em 11-17-2009 05:14 AM
Could some one explain me the basic concept of PFS (Perfect Forward Secrecy)?
I do have some VPN's configured in my router with no PFS. What is the extra security feature that PFS provide?
Thanks in advance,
Ribin
Solucionado! Ir para a Solução.
em 11-19-2009 06:54 PM
During the initial IKE Phase 1 negotiation, public DH key values are exchanged to derive the shared secret DH value. These public and private DH values are used to generate the session key used to encrypt the 5th and 6th main mode exchanges. If you do not specify PFS, the same public and private DH values dervied in Phase 1 are used to generate the subsequent keying material that protects IPSEC traffic.
When PFS is used, there is an additional DH key exchanged performed in IKE Phase 2. These new public/private DH values are then used to generate the keying material for the encrypted IPSEC traffic.
em 11-17-2009 05:17 AM
em 11-17-2009 05:20 AM
I did read that link. Any simple/easily understanding explanation is appreciated.
Regards,
Ribin
em 11-17-2009 05:26 AM
Do you know what the Diffie-Hellman key exchange is?
em 11-17-2009 05:35 AM
Yea, I got some basic idea from http://en.wikipedia.org/wiki/Diffie%E2%80%93Hellman_key_exchange.
- Ribin
em 11-17-2009 05:38 AM
OK - so PFS does NOT use any of the information from the previously negotiated key.
They negotiate and generate a completly new key for the session when the previous key expires.
em 11-17-2009 05:45 AM
OK. So, during the configuration, we need to specify a key once (which will be used for the first negotiation only) and thereafter both the peers will use another key generated using Diffie-Helman?
em 11-17-2009 05:55 AM
No - You need to read the wikipedia on Diffie-Hellman again.
http://en.wikipedia.org/wiki/Diffie-Hellman_key_exchange
Once you understand that - you will understand PFS.
em 11-19-2009 06:54 PM
During the initial IKE Phase 1 negotiation, public DH key values are exchanged to derive the shared secret DH value. These public and private DH values are used to generate the session key used to encrypt the 5th and 6th main mode exchanges. If you do not specify PFS, the same public and private DH values dervied in Phase 1 are used to generate the subsequent keying material that protects IPSEC traffic.
When PFS is used, there is an additional DH key exchanged performed in IKE Phase 2. These new public/private DH values are then used to generate the keying material for the encrypted IPSEC traffic.
em 11-19-2009 07:02 PM
Thanks Patrick for being more specific on the explanation.
- Ribin
Descubra e salve suas ideias favoritas. Volte para ver respostas de especialistas, passo a passo, tópicos recentes e muito mais.
Novo por aqui? Comece com estas dicas. Como usar a Comunidade Guia do novo membro