![]() |
Question With Linux IPSec and Null Encryption
Hello,
I have been asked a question about what it will take to get Null Encryption IPSec setup using Linux. So far I spent several hours googling and reading about RFCs and mainly theoretical stuff but none of that really answered my question. My main specific questions are: 1. Is Null Encryption enabled by default in the Linux Kernel? 2. What are specific requirements for using it? 3. If possible, are there any howtos or examples using it? Thanks in advance, Joe |
Quote:
Code:
user@test:~$ cd $(mktemp -d) One could argue that using NULL encryption (which means you're not actually encrypting anything) is completely pointless outside of a lab/test setup, and could potentially be dangerous if accidentally enabled in a production environment. For those reasons, I wouldn't be at all surprised if I were to find that some distribution maintainers had chosen to disable NULL support in the kernel. Anyway, running zcat /proc/config.gz | grep CRYPTO_NULL on the system in question should tell you. Unless they've disabled proc support for config.gz as well, that is. Quote:
IPsec support does not reside entirely in kernel space. For instance, the IKE process responsible for negotiating Phase1 Security Associations, which includes selecting a set of mutually supported encryption protocols, is not part of the kernel. Instead, you need to install and run a userspace program like StrongSwan's charon daemon to accept or initiate IPsec connections/tunnels. Whether or not the IKE daemon will allow NULL encryption is a matter of configuration. Having said that, most IPsec software on the Linux platform depend on crypto support in the kernel. Disable NULL support, or any of the other protocols, and it's unlikely that the software will be able to work around it. Quote:
By the way, here's a list of the supported encryption suites in StrongSwan. As you can see, "null" is indeed supported. |
All times are GMT -5. The time now is 11:24 AM. |