JUSX-VN-000007 - The Juniper SRX Services Gateway VPN must implement a FIPS-140-2 validated Diffie-Hellman (DH) group.

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

Use of an approved DH algorithm ensures the Internet Key Exchange (IKE) (phase 1) proposal uses FIPS-validated key management techniques and processes in the production, storage, and control of private/secret cryptographic keys. The security of the DH key exchange is based on the difficulty of solving the discrete logarithm in which the key was derived from. Hence, the larger the modulus, the more secure the generated key is considered to be.

Solution

The following command is an example of how to configure the IKE (phase 1) proposals. The following groups are allowed for use in DoD:
DH Groups 14 (2048-bit MODP)
- 19 (256-bit Random ECP), 20 (384-bit Random ECP), 5 (1536-bit MODP), 24 (2048-bit MODP with 256-bit POS).

Example:
[edit]
set security ike proposal <P1-PROPOSAL-NAME> dh-group group14

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_Juniper_SRX_SG_Y22M10_STIG.zip

Item Details

References: CAT|II, CCI|CCI-000068, Rule-ID|SV-214674r382783_rule, STIG-ID|JUSX-VN-000007, STIG-Legacy|SV-81137, STIG-Legacy|V-66647, Vuln-ID|V-214674

Plugin: Juniper

Control ID: 96cc7fae2a38e3d9522bcd8b9c9212e61833fefc3c37ba16076cbf76f01d52a9