[Openswan Users] Question about PFS

Sury Bu bushurui at gmail.com
Sun Oct 21 09:37:16 EDT 2012


Hi, Nick

So, If far side proposes no pfs, I must set pfs=no in my side, is it right?


On 2012-10-21 20:54, Nick Howitt wrote:
> No, it is the other way round. If you set pfs=no, then if the far side 
> proposes pfs your side will use pfs anyway. If you set pfs=yes then if 
> the far side proposes no pfs the connection will fail. If you set 
> pfs=yes and the far side proposes pfs then pfs will be used.
>
> Nick
>
> On 21/10/2012 12:57, Patrick Naubert wrote:
>> Rescued from the Spam bucket.  Please remember to register to the 
>> mailing list before posting to it.
>>
>> Begin forwarded message:
>>
>> *From: *Sury Bu <bushurui at gmail.com <mailto:bushurui at gmail.com>>
>> *Subject: **Question about PFS*
>> *Date: *21 October, 2012 8:03:05 AM EDT
>> *To: *users at lists.openswan.org <mailto:users at lists.openswan.org>
>>
>>
>> Hi, all
>>
>> In ipsec.conf manual page, it said "Openswan will allow a connection 
>> defined with pfs=no to use PFS anyway."
>>
>> With my understand it means if pfs=no set in our side, then  remote 
>> side must use PFS.
>>
>> And if pfs=yes in our side, then remote side can use PFS or not use PFS.
>>
>> But if I set pfs=yes, when I use ipsec auto --status command, I find 
>> the policy will display +PFS+ as below:
>> /
>> //000 "ewelltouh":     myip=172.16.66.254; hisip=unset;//
>> //000 "ewelltouh":   ike_life: 28800s; ipsec_life: 3600s; 
>> rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0//
>> //000 "ewelltouh": //policy: 
>> PSK+ENCRYPT+TUNNEL+PFS+UP+IKEv2ALLOW+SAREFTRACK+lKOD+rKOD; prio: 
>> 32,32; interface: eth0;//
>> //000 "ewelltouh":   dpd: action:clear; delay:0; timeout:0;//
>> //000 "ewelltouh":   newest ISAKMP SA: #0; newest IPsec SA: #0;//
>> //000 "ewelltouh":   IKE algorithms wanted: 
>> AES_CBC(7)_256-SHA1(2)_000-MODP1024(2); flags=-strict//
>> //000 "ewelltouh":   IKE algorithms found: 
>> AES_CBC(7)_256-SHA1(2)_160-MODP1024(2)//
>> //000 "ewelltouh":   ESP algorithms wanted: AES(12)_256-MD5(1)_000; 
>> flags=-strict//
>> //000 "ewelltouh":   ESP algorithms loaded: AES(12)_256-MD5(1)_128//
>> //000//
>> //000 #34: "ewelltouh":500 STATE_QUICK_I1 (sent QI1, expecting QR1); 
>> EVENT_RETRANSMIT in 11s; lastdpd=-1s(seq in:0 out:0); idle; 
>> import:admin initiate/
>>
>> And if I set pfs=no, PFS not appeared anymore, Is the manual page 
>> write in wrong way? And if remote side not use PFS, I must set pfs=yes?
>> /
>> //000 "ewelltouh": 
>> 172.16.66.254/32===115.238.69.227<115.238.69.227>[+S=C]---115.238.69.227...115.238.69.225---202.123.80.227<202.123.80.227>[+S=C]:1/0===192.168.248.78/32; 
>> unrouted; eroute owner: #0//
>> //000 "ewelltouh":     myip=172.16.66.254; hisip=unset;//
>> //000 "ewelltouh":   ike_life: 28800s; ipsec_life: 3600s; 
>> rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0//
>> //000 "ewelltouh": //policy: 
>> PSK+ENCRYPT+TUNNEL+UP+IKEv2ALLOW+SAREFTRACK+lKOD+rKOD; prio: 32,32; 
>> interface: eth0;//
>> //000 "ewelltouh":   dpd: action:clear; delay:0; timeout:0;//
>> //000 "ewelltouh":   newest ISAKMP SA: #0; newest IPsec SA: #0;//
>> //000 "ewelltouh":   IKE algorithms wanted: 
>> AES_CBC(7)_256-SHA1(2)_000-MODP1024(2); flags=-strict//
>> //000 "ewelltouh":   IKE algorithms found: 
>> AES_CBC(7)_256-SHA1(2)_160-MODP1024(2)//
>> //000 "ewelltouh":   ESP algorithms wanted: AES(12)_256-MD5(1)_000; 
>> flags=-strict//
>> //000 "ewelltouh":   ESP algorithms loaded: AES(12)_256-MD5(1)_128//
>> //000//
>> //000 #2: "ewelltouh":500 STATE_QUICK_I1 (sent QI1, expecting QR1); 
>> EVENT_RETRANSMIT in 25s; lastdpd=-1s(seq in:0 out:0); idle; 
>> import:admin initiate//
>> //000/
>>
>> Thanks,
>> Sury Bu
>>
>>
>>
>>
>>
>>
>>
>> _______________________________________________
>> Users at lists.openswan.org
>> https://lists.openswan.org/mailman/listinfo/users
>> Micropayments:https://flattr.com/thing/38387/IPsec-for-Linux-made-easy
>> Building and Integrating Virtual Private Networks with Openswan:
>> http://www.amazon.com/gp/product/1904811256/104-3099591-2946327?n=283155
>

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.openswan.org/pipermail/users/attachments/20121021/d8a0f183/attachment-0001.html>


More information about the Users mailing list