A central idea of Oakley's PFS is that compromise of a single
key will permit access to only data protected by a single key. For
PFS to exist, the key used to protect transmission of data must not
be used to derive any additional keys, and if the key used to protect
transmission of data was derived from some other keying material,
that material shall not be used to derive any more keys. This assures
the "freshness" of a key.
While Oakley defines "modes," ISAKMP defines "phases." IKE
presents different exchanges as modes that operate in one of two
phases:
- Phase 1 is where the two ISAKMP peers establish a secure,
authenticated channel with which to communicate (the SA process).
"Main Mode" and "Aggressive Mode" (we'll get to these later), each
accomplish a phase 1 exchange. "Main Mode" and "Aggressive Mode" are
only used in phase 1.
- Phase 2 is where SAs are negotiated on behalf of
IPSec or another service that needs key material.
"Quick Mode" accomplishes a phase 2 exchange.