mirror of
https://github.com/strongswan/strongswan.git
synced 2025-10-05 00:00:45 -04:00
added two Elliptic Curve DH Group scenarios using the openssl library
This commit is contained in:
parent
0655fe4fd8
commit
5785683afe
17
testing/tests/openssl/ike-alg-ecp-high/description.txt
Normal file
17
testing/tests/openssl/ike-alg-ecp-high/description.txt
Normal file
@ -0,0 +1,17 @@
|
|||||||
|
The roadwarrior <b>carol</b> and the gateway <b>moon</b> use the <b>openssl</b>
|
||||||
|
plugin based on the <b>OpenSSL</b> library for all cryptographical functions
|
||||||
|
whereas roadwarrior <b>dave</b> uses the default <b>strongSwan</b> cryptographical
|
||||||
|
plugins <b>aes des sha1 sha2 md5 gmp</b> plus the <b>openssl</b> plugin for
|
||||||
|
the Elliptic Curve Diffie-Hellman groups only.
|
||||||
|
<p>
|
||||||
|
The roadwarriors <b>carol</b> and <b>dave</b> set up a connection each
|
||||||
|
to gateway <b>moon</b>. The authentication is based on <b>X.509 certificates</b>.
|
||||||
|
<b>carol</b> proposes the DH groups ECP_256 and ECP_384 whereas <b>dave</b> proposes
|
||||||
|
ECP_256 and ECP_521. Since <b>moon</b> does not support ECP_521 the roadwarriors
|
||||||
|
fall back to ECP_384 and ECP_521, respectively.
|
||||||
|
<p>
|
||||||
|
Upon the successful establishment of the IPsec tunnels, <b>leftfirewall=yes</b>
|
||||||
|
automatically inserts iptables-based firewall rules that let pass the tunneled traffic.
|
||||||
|
In order to test both tunnel and firewall, both <b>carol</b> and <b>dave</b> ping
|
||||||
|
the client <b>alice</b> behind the gateway <b>moon</b>.
|
||||||
|
|
12
testing/tests/openssl/ike-alg-ecp-high/evaltest.dat
Normal file
12
testing/tests/openssl/ike-alg-ecp-high/evaltest.dat
Normal file
@ -0,0 +1,12 @@
|
|||||||
|
carol::cat /var/log/daemon.log::ECP_256_BIT.*ECP_384_BIT::YES
|
||||||
|
dave::cat /var/log/daemon.log::ECP_256_BIT.*ECP_521_BIT::YES
|
||||||
|
moon::ipsec statusall::rw.*ESTABLISHED::YES
|
||||||
|
carol::ipsec statusall::home.*ESTABLISHED::YES
|
||||||
|
dave::ipsec statusall::home.*ESTABLISHED::YES
|
||||||
|
carol::ping -c 1 PH_IP_ALICE::64 bytes from PH_IP_ALICE: icmp_seq=1::YES
|
||||||
|
dave::ping -c 1 PH_IP_ALICE::64 bytes from PH_IP_ALICE: icmp_seq=1::YES
|
||||||
|
moon::tcpdump::IP carol.strongswan.org > moon.strongswan.org: ESP::YES
|
||||||
|
moon::tcpdump::IP moon.strongswan.org > carol.strongswan.org: ESP::YES
|
||||||
|
moon::tcpdump::IP dave.strongswan.org > moon.strongswan.org: ESP::YES
|
||||||
|
moon::tcpdump::IP moon.strongswan.org > dave.strongswan.org: ESP::YES
|
||||||
|
|
24
testing/tests/openssl/ike-alg-ecp-high/hosts/carol/etc/ipsec.conf
Executable file
24
testing/tests/openssl/ike-alg-ecp-high/hosts/carol/etc/ipsec.conf
Executable file
@ -0,0 +1,24 @@
|
|||||||
|
# /etc/ipsec.conf - strongSwan IPsec configuration file
|
||||||
|
|
||||||
|
config setup
|
||||||
|
crlcheckinterval=180
|
||||||
|
strictcrlpolicy=no
|
||||||
|
plutostart=no
|
||||||
|
|
||||||
|
conn %default
|
||||||
|
ikelifetime=60m
|
||||||
|
keylife=20m
|
||||||
|
rekeymargin=3m
|
||||||
|
keyingtries=1
|
||||||
|
keyexchange=ikev2
|
||||||
|
ike=aes192-sha384-ecp256,aes192-sha384-ecp384!
|
||||||
|
|
||||||
|
conn home
|
||||||
|
left=PH_IP_CAROL
|
||||||
|
leftcert=carolCert.pem
|
||||||
|
leftid=carol@strongswan.org
|
||||||
|
leftfirewall=yes
|
||||||
|
right=PH_IP_MOON
|
||||||
|
rightid=@moon.strongswan.org
|
||||||
|
rightsubnet=10.1.0.0/16
|
||||||
|
auto=add
|
@ -0,0 +1,5 @@
|
|||||||
|
# /etc/strongswan.conf - strongSwan configuration file
|
||||||
|
|
||||||
|
charon {
|
||||||
|
load = curl openssl random x509 hmac stroke
|
||||||
|
}
|
24
testing/tests/openssl/ike-alg-ecp-high/hosts/dave/etc/ipsec.conf
Executable file
24
testing/tests/openssl/ike-alg-ecp-high/hosts/dave/etc/ipsec.conf
Executable file
@ -0,0 +1,24 @@
|
|||||||
|
# /etc/ipsec.conf - strongSwan IPsec configuration file
|
||||||
|
|
||||||
|
config setup
|
||||||
|
crlcheckinterval=180
|
||||||
|
strictcrlpolicy=no
|
||||||
|
plutostart=no
|
||||||
|
|
||||||
|
conn %default
|
||||||
|
ikelifetime=60m
|
||||||
|
keylife=20m
|
||||||
|
rekeymargin=3m
|
||||||
|
keyingtries=1
|
||||||
|
keyexchange=ikev2
|
||||||
|
ike=aes256-sha512-ecp256,aes256-sha512-ecp521!
|
||||||
|
|
||||||
|
conn home
|
||||||
|
left=PH_IP_DAVE
|
||||||
|
leftcert=daveCert.pem
|
||||||
|
leftid=dave@strongswan.org
|
||||||
|
leftfirewall=yes
|
||||||
|
right=PH_IP_MOON
|
||||||
|
rightid=@moon.strongswan.org
|
||||||
|
rightsubnet=10.1.0.0/16
|
||||||
|
auto=add
|
@ -0,0 +1,5 @@
|
|||||||
|
# /etc/strongswan.conf - strongSwan configuration file
|
||||||
|
|
||||||
|
charon {
|
||||||
|
load = curl aes des sha1 sha2 md5 gmp openssl random x509 hmac stroke
|
||||||
|
}
|
23
testing/tests/openssl/ike-alg-ecp-high/hosts/moon/etc/ipsec.conf
Executable file
23
testing/tests/openssl/ike-alg-ecp-high/hosts/moon/etc/ipsec.conf
Executable file
@ -0,0 +1,23 @@
|
|||||||
|
# /etc/ipsec.conf - strongSwan IPsec configuration file
|
||||||
|
|
||||||
|
config setup
|
||||||
|
crlcheckinterval=180
|
||||||
|
strictcrlpolicy=no
|
||||||
|
plutostart=no
|
||||||
|
|
||||||
|
conn %default
|
||||||
|
ikelifetime=60m
|
||||||
|
keylife=20m
|
||||||
|
rekeymargin=3m
|
||||||
|
keyingtries=1
|
||||||
|
keyexchange=ikev2
|
||||||
|
ike=aes192-sha384-ecp384,aes256-sha512-ecp521!
|
||||||
|
|
||||||
|
conn rw
|
||||||
|
left=PH_IP_MOON
|
||||||
|
leftcert=moonCert.pem
|
||||||
|
leftid=@moon.strongswan.org
|
||||||
|
leftsubnet=10.1.0.0/16
|
||||||
|
leftfirewall=yes
|
||||||
|
right=%any
|
||||||
|
auto=add
|
@ -0,0 +1,5 @@
|
|||||||
|
# /etc/strongswan.conf - strongSwan configuration file
|
||||||
|
|
||||||
|
charon {
|
||||||
|
load = curl openssl random x509 hmac stroke
|
||||||
|
}
|
6
testing/tests/openssl/ike-alg-ecp-high/posttest.dat
Normal file
6
testing/tests/openssl/ike-alg-ecp-high/posttest.dat
Normal file
@ -0,0 +1,6 @@
|
|||||||
|
moon::ipsec stop
|
||||||
|
carol::ipsec stop
|
||||||
|
dave::ipsec stop
|
||||||
|
moon::/etc/init.d/iptables stop 2> /dev/null
|
||||||
|
carol::/etc/init.d/iptables stop 2> /dev/null
|
||||||
|
dave::/etc/init.d/iptables stop 2> /dev/null
|
9
testing/tests/openssl/ike-alg-ecp-high/pretest.dat
Normal file
9
testing/tests/openssl/ike-alg-ecp-high/pretest.dat
Normal file
@ -0,0 +1,9 @@
|
|||||||
|
moon::/etc/init.d/iptables start 2> /dev/null
|
||||||
|
carol::/etc/init.d/iptables start 2> /dev/null
|
||||||
|
dave::/etc/init.d/iptables start 2> /dev/null
|
||||||
|
moon::ipsec start
|
||||||
|
carol::ipsec start
|
||||||
|
dave::ipsec start
|
||||||
|
carol::sleep 1
|
||||||
|
carol::ipsec up home
|
||||||
|
dave::ipsec up home
|
21
testing/tests/openssl/ike-alg-ecp-high/test.conf
Normal file
21
testing/tests/openssl/ike-alg-ecp-high/test.conf
Normal file
@ -0,0 +1,21 @@
|
|||||||
|
#!/bin/bash
|
||||||
|
#
|
||||||
|
# This configuration file provides information on the
|
||||||
|
# UML instances used for this test
|
||||||
|
|
||||||
|
# All UML instances that are required for this test
|
||||||
|
#
|
||||||
|
UMLHOSTS="alice moon carol winnetou dave"
|
||||||
|
|
||||||
|
# Corresponding block diagram
|
||||||
|
#
|
||||||
|
DIAGRAM="a-m-c-w-d.png"
|
||||||
|
|
||||||
|
# UML instances on which tcpdump is to be started
|
||||||
|
#
|
||||||
|
TCPDUMPHOSTS="moon"
|
||||||
|
|
||||||
|
# UML instances on which IPsec is started
|
||||||
|
# Used for IPsec logging purposes
|
||||||
|
#
|
||||||
|
IPSECHOSTS="moon carol dave"
|
17
testing/tests/openssl/ike-alg-ecp-low/description.txt
Normal file
17
testing/tests/openssl/ike-alg-ecp-low/description.txt
Normal file
@ -0,0 +1,17 @@
|
|||||||
|
The roadwarrior <b>carol</b> and the gateway <b>moon</b> use the <b>openssl</b>
|
||||||
|
plugin based on the <b>OpenSSL</b> library for all cryptographical functions
|
||||||
|
whereas roadwarrior <b>dave</b> uses the default <b>strongSwan</b> cryptographical
|
||||||
|
plugins <b>aes des sha1 sha2 md5 gmp</b> plus the <b>openssl</b> plugin for
|
||||||
|
the Elliptic Curve Diffie-Hellman groups only.
|
||||||
|
<p>
|
||||||
|
The roadwarriors <b>carol</b> and <b>dave</b> set up a connection each
|
||||||
|
to gateway <b>moon</b>. The authentication is based on <b>X.509 certificates</b>.
|
||||||
|
<b>carol</b> proposes the DH groups ECP_192 and ECP_224 whereas <b>dave</b> proposes
|
||||||
|
ECP_192 and ECP_256. Since <b>moon</b> does not support ECP_192 the roadwarriors
|
||||||
|
fall back to ECP_224 and ECP_256, respectively.
|
||||||
|
<p>
|
||||||
|
Upon the successful establishment of the IPsec tunnels, <b>leftfirewall=yes</b>
|
||||||
|
automatically inserts iptables-based firewall rules that let pass the tunneled traffic.
|
||||||
|
In order to test both tunnel and firewall, both <b>carol</b> and <b>dave</b> ping
|
||||||
|
the client <b>alice</b> behind the gateway <b>moon</b>.
|
||||||
|
|
12
testing/tests/openssl/ike-alg-ecp-low/evaltest.dat
Normal file
12
testing/tests/openssl/ike-alg-ecp-low/evaltest.dat
Normal file
@ -0,0 +1,12 @@
|
|||||||
|
carol::cat /var/log/daemon.log::ECP_192_BIT.*ECP_224_BIT::YES
|
||||||
|
dave::cat /var/log/daemon.log::ECP_192_BIT.*ECP_256_BIT::YES
|
||||||
|
moon::ipsec statusall::rw.*ESTABLISHED::YES
|
||||||
|
carol::ipsec statusall::home.*ESTABLISHED::YES
|
||||||
|
dave::ipsec statusall::home.*ESTABLISHED::YES
|
||||||
|
carol::ping -c 1 PH_IP_ALICE::64 bytes from PH_IP_ALICE: icmp_seq=1::YES
|
||||||
|
dave::ping -c 1 PH_IP_ALICE::64 bytes from PH_IP_ALICE: icmp_seq=1::YES
|
||||||
|
moon::tcpdump::IP carol.strongswan.org > moon.strongswan.org: ESP::YES
|
||||||
|
moon::tcpdump::IP moon.strongswan.org > carol.strongswan.org: ESP::YES
|
||||||
|
moon::tcpdump::IP dave.strongswan.org > moon.strongswan.org: ESP::YES
|
||||||
|
moon::tcpdump::IP moon.strongswan.org > dave.strongswan.org: ESP::YES
|
||||||
|
|
24
testing/tests/openssl/ike-alg-ecp-low/hosts/carol/etc/ipsec.conf
Executable file
24
testing/tests/openssl/ike-alg-ecp-low/hosts/carol/etc/ipsec.conf
Executable file
@ -0,0 +1,24 @@
|
|||||||
|
# /etc/ipsec.conf - strongSwan IPsec configuration file
|
||||||
|
|
||||||
|
config setup
|
||||||
|
crlcheckinterval=180
|
||||||
|
strictcrlpolicy=no
|
||||||
|
plutostart=no
|
||||||
|
|
||||||
|
conn %default
|
||||||
|
ikelifetime=60m
|
||||||
|
keylife=20m
|
||||||
|
rekeymargin=3m
|
||||||
|
keyingtries=1
|
||||||
|
keyexchange=ikev2
|
||||||
|
ike=aes128-sha256-ecp192,aes128-sha256-ecp224!
|
||||||
|
|
||||||
|
conn home
|
||||||
|
left=PH_IP_CAROL
|
||||||
|
leftcert=carolCert.pem
|
||||||
|
leftid=carol@strongswan.org
|
||||||
|
leftfirewall=yes
|
||||||
|
right=PH_IP_MOON
|
||||||
|
rightid=@moon.strongswan.org
|
||||||
|
rightsubnet=10.1.0.0/16
|
||||||
|
auto=add
|
@ -0,0 +1,5 @@
|
|||||||
|
# /etc/strongswan.conf - strongSwan configuration file
|
||||||
|
|
||||||
|
charon {
|
||||||
|
load = curl openssl random x509 hmac stroke
|
||||||
|
}
|
24
testing/tests/openssl/ike-alg-ecp-low/hosts/dave/etc/ipsec.conf
Executable file
24
testing/tests/openssl/ike-alg-ecp-low/hosts/dave/etc/ipsec.conf
Executable file
@ -0,0 +1,24 @@
|
|||||||
|
# /etc/ipsec.conf - strongSwan IPsec configuration file
|
||||||
|
|
||||||
|
config setup
|
||||||
|
crlcheckinterval=180
|
||||||
|
strictcrlpolicy=no
|
||||||
|
plutostart=no
|
||||||
|
|
||||||
|
conn %default
|
||||||
|
ikelifetime=60m
|
||||||
|
keylife=20m
|
||||||
|
rekeymargin=3m
|
||||||
|
keyingtries=1
|
||||||
|
keyexchange=ikev2
|
||||||
|
ike=aes128-sha256-ecp192,aes128-sha256-ecp256!
|
||||||
|
|
||||||
|
conn home
|
||||||
|
left=PH_IP_DAVE
|
||||||
|
leftcert=daveCert.pem
|
||||||
|
leftid=dave@strongswan.org
|
||||||
|
leftfirewall=yes
|
||||||
|
right=PH_IP_MOON
|
||||||
|
rightid=@moon.strongswan.org
|
||||||
|
rightsubnet=10.1.0.0/16
|
||||||
|
auto=add
|
@ -0,0 +1,5 @@
|
|||||||
|
# /etc/strongswan.conf - strongSwan configuration file
|
||||||
|
|
||||||
|
charon {
|
||||||
|
load = curl aes des sha1 sha2 md5 gmp openssl random x509 hmac stroke
|
||||||
|
}
|
23
testing/tests/openssl/ike-alg-ecp-low/hosts/moon/etc/ipsec.conf
Executable file
23
testing/tests/openssl/ike-alg-ecp-low/hosts/moon/etc/ipsec.conf
Executable file
@ -0,0 +1,23 @@
|
|||||||
|
# /etc/ipsec.conf - strongSwan IPsec configuration file
|
||||||
|
|
||||||
|
config setup
|
||||||
|
crlcheckinterval=180
|
||||||
|
strictcrlpolicy=no
|
||||||
|
plutostart=no
|
||||||
|
|
||||||
|
conn %default
|
||||||
|
ikelifetime=60m
|
||||||
|
keylife=20m
|
||||||
|
rekeymargin=3m
|
||||||
|
keyingtries=1
|
||||||
|
keyexchange=ikev2
|
||||||
|
ike=aes128-sha256-ecp224,aes128-sha256-ecp256!
|
||||||
|
|
||||||
|
conn rw
|
||||||
|
left=PH_IP_MOON
|
||||||
|
leftcert=moonCert.pem
|
||||||
|
leftid=@moon.strongswan.org
|
||||||
|
leftsubnet=10.1.0.0/16
|
||||||
|
leftfirewall=yes
|
||||||
|
right=%any
|
||||||
|
auto=add
|
@ -0,0 +1,5 @@
|
|||||||
|
# /etc/strongswan.conf - strongSwan configuration file
|
||||||
|
|
||||||
|
charon {
|
||||||
|
load = curl openssl random x509 hmac stroke
|
||||||
|
}
|
6
testing/tests/openssl/ike-alg-ecp-low/posttest.dat
Normal file
6
testing/tests/openssl/ike-alg-ecp-low/posttest.dat
Normal file
@ -0,0 +1,6 @@
|
|||||||
|
moon::ipsec stop
|
||||||
|
carol::ipsec stop
|
||||||
|
dave::ipsec stop
|
||||||
|
moon::/etc/init.d/iptables stop 2> /dev/null
|
||||||
|
carol::/etc/init.d/iptables stop 2> /dev/null
|
||||||
|
dave::/etc/init.d/iptables stop 2> /dev/null
|
9
testing/tests/openssl/ike-alg-ecp-low/pretest.dat
Normal file
9
testing/tests/openssl/ike-alg-ecp-low/pretest.dat
Normal file
@ -0,0 +1,9 @@
|
|||||||
|
moon::/etc/init.d/iptables start 2> /dev/null
|
||||||
|
carol::/etc/init.d/iptables start 2> /dev/null
|
||||||
|
dave::/etc/init.d/iptables start 2> /dev/null
|
||||||
|
moon::ipsec start
|
||||||
|
carol::ipsec start
|
||||||
|
dave::ipsec start
|
||||||
|
carol::sleep 1
|
||||||
|
carol::ipsec up home
|
||||||
|
dave::ipsec up home
|
21
testing/tests/openssl/ike-alg-ecp-low/test.conf
Normal file
21
testing/tests/openssl/ike-alg-ecp-low/test.conf
Normal file
@ -0,0 +1,21 @@
|
|||||||
|
#!/bin/bash
|
||||||
|
#
|
||||||
|
# This configuration file provides information on the
|
||||||
|
# UML instances used for this test
|
||||||
|
|
||||||
|
# All UML instances that are required for this test
|
||||||
|
#
|
||||||
|
UMLHOSTS="alice moon carol winnetou dave"
|
||||||
|
|
||||||
|
# Corresponding block diagram
|
||||||
|
#
|
||||||
|
DIAGRAM="a-m-c-w-d.png"
|
||||||
|
|
||||||
|
# UML instances on which tcpdump is to be started
|
||||||
|
#
|
||||||
|
TCPDUMPHOSTS="moon"
|
||||||
|
|
||||||
|
# UML instances on which IPsec is started
|
||||||
|
# Used for IPsec logging purposes
|
||||||
|
#
|
||||||
|
IPSECHOSTS="moon carol dave"
|
Loading…
x
Reference in New Issue
Block a user