On Wed, 3 Jun 2020, Shweta Kalyani wrote:
I wanted to check if SHA 256 and 512 is supported for IKEv1 and IKEv2 for esp tunnels. Following is my conf in which phase 1 passes(ike_sa=1) but fails in phase 2. I have enabled USE_SHA2=true when building libreswan. Would appreciate your response on this.
It is supported and tested and FIPS certified.
esp = 3DES-SHA2_256
Using SHA2 with 3DES is a bit of an odd combination. Although it does work.
ike = 3DES-SHA2_256-MODP1024
This one is also odd. While it works (provided you compile with USE_DH2=true) you don't really gain security here for using SHA2 over SHA1 because of the very very weak DH2 (modp1024).
000 "Tunnel37_1": newest ISAKMP SA: #3; newest IPsec SA: #0; 000 "Tunnel37_1": IKE algorithms: 3DES_CBC-HMAC_SHA2_256-MODP1024 000 "Tunnel37_1": IKEv1 algorithm newest: 3DES_CBC_192-HMAC_SHA2_256-MODP1024 000 "Tunnel37_1": ESP algorithms: 3DES_CBC-HMAC_SHA2_256_128
000 #1: "Tunnel37_1":500 STATE_MAIN_I4 (ISAKMP SA established); EVENT_SA_REPLACE in 28057s; lastdpd=-1s(seq in:0 out:0); idle; 000 #2: "Tunnel37_1":500 STATE_QUICK_I1 (sent QI1, expecting QR1); EVENT_RETRANSMIT in 21s; lastdpd=-1s(seq in:0 out:0); idle; 000 #3: "Tunnel37_1":500 STATE_MAIN_R3 (sent MR3, ISAKMP SA established); EVENT_SA_REPLACE in 28457s; newest ISAKMP; lastdpd=-1s(seq in:0 out:0); idle; 000 #4: "Tunnel37_1":500 STATE_QUICK_R0 (expecting QI1); EVENT_CRYPTO_TIMEOUT in 17s; lastdpd=-1s(seq in:0 out:0); idle;
You can see that the IKEv1 IKE SA came up (state #1) with 3des-sha2_256 The phase 2 packet did not get a reply, presumbly the other end did not like your proposal for phase2. It could be a crypto parameter, but could also be a src/dst IP range or mismatched pfs= setting etc. You will need to check the other endpoint's log on why it refused to answer. Paul _______________________________________________ Swan mailing list [email protected] https://lists.libreswan.org/mailman/listinfo/swan
