Summary: | Windows Roadwarrior Connections Cannot use ECP due to Certificate Type | ||
---|---|---|---|
Product: | IPFire | Reporter: | Tom Rymes <tomvend> |
Component: | --- | Assignee: | Assigned to nobody - feel free to grab it and work on it <nobody> |
Status: | NEW --- | QA Contact: | |
Severity: | - Unknown - | ||
Priority: | - Unknown - | CC: | michael.tremer, peter.mueller |
Version: | 2 | ||
Hardware: | unspecified | ||
OS: | Unspecified | ||
Bug Depends on: | |||
Bug Blocks: | 11618 |
Description
Tom Rymes
2019-02-18 17:26:02 UTC
Interesting, but actually the algorithm of the certificate does not have anything to do with the IKE handshake. It would make sense to use the modern EC cryptography throughout the whole system, but I do not see any technical reason why this would be a requirement. However, I am not sure what you are asking for right now. I would say, keep using MODP4096 or higher if possible. This won't have any disadvantage for the performance of the tunnel. Michael, while the RFC does not require it, the Windows implementation does require it. This is actually a big deal, as the only group types that the built-in Windows IKE client supports at present are: Group1 Group2 Group14 ECP256 ECP384 Group24 Of those, only Group14, ECP256, and ECP384 are considered secure, and since it is not currently possible to use ECP256 or ECP384 with IPFire due to the certificate algorithm, that means IPFire users on Windows are currently limited to MODP2048 (Group14). I do not know if the actual IPFire Host and root certs need modifying, or just the certificate for the connection itself. Rereading the linked comment, it appears that this may be more complex than initially acknowledged: "The ECDSA key length of the certificate used has to match the DH group length." I'm thinking that this means that the connection parameters need to be specified before the key is generated, and that it will only work with one specific DH Group. |