|
|
This document describes the Diffie-Hellman Group 5 feature. It includes information on the benefits of the new feature, supported platforms, related documents, and so on.
This document includes the following sections:
The Diffie-Hellman Group 5 feature enables group 5 on all platforms that support crypto images. Group 5 specifies the 1536-bit Diffie-Hellman group, which is a method of establishing a shared key over an insecure medium.
To specify group 5, you must first enter either the set pfs command or the group command. The group 5 option works exactly like group 1 and group 2; however, group 5 provides a higher level of security and requires more process time than group 1 and group 2.
The 1536-bit Diffie-Hellman group (group 5) provides more security than group 1 and group 2.
The set pfs command is available only for ipsec-isakmp crypto map entries and dynamic crypto map entries.
The following documents provide information related to the Diffie-Hellman Group 5 feature:
Standards
No new or modified standards are supported by this feature.
MIBs
For descriptions of supported MIBs and how to use MIBs, see the Cisco MIB web site on Cisco Connection Online (CCO) at http://www.cisco.com/public/sw-center/netmgmt/cmtk/mibs.shtml.
RFCs
See the following sections for configuration tasks for the Diffie-Hellman Group 5 feature. Each task in the list is indicated as optional or required.
To configure an Internet Key Exchange policy with the 1536-bit Diffie-Hellman group (group 5), enter the following commands beginning in global configuration mode:
| Command | Purpose | |
|---|---|---|
Step 1 | Router(config)#crypto isakmp policy 25 | Defines an IKE policy and enters ISAKMP policy configuration mode. |
Step 2 | Router(config-isakmp)#group 5 | Configures an IKE policy with the 1536-bit Diffie-Hellman group (group 5). |
Step 3 | Router(config-isakmp)# | Exits ISAKMP policy configuration mode. |
For more information on creating IKE policies, refer to the chapter "Configuring Internet Key Exchange Security Protocol" in the Cisco IOS Security Configuration Guide, Release 12.1.
To configure a crypto map and specify that perfect forward secrecy (group 5) should be used whenever a new security association is negotiated for the configured crypto map, enter the following commands beginning in global configuration mode:
| Command | Purpose | |
|---|---|---|
Step 1 | Router(config)#crypto map mymap 15 ipsec-isakmp | Creates or modifies a crypto map entry and enters crypto map configuration mode. |
Step 2 | Router(config-crypto-map)#set pfs group5 | (Optional) Specifies that IPSec should ask for perfect forward secrecy when requesting new security associations for this crypto map entry or should demand perfect forward secrecy in requests received from the IPSec peer. In this configuration, IPSec uses the 1536-bit Diffie-Hellman prime modulus group (group 5). |
Step 3 | Router(config-crypto-map)# | Exits crypto map configuration mode. |
For more information on creating or modifying crypto map sets, refer to the chapter "Configuring IPSec Network Security" in the Cisco IOS Security Configuration Guide, Release 12.1.
To display all existing IKE policies, use the show crypto isakmp policy command in EXEC mode.
To view information about your IPSec configuration, use the show crypto map command in EXEC mode.
This section provides the following configuration examples:
The following example configures an IKE policy with the 1536-bit Diffie-Hellman group (group 5); all other parameters are set to the defaults:
crypto isakmp policy 25group 5
crypto map mymap 15 ipsec-isakmpset pfs group5
To specify the Diffie-Hellman group identifier within an IKE policy, use the group Internet Security Association and Key Management Protocol (ISAKMP) policy configuration command. IKE policies define a set of parameters to be used during IKE negotiation. To reset the Diffie-Hellman group identifier to the default value, use the no form of this command .
group {1 | 2 | 5}
Syntax Description
1 The 768-bit Diffie-Hellman group. 2 The 1024-bit Diffie-Hellman group. 5 The 1536-bit Diffie-Hellman group.
Defaults
768-bit Diffie-Hellman group (group 1).
Command Modes
ISAKMP policy configuration (config-isakmp)
Command History
11.3T This command was introduced. 12.1(3)T The keyword 5 was added.
Release
Modification
Usage Guidelines
Use this command to specify the Diffie-Hellman group to be used in an IKE policy.
Examples
The following example configures an IKE policy with the 1024-bit Diffie-Hellman group (group 2); all other parameters are set to the defaults:
crypto isakmp policy 15group 2
Related Commands
authentication (IKE policy) Specifies the authentication method within an IKE policy. crypto isakmp policy Defines an IKE policy. encryption (IKE policy) Specifies the encryption algorithm within an IKE policy. hash (IKE policy) Specifies the hash algorithm within an IKE policy. lifetime (IKE policy) Specifies the lifetime of an IKE SA. show crypto isakmp policy Displays the parameters for each IKE policy.
Command
Description
To specify that IPSec should ask for perfect forward secrecy (PFS) when requesting new security associations for this crypto map entry, or that IPSec requires PFS when receiving requests for new security associations, use the set pfs crypto map configuration command. To specify that IPSec should not request PFS, use the no form of the command.
set pfs [group1 | group2 | group5]
Syntax Description
group1 (Optional) Specifies that IPSec should use the 768-bit Diffie-Hellman prime modulus group when performing the new Diffie-Hellman exchange. group2 (Optional) Specifies that IPSec should use the 1024-bit Diffie-Hellman prime modulus group when performing the new Diffie-Hellman exchange. group5 (Optional) Specifies that IPSec should use the 1536-bit Diffie-Hellman prime modulus group when performing the new Diffie-Hellman exchange.
Defaults
By default, PFS is not requested. If no group is specified with this command, group1 is used as the default.
Command Modes
Crypto map configuration
Command History
11.3T This command was introduced. 12.1(3)T The group5 keyword was added.
Release
Modification
Usage Guidelines
This command is available only for ipsec-isakmp crypto map entries and dynamic crypto map entries.
During negotiation, this command causes IPSec to request PFS when requesting new security associations for the crypto map entry. The default (group1) is sent if the set pfs statement does not specify a group. If the peer initiates the negotiation and the local configuration specifies PFS, the remote peer must perform a PFS exchange or the negotiation will fail. If the local configuration does not specify a group, a default of group1 will be assumed, and an offer of either group1, group2, or group5 will be accepted. If the local configuration specifies group2 or group5, that group must be part of the offer from the peer or the negotiation will fail. If the local configuration does not specify PFS, it will accept any offer of PFS from the peer.
PFS adds another level of security because if one key is ever cracked by an attacker then only the data sent with that key will be compromised. Without PFS, data sent with other keys could also be compromised.
With PFS, every time a new security association is negotiated, a new Diffie-Hellman exchange occurs. This exchange requires additional processing time.
The 1024-bit Diffie-Hellman prime modulus group, group2, provides more security than group1, but requires more processing time than group1. However, the 1536-bit Diffie-Hellman prime modulus group, group5, provides more security than group1 and group2, but requires more processing time than group1 and group2.
Examples
The following example specifies that PFS should be used whenever a new security association is negotiated for the crypto map "mymap 10":
crypto map mymap 10 ipsec-isakmp set pfs group2
Related Commands
crypto dynamic-map Creates a dynamic crypto map entry and enters the crypto map configuration command mode. crypto map (global IPSec) Creates or modifies a crypto map entry and enters the crypto map configuration mode. crypto map (interface IPSec) Applies a previously defined crypto map set to an interface. crypto map local-address Specifies and names an identifying interface to be used by the crypto map for IPSec traffic. match address (IPSec) Specifies an extended access list for a crypto map entry. set peer (IPSec) Specifies an IPSec peer in a crypto map entry. set security-association level per-host Specifies that separate IPSec security associations should be requested for each source/destination host pair. set security-association lifetime Overrides (for a particular crypto map entry) the global lifetime value, which is used when negotiating IPSec security associations. set transform-set Specifies which transform sets can be used with the crypto map entry. show crypto map (IPSec) Displays the crypto map configuration.
Command
Description
crypto mapA Cisco IOS software configuration entity that performs two primary functions: (1) it selects data flows that need security processing, and (2) it defines the policy for these flows and the crypto peer that traffic needs to go to. A crypto map is applied to an interface. The concept of a crypto map was introduced in classic crypto but was expanded for IPSec.
DHSee Diffie-Hellman.
Diffie-HellmanA public-key cryptography protocol which allows two parties to establish a shared secret over an insecure communications channel. Diffie-Hellman is used within IKE to establish session keys and is a component of Oakley.
Internet Security Association and Key Management ProtocolSee ISAKMP.
ISAKMPInternet Security Association and Key Management Protocol. A protocol framework that defines the mechanics of implementing a key exchange protocol and negotiation of a security policy.
OakleyA key exchange protocol that defines how to acquire authenticated keying material. The basic mechanism for Oakley is the Diffie-Hellman key exchange algorithm.
perfect forward secrecySee PFS.
PFSperfect forward secrecy. PFS ensures that a given key of an IPSec security association was not derived from any other secret (like some other keys). In other words, if someone were to breaks a key, PFS ensures that the attacker would not be able to derive any other key. If PFS were not enabled, someone could hypothetically break the IKE SA secret key, copy all the IPSec-protected data, and then use knowledge of the IKE SA secret to compromise the IPSec SAs set up by this IKE SA. With PFS, breaking IKE would not give an attacker immediate access to IPSec. The attacker would have to break each IPSec SA individually. Cisco IOS IPSec implementation uses PFS group 1 (DH 768 bit) by default.
![]()
![]()
![]()
![]()
![]()
![]()
![]()
Posted: Tue Sep 19 18:03:49 PDT 2000
Copyright 1989-2000©Cisco Systems Inc.