP provide for both graceful and non- + graceful teardown. In the case of PPP, an LCP TermReq and TermAck + sequence corresponds to a graceful teardown. LCP keep-alive messages + and L2TP tunnel hellos provide the capability to detect when a non- + graceful teardown has occurred. Whenever teardown events occur, + causing the tunnel to close, the control connection teardown + mechanism defined in [1] must be used. Once the L2TP tunnel is + deleted by either peer, any phase 1 and phase 2 SA's which still + exist as a result of the L2TP tunnel between the peers SHOULD be + deleted. Phase 1 and phase 2 delete messages SHOULD be sent when + this occurs. + + When IKE receives a phase 1 or phase 2 delete message, IKE should + notify L2TP this event has occurred. If the L2TP state is such that + a ZLB ack has been sent in response to a STOPCCN, this can be assumed + to be positive acknowledgment that the peer received the ZLB ack and + has performed a teardown of any L2TP tunnel state associated with the + peer. The L2TP tunnel state and any associated filters can now be + safely removed. + +3.2. Fragmentation Issues + + Since the default MRU for PPP connections is 1500 bytes, + fragmentation can become a concern when prepending L2TP and IPsec + headers to a PPP frame. One mechanism which can be used to reduce + this problem is to provide PPP with the MTU value of the + ingress/egress interface of the L2TP/IPsec tunnel minus the overhead + of the extra headers. This should occur after the L2TP tunnel has + been setup and but before LCP negotiations begin. If the MTU value + of the ingress/egress interface for the tunnel is less than PPP's + default MTU, it may replace the value being used. This value may + also be used as the initial value proposed for the MRU in the LCP + config req. + + + + + +Patel, et al. Standards Track [Page 6] + +RFC 3193 Securing L2TP using IPsec November 2001 + + + If an ICMP PMTU is received by IPsec, this value should be stored in + the SA as proposed in [6]. IPsec should also provide notification of + this event to L2TP so that the new MTU value can be reflected into + the PPP interface. Any new PTMU discoveries seen at the PPP + interface should be checked against this new value and processed + accordingly. + +3.3. Per-packet security checks + + When a packet arrives from a tunnel which requires security, L2TP + MUST: + + [1] Check to ensure that the packet was decrypted and/or + authenticated by IPsec. Since IPsec already verifies that the + packet arrived in the correct SA, L2TP can be assured that the + packet was indeed sent by a trusted peer and that it did not + arrive in the clear. + + [2] Verify that the IP addresses and UDP port values in the packet + match the socket information which was used to setup the L2TP + tunnel. This step prevents malicious peers from spoofing packets + into other tunnels. + +4. IPsec Filtering details when protecting L2TP + + Since IKE/IPsec is agnostic about the nuances of the application it + is protecting, typically no integration is necessary between the + application and the IPsec protocol. However, protocols which allow + the port number to float during the protocol negotiations (such as + L2TP), can cause problems within the current IKE framework. The L2TP + specification [1] states that implementations MAY use a dynamically + assigned UDP source port. This port change is reflected in the SCCRP + sent from the responder to the initiator. + + Although the current L2TP specification allows the responder to use a + new IP address when sending the SCCRP, implementations requiring + protection of L2TP via IPsec SHOULD NOT do this. To allow for this + behavior when using L2TP and IPsec, when the responder chooses a new + IP address it MUST send a StopCCN to the initiator, with the Result + and Error Code AVP present. The Result Code MUST be set to 2 + (General Error) and the Error Code SHOULD be set to 7 (Try Another). + If the Error Code is set to 7, then the optional error message MUST + be present and the contents MUST contain the IP address (ASCII + encoded) that the Responder desires to use for subsequent + communications. Only the ASCII encoded IP address should be present + in the error message. The IP address is encoded in dotted decimal + format for IPv4 or in RFC 2373 [17] format for IPv6. The initiator + MUST parse the result and error code information and send a new SCCRQ + + + +Patel, et al. Standards Track [Page 7] + +RFC 3193 Securing L2TP using IPsec November 2001 + + + to the new IP address contained in the error message. This approach + reduces complexity since now the initiator always knows precisely the + IP address of its peer. This also allows a controlled mechanism for + L2TP to tie IPsec filters and policy to the same peer. + + The filtering details required to accommodate this behavior as well + as other mechanisms needed to protect L2TP with IPsec are discussed + in the following sections. + +4.1. IKE Phase 1 Negotiations + + Per IKE [7], when using pre-shared key authentication, a key must be + present for each peer to which secure communication is required. + When using Main Mode (which provides identity protection), this key + must correspond to the IP address for the peer. When using + Aggressive Mode (which does not provide identity protection), the + pre-shared key must map to one of the valid id types defined in the + IPsec DOI [5]. + + If the initiator receives a StopCCN with the result and error code + AVP set to "try another" and a valid IP address is present in the + message, it MAY bind the original pre-shared key used by IKE to the + new IP address contained in the error-message. + + One may may wish to consider the implications for scalability of + using pre-shared keys as the authentication method for phase 1. As + the number of LAC and LNS endpoints grow, pre-shared keys become + increasingly difficult to manage. Whenever possible, authentication + with certificates is preferred. + +4.2. IKE Phase 2 Negotiations + + During the IKE phase 2 negotiations, the peers agree on what traffic + is to be protected by the IPsec protocols. The quick mode IDs + represent the traffic which the peers agree to protect and are + comprised of address space, protocol, and port information. + + When securing L2TP with IPsec, the following cases must be + considered: + + + + + + + + + + + + +Patel, et al. Standards Track [Page 8] + +RFC 3193 Securing L2TP using IPsec November 2001 + + + Cases: + + +--------------------------------------------------+ + | Initiator Port | Responder Addr | Responder Port | + +--------------------------------------------------+ + | 1701 | Fixed | 1701 | + +--------------------------------------------------+ + | 1701 | Fixed | Dynamic | + +--------------------------------------------------+ + | 1701 | Dynamic | 1701 | + +--------------------------------------------------+ + | 1701 | Dynamic | Dynamic | + +--------------------------------------------------+ + | Dynamic | Fixed | 1701 | + +--------------------------------------------------+ + | Dynamic | Fixed | Dynamic | + +--------------------------------------------------+ + | Dynamic | Dynamic | 1701 | + +--------------------------------------------------+ + | Dynamic | Dynamic | Dynamic | + +--------------------------------------------------+ + + By solving the most general case of the above permutations, all cases + are covered. The most general case is the last one in the list. + This scenario is when the initiator chooses a new port number and the + responder chooses a new address and port number. The L2TP message + flow which occurs to setup this sequence is as follows: + + -> IKE Phase 1 and Phase 2 to protect Initial SCCRQ + + SCCRQ -> (Fixed IP address, Dynamic Initiator Port) + <- STOPCCN (Responder chooses new IP address) + + -> New IKE Phase 1 and Phase 2 to protect new SCCRQ + + SCCRQ -> (SCCRQ to Responder's new IP address) + + <- New IKE Phase 2 to for port number change by the responder + + <- SCCRP (Responder chooses new port number) + SCCCN -> (L2TP Tunnel Establishment completes) + + Although the Initiator and Responder typically do not dynamically + change ports, L2TP security must accommodate emerging applications + such as load balancing and QoS. This may require that the port and + IP address float during L2TP tunnel establishment. + + + + + +Patel, et al. Standards Track [Page 9] + +RFC 3193 Securing L2TP using IPsec November 2001 + + + To support the general case, mechanisms must be designed into L2TP + and IPsec which allow L2TP to inject filters into the IPsec filter + database. This technique may be used by any application which floats + ports and requires security via IPsec, and is described in the + following sections. + + The responder is not required to support the ability to float its IP + address and port. However, the initiator MUST allow the responder to + float its port and SHOULD allow the responder to choose a new IP + address (see section 4.2.3, below). + + Appendix A provides examples of these cases using the process + described below. + +4.2.1. Terminology definitions used for filtering statements + + I-Port The UDP port number the Initiator chooses to + originate/receive L2TP traffic on. This can be a static + port such as 1701 or an ephemeral one assigned by the + socket. + + R-Port The UDP port number the Responder chooses to + originate/receive L2TP traffic on. This can be the port + number 1701 or an ephemeral one assigned by the socket. + This is the port number the Responder uses after + receiving the initial SCCRQ. + + R-IPAddr1 The IP address the Responder listens on for initial + SCCRQ. If the responder does not choose a new IP + address, this address will be used for all subsequent + L2TP traffic. + + R-IPAddr2 The IP address the Responder chooses upon receiving the + SCCRQ. This address is used to send the SCCRP and all + subsequent L2TP tunnel traffic is sent and received on + this address. + + R-IPAddr The IP address which the responder uses for sending and + receiving L2TP packets. This is either the initial value + of R-IPAddr1 or a new value of R-IPAddr2. + + I-IPAddr The IP address the Initiator uses to communicate with for + the L2TP tunnel. + + Any-Addr The presence of Any-Address defines that IKE should + accept any single address proposed in the local address + of the quick mode IDs sent by the peer during IKE phase 2 + negotiations. This single address may be formatted as an + + + +Patel, et al. Standards Track [Page 10] + +RFC 3193 Securing L2TP using IPsec November 2001 + + + IP Single address, an IP Netmask address with the Netmask + set to 255.255.255.255, and IP address Range with the + range being 1, or a hostname which can be resolved to one + address. Refer to [5] for more information on the format + for quick mode IDs. + + Any-Port The presence of Any-Port defines that IKE should accept a + value of 0 or a specific port value for the port value in + the port value in the quick mode IDs negotiated during + IKE phase 2. + + The filters defined in the following sections are listed from highest + priority to lowest priority. + +4.2.2. Initial filters needed to protect the SCCRQ + + The initial filter set on the initiator and responder is necessary to + protect the SCCRQ sent by the initiator to open the L2TP tunnel. + Both the initiator and the responder must either be pre-configured + for these filters or L2TP must have a method to inject this + information into the IPsec filtering database. In either case, this + filter MUST be present before the L2TP tunnel setup messages start to + flow. + + Responder Filters: + Outbound-1: None. They should be be dynamically created by IKE + upon successful completion of phase 2. + + Inbound-1: From Any-Addr, to R-IPAddr1, UDP, src Any-Port, dst + 1701 + + Initiator Filters: + Outbound-1: From I-IPAddr, to R-IPAddr1, UDP, src I-Port, + dst 1701 + + Inbound-1: From R-IPAddr1, to I-IPAddr, UDP, src 1701, + dst I-Port + Inbound-2: From R-IPAddr1, to I-IPAddr, UDP, src Any-Port, + dst I-Port + + When the initiator uses dynamic ports, L2TP must inject the filters + into the IPsec filter database, once its source port number is known. + If the initiator uses a fixed port of 1701, these filters MAY be + statically defined. + + The Any-Port definition in the initiator's inbound-2 filter statement + is needed to handle the potential port change which may occur as the + result of the responder changing its port number. + + + +Patel, et al. Standards Track [Page 11] + +RFC 3193 Securing L2TP using IPsec November 2001 + + + If a phase 2 SA bundle is not already present to protect the SCCRQ, + the sending of a SCCRQ by the initiator SHOULD cause IKE to setup the + necessary SAs to protect this packet. Alternatively, L2TP may also + request IKE to setup the SA bundle. If the SA cannot be setup for + some reason, the packet MUST be dropped. + + The port numbers in the Quick Mode IDs sent by the initiator MUST + contain the specific port numbers used to identify the UDP socket. + The port numbers would be either I-Port/1701 or 1701/1701 for the + initial SCCRQ. The quick mode IDs sent by the initiator will be a + subset of the Inbound-1 filter at the responder. As a result, the + quick mode exchange will finish and IKE should inject a specific + filter set into the IPsec filter database and associate this filter + set with the phase 2 SA established between the peers. These filters + should persist as long as the L2TP tunnel exists. The new filter set + at the responder will be: + + Responder Filters: + Outbound-1: From R-IPAddr1, to I-IPAddr, UDP, src 1701, + dst I-Port + + Inbound-1: From I-IPAddr, to R-IPAddr1, UDP, src I-Port, + dst 1701 + Inbound-2: From Any-Addr, to R-IPAddr1, UDP, src Any-Port, + dst 1701 + + Mechanisms SHOULD exist between L2TP and IPsec such that L2TP is not + retransmitting the SCCRQ while the SA is being established. L2TP's + control channel retransmit mechanisms should start once the SA has + been established. This will help avoid timeouts which may occur as + the result of slow SA establishment. + + Once the phase 2 SA has been established between the peers, the SCCRQ + should be sent from the initiator to the responder. + + If the responder does not choose a new IP address or a new port + number, the L2TP tunnel can now proceed to establish. + +4.2.3. Responder chooses new IP Address + + This step describes the process which should be followed when the + responder chooses a new IP address. The only opportunity for the + responder to change its IP address is after receiving the SCCRQ but + before sending a SCCRP. + + The new address the responder chooses to use MUST be reflected in the + result and error code AVP of a STOPCCN message. The Result Code MUST + be set to 2 (General Error) and the Error Code MUST be set to 7 (Try + + + +Patel, et al. Standards Track [Page 12] + +RFC 3193 Securing L2TP using IPsec November 2001 + + + Another). The optional error message MUST be present and the + contents MUST contain the IP address (ASCII encoded) the Responder + desires to use for subsequent communications. Only the ASCII encoded + IP address should be present in the error message. The IP address is + encoded in dotted decimal format for IPv4 or in RFC 2373 [17] format + for IPv6. + + The STOPCCN Message MUST be sent using the same address and UDP port + information which the initiator used to send the SCCRQ. This message + will be protecting using the initial SA bundle setup to protect the + SCCRQ. + + Upon receiving the STOPCCN, the initiator MUST parse the IP address + from the Result and Error Code AVP and perform the necessary sanity + checks to verify this is a correctly formatted address. If no errors + are found L2TP should inject a new set of filters into the IPsec + filter database. If using pre-shared key authentication, L2TP MAY + request IKE to bind the new IP address to the pre-shared key which + was used for the original IP address. + + Since the IP address of the responder changed, a new phase 1 and + phase 2 SA must be established between the peers before the new SCCRQ + is sent. + + Assuming the initial tunnel has been torn down and the filters needed + to create the tunnel removed, the new filters for the initiator and + responder will be: + + Initiator Filters: + Outbound-1: From I-IPAddr, to R-IPAddr2, UDP, src I-Port, + dst 1701 + + Inbound-1: From R-IPAddr2, to I-IPAddr, UDP, src 1701, + dst I-Port + Inbound-2: From R-IPAddr2, to I-IPAddr, UDP, src Any-Port, + dst I-Port + + Once IKE phase 2 completes, the new filter set at the responder will + be: + + Responder Filters: + Outbound-1: From R-IPAddr2, to I-IPAddr, UDP, src 1701, + dst I-Port + + Inbound-1: From I-IPAddr, to R-IPAddr2, UDP, src I-Port, + dst 1701 + Inbound-2: From Any-Addr, to R-IPAddr1, UDP, src Any-Port, + dst 1701 + + + +Patel, et al. Standards Track [Page 13] + +RFC 3193 Securing L2TP using IPsec November 2001 + + + If the responder chooses not to move to a new port number, the L2TP + tunnel setup can now complete. + +4.2.4. Responder chooses new Port Number + + The responder MAY choose a new UDP source port to use for L2TP tunnel + traffic. This decision MUST be made before sending the SCCRP. If a + new port number is chosen, then L2TP must inject new filters into the + IPsec filter database. The responder must start new IKE phase 2 + negotiations with the initiator. + + The final filter set at the initiator and responder is as follows. + + Initiator Filters: + Outbound-1: From I-IPAddr, to R-IPAddr, UDP, src I-Port, dst + R-Port + Outbound-2: From I-IPAddr, to R-IPAddr, UDP, src I-Port, dst + 1701 + + + Inbound-1: From R-IPAddr, to I-IPAddr, UDP, src R-Port, dst + I-Port + Inbound-2: From R-IPAddr, to I-IPAddr, UDP, src 1701, dst + I-Port + Inbound-3: From R-IPAddr, to I-IPAddr, UDP, src Any-Port, dst + I-Port + + The Inbound-1 filter for the initiator will be injected by IKE + upon successful completion of the phase 2 negotiations + initiated by the peer. + + Responder Filters: + Outbound-1: From R-IPAddr, to I-IPAddr, UDP, src R-Port, dst + I-Port + Outbound-2: From R-IPAddr, to I-IPAddr, UDP, src 1701, dst + I-Port + + Inbound-1: From I-IPAddr, to R-IPAddr, UDP, src I-Port, dst + R-Port + Inbound-2: From I-IPAddr, to R-IPAddr, UDP, src I-Port, dst + 1701 + Inbound-3: From Any-Addr, to R-IPAddr1, UDP, src Any-Port, dst + 1701 + + Once the negotiations have completed, the SCCRP is sent and the L2TP + tunnel can complete establishment. After the L2TP tunnel has been + established, any residual SAs and their associated filters may be + deleted. + + + +Patel, et al. Standards Track [Page 14] + +RFC 3193 Securing L2TP using IPsec November 2001 + + +4.2.5. Gateway-gateway and L2TP Dial-out considerations + + In the gateway-gateway or the L2TP dial-out scenario, either side may + initiate L2TP. The process outlined in the previous steps should be + followed with one addition. The initial filter set at both sides + MUST include the following filter: + + Inbound Filter: + 1: From Any-Addr, to R-IPAddr1, UDP, src Any-Port, dst 1701 + + When either peer decides to start a tunnel, L2TP should inject the + necessary inbound and outbound filters to protect the SCCRQ. Tunnel + establishment then proceeds exactly as stated in the previous + sections. + +5. Security Considerations + +5.1. Authentication issues + + IPsec IKE negotiation MUST negotiate an authentication method + specified in the IKE RFC 2409 [7]. In addition to IKE + authentication, L2TP implementations utilize PPP authentication + methods, such as those described in [15]-[16]. In this section, we + discuss authentication issues. + +5.1.1. Differences between IKE and PPP authentication + + While PPP provides initial authentication, it does not provide per- + packet authentication, integrity or replay protection. This implies + that the identity verified in the initial PPP authentication is not + subsequently verified on reception of each packet. + + With IPsec, when the identity asserted in IKE is authenticated, the + resulting derived keys are used to provide per-packet authentication, + integrity and replay protection. As a result, the identity verified + in the IKE conversation is subsequently verified on reception of each + packet. + + Let us assume that the identity claimed in PPP is a user identity, + while the identity claimed within IKE is a machine identity. Since + only the machine identity is verified on a per-packet basis, there is + no way to verify that only the user authenticated within PPP is using + the tunnel. In fact, IPsec implementations that only support machine + authentication typically have no way to enforce traffic segregation. + As a result, where machine authentication is used, once an L2TP/IPsec + tunnel is opened, any user on a multi-user machine will typically be + able to send traffic down the tunnel. + + + + +Patel, et al. Standards Track [Page 15] + +RFC 3193 Securing L2TP using IPsec November 2001 + + + If the IPsec implementation supports user authentication, this + problem can be averted. In this case, the user identity asserted + within IKE will be verified on a per-packet basis. In order to + provide segregation of traffic between users when user authentication + is used, the client MUST ensure that only traffic from that + particular user is sent down the L2TP tunnel. + +5.1.2. Certificate authentication in IKE + + When X.509 certificate authentication is chosen within IKE, the LNS + is expected to use an IKE Certificate Request Payload (CRP) to + request from the client a certificate issued by a particular + certificate authority or may use several CRPs if several certificate + authorities are trusted and configured in its IPsec IKE + authentication policy. + + The LNS SHOULD be able to trust several certificate authorities in + order to allow tunnel client end-points to connect to it using their + own certificate credential from their chosen PKI. Client and server + side certificate revocation list checking MAY be enabled on a per-CA + basis, since differences in revocation list checking exist between + different PKI providers. + + L2TP implementations MAY use dynamically assigned ports for both + source and destination ports only if security for each source and + destination port combination can be successfully negotiated by IKE. + +5.1.3. Machine versus user certificate authentication in IKE + + The certificate credentials provided by the L2TP client during the + IKE negotiation MAY be those of the machine or of the L2TP user. + When machine authentication is used, the machine certificate is + typically stored on the LAC and LNS during an enrollment process. + When user certificates are used, the user certificate can be stored + either on the machine or on a smartcard. + + Since the value of a machine certificate is inversely proportional to + the ease with which an attacker can obtain one under false pretenses, + it is advisable that the machine certificate enrollment process be + strictly controlled. For example, only administrators may have the + ability to enroll a machine with a machine certificate. + + While smartcard certificate storage lessens the probability of + compromise of the private key, smartcards are not necessarily + desirable in all situations. For example, some organizations + deploying machine certificates use them so as to restrict use of + non-approved hardware. Since user authentication can be provided + + + + +Patel, et al. Standards Track [Page 16] + +RFC 3193 Securing L2TP using IPsec November 2001 + + + within PPP (keeping in mind the weaknesses described earlier), + support for machine authentication in IPsec makes it is possible to + authenticate both the machine as well as the user. + + In circumstances in which this dual assurance is considered valuable, + enabling movement of the machine certificate from one machine to + another, as would be possible if the machine certificate were stored + on a smart card, may be undesirable. + + Similarly, when user certificate are deployed, it is advisable for + the user enrollment process to be strictly controlled. If for + example, a user password can be readily used to obtain a certificate + (either a temporary or a longer term one), then that certificate has + no more security value than the password. To limit the ability of an + attacker to obtain a user certificate from a stolen password, the + enrollment period can be limited, after which password access will be + turned off. Such a policy will prevent an attacker obtaining the + password of an unused account from obtaining a user certificate once + the enrollment period has expired. + +5.1.4. Pre-shared keys in IKE + + Use of pre-shared keys in IKE main mode is vulnerable to man-in-the- + middle attacks when used in remote access situations. In main mode + it is necessary for SKEYID_e to be used prior to the receipt of the + identification payload. Therefore the selection of the pre-shared + key may only be based on information contained in the IP header. + However, in remote access situations, dynamic IP address assignment + is typical, so that it is often not possible to identify the required + pre-shared key based on the IP address. + + Thus when pre-shared keys are used in remote access scenarios, the + same pre-shared key is shared by a group of users and is no longer + able to function as an effective shared secret. In this situation, + neither the client nor the server identifies itself during IKE phase + 1; it is only known that both parties are a member of the group with + knowledge of the pre-shared key. This permits anyone with access to + the group pre-shared key to act as a man-in-the-middle. + + This vulnerability does not occur in aggressive mode since the + identity payload is sent earlier in the exchange, and therefore the + pre-shared key can be selected based on the identity. However, when + aggressive mode is used the user identity is exposed and this is + often considered undesirable. + + As a result, where main mode is used with pre-shared keys, unless PPP + performs mutual authentication, the server is not authenticated. + This enables a rogue server in possession of the group pre-shared key + + + +Patel, et al. Standards Track [Page 17] + +RFC 3193 Securing L2TP using IPsec November 2001 + + + to successfully masquerade as the LNS and mount a dictionary attack + on legacy authentication methods such as CHAP [15]. Such an attack + could potentially compromise many passwords at a time. This + vulnerability is present in some existing IPsec tunnel mode + implementations. + + To avoid this problem, L2TP/IPsec implementations SHOULD NOT use a + group pre-shared key for IKE authentication to the LNS. IKE pre- + shared authentication key values SHOULD be protected in a manner + similar to the user's account password used by L2TP. + +5.2. IPsec and PPP security interactions + + When L2TP is protected with IPsec, both PPP and IPsec security + services are available. Which services are negotiated depends on + whether the tunnel is compulsory or voluntary. A detailed analysis + of voluntary and compulsory tunneling scenarios is included below. + These scenarios are non-normative and do not create requirements for + an implementation to be L2TP security compliant. + + In the scenarios below, it is assumed that both L2TP clients and + servers are able to set and get the properties of IPsec security + associations, as well as to influence the IPsec security services + negotiated. Furthermore, it is assumed that L2TP clients and servers + are able to influence the negotiation process for PPP encryption and + compression. + +5.2.1. Compulsory tunnel + + In the case of a compulsory tunnel, the client sends PPP frames to + the LAC, and will typically not be aware that the frames are being + tunneled, nor that any security services are in place between the LAC + and LNS. At the LNS, a data packet will arrive, which includes a PPP + frame encapsulated in L2TP, which is itself encapsulated in an IP + packet. By obtaining the properties of the Security Association set + up between the LNS and the LAC, the LNS can obtain information about + security services in place between itself and the LAC. Thus in the + compulsory tunneling case, the client and the LNS have unequal + knowledge of the security services in place between them. + + Since the LNS is capable of knowing whether confidentiality, + authentication, integrity and replay protection are in place between + itself and the LAC, it can use this knowledge in order to modify its + behavior during PPP ECP [10] and CCP [9] negotiation. Let us assume + that LNS confidentiality policy can be described by one of the + following terms: "Require Encryption," "Allow Encryption" or + "Prohibit Encryption." If IPsec confidentiality services are in + place, then an LNS implementing a "Prohibit Encryption" policy will + + + +Patel, et al. Standards Track [Page 18] + +RFC 3193 Securing L2TP using IPsec November 2001 + + + act as though the policy had been violated. Similarly, an LNS + implementing a "Require Encryption" or "Allow Encryption" policy will + act as though these policies were satisfied, and would not mandate + use of PPP encryption or compression. This is not the same as + insisting that PPP encryption and compression be turned off, since + this decision will depend on client policy. + + Since the client has no knowledge of the security services in place + between the LAC and the LNS, and since it may not trust the LAC or + the wire between itself and the LAC, the client will typically want + to ensure sufficient security through use of end-to-end IPsec or PPP + encryption/compression between itself and the LNS. + + A client wishing to ensure security services over the entire travel + path would not modify this behavior even if it had knowledge of the + security services in place between the LAC and the LNS. The client + negotiates confidentiality services between itself and the LNS in + order to provide privacy on the wire between itself and the LAC. The + client negotiates end-to-end security between itself and the end- + station in order to ensure confidentiality on the portion of the path + between the LNS and the end-station. + + The client will typically not trust the LAC and will negotiate + confidentiality and compression services on its own. As a result, + the LAC may only wish to negotiate IPsec ESP with null encryption + with the LNS, and the LNS will request replay protection. This will + ensure that confidentiality and compression services will not be + duplicated over the path between the LAC and the LNS. This results + in better scalability for the LAC, since encryption will be handled + by the client and the LNS. + + The client can satisfy its desire for confidentiality services in one + of two ways. If it knows that all end-stations that it will + communicate with are IPsec-capable (or if it refuses to talk to non- + IPsec capable end-stations), then it can refuse to negotiate PPP + encryption/compression and negotiate IPsec ESP with the end-stations + instead. If the client does not know that all end-stations it will + contact are IPsec capable (the most likely case), then it will + negotiate PPP encryption/compression. This may result in duplicate + compression/encryption which can only be eliminated if PPP + compression/encryption can be turned off on a per-packet basis. Note + that since the LNS knows that the client's packets are being tunneled + but the client does not, the LNS can ensure that stateless + compression/encryption is used by offering stateless + compression/encryption methods if available in the ECP and CCP + negotiations. + + + + + +Patel, et al. Standards Track [Page 19] + +RFC 3193 Securing L2TP using IPsec November 2001 + + +5.2.2. Voluntary tunnel + + In the case of a voluntary tunnel, the client will be send L2TP + packets to the NAS, which will route them to the LNS. Over a dialup + link, these L2TP packets will be encapsulated in IP and PPP. + Assuming that it is possible for the client to retrieve the + properties of the Security Association between itself and the LNS, + the client will have knowledge of any security services negotiated + between itself and the LNS. It will also have knowledge of PPP + encryption/compression services negotiated between itself and the + NAS. + + From the LNS point of view, it will note a PPP frame encapsulated in + L2TP, which is itself encapsulated in an IP packet. This situation + is identical to the compulsory tunneling case. If LNS retrieves the + properties of the Security Association set up between itself and the + client, it can be informed of the security services in place between + them. Thus in the voluntary tunneling case, the client and the LNS + have symmetric knowledge of the security services in place between + them. + + Since the LNS is capable of knowing whether confidentiality, + authentication, integrity check or replay protection is in place + between the client and itself, it is able to use this knowledge to + modify its PPP ECP and CCP negotiation stance. If IPsec + confidentiality is in place, the LNS can behave as though a "Require + Encryption" directive had been fulfilled, not mandating use of PPP + encryption or compression. Typically the LNS will not insist that + PPP encryption/compression be turned off, instead leaving this + decision to the client. + + Since the client has knowledge of the security services in place + between itself and the LNS, it can act as though a "Require + Encryption" directive had been fulfilled if IPsec ESP was already in + place between itself and the LNS. Thus, it can request that PPP + encryption and compression not be negotiated. If IP compression + services cannot be negotiated, it will typically be desirable to turn + off PPP compression if no stateless method is available, due to the + undesirable effects of stateful PPP compression. + + Thus in the voluntary tunneling case the client and LNS will + typically be able to avoid use of PPP encryption and compression, + negotiating IPsec Confidentiality, Authentication, and Integrity + protection services instead, as well as IP Compression, if available. + + This may result in duplicate encryption if the client is + communicating with an IPsec-capable end-station. In order to avoid + duplicate encryption/compression, the client may negotiate two + + + +Patel, et al. Standards Track [Page 20] + +RFC 3193 Securing L2TP using IPsec November 2001 + + + Security Associations with the LNS, one with ESP with null + encryption, and one with confidentiality/compression. Packets going + to an IPsec- capable end-station would run over the ESP with null + encryption security association, and packets to a non-IPsec capable + end-station would run over the other security association. Note that + many IPsec implementations cannot support this without allowing L2TP + packets on the same tunnel to be originated from multiple UDP ports. + This requires modifications to the L2TP specification. + + Also note that the client may wish to put confidentiality services in + place for non-tunneled packets traveling between itself and the NAS. + This will protect the client against eavesdropping on the wire + between itself and the NAS. As a result, it may wish to negotiate + PPP encryption and compression with the NAS. As in compulsory + tunneling, this will result in duplicate encryption and possibly + compression unless PPP compression/encryption can be turned off on a + per-packet basis. + +6. References + + [1] Townsley, W., Valencia, A., Rubens, A., Pall, G., Zorn, G., and + B. Palter, "Layer Two Tunneling Protocol L2TP", RFC 2661, + August 1999. + + [2] Bradner, S., "Key words for use in RFCs to Indicate Requirement + Levels", BCP 14, RFC 2119, March 1997. + + [3] Kent, S. and R. Atkinson, "IP Authentication Header", RFC 2402, + November 1998. + + [4] Kent, S. and R. Atkinson, "IP Encapsulating Security Payload + (ESP)", RFC 2406, November 1998. + + [5] Piper, D., "The Internet IP Security Domain of Interpretation + of ISAKMP", RFC 2407, November 1998. + + [6] Atkinson, R. and S. Kent, "Security Architecture for the + Internet Protocol", RFC 2401, November 1998. + + [7] Harkins, D. and D. Carrel, "The Internet Key Exchange (IKE)", + RFC 2409, November 1998. + + [8] Simpson, W., "The Point-to-Point Protocol (PPP)", STD 51, RFC + 1661, July 1994. + + [9] Rand, D., "The PPP Compression Control Protocol (CCP)", RFC + 1962, June 1996. + + + + +Patel, et al. Standards Track [Page 21] + +RFC 3193 Securing L2TP using IPsec November 2001 + + + [10] Meyer, G., "The PPP Encryption Control Protocol (ECP)", RFC + 1968, June 1996. + + [11] Sklower, K. and G. Meyer, "The PPP DES Encryption Protocol + (DESE)", RFC 1969, June 1996. + + [12] Sklower, K. and G. Meyer, "The PPP DES Encryption Protocol, + Version 2 (DESE-bis)", RFC 2419, September 1998. + + [13] Hummert, K., "The PPP Triple-DES Encryption Protocol (3DESE)", + RFC 2420, September 1998. + + [14] Dierks, T. and C. Allen, "The TLS Protocol Version 1.0", RFC + 2246, November 1998. + + [15] Simpson, W., "PPP Challenge Handshake Authentication Protocol + (CHAP)," RFC 1994, August 1996. + + [16] Blunk, L. and J. Vollbrecht, "PPP Extensible Authentication + Protocol (EAP)," RFC 2284, March 1998. + + [17] Hinden, R. and S. Deering, "IP Version 6 Addressing + Architecture", RFC 2373, July 1998. + +Acknowledgments + + Thanks to Gurdeep Singh Pall, David Eitelbach, Peter Ford, and Sanjay + Anand of Microsoft, John Richardson of Intel and Rob Adams of Cisco + for useful discussions of this problem space. + + + + + + + + + + + + + + + + + + + + + + +Patel, et al. Standards Track [Page 22] + +RFC 3193 Securing L2TP using IPsec November 2001 + + +Authors' Addresses + + Baiju V. Patel + Intel Corp + 2511 NE 25th Ave + Hillsboro, OR 97124 + + Phone: +1 503 702 2303 + EMail: baiju.v.patel@intel.com + + + Bernard Aboba + Microsoft Corporation + One Microsoft Way + Redmond, WA 98052 + + Phone: +1 425 706-6605 + EMail: bernarda@microsoft.com + + + William Dixon + Microsoft Corporation + One Microsoft Way + Redmond, WA 98052 + + Phone: +1 425 703 8729 + EMail: wdixon@microsoft.com + + + Glen Zorn + Cisco Systems, Inc. + 500 108th Avenue N.E., Suite 500 + Bellevue, Washington 98004 + + Phone: +1 425 438 8218 + Fax: +1 425 438 1848 + EMail: gwz@cisco.com + + + Skip Booth + Cisco Systems + 7025 Kit Creek Road + RTP, NC 27709 + + Phone: +1 919 392 6951 + EMail: ebooth@cisco.com + + + + + +Patel, et al. Standards Track [Page 23] + +RFC 3193 Securing L2TP using IPsec November 2001 + + +Appendix A: Example IPsec Filter sets for L2TP Tunnel Establishment + + This section provides examples of IPsec filter sets for L2TP tunnel + establishment. While example filter sets are for IPv4, similar + examples could just as easily be constructed for IPv6. + +A.1 Initiator and Responder use fixed addresses and ports + + This is the most simple of the cases since nothing changes during + L2TP tunnel establishment. Since the initiator does not know whether + the responder will change its port number, it still must be prepared + for this case. In this example, the initiator will use an IPv4 + address of 1.1.1.1 and the responder will use an IPv4 address of + 2.2.2.1. + + The filters for this scenario are: + +A.1.1 Protect the SCCRQ + + Initiator Filters: + Outbound-1: From 1.1.1.1, to 2.2.2.1, UDP, src 1701, dst 1701 + + Inbound-1: From 2.2.2.1, to 1.1.1.1, UDP, src 1701, dst 1701 + Inbound-2: From 2.2.2.1, to 1.1.1.1, UDP, src Any-Port, dst 1701 + + Responder Filters: + Outbound-1: None, dynamically injected when IKE Phase 2 completes + + Inbound-1: From Any-Addr, to 2.2.2.1, UDP, src Any-Port, dst 1701 + + After IKE Phase 2 completes the filters at the initiator and + responder will be: + + Initiator Filters: + Outbound-1: From 1.1.1.1, to 2.2.2.1, UDP, src 1701, dst 1701 + + Inbound-1: From 2.2.2.1, to 1.1.1.1, UDP, src 1701, dst 1701 + Inbound-2: From 2.2.2.1, to 1.1.1.1, UDP, src Any-Port, dst 1701 + + Responder Filters: + Outbound-1: From 2.2.2.1, to 1.1.1.1, UDP, src 1701, dst 1701 + + Inbound-1: From 1.1.1.1, to 2.2.2.1, UDP, src 1701, dst 1701 + Inbound-2: From Any-Addr, to 2.2.2.1, UDP, src Any-Port, dst 1701 + + + + + + + +Patel, et al. Standards Track [Page 24] + +RFC 3193 Securing L2TP using IPsec November 2001 + + +A.2 Gateway to Gateway Scenario where Initiator and Responder use + dynamic ports + + In this scenario either side is allowed to initiate the tunnel. + Since dynamic ports will be used, an extra phase 2 negotiation must + occur to protect the SCCRP sent from the responder to the initiator. + Other than the additional phase 2 setup, the only other difference is + that L2TP on the responder must inject an additional filter into the + IPsec database once the new port number is chosen. + + This example also shows the additional filter needed by the initiator + which allows either side to start the tunnel. In either the dial-out + or the gateway to gateway scenario this additional filter is + required. + + For this example, assume the dynamic port given to the initiator is + 5000 and his IP address is 1.1.1.1. The responder will use an IP + address of 2.2.2.1 and a port number of 6000. + + The filters for this scenario are: + +A.2.1 Initial Filters to allow either side to respond to negotiations + + In this case both peers must be able to accept phase 2 negotiations + to from L2TP peers. My-IPAddr is defined as whatever IP address the + device is willing to accept L2TP negotiations on. + + Responder Filters present at both peers: + Inbound-1: From Any-Addr, to My-IPAddr, UDP, src Any-Port, dst 1701 + + Note: The source IP in the inbound-1 filter above for gateway to + gateway tunnels can be IP specific, such as 1.1.1.1, not necessarily + Any-Addr. + +A.2.2 Protect the SCCRQ, one peer is now the initiator + + Initiator Filters: + Outbound-1: From 1.1.1.1, to 2.2.2.1, UDP, src 5000, dst 1701 + + Inbound-1: From 2.2.2.1, to 1.1.1.1, UDP, src 1701, dst 5000 + Inbound-2: From 2.2.2.1, to 1.1.1.1, UDP, src Any-Port, dst 5000 + Inbound-3: From Any-Addr, to 1.1.1.1, UDP, src Any-Port, dst 1701 + + Responder Filters: + Outbound-1: None, dynamically injected when IKE Phase 2 completes + + Inbound-1: From Any-Addr, to 2.2.2.1, UDP, src Any-Port, dst 1701 + + + + +Patel, et al. Standards Track [Page 25] + +RFC 3193 Securing L2TP using IPsec November 2001 + + + After IKE Phase 2 completes the filters at the initiator and + responder will be: + + Initiator Filters: + Outbound-1: From 1.1.1.1, to 2.2.2.1, UDP, src 5000, dst 1701 + + Inbound-1: From 2.2.2.1, to 1.1.1.1, UDP, src 1701, dst 5000 + Inbound-2: From 2.2.2.1, to 1.1.1.1, UDP, src Any-Port, dst 5000 + + Inbound-3: From Any-Addr, to 1.1.1.1, UDP, src Any-Port, dst 1701 + + Responder Filters: + Outbound-1: From 2.2.2.1, to 1.1.1.1, UDP, src 1701, dst 5000 + + Inbound-1: From 1.1.1.1, to 2.2.2.1, UDP, src 5000, dst 1701 + Inbound-2: From Any-Addr, to 2.2.2.1, UDP, src Any-Port, dst 1701 + +A.2.3 Protect the SCCRP after port change + + At this point the responder knows which port number it is going to + use. New filters should be injected by L2TP to reflect this new port + assignment. + + The new filter set at the responder is: + + Responder Filters: + Outbound-1: From 2.2.2.1, to 1.1.1.1, UDP, src 6000, dst 5000 + Outbound-2: From 2.2.2.1, to 1.1.1.1, UDP, src 1701, dst 5000 + + Inbound-1: From 1.1.1.1, to 2.2.2.1, UDP, src 5000, dst 6000 + Inbound-2: From 1.1.1.1, to 2.2.2.1, UDP, src 5000, dst 1701 + Inbound-3: From Any-Addr, to 2.2.2.1, UDP, src Any-Port, dst 1701 + + The second phase 2 will start once L2TP sends the SCCRP. Once the + phase 2 negotiations complete, the new filter set at the initiator + and the responder will be: + + Initiator Filters: + Outbound-1: From 1.1.1.1, to 2.2.2.1, UDP, src 5000, dst 6000 + Outbound-2: From 1.1.1.1, to 2.2.2.1, UDP, src 5000, dst 1701 + + Inbound-1: From 2.2.2.1, to 1.1.1.1, UDP, src 6000, dst 5000 + Inbound-2: From 2.2.2.1, to 1.1.1.1, UDP, src 1701, dst 5000 + Inbound-3: From 2.2.2.1, to 1.1.1.1, UDP, src Any-Port, dst 1701 + + + + + + + +Patel, et al. Standards Track [Page 26] + +RFC 3193 Securing L2TP using IPsec November 2001 + + + Responder Filters: + Outbound-1: From 2.2.2.1, to 1.1.1.1, UDP, src 6000, dst 5000 + Outbound-2: From 2.2.2.1, to 1.1.1.1, UDP, src 1701, dst 5000 + + Inbound-1: From 1.1.1.1, to 2.2.2.1, UDP, src 5000, dst 6000 + Inbound-2: From 1.1.1.1, to 2.2.2.1, UDP, src 5000, dst 1701 + Inbound-3: From Any-Addr, to 2.2.2.1, UDP, src Any-Port, dst 1701 + + Once the L2TP tunnel has been successfully established, the original + phase 2 may be deleted. This allows the Inbound-2 and Outbound-2 + filter statements to be removed as well. + +Intellectual Property Statement + + The IETF takes no position regarding the validity or scope of any + intellectual property or other rights that might be claimed to + pertain to the implementation or use of the technology described in + this document or the extent to which any license under such rights + might or might not be available; neither does it represent that it + has made any effort to identify any such rights. Information on the + IETF's procedures with respect to rights in standards-track and + standards-related documentation can be found in BCP-11. Copies of + claims of rights made available for publication and any assurances of + licenses to be made available, or the result of an attempt made to + obtain a general license or permission for the use of such + proprietary rights by implementors or users of this specification can + be obtained from the IETF Secretariat. + + The IETF invites any interested party to bring to its attention any + copyrights, patents or patent applications, or other proprietary + rights which may cover technology that may be required to practice + this standard. Please address the information to the IETF Executive + Director. + + + + + + + + + + + + + + + + + + +Patel, et al. Standards Track [Page 27] + +RFC 3193 Securing L2TP using IPsec November 2001 + + +Full Copyright Statement + + Copyright (C) The Internet Society (2001). All Rights Reserved. + + This document and translations of it may be copied and furnished to + others, and derivative works that comment on or otherwise explain it + or assist in its implementation may be prepared, copied, published + and distributed, in whole or in part, without restriction of any + kind, provided that the above copyright notice and this paragraph are + included on all such copies and derivative works. However, this + document itself may not be modified in any way, such as by removing + the copyright notice or references to the Internet Society or other + Internet organizations, except as needed for the purpose of + developing Internet standards in which case the procedures for + copyrights defined in the Internet Standards process must be + followed, or as required to translate it into languages other than + English. + + The limited permissions granted above are perpetual and will not be + revoked by the Internet Society or its successors or assigns. + + This document and the information contained herein is provided on an + "AS IS" basis and THE INTERNET SOCIETY AND THE INTERNET ENGINEERING + TASK FORCE DISCLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING + BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION + HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OF + MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. + +Acknowledgement + + Funding for the RFC Editor function is currently provided by the + Internet Society. + + + + + + + + + + + + + + + + + + + +Patel, et al. Standards Track [Page 28] + |