On 2018-09-10, Tim Jones <b631093f-779b-4d67-9ffe-5f6d5b1d3...@protonmail.ch> 
wrote:
> Unless I misunderstand the 6.3 docs, the following should be valid :
> childsa auth enc chacha20-poly1305 group curve25519

For the AEAD types like chacha20-poly1305 and aes-256-gcm, just specify
them in "enc" and leave out "auth".

> But i get an error "not a valid authentication mode".  If I comment out that 
> line, my configuration validates OK.
>
> The same happens if I copy/paste one of the examples from the docs (e.g. 
> childsa enc aes-128 auth hmac-sha2-256 )
>
> This is what my /etc/iked.conf looks like (excluding the macro lines, which 
> have been wittheld to protect the innocent) :
>
> # MAIN CONFIG
> ikev2 esp from $local_subnet to $remote_subnet \
>         local $local_ip peer $remote_ip \
>         ikesa auth hmac-sha2-512 enc aes-256 prf hmac-sha2-512 group 
> curve25519 \
>         #childsa enc aes-128 auth hmac-sha2-256\
>         srcid $local_ip dstid $remote_ip \
>         ikelifetime 4h lifetime 3h bytes 512M \
>         ikeauth ecdsa384

"ikeauth" isn't a keyword to be used in the file, it's something that is
replaced with either "eap <type>", "ecdsa###", "psk <string>", etc.


Reply via email to