<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Diffie-Hellman groups in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Diffie-Hellman-groups/m-p/162267#M28829</link>
    <description>&lt;P&gt;Hello CheckMates,&lt;/P&gt;
&lt;P&gt;Just wanted to check if someone has any information about plans to support&amp;nbsp;&lt;SPAN&gt;Diffie-Hellman group 21 for s2s vpn's? a quick search on support center showed&amp;nbsp;sk27054, but it talks about other groups and not 21, and it also says they are not recommended. Cisco and Juniper have this group, just wondered why checkpoit does not. Thanks in advance.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Regards&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Wed, 16 Nov 2022 19:33:21 GMT</pubDate>
    <dc:creator>RS_Daniel</dc:creator>
    <dc:date>2022-11-16T19:33:21Z</dc:date>
    <item>
      <title>Diffie-Hellman groups</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Diffie-Hellman-groups/m-p/162267#M28829</link>
      <description>&lt;P&gt;Hello CheckMates,&lt;/P&gt;
&lt;P&gt;Just wanted to check if someone has any information about plans to support&amp;nbsp;&lt;SPAN&gt;Diffie-Hellman group 21 for s2s vpn's? a quick search on support center showed&amp;nbsp;sk27054, but it talks about other groups and not 21, and it also says they are not recommended. Cisco and Juniper have this group, just wondered why checkpoit does not. Thanks in advance.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Regards&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 16 Nov 2022 19:33:21 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Diffie-Hellman-groups/m-p/162267#M28829</guid>
      <dc:creator>RS_Daniel</dc:creator>
      <dc:date>2022-11-16T19:33:21Z</dc:date>
    </item>
    <item>
      <title>Re: Diffie-Hellman groups</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Diffie-Hellman-groups/m-p/162268#M28830</link>
      <description>&lt;P&gt;Thats excellent question actually...I noticed that Fortinet also had it while back, but never seen it on CP. This is whats available on Fortigate fw by default:&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot_1.png" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/18435iA8CFB5D56B2C78E0/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Screenshot_1.png" alt="Screenshot_1.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt; &lt;/P&gt;</description>
      <pubDate>Wed, 16 Nov 2022 19:51:05 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Diffie-Hellman-groups/m-p/162268#M28830</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2022-11-16T19:51:05Z</dc:date>
    </item>
    <item>
      <title>Re: Diffie-Hellman groups</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Diffie-Hellman-groups/m-p/162278#M28834</link>
      <description>&lt;P&gt;Not aware of any specific plans.&lt;BR /&gt;If this is something you need, I’d open an RFE with your Check Point SE.&lt;/P&gt;</description>
      <pubDate>Wed, 16 Nov 2022 20:52:00 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Diffie-Hellman-groups/m-p/162278#M28834</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2022-11-16T20:52:00Z</dc:date>
    </item>
    <item>
      <title>Re: Diffie-Hellman groups</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Diffie-Hellman-groups/m-p/162291#M28836</link>
      <description>&lt;P&gt;I'd recommend against any MODP group at this point if you can avoid them.&lt;/P&gt;
&lt;P&gt;p521 (actually, all of the P curves, including IKE group IDs 19 and 20) came from NIST in the US, with no explanation for some of the constants used in it. There is some suspicion that the NSA chose these constants in a way which gives them an advantage in attacking the negotiation. The strong evidence of NSA tampering in the Dual_EC_DRBG pseudorandom number generator was seen as confirmation of the suspicions about the P curves. As a result, many serious cryptographers recommend against using them.&lt;/P&gt;
&lt;P&gt;Curve25519 (IKE group 31, 128-bit-class) and Curve448 (IKE group 32, 224-bit-class) were designed specifically with constants chosen for clear, mathematical reasons. They're the options I use whenever available.&lt;/P&gt;</description>
      <pubDate>Wed, 16 Nov 2022 21:52:53 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Diffie-Hellman-groups/m-p/162291#M28836</guid>
      <dc:creator>Bob_Zimmerman</dc:creator>
      <dc:date>2022-11-16T21:52:53Z</dc:date>
    </item>
    <item>
      <title>Re: Diffie-Hellman groups</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Diffie-Hellman-groups/m-p/162584#M28924</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/1920"&gt;@RS_Daniel&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Diffie-Hellman group 20 with curve P-384 is good enough alternative to Diffie-Hellman&amp;nbsp;group 21.&lt;/P&gt;
&lt;P&gt;Currently there are no plans to add&amp;nbsp;Diffie-Hellman group 21 support.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;According to&amp;nbsp;NSA,&amp;nbsp;Diffie-Hellman group 20 is secured enough:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://en.wikipedia.org/wiki/Commercial_National_Security_Algorithm_Suite" target="_blank"&gt;https://en.wikipedia.org/wiki/Commercial_National_Security_Algorithm_Suite&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;See also the following Q &amp;amp; A from&amp;nbsp;&lt;A href="https://media.defense.gov/2021/Aug/04/2002821837/-1/-1/1/Quantum_FAQs_20210804.PDF" target="_blank"&gt;NSA | Quantum Computing and Post-Quantum Cryptography FAQs&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Q&lt;/STRONG&gt;: For RSA and Diffie-Hellman based solutions, the CNSA Suite includes only a minimum size. Can I&lt;/P&gt;
&lt;P&gt;use the NIST P-521 curve for ECDH or ECDSA on NSS?&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;A&lt;/STRONG&gt;: Cryptographic libraries implementing RSA and DH have long supported multiple key sizes, and there is a&lt;/P&gt;
&lt;P&gt;diverse range of sizes already in use. To save costs, the existing use of larger key sizes is allowed to continue&lt;/P&gt;
&lt;P&gt;in CNSA. For elliptic curve cryptography, specific parameters must be programmed, and P-384 was the&lt;/P&gt;
&lt;P&gt;common parameter set established in Suite B when this technology was first deployed. To enhance system&lt;/P&gt;
&lt;P&gt;interoperability, &lt;STRONG&gt;NSA retained the requirement to use only NIST P-384 in the CNSA definition&lt;/STRONG&gt;. NSS operators&lt;/P&gt;
&lt;P&gt;who wish to use an algorithm outside of the officially specified CNSA Suite should always consult with NSA.&lt;/P&gt;
&lt;P&gt;However, if interoperability is not a concern, P-521 would likely be considered acceptable.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;Matan&lt;/P&gt;</description>
      <pubDate>Sun, 20 Nov 2022 19:22:57 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Diffie-Hellman-groups/m-p/162584#M28924</guid>
      <dc:creator>matangi</dc:creator>
      <dc:date>2022-11-20T19:22:57Z</dc:date>
    </item>
  </channel>
</rss>

