4.7C Default DS-MIPv6 message and information element contents

36.5083GPPCommon test environments for User Equipment (UE) conformance testingEvolved Universal Terrestrial Radio Access (E-UTRA) and Evolved Packet Core (EPC)Release 17TS

4.7C.1 IKEv2 messages

– IKEv2 IKE_SA_INIT Request

This message is sent by the UE to the SS.

Table 4.7C.1-1: Message IKE_SA_INIT Request

Field

Value/remark

Comment

Condition

IKE Header

Initiator’s IKE_SA SPI

Set by the UE

Responder’s IKE_SA SPI

0

First message jn IKE_SA_INIT exchange

Next Payload

‘00100001’B

SA

Exchange Type

‘00100010’B

IKE_SA_INIT

Security Association Payload

Next Payload

’00100010’B

KE

More proposal

‘00000010’B

Proposal #

‘00000001’B

First cryptographic suite (section 6.5 of TS 33.234)

Protocol ID

‘00000001’B

IKE

SPI size

‘00000000’B

Number of transforms

‘00000010’B

More transform

‘00000011’B

This is the transform for confidentiality

Transform type

‘00000001’B

Encryption

Transform ID

‘00000011’B

3DES in CBC mode (ENCR_3DES)

More transform

‘00000011’B

This is the transform for prf

Transform type

‘00000010’B

PRF

Transform ID

‘00000010’B

PRF_HMAC_SHA1 (HMAC‑SHA1)

More transform

‘00000011’B

This is the transform for integrity

Transform type

‘00000011’B

Integrity

Transform ID

‘00000010’B

HMAC-SHA1-96 (AUTH_HMAC_SHA1_96)

Last transform

‘00000000’B

This is the transform for DH

Transform type

‘00000100’B

DH

Transform ID

‘00000010’B

Diffie-Hellman group 2 (1024-bit MODP)

Last proposal

‘00000000’B

Proposal #

‘00000010’B

Second cryptographic suite (section 6.5 of TS 33.234)

Protocol ID

‘00000001’B

IKE

SPI size

‘00000000’B

Number of transforms

‘00000010’B

More transform

‘00000011’B

This is the transform for confidentiality

Transform type

‘00000001’B

Encryption

Transform ID

‘00001011’B

AES with 128-bit keys in CBC mode (ENCR_AES_CBC)

More transform

‘00000011’B

This is the transform for prf

Transform type

‘00000010’B

PRF

Transform ID

‘00000100’B

PRF_AES128_XCBC_AES-XCBC-PRF-128

More transform

‘00000011’B

This is the transform for integrity

Transform type

‘00000011’B

Integrity

Transform ID

‘00000101’B

AES-XCBC-MAC-96 (AUTH_AES-XCBC -96)

Last transform

‘00000000’B

This is the transform for DH

Transform type

‘00000100’B

DH

Transform ID

‘00000010’B

Diffie-Hellman group 2 (1024-bit MODP)

Key Exchange Payload

Next Payload

‘00101000’B

Nonce

DH Group #

‘0000000000000010’B

DH group 2

Key Exchange data

Set by the UE

Nonce Payload

Next Payload

‘00101001’B

Notify

UE IKE INIT HA

Nonce data

Random number set by the UE

REDIRECT_SUPPORTED Notify Payload

UE IKE INIT HA

Next Payload

‘00000000’B

No Next Payload

UE IKE INIT HA

Protocol ID

‘00000000’B

Notification is not specific to a particular security association

UE IKE INIT HA

SPI size

‘00000000’B

SPI field not present

UE IKE INIT HA

Notify Message Type

‘0100000000010110’B

REDIRECT_SUPPORTED

UE IKE INIT HA

REDIRECT_FROM Notify Payload

UE IKE INIT HA Redirected

Next Payload

‘00000000’B

No next payload

UE IKE INIT HA Redirected

Protocol ID

‘00000000’B

Notification is not specific to a particular security association

UE IKE INIT HA Redirected

SPI size

‘00000000’B

SPI field not present

UE IKE INIT HA Redirected

Notify Message Type

‘0100000000010110’B

REDIRECT_FROM

UE IKE INIT HA Redirected

GW Ident Type

Any allowed value (IPv6 or IPv4 or HA FQDN)

Set depending on how the UE has discovered the HA in the preamble

UE IKE INIT HA Redirected

New Responder GW Identity

Depends on GW Ident type

UE IKE INIT HA Redirected

Condition

Explanation

UE IKE INIT HA

Part of IKE_INIT_SA request message sent to HA only

UE IKE INIT HA Redirected

Part of IKE_INIT_SA request message sent to HA only after a REDIRECT payload was received in a previous IKEV2 messages exchange

– IKE_SA_INIT Response

This message is sent by the SS to the UE.

Table 4.7C.1-2: Message IKE_SA_INIT Response

Field

Value/remark

Comment

Condition

IKE Header

Initiator’s IKE_SA SPI

Same as that set by the UE in IKE_SA_INIT request

Responder’s IKE_SA SPI

Set by the SS

Next Payload

‘00100001’B

SA

Exchange Type

‘00100010’B

IKE_SA_INIT

Security Association Payload

Next Payload

’00100010’B

KE

Proposal

One of the 2 proposals included in IKE_SA_INIT at Step 1

Key Exchange Payload

Next payload

‘00 101000’B

Nonce

DH Group #

‘0000000000000010’B

DH group 2

Key Exchange data

Set by the SS

Nonce Payload

Next t payload

‘00000000’B

No Next Payload

Nonce data

Set by the SS

– IKE_AUTH_Request

This message is sent by the UE to the SS.

Table 4.7C.1-3: Message IKE_AUTH Request

Field

Value/remark

Comment

Condition

IKE Header

Initiator’s IKE_SA SPI

Same as that set by the UE in IKE_INIT_SA Request

Responder’s IKE_SA SPI

Same as that set by the SS in IKE_INIT_SA Response

Next Payload

‘00101110’B

E

Exchange Type

‘00100011’B

IKE_AUTH

Encrypted Payload

Next Payload

‘00100011’B

IDi

UE IKE AUTH1

Initialization Vector

Random value set by the UE

UE IKE AUTH1

Encrypted IKE Payloads

UE IKE AUTH1

Identification – Initiator Payload

UE IKE AUTH1

Next Payload

‘00101111’B

CP

UE IKE AUTH1

ID Type

00000010B

UE IKE AUTH1

ID

Set to MN-NAI

UE IKE AUTH1

Configuration Payload

UE IKE AUTH1

Next Payload

‘00100001’B

SA

UE IKE AUTH1

CFG Type

‘00000001’B

Request

UE IKE AUTH1

Configuration Attribute

‘00010000’B

MIP6_HOME_PREFIX attribute

UE IKE AUTH1 HA

Length

‘0000000000000000’B

UE IKE AUTH1 HA

Security Association Payload

UE IKE AUTH1

Next Payload

‘00101100’B

TSi

UE IKE AUTH1

Proposals

Any set of allowed values

UE IKE AUTH1

Traffic Selector – Initiator Payload

UE IKE AUTH1

Next Payload

‘00101100’B

TSr

UE IKE AUTH1

Traffic selector data

Any allowed set of values

UE IKE AUTH1

Traffic Selector – Responder Payload

UE IKE AUTH1

Next Payload

‘00100100’B

IDr

UE IKE AUTH1

Traffic selector data

Any allowed set of values

UE IKE AUTH1

Identification – Responder Payload

UE IKE AUTH1

Next Payload

‘00000000’B

No Next Payload

UE IKE AUTH1

ID Type

‘00000010’B

UE IKE AUTH1

ID

APN

UE IKE AUTH1

Next Payload

‘00110000’B

EAP

UE IKE AUTH2

Initialization Vector

Random value set by the UE

UE IKE AUTH2

Encrypted IKE Payloads

UE IKE AUTH2

Extensible Authentication Payload

UE IKE AUTH2

Next Payload

‘00000000’B

No Next Payload

UE IKE AUTH2

Code

‘00000010’B

Response

UE IKE AUTH2

Type

‘00010111’B

AKA

UE IKE AUTH2

Subtype

AKA-Challenge

UE IKE AUTH2

Attribute type

’00000011’B

AT_RES

UE IKE AUTH2

AT_RES

See TS 24.301 [28] subclause 9.9.3.4

UE IKE AUTH2

Next Payload

‘00100111’B

AUTH

UE IKE AUTH3

Initialization Vector

Random value set by the UE

UE IKE AUTH3

Encrypted IKE Payloads

UE IKE AUTH3

Authentication Payload

UE IKE AUTH3

Next Payload

‘00000000’B

No Next Payload

UE IKE AUTH3

Auth Method

’00000010’B

Shared Key Integrity code

UE IKE AUTH3

Auth Data

derived from the MSK obtained from AKA exchange

RFC 4306 defines the function to derive this key (section 2.15)

UE IKE AUTH3

Padding

Set by the UE

Fields from Encrypted payload

Pad Length

Set by the UE

Fields from Encrypted payload

Integrity checksum data

Set by the UE

Fields from Encrypted payload

Condition

Explanation

UE IKE AUTH1

Part of IKE_AUTH request message sent to HA or ePDG after the reception of IKE_INIT_SA response

UE IKE AUTH1 HA

Part of IKE_AUTH request message sent to HA after the reception of IKE_INIT_SA response

UE IKE AUTH2

Part of IKE_AUTH request message sent to HA or ePDG after the reception of IKE_SA response message containing the certificate payload CERT

UE IKE AUTH3

Part of IKE_AUTH request message sent to HA or ePDG after the reception of IKE_SA response containing EAP and encryption payloads only

– IKE_AUTH Response

This message is sent by the SS to the UE.

Table 4.7C.1-4: Message IKE_AUTH Response

Field

Value/remark

Comment

Condition

IKE Header

Initiator’s IKE_SA SPI

Same as that set by the UE in IKE_SA_INIT request

Responder’s IKE_SA SPI

Same as that set by the SS in IKE_SA_INIT response

Next Payload

‘00101110’B

E

Exchange Type

‘00100011’B

IKE_AUTH

Encrypted Payload

Next Payload

‘00100100’B

IDr

SS IKE AUTH1

Initialization Vector

Set by the SS

SS IKE AUTH1

Encrypted IKE Payloads

SS IKE AUTH1

Identification – Responder Payload

SS IKE AUTH1

Next Payload

‘00100101’B

CERT

SS IKE AUTH1

ID Type

‘00000010’B

SS IKE AUTH1

ID

APN

SS IKE AUTH1

Certificate Payload

SS IKE AUTH1

Next Payload

‘00110000’B

EAP

SS IKE AUTH1

Cert encoding

’00000100’B

X.509 certificate – signature

SS IKE AUTH1

Certificate data

Set by the SS

DER encoded X.509 certificate

SS IKE AUTH1

Extensible Authentication Payload

SS IKE AUTH1

Next Payload

‘00000000’B

No Next Payload

SS IKE AUTH1

Code

‘00000001’B

Request

SS IKE AUTH1

Type

‘00010111’B

AKA

SS IKE AUTH1

Subtype

AKA-Challenge

SS IKE AUTH1

Attribute type

’00000001’B

AT_RAND

SS IKE AUTH1

AT_RAND

An arbitrarily selected 128 bits value

SS IKE AUTH1

Attribute Type

‘00000010’B

AT_AUTN

SS IKE AUTH1

AT_AUTN

See TS 24.301 [28] subclause 9.9.3.2

SS IKE AUTH1

Next Payload

‘00110000’B

EAP

SS IKE AUTH2

Initialization Vector

Set by the SS

SS IKE AUTH2

Encrypted IKE Payloads

SS IKE AUTH2

Extensible Authentication Payload

SS IKE AUTH2

Next Payload

‘00000000’B

No Next Payload

SS IKE AUTH2

Code

‘00000011’B

Success

SS IKE AUTH2

Next Payload

‘00101111’B

CP

SS IKE AUTH3

Auth Method

’00000010’B

Shared Key Integrity code

SS IKE AUTH3

Auth Data

derived from the MSK obtained from AKA exchange

RFC 4306 defines the function to derive this key (section 2.15)

SS IKE AUTH3

Configuration Payload

SS IKE AUTH3

Next Payload

‘00100001’B

SA

SS IKE AUTH3

CFG Type

‘00000010’B

Reply

SS IKE AUTH3

Configuration Attribute

‘00010000’B

MIP6_HOME_PREFIX attribute

SS IKE AUTH3 HA

Length

‘0000000000010101’B

SS IKE AUTH3 HA

Prefix lifetime

Any allowed value

SS IKE AUTH3 HA

Home Prefix

IPv6 prefix – 16 bytes

SS IKE AUTH3 HA

Prefix length

‘10000000’B

Prefix length must be 64

SS IKE AUTH3 HA

Notify Payload

SS IKE AUTH3 HA redirect

Next Payload

‘00100001’B

SA

SS IKE AUTH3 HA redirect

Protocol ID

‘00000000’B

Notification is not specific to a particular security association

SS IKE AUTH3 HA redirect

SPI Size

‘00000000’B

SPI field not present

SS IKE AUTH3 HA redirect

Notify Message Type Length

‘0100000000010111’B

REDIRECT

SS IKE AUTH3 HA redirect

GW Ident Type

‘00000101’B

SS IKE AUTH3 HA redirect

New Responder GW Identity

IPv6 address of the HA to relocate

SS IKE AUTH3 HA redirect

GW Ident Type

‘00000001’B

SS IKE AUTH3 HA redirect

New Responder GW Identity

IPv4 address of the HA to relocate

Optional

SS IKE AUTH3 HA redirect

Security Association Payload

SS IKE AUTH3

Next Payload

‘00101101’

TSi

SS IKE AUTH3

Proposal

One of the 2 proposals included in IKE_AUTH Request at Step 3

SS IKE AUTH3

Traffic Selector – Initiator Payload

SS IKE AUTH3

Next Payload

‘00101100’B

TSr

SS IKE AUTH3

Traffic Selector data

Any allowed set of values

SS IKE AUTH3

Traffic Selector – Responder Payload

SS IKE AUTH3

Next Payload

‘00000000’B

No Next Payload

SS IKE AUTH3

Padding

Set by the SS

Fields from Encryption payload

Pad Length

Set by the SS

Fields from Encryption payload

Integrity checksum data

Set by the SS

Fields from Encryption payload

Condition

Explanation

SS IKE AUTH1

Part of IKE_AUTH request message sent to the UE as part of the first IKE_AUTH Response message

SS IKE AUTH2

Part of IKE_AUTH request message sent to the UE as part of the second IKE_AUTH Response message

SS IKE AUTH3

Part of IKE_AUTH request message sent to the UE as part of the third IKE_AUTH Response message

SS IKE AUTH3 HA

Part of IKE_AUTH request message sent to the UE as part of the third IKE_AUTH Response message when the UE interacts with HA

SS IKE AUTH3 HA_redirect

Part of IKE_AUTH request message sent to the UE as part of the third IKE_AUTH Response message when the UE interacts with HA and the UE gets redirected

4.7C.2 Messages used to perform DS-MIPv6 registration and deregistration

– Router Advertisement

This message is sent by the SS to the UE.

Table 4.7C.2-1: Message Router Advertisement

Field

Value/remark

Comment

Condition

Type

‘10000110’B

Code

‘00000000’B

Checksum

Set by SS

ICMP checksum

Cur Hop Limit

‘00000000’B

Unspecified

M

Set by the SS

O

Set by the SS

Depends on access network specific settings

H

‘0’B

Prf

Set by the SS

Depends on access network specific settings

Prf

Set by the SS

Depends on access network specific settings

P

Set by the SS

Depends on access network specific settings

Reserved

‘00000’B

Router Lifetime

Set by the SS

Reachable Time

Set by the SS

Retrans Timer

Set by the SS

type

‘00000011’B

Prefix Information Option

Length

‘00000100’B

Prefix length

Set by the SS

L

‘1’B

A

Set by the SS

Valid Lifetime

Set by the SS

Preferred Lifetime

Set by the SS

Prefix

Set as per specific message content

– Binding Update

This message is sent by the UE to the SS.

Table 4.7C.2-2: Message Binding Update

Information Element

Value/remark

Comment

Condition

IPv4 Source Address

UE IPv4 CoA (IPv4 address acquired by UE during network attachment)

UE IPv4

IPv4 Destination Address

IPv4 of Home Agent discovered during preamble

UE IPv4

UDP header

UE IPv4

Source Port

Set by UE

UE IPv4

Destination port

‘0001000001011111’B

UE IPv4

IPv6 Source Address

UE IPv6 CoA (IPv6 address acquired by the UE during network attachment)

IPv6 visited

IPv6 Home Address configured by the UE from Home Network Prefix assigned to UE during preamble

UE IPv6-home, UE IPv4

IPv6 Destination Address

IPv6 of Home Agent discovered during preamble

Destination Header

IPv6 Home Address configured by the UE from Home Network Prefix assigned to the UE during preamble

IPv6 visited

Payload Proto

‘00111011’B

MH Type

‘00000101’B

Binding Update message

Sequence Number

Any allowed value

Lifetime

Any allowed non-zero value

IPv6 visited

‘0000000000000000’B

UE IPv6-home

A

‘1’B

H

‘1’B

L

Not checked

K

‘1’B

M

’0’B

R

’1’B

P

‘0’B

F

’0’B

IPv4 Home Address option

Set to the value "0.0.0.0" to request allocation for the UE. The "P" flag is set to ‘0’B.

The Prefix Length is set to the requested prefix length of ’32’.

Optional

Alternate Care-of Address option

Same IPv6 address as that inserted in the IP Source Address field

UE IPv6-visited

Condition

Explanation

UE IPv4

UE is in an IPv4 visited network (see RFC 5555)

UE IPv6-home

UE is in an IPv6 home network (see RFC 5555)

UE IPv6-visited

UE is in an IPv6 visited network (see RFC 5555)

– Binding Acknowledgement

This message is sent by the SS to the UE.

Table 4.7C.2-3: Message Binding Acknowledgement

Information Element

Value/remark

Comment

Condition

IPv4 Source Address

IPv4 Home Agent address

UE IPv4

IPv4 Destination Address

Same value as UE IPv4 CoA in IP Source Address from Binding Update

UE IPv4

UDP header

UE IPv4

Source Port

‘0001000001011111’B

UE IPv4

Destination port

Same as Source port in Binding Update

UE IPv4

IPv6 Source Address

IPv6 Home Agent address

IPv6 Destination Address

Same value as UE IPv6 CoA in IP Source Address from Binding Update

UE IPv6-visited

IPv6 Home Address

UE IPv6-home, UE IPv4

Routing Header

Same value as UE IPv6 Home Address in Destination Header from Binding Update

UE IPv6-visited

Payload Proto

‘00111011’B

MH Type

‘00000110’B

Binding Acknowledgement message

Status

‘00000000’B

Binding Update accepted

K

Set by the SS

R

‘1’B

P

‘0’B

Sequence Number

Same value as that sent by the UE in the Binding Update

Lifetime

‘0000000010010110’B

10 min

UE IPv6-visited, UE IPv4

‘0000000000000000’B

UE IPv6-home

IPv4 Address Acknowledgement option

IPv4 Home Address allocated to the UE

Present if IPv4 Home Address option was included by the UE in Binding Update

Binding Refresh Advice option

‘0000000010010110’B

10 min

Condition

Explanation

UE IPv4

UE is in an IPv4 visited network (see RFC 5555)

UE IPv6-home

UE is in an IPv6 home network (see RFC 5555)

UE IPv6-visited

UE is in an IPv6 visited network (see RFC 5555)

– Binding Revocation Indication

This message is sent by the SS to the UE.

Table 4.7C.2-4: Binding Revocation Indication

Field

Value/remark

Comment

Condition

IPv4 Header

UE IPv4

IPv4 Source Address

UE IPv4 Home Agent address

UE IPv4

UDP header

UE IPv4

Source Port

Set by SS

UE IPv4

Destination port

‘0001000001011111’B

UE IPv4

IPv6 Header

IPv6 Source Address

IPv6 Home Agent address

IPv6 Destination Address

IPv6 Home Address configured by UE from Home Network Prefix assigned to UE during preamble

UE IPv4

IPv6 CoA

UE IPv6-visited

Routing Header

IPv6 Home Address configured by the UE from Home Network Prefix assigned to the UE during preamble

UE IPv6-visited

B.R. Type

‘00000001’B

B.R.I

Sequence Number

Set by the SS

Revocation Trigger

‘00000001’B

P

‘0’B

G

‘0’B

V

‘0’B

Condition

Explanation

UE IPv4

UE is in an IPv4 visited network (see RFC 5555)

UE IPv6-visited

UE is in an IPv6 visited network (see RFC 5555)

– Binding Revocation Acknowledgement

This message is sent by the UE to the SS.

Table 4.7C.2-5: Binding Revocation Acknowledgement

Information Element

Value/remark

Comment

Condition

IPv4 Header

UE IPv4

IPv4 Source Address

IPv4 CoA

UE IPv4

IPv4 Destination Address

UE IPv4 Home Agent Address

UE IPv4

UDP header

UDP header

UE IPv4

Source Port

‘0001000001011111’B

Source Port

UE IPv4

Destination port

Same as Source port in Binding Revocation

Destination port

UE IPv4

IPv6 Header

IPv6 Source Address

IPv6 Home Address configured by UE

UE IPv4

IPv6 CoA

UE IPv6-visited

IPv6 Destination Address

IPv6 of Home Agent address

IPv6 Destination Address

Destination Header

IPv6 Home Address configured by the UE

UE IPv6-visited

B.R. Type

‘00000010’B

B.R.A

Sequence Number

Same value as Sequence Number sent by the SS in Binding Revocation

Status

‘00000000’B

Success

P

‘0’B

G

‘0’B

V

‘0’B

Condition

Explanation

UE IPv4

UE is in an IPv4 visited network (see RFC 5555)

UE IPv6-visited

UE is in an IPv6 visited network (see RFC 5555)