summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorGuilhem Moulin <guilhem@fripost.org>2018-12-03 05:25:36 +0100
committerGuilhem Moulin <guilhem@fripost.org>2018-12-09 20:25:40 +0100
commit8e94552594aae657358978988de9909ee4287a43 (patch)
tree002bcea084b6352f5c143253e349275f9db4ab02
parent1d2a6bfc7062c60cfe61fd74c2af23a5c828c440 (diff)
IPsec: use Suite-B-GCM-256 algorithms for IKEv2 & ESP.
(That is, remove algorithms from Suite-B-GCM-128.) Cf. https://wiki.strongswan.org/projects/strongswan/wiki/IKEv2CipherSuites and https://wiki.strongswan.org/projects/strongswan/wiki/SecurityRecommendations .
-rw-r--r--roles/common/templates/etc/ipsec.conf.j24
1 files changed, 2 insertions, 2 deletions
diff --git a/roles/common/templates/etc/ipsec.conf.j2 b/roles/common/templates/etc/ipsec.conf.j2
index 938f6b8..0ff9fbb 100644
--- a/roles/common/templates/etc/ipsec.conf.j2
+++ b/roles/common/templates/etc/ipsec.conf.j2
@@ -7,8 +7,8 @@ config setup
conn %default
keyexchange = ikev2
keyingtries = %forever
- ike = aes128gcm16-prfsha256-ecp256,aes256gcm16-prfsha384-ecp384!
- esp = aes128gcm16-ecp256,aes256gcm16-ecp384!
+ ike = aes256gcm16-prfsha384-ecp384!
+ esp = aes256gcm16-ecp384!
{% if 'NATed' not in group_names %}
mobike = no
{% endif %}