On Fri, 30 Aug 2019, John Crisp wrote:

that option should enable using reauthentication of IKE SAs instead of
rekeying them
as per RFC7296 Section 2.8.3 (
https://tools.ietf.org/html/rfc7296#section-2.8.3.),
when libreswan is the initiator of rekeying (that is,
reauthentication in this case).

OK. Not sure how to you would force that, or why Endian/StrongSwan
fails.

And yes, it isn't documented in man pages.


Interesting...

Don't know if that will help you solve your problem.

Me neither - it answers one question and asks another!

It could help, but at least for now, the reauth= option is a boolean.
That changes the rekey behaviour to reauth. But it still uses the
ikelifetime value (not yet an authlifetime= value). So setting the
ikelifetime= shorter than the required reauth lifetime on the other
end, together with reauth=yes, might resolve your issue. This all
assumes IKEv2.

Paul
_______________________________________________
Swan mailing list
[email protected]
https://lists.libreswan.org/mailman/listinfo/swan

Reply via email to