Re: [strongSwan] key length

2009-03-18 Thread Andreas Steffen
Hi Michael, overridemtu only helps with IPsec ESP payload packets and the KLIPS IPsec stack from the FreeS/WAN project. It does not help with IKE because the messages MI3 and MR3 cannot be logically split into two UDP datagrams (some VPN vendors have a proprietary FRAGMENTATION option.though, whic

Re: [strongSwan] key length

2009-03-18 Thread Michael Roy
> The IKE protocol is transported in UDP datagrams. If you are > transmitting certificates with 2048 bit RSA keys the IKE message > becomes larger than the MTU of 1500 bytes and the datagram gets > fragmented. Most firewalls and many routers discard IP fragments > by default so the IKE message neve

Re: [strongSwan] key length

2009-03-18 Thread Michael Roy
> The IKE protocol is transported in UDP datagrams. If you are > transmitting certificates with 2048 bit RSA keys the IKE message > becomes larger than the MTU of 1500 bytes and the datagram gets > fragmented. Most firewalls and many routers discard IP fragments > by default so the IKE message neve

Re: [strongSwan] iPhone

2009-03-18 Thread Gbenga
Hi Scott, I have never tried it (iPhone) before but I am sure it can be done. it cannot be that much different from Mac OS X, which has been known to work well with Strongswan. Mac OS is not widely used in my network, but I have had to set up a connection once for one of people I work with. H

Re: [strongSwan] key length

2009-03-18 Thread Andreas Steffen
The IKE protocol is transported in UDP datagrams. If you are transmitting certificates with 2048 bit RSA keys the IKE message becomes larger than the MTU of 1500 bytes and the datagram gets fragmented. Most firewalls and many routers discard IP fragments by default so the IKE message never reaches

[strongSwan] key length

2009-03-18 Thread Michael Roy
Hello all, # ipsec version Linux strongSwan U2.8.8/K2.6.18-92.el5 (native) Though I'm involved in the ipsec for quite some time I've got a problem with the key length recently. I created a key (and a host cert), though in rather too much relaxed manner, with the openssl option "-newkey rsa:2048"

[strongSwan] iPhone

2009-03-18 Thread Scott Weigle
I was wondering if anyone has successfully connected the iPhone to strongswan using L2TP/IPSEC? I have been trying, but unsuccessful so far. I have stepped back a bit and I am now trying to get the Leopard L2TP/IPSEC client to connect to strongswan. Again, so far I have been unsuccessful. I

Re: [strongSwan] checkpoint with username and password

2009-03-18 Thread Andreas Steffen
Hi Michael, strongSwan offers the following support for username password: - IKEv1 Main Mode with Mutual RSA authentication + XAUTH client authentication with username/password http://www.strongswan.org/uml/testresults42/ikev1/xauth-rsa/ - IKEv2 Server Side RSA authentication + client side E

[strongSwan] checkpoint with username and password

2009-03-18 Thread Michael Mengershausen
Hello Strongswan-team, is there a setup with strongswan for username and password (one time password, otp) authentication with a checkpoint vpn-server ? Best regards Michael -- Dr. Michael von Mengershausen, MR-Physik / PET Max-Planck-Institute for Neurological Research Gleueler Str. 50