]> git.ipfire.org Git - people/ms/strongswan.git/commitdiff
adapted gcrypt-ikev1 alg scenarios
authorAndreas Steffen <andreas.steffen@strongswan.org>
Wed, 9 Dec 2009 14:45:45 +0000 (15:45 +0100)
committerAndreas Steffen <andreas.steffen@strongswan.org>
Wed, 9 Dec 2009 14:45:45 +0000 (15:45 +0100)
testing/tests/gcrypt-ikev1/alg-serpent/description.txt
testing/tests/gcrypt-ikev1/alg-serpent/evaltest.dat
testing/tests/gcrypt-ikev1/alg-serpent/hosts/carol/etc/ipsec.conf
testing/tests/gcrypt-ikev1/alg-serpent/hosts/moon/etc/ipsec.conf
testing/tests/gcrypt-ikev1/alg-serpent/test.conf
testing/tests/gcrypt-ikev1/alg-twofish/description.txt
testing/tests/gcrypt-ikev1/alg-twofish/evaltest.dat
testing/tests/gcrypt-ikev1/alg-twofish/hosts/carol/etc/ipsec.conf
testing/tests/gcrypt-ikev1/alg-twofish/hosts/moon/etc/ipsec.conf
testing/tests/gcrypt-ikev1/alg-twofish/test.conf

index 604fb45df9ff5dd1a94cdc98ff8afaef5307ad51..982efa5eac5c68e8ed511b8feb35725ef18ee698 100644 (file)
@@ -1,4 +1,4 @@
 Roadwarrior <b>carol</b> proposes  to gateway <b>moon</b> the strong cipher suite
 <b>SERPENT_CBC_256 / HMAC_SHA2_512 / MODP_4096</b> for the IKE protocol and 
-<b>SERPENT_CBC_256 / HMAC_SHA2_256 </b> for ESP packets. A ping from <b>carol</b> to
+<b>SERPENT_CBC_256 / HMAC_SHA2_512_256 </b> for ESP packets. A ping from <b>carol</b> to
 <b>alice</b> successfully checks the established tunnel.
index 2be8f675f982738b943752b42d55ddf27cbb1db8..d9964314bfa3f04b48dd2ebc61521f7f1161622d 100644 (file)
@@ -2,9 +2,10 @@ carol::ipsec status::home.*STATE_QUICK_I2.*IPsec SA established::YES
 moon::ipsec status::rw.*STATE_QUICK_R2.*IPsec SA established::YES
 carol::ipsec statusall::IKE proposal: SERPENT_CBC_256/HMAC_SHA2_512/MODP_4096::YES
 moon::ipsec statusall::IKE proposal: SERPENT_CBC_256/HMAC_SHA2_512/MODP_4096::YES
-carol::ipsec statusall::ESP proposal: SERPENT_CBC_256/HMAC_SHA2_256::YES
-moon::ipsec statusall::ESP proposal: SERPENT_CBC_256/HMAC_SHA2_256::YES
+carol::ping -c 1 -s 120 -p deadbeef PH_IP_ALICE::128 bytes from PH_IP_ALICE: icmp_seq=1::YES
+carol::ipsec statusall::ESP proposal: SERPENT_CBC_256/HMAC_SHA2_512::YES
+moon::ipsec statusall::ESP proposal: SERPENT_CBC_256/HMAC_SHA2_512::YES
 carol::ip xfrm state::enc cbc(serpent)::YES
 moon::ip xfrm state::enc cbc(serpent)::YES
-carol::ping -c 1 PH_IP_ALICE::64 bytes from PH_IP_ALICE: icmp_seq=1::YES
-
+moon::tcpdump::IP carol.strongswan.org > moon.strongswan.org: ESP.*length 216::YES
+moon::tcpdump::IP moon.strongswan.org > carol.strongswan.org: ESP.*length 216::YES
index b050f022acb352ad542103fc268de30af19f0e2b..0848c3696d20e95c2d785e888e59b76154e3378e 100755 (executable)
@@ -12,7 +12,7 @@ conn %default
        rekeymargin=3m
        keyingtries=1
        ike=serpent256-sha2_512-modp4096!
-       esp=serpent256-sha2_256!
+       esp=serpent256-sha2_512!
 
 conn home
        left=PH_IP_CAROL
index 75830f0436977322159b9d6aa0b380d31cf5f0f2..05edfc7d072249b5b703067be2305e21db10b763 100755 (executable)
@@ -12,7 +12,7 @@ conn %default
        rekeymargin=3m
        keyingtries=1
        ike=serpent256-sha2_512-modp4096!
-       esp=serpent256-sha2_256!
+       esp=serpent256-sha2_512!
 
 conn rw
        left=PH_IP_MOON
index a6c8f026c58298522111171417e5deab20dff3d1..fd33cfb573abd02036ade275b2afa1d4e3bb6ed1 100644 (file)
@@ -13,7 +13,7 @@ DIAGRAM="m-c-w.png"
 
 # UML instances on which tcpdump is to be started
 #
-TCPDUMPHOSTS=""
+TCPDUMPHOSTS="moon"
 
 # UML instances on which IPsec is started
 # Used for IPsec logging purposes
index b65ea7b8d793267172c68c966e7334a2b68d4dfd..f3fc61fe6382b8ccc1846e6dd90c72b77c07f3ee 100644 (file)
@@ -1,4 +1,4 @@
 Roadwarrior <b>carol</b> proposes  to gateway <b>moon</b> the strong cipher suite
 <b>TWOFISH_CBC_256 / HMAC_SHA2_512 / MODP_4096</b> for the IKE protocol and 
-<b>TWOFISH_CBC_256 / HMAC_SHA2_256</b> for ESP packets. A ping from <b>carol</b> to
+<b>TWOFISH_CBC_256 / HMAC_SHA2_512_256</b> for ESP packets. A ping from <b>carol</b> to
 <b>alice</b> successfully checks the established tunnel.
index 34c9d1c65e36371a733da3f76684e31e9ceb96ba..c69355b81ace6b73171eda8307ed63571d3b0794 100644 (file)
@@ -2,9 +2,10 @@ carol::ipsec status::home.*STATE_QUICK_I2.*IPsec SA established::YES
 moon::ipsec status::rw.*STATE_QUICK_R2.*IPsec SA established::YES
 carol::ipsec statusall::IKE proposal: TWOFISH_CBC_256/HMAC_SHA2_512/MODP_4096::YES
 moon::ipsec statusall::IKE proposal: TWOFISH_CBC_256/HMAC_SHA2_512/MODP_4096::YES
-carol::ipsec statusall::ESP proposal: TWOFISH_CBC_256/HMAC_SHA2_256::YES
-moon::ipsec statusall::ESP proposal: TWOFISH_CBC_256/HMAC_SHA2_256::YES
+carol::ping -c 1 -s 120 -p deadbeef PH_IP_ALICE::128 bytes from PH_IP_ALICE: icmp_seq=1::YES
+carol::ipsec statusall::ESP proposal: TWOFISH_CBC_256/HMAC_SHA2_512::YES
+moon::ipsec statusall::ESP proposal: TWOFISH_CBC_256/HMAC_SHA2_512::YES
 carol::ip xfrm state::enc cbc(twofish)::YES
 moon::ip xfrm state::enc cbc(twofish)::YES
-carol::ping -c 1 PH_IP_ALICE::64 bytes from PH_IP_ALICE: icmp_seq=1::YES
-
+moon::tcpdump::IP carol.strongswan.org > moon.strongswan.org: ESP.*length 216::YES
+moon::tcpdump::IP moon.strongswan.org > carol.strongswan.org: ESP.*length 216::YES
index 71ed475199b2fce209bdf65d1869ca08f3912728..838291f80bcd34713fe3403ee1706f68d994f3bf 100755 (executable)
@@ -12,7 +12,7 @@ conn %default
        rekeymargin=3m
        keyingtries=1
        ike=twofish256-sha2_512-modp4096!
-       esp=twofish256-sha2_256!
+       esp=twofish256-sha2_512!
 
 conn home
        left=PH_IP_CAROL
index ba739f8873aa94b74224079896ba87b44b8af719..c2ef128530832874c7fadd8120694100da796838 100755 (executable)
@@ -12,7 +12,7 @@ conn %default
        rekeymargin=3m
        keyingtries=1
        ike=twofish256-sha2_512-modp4096!
-       esp=twofish256-sha2_256!
+       esp=twofish256-sha2_512!
 
 conn rw
        left=PH_IP_MOON
index a6c8f026c58298522111171417e5deab20dff3d1..fd33cfb573abd02036ade275b2afa1d4e3bb6ed1 100644 (file)
@@ -13,7 +13,7 @@ DIAGRAM="m-c-w.png"
 
 # UML instances on which tcpdump is to be started
 #
-TCPDUMPHOSTS=""
+TCPDUMPHOSTS="moon"
 
 # UML instances on which IPsec is started
 # Used for IPsec logging purposes