]> git.ipfire.org Git - thirdparty/strongswan.git/blame - testing/tests/openssl-ikev2/alg-ecp-low/description.txt
testing: Migrated openssl alg-ecp-low scenarios to swanctl
[thirdparty/strongswan.git] / testing / tests / openssl-ikev2 / alg-ecp-low / description.txt
CommitLineData
5aab3759 1The roadwarrior <b>carol</b> and the gateway <b>moon</b> use the <b>openssl</b>
1cab8ed5 2plugin based on the <b>OpenSSL</b> library for all cryptographical and X.509
bd371cca 3certificate functions whereas roadwarrior <b>dave</b> uses the default <b>strongSwan</b>
1cab8ed5 4cryptographical plugins <b>aes des sha1 sha2 hmac gmp x509</b> plus the <b>openssl</b>
bd371cca 5plugin for the Elliptic Curve Diffie-Hellman groups only.
5aab3759 6<p>
1cab8ed5 7The roadwarriors <b>carol</b> and <b>dave</b> set up a connection each
5aab3759
AS
8to gateway <b>moon</b>. The authentication is based on <b>X.509 certificates</b>.
9<b>carol</b> proposes the DH groups ECP_192 and ECP_224 whereas <b>dave</b> proposes
10ECP_192 and ECP_256. Since <b>moon</b> does not support ECP_192 the roadwarriors
11fall back to ECP_224 and ECP_256, respectively.
12<p>
1cab8ed5
AS
13Upon the successful establishment of the IPsec tunnels, the updown script automatically
14inserts iptables-based firewall rules that let pass the tunneled traffic.
5aab3759
AS
15In order to test both tunnel and firewall, both <b>carol</b> and <b>dave</b> ping
16the client <b>alice</b> behind the gateway <b>moon</b>.
17