[strongSwan] Disable only 3DES?
Troy Telford
ttelford.groups at gmail.com
Mon Oct 4 07:34:13 CEST 2010
On Oct 3, 2010, at 9:57 PM, Andreas Steffen wrote:
> Hi Troy,
>
> --disable-des disables the des plugin but the 3DES is still provided
> by either the openssl or gcrypt plugins which you seem to have enabled.
> You can generate all combinations of encryption, integrity and key
> exchange algorithms in the following way:
>
> ike=aes128-aes256-sha1-sha2-md5-modp1536-modp2048-modp1024!
I noticed that syntax in the ipsec.conf man page; however it doesn't appear to work for either pluto or charon:
I'm getting the following for each conn entry (from pluto):
Oct 3 23:24:26 pilot pluto[13470]: added connection description "rw"
Oct 3 23:24:26 pilot pluto[13470]: syntax error in ike string
And something similar from charon:
Oct 3 23:20:25 pilot charon: 00[DMN] loaded plugins: curl ldap aes sha1 sha2 random x509 pubkey pkcs1 pgp dnskey pem sqlite openssl fips-prf xcbc hmac agent gmp attr attr-sql resolve kernel-netlink socket-raw farp stroke updown eap-identity eap-aka eap-md5 eap-gtc eap-mschapv2 dhcp
Oct 3 23:20:25 pilot charon: 00[JOB] spawning 16 worker threads
Oct 3 23:20:25 pilot charon: 03[CFG] crl caching to /etc/ipsec.d/crls enabled
Oct 3 23:20:25 pilot charon: 03[CFG] received stroke: add connection 'rw'
Oct 3 23:20:25 pilot charon: 03[CFG] skipped invalid proposal string: aes128-aes256-sha1-sha2-modp1536-modp2048-modp1024
Oct 3 23:20:25 pilot charon: 03[CFG] loaded certificate "C=US, ST=<blah>"
I've dug into the Debian package, and here's what I've found:
* One patch to the init script for debian: "Fixed init script for restart to work when either pluto or charon
are not installed."
* ./configure options of:
CONFIGUREARGS := --prefix=/usr --sysconfdir=/etc --localstatedir=/var \
--libexecdir=/usr/lib \
--enable-ldap --enable-curl \
--with-capabilities=libcap \
--enable-smartcard \
--with-default-pkcs11=/usr/lib/opensc-pkcs11.so \
--enable-mediation --enable-medsrv --enable-medcli \
--enable-openssl --enable-agent \
--enable-eap-radius --enable-eap-identity --enable-eap-md5 \
--enable-eap-gtc --enable-eap-aka --enable-eap-mschapv2 \
--enable-sql --enable-integrity-test \
--enable-nat-transport --enable-sqlite \
--enable-nm --enable-ha --enable-dhcp --enable-farp \
--enable-test-vectors
(I personally added --enable-sqlite and --enable-nat-transport; --enable-nat-transport was enabled because I have to have L2TP, and L2TP won't work in either transport or tunnel mode unless --enable-nat-transport is used.)
>
> On 10/04/2010 12:24 AM, Troy Telford wrote:
>> I hope this is a quick question:
>>
>> It seems tedious to have to list each and every combination of allowed
>> cipher, but exclude DES/3DES by using ike= and esp=.
>>
>> I realize I could simply limit to, say, AES, by using something like:
>> ike=aes128-md5-modp1536
>> esp=aes128-md5-modp1536
>>
>> but I'd rather remain flexible...
>>
>> I've tried compiling strongswan with --disable-des, however 'ipsec
>> listall' still lists DES and 3DES:
>>
>> 000 List of registered IKEv1 Algorithms:
>> 000
>> 000 encryption: BLOWFISH_CBC 3DES_CBC AES_CBC CAMELLIA_CBC
>> 000 integrity: HMAC_MD5 HMAC_SHA1 HMAC_SHA2_256 HMAC_SHA2_384 HMAC_SHA2_512
>> 000 dh-group: MODP_1024 MODP_1536 MODP_2048 MODP_3072 MODP_4096
>> MODP_6144 MODP_8192 ECP_256 ECP_384 ECP_521 MODP_1024_160 MODP_2048_224
>> MODP_2048_256 ECP_192 ECP_224
>> 000
>> 000 List of registered ESP Algorithms:
>> 000
>> 000 encryption: DES_CBC 3DES_CBC CAST_CBC BLOWFISH_CBC NULL AES_CBC
>> AES_CTR AES_CCM_8 AES_CCM_12 AES_CCM_16 AES_GCM_8 AES_GCM_12 AES_GCM_16
>> CAMELLIA_CBC AES_GMAC SERPENT_CBC TWOFISH_CBC
>> 000 integrity: HMAC_MD5 HMAC_SHA1 HMAC_SHA2_256 HMAC_RIPEMD
>> AES_XCBC_96 NULL HMAC_SHA2_256_96
>> List of registered IKEv2 Algorithms:
>>
>> encryption: AES_CBC CAMELLIA_CBC 3DES_CBC RC5_CBC IDEA_CBC CAST_CBC
>> BLOWFISH_CBC DES_CBC DES_ECB NULL
>> integrity: AES_XCBC_96 HMAC_SHA1_96 HMAC_SHA1_128 HMAC_SHA1_160
>> HMAC_SHA2_256_128 HMAC_MD5_96 HMAC_MD5_128 HMAC_SHA2_384_192
>> HMAC_SHA2_512_256
>> hasher: HASH_SHA1 HASH_SHA224 HASH_SHA256 HASH_SHA384 HASH_SHA512
>> HASH_MD2 HASH_MD4 HASH_MD5
>> prf: PRF_KEYED_SHA1 PRF_FIPS_SHA1_160 PRF_AES128_XCBC
>> PRF_HMAC_SHA2_256 PRF_HMAC_SHA1 PRF_HMAC_MD5 PRF_HMAC_SHA2_384
>> PRF_HMAC_SHA2_512
>> dh-group: MODP_2048 MODP_2048_224 MODP_2048_256 MODP_1536 ECP_256
>> ECP_384 ECP_521 ECP_224 ECP_192 MODP_3072 MODP_4096 MODP_6144 MODP_8192
>> MODP_1024 MODP_1024_160 MODP_768
>>
>> So am I just reading what's happening wrong, or what?
>>
>> Thanks,
>
>
> --
> ======================================================================
> Andreas Steffen andreas.steffen at strongswan.org
> strongSwan - the Linux VPN Solution! www.strongswan.org
> Institute for Internet Technologies and Applications
> University of Applied Sciences Rapperswil
> CH-8640 Rapperswil (Switzerland)
> ===========================================================[ITA-HSR]==
--
Troy Telford
ttelford.groups at gmail.com
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.strongswan.org/pipermail/users/attachments/20101003/124786bb/attachment.html>
More information about the Users
mailing list