First of all let me say thank you for changes in rOS 6.48 but just created even more confusion and I needed to downgrade my setups as it messed-up Phase 2 for me.
Awesome changes to Phase 1 (Profile) but:
Encryption Algorithm section should be in compliance with https://wiki.strongswan.org/projects/st ... pherSuites - that includes most of other AES suites.
For example - ProtonVPN supports those cyphers:
aes256gcm16-prfsha384-ecp384
aes128gcm16-prfsha256-ecp256
aes256-sha256-modp2048
With current setup I can only use the last one (aes256-sha256-modp2048) to complete Phase 1 even thou theoretically I could go for first suite as MicroTik supports it.
In another words maybe Encryption Algorithm section should be expanded
Lack of changes to Phase 2 (Proposals)
No SHA2-384 hash algorithm added, nor PRF algorithm section.
Hence in ProtonVPN example I can go to AES-256-GCM in Phase 2 but lack of SHA2-384 and PRF allows me to set up initial SA but then it disconnects me and reconnects. To avoid this situation I had to downgrade it to AES-256-CBC
Those are 2 critical issues (areas) in my mind.
Additional problems:
1. No information if SHA2-384 is supported by hardware in CCRs - documentation. If it is - we need test results, if no just put it on the website.
2. No information in wiki about new possibilities. Documentation, documentation, documentation.
3. As per iOS 14.2 (supported cyphers suites) - have not confirmed myself but is should be the same with macOS11:
Phase 1:
IKE:AES_CBC_256/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024,
IKE:AES_CBC_256/HMAC_MD5_96/PRF_HMAC_MD5/MODP_1024,
IKE:AES_CBC_128/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024,
IKE:AES_CBC_128/HMAC_MD5_96/PRF_HMAC_MD5/MODP_1024,
IKE:3DES_CBC/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024,
IKE:3DES_CBC/HMAC_MD5_96/PRF_HMAC_MD5/MODP_1024,
IKE:DES_CBC/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024,
IKE:DES_CBC/HMAC_MD5_96/PRF_HMAC_MD5/MODP_1024
Phase 2:
IKE:AES_CBC_256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_2048,
IKE:AES_CBC_256/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_2048,
IKE:AES_CBC_256/HMAC_MD5_96/PRF_HMAC_MD5/MODP_2048,
IKE:AES_CBC_256/HMAC_SHA2_512_256/PRF_HMAC_SHA2_512/MODP_2048,
IKE:AES_CBC_256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1536,
IKE:AES_CBC_256/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1536,
IKE:AES_CBC_256/HMAC_MD5_96/PRF_HMAC_MD5/MODP_1536,
IKE:AES_CBC_256/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024,
IKE:AES_CBC_256/HMAC_MD5_96/PRF_HMAC_MD5/MODP_1024,
IKE:AES_CBC_128/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024,
IKE:AES_CBC_128/HMAC_MD5_96/PRF_HMAC_MD5/MODP_1024,
IKE:3DES_CBC/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024,
IKE:3DES_CBC/HMAC_MD5_96/PRF_HMAC_MD5/MODP_1024,
IKE:DES_CBC/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024,
IKE:DES_CBC/HMAC_MD5_96/PRF_HMAC_MD5/MODP_1024
4. Most current Windows 10 IKEv2 available settings
- ESP cyphers:
DES
DES3
AES128
AES192
AES256
GCMAES128
GCMAES192
GCMAES256
None
- DH Groups:
None
Group1 (modp768)
Group2 (modp1024)
Group14 (modp2048)
ECP256
ECP384
Group24 (modp2048s256)
- Encryption methods:
DES
DES3
AES128
AES192
AES256
GCMAES128
GCMAES256
- Integrity checks:
MD5
SHA1
SHA256
SHA384
- PFS Groups:
None
PFS1 (modp768)
PFS2 (modp1024)
PFS2048
ECP256
ECP384
PFS24 (modp2048s256)
Would you please fix config issues and update documentation.
Thanks in advance.