NSA Publishes Recommendations on Securing IPsec VPNs
The National Security Agency (NSA) has published a series of recommendations on how to properly configure IP Security (IPsec) Virtual Private Networks (VPNs).
Used within organizations of all sizes for remote connection to assets and for telework, VPNs can deliver the expected level of security if strong cryptography is employed and if admins perform regular assessments to identify and eliminate misconfigurations and vulnerabilities.
Thus, the NSA recommends that network administrators avoid default settings and reduce the attack surface of VPN gateways, ensure that only CNSSP 15-compliant cryptographic algorithms are used, remove unused or non-compliant cryptography, and keep both VPN gateways and clients up to date.
Administrators, the NSA says, should avoid using default configurations or the vendor-supplied tools for automated configuration or VPN access, as they might include undesired, non-compliant ISAKMP/IKE (Internet Security Association and Key Management Protocol/Internet Key Exchange) and IPsec policies.
Restricting traffic to the VPN gateway to only UDP port 500/4500 and ESP, and limiting traffic to known VPN peer IP addresses should reduce attack surface. Using an Intrusion Prevention System (IPS) to monitor IPsec traffic should help as well.
The NSA also points out that the ISAKMP/IKE and IPsec policies should be configured with recommended settings, otherwise they would expose the entire VPN to attacks.
Per CNSSP 15, as of June 2020, minimum recommended settings for ISAKMP/IKE are Diffie-Hellman group 16, AES-256 encryption, and SHA-384 hash, while those for IPsec are AES-256 encryption, SHA-384 hash, and CBC block cipher mode.
“Cryptography standards continue to change over time as the computing environment evolves and new weaknesses in algorithms are identified. Administrators should prepare for cryptographic agility and periodically check CNSSP and NIST guidance for the latest cryptography requirements, standards, and recommendations,” the NSA notes.
Any unused or non-compliant cryptography suites could expose the VPN to downgrade attacks and administrators are advised to remove them from their deployments, so that only compliant ISAKMP/IKE and IPsec policies are used.
On top of ensuring that only strong cryptography is employed and that default settings don’t create an additional attack surface, administrators should always apply the available patches for the VPN gateways and clients used within the organization.
“VPNs are essential for enabling remote access and connecting remote sites securely. However, without the proper configuration, patch management, and hardening, VPNs are vulnerable to many different types of attacks,” the NSA concludes.