]> git.ipfire.org Git - thirdparty/strongswan.git/blob - testing/tests/openssl-ikev2/alg-ecp-high/description.txt
testing: Migrated openssl alg-ecp-low scenarios to swanctl
[thirdparty/strongswan.git] / testing / tests / openssl-ikev2 / alg-ecp-high / description.txt
1 The roadwarrior <b>carol</b> and the gateway <b>moon</b> use the <b>openssl</b>
2 plugin based on the <b>OpenSSL</b> library for all cryptographical and X.509
3 certificate functions whereas roadwarrior <b>dave</b> uses the default <b>strongSwan</b>
4 cryptographical plugins <b>aes sha1 sha2 hmac gmp x509</b> plus the <b>openssl</b>
5 plugin for the Elliptic Curve Diffie-Hellman groups only.
6 <p>
7 The roadwarriors <b>carol</b> and <b>dave</b> set up a connection each
8 to gateway <b>moon</b>. The authentication is based on <b>X.509 certificates</b>.
9 <b>carol</b> proposes the DH groups ECP_256 and ECP_384 whereas <b>dave</b> proposes
10 ECP_256 and ECP_521. Since <b>moon</b> does not support ECP_256 the roadwarriors
11 fall back to ECP_384 and ECP_521, respectively.
12 <p>
13 Upon the successful establishment of the IPsec tunnels, the updown script automatically
14 inserts iptables-based firewall rules that let pass the tunneled traffic.
15 In order to test both tunnel and firewall, both <b>carol</b> and <b>dave</b> ping
16 the client <b>alice</b> behind the gateway <b>moon</b>.
17