-
Notifications
You must be signed in to change notification settings - Fork 759
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
ipsec: support multiple phase 1 proposals #1852
Comments
|
This would be very nice feature since it guarantuees compatibility to older and newer clients. Then older clients would negotiate lower encryption: |
|
https://forum.opnsense.org/index.php?topic=6544.0 This could fit the thing with "!" .. a button "Disable strict policy" would be nice. |
|
For me it seems if the other endpoint has multiple offers and the first one doesn't match, the connections fails (see newest reply in forum). If the "!" is removed it tries the next one and so one. So I'd still suggest a new Checkbox "Disable strict policy" to remove it (default unchecked). It's a compatibilty enhancement for devices supporting multiple values for P1 and P2 like ASA. |
|
This would be nice, since I have to configure both Android 8 and Windows 10 roadwarrior clients, which is not possible, since there is no configuration that both support. |
|
I'm also fighting ATM since Android 7 only support 1024 PFS in P1 and Mac requires 2048. Some months ago I opened an issue to add a checkbox which would just remove the |
|
@mimugmail first part in 037a92f -- it only works in IKEv2, IKEv1 only takes the first and maybe we should warn users in the GUI about this. The enc algo modelling is less flexible and we need glue to bring it all together but we'll have a solution for 19.1 in any case. :) Please test! |
|
@mimugmail 36cde51 job done? :D |
|
This looks great!! Thanks! :) |
|
Hmm, we could reverse the write order, assuming that the values are filled from smallest to highest, but it's somewhat dependent on the browser. |
|
Legacy code doesn't support ordering so we could order from config.xml to ipsec.conf? |
|
The issue is that in the current modelling it supported only one entry, so there is no order by intention... now that we can choose multiple values we're left to guess what the best order is. 2 hashes and 2 dh groups are 4 combinations and even if we order by both hashes and dh groups from best to worst we have a middle gap where order is subject to interpretation due to the inner and outer loop. I'll add a final reverse, but that's as far as we can go before rewriting the entire handling of ike and esp entries. |
|
@mimugmail see c1c27c3 -- do we still want overrides for "!" or close as is? I'd add them only if strictly needed. |
|
Thanks, I'll test. But for this I'd left P2 untouched (which also has wrong ordering regarding hash) since it could break existing setups |
|
I haven't changed P2 other than changing the hash checkboxes to a selectpicker for unified style. |
|
Ok, works perfect. Tested with Andoid, before the patch both devices were DH1024, now Android is DH1024 and iPAD is at DH2048, so, working as expected with highest security available 👍 |
|
Ok, close? |
|
Close, thanks 🥇 |
|
Pew pew! |
Goal is to have single phase 1 compatibility with multiple mobile platforms.
Hash algos as selectpickers with multiple values phase1/2Dh groups as selectpickers with multiple values phase1The text was updated successfully, but these errors were encountered: