New commits:
commit 80558468746c09461cc2a9436bbb098a800c6ac9
Author: Andrew Cagney <[email protected]>
Date:   Fri Dec 17 12:20:57 2021 -0500

    connections: in refine_host_connection_on_responder() check candidate's 
AUTHBY
    
    For IKEv2, when the initiator proposes DIGSIG, the authby (ECDSA/RSA)
    was determined using on the connection selected during IKE_SA_INIT.
    If that connection wanted RSA, it would never switch to ECDSA.
    
    - this at least allows both RSA and ECDSA
    
      suspect it needs to look further into the payload before making the
      decision
    
    - the required keymat check was merged in with the other AUTH checks
      and ECDSA was added
    
    - for IKEv2 and PSK, no check is performed
    
      the IKEv1 call to get_connection_psk(d) doesn't work as, at this
      point the candidate's that.id is still %any
    
      it looks like one of the reasons for recursion is to simplfy fill in
      and then test that.id; grrr

_______________________________________________
Swan-commit mailing list
[email protected]
https://lists.libreswan.org/mailman/listinfo/swan-commit

Reply via email to