On Monday 13 May 2013 03:13:27 Adam Carter wrote:
> > You can read a comparison between the *Swans here, but things have moved
> > on since; e.g. StrongSwan supports IKEv1 in Aggressive Mode,
> 
> Aggressive mode with pre-shared keys is vulnerable to offline dictionary
> attack so you might as well use main mode. If for some reason you have to
> use aggressive mode use a long randomly generated PSK.

Indeed it is vulnerable, because the hash of the PSK is sent out in the 
initial handshake.  This can be captured by eavesdropping and cracked by brute 
force off line.  As suggested long keys help, especially if they are changed 
often.

It is best, however, to not use a PSK at all and instead set up SSL 
certificates for VPN gateway and client machines authentication and RSA 
encryption.  This makes it easy to revoke a single SSL certificate if a client 
is compromised, instead of having to change PSKs for any number of machines 
that are using the VPN network.
-- 
Regards,
Mick

Attachment: smime.p7s
Description: S/MIME cryptographic signature

Reply via email to