My question is how does one properly load this module? I've tried loading it from the modules package (/etc/modules) but when I try to restart ipsec it fails becuase it can't unload the ipsec.o module due to the fact that it is in use by the ipsec_aes.o module.
I'm sure I'm missing something here. Should I replace the ipsec.o with ipsec_aes.o or add a stub to the shutdown/restart script to remove unload ipsec_aes.o first? Dumb questions I'm sure but we all have to learn somehow =-) ----- Original Message ----- From: "Roger E McClurg" <[EMAIL PROTECTED]> To: "Troy Aden" <[EMAIL PROTECTED]> Cc: "Charles Steinkuehler" <[EMAIL PROTECTED]>; <[EMAIL PROTECTED]> Sent: Wednesday, April 14, 2004 11:43 AM Subject: RE: [leaf-user] Bering 1.2 Throughput Test Results > Troy, > > It's not a dumb question. I just figured it out myself. In the connection > defaults, or in the specific connection you want to use aes, just add > esp=aes. Of course the ipsec-aes.o module must be loaded. > > Roger > > > > > > Troy Aden <Troy.Aden > @VCom.com> > 04/14/2004 10:13 AM > > To: Roger E McClurg/CEG/[EMAIL PROTECTED], Charles Steinkuehler > <[EMAIL PROTECTED]> > cc: [EMAIL PROTECTED] > Subject: RE: [leaf-user] Bering 1.2 Throughput Test Results > > > I am sure this question is a silly one but here it goes. > How do I go about changing the Encryption algorithm in Freeswan IPSec? > I am using Bering Uclibc 2.0. I am using FreeSwan IPSec with PSK's for my > connections. I did not see anything in the procedures for changing the > encryption algorithms that this package uses. I am assuming that I would > add > the module (ipsec_aes.o) to /lib/modules/. But can anyone please tell me > the > command that I need to put in the IPSec config file to tell it > specifically > what algorithm to use? > > Thanks in advance! > > Troy > > Here is what my config looks like: > > config setup > # THIS SETTING MUST BE CORRECT or almost nothing will work; > # %defaultroute is okay for most simple cases. > interfaces=%defaultroute > # Debug-logging controls: "none" for (almost) none, "all" for > lots. > klipsdebug=none > plutodebug=none > # Use auto= parameters in conn descriptions to control startup > actions. > plutoload=%search > plutostart=%search > # Close down old connection when new one using same ID shows up. > uniqueids=yes > > > > # defaults for subsequent connection descriptions > conn %default > # How persistent to be in (re)keying negotiations (0 means very). > keyingtries=0 > # RSA authentication with keys from DNS. > authby=secret > right=132.125.107.155 > rightsubnet=192.168.55.0/16 > rightnexthop=132.125.107.254 > pfs=yes > > conn block > auto=ignore > > conn private > auto=ignore > > conn private-or-clear > auto=ignore > > conn clear > auto=ignore > > conn packetdefault > auto=ignore > > conn troy > left=139.145.45.166 > leftsubnet=10.10.65.0/24 > leftnexthop=139.145.45.129 > auto=start > > Here is what comes up when I start a connection: > > ipsec whack --initiate --name test > 002 "troy" #152: initiating Main Mode > 104 "troy" #152: STATE_MAIN_I1: initiate > 106 "troy" #152: STATE_MAIN_I2: sent MI2, expecting MR2 > 108 "troy" #152: STATE_MAIN_I3: sent MI3, expecting MR3 > 002 "troy" #152: Main mode peer ID is ID_IPV4_ADDR: '139.145.45.166' > 002 "troy" #152: ISAKMP SA established > 004 "troy" #152: STATE_MAIN_I4: ISAKMP SA established > 002 "troy" #153: initiating Quick Mode > PSK+ENCRYPT+TUNNEL+PFS+DISABLEARRIVALCHECK > 117 "troy" #153: STATE_QUICK_I1: initiate > 002 "troy" #153: sent QI2, IPsec SA established > 004 "troy" #153: STATE_QUICK_I2: sent QI2, IPsec SA established > > -----Original Message----- > From: Roger E McClurg [mailto:[EMAIL PROTECTED] > Sent: Wednesday, April 14, 2004 7:13 AM > To: Charles Steinkuehler > Cc: [EMAIL PROTECTED] > Subject: Re: [leaf-user] Bering 1.2 Throughput Test Results > > My apologies. I should have looked before I asked. It is in the Bering > modules, right where it should be. > > Roger > > -=-=-=--=-=-=-=-=-=-=-= > Charles, > > I'd love to run the tests. Where can I find the ipsec_aes.o module for > Bering 1.2? > > Roger > > > > > > Charles Steinkuehler <charles > @steinkuehler.net> > 04/13/2004 04:13 PM > > To: Roger E McClurg/CEG/[EMAIL PROTECTED] > cc: [EMAIL PROTECTED] > Subject: Re: [leaf-user] Bering 1.2 Throughput Test Results > > > Roger E McClurg wrote: > <snip> > > The next test was to FTP from the PC connected to the OpenBrick E to the > > > PC connected to a 500 Mhz P III running Bering 1.2. The transfer rate > was > > only 12.67 Mb/sec. The 3DES IPSEC encryption was certainly taking it's > > toll. > > > > Next we replaced both Bering machines with Nortel Contivity 1500 VPN > > devices. The Contivity is a popular VPN concentrator for small branch > > offices. It was designed specifically for the purpose of a VPN > > concentrator. Imagine our surprise when the Contivity transfer rate was > > only 4.45 Mb/sec. The Bering boxes were running weblet, shorewall, > > dnscache, dhcpd, ssh, sshd, sftp, snmp, and snmpd in addition to IPSEC, > > and yet they were almost three times faster than commercial VPN > > concentrators. > > If you want to have a bit more fun, switch your IPSec links to the new > AES (ipsec_aes.o) encryption algorithm. Designed to be more friendly to > modern CPU's with wide registers and SIMD (Single Instruction Multiple > Data) instruction sets (3DES is optimized for hardware, and doesn't > translate nicely into a byte/word oriented general-purpose CPU > algorithm), you should see a substantial increase in your transfer rates. > > 3DES is usually not much of a bottleneck (even with the 'slow' Nortel > devices), as usually the upstream WAN link is substantially slower than > the potential CPU throughput when compressing, but if you've got fast > pipes, you'll notice a drastic difference by choosing an alternate > encryption scheme. > > -- > Charles Steinkuehler > [EMAIL PROTECTED] > > > > > > ------------------------------------------------------- > This SF.Net email is sponsored by: IBM Linux Tutorials > Free Linux tutorial presented by Daniel Robbins, President and CEO of > GenToo technologies. Learn everything from fundamentals to system > administration.http://ads.osdn.com/?ad_id=1470&alloc_id=3638&op=click > ------------------------------------------------------------------------ > leaf-user mailing list: [EMAIL PROTECTED] > https://lists.sourceforge.net/lists/listinfo/leaf-user > SR FAQ: http://leaf-project.org/pub/doc/docmanager/docid_1891.html > > > > > ------------------------------------------------------- > This SF.Net email is sponsored by: IBM Linux Tutorials > Free Linux tutorial presented by Daniel Robbins, President and CEO of > GenToo technologies. Learn everything from fundamentals to system > administration.http://ads.osdn.com/?ad_id=1470&alloc_id=3638&op=click > ------------------------------------------------------------------------ > leaf-user mailing list: [EMAIL PROTECTED] > https://lists.sourceforge.net/lists/listinfo/leaf-user > SR FAQ: http://leaf-project.org/pub/doc/docmanager/docid_1891.html ------------------------------------------------------- This SF.Net email is sponsored by: IBM Linux Tutorials Free Linux tutorial presented by Daniel Robbins, President and CEO of GenToo technologies. Learn everything from fundamentals to system administration.http://ads.osdn.com/?ad_id=1470&alloc_id=3638&op=click ------------------------------------------------------------------------ leaf-user mailing list: [EMAIL PROTECTED] https://lists.sourceforge.net/lists/listinfo/leaf-user SR FAQ: http://leaf-project.org/pub/doc/docmanager/docid_1891.html