[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

SSH ISAKMP/Oakley interoperability test site updated to latest drafts



I updated the SSH ISAKMP/Oakley interoperability test site to latest
drafts, and now it also have some more compatibility options.

It should also now have better bandwidth than earlier, so if you had
problems earlier you should try again now.

The URL for the test site is <URL:http://isakmp-test.ssh.fi/>.

Here is update announcement text:
----------------------------------------------------------------------
This site was already announced in the Washington IETF IPSec session,
and has been operational since then, but this is official announcement
for its availability for testing.

The SSH ISAKMP/Oakley test site is web based test site for
ISAKMP/Oakley servers and it allows your implementation to perform
negotiations against the test server. It gives you sufficient
debugging output, so you can resolve most problems yourself; we are
happy to work with you on the remaining ones (send mail to
isakmp-support@ssh.fi).

For demonstration purposes, you can also put our implementation
negotiating against itself by giving 194.100.55.1 as the IP address
for the other end and using different port number for each end.

I've now configured the system so that you can also use port 500 for
testing at the SSH end. So if you couldn't test earlier because you
couldn't configure the remote port, now you can also use port 500. 

Because only one user can be testing in the same port at same time
(the test servers are each completely separate from each other, but
running on same machine), it would be good to use some other port if
you can, and leave port 500 for those who cannot choose...

The SSH ISAKMP/Oakley test site supports latest drafts (isakmp-09,
oakley-02, isakmp-oakley-07, doi-08), and following options in those
drafts:

	- Several compatibility flags. 

	- Authentication with Pre-Shared keys and limited support for
	  DSA/RSA signatures and RSA encryption authentications.
	  Authentication via signatures or encryption is slightly
	  limited because you have to configure your own system so it
	  trusts our test CA key (certificate for it can be found on
	  the main page) or just trusts any certificate sent
	  by the other end (you also need to put the "trust all
	  certificates" flag on in SSH end so it will trust your
	  certificates). The certificate sent by the other end must
	  have the correct IP address in the alt name field. We can
	  also manually do some CA operations here, so send mail to
	  isakmp-support@ssh.fi if you want to do even more complicated
	  certificate testing.

	- Both responder and initiator ends.

	- Both Main mode and Aggressive mode.

	- New group mode between main or aggressive mode and quick
	  mode.

	- Quick mode. 

	- Encryption algorithms: DES, Blowfish, 3DES, and CAST-128.

	- Hash algorithms: MD5, and SHA

	- Diffie-Hellman Groups: 1, 2, private group arguments
	  given in ISAKMP proposal, and private group negotiated in
	  new group mode (for quick mode). It also supports 1536 bit
	  modp group created by Richard Schroeppel and posted to
	  linux-ipsec list. This is numbered to be group 5. 

	- With or without PFS in quick mode.

The ISAKMP/Oakley test site is NOT connected to an IPSec engine so it
will just print out the resulting keys after negotiation, so you can
check them (note, that it will print just raw key material, parity
bits etc are fixed in the IPSec engine level, not in this level).

If you have any comments, problems, enchancements etc please send mail
to isakmp-support@ssh.fi.

I will try to add some more help texts to the pages later, but I think
implementators should be able to understand the user interface and
debug output already. I really hope this service will be usefull to
IPSec community.

For more information about SSH ipsec see http://www.ssh.fi/ipsec.html
-- 
kivinen@ssh.fi                               Work : +358-9-4354 3207
SSH Communications Security                  http://www.ssh.fi/