Hi there,
i wanna ask if there is an idea in the future to made it possible that i can select which sha or aes i will use?
Currently there is only sha1 and aes128 available, but sha1 is already known as vulnerable.
So currently there is only one way to fix this, you had to setup an ipsec tunnel and then the eoip trough it.
And thats a little bit boring if you had so much tunnels as i have.
i highly encourage the usage of proper DH groups for perfect forward secrecy. Group 14 (modp2048) is considered as minimum, and one shall be rather using elliptic curve ones (group19+).
with regards to hashing, i’ll say SHA256 (or SHA512) for phase 1, and use aes256 at least.
with regards to the peer section, you don’t seem to have much alternatives than manually configuring your all your peers.
the defaults are as you said (aes128/3des and sha1) and i see no knob to control this. this is extremely unpleasant as phase1 is very important, if someone breaks into that, then you are screwed.
luckily we have modp2048 (group14) as default PFS setting here:
so we could tweak all phase1 parameters in dynamic sessions, even certificate-based auth would be possible, and by setting “policy-template-group” to an user defined one we could also have control over phase2 parameters. but it would not break existing “not so secure” peers.
Yeah it would be really nice if this feature would be added, because i had to configure a lot of tunnels by hand. If it would be implementet that i can chose the profile, i didn’t need to configure for each peer a seperat ipsec tunnel and can use eoip with secret.
Or is there any other way that the Eoip Tunnel did not chose the default configuration? Or can i adjust the default and optimize it?
When you think that your data is so secret and important that aes128 is nog good enough for you, it should not be too much effort to manually configure IPsec.
It is quite easy, just setup with automatic IPsec first, then copy the generated IPsec setup and change it to your liking and remove the automatic IPsec.
In fact, when you are so concerned about Phase1 security, it is probably a good idea to instead look at your firewall rules so ISAKMP is only allowed from your peer(s).