Date: Sat, 24 Mar 2001 18:38:48 -0500 From: Mipam <mipam@ibb.net> To: Jeremy Karteczka <jerkart@mw.mediaone.net> Cc: freebsd-security@FreeBSD.ORG Subject: Re: Trying to set up an IKE vpn between FreeBSD and Checkpoint FW-1 Message-ID: <20010324183848.A4464@bootp-20-219.bootp.virginia.edu> In-Reply-To: <05ae01c0b41e$1f82ac90$0200a8c0@jose>; from jerkart@mw.mediaone.net on Fri, Mar 23, 2001 at 11:51:38PM -0500 References: <05ae01c0b41e$1f82ac90$0200a8c0@jose>
next in thread | previous in thread | raw e-mail | index | archive | help
On Fri, Mar 23, 2001 at 11:51:38PM -0500, Jeremy Karteczka wrote: > Greetings, > I am trying to get an IKE vpn going between a 4.2-RELEASE machine (using racoon > for key exchange) and a Checkpoint firewall (v4.1 SP3). I have tried both sha1 [SNIP] > I have looked for RFCs to find out which is the accepted standard but could not > find one that specifically states how long the key should be for each hash > method. > Can anyone point me to the proper RFCs and/or tell me if there is a way I can > reverse the expected key lenght on the FreeBSD side? md5 is 128 bits and sha1 is 160 bits. For some rfc's to read: RFC 2085 - HMAC-MD5 IP Authentication with Replay Prevention RFC 2104 - HMAC: Keyed-Hashing for Message Authentication RFC 2202 - Test Cases for HMAC-MD5 and HMAC-SHA-1 RFC 2403 - The Use of HMAC-MD5-96 within ESP and AH RFC 2404 - The Use of HMAC-SHA-1-96 within ESP and AH And of course rfc 2402 - AH Bye, Mipam. To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20010324183848.A4464>