On Sun, 18 May 2014 07:25:22 +0500
masoom alam <masoom.a...@gmail.com> wrote:

> Thanks for the answer.
> 
> What are the strong points for StrongSWAN for you to select it as a
> replacement for ipsec-tools? And what are the issues that you dont
> like.

strongSwan seems to have evolved one of the most comprehensive open
source IKE daemons feature wise. It has also threaded design that takes
better advantage of multiple cores than e.g. ipsec-tools. It has also
relatively good plugin API, and abstraction. The aspects I don't like
are also related: the abstraction is an overkill at some parts, and the
multi-threading as implementation issues that require very indepth
insight of the code to tune properly. In short, it could have been
implemented in a little bit simpler manner.

As for dmvpn phase 4 is based on IKEv2, there are not that many
projects choose from. libreswan would be an option, but I feel the
strongSwan code is overall in better shape. In dream world, I would
probably write my own IKE in perfect way, but there's always something
more important to do first, so I suppose this is not going to happen
any time near future. Thus my current preference is on strongSwan.

- Timo

------------------------------------------------------------------------------
"Accelerate Dev Cycles with Automated Cross-Browser Testing - For FREE
Instantly run your Selenium tests across 300+ browser/OS combos.
Get unparalleled scalability from the best Selenium testing platform available
Simple to use. Nothing to install. Get started now for free."
http://p.sf.net/sfu/SauceLabs
_______________________________________________
opennhrp-devel mailing list
opennhrp-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/opennhrp-devel

Reply via email to