Community discussions

MikroTik App
 
pawlisko
Frequent Visitor
Frequent Visitor
Topic Author
Posts: 54
Joined: Sat Oct 17, 2020 5:12 am

IKEv2 - issues

Wed Dec 30, 2020 6:16 am

First of all let me say thank you for changes in rOS 6.48 but just created even more confusion and I needed to downgrade my setups as it messed-up Phase 2 for me.

Awesome changes to Phase 1 (Profile) but:
Encryption Algorithm section should be in compliance with https://wiki.strongswan.org/projects/st ... pherSuites - that includes most of other AES suites.
For example - ProtonVPN supports those cyphers:
aes256gcm16-prfsha384-ecp384
aes128gcm16-prfsha256-ecp256
aes256-sha256-modp2048
With current setup I can only use the last one (aes256-sha256-modp2048) to complete Phase 1 even thou theoretically I could go for first suite as MicroTik supports it.
In another words maybe Encryption Algorithm section should be expanded

Lack of changes to Phase 2 (Proposals)
No SHA2-384 hash algorithm added, nor PRF algorithm section.
Hence in ProtonVPN example I can go to AES-256-GCM in Phase 2 but lack of SHA2-384 and PRF allows me to set up initial SA but then it disconnects me and reconnects. To avoid this situation I had to downgrade it to AES-256-CBC

Those are 2 critical issues (areas) in my mind.

Additional problems:
1. No information if SHA2-384 is supported by hardware in CCRs - documentation. If it is - we need test results, if no just put it on the website.
2. No information in wiki about new possibilities. Documentation, documentation, documentation.
3. As per iOS 14.2 (supported cyphers suites) - have not confirmed myself but is should be the same with macOS11:
Phase 1:
IKE:AES_CBC_256/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024,
IKE:AES_CBC_256/HMAC_MD5_96/PRF_HMAC_MD5/MODP_1024,
IKE:AES_CBC_128/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024,
IKE:AES_CBC_128/HMAC_MD5_96/PRF_HMAC_MD5/MODP_1024,
IKE:3DES_CBC/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024,
IKE:3DES_CBC/HMAC_MD5_96/PRF_HMAC_MD5/MODP_1024,
IKE:DES_CBC/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024,
IKE:DES_CBC/HMAC_MD5_96/PRF_HMAC_MD5/MODP_1024
Phase 2:
IKE:AES_CBC_256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_2048,
IKE:AES_CBC_256/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_2048,
IKE:AES_CBC_256/HMAC_MD5_96/PRF_HMAC_MD5/MODP_2048,
IKE:AES_CBC_256/HMAC_SHA2_512_256/PRF_HMAC_SHA2_512/MODP_2048,
IKE:AES_CBC_256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1536,
IKE:AES_CBC_256/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1536,
IKE:AES_CBC_256/HMAC_MD5_96/PRF_HMAC_MD5/MODP_1536,
IKE:AES_CBC_256/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024,
IKE:AES_CBC_256/HMAC_MD5_96/PRF_HMAC_MD5/MODP_1024,
IKE:AES_CBC_128/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024,
IKE:AES_CBC_128/HMAC_MD5_96/PRF_HMAC_MD5/MODP_1024,
IKE:3DES_CBC/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024,
IKE:3DES_CBC/HMAC_MD5_96/PRF_HMAC_MD5/MODP_1024,
IKE:DES_CBC/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024,
IKE:DES_CBC/HMAC_MD5_96/PRF_HMAC_MD5/MODP_1024

4. Most current Windows 10 IKEv2 available settings
- ESP cyphers:
DES
DES3
AES128
AES192
AES256
GCMAES128
GCMAES192
GCMAES256
None
- DH Groups:
None
Group1 (modp768)
Group2 (modp1024)
Group14 (modp2048)
ECP256
ECP384
Group24 (modp2048s256)
- Encryption methods:
DES
DES3
AES128
AES192
AES256
GCMAES128
GCMAES256
- Integrity checks:
MD5
SHA1
SHA256
SHA384
- PFS Groups:
None
PFS1 (modp768)
PFS2 (modp1024)
PFS2048
ECP256
ECP384
PFS24 (modp2048s256)

Would you please fix config issues and update documentation.

Thanks in advance.
 
nagylzs
Member
Member
Posts: 357
Joined: Sun May 26, 2019 2:08 pm

Re: IKEv2 - issues

Wed Jan 06, 2021 9:36 pm

Hence in ProtonVPN example I can go to AES-256-GCM in Phase 2 but lack of SHA2-384 and PRF allows me to set up initial SA but then it disconnects me and reconnects. To avoid this situation I had to downgrade it to AES-256-CBC
Well it is worse than that. AES-256-GCM is supported by RouterOS, but it has no hw acceleration on any MikroTik devices that I know of. It means that even though it is usable, you will most probably get poor performance. But it might be a hardware limitation that cannot be solved from software.
 
pawlisko
Frequent Visitor
Frequent Visitor
Topic Author
Posts: 54
Joined: Sat Oct 17, 2020 5:12 am

Re: IKEv2 - issues

Wed Jan 06, 2021 9:42 pm

Well it is worse than that. AES-256-GCM is supported by RouterOS, but it has no hw acceleration on any MikroTik devices that I know of. It means that even though it is usable, you will most probably get poor performance. But it might be a hardware limitation that cannot be solved from software.
As per https://wiki.mikrotik.com/wiki/Manual:IP/IPsec
1. RB1100AHx4 and RB1100AHx4 Dude Edition
2. RB4011iGS+RM and RB4011iGS+5HacQ2HnD-IN
3. CCR2004-1G-12S+2XS
4. x86 (AES-NI)
Support Hardware Acceleration of AES-265-GCM traffic
 
nagylzs
Member
Member
Posts: 357
Joined: Sun May 26, 2019 2:08 pm

Re: IKEv2 - issues

Thu Jan 07, 2021 7:34 pm

Okay, so there are a few that support AES-256-GCM, they are the most expensive ones. Interestingly, SHA384 is not listed anywhere, I guess it means that SHA384 is not supported on any of them.
 
pawlisko
Frequent Visitor
Frequent Visitor
Topic Author
Posts: 54
Joined: Sat Oct 17, 2020 5:12 am

Re: IKEv2 - issues

Thu Jan 07, 2021 9:38 pm

Okay, so there are a few that support AES-256-GCM, they are the most expensive ones. Interestingly, SHA384 is not listed anywhere, I guess it means that SHA384 is not supported on any of them.
SHA384 is supported by them - I know I use it. Please reread my original post. SHA384 was added few weeks ago with rOS 6.48. They need to update lots of documentation and Wikis. Obviously it is not Cisco which would made it right at the time of software release, but it is coming.
Price - well I would expect most expensive models to have everything :)
Also I hope for CCR2004-1G-12S+2QS but we will see
 
msatter
Forum Guru
Forum Guru
Posts: 2942
Joined: Tue Feb 18, 2014 12:56 am
Location: Netherlands / Nīderlande

Re: IKEv2 - issues

Thu Jan 07, 2021 9:47 pm

SHA-384 was already supported earlier but then only through the CLI. Now also through Winbox.

The sixt of January 2021 the table in the Wiki was updated for the RB4011 and here the link to that table:

https://wiki.mikrotik.com/wiki/Manual:I ... celeration