On Wed, 13 Feb 2019, Andrew Cagney wrote:

It would be from more algorithms being added to defaults.  But there's
another change I think needs to follow.  Namely changing the way IKE
proposals are formatted.  Namely remove the smart that suppresses
<integ>, so that what was:

 <encrypt>-<prf>-<dh>
 AES_CBC-HMAC_SHA1-DH31
 AES_GCM_16-HMAC_SHA1-DH31

That is really encrypt-integ-dh right?
We don't specify/print the prf until now because we assume integ == prf
except for AEAD.


becomes the longer:

 <encrypts>-<prfs>-<integs>-<dhs>
 AES_CBC-HMAC_SHA1-HMAC_SHA1_96-DH31
 AES_GCM_16-HMAC_SHA1-NONE-DH31

thoughts?

I'd prefer encr-integ-prf-dh maybe ? I don't know.

I'll look at this.  It wasn't expected.  IKE proposals should prefer
256 while ESP proposals should prefer 128.

Ok,

Paul
_______________________________________________
Swan-dev mailing list
[email protected]
https://lists.libreswan.org/mailman/listinfo/swan-dev

Reply via email to