]> git.ipfire.org Git - thirdparty/strongswan.git/blame - testing/tests/openssl-ikev1/alg-ecp-high/description.txt
testing: Migrated openssl alg-ecp-low scenarios to swanctl
[thirdparty/strongswan.git] / testing / tests / openssl-ikev1 / alg-ecp-high / description.txt
CommitLineData
5aab3759 1The roadwarrior <b>carol</b> and the gateway <b>moon</b> use the <b>openssl</b>
90e941fb
AS
2plugin based on the <b>OpenSSL</b> library for all cryptographical and X.509
3certificate functions whereas roadwarrior <b>dave</b> uses the default <b>strongSwan</b>
1cab8ed5 4cryptographical plugins <b>aes sha1 sha2 hmac gmp x509</b> plus the <b>openssl</b>
90e941fb 5plugin for the Elliptic Curve Diffie-Hellman groups only.
5aab3759 6<p>
21735750 7The roadwarriors <b>carol</b> and <b>dave</b> set up a connection each
5aab3759
AS
8to gateway <b>moon</b>. The authentication is based on <b>X.509 certificates</b>.
9<b>carol</b> proposes the DH groups ECP_256 and ECP_384 whereas <b>dave</b> proposes
10ECP_256 and ECP_521. Since <b>moon</b> does not support ECP_256 the roadwarriors
11fall back to ECP_384 and ECP_521, respectively.
12<p>
21735750
AS
13Upon the successful establishment of the IPsec tunnels, the updown script automatically
14inserts iptables-based firewall rules that let pass the tunneled traffic.
5aab3759
AS
15In order to test both tunnel and firewall, both <b>carol</b> and <b>dave</b> ping
16the client <b>alice</b> behind the gateway <b>moon</b>.
17