<div dir="ltr">HI Noel,<div>Thank you for your reply .</div><div>Even after using the configuration </div><div><span style="font-family:arial,sans-serif;font-size:13.333333969116211px">"--disable-rc2 --disable-md5 --disable-sha1 --disable-sha2 --disable-fips-prf --disable-aes --disable-des --enable-openssl --disable-pkcs1 --disable-pkcs7 --disable-pkcs8 \</span><br style="font-family:arial,sans-serif;font-size:13.333333969116211px">
<span style="font-family:arial,sans-serif;font-size:13.333333969116211px">- --disable-pkcs12 --disable-pgp --disable-dnskey --disable-sshkey --disable-hmac --disable-cmac --disable-xcbc --disable-gmp --disable-scripts --disable-ikev1 --disable-tools"</span><br>
</div><div><span style="font-family:arial,sans-serif;font-size:13.333333969116211px"><br></span></div><div><font face="arial, sans-serif">I see that the strongwas was taking more memory , i was trying to port this on a embedded device for supporting VPN client,</font></div>
<div><span style="font-family:arial,sans-serif">I need to evaluate the VPN tools for the same , hence i was very confident about using strongswan .</span></div><div><span style="font-family:arial,sans-serif">Can i still further reduce the size , because i have very less memory footprint about 30MB .</span></div>
<div><br></div><div><span style="font-family:arial,sans-serif">Regards</span></div><div><span style="font-family:arial,sans-serif">Naveen</span></div></div><div class="gmail_extra"><br><br><div class="gmail_quote">On Fri, Aug 30, 2013 at 11:47 AM, Noel Kuntze <span dir="ltr"><<a href="mailto:noel@familie-kuntze.de" target="_blank">noel@familie-kuntze.de</a>></span> wrote:<br>
<blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><br>
-----BEGIN PGP SIGNED MESSAGE-----<br>
Hash: SHA256<br>
<br>
Hello Naveen,<br>
<br>
First of all, you don't need to include all the --enable options.<br>
If you don't use them, the corresponding features won't be compiled anyway, so you can<br>
simply use this: "--disable-rc2 --disable-md5 --disable-sha1 --disable-sha2 --disable-fips-prf --disable-aes --disable-des --enable-openssl --disable-pkcs1 --disable-pkcs7 --disable-pkcs8 \<br>
- --disable-pkcs12 --disable-pgp --disable-dnskey --disable-sshkey --disable-hmac --disable-cmac --disable-xcbc --disable-gmp --disable-scripts --disable-ikev1 --disable-tools"<br>
<br>
I think you should keep the "pem" and "x509" plugins, as those are needed to authenticate peers using certificates for authentication. You should also keep the nonce generator, as strongSwan<br>
won't work without it. As of now, the "nonce" plugin is the only one providing a nonce generator.<br>
Another thing: Also keep the "random" plugin. strongSwan needs it, too.<br>
<br>
To your ipsec starter problem: It could be, that disabling "stroke" also removed starter or your --sbindir, --bindir --libexecdir are not properly defined. If you want to install a self compiled version<br>
of strongswan without packaging it, you should remove the package version of strongSwan first and then install your own version of it, otherwise strange things might happen.<br>
personally, I use the following line to configure strongSwan:<br>
./configure --prefix=/usr \<br>
--sbindir=/usr/bin \<br>
--sysconfdir=/etc \<br>
--libexecdir=/usr/lib \<br>
--with-ipsecdir=/usr/lib/strongswan \<br>
<lots of modules><br>
This line will produce a working set of binaries.<br>
Remember to uninstall the strongSwan version that was installed over the package manager first!<br>
<br>
Regards,<br>
Noel Kuntze<br>
<div><div class="h5"><br>
On 30.08.2013 20:19, Naveen Neelakanta wrote:<br>
> Hi<br>
> I am new to strongswan, I have been able to successfully establish tunnel<br>
> between to linux PC . How ever i want to reduce the size of the strongswan image<br>
> and hence i have used the below compilation options .<br>
><br>
> " --disable-curl --disable-soup --disable-ldap \<br>
> --enable-gmp --disable-mysql --disable-sqlite \<br>
> --enable-openssl --enable-curl=no --enable-unbound=no --enable- soup=no --enable-ldap=no --enable-blowfish=no --disable-rc2 --disable-fips-prf --disable-gmp \<br>
> --enable-rdrand=no --disable-nonce --disable-x509 --disable-revocation --disable-constraints --disable-pubkey --disable-pkcs1 \<br>
> --disable-pkcs7 --disable-pkcs8 --disable-pkcs12 --disable-pgp --disable-sshkey --disable-dnskey --disable-pem --enable-test-vectors=no \<br>
> --enable-mysql=no --enable-sqlite=no --disable-stroke --enable-medsrv=no --enable-medcli=no --enable-sql=no --enable-leak-detective=no \<br>
> --enable-shared --enable-static=no<br>
> "<br>
> I got it compiled but when i run the below command<br>
> #ipsec start<br>
> /usr/sbin/ipsec: exec: line 326: /usr/libexec/ipsec/starter: not found<br>
><br>
> Can you please let me know is the above configuartion that i have used is<br>
> good for my below requirement.<br>
> I want to just make use of openssl has crypto library and IKEV2 client only and<br>
> i am using linux kernel for ipsec functionality with xfrm and netlink modules<br>
> built in kernel.<br>
><br>
> Appreciate your response.<br>
><br>
> Thanks<br>
> Naveen<br>
><br>
><br>
</div></div>> _______________________________________________<br>
> Users mailing list<br>
> <a href="mailto:Users@lists.strongswan.org">Users@lists.strongswan.org</a><br>
> <a href="https://lists.strongswan.org/mailman/listinfo/users" target="_blank">https://lists.strongswan.org/mailman/listinfo/users</a><br>
<br>
-----BEGIN PGP SIGNATURE-----<br>
Version: GnuPG v2.0.21 (GNU/Linux)<br>
Comment: Using GnuPG with Thunderbird - <a href="http://www.enigmail.net/" target="_blank">http://www.enigmail.net/</a><br>
<br>
iQIcBAEBCAAGBQJSIOjEAAoJEDg5KY9j7GZYNNYP/0gPJhoh6ywoOGWD6MskmcDJ<br>
aGAo83WRpqVHYkUMO7IiQFn/EL9c7eMvM95VvyN1ACy7UgtdZl8UQV0NRrs48DYK<br>
JXdC3gFENPSp/ykjZvAs1Qq8uMGh3Y07c3JhAWc0lR9icaMjIXO9ZoWrah9gfbEd<br>
ymC6ZphbEFqW6fX7PSl1wQQEV4AkP9CWQA3SsQSDdOOOqw3rkMgB4pd/OCOk423W<br>
iF0QvW5jQy4eMj426NYEB4GjbRCLXmzxmaniX6T/cjw6nIn6eh9t2qN9mK3e7xrL<br>
nriCSZ5s4P6X/1YHP2SkpzvNhXaoxVCkZFblqgBvImzB6EbluK6+DeFFhzbmzIiR<br>
lHtjSc6YRCM7sPjkfTv0UipfmmvyXpYeSuhVeguZZRs9IOjiSviiBy72ZFZ0ljWO<br>
GAN6EKVzUPiNvPstzDAwKAb7XEd6RLiyYOcM7QYJ16YTmC3IJG05b81CCX4ebf1n<br>
3BSVtmsFhtnZl8kP29wwQFcE5NKaK/t4fHT0W2jCfHIEXVqkksIYoCBuSNwmaEuO<br>
EF1aLkKVYLhsvoZvEWpxetJ65UKxgAUQ5+M+vf4C2n848LJOp6cjOSl1CxbTdxvj<br>
ZiTZHaOFFAJjzlld/cOKk0ZP9i9Fy/aq4VA21+Ch3si2Ecsw1MnOHjHztStolK2m<br>
kbR7ryNO9NwtGxcF6EDy<br>
=oqVg<br>
-----END PGP SIGNATURE-----<br>
<br>
</blockquote></div><br></div>