Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Research using the Ada TCB in StrongSwan #68

Closed
dguido opened this issue Aug 20, 2016 · 1 comment
Closed

Research using the Ada TCB in StrongSwan #68

dguido opened this issue Aug 20, 2016 · 1 comment

Comments

@dguido
Copy link
Member Author

dguido commented Aug 21, 2016

TKM does not support the encryption modes we use :-(.

Supported cipher suites and modes from the docs:

  • Encryption Algorithm: IANA 12 aka aes128, aes192, aes256
  • Psuedo-random Function: IANA 7 aka prfsha512
  • Integrity Algorithm: IANA 14 aka sha2_256, sha2_384, sha2_512
  • Diffie-Hellman Group: IANA 15 and 16 aka modp3072 and modp4096
  • Authentication Method: IANA 1 aka RSA Digital Signature

We're using the following config for IKEv2 crypto:

# ike=encryption-integrity-prf-dhgroup
ike=aes128gcm16-sha2_256-prfsha256-ecp256!

# esp = encryption-integrity-dhgroup
esp=aes128gcm16-sha2_256-ecp256!

We would have to make the following changes to support TKIM, none of which I want to make:

  • Bulk encryption: Drop AES-GCM for AES-CBC
  • DH exchange: Drop P-256 ECC for RSA
  • Certificates: Drop P-256 ECC for RSA

More info about IKEv2 cipher suites can be found in the StrongSwan docs and from IANA.

TKM may also have other limitations that we would run into, noted at the bottom of their docs.

@dguido dguido closed this as completed Aug 21, 2016
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant