Creating IKE tunnels using digital certificates

To create IKE tunnels that use digital certificates, you must specify RSA signatures as the authentication mode in the IKE tunnel transform policy file.

The following example shows an example of the XML policy file that specifies RSA signatures:
<!-- define the policy for IKE tunnel -->
<IKEProtection
	IKE ProtectionName="ike_3des_sha">
	<IKETTransform
		IKE AuthenticationMethod="RSA_signatures"
		IKE Encryption="3DES-CBC"
		IKE Hash="SHA"
		IKE DHGroup="1"/>
</IKEProtection>
IP Security supports the following IKE tunnel host identity types:
  • IP address
  • Fully Qualified Domain Name (FQDN)
  • user@FQDN
  • X.500 Distinguished Name
  • Key identifier
When the IKE tunnel uses the RSA signature mode, the X.500 Distinguished Names are typically used in the IKE tunnel definition. For example, if the local and remote hosts of your tunnel are identified as /C=US/O=ABC/OU=SERV/CN=localname.austin.ibm.com and /C=US/O=ABC/OU=SERV/CN=remotename.austin.ibm.com, the IKE tunnel definition in the XML file reads like the following sample contents:
<IKETunnel>
	IKE TunnelName="Key_Tunnel"
	IKE ProtectionRef="ike_3des_sha">
<IKELocalIdentity>
	<ASN1_DN Value="/C=US/O=ABC/OU=SERV/CN=localname.austin.ibm.com">
	</ASN1_DN>
</IKELocalIdentity>
<IKERemoteIdentity>
	<ASN1_DN Value="/C=US/O=ABC/OU=SERV/CN=remotename.austin.ibm.com">
	</ASN1_DN>
</IKERemoteIdentity>
</IKETunnel>
To obtain the required certificate from the certificate authority (CA), use the Key Manager tool to generate the certificate request. For example, if you use /C=US/O=ABC/OU=SERV/CN=name.austin.ibm.com as the Subject Distinguished Name in your certificate, you must enter the following values in the Key Manager tool when you create a digital certificate request:
Common name
name.austin.ibm.com
Organization
ABC
Organizational unit
SERV
Country
US

The X.500 Distinguished Name that is entered is the name that is typically set up by your system or LDAP administrator. The organizational unit value is optional.

IP Security also supports entering other identity types as Subject Alternate Names in a digital certificate. For example, if you use IP address 10.10.10.1 as the alternate host identity, the following values must be entered in the digital certificate request:
Common name
name.austin.ibm.com
Organization
ABC
Organizational unit
SERV
Country
US
Subject alternate IP address field
10.10.10.1

After you create the digital certificate request with this information, the CA uses this information to create the personal digital certificate.

When requesting a personal digital certificate, the CA needs the following information:

  • You are requesting an X.509 certificate.
  • The signature format is MD5 with RSA encryption.
  • Whether you are specifying Subject Alternate Name. Alternate name types are provided in the following list:
    • IP address
    • Fully qualified domain name (FQDN)
    • user@FQDN

    The following subject alternate-name information is included in the certificate request file.

  • Your planned key use (the digital signature bit must be selected).
  • The Key Manager digital certificate request file (in PKCS#10 format).

For specific steps that explain how to use the Key Manager tool to create a certificate request, see Requesting a digital certificate.

Before you activate the IKE tunnel, you must add the personal digital certificate that you received from the CA into the Key Manager database, ikekey.kdb. For more information, see Adding (Receiving) a new digital certificate.

IP Security supports the following types of personal digital certificates:

Subject DN
The Subject Distinguished Name must be in the following format and order:
/C=US/O=ABC/OU=SERV/CN=name.austin.ibm.com

The Key Manager tool allows only one OU value.

Subject DN and Subject Alternate Name as an IP address
The Subject Distinguished Name and Subject Alternate Name can be designated as an IP address, as shown in the following:

/C=US/O=ABC/OU=SERV/CN=name.austin.ibm.com and 10.10.10.1

Subject DN and Subject Alternate Name as FQDN
The Subject Distinguished Name and Subject Alternate Name can be designated as a fully qualified domain name, as shown in the following:

/C=US/O=ABC/OU=SERV/CN=name.austin.ibm.com and bell.austin.ibm.com.

Subject DN and Subject Alternate Name as user@FQDN
The Subject Distinguished Name and Subject Alternate Name can be designated as a user address (user_ID@fully_qualified_domain_name), as shown in the following:

/C=US/O=ABC/OU=SERV/CN=name.austin.ibm.com and name@austin.ibm.com.

Subject DN and multiple Subject Alternate Names
The Subject Distinguished Name can be associated with multiple Subject Alternate Names, as shown in the following:

/C=US/O=ABC/OU=SERV/CN=name.austin.ibm.com and bell.austin.ibm.com, 10.10.10.1, and user@name.austin.ibm.com.