Go to file
2024-05-04 00:53:11 +02:00
.gitattributes Sync from SUSE:SLFO:Main strongswan revision c330aa00148b2c1727e83f27b487a6a9 2024-05-04 00:53:11 +02:00
0005-ikev1-Don-t-retransmit-Aggressive-Mode-response.patch Sync from SUSE:SLFO:Main strongswan revision c330aa00148b2c1727e83f27b487a6a9 2024-05-04 00:53:11 +02:00
fips-enforce.conf Sync from SUSE:SLFO:Main strongswan revision c330aa00148b2c1727e83f27b487a6a9 2024-05-04 00:53:11 +02:00
harden_strongswan.service.patch Sync from SUSE:SLFO:Main strongswan revision c330aa00148b2c1727e83f27b487a6a9 2024-05-04 00:53:11 +02:00
README.SUSE Sync from SUSE:SLFO:Main strongswan revision c330aa00148b2c1727e83f27b487a6a9 2024-05-04 00:53:11 +02:00
strongswan_ipsec_service.patch Sync from SUSE:SLFO:Main strongswan revision c330aa00148b2c1727e83f27b487a6a9 2024-05-04 00:53:11 +02:00
strongswan-5.9.12.tar.bz2 Sync from SUSE:SLFO:Main strongswan revision c330aa00148b2c1727e83f27b487a6a9 2024-05-04 00:53:11 +02:00
strongswan-5.9.12.tar.bz2.sig Sync from SUSE:SLFO:Main strongswan revision c330aa00148b2c1727e83f27b487a6a9 2024-05-04 00:53:11 +02:00
strongswan-rpmlintrc Sync from SUSE:SLFO:Main strongswan revision c330aa00148b2c1727e83f27b487a6a9 2024-05-04 00:53:11 +02:00
strongswan.changes Sync from SUSE:SLFO:Main strongswan revision c330aa00148b2c1727e83f27b487a6a9 2024-05-04 00:53:11 +02:00
strongswan.init.in Sync from SUSE:SLFO:Main strongswan revision c330aa00148b2c1727e83f27b487a6a9 2024-05-04 00:53:11 +02:00
strongswan.keyring Sync from SUSE:SLFO:Main strongswan revision c330aa00148b2c1727e83f27b487a6a9 2024-05-04 00:53:11 +02:00
strongswan.spec Sync from SUSE:SLFO:Main strongswan revision c330aa00148b2c1727e83f27b487a6a9 2024-05-04 00:53:11 +02:00

Dear Customer,

please note, that the strongswan release 4.5 changes the keyexchange mode
to IKEv2 as default -- from strongswan-4.5.0/NEWS:
"[...]
IMPORTANT: the default keyexchange mode 'ike' is changing with release 4.5
from 'ikev1' to 'ikev2', thus commemorating the five year anniversary of the
IKEv2 RFC 4306 and its mature successor RFC 5996. The time has definitively
come for IKEv1 to go into retirement and to cede its place to the much more
robust, powerful and versatile IKEv2 protocol!
[...]"

This requires adoption of either the "conn %default" or all other IKEv1
"conn" sections in the /etc/ipsec.conf to use explicit:

	keyexchange=ikev1

The charon daemon in strongswan 5.x versions supports IKEv1 and IKEv2,
thus a separate pluto IKEv1 daemon is not needed / not shipped any more.


The strongswan package does not provide any files except of this README,
but triggers the installation of the charon daemon and the "traditional"
strongswan-ipsec package providing the "ipsec" script and service.
The ipsec.service is an alias link to the "strongswan.service" systemd
service unit and created by "systemctl enable strongswan.service".


There is a new strongswan-nm package with a NetworkManager specific charon-nm
binary controlling the charon daemon through D-Bus and designed to work using
the NetworkManager-strongswan graphical user interface.
It does not depend on the traditional starter scripts, but on the IKEv2
charon daemon and plugins only. 


The stongswan-hmac package provides the fips hmac hash files, a _fipscheck
script and a /etc/strongswan.d/charon/zzz_fips-enforce.conf config file,
which disables all non-openssl algorithm implementations.

When fips operation mode is enabled in the kernel using the fips=1 boot
parameter, the strongswan fips checks are executed in front of any start
action of the "ipsec" script provided by the "strongswan-ipsec" package
and a verification problem causes a failure as required by fips-140-2.
Further, it is not required to enable the fips_mode in the openssl plugin
(/etc/strongswan.d/charon/openssl.conf); the kernel entablement enables
it automatically as needed.

The "ipsec _fipscheck" command allows to execute the fips checks manually
without a check if fips is enabled (/proc/sys/crypto/fips_enabled is 1),
e.g. for testing purposes.


Have a lot of fun...