Unlabeled
addresspool
AH
Authentication Header
blocked
Could be waiting on upstream, more information from submitter, ...
bug
build
Building and Installing Libreswan
CAT
Client Address Translation
cleanup
Remove dead feature; refactor code.
connalias
both connalias= and subnets=
connswitch
selecting the initial and then switching to a better connection
CP
IKEv2 Configuration Payload
crossing-streams
when initiator/responder establish simultaneously
crypto
Crypto (typically connected to NSS)
CVE
DDNS
dynamic DNS
documentation
DPD
IKEv1 Dead Peer Detection (RFC3706)
duplicate
EAPTLS
enhancement
ESN
Extended Sequence Numbers
ESP
Encapsulating Security Payload
FIPS
FIPS compliance
FreeBSD
FreeBSD (PF KEY V2, userland, ...)
has workaround
Includes a workaround to problem
IKE_INTERMEDIATE
IKE Intermediate Exchange (RFC 9370)
IKEv1
IKEv2
INITIAL_CONTACT
initiate
invalid
IP-TFS
RFC 9347: IP Traffic Flow Security
IPCOMP
IP Compression
ipsec.conf
including addconn and connection.c's add_connection()
IPsec Interface
aka ipsec-interface; Linux VTI, XFRMI; BSD ipsecif, ipsec_if, sec
IPv4
IP Version 4
IPv6
Stuff that happens with IPv6 (but presumably not IPv4)
kernel
Code manipulating kernel policy/state (generic and kernel specific)
l2tp
Level 2 Transport Protocol wiht PPP auth
letsencrypt
ipsec letsencrypt command
linux
Linux, notably the XFRM(I) kernel interface
logging
MOBIKE
RFC 4555 IKEv2 Mobility and Multihoming Protocol aka MOBIKE
NAT
Network Address Translation
need-info
waiting on additional information
NetBSD
NetBSD (PF KEY V2, userland, ...)
nftables
OE
Opportunistic Encryption - where initiator instantiates group
offload
ondemand
OpenBSD
orient
getting a connection and interface to align
packaging
packaging related, eg for linux/bsd distributions
PPK
Post-quantum Pre-shared Keys
question
reauth
an established +UP connection needs to re-authenticate
REDIRECT
IKEv2 Redirect Mechanism (RFC 5685)
regression
Functionality that was tested and working.
rekey
an established +UP connection's state needs to refresh its keying material
releng
Release Engineering
replay-window
reproduced
a test reproducing the problem has been added to the testsuite
revival
a +UP connection dies or is deleted
RFC
RFC compliance
rhc
Refine Host Connection using AUTH payload
roadwarrior
on responder initiator is %any so instantiates a template
routing
SECLABEL
Labeled IPsec per RFC 9478; aka sec_label
SOC
Good Project for Summer-Of-Code
TCP
TCP protocol
test framework
problems with the test framework (KVM, NS, WWW, ...)
TS
Traffic Selectors
UDP
UI
user interface / usability
untested
lacks test demonstrating issue in the testsuite
updown
upstream
The problem is in code we depend on
user discussion
v3.10
v3.22
v3.23
v3.25
v3.27
v3.29
v3.32
v4.0
v4.1
v4.2
v4.3
v4.4
v4.5
v4.6
v4.7
v4.8
v4.9
v4.10
v4.11
v4.12
v4.13
v4.14
v4.15
v5.0rc1
v5.0 release candidate 1
v5.0rc2
v5.0 release candidate 2
v5.0
v5.1
Vendor ID
IKEv1 VID; IKEv2 V
vMAIN
web
web pages
whack
ipsec [whack] ... commands
wontfix
X.509
No labels found. Sorry about that.