Palo Alto Networks Extends Multilayered Quantum Safe VPN Support with ETSI 014 protocol, leveraging Quantum Key Distribution (QKD)

cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 
Announcements
Community Blogs
11 min read
L2 Linker

The Need for Post-Quantum Resistant VPN

 

Diffie-Hellman (DH), Elliptic Curve Cryptography (ECC), and Elliptic Curve Diffie-Hellman (ECDH) are used extensively in both PKI encryption and IKE key exchange mechanisms (KEMs) to create shared key material to perform data encryption. This technology is at risk of being broken by a cryptographically relevant quantum computer (CRQC) within the next 5-8 years.  Although quantum computers do not have sufficient power to break these encryption protocols today, Harvest Now, Decrypt Later attacks are being conducted to gather encrypted data now and decrypt it when a sufficiently powerful CRQC becomes available.

 

The vulnerability in asymmetric encryption protocols stems from Shor’s Algorithm, which enables factoring large numbers and calculating discrete logarithms to reverse the primes used in key creation.  Even though Shor’s algorithm was created in 1994, there was never enough computing power to exercise it to break modern PKI encryption protocols fully.  However, with the promise of quantum computers being millions of times more powerful than the most powerful classic supercomputers today, Shor’s algorithm becomes a new tool for breaking encryption.

 

For symmetric encryption, the Advanced Encryption Standard (AES) cryptographic algorithm is still considered safe from a QC attack when long key lengths are used.  For example, replacing weaker AES-128 with AES-256 encryption still provides sufficient security strength against a quantum computer.  As most VPN implementations utilize asymmetric key exchange with DH and ECDH, IT professionals must begin reviewing their crypto inventory and develop plans to upgrade their critical VPN infrastructure. 

 

Best Practice Tip: If your company is a potential target of harvesting attacks, each day you delay taking action gives the attacker more information to decrypt later.  Taking action earlier helps to reduce the window of opportunity for harvesting attacks.

 

 

To start arming customers with quantum-resistant tools, Palo Alto Networks is introducing several new features to enhance the IKEv2 protocol, providing Post-Quantum (PQ) Resistant VPN capabilities.  The first feature offered is based on RFC 8784, which uses Post-Quantum Preshared Keys (PPK), and this was released in Cosmos PAN-OS 11.1.  

 

The second PQ VPN feature provided the ability to use the new Post Quantum Cryptography (PQC) algorithms to produce hybrid encryption keys as described in RFC 9242, Intermediate Key Exchange and RFC 9370 Multiple Key Exchanges in IKEv2.  This capability was released in PAN-OS 11.2 Quasar.

 

The next PQ VPN security feature being released in PAN-OS is the support for the ETSI-014 standard, which provides a standard API to obtain high-quality encryption keys from an external Quantum Key Distribution (QKD) device.

QKD is of strategic importance for a high-value traffic environment, such as telcos and financial industries. Telcos are rolling out QKD on metro and inter-DC fiber as a premium, quantum-safe transport that they can sell to high-value customers like finance, government, and critical infrastructure. The financial sector is piloting QKD for ultra-sensitive, low-latency links for scenarios like trading, financial transactions, and inter-DC replication, to avoid Harvest Now, Decrypt Later attacks. QKD provides a physics-guaranteed key exchange that complements PQC, facilitating broader cryptographic migration.

 

What is the ETSI-014 Standard

 

The ETSI-014 standard provides a set of standardized API calls that allow the PAN-OS NGFW to communicate and request symmetric encryption keys from a QKD device, typically located in the exact location as the NGFW used to establish the site-to-site VPN tunnel.  Any QKD device or platform that supports the ETSI-014 standard should be interoperable with the PAN-OS firewall.

 

Under the ETSI-014 standard, the PAN-OS firewall acts as the SAE device and makes API calls to the QKD device, referred to as the KME.  The standard doesn’t specify how the communication is secured, and this is outside of the ETSI-014 API.  However, most implementations typically use a TLSv1.3 tunnel to ensure communication between the PAN-OS firewall and the KME.  Depending on the QKD vendor’s implementation, either classic encryption and/or PQC encryption can be used to secure the key generation process from a quantum attack.

 

Certificate authentication can also be used to authenticate one or both parties when setting up the secure TLS tunnel.  Palo Alto Networks’ QKD implementation will support both PQC-based TLSv1.3 connections and bi-directional certificate authentication.

 

Looking at the illustration below, we can see how the VPN initiator (Alice) and responder (Bob) utilize the ETSI-014 APIs to retrieve encryption keys from their KME QKD appliances, which are located in the exact locations as their respective PAN-OS firewalls.

 

JayGolf_0-1757648992271.png

 

 

  1. Alice’s firewall is the initiator.  When the IKEv2 peering process begins, Alice’s firewall issues an ETSI-014 API call to perform a key request from her KME QKD device.
  2. Alice’s KME QKD device returns a key identified by a unique keyid. 
  3. The KME devices are always synchronized with each other and constantly exchange key and key ID pairs among themselves. QKD KMEs utilize a dedicated fiber connection to synchronize key information between themselves securely.  The key material is transmitted using quantum qubits and is protected by the laws of quantum physics.  This means the keys cannot be intercepted or viewed by a third party between the two KEM devices, and any attempts to do so will result in a change to the qubit’s state and detection of the hijacking attempt.
  4. Once Alice’s firewall has the key and key ID pair, the key ID is placed in the IKEv2 exchange and sent to Bob’s firewall, acting as the responder.  Only the key ID is sent, and the key itself is never transmitted in the IKEv2 peering process.  Anyone harvesting this information will never be able to obtain the symmetric encryption key, as it was never sent.
  5. Bob’s firewall (responder) receives the keyid sent by Alice’s firewall and makes an ETSI-014 API call to fetch the symmetric key using the keyid it received.
  6. Bob’s KME QKD appliance returns the symmetric key matching the keyid.

 

With the same symmetric key deployed on both PAN-OS firewalls, the IPSec tunnel is brought up and the data is encrypted using the key from the KME QKD devices.

 

The advantages of QKD and ETSI-014 include:

  1. High-quality keys are generated with a Quantum Random Number Generator (QRNG) and are not produced using a mathematical formula.  
  2. Keys are securely transmitted between KME devices using quantum physics and can not be intercepted or read without being detected.
  3. The ETSI-014 APIs are standardized and supported by many vendors, providing interoperability between requesting devices and KME key distribution devices.
  4. The ETSI-014 standard is straightforward to implement, as it only requires three API calls.

 

JayGolf_2-1757649076001.png

 

The disadvantages of QKD include:

  1. The QKD technology is still young, and several items need to mature before full-scale global production adoption can take place:
    • The dedicated fiber channel used to synchronize the keys securely is currently limited to a few hundred kilometers due to production technology constraints.  Although this is improving, it may not arrive quickly enough to beat Y2Q—the year a CRQC becomes available.
    • Distance limitations can be solved with a repeater node today.  The repeater converts the quantum channel back to a digital channel and then back to another quantum channel to transmit the key another few hundred kilometers.  While the key material is converted to digital format, there is a chance for it to be intercepted.
    • The protocols used to communicate and synchronize the QKD devices are still not fully standardized and have not been vetted by the world community.
  2. The QKD equipment is expensive and the QKD topology requires a QKD device at every location where the site-to-site VPN is to initiate and terminate.
  3. Select world governments are recommending the use of PQCs as the immediate step to protecting VPN communications from being harvested and successfully decrypted at a later date. Their reasoning is that PQCs are software enhancements that can be deployed faster and to more use cases than QKD technology.  If the goal is to prevent a successful harvesting attack as quickly as possible, deploying expensive and early technology like QKD can be a slower path.

 

NOW let’s look at the Configurations for ETSI-014 and QKD in PAN-OS

 

PAN-OS QKD and ETSI-014 Support

 

The PAN-OS firewall provides support for QKD and the ETSI-014 standard as follows:

 

  1. Allows one or more QKD profiles to be created to support different QKD devices. The QKD profile is assigned to the IKE Gateway to permit a different QKD KME device for each IKE peer the firewall needs to communicate with.
  2. Secures the QKD communications with industry-standard TLSv1.3.  Classic and PQCs will be supported, with PQCs coming in later.
  3. Provides bidirectional certificate authentication.

 

Best Practice TipTo ensure strong security for the QKD communication network, VLANs should be used to segment QKD communications from other network traffic.  Access to the QKD network should be limited to specific authorized personnel only.

 

With QKD enabled, the PAN-OS firewall will not use RFC 8784 PQ VPN PPK or the PQ VPN Hybrid Key key generation mechanisms to generate the symmetric key.  The assigned KME QKD device will provide the encryption key over the secure TLS channel.


Enabling IKEv2 with QKD Encryption Keys

To enable the new PQ VPN QKD feature, reference the configuration screens below to configure the firewall’s QKD profile(s) and IKE Gateway’s PQ QKD settings.



QKD Profile Configuration

The QKD Profile allows you to configure a unique connection profile to each KME QKD device the firewall is to communicate with.  In most use cases, an enterprise site-to-site VPN topology should only require one KME QKD device connection per site.  PAN-OS firewalls used in a service provider use case may require additional QKD profiles to support different parties sharing the same firewall.

 

  1. Navigate to the Device>Setup>Quantum tab to add or remove QKD profiles.

JayGolf_1-1757650767173.png

2. Click Add to create a new QKD profile and provide the information requested on the form.

JayGolf_2-1757650811927.png

 

    1. Name: The name assigned to the QKD profile.
    2. KME URL:  The URL string to connect to the local KME device.
    3. Local SAE ID:  The SAE ID assigned to the firewall you’re configuring.
    4. Local Certificate:  The local certificate used to authenticate the firewall to the KME. Both the Firewalls and the KME will need to import the same certificate in the trusted store. 
    5. KME CA Certificate:  The KME’s Certificate Authority certificate.
    6. KME Certificate:  The KME’s server certificate.

 

IKE Gateway Configuration

Navigate to the IKE Gateway>Advanced Options, select the PQ QKD tab as shown in the illustration below.

 

JayGolf_3-1757650854920.png

 

QKD Profile: Select the QKD profile to assign to the IKE gateway in the dropdown list.

SAE ID: (Read Only) The local SAE ID is displayed for confirmation.

Peer SAE ID: Enter the SAE ID assigned to the IKE peer on the other side VPN tunnel.

Key Size (bits): The key size for the key returned from the KME QKD device. The default is 256 bits.

QKD Timeout (Sec): The timeout value to wait for the QKD response

 

Service Route Configuration

By default, the QKD connection will use the management plane (MP) interface to communicate with the KME. If the KME is on a different network that is connected to the NGFW’s data plane (DP), you will need to configure a service route to redirect the QKD communications from the MP to the DP.

 

The Service Route Configuration option is found in the Device>Setup>Services menu.  Select the QKD service option and configure the source interface and IP address for the service redirection.

 

JayGolf_4-1757650908800.png

 

Test connectivity to KME host,


Once the configuration is set up, click on Test connectivity to KME host, to verify if the NGFW firewall can reach the KME host from each firewall. Below is an output example you should see if the connection is successful.

 

JayGolf_5-1757650943635.png

 

Live Demo 

 

 

Validate IKE info for QKD 

  • Once the tunnel is up, navigate to Network → IPsec Tunnels and click on IKE Info.

 

JayGolf_6-1757651740318.png

 

  • In IKE Info, under Algorithm, you will see that the IKEv2 is using PSK/DH21+QKD/AES256-GCM16/COMBINED.

 

JayGolf_7-1757651788767.png

 

CLI Commands for QKD Validation and Troubleshooting

The following list of CLI commands can be used to validate the QKD configuration.

 

  • show quantumd qkd command will show you all the QKD profiles configured on the NGFW firewall. 

 

JayGolf_8-1757651838210.png

 

  • To get the key_ID and key from the KME server, run the following command:

    debug quantumd test qkd get-key qkd-profile QKD-profile peer-sae-id SA00000009
    • Ensure to select the correct QKD profile and peer-sae-id

 

 

To learn more about the cybersecurity impact of quantum computers and how your organization can begin your Quantum Readiness journey now, check out our new CISO’s Guide to Quantum Security video series. Or follow our Quantum Readiness Blog, Quantum documentation, and how Palo Alto Networks is helping customers in their Quantum Secure journey

 

Other VPN References

 

https://docs.paloaltonetworks.com/network-security/quantum-security/administration/configure-quantum...

 

 



 

 

 

 

 

 

 

 

  • 237 Views
  • 0 comments
  • 1 Likes
Register or Sign-in
Labels
Top Liked Authors