mirror of
https://github.com/strongswan/strongswan.git
synced 2025-10-06 00:00:47 -04:00
testing: Migrated wolfssl scenarios
This commit is contained in:
parent
2e4c062512
commit
558529afe2
@ -1,8 +1,8 @@
|
|||||||
A connection between the subnets behind the gateways <b>moon</b> and <b>sun</b> is set up.
|
A connection between the subnets behind the gateways <b>moon</b> and <b>sun</b> is set up.
|
||||||
The authentication is based on <b>X.509 certificates</b> containing <b>Ed25519</b> keys.
|
The authentication is based on <b>X.509 certificates</b> containing <b>Ed25519</b> keys.
|
||||||
<b>moon</b> uses the wolfssl plugin based on the wolfCrypt library for all
|
<b>moon</b> uses the wolfssl plugin based on the wolfCrypt library for all
|
||||||
cryptographical functions whereas <b>sun</b> uses the default strongSwan
|
cryptographical functions whereas <b>sun</b> uses t<b>openssl</b> as the default
|
||||||
cryptographical plugins.
|
<b>strongSwan</b> cryptographical plugin.
|
||||||
<p/>
|
<p/>
|
||||||
Upon the successful establishment of the IPsec tunnel, the updown script automatically
|
Upon the successful establishment of the IPsec tunnel, the updown script automatically
|
||||||
inserts iptables-based firewall rules that let pass the tunneled traffic.
|
inserts iptables-based firewall rules that let pass the tunneled traffic.
|
||||||
|
@ -1,9 +1,9 @@
|
|||||||
# /etc/strongswan.conf - strongSwan configuration file
|
# /etc/strongswan.conf - strongSwan configuration file
|
||||||
|
|
||||||
swanctl {
|
swanctl {
|
||||||
load = random pem sha1 pkcs1 pkcs8 curve25519 x509 revocation constraints
|
load = random pem pkcs1 openssl revocation constraints
|
||||||
}
|
}
|
||||||
|
|
||||||
charon-systemd {
|
charon-systemd {
|
||||||
load = random nonce aes sha1 sha2 hmac kdf pem pkcs1 pkcs8 x509 revocation curve25519 curl kernel-netlink socket-default updown vici
|
load = random nonce openssl pem pkcs1 revocation constraints curl kernel-netlink socket-default updown vici
|
||||||
}
|
}
|
||||||
|
@ -1,8 +1,8 @@
|
|||||||
The roadwarrior <b>carol</b> and the gateway <b>moon</b> use the <b>wolfssl</b>
|
The roadwarrior <b>carol</b> and the gateway <b>moon</b> use the <b>wolfssl</b>
|
||||||
plugin based on the <b>wolfSSL</b> library for all cryptographical functions whereas
|
plugin based on the <b>wolfSSL</b> library for all cryptographical functions whereas
|
||||||
roadwarrior <b>dave</b> uses the default <b>strongSwan</b> cryptographical
|
roadwarrior <b>dave</b> uses <b>openssl</b> as the default <b>strongSwan</b>
|
||||||
plugins. The authentication is based on <b>X.509 certificates</b> and the key exchange
|
cryptographical plugin. The authentication is based on <b>X.509 certificates</b>
|
||||||
on <b>x25519</b>.
|
and the key exchange on <b>x25519</b>.
|
||||||
<p/>
|
<p/>
|
||||||
Upon the successful establishment of the IPsec tunnels, the updown script
|
Upon the successful establishment of the IPsec tunnels, the updown script
|
||||||
automatically inserts iptables-based firewall rules that let pass the tunneled traffic.
|
automatically inserts iptables-based firewall rules that let pass the tunneled traffic.
|
||||||
|
@ -1,11 +1,11 @@
|
|||||||
# /etc/strongswan.conf - strongSwan configuration file
|
# /etc/strongswan.conf - strongSwan configuration file
|
||||||
|
|
||||||
swanctl {
|
swanctl {
|
||||||
load = pkcs1 pem openssl x509 revocation constraints
|
load = pkcs1 pem openssl revocation constraints
|
||||||
}
|
}
|
||||||
|
|
||||||
charon-systemd {
|
charon-systemd {
|
||||||
load = random nonce sha1 sha2 sha3 aes curve25519 hmac kdf mgf1 pem pkcs1 x509 revocation constraints gmp curl kernel-netlink socket-default updown vici
|
load = random nonce openssl pem pkcs1 revocation constraints curl kernel-netlink socket-default updown vici
|
||||||
|
|
||||||
rsa_pss = yes
|
rsa_pss = yes
|
||||||
}
|
}
|
||||||
|
@ -1,8 +1,8 @@
|
|||||||
The roadwarrior <b>carol</b> and the gateway <b>moon</b> use the <b>wolfssl</b>
|
The roadwarrior <b>carol</b> and the gateway <b>moon</b> use the <b>wolfssl</b>
|
||||||
plugin based on the <b>wolfCrypt</b> library for all cryptographical functions whereas
|
plugin based on the <b>wolfCrypt</b> library for all cryptographical functions whereas
|
||||||
roadwarrior <b>dave</b> uses the default <b>strongSwan</b> cryptographical
|
roadwarrior <b>dave</b> uses <b>openssl</b> as the default <b>strongSwan</b>
|
||||||
plugins. The authentication is based on <b>X.509 certificates</b> and the key exchange
|
cryptographical plugin. The authentication is based on <b>X.509 certificates</b>
|
||||||
on <b>modp3072</b>.
|
and the key exchange on <b>modp3072</b>.
|
||||||
<p/>
|
<p/>
|
||||||
Upon the successful establishment of the IPsec tunnels, the updown script
|
Upon the successful establishment of the IPsec tunnels, the updown script
|
||||||
automatically inserts iptables-based firewall rules that let pass the tunneled traffic.
|
automatically inserts iptables-based firewall rules that let pass the tunneled traffic.
|
||||||
|
@ -1,11 +1,11 @@
|
|||||||
# /etc/strongswan.conf - strongSwan configuration file
|
# /etc/strongswan.conf - strongSwan configuration file
|
||||||
|
|
||||||
swanctl {
|
swanctl {
|
||||||
load = pem pkcs1 x509 revocation constraints pubkey openssl random
|
load = pem pkcs1 revocation constraints pubkey openssl random
|
||||||
}
|
}
|
||||||
|
|
||||||
charon-systemd {
|
charon-systemd {
|
||||||
load = random nonce sha1 sha2 aes hmac kdf mgf1 pem pkcs1 x509 revocation constraints pubkey gmp curl kernel-netlink socket-default updown vici
|
load = random nonce openssl pem pkcs1 revocation constraints pubkey curl kernel-netlink socket-default updown vici
|
||||||
|
|
||||||
rsa_pss = yes
|
rsa_pss = yes
|
||||||
}
|
}
|
||||||
|
Loading…
x
Reference in New Issue
Block a user