Thanks Paul,
the patch didn't apply cleanly on barf.in, but I got it in there
manually. Compiles without error and pluto is running.
you are awesome!! thank you!!
On 2019-05-27 9:29 p.m., Paul Wouters wrote:
On Mon, 27 May 2019, Computerisms Corporation wrote:
Thanks for responding, much appreciated.
It is part of the kernel, and is created by enabling
CONFIG_XFRM_STATISTICS.
Acknowledged and understood.
Does your system have /proc/sys/net/core/xfrm_acq_expires ? Maybe we
need to switch to that to test whether XFRM support is available.
Apparently so:
ls -al /proc/sys/net/core/xfrm_acq_expires
-rw-r--r-- 1 root root 0 May 27 17:24 /proc/sys/net/core/xfrm_acq_expires
So, did I find a real problem, or am I just in need of someone to
point
out a glaringly obvious error on my part?
It's not you, it's us :)
Phew, not that I am happy to pass my troubles to others or anything ;)
I've created a patch:
https://github.com/libreswan/libreswan/commit/716f4b712724c6698469563e531dea3667507ceb
(if you want a text based patch for use with "patch", append ".patch" to
the above URL
It should fix the XFRM detection for you.
Okay, so custom kernels are within my skill set, but I don't really
want to be creating a new custom kernel for every firewall I have
under my thumb. Pretty sure one of the happiest days in my computing
career was finding linux-image in the apt repos. Is there an
immediate workaround short of installing an older version? can I
change the _stackmanager.in file to look for this
/proc/sys/net/core/xfrm_acq_expires file instead? or will that just
move me to the next problem?
That's only part of the problem. pluto itself also checks. So best to
just apply the above patch :)
Paul
_______________________________________________
Swan mailing list
[email protected]
https://lists.libreswan.org/mailman/listinfo/swan