[Openswan Users] IKE algorithm newest

kAja Ziegler ziegleka at gmail.com
Thu Sep 20 02:48:12 EDT 2012


Hi,

  I have two nodes with CentOS 6.3 and Openswan 2.6.32 and with the same
ipsec configuration. I have two questions about "IKE algorithm newest",
when IKEv2 is used.

conn <name>
        left=<ip>
        leftsubnet=<subnet>
        leftid=@<id_fqdn>
        leftrsasigkey=<rsa_key>

        right=<ip>
        rightsubnet=<subnet>
        rightid=@<id_fqdn>
        rightrsasigkey=<rsa_key>

        authby=rsasig
        ike=<IKE>
        ikev2=propose
        phase2alg=aes256-sha1;modp2048

        auto=add


1. When I set ike=3des-sha1;modp2048 on both nodes, then the "IKE algorithm
newest" is BLOWFISH_CBC_192-SHA1-MODP2048 on both sides. Is it OK or is
this a bug - 3DES -> BLOWFISH?

000 "<name>":   ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s;
rekey_fuzz: 100%; keyingtries: 0
000 "<name>":   policy:
RSASIG+ENCRYPT+TUNNEL+PFS+IKEv2ALLOW+IKEv2Init+SAREFTRACK; prio: 23,16;
interface: eth0;
000 "<name>":   newest ISAKMP SA: #1; newest IPsec SA: #2;
000 "<name>":   IKE algorithms wanted:
3DES_CBC(5)_000-SHA1(2)_000-MODP2048(14); flags=-strict
000 "<name>":   IKE algorithms found:
3DES_CBC(5)_192-SHA1(2)_160-MODP2048(14)
000 "<name>":   IKE algorithm newest: BLOWFISH_CBC_192-SHA1-MODP2048
000 "<name>":   ESP algorithms wanted: AES(12)_256-SHA1(2)_000;
pfsgroup=MODP2048(14); flags=-strict
000 "<name>":   ESP algorithms loaded: AES(12)_256-SHA1(2)_160
000 "<name>":   ESP algorithm newest: AES_256-HMAC_SHA1; pfsgroup=MODP2048


2. When I set ike=aes256-sha1;modp2048 on both nodes, then the "IKE
algorithm newest" is _256-SHA1-MODP2048 on both sides. Is it OK or is this
a bug - missing AES at beginning?

000 "<name>":   ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s;
rekey_fuzz: 100%; keyingtries: 0
000 "<name>":   policy:
RSASIG+ENCRYPT+TUNNEL+PFS+IKEv2ALLOW+IKEv2Init+SAREFTRACK; prio: 23,16;
interface: eth0;
000 "<name>":   newest ISAKMP SA: #1; newest IPsec SA: #2;
000 "<name>":   IKE algorithms wanted:
AES_CBC(7)_256-SHA1(2)_000-MODP2048(14); flags=-strict
000 "<name>":   IKE algorithms found:
AES_CBC(7)_256-SHA1(2)_160-MODP2048(14)
000 "<name>":   IKE algorithm newest: _256-SHA1-MODP2048
000 "<name>":   ESP algorithms wanted: AES(12)_256-SHA1(2)_000;
pfsgroup=MODP2048(14); flags=-strict
000 "<name>":   ESP algorithms loaded: AES(12)_256-SHA1(2)_160
000 "<name>":   ESP algorithm newest: AES_256-HMAC_SHA1; pfsgroup=MODP2048

Best regards,
-- 
Karel Ziegler
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.openswan.org/pipermail/users/attachments/20120920/b9e2dd5f/attachment.html>


More information about the Users mailing list