<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: IKEv2 Proposal in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ikev2-proposal/m-p/4728965#M1095431</link>
    <description>&lt;P&gt;he need time for his algorithm to break the Key, during that time the key is change.&amp;nbsp;&lt;BR /&gt;why recommend strong ? if you see all strong hash&amp;amp;encrypt use long bits number for your example SHA256 meaning it use 256 bit, this long bit make hacker algorithm need more time and hence you are safe because in time he need to hack your info., you change seed of Key many times.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;this in simple words why we need strong hash&amp;amp;encrypt in IPsec.&lt;/P&gt;</description>
    <pubDate>Mon, 28 Nov 2022 08:40:02 GMT</pubDate>
    <dc:creator>MHM Cisco World</dc:creator>
    <dc:date>2022-11-28T08:40:02Z</dc:date>
    <item>
      <title>IKEv2 Proposal</title>
      <link>https://community.cisco.com/t5/network-security/ikev2-proposal/m-p/4728499#M1095393</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;i would like to ask about ikev2 proposal encryption. If we are using we encryption in IKEv2 proposal but i will use strong encryption on IPSec,&amp;nbsp;can IKE proposal compromise ? Phase 1 will compromise ?&lt;/P&gt;&lt;P&gt;If Ike proposal is compromise, what kind of data will lose ?&lt;/P&gt;&lt;P&gt;what kind of information will attacker will get ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 27 Nov 2022 01:36:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ikev2-proposal/m-p/4728499#M1095393</guid>
      <dc:creator>MrBeginner</dc:creator>
      <dc:date>2022-11-27T01:36:46Z</dc:date>
    </item>
    <item>
      <title>Re: IKEv2 Proposal</title>
      <link>https://community.cisco.com/t5/network-security/ikev2-proposal/m-p/4728548#M1095396</link>
      <description>&lt;P&gt;On the IKE SA both status messages are exchanged (think of it as a "management" tunnel) and also the key-negotiation of all following IPsec SAs are done.&lt;/P&gt;
&lt;P&gt;It is best practice for the IKE SA to have at least the security strength of all IPsec SAs and also protect the additional IPsec SAs with PFS, Perfect Forward Secrecy.&lt;/P&gt;</description>
      <pubDate>Sun, 27 Nov 2022 08:05:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ikev2-proposal/m-p/4728548#M1095396</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2022-11-27T08:05:10Z</dc:date>
    </item>
    <item>
      <title>Re: IKEv2 Proposal</title>
      <link>https://community.cisco.com/t5/network-security/ikev2-proposal/m-p/4728614#M1095403</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/325766"&gt;@Karsten Iwen&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P&gt;I cannot find any reference about below information.&lt;/P&gt;&lt;P&gt;If IKEv2 proposal is compromised , what will happen ?&lt;BR /&gt;It will only effect on ike proposal , it will not impact to payload,ipsec etc ?&lt;BR /&gt;It can see ipsec encrytion type,authentication type,preshare key ,etc ?&lt;/P&gt;&lt;P&gt;As per below thread, i concern malicious user&amp;nbsp;&lt;SPAN&gt;can access to all data sent across the VPN connection, which may include passwords and sensitive file if ikev2 proposal is using weak encryption ?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://community.cisco.com/t5/network-management/weak-ipsec-encryption/td-p/4093182" target="_blank"&gt;https://community.cisco.com/t5/network-management/weak-ipsec-encryption/td-p/4093182&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 27 Nov 2022 14:51:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ikev2-proposal/m-p/4728614#M1095403</guid>
      <dc:creator>MrBeginner</dc:creator>
      <dc:date>2022-11-27T14:51:15Z</dc:date>
    </item>
    <item>
      <title>Re: IKEv2 Proposal</title>
      <link>https://community.cisco.com/t5/network-security/ikev2-proposal/m-p/4728616#M1095404</link>
      <description>&lt;P&gt;I have note here,&amp;nbsp;&lt;BR /&gt;what is different between phaseI and phaseII ??&lt;BR /&gt;PhaseI build protect tunnel to make PhaseII proposal exchange safely between two Peer.&amp;nbsp;&lt;BR /&gt;so the hack must hack first Phase then he can know proposal, BUT the issue is key,&amp;nbsp;&lt;BR /&gt;the key is not direct used it build from many seed info. include pre-shared key.&amp;nbsp;&lt;BR /&gt;but can he predict the key used, YES&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 27 Nov 2022 14:47:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ikev2-proposal/m-p/4728616#M1095404</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2022-11-27T14:47:39Z</dc:date>
    </item>
    <item>
      <title>Re: IKEv2 Proposal</title>
      <link>https://community.cisco.com/t5/network-security/ikev2-proposal/m-p/4728647#M1095419</link>
      <description>&lt;P&gt;The reference for all of this is the &lt;A href="https://www.rfc-editor.org/rfc/rfc7296" target="_self"&gt;IKEv2 RFC&lt;/A&gt; (or the older RFCs for the legacy versions) ...&amp;nbsp;&lt;BR /&gt;If at all, the IKE SA will get compromised, not the proposals. If an attacker can break the IKE SA, he will not automatically get the data from the IPsec SA, as all creations of the child SAs also include material from the initial Diffie-Hellman. And this can be even increase with the application of PFS which is optional, but can be considered as a best practice. But the attacker could read the additional exchanges which gives him an advantage.&lt;/P&gt;
&lt;P&gt;The good thing is that with the actual RFC, every refresh of the IKE SA must also do an additional DH which was not mandated in previous RFCs.&lt;/P&gt;
&lt;P&gt;The link that you quoted seems to be specific to weak algorithms like DES and DH1. For IKE/IPsec implementations all encryption that is not AES, all DH groups below DH14 and Hashing/HMACs below SHA2 are considered weak and should not be used any more.&lt;/P&gt;</description>
      <pubDate>Sun, 27 Nov 2022 17:52:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ikev2-proposal/m-p/4728647#M1095419</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2022-11-27T17:52:31Z</dc:date>
    </item>
    <item>
      <title>Re: IKEv2 Proposal</title>
      <link>https://community.cisco.com/t5/network-security/ikev2-proposal/m-p/4728754#M1095421</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/325766"&gt;@Karsten Iwen&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P&gt;As per your explanation ,&lt;SPAN&gt;If an attacker can break the IKE SA , they only can get ikev2 proposal information ( phase 1 ) , is it correct ? If we are using strong encryption/authentication on ipsec phase, they&amp;nbsp;cannot see IPsec&amp;nbsp;information ( phase2 ) .is it correct ?&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 28 Nov 2022 00:44:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ikev2-proposal/m-p/4728754#M1095421</guid>
      <dc:creator>MrBeginner</dc:creator>
      <dc:date>2022-11-28T00:44:18Z</dc:date>
    </item>
    <item>
      <title>Re: IKEv2 Proposal</title>
      <link>https://community.cisco.com/t5/network-security/ikev2-proposal/m-p/4728757#M1095422</link>
      <description>&lt;P&gt;Basically yes, but ...&lt;/P&gt;
&lt;P&gt;This is how the key-material for the IPsec SAs is build:&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;KEYMAT = prf+(SK_d, Ni | Nr)&lt;/LI-CODE&gt;
&lt;P&gt;If the IKE SA is broken, he sees the random nonces Ni and Nr that get exchanged for the next IPsec SA. But the attacker doesn't know the value of SK_d which is derived from the diffie-hellman exchange. But let's assume the worst case, we use a pseudo random function (PRF) of MD5 (what, of course, we never do), then the attacker could try to brute-force the next keys for the next SAs.&lt;/P&gt;</description>
      <pubDate>Mon, 28 Nov 2022 01:13:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ikev2-proposal/m-p/4728757#M1095422</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2022-11-28T01:13:35Z</dc:date>
    </item>
    <item>
      <title>Re: IKEv2 Proposal</title>
      <link>https://community.cisco.com/t5/network-security/ikev2-proposal/m-p/4728768#M1095423</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/325766"&gt;@Karsten Iwen&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P&gt;if we are using SHA 256&amp;nbsp; for key exchange&amp;nbsp; , attacker will not get the information of ipsec or child_SA. And then If we are using PFS , key exchange will not use again same key .So attacker need to try again to get IKE SA after key life time is expire, is it correct ?&lt;/P&gt;&lt;P&gt;So let me know what is the best practice for key life time ?&lt;/P&gt;</description>
      <pubDate>Mon, 28 Nov 2022 02:21:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ikev2-proposal/m-p/4728768#M1095423</guid>
      <dc:creator>MrBeginner</dc:creator>
      <dc:date>2022-11-28T02:21:54Z</dc:date>
    </item>
    <item>
      <title>Re: IKEv2 Proposal</title>
      <link>https://community.cisco.com/t5/network-security/ikev2-proposal/m-p/4728835#M1095424</link>
      <description>&lt;P&gt;Correct. And breaking the IKE SA with AES256/AES128 is quite esoteric.&lt;/P&gt;
&lt;P&gt;IMO, the default lifetimes on the Cisco devices (IKE one day, IPsec eight or one hour) is quite ok.&lt;/P&gt;</description>
      <pubDate>Mon, 28 Nov 2022 05:29:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ikev2-proposal/m-p/4728835#M1095424</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2022-11-28T05:29:33Z</dc:date>
    </item>
    <item>
      <title>Re: IKEv2 Proposal</title>
      <link>https://community.cisco.com/t5/network-security/ikev2-proposal/m-p/4728864#M1095426</link>
      <description>&lt;P&gt;&lt;SPAN&gt;As per your explanation ,&lt;/SPAN&gt;&lt;SPAN&gt;If an attacker can break the IKE SA , they only can get ikev2 proposal information ( phase 1 ) , is it correct ? If we are using strong encryption/authentication on ipsec phase, they&amp;nbsp;cannot see IPsec&amp;nbsp;information ( phase2 ) .is it correct &lt;A href="https://financeinvestation.com" target="_self"&gt;?&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 28 Nov 2022 06:04:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ikev2-proposal/m-p/4728864#M1095426</guid>
      <dc:creator>harryhales77</dc:creator>
      <dc:date>2022-11-28T06:04:53Z</dc:date>
    </item>
    <item>
      <title>Re: IKEv2 Proposal</title>
      <link>https://community.cisco.com/t5/network-security/ikev2-proposal/m-p/4728870#M1095427</link>
      <description>&lt;P&gt;Correct&lt;/P&gt;</description>
      <pubDate>Mon, 28 Nov 2022 06:12:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ikev2-proposal/m-p/4728870#M1095427</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2022-11-28T06:12:59Z</dc:date>
    </item>
    <item>
      <title>Re: IKEv2 Proposal</title>
      <link>https://community.cisco.com/t5/network-security/ikev2-proposal/m-p/4728965#M1095431</link>
      <description>&lt;P&gt;he need time for his algorithm to break the Key, during that time the key is change.&amp;nbsp;&lt;BR /&gt;why recommend strong ? if you see all strong hash&amp;amp;encrypt use long bits number for your example SHA256 meaning it use 256 bit, this long bit make hacker algorithm need more time and hence you are safe because in time he need to hack your info., you change seed of Key many times.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;this in simple words why we need strong hash&amp;amp;encrypt in IPsec.&lt;/P&gt;</description>
      <pubDate>Mon, 28 Nov 2022 08:40:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ikev2-proposal/m-p/4728965#M1095431</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2022-11-28T08:40:02Z</dc:date>
    </item>
    <item>
      <title>Re: IKEv2 Proposal</title>
      <link>https://community.cisco.com/t5/network-security/ikev2-proposal/m-p/4737909#M1095911</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;Let me know if IKE SA is compromised,attacker will get what kind of information?&lt;/P&gt;
&lt;P&gt;How protect weakness encryption in phase 1,i knew that ipsece lvl ?&lt;/P&gt;
&lt;P&gt;What information will include Ni and Nr ?&lt;/P&gt;</description>
      <pubDate>Tue, 13 Dec 2022 15:02:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ikev2-proposal/m-p/4737909#M1095911</guid>
      <dc:creator>MrBeginner</dc:creator>
      <dc:date>2022-12-13T15:02:59Z</dc:date>
    </item>
    <item>
      <title>Re: IKEv2 Proposal</title>
      <link>https://community.cisco.com/t5/network-security/ikev2-proposal/m-p/4737914#M1095912</link>
      <description>&lt;P&gt;Hi &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1065752"&gt;@MHM Cisco World&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If ipsec tunbel is established, there is no more ikev2 phase one traffic?&lt;/P&gt;
&lt;P&gt;Or ike SA will add in&amp;nbsp; every ipsec packet ?&lt;/P&gt;</description>
      <pubDate>Tue, 13 Dec 2022 15:05:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ikev2-proposal/m-p/4737914#M1095912</guid>
      <dc:creator>MrBeginner</dc:creator>
      <dc:date>2022-12-13T15:05:57Z</dc:date>
    </item>
    <item>
      <title>Re: IKEv2 Proposal</title>
      <link>https://community.cisco.com/t5/network-security/ikev2-proposal/m-p/4737924#M1095915</link>
      <description>&lt;P&gt;friend, both Peers start clear text exchange proposal of phase1 and DH key seed&amp;nbsp;&lt;BR /&gt;then after agree build tunnel 1, tunnel1 is secure by phase1 DH key and SA both peer use.&lt;BR /&gt;&lt;BR /&gt;now&amp;nbsp; phase2 start, both Peers exchange ID and proposal and PSK-Seed BUT this time this exchange is pass secure suing the tunnel1 build from phase1, and in end of this phase the two peers build tunnel2 which use to ass data traffic between two peer.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;why I call it tunnel1 of phase1 ?? because when you do capture with wireshark you can see IP address of header but all data inside that packet is secure (encrypt).&lt;/P&gt;</description>
      <pubDate>Tue, 13 Dec 2022 15:14:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ikev2-proposal/m-p/4737924#M1095915</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2022-12-13T15:14:58Z</dc:date>
    </item>
  </channel>
</rss>

