Skip to content

Commit 22e3bf2

Browse files
committed
fix(vpn): fix security proposal doc
1 parent 0a187ec commit 22e3bf2

File tree

1 file changed

+3
-5
lines changed

1 file changed

+3
-5
lines changed

pages/site-to-site-vpn/reference-content/security-proposals.mdx

Lines changed: 3 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -38,16 +38,14 @@ When defining your Site-to-Site VPN security proposal, you must define the algor
3838
| Protocol | Element | Description | User must define? |
3939
|-----------------|-----------------|----------------------------------------------------|----------------------------|
4040
| **IKEv2** | **Encryption** | Algorithm to encrypt IKE negotiation messages | ✅ Yes |
41-
| **IKEv2** | **Integrity** | HMAC-based algorithm to verify IKE negotiation messages have not been tampered with | ✅ Yes |
41+
| **IKEv2** | **Integrity** | HMAC-based algorithm to verify IKE negotiation messages have not been tampered with. <br/><br/>Only set an HMAC integrity algorithm if **not** using an AEAD algorithm for IKEv2 encryption (see below). Otherwise, integrity is built in, and you do not need to set an IKEv2 integrity algorithm. | ❓ Depends |
4242
| **IKEv2** | **Key Exchange Method** | DH group to define strength of key exchange | ✅ Yes |
4343

4444
| Protocol | Element | Description | User must define? |
4545
|-----------------|-----------------|----------------------------------------------------|----------------------------|
4646
| **ESP** | **Encryption** | Algorithm to encrypt traffic's data payloads | ✅ Yes |
4747
| **ESP** | **Integrity** | HMAC-based algorithm to verify data payloads have not been tampered with. <br/><br/>Only set an HMAC integrity algorithm if **not** using an AEAD algorithm for ESP encryption (see below). Otherwise, integrity is built in, and you do not need to set an ESP integrity algorithm. | ❓ Depends |
48-
| **ESP** | **Key Exchange Method** | Not applicable to ESP. | ❌ No |
49-
50-
?? Pseudorandom function ??
48+
| **ESP** | **Key Exchange Method** | DH group to define strength of key exchange | ❌ No |
5149

5250
## Encryption algorithms
5351

@@ -65,7 +63,7 @@ The following encryption algorithms are available.
6563
| `aes192` (AES-CBC) | non-AEAD | 192 | ⚠️ Medium | Rarely used, `aes256` is preferred. | ⚠️ Use with caution |
6664
| `aes128` (AES-CBC) | non-AEAD | 128 | ⚠️ Medium | Suitable for performance-sensitive VPNs, where constraints don't allow `aes256` | ⚠️ Use with caution |
6765

68-
\* **A**uthenticated **E**ncryption with **A**ssociated **D**ata (**AEAD**) algorithms provide both encryption and authentication in a single step. They are more secure and efficient than non-AEAD algorithms, but are not supported by all legacy devices. We recommend that you always prefer AEAD algorithms (`aes256gcm16` or `chacha20poly1305`) for performance and security. Choosing an AEAD algorithm for ESP encryption means you do **not** need to define an algorithm for ESP integrity.
66+
\* **A**uthenticated **E**ncryption with **A**ssociated **D**ata (**AEAD**) algorithms provide both encryption and authentication in a single step. They are more secure and efficient than non-AEAD algorithms, but are not supported by all legacy devices. We recommend that you always prefer AEAD algorithms (`aes256gcm16` or `chacha20poly1305`) for performance and security. Choosing an AEAD algorithm for IKEv2/ESP encryption means you do **not** need to define an algorithm for IKEv2/ESP integrity.
6967

7068
## Integrity algorithms
7169

0 commit comments

Comments
 (0)