Skip to content

Commit 029af07

Browse files
committed
Settings to mark cryptographic parameters as excluded/obsolete
1 parent 1b8f2ca commit 029af07

File tree

1 file changed

+101
-7
lines changed

1 file changed

+101
-7
lines changed

source/adminguide/networking/site_to_site_vpn.rst

Lines changed: 101 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -115,13 +115,19 @@ To add a VPN Customer Gateway:
115115
confirming that the remote gateway has a matching Preshared Key.
116116

117117
- **IKE Hash**: The IKE hash for phase-1. The supported hash
118-
algorithms are SHA1 and MD5.
118+
algorithms are SHA1, SHA256, SHA384 and SHA512 and MD5.
119+
120+
- **IKE Version**: The IKE Version to use between ike (autoselect), ikev1, or ikev2.
121+
Connections marked with 'ike' will use 'ikev2' when initiating,
122+
but accept any protocol version when responding. Defaults to 'ike'.
119123

120124
- **IKE DH**: A public-key cryptography protocol which allows two
121125
parties to establish a shared secret over an insecure
122126
communications channel. The 1536-bit Diffie-Hellman group is used
123127
within IKE to establish session keys. The supported options are
124-
None, Group-5 (1536-bit) and Group-2 (1024-bit).
128+
None, Group-2 (1024-bit), Group-5 (1536-bit), Group-14 (2048-bit),
129+
Group-15 (3072-bit), Group-16 (4096-bit), Group-17 (6144-bit) and
130+
Group-18 (8192-bit).
125131

126132
- **ESP Encryption**: Encapsulating Security Payload (ESP) algorithm
127133
within phase-2. The supported encryption algorithms are AES128,
@@ -134,18 +140,19 @@ To add a VPN Customer Gateway:
134140
extracted from the Diffie-Hellman key exchange in phase-1, to
135141
provide session keys to use in protecting the VPN data flow.
136142

137-
- **ESP Hash**: Encapsulating Security Payload (ESP) hash for
138-
phase-2. Supported hash algorithms are SHA1 and MD5.
143+
- **ESP Hash**: Encapsulating Security Payload (ESP) hash for phase-2.
144+
Supported hash algorithms are SHA1, SHA256, SHA384 and SHA512 and MD5.
139145

140146
- **Perfect Forward Secrecy**: Perfect Forward Secrecy (or PFS) is
141147
the property that ensures that a session key derived from a set of
142148
long-term public and private keys will not be compromised. This
143149
property enforces a new Diffie-Hellman key exchange. It provides
144150
the keying material that has greater key material life and thereby
145151
greater resistance to cryptographic attacks. The available options
146-
are None, Group-5 (1536-bit) and Group-2 (1024-bit). The security
147-
of the key exchanges increase as the DH groups grow larger, as
148-
does the time of the exchanges.
152+
are None, Group-2 (1024-bit), Group-5 (1536-bit), Group-14 (2048-bit),
153+
Group-15 (3072-bit), Group-16 (4096-bit), Group-17 (6144-bit) and
154+
Group-18 (8192-bit). The security of the key exchanges increase as
155+
the DH groups grow larger, as does the time of the exchanges.
149156

150157
.. note::
151158
When PFS is turned on, for every negotiation of a new phase-2 SA
@@ -172,15 +179,102 @@ To add a VPN Customer Gateway:
172179
- **Force UDP Encapsulation of ESP Packets**: Force Encapsulation for
173180
NAT traversal
174181

182+
.. note::
183+
If the administrator has configured excluded cryptographic
184+
parameters, those options will not appear in the form. If obsolete
185+
parameters are configured, those options will be displayed with a
186+
warning message indicating they are obsolete and should be avoided.
187+
175188
#. Click OK.
176189

177190

191+
Configuring Excluded and Obsolete VPN Customer Gateway Parameters
192+
''''''''''''''''''''''''''''''''''''''''''''''''
193+
194+
CloudStack provides administrators with configuration settings to enforce
195+
modern security standards by marking certain cryptographic algorithms and
196+
parameters as excluded or obsolete for VPN Customer Gateway creation.
197+
198+
**Excluded Parameters:**
199+
200+
These parameters are completely hidden from users and cannot be used
201+
while creating or updating VPN Customer Gateways:
202+
203+
- **vpn.customer.gateway.excluded.encryption.algorithms**: Comma-separated
204+
list of encryption algorithms to exclude. Applies to both phases.
205+
206+
- **vpn.customer.gateway.excluded.hashing.algorithms**: Comma-separated
207+
list of hashing algorithms to exclude. Applies to both phases.
208+
209+
- **vpn.customer.gateway.excluded.ike.versions**: Comma-separated list of
210+
IKE versions to exclude.
211+
212+
- **vpn.customer.gateway.excluded.dh.group**: Comma-separated list of
213+
Diffie-Hellman groups to exclude. Applies to both phases.
214+
215+
**Obsolete Parameters:**
216+
217+
These parameters are shown with a warning message, allowing existing
218+
deployments to continue functioning while encouraging migration to more
219+
secure alternatives:
220+
221+
- **vpn.customer.gateway.obsolete.encryption.algorithms**: Comma-separated
222+
list of encryption algorithms marked as obsolete. Applies to both phases.
223+
224+
- **vpn.customer.gateway.obsolete.hashing.algorithms**: Comma-separated
225+
list of hashing algorithms marked as obsolete. Applies to phases.
226+
227+
- **vpn.customer.gateway.obsolete.ike.versions**: Comma-separated list of
228+
IKE versions marked as obsolete.
229+
230+
- **vpn.customer.gateway.obsolete.dh.group**: Comma-separated list of
231+
Diffie-Hellman groups marked as obsolete. Applies to both phases.
232+
233+
**Behavior:**
234+
235+
- **Excluded parameters**: Not shown in the Create and Update VPN Customer
236+
Gateway forms. Users cannot select these options for new gateways.
237+
238+
- **Obsolete parameters**: Shown with a warning message in the Create and
239+
Update forms, indicating they are deprecated and should be avoided.
240+
241+
- **Existing gateways**: If a VPN Customer Gateway already uses excluded or
242+
obsolete parameters:
243+
244+
- A warning icon is displayed next to the gateway name with a message
245+
prompting users to change the obsolete or excluded parameters.
246+
247+
- The Update VPN Customer Gateway form displays the setting with a
248+
warning message encouraging users to change it to a more secure
249+
alternative.
250+
251+
- The ``listVpnCustomerGateways`` API response includes two new boolean
252+
fields:
253+
254+
- **containsobsoleteparameters**: Indicates whether the gateway
255+
contains any obsolete parameters
256+
257+
- **containsexcludedparameters**: Indicates whether the gateway
258+
contains any excluded parameters
259+
260+
- The ``listCapabilities`` API response includes a new field containing
261+
the list of excluded and obsolete VPN Customer Gateway parameters, but
262+
only if these configuration settings are configured by the operator.
263+
264+
178265
Updating and Removing a VPN Customer Gateway
179266
''''''''''''''''''''''''''''''''''''''''''''
180267

181268
You can update a customer gateway either with no VPN connection, or
182269
related VPN connection is in error state.
183270

271+
.. note::
272+
If a VPN Customer Gateway is using excluded or obsolete cryptographic
273+
parameters (as configured by your CloudStack operator), a warning icon
274+
will be displayed next to the gateway name. When editing such a gateway,
275+
the Update form will display warnings for any obsolete or excluded
276+
parameters, encouraging you to change them to more secure alternatives.
277+
184278
#. Log in to the CloudStack UI as an administrator or end user.
185279

186280
#. In the left navigation, choose Network.

0 commit comments

Comments
 (0)