[Announce] ANNOUNCE: strongswan-4.3.2 released

Andreas Steffen andreas.steffen at strongswan.org
Mon Jun 22 10:46:06 CEST 2009


Hello,

we are happy to announce the release of strongSwan 4.3.2, our
LinuxTag 2009 edition offering the following new features:

* Support of the GNU Libgcrypt library
  ------------------------------------

  The new gcrypt plugin provides symmetric cipher, hasher, RNG,
  Diffie-Hellman and RSA crypto primitives using the LGPL licensed
  GNU gcrypt library. Here are some sample scenarios:

  http://www.strongswan.org/uml/testresults43/gcrypt-ikev2/index.html

  Thus a third alternative to the built-in crypto primitives using
  the GNU Multi-Precision library (GMP) and the OpenSSL crypto library
  has been made available. The following link shows a comparison of DH,
  RSA, and ECDSA public key speed performance:

     http://wiki.strongswan.org/wiki/strongswan/PublicKeySpeed

  Clearly the GMP library shows the best performance, closely
  followed by OpenSSL whereas Libgcrypt is considerably slower.

* Self-test of crypto algorithms
  ------------------------------

  libstrongswan features an integrated crypto self-test framework for
  registered algorithms. The test-vector plugin (--enable-test-vectors)
  provides a first set of test vectors and allows pluto and charon to
  rely on tested crypto algorithms. Here is a sample self-test output:

http://www.strongswan.org/uml/testresults43/openssl-ikev2/rw-cert/moon.daemon.log

  In order to activate the self-tests during startup, add the following
  lines to strongswan.conf:

  libstrongswan {
      crypto_test {
          on_add = yes
      }
  }

* IKEv1 pluto daemon supports ECP DH groups and ECDSA signatures
  --------------------------------------------------------------

  Thanks to the use of the openssl plugin, the ECP Diffie-Hellman groups
  19, 20, 21, 25, and 26 as well as ECDSA-256, ECDSA-384, and ECDSA-521
  authentication can be used with IKEv1.

   IKEv1 ECP DH group scenario:

http://www.strongswan.org/uml/testresults43/openssl-ikev1/alg-ecp-high/

  IKEv1 ECDSA signature scenario:

http://www.strongswan.org/uml/testresults43/openssl-ikev1/ecdsa-certs/

Best regards

Andreas Steffen & Martin Willi

======================================================================
Andreas Steffen                         andreas.steffen at strongswan.org
strongSwan - the Linux VPN Solution!                www.strongswan.org
Institute for Internet Technologies and Applications
University of Applied Sciences Rapperswil
CH-8640 Rapperswil (Switzerland)
===========================================================[ITA-HSR]==


More information about the Announce mailing list