To provide enhanced security defaults, Cloud VPN is rolling out changes to the default order of IKE ciphers, so that Cloud VPN prefers more secure cipher algorithms first.
Furthermore, Google is dropping support for DH algorithm group 22. For more information, see Deprecated configurations.
If the new default order of the cipher algorithms causes a new cipher selection and rekey, these changes may disrupt traffic on your Cloud VPN connection.
The rest of this document helps you plan and implement your VPN cipher changes.
Order modification
When Cloud VPN initiates a VPN connection, a cipher is selected as described in the Cloud VPN documentation using the order in the supported cipher tables.
Currently, the ciphers are not ordered based on security. Some less-secure algorithms are listed before more secure algorithms. After Cloud VPN cipher changes are implemented, the Cloud VPN algorithm preferences change so that more secure cipher algorithms are preferred. The cipher order modification is planned to progressively roll out to all of our Cloud VPN gateways.
The following table shows the existing IKEv2 DH algorithm order and the new order:
Existing IKEv2 DH algorithm order | New IKEv2 DH algorithm order |
---|---|
MODP_2048_BIT | CURVE_25519 |
MODP_2048_224 | ECP_256_BIT |
MODP_2048_256 | ECP_384_BIT |
MODP_1536_BIT | ECP_521_BIT |
MODP_3072_BIT | MODP_3072_BIT |
MODP_4096_BIT | MODP_4096_BIT |
MODP_8192_BIT | MODP_6144_BIT |
MODP_1024_BIT | MODP_8192_BIT |
MODP_1024_160 | MODP_2048_BIT |
ECP_256_BIT | MODP_2048_224 |
ECP_384_BIT | MODP_2048_256 |
ECP_521_BIT | MODP_1536_BIT |
CURVE_25519 | MODP_1024_BIT |
The following table shows the existing IKEv2 pseudo-random function algorithm order and the new order:
Existing IKEv2 pseudo-random function algorithm order | New IKEv2 pseudo-random function algorithm order |
---|---|
PRF_AES128_XCBC | PRF_HMAC_SHA2_256 |
PRF_AES128_CMAC | PRF_HMAC_SHA2_384 |
PRF_HMAC_SHA1 | PRF_HMAC_SHA2_512 |
PRF_HMAC_MD5 | PRF_HMAC_SHA1 |
PRF_HMAC_SHA2_256 | PRF_HMAC_MD5 |
PRF_HMAC_SHA2_384 | PRF_AES128_CMAC |
PRF_HMAC_SHA2_512 | PRF_AES128_XCBC |
The following table shows the existing integrity algorithm order and the new order:
Existing integrity algorithm order | New integrity algorithm order |
---|---|
AUTH_HMAC_SHA2_256_128 | AUTH_HMAC_SHA2_256_128 |
AUTH_HMAC_SHA2_384_192 | AUTH_HMAC_SHA2_384_192 |
AUTH_HMAC_SHA2_512_256 | AUTH_HMAC_SHA2_512_256 |
AUTH_HMAC_MD5_96 | AUTH_HMAC_SHA1_96 |
AUTH_HMAC_SHA1_96 | AUTH_HMAC_MD5_96 |
The following table shows the existing encryption algorithm order and the new algorithm order:
Existing encryption algorithm order | New encryption algorithm order |
---|---|
ENCR_AES_CBC, 128 |
ENCR_AES_CBC, 128 |
ENCR_AES_CBC, 192 |
ENCR_AES_CBC, 256 |
ENCR_AES_CBC, 256 |
ENCR_AES_CBC, 192 |
You may experience disrupted traffic on your Cloud VPN connection when the changes are implemented due to the new cipher maximum transmission unit (MTU). Specifically, if your peer device chooses a different algorithm than it did previously, traffic disruption can occur due to a decrease in the size of the maximum payload in the encrypted ESP packet. For more information about avoiding traffic disruptions, see Recommendations.
The Cloud VPN payload MTU depends on the selected cipher. The potential disruption only affects traffic that uses the full payload capacity. Any disruption is expected to be transient until the network adapts to the new maximum Cloud VPN payload MTU.
Deprecated configurations
Cloud VPN is dropping support for Diffie-Hellman (DH) algorithm group 22. As published in RFC 8247, DH group 22 is no longer considered a strong nor safe algorithm.
If your connection currently uses DH algorithm group 22, you will experience traffic disruption on your Cloud VPN connection when the changes go into effect.
Supported configurations
Cloud VPN previously added support for DH algorithm groups 19, 20, and 21.
If you want to use algorithms from DH algorithm groups 19, 20, and 21, you can configure your peer VPN gateway to propose and accept the algorithms after the changes go into effect. However, making that change could disrupt traffic over your Cloud VPN connection.
Recommendations
If you don't enforce DH group 22 and you can tolerate potential temporary traffic disruptions during MTU changes, no further action is required.
To avoid traffic disruptions, we recommend that you configure your peer VPN gateway to propose and accept only one supported cipher for each cipher role. A VPN gateway that proposes and accepts only one supported cipher for each cipher role isn't affected by Google's new cipher algorithm proposal order.
After this change, DH group 22 is no longer supported by Cloud VPN for existing tunnels. If your cipher algorithm proposal set doesn't contain other supported DH groups, your router and Cloud VPN will be unable to establish a VPN tunnel.
For more information about MTU, see MTU considerations.
Billing changes
There are no billing changes for Cloud VPN cipher changes.
Where to get help
If you have any questions or require assistance, contact Google Cloud Support.