Hello All,<div><br></div><blockquote class="webkit-indent-blockquote" style="margin: 0 0 0 40px; border: none; padding: 0px;"><div>We've been using strongSwan as our IPsec solution for a while now (thanks to Martin, Andreas and everyone else who has helped us get this far!).</div>
<div><br></div><div>However, we've come up against a problem trying to implement the certificate hierarchy designed by our device-security guys.</div><div><br></div><div>They've come up with a four-certificate chain solution, i.e. self-certified root CA -> class CA -> group CA -> device certificate.</div>
<div><br></div><div>Unfortunately, when I set up one of our devices to use this chain (i.e. root CA on the SeGW, class and group CAs and device certificate on the device), the tunnel is set up fine, but during the initial IKE_AUTH packet sent from the device to the SeGW, the amount of certificate data sent is so large that IP fragmentation kicks in and three IP fragments are sent.</div>
<div><br></div><div>We've been warned by our SeGW partners that most SeGWs will not accept IP fragments due to the security risk and that we need to trim back the data sent to make everything fit inside one IP packet. This matches up with one of the answers given in the strongSwan FAQ.</div>
<div><br></div><div>Our PKI guys are incredulous about this situation. They wonder "how have the IPsec standards managed to get into this situation ?".</div><div><br></div><div>Can anyone suggest any solutions ?</div>
<div><br></div><div>I see that hash-and-url is one proposed solution, and although it is implemented by strongSwan, does anyone have a feel for how widespread that is among other IPsec SeGW implementations ?</div><div><br>
</div><div>The PKI guys have grudgingly agreed to cut out one level of CA from the chain, but this would still involve sending one CA plus the device certificate across in the IKE_AUTH packet, and that would still involve IP fragmentation.</div>
<div><br></div><div>Another solution would be to preload the intermediate CAs onto the SeGW (as well as our root CA). This works in our lab, when we also use strongSwan as a test SeGW, but I've been informed that most of our customers would NOT be interested in this solution. They want to load ONE root CA onto their SeGW and nothing else.</div>
<div><br></div><div>Are there any options left ?</div><div><br></div><div>Thanks,</div><div><br></div></blockquote><blockquote class="webkit-indent-blockquote" style="margin: 0 0 0 40px; border: none; padding: 0px;"><blockquote class="webkit-indent-blockquote" style="margin: 0 0 0 40px; border: none; padding: 0px;">
<div>Graham.</div><div><br></div></blockquote></blockquote>