[strongSwan] What modules to build?
Noel Kuntze
noel.kuntze at thermi.consulting
Wed Jul 17 21:21:50 CEST 2019
Hello,
Just use what works already and go from there. You could, for example, use the arguments that Arch Linux uses for the strongSwan package[1].
Kind regards
Noel
[1] https://git.archlinux.org/svntogit/community.git/tree/trunk/PKGBUILD?h=packages/strongswan
Am 17.07.19 um 04:25 schrieb IL Ka:
> It seems that you are right.
>
> ECP384 is Elliptic Curve DH (ECDH) group
> https://wiki.strongswan.org/projects/strongswan/wiki/IKEv2CipherSuites
>
>
> and for ECDH you need one of *ssl plugins (botan, wolfssl, openssl)
> https://wiki.strongswan.org/projects/strongswan/wiki/PluginList
> I think it depends on which library you have installed.
>
> First link says "b w o", which means botan, wolf and open implement this group.
>
>
> >What other options are useful to enable for a general purpose install?
> It depends. I use this (see config options)
> https://slackbuilds.org/repository/14.2/network/strongswan/
> and it works, at least for my install:)
>
>
> On Wed, Jul 17, 2019 at 3:19 AM Ben Greear <greearb at candelatech.com <mailto:greearb at candelatech.com>> wrote:
>
> Hello,
>
> While googling for the error below, it seems that my problem is probably that I am not
> running ./configure --enable-openssl
>
> What other options are useful to enable for a general purpose install?
>
> Jul 16 17:08:56 lf0313-63e7 charon[1530]: 16[ENC] parsed IKE_SA_INIT response 0 [ N(INVAL_KE) ]
> Jul 16 17:08:56 lf0313-63e7 charon[1530]: 16[IKE] peer didn't accept DH group MODP_3072, it requested ECP_384
> Jul 16 17:08:56 lf0313-63e7 charon[1530]: 16[IKE] initiating IKE_SA _vrf4[19] to 192.168.5.1
> Jul 16 17:08:56 lf0313-63e7 charon[1530]: 16[IKE] initiating IKE_SA _vrf4[19] to 192.168.5.1
> Jul 16 17:08:56 lf0313-63e7 charon[1530]: 16[IKE] requested DH group ECP_384 not supported
>
> Thanks,
> Ben
>
> --
> Ben Greear <greearb at candelatech.com <mailto:greearb at candelatech.com>>
> Candela Technologies Inc http://www.candelatech.com
>
--
Noel Kuntze
IT security consultant
GPG Key ID: 0x0739AD6C
Fingerprint: 3524 93BE B5F7 8E63 1372 AF2D F54E E40B 0739 AD6C
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 833 bytes
Desc: OpenPGP digital signature
URL: <http://lists.strongswan.org/pipermail/users/attachments/20190717/d9cd670b/attachment.sig>
More information about the Users
mailing list