Fact-checked by Grok 2 weeks ago
References
-
[1]
RFC 2409 - The Internet Key Exchange (IKE) - IETF DatatrackerRFC 2409 describes the Internet Key Exchange (IKE), a protocol using parts of Oakley and SKEME with ISAKMP to obtain authenticated keying material.
-
[2]
RFC 7296 - Internet Key Exchange Protocol Version 2 (IKEv2)This document describes version 2 of the Internet Key Exchange (IKE) protocol. IKE is a component of IPsec used for performing mutual authentication.
-
[3]
Understand IPsec IKEv1 Protocol - CiscoIntroduction. This document describes the Internet Key Exchange (IKEv1) protocol process for a Virtual Private Network (VPN) establishment.
-
[4]
IKEv2 Packet Exchange and Protocol Level Debugging - CiscoMar 12, 2013 · This document describes the advantages of the latest version of Internet Key Exchange (IKE) and the differences between version 1 and version 2.
-
[5]
RFC 9395 - Deprecation of the Internet Key Exchange Version 1 ...Apr 19, 2023 · RFC 9395. Deprecation of the Internet Key Exchange Version 1 (IKEv1) Protocol and Obsoleted Algorithms. Abstract. Internet Key Exchange ...
-
[6]
RFC 4306 - Internet Key Exchange (IKEv2) Protocol - IETF DatatrackerRFC 4306 describes IKEv2, an Internet Key Exchange protocol for mutual authentication and establishing security associations (SAs) in IPsec.
-
[7]
RFC 4302 - IP Authentication Header - IETF DatatrackerThis document describes an updated version of the IP Authentication Header (AH), which is designed to provide authentication services in IPv4 and IPv6.
-
[8]
RFC 4303 - IP Encapsulating Security Payload (ESP)This document describes an updated version of the Encapsulating Security Payload (ESP) protocol, which is designed to provide a mix of security services in IPv ...
-
[9]
RFC 4301: Security Architecture for the Internet ProtocolSummary of each segment:
-
[10]
RFC 2408: Internet Security Association and Key Management Protocol (ISAKMP)Summary of each segment:
-
[11]
RFC 6071 - IP Security (IPsec) and Internet Key Exchange (IKE ...This document is a snapshot of IPsec- and IKE-related RFCs. It includes a brief description of each RFC, along with background information explaining the ...
-
[12]
IP Security Protocol (ipsec) Charter - IETFThe IP Security Protocol Working Group (IPSEC) will develop mechanisms to protect client protocols of IP. A security protocol in the network layer will be ...
-
[13]
IPsec Networking Standards — An Overview - ScienceDirect.comThe BOF group, which developed into the IPsec working group under the auspices of the IETF set out with the explicit goal of producing a protection mechanism ...
-
[14]
[PDF] Guide to IPsec VPNs - NIST Technical Series PublicationsJun 1, 2020 · ... IPsec Working Group at the Internet Engineering Task Force (IETF) is responsible for maintaining and publishing the standards for IKE and IPsec.
-
[15]
RFC 2522 - Photuris: Session-Key Management ProtocolPhoturis is a session-key management protocol intended for use with the IP Security Protocols (AH and ESP). This document defines the basic protocol mechanisms.
-
[16]
Secure Key Integration Protocol (SKIP) - IETFSep 3, 2025 · This document specifies the Secure Key Integration Protocol (SKIP), a two-party protocol that allows a client to securely obtain a key from ...Missing: IKEv1 origins Photuris
-
[17]
[PDF] Implementing IPsec * Abstract 1 IP security 2 Our implementationAug 1, 1997 · The IP Security protocols are sufficiently mature to benefit from multiple independent implementations and worldwide deployment.
-
[18]
RFC 4306 - Internet Key Exchange (IKEv2) Protocol - IETF DatatrackerIKE is a component of IPsec used for performing mutual authentication and establishing and maintaining security associations (SAs).Missing: development | Show results with:development
-
[19]
Design Rationale for IKEv2 - IETFThis document explains the reasoning for the design choices made by IKEv2, as well as possible alternatives, the advantages and disadvantages of these ...Missing: simplify mobility
-
[20]
draft-ietf-ipsecme-ikev2-mlkem-03 - Post-quantum Hybrid Key ...Post-quantum Hybrid Key Exchange with ML-KEM in the Internet Key Exchange Protocol Version 2 (IKEv2)
- [21]
- [22]
- [23]
- [24]
- [25]
- [26]
- [27]
- [28]
- [29]
- [30]
- [31]
- [32]
- [33]
- [34]
- [35]
- [36]
- [37]
- [38]
- [39]
- [40]
- [41]
- [42]
- [43]
- [44]
- [45]
-
[46]
RFC 3947 - Negotiation of NAT-Traversal in the IKE - IETF DatatrackerThis document describes how to detect one or more network address translation devices (NATs) between IPsec hosts, and how to negotiate the use of UDP ...
- [47]
-
[48]
RFC 4555 - IKEv2 Mobility and Multihoming Protocol (MOBIKE)This document describes the MOBIKE protocol, a mobility and multihoming extension to Internet Key Exchange (IKEv2).
- [49]
- [50]
-
[51]
unity Plugin - strongSwan DocumentationThe unity plugin provides for libcharon support for parts of the IKEv1 Cisco Unity Extensions. The plugin is disabled by default and can be enabled with the ...
-
[52]
RFC 7427 - Signature Authentication in the Internet Key Exchange ...This document generalizes IKEv2 signature support to allow any signature method supported by PKIX and also adds signature hash algorithm negotiation.
-
[53]
RFC 8784 - Mixing Preshared Keys in the Internet Key Exchange ...Mixing Preshared Keys in the Internet Key Exchange Protocol Version 2 (IKEv2) for Post-quantum Security · 1. Introduction · 2. Assumptions · 3. Exchanges · 4.Missing: Kyber | Show results with:Kyber
-
[54]
strongSwan - IPsec VPN for Linux, Android, FreeBSD, macOS ...strongSwan is a comprehensive implementation of the Internet Key Exchange (IKE) protocols that allows securing IP traffic in policy- and route-based IPsec ...Documentation · Download · About · IPsec and Related Standards
-
[55]
About - strongSwanstrongSwan is a comprehensive implementation of the Internet Key Exchange (IKE) protocols that allows securing IP traffic in policy- and route-based IPsec ...
-
[56]
MOBIKE :: strongSwan DocumentationMOBIKE. The MOBIKE IKEv2 extension (RFC 4555) allows an initiator to change its network attachement point (e.g. roam to an other interface/address) ...
-
[57]
[PDF] strongSwan VPNs scalable and modularized!Apr 16, 2008 · The new strongSwan 4.2 IKEv2 release has been completely modularized. As an alternative to the classical ipsec.conf and ipsec.secrets ...
- [58]
-
[59]
Simulating Site-to-Site VPN Customer Gateways Using strongSwanSep 2, 2020 · This post shows how to use an AWS CloudFormation template to easily deploy the open source strongSwan VPN solution to simulate an on-premises customer gateway.Setting Up The Environment · 3. Configure The Aws Side Of... · 5. Deploy Strongswan Vpn...
-
[60]
libreswanLibreswan is a free software implementation of the most widely supported and standardized VPN protocol using IPsec and the Internet Key Exchange (IKE).Documentation · Configuration examples · Ipsec.conf · FAQ
-
[61]
History - LibreswanJul 14, 2014 · Libreswan started as FreeS/WAN in 1996, became Openswan in 2003, and renamed to Libreswan in 2012 due to a lawsuit.
-
[62]
Cryptographic Module Validation Program | CSRCRed Hat Enterprise Linux Libreswan Cryptographic Module is a software only cryptographic module that provides the IKE protocol version 1 and version 2 key ...
-
[63]
4.6. Securing Virtual Private Networks (VPNs) Using LibreswanLibreswan is an open-source, user-space IKE implementation available in Red Hat Enterprise Linux 7. IKE version 1 and 2 are implemented as a user-level daemon.
-
[64]
Access to Other Clouds with Libreswan - Oracle Help CenterJul 10, 2025 · Libreswan, an open-source IPSec implementation, connects Oracle Cloud with other clouds like AWS using Site-to-Site VPN, enabling secure ...Missing: features history
-
[65]
wolfSSL Embedded SSL/TLS Library | ProductsThe wolfSSL embedded SSL library is a lightweight SSL/TLS library written in ANSI C and targeted for embedded, RTOS, and resource-constrained environments.Missing: IKEv2 | Show results with:IKEv2
-
[66]
wolfSSL Changelog | DocumentationThe wolfSSL ChangeLog documenting the changes that took place with each release of wolfSSL since the project's beginning in 2006 can be found in each wolfSSL ...
-
[67]
4. Features - wolfSSL ManualThis chapter covers some of the features of wolfSSL in more depth, including Stream Ciphers, AES-NI, IPv6 support, SSL Inspection (Sniffer) support, and more.
-
[68]
Answer AnyConnect FAQ - Tunnels, DPDs, and Inactivity Timer - CiscoThis document describes Cisco AnyConnect Secure Mobility Client tunnels, the reconnect behavior and Dead Peer Detection (DPD), and inactivity timer.
-
[69]
Understand IKEv2 and AnyConnect Reconnect Feature - CiscoMar 13, 2025 · This document describes how IKEv2 Auto Reconnect feature works on Cisco IOS® and Cisco IOS® XE routers for AnyConnect.
-
[70]
IKEv2 - Palo Alto NetworksSupports traffic selectors (one per exchange). The traffic selectors are used in IKE negotiations to control what traffic can access the tunnel. Supports Hash ...
-
[71]
GlobalProtect Always On VPN Configuration - Palo Alto NetworksIn an “Always On” GlobalProtect configuration, the app connects to the GlobalProtect portal (upon user login) to submit user and host information and receive ...Missing: IKEv2 | Show results with:IKEv2
-
[72]
VPN authentication options - Microsoft LearnJan 28, 2025 · You can only configure EAP-based authentication if you select a built-in VPN type (IKEv2, L2TP, PPTP or Automatic). Windows supports a number of ...Missing: rasman. dll
-
[73]
Implementing an IKEv2 VPN client under Windows 10 VPN - In DetailDec 10, 2019 · The RasDial routine is the entry point for the flow of control for the establishment of a VPN connection and %APPDATA%\Microsoft\Network\ ...
-
[74]
Configure RADIUS Attribute Mapping for FlexVPN Remote UsersFeb 6, 2024 · This document describes how to configure FlexVPN using Cisco Identity Services Engine (ISE) to verify identities and perform attribute group mapping.<|control11|><|separator|>
-
[75]
New version of ike-scan (IPsec IKE scanner) available - v1.7Feb 7, 2005 · 7. From: Roy Hills <Roy.Hills () nta-monitor com> Date: Mon, 07 Feb ... a) new psk-crack program to crack IKE Aggressive Mode pre-shared keys ...
-
[76]
[PDF] The Dangers of Key Reuse: Practical Attacks on IPsec IKE - USENIXAug 15, 2018 · It is common knowledge that the aggressive mode of. IKEv1 using PSKs is susceptible to offline dictionary at- tacks, against passive attackers ...
-
[77]
VU#857035 - IKEv1 Main Mode vulnerable to brute force attacksAug 14, 2018 · It is well known, that the aggressive mode of IKEv1 PSK is vulnerable to offline dictionary or brute force attacks. For the main mode ...Missing: Roy 2005
-
[78]
CVE-2016-5361 Detail - NVDJun 16, 2016 · NOTE: the original behavior complies with the IKEv1 protocol, but has a required security update from the libreswan vendor; as of 2016-06-10, it ...Missing: DoS | Show results with:DoS
-
[79]
[PDF] ETSI GR QSC 004 V1.1.1 (2017-03)Mar 8, 2017 · The Diffie-Hellman-Merkle key agreement protocol will offer no security. ... IKE was built upon key agreement, such as DH, or ECDH, for the ...
-
[80]
Grover's Algorithm and Its Impact on Cybersecurity - PostQuantum.comFor cybersecurity professionals, Grover's algorithm serves as a warning that current security parameters may not be sufficient once large-scale quantum ...Missing: IKEv1 | Show results with:IKEv1
- [81]
-
[82]
VU#226364 - Multiple vulnerabilities in Internet Key Exchange (IKE ...Nov 17, 2005 · According to that advisory, many IKEv1 implementations contain buffer overflow, format string, and other unspecified vulnerabilities in phase 1 ...<|separator|>
- [83]
-
[84]
[PDF] A Novel Denial-of-Service Attack Against IKEv2 - Hal-InriaOct 22, 2019 · We call the novel DoS attack the Deviation Attack. The Deviation Attack bypasses all measures that were introduced in IKEv2 to resist DoS ...
-
[85]
RFC 8019 - Protecting Internet Key Exchange Protocol Version 2 ...This document recommends implementation and configuration best practices for Internet Key Exchange Protocol version 2 (IKEv2) Responders.
-
[86]
[PDF] Analyzing IKEv2: Security Proofs, Known Attacks, and Other InsightsFeb 1, 2025 · IKE SA INIT uses cookies as a DoS defense mechanism, which are insufficient for DoS protection and could leak information if poorly implemented.
-
[87]
Evaluation Framework for Quantum Security Risk Assessment - arXivShor's algorithm enables quantum computers to efficiently calculate the private key, which is secret, from the public key. Therefore, the standard public key ...
-
[88]
How RFC 8784 Resists Quantum Computing ThreatsRFC 8784 creates quantum-resistant IKEv2 VPNs by mixing out-of-band pre-shared keys with in-band DH keys, making the key not vulnerable to Shor's algorithm.Missing: Kyber | Show results with:Kyber
-
[89]
draft-ietf-ipsecme-ikev2-pqc-auth-06 - Signature Authentication in ...Oct 20, 2025 · PQC signature algorithms can leverage the hedged variant within IKEv2 to enhance security against side-channel attacks. The choice between ...Missing: 2023-2025 leaks Bleichenbacher- style 8249