I get they seem less secure, but a parameter regarding security is Availability. I'm not (intentionally) trying to be the grumpy old man, but the argument that "We don't provide this feature, because it is insecure" is simply not valid.
NIST standards own say on PSKs used for VPN is that they are perfectly valid (is s2s): - https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-77r1.pdf "PSKs must have a high entropy value. A good PSK is pseudorandomly created and has at least 128 bits of entropy." and "In fact, many VPN implementations actually
tend to decrease availability somewhat because they add more components, complexity, and
services to the existing network infrastructure."
But the simple fact when you use certs for the vpn is that you add on many dependencies.
- No checks warns the users that the crl is not reachable causing the vpn to go down in the future.
- You need to maintain firewall rules to allow crl access to the mgmt/cma on all in between devices
- DNS needed for 3rd party crl lookups
- Expire time warning is not usable
- no auto renew certificate
- And I'm sure there are many other reasons to avoid this.
Besides this - I'm quite happy 🙂
/Henrik