On Mon, 18 May 2015, Wolfgang Nothdurft wrote:

 Thanks! I added two interop test cases between KLIPS and NETKEy as well.

 Paul
I added a patch to my ticket that enables the sha2-truncbug option for klips.

In linux/net/ipsec/pfkey_v2_build.c:236 I have changed SADB_AALG_MAX to K_SADB_AALG_MAX, because I think that was a bug. SADB_AALG_MAX seems not defined in kernel space and with my tests it shows a value of 251 instead 255, which prevents klips from using the truncated algo (AH_SHA2_256_TRUNC 252).

Thanks! I'll test it.

Could you test AH with your patch? I had modified your patch in an
attempt to not make a change between buildin and cryptoapi default
choices, but testing shows that AH now fails with:

[ 00.00] KLIPS pfkey_add_parse: not successful for SA:  (error), deleting.
[ 00.00] KLIPS pfkey_add_parse: not successful for SA:  (error), deleting.

eg, see
http://bofh.nohats.ca/results/bofh.nohats.ca/2015-05-12-bofh.nohats.ca-3.13aq6-225-g34f80a0-dirty-master/ikev2-13-ah/

It would be useful to see if I made an error with merging the patch in,
or if your patch actually introduced this problem.

Paul
_______________________________________________
Swan-dev mailing list
[email protected]
https://lists.libreswan.org/mailman/listinfo/swan-dev

Reply via email to