[strongSwan] strongswan memory leak v 5.6.3
Amstaff zg
amstaff.zg at gmail.com
Wed Dec 4 15:01:19 CET 2019
Hi all,
I've noticed a memory leak on my VPN servers and everything points to
memory leak in strongswan.
My configuration is:
config setup
charondebug="ike 1, knl 1, cfg 0"
uniqueids=no
strictcrlpolicy=no
conn %default
ikelifetime=30m
keylife=10m
rekeymargin=3m
keyingtries=1
keyexchange=ikev2
ike=aes256-sha256-modp1024,aes128-sha256-ecp256,aes256-sha384-ecp384,aes128-sha256-modp2048,aes128-sha1-modp2048,aes256-sha384-modp4096,aes256-sha256-modp4096,aes256-sha1-modp4096,aes128-sha256-modp1536,aes128-sha1-modp1536,aes256-sha384-modp2048,aes256-sha256-modp2048,aes256-sha1-modp2048,aes128-sha256-modp1024,aes128-sha1-modp1024,aes256-sha384-modp1536,aes256-sha256-modp1536,aes256-sha1-modp1536,aes256-sha384-modp1024,aes256-sha256-modp1024,aes256-sha1-modp1024!
esp=aes256gcm16-modp1024-modp2048,aes128gcm16-ecp256,aes256gcm16-ecp384,aes128-sha256-ecp256,aes256-sha384-ecp384,aes128-sha256-modp2048,aes128-sha1-modp2048,aes256-sha384-modp4096,aes256-sha256-modp4096,aes256-sha1-modp4096,aes128-sha256-modp1536,aes128-sha1-modp1536,aes256-sha384-modp2048,aes256-sha256-modp2048,aes256-sha1-modp2048,aes128-sha256-modp1024,aes128-sha1-modp1024,aes256-sha384-modp1536,aes256-sha256-modp1536,aes256-sha1-modp1536,aes256-sha384-modp1024,aes256-sha256-modp1024,aes256-sha1-modp1024,aes128gcm16,aes256gcm16,aes128-sha256,aes128-sha1,aes256-sha384,aes256-sha256,aes256-sha1!
conn android
left=%any
leftsubnet=0.0.0.0/0
leftcert=server.cert.pem
leftauth=pubkey
rekey=no
rightauth=eap-radius
rightsendcert=never
right=%any
rightsourceip=10.200.0.0/16
eap_identity=%identity
dpdaction=clear
dpddelay=30s
dpdtimeout=200s
auto=add
conn ios
left=%any
leftid=xxxxxxxxxxxxxxxxxx
leftsubnet=0.0.0.0/0
leftcert=server.cert.pem
leftsendcert=always
right=%any
rightauth=eap-radius
rightsourceip=10.200.0.0/16
eap_identity=%identity
auto=add
Anyone had similar issues?
Thanks.
BR,
Kreso
More information about the Users
mailing list