| /* $NetBSD: isakmp.h,v 1.4 2006/09/09 16:22:09 manu Exp $ */ |
| |
| /* Id: isakmp.h,v 1.11 2005/04/25 22:19:39 manubsd Exp */ |
| |
| /* |
| * Copyright (C) 1995, 1996, 1997, and 1998 WIDE Project. |
| * All rights reserved. |
| * |
| * Redistribution and use in source and binary forms, with or without |
| * modification, are permitted provided that the following conditions |
| * are met: |
| * 1. Redistributions of source code must retain the above copyright |
| * notice, this list of conditions and the following disclaimer. |
| * 2. Redistributions in binary form must reproduce the above copyright |
| * notice, this list of conditions and the following disclaimer in the |
| * documentation and/or other materials provided with the distribution. |
| * 3. Neither the name of the project nor the names of its contributors |
| * may be used to endorse or promote products derived from this software |
| * without specific prior written permission. |
| * |
| * THIS SOFTWARE IS PROVIDED BY THE PROJECT AND CONTRIBUTORS ``AS IS'' AND |
| * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE |
| * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE |
| * ARE DISCLAIMED. IN NO EVENT SHALL THE PROJECT OR CONTRIBUTORS BE LIABLE |
| * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL |
| * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS |
| * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) |
| * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT |
| * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY |
| * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF |
| * SUCH DAMAGE. |
| */ |
| |
| #ifndef _ISAKMP_H |
| #define _ISAKMP_H |
| |
| /* refer to RFC 2408 */ |
| |
| /* must include <netinet/in.h> first. */ |
| /* must include "isakmp_var.h" first. */ |
| |
| #define INITIATOR 0 /* synonym sender */ |
| #define RESPONDER 1 /* synonym receiver */ |
| |
| #define GENERATE 1 |
| #define VALIDATE 0 |
| |
| /* 3.1 ISAKMP Header Format |
| 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 |
| +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ |
| ! Initiator ! |
| ! Cookie ! |
| +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ |
| ! Responder ! |
| ! Cookie ! |
| +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ |
| ! Next Payload ! MjVer ! MnVer ! Exchange Type ! Flags ! |
| +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ |
| ! Message ID ! |
| +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ |
| ! Length ! |
| +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ |
| */ |
| struct isakmp { |
| cookie_t i_ck; /* Initiator Cookie */ |
| cookie_t r_ck; /* Responder Cookie */ |
| u_int8_t np; /* Next Payload Type */ |
| u_int8_t v; |
| u_int8_t etype; /* Exchange Type */ |
| u_int8_t flags; /* Flags */ |
| u_int32_t msgid; |
| u_int32_t len; /* Length */ |
| } __attribute__((__packed__)); |
| |
| /* Next Payload Type */ |
| #define ISAKMP_NPTYPE_NONE 0 /* NONE*/ |
| #define ISAKMP_NPTYPE_SA 1 /* Security Association */ |
| #define ISAKMP_NPTYPE_P 2 /* Proposal */ |
| #define ISAKMP_NPTYPE_T 3 /* Transform */ |
| #define ISAKMP_NPTYPE_KE 4 /* Key Exchange */ |
| #define ISAKMP_NPTYPE_ID 5 /* Identification */ |
| #define ISAKMP_NPTYPE_CERT 6 /* Certificate */ |
| #define ISAKMP_NPTYPE_CR 7 /* Certificate Request */ |
| #define ISAKMP_NPTYPE_HASH 8 /* Hash */ |
| #define ISAKMP_NPTYPE_SIG 9 /* Signature */ |
| #define ISAKMP_NPTYPE_NONCE 10 /* Nonce */ |
| #define ISAKMP_NPTYPE_N 11 /* Notification */ |
| #define ISAKMP_NPTYPE_D 12 /* Delete */ |
| #define ISAKMP_NPTYPE_VID 13 /* Vendor ID */ |
| #define ISAKMP_NPTYPE_ATTR 14 /* Attribute */ |
| |
| |
| /* NAT-T draft-ietf-ipsec-nat-t-ike-05 and later */ |
| /* XXX conflicts with values assigned to RFC 3547 */ |
| #define ISAKMP_NPTYPE_NATD_BADDRAFT 15 /* NAT Discovery */ |
| #define ISAKMP_NPTYPE_NATOA_BADDRAFT 16 /* NAT Original Address */ |
| |
| |
| /* NAT-T RFC */ |
| #define ISAKMP_NPTYPE_NATD_RFC 20 /* NAT Discovery */ |
| #define ISAKMP_NPTYPE_NATOA_RFC 21 /* NAT Original Address */ |
| |
| /* NAT-T up to draft-ietf-ipsec-nat-t-ike-04 */ |
| #define ISAKMP_NPTYPE_NATD_DRAFT 130 /* NAT Discovery */ |
| #define ISAKMP_NPTYPE_NATOA_DRAFT 131 /* NAT Original Address */ |
| |
| /* Frag does not seems to be documented */ |
| #define ISAKMP_NPTYPE_FRAG 132 /* IKE fragmentation payload */ |
| |
| #define ISAKMP_NPTYPE_MAX 17 |
| /* 128 - 255 Private Use */ |
| |
| /* |
| * The following are valid when the Vendor ID is one of the |
| * following: |
| * |
| * MD5("A GSS-API Authentication Method for IKE") |
| * MD5("GSSAPI") (recognized by Windows 2000) |
| * MD5("MS NT5 ISAKMPOAKLEY") (sent by Windows 2000) |
| * |
| * See draft-ietf-ipsec-isakmp-gss-auth-06.txt. |
| */ |
| #define ISAKMP_NPTYPE_GSS 129 /* GSS token */ |
| |
| #define ISAKMP_MAJOR_VERSION 1 |
| #define ISAKMP_MINOR_VERSION 0 |
| #define ISAKMP_VERSION_NUMBER 0x10 |
| #define ISAKMP_GETMAJORV(v) (((v) & 0xf0) >> 4) |
| #define ISAKMP_SETMAJORV(v, m) ((v) = ((v) & 0x0f) | (((m) << 4) & 0xf0)) |
| #define ISAKMP_GETMINORV(v) ((v) & 0x0f) |
| #define ISAKMP_SETMINORV(v, m) ((v) = ((v) & 0xf0) | ((m) & 0x0f)) |
| |
| /* Exchange Type */ |
| #define ISAKMP_ETYPE_NONE 0 /* NONE */ |
| #define ISAKMP_ETYPE_BASE 1 /* Base */ |
| #define ISAKMP_ETYPE_IDENT 2 /* Identity Proteciton */ |
| #define ISAKMP_ETYPE_AUTH 3 /* Authentication Only */ |
| #define ISAKMP_ETYPE_AGG 4 /* Aggressive */ |
| #define ISAKMP_ETYPE_INFO 5 /* Informational */ |
| #define ISAKMP_ETYPE_CFG 6 /* Mode config */ |
| /* Additional Exchange Type */ |
| #define ISAKMP_ETYPE_QUICK 32 /* Quick Mode */ |
| #define ISAKMP_ETYPE_NEWGRP 33 /* New group Mode */ |
| #define ISAKMP_ETYPE_ACKINFO 34 /* Acknowledged Informational */ |
| |
| /* Flags */ |
| #define ISAKMP_FLAG_E 0x01 /* Encryption Bit */ |
| #define ISAKMP_FLAG_C 0x02 /* Commit Bit */ |
| #define ISAKMP_FLAG_A 0x04 /* Authentication Only Bit */ |
| |
| /* 3.2 Payload Generic Header |
| 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 |
| +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ |
| ! Next Payload ! RESERVED ! Payload Length ! |
| +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ |
| */ |
| struct isakmp_gen { |
| u_int8_t np; /* Next Payload */ |
| u_int8_t reserved; /* RESERVED, unused, must set to 0 */ |
| u_int16_t len; /* Payload Length */ |
| } __attribute__((__packed__)); |
| |
| /* 3.3 Data Attributes |
| 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 |
| +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ |
| !A! Attribute Type ! AF=0 Attribute Length ! |
| !F! ! AF=1 Attribute Value ! |
| +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ |
| . AF=0 Attribute Value . |
| . AF=1 Not Transmitted . |
| +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ |
| */ |
| struct isakmp_data { |
| u_int16_t type; /* defined by DOI-spec, and Attribute Format */ |
| u_int16_t lorv; /* if f equal 1, Attribute Length */ |
| /* if f equal 0, Attribute Value */ |
| /* if f equal 1, Attribute Value */ |
| } __attribute__((__packed__)); |
| #define ISAKMP_GEN_TLV 0x0000 |
| #define ISAKMP_GEN_TV 0x8000 |
| /* mask for type of attribute format */ |
| #define ISAKMP_GEN_MASK 0x8000 |
| |
| #if 0 |
| /* MAY NOT be used, because of being defined in ipsec-doi. */ |
| /* 3.4 Security Association Payload */ |
| struct isakmp_pl_sa { |
| struct isakmp_gen h; |
| u_int32_t doi; /* Domain of Interpretation */ |
| u_int32_t sit; /* Situation */ |
| } __attribute__((__packed__)); |
| #endif |
| |
| /* 3.5 Proposal Payload */ |
| /* |
| The value of the next payload field MUST only contain the value "2" |
| or "0". If there are additional Proposal payloads in the message, |
| then this field will be 2. If the current Proposal payload is the |
| last within the security association proposal, then this field will |
| be 0. |
| */ |
| struct isakmp_pl_p { |
| struct isakmp_gen h; |
| u_int8_t p_no; /* Proposal # */ |
| u_int8_t proto_id; /* Protocol */ |
| u_int8_t spi_size; /* SPI Size */ |
| u_int8_t num_t; /* Number of Transforms */ |
| /* SPI */ |
| } __attribute__((__packed__)); |
| |
| /* 3.6 Transform Payload */ |
| /* |
| The value of the next payload field MUST only contain the value "3" |
| or "0". If there are additional Transform payloads in the proposal, |
| then this field will be 3. If the current Transform payload is the |
| last within the proposal, then this field will be 0. |
| */ |
| struct isakmp_pl_t { |
| struct isakmp_gen h; |
| u_int8_t t_no; /* Transform # */ |
| u_int8_t t_id; /* Transform-Id */ |
| u_int16_t reserved; /* RESERVED2 */ |
| /* SA Attributes */ |
| } __attribute__((__packed__)); |
| |
| /* 3.7 Key Exchange Payload */ |
| struct isakmp_pl_ke { |
| struct isakmp_gen h; |
| /* Key Exchange Data */ |
| } __attribute__((__packed__)); |
| |
| #if 0 |
| /* NOTE: MUST NOT use because of being defined in ipsec-doi instead them. */ |
| /* 3.8 Identification Payload */ |
| struct isakmp_pl_id { |
| struct isakmp_gen h; |
| union { |
| u_int8_t id_type; /* ID Type */ |
| u_int32_t doi_data; /* DOI Specific ID Data */ |
| } d; |
| /* Identification Data */ |
| } __attribute__((__packed__)); |
| /* A.4 ISAKMP Identification Type Values */ |
| #define ISAKMP_ID_IPV4_ADDR 0 |
| #define ISAKMP_ID_IPV4_ADDR_SUBNET 1 |
| #define ISAKMP_ID_IPV6_ADDR 2 |
| #define ISAKMP_ID_IPV6_ADDR_SUBNET 3 |
| #endif |
| |
| /* 3.9 Certificate Payload */ |
| struct isakmp_pl_cert { |
| struct isakmp_gen h; |
| /* |
| * Encoding type of 1 octet follows immediately, |
| * variable length CERT data follows encoding type. |
| */ |
| } __attribute__((__packed__)); |
| |
| /* Certificate Type */ |
| #define ISAKMP_CERT_NONE 0 |
| #define ISAKMP_CERT_PKCS7 1 |
| #define ISAKMP_CERT_PGP 2 |
| #define ISAKMP_CERT_DNS 3 |
| #define ISAKMP_CERT_X509SIGN 4 |
| #define ISAKMP_CERT_X509KE 5 |
| #define ISAKMP_CERT_KERBEROS 6 |
| #define ISAKMP_CERT_CRL 7 |
| #define ISAKMP_CERT_ARL 8 |
| #define ISAKMP_CERT_SPKI 9 |
| #define ISAKMP_CERT_X509ATTR 10 |
| #define ISAKMP_CERT_PLAINRSA 11 |
| |
| /* the method to get peers certificate */ |
| #define ISAKMP_GETCERT_PAYLOAD 1 |
| #define ISAKMP_GETCERT_LOCALFILE 2 |
| #define ISAKMP_GETCERT_DNS 3 |
| |
| /* 3.10 Certificate Request Payload */ |
| struct isakmp_pl_cr { |
| struct isakmp_gen h; |
| u_int8_t num_cert; /* # Cert. Types */ |
| /* |
| Certificate Types (variable length) |
| -- Contains a list of the types of certificates requested, |
| sorted in order of preference. Each individual certificate |
| type is 1 octet. This field is NOT required. |
| */ |
| /* # Certificate Authorities (1 octet) */ |
| /* Certificate Authorities (variable length) */ |
| } __attribute__((__packed__)); |
| |
| /* 3.11 Hash Payload */ |
| struct isakmp_pl_hash { |
| struct isakmp_gen h; |
| /* Hash Data */ |
| } __attribute__((__packed__)); |
| |
| /* 3.12 Signature Payload */ |
| struct isakmp_pl_sig { |
| struct isakmp_gen h; |
| /* Signature Data */ |
| } __attribute__((__packed__)); |
| |
| /* 3.13 Nonce Payload */ |
| struct isakmp_pl_nonce { |
| struct isakmp_gen h; |
| /* Nonce Data */ |
| } __attribute__((__packed__)); |
| |
| /* 3.14 Notification Payload */ |
| struct isakmp_pl_n { |
| struct isakmp_gen h; |
| u_int32_t doi; /* Domain of Interpretation */ |
| u_int8_t proto_id; /* Protocol-ID */ |
| u_int8_t spi_size; /* SPI Size */ |
| u_int16_t type; /* Notify Message Type */ |
| /* SPI */ |
| /* Notification Data */ |
| } __attribute__((__packed__)); |
| |
| /* 3.14.1 Notify Message Types */ |
| /* NOTIFY MESSAGES - ERROR TYPES */ |
| #define ISAKMP_NTYPE_INVALID_PAYLOAD_TYPE 1 |
| #define ISAKMP_NTYPE_DOI_NOT_SUPPORTED 2 |
| #define ISAKMP_NTYPE_SITUATION_NOT_SUPPORTED 3 |
| #define ISAKMP_NTYPE_INVALID_COOKIE 4 |
| #define ISAKMP_NTYPE_INVALID_MAJOR_VERSION 5 |
| #define ISAKMP_NTYPE_INVALID_MINOR_VERSION 6 |
| #define ISAKMP_NTYPE_INVALID_EXCHANGE_TYPE 7 |
| #define ISAKMP_NTYPE_INVALID_FLAGS 8 |
| #define ISAKMP_NTYPE_INVALID_MESSAGE_ID 9 |
| #define ISAKMP_NTYPE_INVALID_PROTOCOL_ID 10 |
| #define ISAKMP_NTYPE_INVALID_SPI 11 |
| #define ISAKMP_NTYPE_INVALID_TRANSFORM_ID 12 |
| #define ISAKMP_NTYPE_ATTRIBUTES_NOT_SUPPORTED 13 |
| #define ISAKMP_NTYPE_NO_PROPOSAL_CHOSEN 14 |
| #define ISAKMP_NTYPE_BAD_PROPOSAL_SYNTAX 15 |
| #define ISAKMP_NTYPE_PAYLOAD_MALFORMED 16 |
| #define ISAKMP_NTYPE_INVALID_KEY_INFORMATION 17 |
| #define ISAKMP_NTYPE_INVALID_ID_INFORMATION 18 |
| #define ISAKMP_NTYPE_INVALID_CERT_ENCODING 19 |
| #define ISAKMP_NTYPE_INVALID_CERTIFICATE 20 |
| #define ISAKMP_NTYPE_BAD_CERT_REQUEST_SYNTAX 21 |
| #define ISAKMP_NTYPE_INVALID_CERT_AUTHORITY 22 |
| #define ISAKMP_NTYPE_INVALID_HASH_INFORMATION 23 |
| #define ISAKMP_NTYPE_AUTHENTICATION_FAILED 24 |
| #define ISAKMP_NTYPE_INVALID_SIGNATURE 25 |
| #define ISAKMP_NTYPE_ADDRESS_NOTIFICATION 26 |
| #define ISAKMP_NTYPE_NOTIFY_SA_LIFETIME 27 |
| #define ISAKMP_NTYPE_CERTIFICATE_UNAVAILABLE 28 |
| #define ISAKMP_NTYPE_UNSUPPORTED_EXCHANGE_TYPE 29 |
| #define ISAKMP_NTYPE_UNEQUAL_PAYLOAD_LENGTHS 30 |
| #define ISAKMP_NTYPE_MINERROR 1 |
| #define ISAKMP_NTYPE_MAXERROR 16383 |
| /* NOTIFY MESSAGES - STATUS TYPES */ |
| #define ISAKMP_NTYPE_CONNECTED 16384 |
| /* 4.6.3 IPSEC DOI Notify Message Types */ |
| #define ISAKMP_NTYPE_RESPONDER_LIFETIME 24576 |
| #define ISAKMP_NTYPE_REPLAY_STATUS 24577 |
| #define ISAKMP_NTYPE_INITIAL_CONTACT 24578 |
| |
| /* DPD */ |
| #define ISAKMP_NTYPE_R_U_THERE 36136 |
| #define ISAKMP_NTYPE_R_U_THERE_ACK 36137 |
| |
| #define ISAKMP_NTYPE_HEARTBEAT 40503 |
| |
| /* using only to log */ |
| #define ISAKMP_LOG_RETRY_LIMIT_REACHED 65530 |
| |
| /* XXX means internal error but it's not reserved by any drafts... */ |
| #define ISAKMP_INTERNAL_ERROR -1 |
| |
| /* 3.15 Delete Payload */ |
| struct isakmp_pl_d { |
| struct isakmp_gen h; |
| u_int32_t doi; /* Domain of Interpretation */ |
| u_int8_t proto_id; /* Protocol-Id */ |
| u_int8_t spi_size; /* SPI Size */ |
| u_int16_t num_spi; /* # of SPIs */ |
| /* SPI(es) */ |
| } __attribute__((__packed__)); |
| |
| struct payload_list { |
| struct payload_list *next, *prev; |
| vchar_t *payload; |
| int payload_type; |
| }; |
| |
| |
| /* See draft-ietf-ipsec-isakmp-mode-cfg-04.txt, 3.2 */ |
| struct isakmp_pl_attr { |
| struct isakmp_gen h; |
| u_int8_t type; /* Exchange type */ |
| u_int8_t res2; |
| u_int16_t id; /* Per transaction id */ |
| } __attribute__((__packed__)); |
| |
| /* Exchange type */ |
| #define ISAKMP_CFG_REQUEST 1 |
| #define ISAKMP_CFG_REPLY 2 |
| #define ISAKMP_CFG_SET 3 |
| #define ISAKMP_CFG_ACK 4 |
| |
| /* IKE fragmentation payload */ |
| struct isakmp_frag { |
| u_int16_t unknown0; /* always set to zero? */ |
| u_int16_t len; |
| u_int16_t unknown1; /* always set to 1? */ |
| u_int8_t index; |
| u_int8_t flags; |
| } __attribute__((__packed__)); |
| |
| /* flags */ |
| #define ISAKMP_FRAG_LAST 1 |
| |
| /* DPD R-U-THERE / R-U-THERE-ACK Payload */ |
| struct isakmp_pl_ru { |
| struct isakmp_gen h; |
| u_int32_t doi; /* Domain of Interpretation */ |
| u_int8_t proto_id; /* Protocol-Id */ |
| u_int8_t spi_size; /* SPI Size */ |
| u_int16_t type; /* Notify type */ |
| cookie_t i_ck; /* Initiator Cookie */ |
| cookie_t r_ck; /* Responder cookie*/ |
| u_int32_t data; /* Notification data */ |
| } __attribute__((__packed__)); |
| |
| #endif /* _ISAKMP_H */ |