# /etc/strongswan.conf - strongSwan configuration file
charon {
- load = curl pem pkcs1 openssl random x509 hmac stroke kernel-netlink socket-default updown
+ load = curl pem pkcs1 openssl random hmac stroke kernel-netlink socket-default updown
}
# /etc/strongswan.conf - strongSwan configuration file
charon {
- load = curl pem pkcs1 openssl random x509 hmac stroke kernel-netlink socket-default updown
+ load = curl pem pkcs1 openssl random hmac stroke kernel-netlink socket-default updown
}
# /etc/strongswan.conf - strongSwan configuration file
charon {
- load = curl pem pkcs1 openssl random x509 hmac stroke kernel-netlink socket-default updown
+ load = curl pem pkcs1 openssl random hmac stroke kernel-netlink socket-default updown
}
# /etc/strongswan.conf - strongSwan configuration file
charon {
- load = curl pem pkcs1 openssl random x509 hmac xcbc stroke kernel-netlink socket-default updown
+ load = curl pem pkcs1 openssl random hmac xcbc stroke kernel-netlink socket-default updown
}
# /etc/strongswan.conf - strongSwan configuration file
charon {
- load = curl pem pkcs1 openssl random x509 hmac xcbc stroke kernel-netlink socket-default updown
+ load = curl pem pkcs1 openssl random hmac xcbc stroke kernel-netlink socket-default updown
}
The roadwarrior <b>carol</b> and the gateway <b>moon</b> use the <b>openssl</b>
-plugin based on the <b>OpenSSL</b> library for all cryptographical functions
-whereas roadwarrior <b>dave</b> uses the default <b>strongSwan</b> cryptographical
-plugins <b>aes des sha1 sha2 md5 gmp</b> plus the <b>openssl</b> plugin for
-the Elliptic Curve Diffie-Hellman groups only.
+plugin based on the <b>OpenSSL</b> library for all cryptographical and X.509
+certificate functions whereas roadwarrior <b>dave</b> uses the default <b>strongSwan</b>
+cryptographical plugins <b>aes des sha1 sha2 md5 gmp x509</b> plus the <b>openssl</b>
+plugin for the Elliptic Curve Diffie-Hellman groups only.
<p>
The roadwarriors <b>carol</b> and <b>dave</b> set up a connection each
to gateway <b>moon</b>. The authentication is based on <b>X.509 certificates</b>.
# /etc/strongswan.conf - strongSwan configuration file
charon {
- load = curl pem pkcs1 openssl random x509 hmac stroke kernel-netlink socket-default updown
+ load = curl pem pkcs1 openssl random hmac stroke kernel-netlink socket-default updown
}
libstrongswan {
# /etc/strongswan.conf - strongSwan configuration file
charon {
- load = curl aes des sha1 sha2 md5 pem pkcs1 gmp pem pkcs1 openssl random x509 hmac stroke kernel-netlink socket-default updown
+ load = curl aes des sha1 sha2 md5 pem pkcs1 gmp pem pkcs1 x509 openssl random hmac stroke kernel-netlink socket-default updown
}
libstrongswan {
# /etc/strongswan.conf - strongSwan configuration file
charon {
- load = curl pem pkcs1 openssl random x509 hmac stroke kernel-netlink socket-default updown
+ load = curl pem pkcs1 openssl random hmac stroke kernel-netlink socket-default updown
}
libstrongswan {
The roadwarrior <b>carol</b> and the gateway <b>moon</b> use the <b>openssl</b>
-plugin based on the <b>OpenSSL</b> library for all cryptographical functions
-whereas roadwarrior <b>dave</b> uses the default <b>strongSwan</b> cryptographical
-plugins <b>aes des sha1 sha2 md5 gmp</b> plus the <b>openssl</b> plugin for
-the Elliptic Curve Diffie-Hellman groups only.
+plugin based on the <b>OpenSSL</b> library for all cryptographical and X.509
+certificate functions whereas roadwarrior <b>dave</b> uses the default <b>strongSwan</b>
+cryptographical plugins <b>aes des sha1 sha2 md5 gmp x509</b> plus the <b>openssl</b>
+plugin for the Elliptic Curve Diffie-Hellman groups only.
<p>
The roadwarriors <b>carol</b> and <b>dave</b> set up a connection each
to gateway <b>moon</b>. The authentication is based on <b>X.509 certificates</b>.
# /etc/strongswan.conf - strongSwan configuration file
charon {
- load = curl pem pkcs1 openssl random x509 hmac stroke kernel-netlink socket-default updown
+ load = curl pem pkcs1 openssl random hmac stroke kernel-netlink socket-default updown
}
libstrongswan {
# /etc/strongswan.conf - strongSwan configuration file
charon {
- load = curl aes des sha1 sha2 md5 pem pkcs1 gmp pem pkcs1 openssl random x509 hmac stroke kernel-netlink socket-default updown
+ load = curl aes des sha1 sha2 md5 pem pkcs1 gmp pem pkcs1 x509 openssl random hmac stroke kernel-netlink socket-default updown
}
libstrongswan {
# /etc/strongswan.conf - strongSwan configuration file
charon {
- load = curl pem pkcs1 openssl random x509 hmac stroke kernel-netlink socket-default updown
+ load = curl pem pkcs1 openssl random hmac stroke kernel-netlink socket-default updown
}
libstrongswan {
The hosts <b>carol</b>, <b>dave</b>, and <b>moon</b> use the <b>openssl</b> plugin
-based on the <b>OpenSSL</b> library for all cryptographical functions.
+based on the <b>OpenSSL</b> library for all cryptographical and X.509 certificate functions.
<p>
The roadwarriors <b>carol</b> and <b>dave</b> set up a connection each
to gateway <b>moon</b>. The authentication is based on <b>ECDSA signatures</b>
# /etc/strongswan.conf - strongSwan configuration file
charon {
- load = curl pem pkcs1 openssl random x509 hmac stroke kernel-netlink socket-default updown
+ load = curl pem pkcs1 openssl random hmac stroke kernel-netlink socket-default updown
}
# /etc/strongswan.conf - strongSwan configuration file
charon {
- load = curl pem pkcs1 openssl random x509 hmac stroke kernel-netlink socket-default updown
+ load = curl pem pkcs1 openssl random hmac stroke kernel-netlink socket-default updown
}
# /etc/strongswan.conf - strongSwan configuration file
charon {
- load = curl pem pkcs1 openssl random x509 hmac stroke kernel-netlink socket-default updown
+ load = curl pem pkcs1 openssl random hmac stroke kernel-netlink socket-default updown
}