testing: Enable mgf1 plugin for scenarios where FreeRADIUS uses PSS signatures

Looks like a cipher suite without DHE was selected previously.

Could be a side-effect of dc1085734f34 ("testing: Remove unnecessary
FreeRADIUS dh_file option as recommended in the log").
This commit is contained in:
Tobias Brunner 2024-06-26 14:49:34 +02:00
parent a9ced3ccb4
commit c4bce2b79b
8 changed files with 8 additions and 8 deletions

View File

@ -1,6 +1,6 @@
# /etc/strongswan.conf - strongSwan configuration file
charon {
load = random nonce aes sha1 sha2 md5 pem pkcs1 curve25519 gmp x509 curl revocation hmac kdf stroke kernel-netlink socket-default eap-identity eap-md5 eap-peap updown
load = random nonce aes sha1 sha2 md5 pem pkcs1 curve25519 gmp x509 curl revocation hmac kdf mgf1 stroke kernel-netlink socket-default eap-identity eap-md5 eap-peap updown
multiple_authentication=no
}

View File

@ -1,6 +1,6 @@
# /etc/strongswan.conf - strongSwan configuration file
charon {
load = random nonce aes sha1 sha2 md5 pem pkcs1 curve25519 gmp x509 curl revocation hmac kdf stroke kernel-netlink socket-default eap-identity eap-md5 eap-peap updown
load = random nonce aes sha1 sha2 md5 pem pkcs1 curve25519 gmp x509 curl revocation hmac kdf mgf1 stroke kernel-netlink socket-default eap-identity eap-md5 eap-peap updown
multiple_authentication=no
}

View File

@ -1,7 +1,7 @@
# /etc/strongswan.conf - strongSwan configuration file
charon {
load = random nonce aes md5 sha1 sha2 pem pkcs1 curve25519 gmp x509 curl revocation hmac kdf stroke kernel-netlink socket-default eap-identity eap-md5 eap-ttls updown
load = random nonce aes md5 sha1 sha2 pem pkcs1 curve25519 gmp x509 curl revocation hmac kdf mgf1 stroke kernel-netlink socket-default eap-identity eap-md5 eap-ttls updown
multiple_authentication=no
syslog {
daemon {

View File

@ -1,7 +1,7 @@
# /etc/strongswan.conf - strongSwan configuration file
charon {
load = random nonce aes md5 sha1 sha2 pem pkcs1 curve25519 gmp x509 curl revocation hmac kdf stroke kernel-netlink socket-default eap-identity eap-md5 eap-ttls updown
load = random nonce aes md5 sha1 sha2 pem pkcs1 curve25519 gmp x509 curl revocation hmac kdf mgf1 stroke kernel-netlink socket-default eap-identity eap-md5 eap-ttls updown
multiple_authentication=no
syslog {
daemon {

View File

@ -5,5 +5,5 @@ swanctl {
}
charon-systemd {
load = random nonce aes md5 sha1 sha2 pem pkcs1 curve25519 gmp x509 curl revocation hmac kdf vici kernel-netlink socket-default eap-identity eap-md5 eap-peap updown
load = random nonce aes md5 sha1 sha2 pem pkcs1 curve25519 gmp x509 curl revocation hmac kdf mgf1 vici kernel-netlink socket-default eap-identity eap-md5 eap-peap updown
}

View File

@ -5,5 +5,5 @@ swanctl {
}
charon-systemd {
load = random nonce aes md5 sha1 sha2 pem pkcs1 curve25519 gmp x509 curl revocation hmac kdf vici kernel-netlink socket-default eap-identity eap-md5 eap-peap updown
load = random nonce aes md5 sha1 sha2 pem pkcs1 curve25519 gmp x509 curl revocation hmac kdf mgf1 vici kernel-netlink socket-default eap-identity eap-md5 eap-peap updown
}

View File

@ -5,5 +5,5 @@ swanctl {
}
charon-systemd {
load = random nonce aes md5 sha1 sha2 pem pkcs1 curve25519 gmp x509 curl revocation hmac kdf vici kernel-netlink socket-default eap-identity eap-md5 eap-ttls updown
load = random nonce aes md5 sha1 sha2 pem pkcs1 curve25519 gmp x509 curl revocation hmac kdf mgf1 vici kernel-netlink socket-default eap-identity eap-md5 eap-ttls updown
}

View File

@ -5,5 +5,5 @@ swanctl {
}
charon-systemd {
load = random nonce aes md5 sha1 sha2 pem pkcs1 curve25519 gmp x509 curl revocation hmac kdf vici kernel-netlink socket-default eap-identity eap-md5 eap-ttls updown
load = random nonce aes md5 sha1 sha2 pem pkcs1 curve25519 gmp x509 curl revocation hmac kdf mgf1 vici kernel-netlink socket-default eap-identity eap-md5 eap-ttls updown
}