[strongSwan] Cipher Suite proposals changed in the course of 5.6.0 to 5.6.2

2018-03-18 Thread Dr . Rolf Jansen
I am still using an iPhone 4 with iOS 7.1.2 which cannot be updated to a more recent iOS. When I am on travel, I use the builtin L2TP/IPsec client in order to connect to my FreeBSD home server providing the respective VPN service via net/mpd5 + security/strongswan (both of which are installed f

Re: [strongSwan] Cipher Suite proposals changed in the course of 5.6.0 to 5.6.2

2018-03-18 Thread Dr. Rolf Jansen
insecure and now there's an RFC for > that. Take a look at the UsableExamples page. > > Kind regards > > Noel > > On 18.03.2018 23:48, Dr. Rolf Jansen wrote: >> I am still using an iPhone 4 with iOS 7.1.2 which cannot be updated to a >> more recent iOS. &

[strongSwan] Issues with maintaining IKEv2 tunnels

2022-08-17 Thread Dr. Rolf Jansen
Hello, The IKEv2 tunnels are established between device controllers in a remote pilot plant in Spain, which is connected to the internet by a G4 mobile router, and an AWS-EC2 instance in Frankfurt. On both sides strongSwan v5.9.6 is installed and the OS is FreeBSD 13.0-RELEASE. Both sides are b

Re: [strongSwan] Issues with maintaining IKEv2 tunnels

2022-08-17 Thread Dr. Rolf Jansen
ys4.de>>: > > On 17.08.22 14:50, Dr. Rolf Jansen wrote: >> Hello, >> >> The IKEv2 tunnels are established between device controllers in a remote >> pilot plant in Spain, which is connected to the internet by a G4 mobile >> router, and an AWS-EC2 instance in F

Re: [strongSwan] Issues with maintaining IKEv2 tunnels

2022-08-17 Thread Dr. Rolf Jansen
> Am 17.08.2022 um 10:45 schrieb Michael Schwartzkopff : > > On 17.08.22 15:35, Dr. Rolf Jansen wrote: >> I know what DPD is. Years ago, I used it with the old racoon of the >> ipsec-tools then with IKEv1, and in racoon.conf I set the dpd_delay and let >> it after dpd

Re: [strongSwan] Issues with maintaining IKEv2 tunnels

2022-08-17 Thread Dr. Rolf Jansen
> Am 17.08.2022 um 10:41 schrieb > noel.kuntze+strongswan-users-ml@thermi.consulting: > > Hi all, > > Dpd and nat keepalive only work on IKE layer, not on the CHILD_SAs that you > want. I didn’t tell in my first post, that I checked the SA dumps on both sides of a nonworking tunnel using „set

Re: [strongSwan] Issues with maintaining IKEv2 tunnels

2022-08-17 Thread Dr. Rolf Jansen
> Am 17.08.2022 um 12:11 schrieb > noel.kuntze+strongswan-users-ml@thermi.consulting: > > Hi all, > > Regarding traps: > All supported OS can do that. It's not special. > Auto=start does not install these traps. > If the tunnel is terminated you will not have any policies. Not even traps. > The

[strongSwan] How many concurrent connections can charon handle reliably?

2022-08-22 Thread Dr. Rolf Jansen
I am not 100 % sure yet, however the impression is, not more than 1. FreeBSD 13.1-RELEASE strongSwan 5.9.6 As soon as there are more than 1 connections having different virtual peer addresses connected to the same local address, the system suffers connection losses. From charon's point of view,

Re: [strongSwan] How many concurrent connections can charon handle reliably?

2022-08-22 Thread Dr. Rolf Jansen
> I propose you investigate in detail and create some logs and so on. >> The configs tell basically nothing relevant about what happens in your real >> life scenario. >> >> Kind regards >> Noel >> >> On 22.08.22 16:19, Dr. Rolf Jansen wrote: >

Re: [strongSwan] How many concurrent connections can charon handle reliably?

2022-08-22 Thread Dr. Rolf Jansen
and so on. > The configs tell basically nothing relevant about what happens in your real > life scenario. > > Kind regards > Noel > > On 22.08.22 16:19, Dr. Rolf Jansen wrote: >> I am not 100 % sure yet, however the impression is, not more than 1. >> FreeBSD 13.1-R

[strongSwan] L2TP/IPsec on FreeBSD 10 and a Windows 7 Client behind NAT

2014-09-17 Thread Dr. Rolf Jansen
The server is running FreeBSD 10-RELEASE-p9 with IPsec/NATT enabled in the Kernel. I installed installed strongSwan 5.2.0 from the FreeBSD Ports tree. The ipsec.conf is: conn L2TP leftauth = psk rightauth = psk left = 11.11.11.11 right = %any auto = add The strongswan.conf is: c

Re: [strongSwan] L2TP/IPsec on FreeBSD 10 and a Windows 7 Client behind NAT

2014-09-19 Thread Dr. Rolf Jansen
Many thanks for your kind reply! Am 19.09.2014 um 05:41 schrieb Martin Willi : > Am 17.09.2014 um 22:39 schrieb Dr. Rolf Jansen : > >> I can connect to this L2TP/IPsec setup using Mac OS X 10.6 to 10.9, >> and iOS 7 clients sitting behind a NAT. A Windows 7 client from behi

Re: [strongSwan] Get working Win7 roadwarriors accross psk or ipsec-cert or ikev2-cert with Strongswan ! Is it possibe ?

2014-09-27 Thread Dr. Rolf Jansen
Am 27.09.2014 um 15:12 schrieb CpServiceSPb . : > Can somebody give step by step instruction and/or working Ca, Server & Client > certificate with testing data as working example that Win 7 could work > accross psk/ikev1/ikev2 ? I am running strongSwan 5.2.0 on a FreeBSD machine, and I also ha

[strongSwan] Question on IKEv2 + farp example

2014-10-12 Thread Dr. Rolf Jansen
I am referring to the example setup given at http://www.strongswan.org/uml/testresults/ikev2/farp/index.html. My question is, whether carol and dave do have access to the web server winnetou from within the internal network by the way of a NAT'ing moon? Best regards Rolf

Re: [strongSwan] Question on IKEv2 + farp example

2014-11-03 Thread Dr. Rolf Jansen
to packets that aren't > handled by ipsec and only going to the WAN. > I think it should work alright from the peer's viewpoint, if the firewall on > the gateway is set up correctly. > > Am 12.10.2014 um 16:34 schrieb Dr. Rolf Jansen: > >> I am referring to the

[strongSwan] received 250000000 lifebytes, configured 0

2014-11-03 Thread Dr. Rolf Jansen
During connection attempts of a Windows 7 client by IKEv1 in transport mode, I see the following: ... [NET] received packet: from Y.Y.Y.Y[4500] to X.X.X.X[4500] (284 bytes) [ENC] parsed QUICK_MODE request 1 [ HASH SA No ID ID NAT-OA NAT-OA ] [IKE] received 25000 lifebytes, configured 0 [

Re: [strongSwan] received 250000000 lifebytes, configured 0

2014-11-04 Thread Dr. Rolf Jansen
Am 04.11.2014 um 06:51 schrieb Martin Willi : >> During connection attempts of a Windows 7 client by IKEv1 in transport mode, >> I see the following: > >> [IKE] received 25000 lifebytes, configured 0 > > These lifebytes refer to the number of bytes the peer allows over this > Quick Mode be