Skip site navigation (1)Skip section navigation (2)
Date:      Sat, 24 Mar 2001 18:38:48 -0500
From:      Mipam <mipam@ibb.net>
To:        Jeremy Karteczka <jerkart@mw.mediaone.net>
Cc:        freebsd-security@FreeBSD.ORG
Subject:   Re: Trying to set up an IKE vpn between FreeBSD and Checkpoint FW-1
Message-ID:  <20010324183848.A4464@bootp-20-219.bootp.virginia.edu>
In-Reply-To: <05ae01c0b41e$1f82ac90$0200a8c0@jose>; from jerkart@mw.mediaone.net on Fri, Mar 23, 2001 at 11:51:38PM -0500
References:  <05ae01c0b41e$1f82ac90$0200a8c0@jose>

next in thread | previous in thread | raw e-mail | index | archive | help
On Fri, Mar 23, 2001 at 11:51:38PM -0500, Jeremy Karteczka wrote:
> Greetings,
> I am trying to get an IKE vpn going between a 4.2-RELEASE machine (using racoon
> for key exchange) and a Checkpoint firewall (v4.1 SP3).  I have tried both sha1

[SNIP]

> I have looked for RFCs to find out which is the accepted standard but could not
> find one that specifically states how long the key should be for each hash
> method.
> Can anyone point me to the proper RFCs and/or tell me if there is a way I can
> reverse the expected key lenght on the FreeBSD side? 

md5 is 128 bits and sha1 is 160 bits.
For some rfc's to read:

RFC 2085 - HMAC-MD5 IP Authentication with Replay Prevention 
RFC 2104 - HMAC: Keyed-Hashing for Message Authentication 
RFC 2202 - Test Cases for HMAC-MD5 and HMAC-SHA-1
RFC 2403 - The Use of HMAC-MD5-96 within ESP and AH 
RFC 2404 - The Use of HMAC-SHA-1-96 within ESP and AH
And of course rfc 2402 - AH
Bye,

Mipam.

To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20010324183848.A4464>