Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

IKE Proposal configuration requires authentication even with AES GCM #14499

Closed
markkuleinio opened this issue Dec 12, 2023 · 6 comments
Closed
Assignees
Labels
beta Concerns a bug/feature in a beta release severity: low Does not significantly disrupt application functionality, or a workaround is available status: accepted This issue has been accepted for implementation type: bug A confirmed report of unexpected behavior in the application

Comments

@markkuleinio
Copy link
Contributor

markkuleinio commented Dec 12, 2023

Deployment Type

Self-hosted

NetBox Version

v3.7-beta1

Python Version

3.11

Steps to Reproduce

  1. Go to VPN - IKE Proposals, Add
  2. Select Encryption algorithm: 256-bit AES (GCM)

Expected Behavior

It should be possible to select "None" in Authentication algorithm.

Example of PAN-OS configuration:

set network ike crypto-profiles ike-crypto-profiles IKE-SHA384-AES256-DH20-86400 encryption aes-256-gcm
set network ike crypto-profiles ike-crypto-profiles IKE-SHA384-AES256-DH20-86400 hash non-auth
set network ike crypto-profiles ike-crypto-profiles IKE-SHA384-AES256-DH20-86400 dh-group group20
set network ike crypto-profiles ike-crypto-profiles IKE-SHA384-AES256-DH20-86400 lifetime hours 24

Observed Behavior

Authentication algorithm must be selected from the dropdown, there is no "None" option, not possible to match NetBox with the actual device configuration

image

@markkuleinio markkuleinio added the type: bug A confirmed report of unexpected behavior in the application label Dec 12, 2023
@jeremystretch
Copy link
Member

Is there a difference in the PAN-OS config between explicitly setting hash non-auth and not setting the parameter at all? Or is this effectively the same? Just trying to fully understand the context.

@markkuleinio
Copy link
Contributor Author

# show
set network ike crypto-profiles ike-crypto-profiles TEST encryption aes-256-gcm
set network ike crypto-profiles ike-crypto-profiles TEST dh-group group20
set network ike crypto-profiles ike-crypto-profiles TEST lifetime hours 24

# commit
Validation Error:
 network -> ike -> crypto-profiles -> ike-crypto-profiles -> TEST  is missing 'hash'
 network -> ike -> crypto-profiles -> ike-crypto-profiles is invalid

# set hash ?
  [          Start a list of values.
  md5        below 80-bit strength
  non-auth   Integrity check is unnecessary when AESGCM is chosen
  sha1       NIST rating 128-bit strength
  sha256     NIST rating 256-bit strength
  sha384     NIST rating over 256-bit strength
  sha512     NIST rating over 256-bit strength

# set hash non-auth

# commit
Configuration committed successfully

PAN-OS 10.2.7

@jeremystretch
Copy link
Member

Ok, so the command itself is required and no-hash effectively represents "none." Thanks.

@jeremystretch jeremystretch self-assigned this Dec 12, 2023
@jeremystretch jeremystretch added status: accepted This issue has been accepted for implementation beta Concerns a bug/feature in a beta release severity: low Does not significantly disrupt application functionality, or a workaround is available labels Dec 12, 2023
@DanSheps
Copy link
Member

Just want to say thank you for giving the beta a test run and helping us tweak it further.

@jeremystretch
Copy link
Member

We should also think about IPSec policies (phase two): It should be possible to set only encryption or authentication (or both), right?

As for IKE policies (phase one), IIRC encryption is always required.

@markkuleinio
Copy link
Contributor Author

markkuleinio commented Dec 12, 2023

We should also think about IPSec policies (phase two): It should be possible to set only encryption or authentication (or both), right?

I'd say yes:

# edit ipsec-crypto-profiles IPSEC_TEST
# set ?
+ dh-group   phase-2 DH group (PFS DH group)
> ah         AH only
> esp        ESP options
> lifesize   IPSec SA lifesize
> lifetime   IPSec SA lifetime

# set ah ?
> authentication   Authentication algorithm

# set ah authentication ?
  [        Start a list of values.
  md5      below 80-bit strength
  sha1     NIST rating 128-bit strength
  sha256   NIST rating 256-bit strength
  sha384   NIST rating over 256-bit strength
  sha512   NIST rating over 256-bit strength

# set ah authentication sha512
# set lifetime seconds 3600
# show
set network ike crypto-profiles ipsec-crypto-profiles IPSEC_TEST ah authentication sha512
set network ike crypto-profiles ipsec-crypto-profiles IPSEC_TEST lifetime seconds 3600

# commit
Configuration committed successfully

= no ESP

Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
beta Concerns a bug/feature in a beta release severity: low Does not significantly disrupt application functionality, or a workaround is available status: accepted This issue has been accepted for implementation type: bug A confirmed report of unexpected behavior in the application
Projects
None yet
Development

No branches or pull requests

3 participants