<div dir="ltr">Hi all,<div><br></div><div><span style="color:rgb(0,0,0);font-family:Verdana,Geneva,Arial,Helvetica,sans-serif;font-size:18px">I came across below news about a paper enlisting attacks pertaining to IKE protocol, and want to know whether the latest version of trongSwan stack is vulnerable to the attacks mentioned in this paper: </span><span style="color:rgb(0,0,0);font-family:Verdana,Geneva,Arial,Helvetica,sans-serif;font-size:18px"><a href="https://www.ei.rub.de/media/nds/veroeffentlichungen/2018/08/13/sec18-felsch.pdf">https://www.ei.rub.de/media/nds/veroeffentlichungen/2018/08/13/sec18-felsch.pdf</a></span></div><div><span style="color:rgb(0,0,0);font-family:Verdana,Geneva,Arial,Helvetica,sans-serif;font-size:18px">References:</span></div><div><span style="color:rgb(0,0,0);font-family:Verdana,Geneva,Arial,Helvetica,sans-serif;font-size:18px"><a href="https://latesthackingnews.com/2018/08/20/ipsec-vpn-connections-broken-using-20-year-old-flaw/">https://latesthackingnews.com/2018/08/20/ipsec-vpn-connections-broken-using-20-year-old-flaw/</a></span><br style="color:rgb(0,0,0);font-family:Verdana,Geneva,Arial,Helvetica,sans-serif;font-size:18px"><span style="color:rgb(0,0,0);font-family:Verdana,Geneva,Arial,Helvetica,sans-serif;font-size:18px"><a href="https://securityaffairs.co/wordpress/75352/hacking/key-reuse-ipsec-attack.html">https://securityaffairs.co/wordpress/75352/hacking/key-reuse-ipsec-attack.html</a></span><br></div><div><br></div><div><span style="color:rgb(0,0,0);font-family:Verdana,Geneva,Arial,Helvetica,sans-serif;font-size:18px">Thanks,</span></div><div><span style="color:rgb(0,0,0);font-family:Verdana,Geneva,Arial,Helvetica,sans-serif;font-size:18px">Sandesh</span></div></div>