I did a write up in response to the paper published at:
https://weakdh.org/ You can find it at: https://nohats.ca/wordpress/blog/2015/05/20/weakdh-and-ike-ipsec/ Exec Summary below, you can find more details in my blog post. Paul TL;DR The LogJam downgrade attack does not apply to MODP groups in the IKE protocol, only to TLS, so IKE or IPsec is not impacted. If you are using libreswan you are not vulnerable to weak MODP groups and using MODP2048 per default unless specifically configured for a lower MODP group. If you are using openswan with IKEv2 you are using MODP2048, but if you are using IKEv1 you are using MODP1536 which is still much stronger than MODP768 or MODP1024. Libreswan as a client to a weak server will allow MODP1024 in IKEv1 as the least secure option, and MODP1536 in IKEv2 as the least secure option. Openswan does not properly implement INVALID_KE, so it cannot connect to another DH group than the one it started out as, so it runs the risk of getting locked out if the server side bumps their minimum MODP group to 2048. openswan defaults to MODP1536 in IKEv1 and MODP2048 in IKEv2 [...] _______________________________________________ Swan mailing list [email protected] https://lists.libreswan.org/mailman/listinfo/swan
