]> git.ipfire.org Git - thirdparty/strongswan.git/blame - testing/tests/openssl/ikev1-alg-ecp-high/description.txt
added openssl/ikev1-alg-ecp-low and openssl/ikev1-alg-ecp-high scenarios
[thirdparty/strongswan.git] / testing / tests / openssl / ikev1-alg-ecp-high / description.txt
CommitLineData
5aab3759
AS
1The roadwarrior <b>carol</b> and the gateway <b>moon</b> use the <b>openssl</b>
2plugin based on the <b>OpenSSL</b> library for all cryptographical functions
3whereas roadwarrior <b>dave</b> uses the default <b>strongSwan</b> cryptographical
4plugins <b>aes des sha1 sha2 md5 gmp</b> plus the <b>openssl</b> plugin for
5the Elliptic Curve Diffie-Hellman groups only.
6<p>
7The roadwarriors <b>carol</b> and <b>dave</b> set up a connection each
8to gateway <b>moon</b>. The authentication is based on <b>X.509 certificates</b>.
9<b>carol</b> proposes the DH groups ECP_256 and ECP_384 whereas <b>dave</b> proposes
10ECP_256 and ECP_521. Since <b>moon</b> does not support ECP_256 the roadwarriors
11fall back to ECP_384 and ECP_521, respectively.
12<p>
13Upon the successful establishment of the IPsec tunnels, <b>leftfirewall=yes</b>
14automatically inserts iptables-based firewall rules that let pass the tunneled traffic.
15In order to test both tunnel and firewall, both <b>carol</b> and <b>dave</b> ping
16the client <b>alice</b> behind the gateway <b>moon</b>.
17