mirror of
https://github.com/strongswan/strongswan.git
synced 2025-10-09 00:00:53 -04:00
added ikev1/alg-sha384 scenario
This commit is contained in:
parent
5d9d779808
commit
cb7e304d33
4
testing/tests/ikev1/alg-sha384/description.txt
Normal file
4
testing/tests/ikev1/alg-sha384/description.txt
Normal file
@ -0,0 +1,4 @@
|
|||||||
|
Roadwarrior <b>carol</b> proposes to gateway <b>moon</b> the cipher suite
|
||||||
|
<b>AES_CBC_192 / HMAC_SHA2_384 / MODP_3072</b> for the IKE protocol and
|
||||||
|
<b>AES_CBC_192 / HMAC_SHA2_384</b> for ESP packets. A ping from <b>carol</b> to
|
||||||
|
<b>alice</b> successfully checks the established tunnel.
|
12
testing/tests/ikev1/alg-sha384/evaltest.dat
Normal file
12
testing/tests/ikev1/alg-sha384/evaltest.dat
Normal file
@ -0,0 +1,12 @@
|
|||||||
|
carol::ipsec status::home.*STATE_QUICK_I2.*IPsec SA established::YES
|
||||||
|
moon::ipsec status::rw.*STATE_QUICK_R2.*IPsec SA established::YES
|
||||||
|
carol::ipsec statusall::IKE proposal: AES_CBC_192/HMAC_SHA2_384/MODP_3072::YES
|
||||||
|
moon::ipsec statusall::IKE proposal: AES_CBC_192/HMAC_SHA2_384/MODP_3072::YES
|
||||||
|
carol::ping -c 1 -s 120 -p deadbeef PH_IP_ALICE::128 bytes from PH_IP_ALICE: icmp_seq=1::YES
|
||||||
|
carol::ipsec statusall::ESP proposal: AES_CBC_192/HMAC_SHA2_384::YES
|
||||||
|
moon::ipsec statusall::ESP proposal: AES_CBC_192/HMAC_SHA2_384::YES
|
||||||
|
carol::ip xfrm state::auth hmac(sha384)::YES
|
||||||
|
moon::ip xfrm state::auth hmac(sha384)::YES
|
||||||
|
moon::tcpdump::IP carol.strongswan.org > moon.strongswan.org: ESP.*length 208::YES
|
||||||
|
moon::tcpdump::IP moon.strongswan.org > carol.strongswan.org: ESP.*length 208::YES
|
||||||
|
|
24
testing/tests/ikev1/alg-sha384/hosts/carol/etc/ipsec.conf
Executable file
24
testing/tests/ikev1/alg-sha384/hosts/carol/etc/ipsec.conf
Executable file
@ -0,0 +1,24 @@
|
|||||||
|
# /etc/ipsec.conf - strongSwan IPsec configuration file
|
||||||
|
|
||||||
|
config setup
|
||||||
|
plutodebug="control crypt"
|
||||||
|
crlcheckinterval=180
|
||||||
|
strictcrlpolicy=no
|
||||||
|
charonstart=no
|
||||||
|
|
||||||
|
conn %default
|
||||||
|
ikelifetime=60m
|
||||||
|
keylife=20m
|
||||||
|
rekeymargin=3m
|
||||||
|
keyingtries=1
|
||||||
|
ike=aes192-sha384-modp3072!
|
||||||
|
esp=aes192-sha384!
|
||||||
|
|
||||||
|
conn home
|
||||||
|
left=PH_IP_CAROL
|
||||||
|
leftcert=carolCert.pem
|
||||||
|
leftid=carol@strongswan.org
|
||||||
|
right=PH_IP_MOON
|
||||||
|
rightsubnet=10.1.0.0/16
|
||||||
|
rightid=@moon.strongswan.org
|
||||||
|
auto=add
|
24
testing/tests/ikev1/alg-sha384/hosts/moon/etc/ipsec.conf
Executable file
24
testing/tests/ikev1/alg-sha384/hosts/moon/etc/ipsec.conf
Executable file
@ -0,0 +1,24 @@
|
|||||||
|
# /etc/ipsec.conf - strongSwan IPsec configuration file
|
||||||
|
|
||||||
|
config setup
|
||||||
|
plutodebug="control crypt"
|
||||||
|
crlcheckinterval=180
|
||||||
|
strictcrlpolicy=no
|
||||||
|
charonstart=no
|
||||||
|
|
||||||
|
conn %default
|
||||||
|
ikelifetime=60m
|
||||||
|
keylife=20m
|
||||||
|
rekeymargin=3m
|
||||||
|
keyingtries=1
|
||||||
|
ike=aes192-sha384-modp3072!
|
||||||
|
esp=aes192-sha384!
|
||||||
|
|
||||||
|
conn rw
|
||||||
|
left=PH_IP_MOON
|
||||||
|
leftcert=moonCert.pem
|
||||||
|
leftid=@moon.strongswan.org
|
||||||
|
leftsubnet=10.1.0.0/16
|
||||||
|
right=%any
|
||||||
|
rightid=carol@strongswan.org
|
||||||
|
auto=add
|
2
testing/tests/ikev1/alg-sha384/posttest.dat
Normal file
2
testing/tests/ikev1/alg-sha384/posttest.dat
Normal file
@ -0,0 +1,2 @@
|
|||||||
|
moon::ipsec stop
|
||||||
|
carol::ipsec stop
|
5
testing/tests/ikev1/alg-sha384/pretest.dat
Normal file
5
testing/tests/ikev1/alg-sha384/pretest.dat
Normal file
@ -0,0 +1,5 @@
|
|||||||
|
moon::echo 1 > /proc/sys/net/ipv4/ip_forward
|
||||||
|
carol::ipsec start
|
||||||
|
moon::ipsec start
|
||||||
|
carol::sleep 2
|
||||||
|
carol::ipsec up home
|
22
testing/tests/ikev1/alg-sha384/test.conf
Normal file
22
testing/tests/ikev1/alg-sha384/test.conf
Normal file
@ -0,0 +1,22 @@
|
|||||||
|
#!/bin/bash
|
||||||
|
#
|
||||||
|
# This configuration file provides information on the
|
||||||
|
# UML instances used for this test
|
||||||
|
|
||||||
|
# All UML instances that are required for this test
|
||||||
|
#
|
||||||
|
UMLHOSTS="moon carol winnetou"
|
||||||
|
|
||||||
|
# Corresponding block diagram
|
||||||
|
#
|
||||||
|
DIAGRAM="m-c-w.png"
|
||||||
|
|
||||||
|
# UML instances on which tcpdump is to be started
|
||||||
|
#
|
||||||
|
TCPDUMPHOSTS="moon"
|
||||||
|
|
||||||
|
# UML instances on which IPsec is started
|
||||||
|
# Used for IPsec logging purposes
|
||||||
|
#
|
||||||
|
IPSECHOSTS="moon carol"
|
||||||
|
|
Loading…
x
Reference in New Issue
Block a user