[strongSwan] [Strongswan] AH mode support in Strongswan for Ikev1
SaRaVanAn
saravanan.nagarajan87 at gmail.com
Wed May 30 09:02:11 CEST 2012
Hi Andreas,
Thanks for your prompt reply. I have one more clarification from your
side.
Is there any command or tool in Strongswan to see encryption statistics for
Netkey stack?
I meant, statistics like
No of packets encrypted using ESP
No of packets dropped by tunnel and so on.
Regards,
Saravanan N
On Mon, May 28, 2012 at 8:24 PM, Andreas Steffen <
andreas.steffen at strongswan.org> wrote:
> Hello,
>
> AH withouth ESP is not supported by strongSwan IKEv1 (which goes all
> the way back to FreeS/WAN).
>
> With auth=esp which is the default you opt for ESP encryption and ESP's
> optional authentication mode.
>
> With auth=ah you get ESP encryption withouth ESP's optional
> authentication mode but you get AH on top of ESP instead.
>
> If you don't want to encrypt your packets please use either
> ESP NULL encryption
>
> http://www.strongswan.org/uml/testresults/ikev1/esp-alg-null
>
> or AES-GMAC
>
> http://www.strongswan.org/uml/testresults/ikev1/esp-alg-aes-gmac
>
> Regards
>
> Andreas
>
> On 28.05.2012 15:40, SaRaVanAn wrote:
> > Hi Team,
> > I hope , ah mode in strongswan is supported for Ikev1. But I tried
> > to form a tunnel
> > using AH mode with ikev1, but strongswan was expecting ESP proposal even
> > i configured
> > auth=ah. If ah mode is supported for Ikev1 , please correct me if there
> > any syntax error in
> > the below configuration file which makes thing not working.
> >
> > *ipsec.conf*
> > ____________
> > # basic configuration
> > ca vpnca
> > cacert=ca1Cert.pem
> > #crluri=crl.pem
> > auto=add
> >
> > config setup
> > plutostart=yes
> > plutodebug=all
> > charonstart=yes
> > charondebug=all
> > nat_traversal=yes
> > crlcheckinterval=10m
> > strictcrlpolicy=no
> >
> > conn %default
> > ikelifetime=1h
> > keylife=2h
> > keyingtries=1
> >
> > conn fqdn_vr
> > auth=ah
> > type=transport
> > keyexchange=ikev1
> > left=172.31.114.227
> > right=%any
> > rightid=172.31.114.211
> > pfs=no
> > rekey=no
> > auto=add
> >
> > *logs*
> > _____
> > May 28 18:48:07 uxcasxxx pluto[32284]: | ******parse ISAKMP IPsec DOI
> > attribute:
> > May 28 18:48:07 uxcasxxx pluto[32284]: | af+type: ENCAPSULATION_MODE
> > May 28 18:48:07 uxcasxxx pluto[32284]: | length/value: 1
> > May 28 18:48:07 uxcasxxx pluto[32284]: | [1 is
> ENCAPSULATION_MODE_TUNNEL]
> > May 28 18:48:07 uxcasxxx pluto[32284]: | ******parse ISAKMP IPsec DOI
> > attribute:
> > May 28 18:48:07 uxcasxxx pluto[32284]: | af+type: AUTH_ALGORITHM
> > May 28 18:48:07 uxcasxxx pluto[32284]: | length/value: 2
> > May 28 18:48:07 uxcasxxx pluto[32284]: | [2 is HMAC_SHA1]
> > *May 28 18:48:07 uxcasxxx pluto[32284]: | policy for "fqdn_vr" requires
> > encryption but ESP not in Proposal from 172.31.114.211
> > May 28 18:48:07 uxcasxxx pluto[32284]: "fqdn_vr"[1] 172.31.114.211 #2:
> > no acceptable Proposal in IPsec SA
> > May 28 18:48:07 uxcasxxx pluto[32284]: "fqdn_vr"[1] 172.31.114.211 #2:
> > sending encrypted notification *NO_PROPOSAL_CHOSEN to 172.31.114.211:500
> > <http://172.31.114.211:500>
> > May 28 18:48:07 uxcasxxx pluto[32284]: | **emit ISAKMP Message:
> > May 28 18:48:07 uxcasxxx pluto[32284]: | initiator cookie:
> > May 28 18:48:07 uxcasxxx pluto[32284]: | 39 e8 20 f0 36 bb c5 63
> > May 28 18:48:07 uxcasxxx pluto[32284]: | responder cookie:
> > May 28 18:48:07 uxcasxxx pluto[32284]: | 1b 60 45 9a ac b4 b9 d9
> > May 28 18:48:07 uxcasxxx pluto[32284]: | next payload type:
> > ISAKMP_NEXT_HASH
> > May 28 18:48:07 uxcasxxx pluto[32284]: | ISAKMP version: ISAKMP
> > Version 1.0
> > May 28 18:48:07 uxcasxxx pluto[32284]: | exchange type:
> ISAKMP_XCHG_INFO
> > May 28 18:48:07 uxcasxxx pluto[32284]: | flags: ISAKMP_FLAG_ENCRYPTION
> > May 28 18:48:07 uxcasxxx pluto[32284]: | message ID: 4a 6d 47 56
> > May 28 18:48:07 uxcasxxx pluto[32284]: | ***emit ISAKMP Hash Payload:
> > May 28 18:48:07 uxcasxxx pluto[32284]: | next payload type:
> ISAKMP_NEXT_N
> > May 28 18:48:07 uxcasxxx pluto[32284]: | emitting 20 zero bytes of HASH
> > into ISAKMP Hash Payload
> > May 28 18:48:07 uxcasxxx pluto[32284]: | emitting length of ISAKMP Hash
> > Payload: 24
> > May 28 18:48:07 uxcasxxx pluto[32284]: | ***emit ISAKMP Notification
> > Payload:
> > May 28 18:48:07 uxcasxxx pluto[32284]: | next payload type:
> > ISAKMP_NEXT_NONE
> > May 28 18:48:07 uxcasxxx pluto[32284]: | DOI: ISAKMP_DOI_IPSEC
> > May 28 18:48:07 uxcasxxx pluto[32284]: | protocol ID: 1
> > May 28 18:48:07 uxcasxxx pluto[32284]: | SPI size: 0
> > May 28 18:48:07 uxcasxxx pluto[32284]: | Notify Message Type:
> > NO_PROPOSAL_CHOSEN
> > May 28 18:48:07 uxcasxxx pluto[32284]: | emitting 0 raw bytes of spi
> > into ISAKMP Notification Payload
> > May 28 18:48:07 uxcasxxx pluto[32284]: | spi
> > May 28 18:48:07 uxcasxxx pluto[32284]: | emitting length of ISAKMP
> > Notification Payload: 12
> >
> >
> > Regards,
> > Saravanan N
> ================================================================
> Andreas Steffen andreas.steffen at strongswan.org
> strongSwan - the Linux VPN Solution! www.strongswan.org
> Institute for Internet Technologies and Applications
> University of Applied Sciences Rapperswil
> CH-8640 Rapperswil (Switzerland)
> ===========================================================[ITA-HSR]==
>
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.strongswan.org/pipermail/users/attachments/20120530/5b0d4a4f/attachment.html>
More information about the Users
mailing list