![]() ![]() It explains all authentication methods of IKEv1 and it gives message flow diagrams of the protocol. The paper contains a lot more details than this blogpost. ![]() No, interestingly the standard also mentions that IKEv2 does not prevent against off-line dictionary attacks. ![]() And do not use something that can be found in public databases. 128 bits of security, configure a PSK with at least 19 random ASCII characters. If you do not have the option to switch to authentication with digital signatures, choose a Pre-Shared Key that resists dictionary attacks. But this is a rather weak indication and no evidence for an attack. In the logs this could look like a failed connection attempt or a session timed out. We mentioned above that such an attack would require an active man-in-the-middle attack.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |