On Mon, Nov 12, 2018 at 01:50:57PM +0100, Jean-Samuel Reynaud wrote:
> In conclusion, for me it's look like a feature missing in racoon... A
> discusion was about this on racoon ML:
>
> https://sourceforge.net/p/ipsec-tools/mailman/message/34146970/
Thanks. The best course of action from here is
Hi
I found a problem similar to this one. I think I understand this issue:
There is a draft for hmac sha256 use on IPSEC:
https://tools.ietf.org/html/draft-ietf-ipsec-ciph-sha-256-00
On this version (V 00) the truncation is 96 bits
On next version (V 01) the truncation shift to 128 bits
And
On Wed, Oct 04, 2017 at 10:05:08PM +0200, Bartek Krawczyk wrote:
> In summary: 1. racoon configuration with aes128-cbc, sha256 and
> pfs2048 doesn't work with MikroTik. 2. changing only sha256 to sha1
> on racoon and MikroTik solves the problem immediately. 3. MikroTik to
> MikroTik and MikroTik
And below you see a working strongSwan configuration with HMAC SHA256
tested on the same server also on Debian stretch with the same PSK
conn VPN
left=217.182.74.61
leftsubnet=4.4.4.4/32[gre]
rightsubnet=2.2.2.2/32[gre]
rightauth=psk
leftauth=psk
a
Package: racoon
Version: 1:0.8.2+20140711-8
Severity: normal
Dear Maintainer,
I am configuring a roadwarrior-like scenario which works however I've
encounterd a strange problem. When configuring racoon to use AES 128
CBC as encryption algorithm with SHA256 as authentication algorighm
(and PFS
5 matches
Mail list logo