]> git.ipfire.org Git - thirdparty/strongswan.git/commitdiff
adapted ikev1 alg and esp scenarios
authorAndreas Steffen <andreas.steffen@strongswan.org>
Wed, 9 Dec 2009 14:41:54 +0000 (15:41 +0100)
committerAndreas Steffen <andreas.steffen@strongswan.org>
Wed, 9 Dec 2009 14:41:54 +0000 (15:41 +0100)
28 files changed:
testing/tests/ikev1/alg-blowfish/description.txt
testing/tests/ikev1/alg-blowfish/evaltest.dat
testing/tests/ikev1/alg-blowfish/hosts/carol/etc/ipsec.conf
testing/tests/ikev1/alg-blowfish/hosts/moon/etc/ipsec.conf
testing/tests/ikev1/alg-blowfish/pretest.dat
testing/tests/ikev1/alg-blowfish/test.conf
testing/tests/ikev1/alg-sha256/description.txt
testing/tests/ikev1/alg-sha256/evaltest.dat
testing/tests/ikev1/alg-sha256/hosts/carol/etc/ipsec.conf
testing/tests/ikev1/alg-sha256/hosts/moon/etc/ipsec.conf
testing/tests/ikev1/alg-sha256/test.conf
testing/tests/ikev1/esp-alg-aes-ccm/evaltest.dat
testing/tests/ikev1/esp-alg-aes-ccm/test.conf
testing/tests/ikev1/esp-alg-aes-ctr/evaltest.dat
testing/tests/ikev1/esp-alg-aes-ctr/test.conf
testing/tests/ikev1/esp-alg-aes-gcm/evaltest.dat
testing/tests/ikev1/esp-alg-aes-gcm/test.conf
testing/tests/ikev1/esp-alg-aesxcbc/evaltest.dat
testing/tests/ikev1/esp-alg-aesxcbc/test.conf
testing/tests/ikev1/esp-alg-camellia/description.txt
testing/tests/ikev1/esp-alg-camellia/evaltest.dat
testing/tests/ikev1/esp-alg-camellia/hosts/carol/etc/ipsec.conf
testing/tests/ikev1/esp-alg-camellia/hosts/moon/etc/ipsec.conf
testing/tests/ikev1/esp-alg-camellia/pretest.dat
testing/tests/ikev1/esp-alg-camellia/test.conf
testing/tests/ikev1/esp-alg-des/evaltest.dat
testing/tests/ikev1/esp-alg-null/evaltest.dat
testing/tests/ikev1/esp-alg-null/test.conf

index 7d8f245ab94a97dca044e99be4e50d840c5e86d9..7b14287f7552dc767ce16e2313b90a269ff7163a 100644 (file)
@@ -1,4 +1,4 @@
 Roadwarrior <b>carol</b> proposes  to gateway <b>moon</b> the strong cipher suite
 <b>BLOWFISH_CBC_256 / HMAC_SHA2_512 / MODP_4096</b> for the IKE protocol and 
-<b>BLOWFISH_CBC_256 / HMAC_SHA2_256</b> for ESP packets. A ping from <b>carol</b> to
+<b>BLOWFISH_CBC_256 / HMAC_SHA2_512</b> for ESP packets. A ping from <b>carol</b> to
 <b>alice</b> successfully checks the established tunnel.
index fd46cdb9dee117c94070cd18a25c22d223224d93..4ea613d3d76444edbff71022c4573920c58b0fa6 100644 (file)
@@ -2,9 +2,10 @@ carol::ipsec status::home.*STATE_QUICK_I2.*IPsec SA established::YES
 moon::ipsec status::rw.*STATE_QUICK_R2.*IPsec SA established::YES
 carol::ipsec statusall::IKE proposal: BLOWFISH_CBC_256/HMAC_SHA2_512/MODP_4096::YES
 moon::ipsec statusall::IKE proposal: BLOWFISH_CBC_256/HMAC_SHA2_512/MODP_4096::YES
-carol::ipsec statusall::ESP proposal: BLOWFISH_CBC_256/HMAC_SHA2_256::YES
-moon::ipsec statusall::ESP proposal: BLOWFISH_CBC_256/HMAC_SHA2_256::YES
+carol::ping -c 1 -s 120 -p deadbeef PH_IP_ALICE::128 bytes from PH_IP_ALICE: icmp_seq=1::YES
+carol::ipsec statusall::ESP proposal: BLOWFISH_CBC_256/HMAC_SHA2_512::YES
+moon::ipsec statusall::ESP proposal: BLOWFISH_CBC_256/HMAC_SHA2_512::YES
 carol::ip xfrm state::enc cbc(blowfish)::YES
 moon::ip xfrm state::enc cbc(blowfish)::YES
-carol::ping -c 1 PH_IP_ALICE::64 bytes from PH_IP_ALICE: icmp_seq=1::YES
-
+moon::tcpdump::IP carol.strongswan.org > moon.strongswan.org: ESP.*length 200::YES
+moon::tcpdump::IP moon.strongswan.org > carol.strongswan.org: ESP.*length 200::YES
index 175349c411a6924637ad3481f7c1c7a35a068dad..3517077f9badcbe1e2da446e06ecfe63327d29ad 100755 (executable)
@@ -12,7 +12,7 @@ conn %default
        rekeymargin=3m
        keyingtries=1
        ike=blowfish256-sha2_512-modp4096!
-       esp=blowfish256-sha2_256!
+       esp=blowfish256-sha2_512!
 
 conn home
        left=PH_IP_CAROL
index 89dbee0af8211561659b72d03e573abaf4d7786c..1b4cca222139145e48b7f11a8ec1a5ebfba075ec 100755 (executable)
@@ -12,7 +12,7 @@ conn %default
        rekeymargin=3m
        keyingtries=1
        ike=blowfish256-sha2_512-modp4096!
-       esp=blowfish256-sha2_256!
+       esp=blowfish256-sha2_512!
 
 conn rw
        left=PH_IP_MOON
index 6d2eeb5f9f74e5fed3afd7af52c46ba8828aec9c..5e1e80e1df2acb653668df2fc0d69ecc426ce501 100644 (file)
@@ -3,3 +3,4 @@ carol::ipsec start
 moon::ipsec start
 carol::sleep 2 
 carol::ipsec up home
+carol::sleep 1
index a6c8f026c58298522111171417e5deab20dff3d1..fd33cfb573abd02036ade275b2afa1d4e3bb6ed1 100644 (file)
@@ -13,7 +13,7 @@ DIAGRAM="m-c-w.png"
 
 # UML instances on which tcpdump is to be started
 #
-TCPDUMPHOSTS=""
+TCPDUMPHOSTS="moon"
 
 # UML instances on which IPsec is started
 # Used for IPsec logging purposes
index e0af2e2f7d89d5938b65214e0b5f785dc1bbf009..62810192147cfab3e2f2f32d486b004d83624f6e 100644 (file)
@@ -1,4 +1,4 @@
-Roadwarrior <b>carol</b> proposes  to gateway <b>moon</b> the rather strong cipher suite
-<b>AES_CBC_128 / HMAC_SHA2_256 / MODP_1536</b> for the IKE protocol and 
+Roadwarrior <b>carol</b> proposes  to gateway <b>moon</b> the cipher suite
+<b>AES_CBC_128 / HMAC_SHA2_256 / MODP_2048</b> for the IKE protocol and 
 <b>AES_CBC_128 / HMAC_SHA2_256</b> for ESP packets. A ping from <b>carol</b> to
 <b>alice</b> successfully checks the established tunnel.
index b8a83e0fb25a4072cd033658f160149366e0cede..00fcb8862499bbdccbf0f3952929e923ff2c3c98 100644 (file)
@@ -1,11 +1,12 @@
-
 carol::ipsec status::home.*STATE_QUICK_I2.*IPsec SA established::YES
 moon::ipsec status::rw.*STATE_QUICK_R2.*IPsec SA established::YES
-carol::ipsec statusall::IKE proposal: AES_CBC_128/HMAC_SHA2_256/MODP_1536::YES
-moon::ipsec statusall::IKE proposal: AES_CBC_128/HMAC_SHA2_256/MODP_1536::YES
+carol::ipsec statusall::IKE proposal: AES_CBC_128/HMAC_SHA2_256/MODP_2048::YES
+moon::ipsec statusall::IKE proposal: AES_CBC_128/HMAC_SHA2_256/MODP_2048::YES
+carol::ping -c 1 -s 120 -p deadbeef PH_IP_ALICE::128 bytes from PH_IP_ALICE: icmp_seq=1::YES
 carol::ipsec statusall::ESP proposal: AES_CBC_128/HMAC_SHA2_256::YES
 moon::ipsec statusall::ESP proposal: AES_CBC_128/HMAC_SHA2_256::YES
 carol::ip xfrm state::auth hmac(sha256)::YES
 moon::ip xfrm state::auth hmac(sha256)::YES
-carol::ping -c 1 PH_IP_ALICE::64 bytes from PH_IP_ALICE: icmp_seq=1::YES
+moon::tcpdump::IP carol.strongswan.org > moon.strongswan.org: ESP.*length 200::YES
+moon::tcpdump::IP moon.strongswan.org > carol.strongswan.org: ESP.*length 200::YES
 
index 0c5980ed3ef8de54d8034170b716e1c948c6c5ab..0e1db6fbe0ded7904c2b22a4bcb973fe67147ba0 100755 (executable)
@@ -11,8 +11,8 @@ conn %default
        keylife=20m
        rekeymargin=3m
        keyingtries=1
-       ike=aes128-sha2_256-modp1536!
-       esp=aes128-sha2_256!
+       ike=aes128-sha256-modp2048!
+       esp=aes128-sha256!
 
 conn home
        left=PH_IP_CAROL
index 1770e531332e476241d19eeef728f4aaf6e5946f..584ffda19e03984e8ddd3dc866db30655cd049f7 100755 (executable)
@@ -11,8 +11,8 @@ conn %default
        keylife=20m
        rekeymargin=3m
        keyingtries=1
-       ike=aes128-sha2_256-modp1536!
-       esp=aes128-sha2_256!
+       ike=aes128-sha256-modp2048!
+       esp=aes128-sha256!
 
 conn rw
        left=PH_IP_MOON
index a6c8f026c58298522111171417e5deab20dff3d1..fd33cfb573abd02036ade275b2afa1d4e3bb6ed1 100644 (file)
@@ -13,7 +13,7 @@ DIAGRAM="m-c-w.png"
 
 # UML instances on which tcpdump is to be started
 #
-TCPDUMPHOSTS=""
+TCPDUMPHOSTS="moon"
 
 # UML instances on which IPsec is started
 # Used for IPsec logging purposes
index 27a5207a122d767a718c1c0fbe166815b202adac..14d57690994ecc15f9319db1c57f84860a4958e6 100644 (file)
@@ -1,5 +1,7 @@
 carol::ipsec status::home.*STATE_QUICK_I2.*IPsec SA established::YES
 moon::ipsec status::rw.*STATE_QUICK_R2.*IPsec SA established::YES
+carol::ping -c 1 -s 120 -p deadbeef PH_IP_ALICE::128 bytes from PH_IP_ALICE: icmp_seq=1::YES
 moon::ipsec statusall::AES_CCM_12_128::YES
 carol::ipsec statusall::AES_CCM_12_128::YES
-carol::ping -c 1 -s 120 -p deadbeef 10.1.0.10::128 bytes from 10.1.0.10: icmp_seq=1::YES
+moon::tcpdump::IP carol.strongswan.org > moon.strongswan.org: ESP.*length 180::YES
+moon::tcpdump::IP moon.strongswan.org > carol.strongswan.org: ESP.*length 180::YES
index 2b240d89533cf6d6f18a3dcef80184ee1551ee5b..acb73b06feb33c9b70c88d2c05bfcbd7f0d62c20 100644 (file)
@@ -13,7 +13,7 @@ DIAGRAM="m-c-w.png"
 
 # UML instances on which tcpdump is to be started
 #
-TCPDUMPHOSTS=""
+TCPDUMPHOSTS="moon"
 
 # UML instances on which IPsec is started
 # Used for IPsec logging purposes
index 6f1cd4c49b812dc0b6d830ecc29039e0f14aa014..c7992fbe448aac0a80eff3610ac8205b1843f820 100644 (file)
@@ -1,7 +1,9 @@
 carol::ipsec status::home.*STATE_QUICK_I2.*IPsec SA established::YES
 moon::ipsec status::rw.*STATE_QUICK_R2.*IPsec SA established::YES
+carol::ping -c 1 -s 120 -p deadbeef PH_IP_ALICE::128 bytes from PH_IP_ALICE: icmp_seq=1::YES
 moon::ipsec statusall::AES_CTR_256/AES_XCBC_96::YES
 carol::ipsec statusall::AES_CTR_256/AES_XCBC_96::YES
 moon::ip xfrm state::rfc3686(ctr(aes))::YES
 carol::ip xfrm state::rfc3686(ctr(aes))::YES
-carol::ping -c 1 -s 120 -p deadbeef 10.1.0.10::128 bytes from 10.1.0.10: icmp_seq=1::YES
+moon::tcpdump::IP carol.strongswan.org > moon.strongswan.org: ESP.*length 180::YES
+moon::tcpdump::IP moon.strongswan.org > carol.strongswan.org: ESP.*length 180::YES
index 2b240d89533cf6d6f18a3dcef80184ee1551ee5b..acb73b06feb33c9b70c88d2c05bfcbd7f0d62c20 100644 (file)
@@ -13,7 +13,7 @@ DIAGRAM="m-c-w.png"
 
 # UML instances on which tcpdump is to be started
 #
-TCPDUMPHOSTS=""
+TCPDUMPHOSTS="moon"
 
 # UML instances on which IPsec is started
 # Used for IPsec logging purposes
index d7d4666ed0984cf15b12855c34de78026abf9516..e1fbe46539f8274aa60ef639b773ddb44b9cdfc2 100644 (file)
@@ -1,5 +1,7 @@
 carol::ipsec status::home.*STATE_QUICK_I2.*IPsec SA established::YES
 moon::ipsec status::rw.*STATE_QUICK_R2.*IPsec SA established::YES
+carol::ping -c 1 -s 120 -p deadbeef PH_IP_ALICE::128 bytes from PH_IP_ALICE: icmp_seq=1::YES
 moon::ipsec statusall::AES_GCM_16_256::YES
 carol::ipsec statusall::AES_GCM_16_256::YES
-carol::ping -c 1 -s 120 -p deadbeef 10.1.0.10::128 bytes from 10.1.0.10: icmp_seq=1::YES
+moon::tcpdump::IP carol.strongswan.org > moon.strongswan.org: ESP.*length 184::YES
+moon::tcpdump::IP moon.strongswan.org > carol.strongswan.org: ESP.*length 184::YES
index 2b240d89533cf6d6f18a3dcef80184ee1551ee5b..acb73b06feb33c9b70c88d2c05bfcbd7f0d62c20 100644 (file)
@@ -13,7 +13,7 @@ DIAGRAM="m-c-w.png"
 
 # UML instances on which tcpdump is to be started
 #
-TCPDUMPHOSTS=""
+TCPDUMPHOSTS="moon"
 
 # UML instances on which IPsec is started
 # Used for IPsec logging purposes
index 872962de467419e70868c2e4113378a5527438a4..5cee96b08fa47e753b8b7ab0f9f3cde3890471fc 100644 (file)
@@ -1,9 +1,10 @@
-
 carol::ipsec status::home.*STATE_QUICK_I2.*IPsec SA established::YES
 moon::ipsec status::rw.*STATE_QUICK_R2.*IPsec SA established::YES
+carol::ping -c 1 -s 120 -p deadbeef 10.1.0.10::128 bytes from 10.1.0.10: icmp_seq=1::YES
 carol::ipsec statusall::ESP proposal: AES_CBC_256/AES_XCBC_96::YES
 moon::ipsec statusall::ESP proposal: AES_CBC_256/AES_XCBC_96::YES
 carol::ip xfrm state::auth xcbc(aes)::YES
 moon::ip xfrm state::auth xcbc(aes)::YES
-carol::ping -c 1 PH_IP_ALICE::64 bytes from PH_IP_ALICE: icmp_seq=1::YES
+moon::tcpdump::IP carol.strongswan.org > moon.strongswan.org: ESP.*length 196::YES
+moon::tcpdump::IP moon.strongswan.org > carol.strongswan.org: ESP.*length 196::YES
 
index a6c8f026c58298522111171417e5deab20dff3d1..fd33cfb573abd02036ade275b2afa1d4e3bb6ed1 100644 (file)
@@ -13,7 +13,7 @@ DIAGRAM="m-c-w.png"
 
 # UML instances on which tcpdump is to be started
 #
-TCPDUMPHOSTS=""
+TCPDUMPHOSTS="moon"
 
 # UML instances on which IPsec is started
 # Used for IPsec logging purposes
index b679d03ecc93f67823bfbc37f9e26c856560d383..9b0582f2c368cf6a7d73879b05df8026051b61d4 100644 (file)
@@ -1,4 +1,4 @@
 Roadwarrior <b>carol</b> proposes  to gateway <b>moon</b> the ESP cipher suite
-<b>CAMELLIA_CBC_192 / HMAC_SHA2_256</b> by defining <b>esp=camellia192-sha2_256</b>
+<b>CAMELLIA_CBC_192 / HMAC_SHA2_384</b> by defining <b>esp=camellia192-sha384</b>
 in ipsec.conf. A ping from <b>carol</b> to <b>alice</b> successfully checks
 the established tunnel.
index 1b0f3a12bc9c7552bee00e4ceaa6284ef3841090..e78c2ef8be56c6cae3a5ebe3c7a39833deb31bda 100644 (file)
@@ -1,8 +1,9 @@
 carol::ipsec status::home.*STATE_QUICK_I2.*IPsec SA established::YES
 moon::ipsec status::rw.*STATE_QUICK_R2.*IPsec SA established::YES
-carol::ipsec statusall::ESP proposal: CAMELLIA_CBC_192/HMAC_SHA2_256::YES
-moon::ipsec statusall::ESP proposal: CAMELLIA_CBC_192/HMAC_SHA2_256::YES
+carol::ping -c 1 -s 120 -p deadbeef PH_IP_ALICE::128 bytes from PH_IP_ALICE: icmp_seq=1::YES
+carol::ipsec statusall::ESP proposal: CAMELLIA_CBC_192/HMAC_SHA2_384::YES
+moon::ipsec statusall::ESP proposal: CAMELLIA_CBC_192/HMAC_SHA2_384::YES
 carol::ip xfrm state::enc cbc(camellia)::YES
 moon::ip xfrm state::enc cbc(camellia)::YES
-carol::ping -c 1 PH_IP_ALICE::64 bytes from PH_IP_ALICE: icmp_seq=1::YES
-
+moon::tcpdump::IP carol.strongswan.org > moon.strongswan.org: ESP.*length 208::YES
+moon::tcpdump::IP moon.strongswan.org > carol.strongswan.org: ESP.*length 208::YES
index 9af94a18eb80cd7a948754ee29947336c8050262..6387118c56fac2ce074b354dce68b42054c7e7fa 100755 (executable)
@@ -11,8 +11,8 @@ conn %default
        keylife=20m
        rekeymargin=3m
        keyingtries=1
-       ike=aes192-sha2_256-modp2048!
-       esp=camellia192-sha2_256!
+       ike=aes192-sha384-modp3072!
+       esp=camellia192-sha384!
 
 conn home
        left=PH_IP_CAROL
index 3501319a5b8e915748fc0aafd1db1809f5078fb9..77d867e3215fc143175d053744cf3b01007c16d2 100755 (executable)
@@ -11,8 +11,8 @@ conn %default
        keylife=20m
        rekeymargin=3m
        keyingtries=1
-       ike=aes192-sha2_256-modp2048!
-       esp=camellia192-sha2_256!
+       ike=aes192-sha384-modp3072!
+       esp=camellia192-sha384!
 
 conn rw
        left=PH_IP_MOON
index 7d077c12601fa95dae514bc10335cf6c6e3e799e..e096695a3bdeb86b90baa8357f16c511bbd986fb 100644 (file)
@@ -3,3 +3,4 @@ carol::ipsec start
 moon::ipsec start
 carol::sleep 2
 carol::ipsec up home
+carol::sleep 1
index a6c8f026c58298522111171417e5deab20dff3d1..fd33cfb573abd02036ade275b2afa1d4e3bb6ed1 100644 (file)
@@ -13,7 +13,7 @@ DIAGRAM="m-c-w.png"
 
 # UML instances on which tcpdump is to be started
 #
-TCPDUMPHOSTS=""
+TCPDUMPHOSTS="moon"
 
 # UML instances on which IPsec is started
 # Used for IPsec logging purposes
index 57d09a48833954ab81d60fae1dea866aca376493..8e42707a2e0c1d82b0bdb01ac3791a8c595acb1e 100644 (file)
@@ -1,8 +1,9 @@
 carol::ipsec status::home.*STATE_QUICK_I2.*IPsec SA established::YES
 moon::ipsec status::rw.*STATE_QUICK_R2.*IPsec SA established::YES
+carol::ping -c 1 -s 120 -p deadbeef 10.1.0.10::128 bytes from 10.1.0.10: icmp_seq=1::YES
 moon::ipsec statusall::ESP proposal: DES_CBC/HMAC_MD5::YES
 carol::ipsec statusall::ESP proposal: DES_CBC/HMAC_MD5::YES
 moon::ip xfrm state::enc cbc(des)::YES
 carol::ip xfrm state::enc cbc(des)::YES
-carol::ping -c 1 PH_IP_ALICE::64 bytes from PH_IP_ALICE: icmp_seq=1::YES
-
+moon::tcpdump::IP carol.strongswan.org > moon.strongswan.org: ESP.*length 180::YES
+moon::tcpdump::IP moon.strongswan.org > carol.strongswan.org: ESP.*length 180::YES
index 8c748a54c7b03f8cbe932a8185b5fc7e784350ba..a259e6d09b953999943f2ee40f130f8d8955731d 100644 (file)
@@ -1,7 +1,9 @@
 carol::ipsec status::home.*STATE_QUICK_I2.*IPsec SA established::YES
 moon::ipsec status::rw.*STATE_QUICK_R2.*IPsec SA established::YES
+carol::ping -c 1 -s 120 -p deadbeef PH_IP_ALICE::128 bytes from PH_IP_ALICE: icmp_seq=1::YES
 moon::ipsec statusall::ESP proposal::NULL/HMAC_SHA1::YES
 carol::ipsec statusall::ESP proposal::NULL/HMAC_SHA1::YES
 moon::ip xfrm state::enc ecb(cipher_null)::YES
 carol::ip xfrm state::enc ecb(cipher_null)::YES
-carol::ping -c 1 -s 120 -p deadbeef PH_IP_ALICE::128 bytes from PH_IP_ALICE: icmp_seq=1::YES
+moon::tcpdump::IP carol.strongswan.org > moon.strongswan.org: ESP.*length 172::YES
+moon::tcpdump::IP moon.strongswan.org > carol.strongswan.org: ESP.*length 172::YES
index a6c8f026c58298522111171417e5deab20dff3d1..fd33cfb573abd02036ade275b2afa1d4e3bb6ed1 100644 (file)
@@ -13,7 +13,7 @@ DIAGRAM="m-c-w.png"
 
 # UML instances on which tcpdump is to be started
 #
-TCPDUMPHOSTS=""
+TCPDUMPHOSTS="moon"
 
 # UML instances on which IPsec is started
 # Used for IPsec logging purposes