[Openswan Users] Question about PFS
Patrick Naubert
patrickn at xelerance.com
Sun Oct 21 07:57:55 EDT 2012
Rescued from the Spam bucket. Please remember to register to the mailing list before posting to it.
Begin forwarded message:
From: Sury Bu <bushurui at gmail.com>
Subject: Question about PFS
Date: 21 October, 2012 8:03:05 AM EDT
To: users at lists.openswan.org
Hi, all
In ipsec.conf manual page, it said "Openswan will allow a connection defined with pfs=no to use PFS anyway."
With my understand it means if pfs=no set in our side, then remote side must use PFS.
And if pfs=yes in our side, then remote side can use PFS or not use PFS.
But if I set pfs=yes, when I use ipsec auto --status command, I find the policy will display +PFS+ as below:
000 "ewelltouh": myip=172.16.66.254; hisip=unset;
000 "ewelltouh": ike_life: 28800s; ipsec_life: 3600s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0
000 "ewelltouh": policy: PSK+ENCRYPT+TUNNEL+PFS+UP+IKEv2ALLOW+SAREFTRACK+lKOD+rKOD; prio: 32,32; interface: eth0;
000 "ewelltouh": dpd: action:clear; delay:0; timeout:0;
000 "ewelltouh": newest ISAKMP SA: #0; newest IPsec SA: #0;
000 "ewelltouh": IKE algorithms wanted: AES_CBC(7)_256-SHA1(2)_000-MODP1024(2); flags=-strict
000 "ewelltouh": IKE algorithms found: AES_CBC(7)_256-SHA1(2)_160-MODP1024(2)
000 "ewelltouh": ESP algorithms wanted: AES(12)_256-MD5(1)_000; flags=-strict
000 "ewelltouh": ESP algorithms loaded: AES(12)_256-MD5(1)_128
000
000 #34: "ewelltouh":500 STATE_QUICK_I1 (sent QI1, expecting QR1); EVENT_RETRANSMIT in 11s; lastdpd=-1s(seq in:0 out:0); idle; import:admin initiate
And if I set pfs=no, PFS not appeared anymore, Is the manual page write in wrong way? And if remote side not use PFS, I must set pfs=yes?
000 "ewelltouh": 172.16.66.254/32===115.238.69.227<115.238.69.227>[+S=C]---115.238.69.227...115.238.69.225---202.123.80.227<202.123.80.227>[+S=C]:1/0===192.168.248.78/32; unrouted; eroute owner: #0
000 "ewelltouh": myip=172.16.66.254; hisip=unset;
000 "ewelltouh": ike_life: 28800s; ipsec_life: 3600s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0
000 "ewelltouh": policy: PSK+ENCRYPT+TUNNEL+UP+IKEv2ALLOW+SAREFTRACK+lKOD+rKOD; prio: 32,32; interface: eth0;
000 "ewelltouh": dpd: action:clear; delay:0; timeout:0;
000 "ewelltouh": newest ISAKMP SA: #0; newest IPsec SA: #0;
000 "ewelltouh": IKE algorithms wanted: AES_CBC(7)_256-SHA1(2)_000-MODP1024(2); flags=-strict
000 "ewelltouh": IKE algorithms found: AES_CBC(7)_256-SHA1(2)_160-MODP1024(2)
000 "ewelltouh": ESP algorithms wanted: AES(12)_256-MD5(1)_000; flags=-strict
000 "ewelltouh": ESP algorithms loaded: AES(12)_256-MD5(1)_128
000
000 #2: "ewelltouh":500 STATE_QUICK_I1 (sent QI1, expecting QR1); EVENT_RETRANSMIT in 25s; lastdpd=-1s(seq in:0 out:0); idle; import:admin initiate
000
Thanks,
Sury Bu
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.openswan.org/pipermail/users/attachments/20121021/62d1540c/attachment.html>
More information about the Users
mailing list