I can't find much information on PFS (Perfect Forward Secrecy) Groups so I'm unsure what to suggest for a secure IPSec configuration.
Any suggestions on PFS groups that aren't recommended?
What is the implication for using better PFS groups?
I can't find much information on PFS (Perfect Forward Secrecy) Groups so I'm unsure what to suggest for a secure IPSec configuration.
Any suggestions on PFS groups that aren't recommended?
What is the implication for using better PFS groups?
What you refer to as "PFS Groups" are more precisely Diffie-Hellman groups. The Internet Key Exchange (IKE) protocol uses Diffie-Hellman to derive key material for both the IKE and IPsec security associations (SA). With IKEv2, the keys for the first IPsec (or Child) SA are derived from the IKE key material (there is no DH exchange during the IKE_AUTH exchange that follows the initial IKE_SA_INIT exchange). A separate DH exchange may optionally be used with CREATE_CHILD_SA exchanges for Child SAs created later or their rekeyings. Only to rekey the IKE SA itself is a DH exchange mandatory (so even if no separate DH exchange is used for each Child SA, will their key material be derived from new DH secrets once the IKE SA has been rekeyed).
The currently defined DH groups for IKEv2 are listed in Transform Type 4 - Diffie-Hellman Group Transform IDs. In 2017, RFC 8247 was released with recommendations regarding algorithms for IKEv2, including Diffie-Hellman groups in section 2.4. According to it, the groups to avoid are
So for MODP at least 2048 bit and for ECP at least 256 bit should be used. For a general assessment of the cryptographic strength of the groups keylength.com might be useful.
What is the implication for using better PFS groups?
Two issues may arise: