- Community Home
- >
- Servers and Operating Systems
- >
- Operating Systems
- >
- Operating System - Linux
- >
- FOR ipsec, does manual Key is the key-exchange-way...
Operating System - Linux
1824488
Members
3412
Online
109672
Solutions
Forums
Categories
Company
Local Language
back
Forums
Discussions
Forums
- Data Protection and Retention
- Entry Storage Systems
- Legacy
- Midrange and Enterprise Storage
- Storage Networking
- HPE Nimble Storage
Discussions
Forums
Discussions
Discussions
Discussions
Forums
Discussions
back
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
- BladeSystem Infrastructure and Application Solutions
- Appliance Servers
- Alpha Servers
- BackOffice Products
- Internet Products
- HPE 9000 and HPE e3000 Servers
- Networking
- Netservers
- Secure OS Software for Linux
- Server Management (Insight Manager 7)
- Windows Server 2003
- Operating System - Tru64 Unix
- ProLiant Deployment and Provisioning
- Linux-Based Community / Regional
- Microsoft System Center Integration
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Blogs
Information
Community
Resources
Community Language
Language
Forums
Blogs
Go to solution
Topic Options
- Subscribe to RSS Feed
- Mark Topic as New
- Mark Topic as Read
- Float this Topic for Current User
- Bookmark
- Subscribe
- Printer Friendly Page
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
07-03-2003 02:05 AM
07-03-2003 02:05 AM
July 03, 2003 10:00 AM GMT
I want to build a simplest IPsec use freeswan, and notice the option of keyexchage=ike is default and the oonly option. however, I remember there are much case only need preshare manual key.
so I doubt whether manual Key is the key-exchange-way other than IKE or the special mode of IKE.
or in other simply word, can IPsec/freeswan can work without IKE?
best regards,
Frederick van Targero
I want to build a simplest IPsec use freeswan, and notice the option of keyexchage=ike is default and the oonly option. however, I remember there are much case only need preshare manual key.
so I doubt whether manual Key is the key-exchange-way other than IKE or the special mode of IKE.
or in other simply word, can IPsec/freeswan can work without IKE?
best regards,
Frederick van Targero
frederick van targero
Solved! Go to Solution.
1 REPLY 1
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
07-03-2003 09:08 PM
07-03-2003 09:08 PM
Solution
Hi Frederick,
The difference between IKE and "manual" key is that once a manual shared secret/key is setup, it will never change, unless you change it yourself. This is a problem since the longer that use use the same key, the higher the chances that an attacker can analyse your traffic, and work out what the key is, and thus decrypt your data. The other problem is that to change the key you have to find a way to transmit it securely to the other party, then stop/start the tunnel to install it.
With IKE you can either setup a shared-secret in exactly the same way as the manual tunnel, or use X.509 certificates to generate one for you. Which ever way you choose to do it IKE will automatically derive new session keys on a regular basis, thus anyone listening could not rely on the fact that any traffic they captured was encyphered with the same key.
I'm sorry that I don't know much about Freeswan but there is no simpler way to use IPSec than with a shared-key that is rotated by IKE.
The difference between IKE and "manual" key is that once a manual shared secret/key is setup, it will never change, unless you change it yourself. This is a problem since the longer that use use the same key, the higher the chances that an attacker can analyse your traffic, and work out what the key is, and thus decrypt your data. The other problem is that to change the key you have to find a way to transmit it securely to the other party, then stop/start the tunnel to install it.
With IKE you can either setup a shared-secret in exactly the same way as the manual tunnel, or use X.509 certificates to generate one for you. Which ever way you choose to do it IKE will automatically derive new session keys on a regular basis, thus anyone listening could not rely on the fact that any traffic they captured was encyphered with the same key.
I'm sorry that I don't know much about Freeswan but there is no simpler way to use IPSec than with a shared-key that is rotated by IKE.
The opinions expressed above are the personal opinions of the authors, not of Hewlett Packard Enterprise. By using this site, you accept the Terms of Use and Rules of Participation.
Company
Learn About
News and Events
Support
© Copyright 2025 Hewlett Packard Enterprise Development LP