On Tue, 9 Jul 2019, Kaushal Shriyan wrote:

I am running libreswan version 3.29 on CentOS 7.6 and the details are as below:-

I have the below config. 

       conn apps-tomcat-primary
              type=tunnel
              authby=secret
              left=%defaultroute
              leftid=128.117.167.12
              leftnexthop=%defaultroute
              leftsubnet=128.117.167.12/32
              right=126.114.94.7
              rightsubnet=126.114.90.7/32
              ike=aes128-sha1;modp1024

Note using DH2 makes no sense. It's too weak. libreswan-3.30 has it
compile time disabled by default.

              phase2alg=aes128-sha1;modp1536

It also makes little sense to have a larger phase2 DH group.

              pfs=yes
              auto=start
              ikev2=no


I will appreciate if you can let me know the suggested cipher suites 
(encryption and authentication) to be implemented as per the above Libreswan 
IPsec configuration.

It will only allow what you specified on the ike= and esp= lines. Only
if you specify nothing in the conn, do you get default ciphers eiter
from conn %default or via the system-wide crypto policies (via conn
%default).

So your ike= line will only allow AES 128 bit key, SHA1 for PRF and
INTEG, using DH2. Your esp=/phase2alg- line only allows AES 128 bit key,
SHA1 for INTEG and DH5 Quickmode/PFS.

Paul
_______________________________________________
Swan mailing list
[email protected]
https://lists.libreswan.org/mailman/listinfo/swan

Reply via email to