[Pkg-swan-devel] Bug#883072: Bug#883072: strongswan-libcharon:	Upgrade to 5.6.1-2 changed cypher proposals,	can't connect to VPN anymore
    Yves-Alexis Perez 
    corsac at debian.org
       
    Wed Nov 29 12:34:24 UTC 2017
    
    
  
On Wed, 2017-11-29 at 10:54 +0100, Luca Niccoli wrote:
> Is there a specific reason the default cipher proposal by
> strongswan doesn't offer aes256-sha256-prfsha256-modp1024 anymore?
> Would it be possible to add it back? 
Hi,
see the first point in https://wiki.strongswan.org/versions/67:
====
    Several algorithms were removed from the default ESP/AH and IKEv2 proposals in compliance with
    RFC 8221 and RFC 8247, respectively. Removed from the default ESP/AH proposal were the
    3DES and Blowfish encryption algorithms and the HMAC-MD5 integrity algorithm. From the IKEv2 default
    proposal the HMAC-MD5 integrity algorithm and the MODP-1024 Diffie-Hellman group were removed (the
    latter is significant for Windows clients in their default configuration).
    These algorithms may still be used in custom proposals.
====
We don't intend to divert from upstream on that (quite the contrary actually),
so no we won't add it back. I'll add a note to NEWS.Debian though, so users
are warned at upgrade time.
Regards,
-- 
Yves-Alexis
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 488 bytes
Desc: This is a digitally signed message part
URL: <http://lists.alioth.debian.org/pipermail/pkg-swan-devel/attachments/20171129/aa478e9d/attachment.sig>
    
    
More information about the Pkg-swan-devel
mailing list