[strongSwan] Android supported cipher suites
Mark M
mark076h at yahoo.com
Sat Apr 11 22:52:15 CEST 2015
Andreas,
Thanks for the info. This means that the Android client fully supports SuiteB.
Does the client support pfs? I have esp=aes256-sha384-ecp384! but I only see AES_CBC_256/HMAC_SHA2_384_192 for the tunnel SA? Maybe I am confused about how pfs works or what adding the DH group to esp= does? I
phone1{2}: INSTALLED, TUNNEL, ESP in UDP SPIs: ca1b40f8_i cf71b373_o
> phone1{2}: AES_CBC_256/HMAC_SHA2_384_192, 15552 bytes_i (100
Thanks,
Mark-
On Saturday, April 11, 2015 8:59 AM, Andreas Steffen <andreas.steffen at strongswan.org> wrote:
Hi Mark,
the Android client proposes the following cipher suites:
IKE:AES_CBC_128/AES_CBC_192/AES_CBC_256/3DES_CBC/
HMAC_MD5_96/HMAC_SHA1_96/HMAC_SHA2_256_128/HMAC_SHA2_384_192/
HMAC_SHA2_512_256/AES_XCBC_96/
PRF_HMAC_MD5/PRF_HMAC_SHA1/PRF_HMAC_SHA2_256/PRF_HMAC_SHA2_384/
PRF_HMAC_SHA2_512/PRF_AES128_XCBC/
MODP_2048/MODP_2048_224/MODP_2048_256/MODP_1536/MODP_3072/
MODP_4096/MODP_8192/MODP_1024/MODP_1024_160/ECP_256/ECP_384/ECP_521/
ECP_224/ECP_192/ECP_224_BP/ECP_256_BP/ECP_384_BP/ECP_512_BP,
IKE:AES_GCM_8_128/AES_GCM_8_192/AES_GCM_8_256/AES_GCM_12_128/
AES_GCM_12_192/AES_GCM_12_256/AES_GCM_16_128/AES_GCM_16_192/
AES_GCM_16_256/
PRF_HMAC_MD5/PRF_HMAC_SHA1/PRF_HMAC_SHA2_256/PRF_HMAC_SHA2_384/
PRF_HMAC_SHA2_512/PRF_AES128_XCBC/
MODP_2048/MODP_2048_224/MODP_2048_256/MODP_1536/MODP_3072/
MODP_4096/MODP_8192/MODP_1024/MODP_1024_160/ECP_256/ECP_384/ECP_521/
ECP_224/ECP_192/ECP_224_BP/ECP_256_BP/ECP_384_BP/ECP_512_BP
ESP:AES_GCM_16_128/AES_GCM_16_256/NO_EXT_SEQ,
ESP:AES_CBC_128/HMAC_SHA2_256_128/NO_EXT_SEQ,
ESP:AES_CBC_256/HMAC_SHA2_384_192/NO_EXT_SEQ,
ESP:AES_CBC_128/AES_CBC_192/AES_CBC_256/HMAC_SHA1_96/
HMAC_SHA2_256_128/HMAC_SHA2_384_192/HMAC_SHA2_512_256/NO_EXT_SEQ
Best regards
Andreas
On 04/11/2015 04:45 AM, Mark M wrote:
> What cipher suites are officially supported with the Android client? I
> am using Android 5.0.2 and was able to establish an SA and tunnel with
> esp=aes256-sha384-ecp384! and ike=aes256-sha384-ecp384!
>
> The documentation on the site and the Android Play page does not really
> specify the actual supported ciphers?
>
> Below is the output of my strongswan statusall
>
> phone1[4]: IKEv2 SPIs: de827fcebd1a9dff_i 8bf56383c0465740_r*, public
> key reauthentication in 2 hours
> phone1[4]: IKE proposal:
> AES_CBC_256/HMAC_SHA2_384_192/PRF_HMAC_SHA2_384/ECP_384
> phone1{2}: INSTALLED, TUNNEL, ESP in UDP SPIs: ca1b40f8_i cf71b373_o
> phone1{2}: AES_CBC_256/HMAC_SHA2_384_192, 15552 bytes_i (100
> pkts, 17s ago), 27531 bytes_o (87 pkts, 17s ago), rekeying in 44 minutes
> phone1{2}: 0.0.0.0/0 === 192.168.9.1/32
>
>
>
> Thanks,
>
> Mark-
======================================================================
Andreas Steffen andreas.steffen at strongswan.org
strongSwan - the Open Source VPN Solution! www.strongswan.org
Institute for Internet Technologies and Applications
University of Applied Sciences Rapperswil
CH-8640 Rapperswil (Switzerland)
===========================================================[ITA-HSR]==
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.strongswan.org/pipermail/users/attachments/20150411/f6680c41/attachment.html>
More information about the Users
mailing list