aboutsummaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorMartin Willi <martin@strongswan.org>2006-05-18 06:02:28 +0000
committerMartin Willi <martin@strongswan.org>2006-05-18 06:02:28 +0000
commitb5e1560659f9e7e74299077c1456c29065dbb4c9 (patch)
tree40b8e86f26c2879166e6a05b86e682b0eafcd893
parent1e93135408e9810cc10b2b10395b508d687bc819 (diff)
downloadstrongswan-b5e1560659f9e7e74299077c1456c29065dbb4c9.tar.bz2
strongswan-b5e1560659f9e7e74299077c1456c29065dbb4c9.tar.xz
- applied andreas's patch
- logger output improvements - testin gupdates - and a lot more
-rw-r--r--configure.in2
-rw-r--r--src/charon/config/connections/local_connection_store.c97
-rw-r--r--src/charon/network/socket.c8
-rw-r--r--src/charon/sa/ike_sa_manager.c6
-rw-r--r--src/charon/threads/receiver.c2
-rw-r--r--src/charon/threads/scheduler.c2
-rw-r--r--src/charon/threads/sender.c2
-rwxr-xr-xsrc/charon/threads/stroke_interface.c15
-rw-r--r--src/charon/threads/thread_pool.c4
-rw-r--r--src/libstrongswan/Makefile.am2
-rw-r--r--src/libstrongswan/utils/host.c24
-rw-r--r--src/libstrongswan/utils/host.h2
-rw-r--r--src/libstrongswan/utils/logger.c10
-rw-r--r--src/libstrongswan/utils/logger_manager.c16
-rw-r--r--src/pluto/fetch.c6
-rw-r--r--src/pluto/vendor.c5
-rw-r--r--src/pluto/vendor.h3
-rw-r--r--src/starter/starterstroke.c197
-rw-r--r--src/stroke/Makefile.am1
-rw-r--r--src/whack/Makefile.am2
-rwxr-xr-xtesting/hosts/alice/etc/ipsec.conf1
-rwxr-xr-xtesting/hosts/bob/etc/ipsec.conf1
-rwxr-xr-xtesting/hosts/carol/etc/ipsec.conf1
-rwxr-xr-xtesting/hosts/dave/etc/ipsec.conf1
-rwxr-xr-xtesting/hosts/moon/etc/ipsec.conf7
-rwxr-xr-xtesting/hosts/sun/etc/ipsec.conf1
-rwxr-xr-xtesting/hosts/venus/etc/ipsec.conf1
-rwxr-xr-xtesting/testing.conf4
-rwxr-xr-xtesting/tests/alg-blowfish/hosts/carol/etc/ipsec.conf1
-rwxr-xr-xtesting/tests/alg-blowfish/hosts/moon/etc/ipsec.conf1
-rwxr-xr-xtesting/tests/alg-serpent/hosts/carol/etc/ipsec.conf1
-rwxr-xr-xtesting/tests/alg-serpent/hosts/moon/etc/ipsec.conf3
-rwxr-xr-xtesting/tests/alg-sha2_256/hosts/carol/etc/ipsec.conf1
-rwxr-xr-xtesting/tests/alg-sha2_256/hosts/moon/etc/ipsec.conf1
-rwxr-xr-xtesting/tests/alg-twofish/hosts/carol/etc/ipsec.conf1
-rwxr-xr-xtesting/tests/alg-twofish/hosts/moon/etc/ipsec.conf1
-rwxr-xr-xtesting/tests/attr-cert/hosts/carol/etc/ipsec.conf1
-rwxr-xr-xtesting/tests/attr-cert/hosts/dave/etc/ipsec.conf1
-rwxr-xr-xtesting/tests/attr-cert/hosts/moon/etc/ipsec.conf1
-rwxr-xr-xtesting/tests/compress/hosts/carol/etc/ipsec.conf1
-rwxr-xr-xtesting/tests/compress/hosts/moon/etc/ipsec.conf1
-rwxr-xr-xtesting/tests/crl-from-cache/hosts/carol/etc/ipsec.conf1
-rwxr-xr-xtesting/tests/crl-from-cache/hosts/moon/etc/ipsec.conf1
-rwxr-xr-xtesting/tests/crl-ldap/hosts/carol/etc/ipsec.conf1
-rwxr-xr-xtesting/tests/crl-ldap/hosts/moon/etc/ipsec.conf1
-rwxr-xr-xtesting/tests/crl-revoked/hosts/carol/etc/ipsec.conf1
-rwxr-xr-xtesting/tests/crl-revoked/hosts/moon/etc/ipsec.conf1
-rwxr-xr-xtesting/tests/crl-strict/hosts/carol/etc/ipsec.conf1
-rwxr-xr-xtesting/tests/crl-strict/hosts/moon/etc/ipsec.conf1
-rwxr-xr-xtesting/tests/crl-to-cache/hosts/carol/etc/ipsec.conf1
-rwxr-xr-xtesting/tests/crl-to-cache/hosts/moon/etc/ipsec.conf1
-rwxr-xr-xtesting/tests/default-keys/hosts/carol/etc/ipsec.conf1
-rwxr-xr-xtesting/tests/default-keys/hosts/moon/etc/ipsec.conf3
-rwxr-xr-xtesting/tests/double-nat-net/hosts/alice/etc/ipsec.conf1
-rwxr-xr-xtesting/tests/double-nat-net/hosts/bob/etc/ipsec.conf1
-rwxr-xr-xtesting/tests/double-nat/hosts/alice/etc/ipsec.conf1
-rwxr-xr-xtesting/tests/dpd-clear/hosts/moon/etc/ipsec.conf1
-rwxr-xr-xtesting/tests/esp-ah-transport/hosts/carol/etc/ipsec.conf1
-rwxr-xr-xtesting/tests/esp-ah-transport/hosts/moon/etc/ipsec.conf1
-rwxr-xr-xtesting/tests/esp-ah-tunnel/hosts/carol/etc/ipsec.conf1
-rwxr-xr-xtesting/tests/esp-ah-tunnel/hosts/moon/etc/ipsec.conf1
-rwxr-xr-xtesting/tests/esp-alg-des/hosts/carol/etc/ipsec.conf1
-rwxr-xr-xtesting/tests/esp-alg-des/hosts/moon/etc/ipsec.conf1
-rwxr-xr-xtesting/tests/esp-alg-null/hosts/carol/etc/ipsec.conf1
-rwxr-xr-xtesting/tests/esp-alg-null/hosts/moon/etc/ipsec.conf1
-rwxr-xr-xtesting/tests/esp-alg-strict-fail/hosts/carol/etc/ipsec.conf1
-rwxr-xr-xtesting/tests/esp-alg-strict-fail/hosts/moon/etc/ipsec.conf1
-rwxr-xr-xtesting/tests/esp-alg-strict/hosts/carol/etc/ipsec.conf1
-rwxr-xr-xtesting/tests/esp-alg-strict/hosts/moon/etc/ipsec.conf1
-rwxr-xr-xtesting/tests/esp-alg-weak/hosts/carol/etc/ipsec.conf1
-rwxr-xr-xtesting/tests/esp-alg-weak/hosts/moon/etc/ipsec.conf1
-rwxr-xr-xtesting/tests/host2host-swapped/hosts/moon/etc/ipsec.conf1
-rwxr-xr-xtesting/tests/host2host-swapped/hosts/sun/etc/ipsec.conf1
-rwxr-xr-xtesting/tests/host2host-transport/hosts/moon/etc/ipsec.conf1
-rwxr-xr-xtesting/tests/host2host-transport/hosts/sun/etc/ipsec.conf1
-rwxr-xr-xtesting/tests/ike-alg-sha2_512/hosts/carol/etc/ipsec.conf1
-rwxr-xr-xtesting/tests/ike-alg-sha2_512/hosts/moon/etc/ipsec.conf1
-rwxr-xr-xtesting/tests/ike-alg-strict-fail/hosts/carol/etc/ipsec.conf1
-rwxr-xr-xtesting/tests/ike-alg-strict-fail/hosts/moon/etc/ipsec.conf1
-rwxr-xr-xtesting/tests/ike-alg-strict/hosts/carol/etc/ipsec.conf1
-rwxr-xr-xtesting/tests/ike-alg-strict/hosts/moon/etc/ipsec.conf1
-rw-r--r--testing/tests/ikev2-net2net/description.txt2
-rw-r--r--testing/tests/ikev2-net2net/hosts/moon/etc/ipsec.conf4
-rw-r--r--testing/tests/ikev2-net2net/hosts/sun/etc/ipsec.conf4
-rwxr-xr-xtesting/tests/mode-config-swapped/hosts/carol/etc/ipsec.conf1
-rwxr-xr-xtesting/tests/mode-config-swapped/hosts/dave/etc/ipsec.conf1
-rwxr-xr-xtesting/tests/mode-config-swapped/hosts/moon/etc/ipsec.conf1
-rwxr-xr-xtesting/tests/mode-config/hosts/carol/etc/ipsec.conf1
-rwxr-xr-xtesting/tests/mode-config/hosts/dave/etc/ipsec.conf1
-rwxr-xr-xtesting/tests/mode-config/hosts/moon/etc/ipsec.conf1
-rwxr-xr-xtesting/tests/multi-level-ca-ldap/hosts/carol/etc/ipsec.conf1
-rwxr-xr-xtesting/tests/multi-level-ca-ldap/hosts/dave/etc/ipsec.conf1
-rwxr-xr-xtesting/tests/multi-level-ca-ldap/hosts/moon/etc/ipsec.conf1
-rwxr-xr-xtesting/tests/multi-level-ca-loop/hosts/carol/etc/ipsec.conf1
-rwxr-xr-xtesting/tests/multi-level-ca-loop/hosts/moon/etc/ipsec.conf1
-rwxr-xr-xtesting/tests/multi-level-ca-revoked/hosts/carol/etc/ipsec.conf1
-rwxr-xr-xtesting/tests/multi-level-ca-revoked/hosts/moon/etc/ipsec.conf1
-rwxr-xr-xtesting/tests/multi-level-ca-strict/hosts/carol/etc/ipsec.conf1
-rwxr-xr-xtesting/tests/multi-level-ca-strict/hosts/dave/etc/ipsec.conf1
-rwxr-xr-xtesting/tests/multi-level-ca-strict/hosts/moon/etc/ipsec.conf1
-rwxr-xr-xtesting/tests/multi-level-ca/hosts/carol/etc/ipsec.conf1
-rwxr-xr-xtesting/tests/multi-level-ca/hosts/dave/etc/ipsec.conf1
-rwxr-xr-xtesting/tests/multi-level-ca/hosts/moon/etc/ipsec.conf1
-rwxr-xr-xtesting/tests/net2net-pgp/hosts/moon/etc/ipsec.conf1
-rwxr-xr-xtesting/tests/net2net-pgp/hosts/sun/etc/ipsec.conf1
-rwxr-xr-xtesting/tests/net2net-psk-fail/hosts/moon/etc/ipsec.conf1
-rwxr-xr-xtesting/tests/net2net-psk-fail/hosts/sun/etc/ipsec.conf1
-rwxr-xr-xtesting/tests/net2net-psk/hosts/moon/etc/ipsec.conf1
-rwxr-xr-xtesting/tests/net2net-psk/hosts/sun/etc/ipsec.conf1
-rwxr-xr-xtesting/tests/net2net-route/hosts/moon/etc/ipsec.conf1
-rwxr-xr-xtesting/tests/net2net-rsa/hosts/moon/etc/ipsec.conf1
-rwxr-xr-xtesting/tests/net2net-rsa/hosts/sun/etc/ipsec.conf1
-rwxr-xr-xtesting/tests/net2net-start/hosts/moon/etc/ipsec.conf1
-rwxr-xr-xtesting/tests/ocsp-revoked/hosts/carol/etc/ipsec.conf1
-rwxr-xr-xtesting/tests/ocsp-revoked/hosts/moon/etc/ipsec.conf1
-rwxr-xr-xtesting/tests/ocsp-strict/hosts/carol/etc/ipsec.conf1
-rwxr-xr-xtesting/tests/ocsp-strict/hosts/moon/etc/ipsec.conf1
-rwxr-xr-xtesting/tests/protoport-dual/hosts/carol/etc/ipsec.conf1
-rwxr-xr-xtesting/tests/protoport-dual/hosts/moon/etc/ipsec.conf1
-rwxr-xr-xtesting/tests/protoport-pass/hosts/carol/etc/ipsec.conf1
-rwxr-xr-xtesting/tests/protoport-pass/hosts/moon/etc/ipsec.conf1
-rwxr-xr-xtesting/tests/protoport-route/hosts/carol/etc/ipsec.conf1
-rwxr-xr-xtesting/tests/protoport-route/hosts/moon/etc/ipsec.conf1
-rwxr-xr-xtesting/tests/req-pkcs10/hosts/carol/etc/ipsec.conf1
-rwxr-xr-xtesting/tests/rw-psk-fqdn-named/hosts/carol/etc/ipsec.conf1
-rwxr-xr-xtesting/tests/rw-psk-fqdn-named/hosts/moon/etc/ipsec.conf1
-rwxr-xr-xtesting/tests/rw-psk-fqdn/hosts/carol/etc/ipsec.conf1
-rwxr-xr-xtesting/tests/rw-psk-fqdn/hosts/moon/etc/ipsec.conf1
-rwxr-xr-xtesting/tests/rw-psk-ipv4/hosts/carol/etc/ipsec.conf1
-rwxr-xr-xtesting/tests/rw-psk-ipv4/hosts/moon/etc/ipsec.conf1
-rwxr-xr-xtesting/tests/rw-psk-no-policy/hosts/carol/etc/ipsec.conf1
-rwxr-xr-xtesting/tests/rw-psk-no-policy/hosts/moon/etc/ipsec.conf1
-rwxr-xr-xtesting/tests/rw-psk-rsa-mixed/hosts/carol/etc/ipsec.conf1
-rwxr-xr-xtesting/tests/rw-psk-rsa-mixed/hosts/moon/etc/ipsec.conf1
-rwxr-xr-xtesting/tests/self-signed/hosts/carol/etc/ipsec.conf1
-rwxr-xr-xtesting/tests/self-signed/hosts/moon/etc/ipsec.conf3
-rwxr-xr-xtesting/tests/starter-also-loop/hosts/moon/etc/ipsec.conf5
-rwxr-xr-xtesting/tests/starter-also/hosts/moon/etc/ipsec.conf5
-rwxr-xr-xtesting/tests/starter-includes/hosts/carol/etc/ipsec.conf1
-rwxr-xr-xtesting/tests/starter-includes/hosts/dave/etc/ipsec.conf1
-rwxr-xr-xtesting/tests/starter-includes/hosts/moon/etc/ipsec.conf1
-rwxr-xr-xtesting/tests/virtual-ip-swapped/hosts/carol/etc/ipsec.conf1
-rwxr-xr-xtesting/tests/virtual-ip-swapped/hosts/moon/etc/ipsec.conf1
-rwxr-xr-xtesting/tests/virtual-ip/hosts/carol/etc/ipsec.conf1
-rwxr-xr-xtesting/tests/virtual-ip/hosts/moon/etc/ipsec.conf1
-rwxr-xr-xtesting/tests/wildcards/hosts/carol/etc/ipsec.conf1
-rwxr-xr-xtesting/tests/wildcards/hosts/dave/etc/ipsec.conf1
-rwxr-xr-xtesting/tests/wildcards/hosts/moon/etc/ipsec.conf1
-rwxr-xr-xtesting/tests/wlan/hosts/alice/etc/ipsec.conf1
-rwxr-xr-xtesting/tests/wlan/hosts/moon/etc/ipsec.conf1
-rwxr-xr-xtesting/tests/wlan/hosts/venus/etc/ipsec.conf1
151 files changed, 356 insertions, 211 deletions
diff --git a/configure.in b/configure.in
index 9a610f623..e9d6f19c0 100644
--- a/configure.in
+++ b/configure.in
@@ -16,7 +16,7 @@ dnl ===========================
dnl initialize & set some vars
dnl ===========================
-AC_INIT(strongSwan,4.0.0)
+AC_INIT(strongSwan,4.0.1)
AM_INIT_AUTOMAKE
AC_C_BIGENDIAN
AC_SUBST(ipsecdir, '${libexecdir}/ipsec')
diff --git a/src/charon/config/connections/local_connection_store.c b/src/charon/config/connections/local_connection_store.c
index 0ae18e0a7..a7e4d18f1 100644
--- a/src/charon/config/connections/local_connection_store.c
+++ b/src/charon/config/connections/local_connection_store.c
@@ -57,69 +57,84 @@ struct private_local_connection_store_t {
*/
static connection_t *get_connection_by_hosts(private_local_connection_store_t *this, host_t *my_host, host_t *other_host)
{
+ typedef enum {
+ PRIO_UNDEFINED= 0x00,
+ PRIO_ADDR_ANY= 0x01,
+ PRIO_ADDR_MATCH= 0x02
+ } prio_t;
+
+ prio_t best_prio = PRIO_UNDEFINED;
+
iterator_t *iterator;
- connection_t *current, *found = NULL;
+ connection_t *candidate;
+ connection_t *found = NULL;
- this->logger->log(this->logger, CONTROL|LEVEL1, "getting config for hosts %s - %s",
+ this->logger->log(this->logger, CONTROL|LEVEL1, "searching connection for host pair %s...%s",
my_host->get_address(my_host), other_host->get_address(other_host));
-
+
iterator = this->connections->create_iterator(this->connections, TRUE);
+
+ /* determine closest matching connection */
while (iterator->has_next(iterator))
{
- host_t *config_my_host, *config_other_host;
+ host_t *candidate_my_host;
+ host_t *candidate_other_host;
- iterator->current(iterator, (void**)&current);
+ iterator->current(iterator, (void**)&candidate);
- config_my_host = current->get_my_host(current);
- config_other_host = current->get_other_host(current);
+ candidate_my_host = candidate->get_my_host(candidate);
+ candidate_other_host = candidate->get_other_host(candidate);
- /* first check if ip is equal */
- if(config_other_host->ip_equals(config_other_host, other_host))
+ /* my_host addresses must match*/
+ if (my_host->ip_equals(my_host, candidate_my_host))
{
- this->logger->log(this->logger, CONTROL|LEVEL2, "config entry with remote host %s",
- config_other_host->get_address(config_other_host));
- /* could be right one, check my_host for default route*/
- if (config_my_host->is_default_route(config_my_host))
+ prio_t prio = PRIO_UNDEFINED;
+
+ /* exact match of peer host address or wildcard address? */
+ if (other_host->ip_equals(other_host, candidate_other_host))
{
- found = current->clone(current);
- break;
+ prio |= PRIO_ADDR_MATCH;
}
- /* check now if host informations are the same */
- else if (config_my_host->ip_equals(config_my_host,my_host))
+ else if (candidate_other_host->is_anyaddr(candidate_other_host))
{
- found = current->clone(current);
- break;
+ prio |= PRIO_ADDR_ANY;
}
-
- }
- /* Then check for wildcard hosts!
- * TODO
- * actually its only checked if other host with default route can be found! */
- else if (config_other_host->is_default_route(config_other_host))
- {
- /* could be right one, check my_host for default route*/
- if (config_my_host->is_default_route(config_my_host))
- {
- found = current->clone(current);
- break;
- }
- /* check now if host informations are the same */
- else if (config_my_host->ip_equals(config_my_host,my_host))
+
+ this->logger->log(this->logger, CONTROL|LEVEL2,
+ "candidate connection \"%s\": %s...%s (prio=%d)",
+ candidate->get_name(candidate),
+ candidate_my_host->get_address(candidate_my_host),
+ candidate_other_host->get_address(candidate_other_host),
+ prio);
+
+ if (prio > best_prio)
{
- found = current->clone(current);
- break;
- }
+ found = candidate;
+ best_prio = prio;
+ }
}
}
iterator->destroy(iterator);
- /* apply hosts as they are supplied since my_host may be %defaultroute, and other_host may be %any. */
if (found)
{
- found->update_my_host(found, my_host->clone(my_host));
- found->update_other_host(found, other_host->clone(other_host));
+ host_t *found_my_host = found->get_my_host(found);
+ host_t *found_other_host = found->get_other_host(found);
+
+ this->logger->log(this->logger, CONTROL|LEVEL1,
+ "found matching connection \"%s\": %s...%s (prio=%d)",
+ found->get_name(found),
+ found_my_host->get_address(found_my_host),
+ found_other_host->get_address(found_other_host),
+ best_prio);
+
+ found = found->clone(found);
+ if (best_prio & PRIO_ADDR_ANY)
+ {
+ /* replace %any by the peer's address */
+ found->update_other_host(found, other_host->clone(other_host));
+ }
}
-
return found;
}
diff --git a/src/charon/network/socket.c b/src/charon/network/socket.c
index 4193e6fd8..89f67c964 100644
--- a/src/charon/network/socket.c
+++ b/src/charon/network/socket.c
@@ -390,11 +390,9 @@ static bool is_listening_on(private_socket_t *this, host_t *host)
{
iterator_t *iterator;
- /* listening on 0.0.0.0 is always TRUE */
- if (host->is_default_route(host))
- {
- return TRUE;
- }
+ /* listening on wildcard 0.0.0.0 is always FALSE */
+ if (host->is_anyaddr(host))
+ return FALSE;
/* compare host with all interfaces */
iterator = this->interfaces->create_iterator(this->interfaces, TRUE);
diff --git a/src/charon/sa/ike_sa_manager.c b/src/charon/sa/ike_sa_manager.c
index a65f41042..e6c8e4982 100644
--- a/src/charon/sa/ike_sa_manager.c
+++ b/src/charon/sa/ike_sa_manager.c
@@ -507,9 +507,9 @@ static status_t checkout_by_hosts(private_ike_sa_manager_t *this, host_t *me, ho
sa_other = current->ike_sa->get_other_host(current->ike_sa);
/* one end may be default/any, but not both */
- if (me->is_default_route(me))
+ if (me->is_anyaddr(me))
{
- if (other->is_default_route(other))
+ if (other->is_anyaddr(other))
{
break;
}
@@ -519,7 +519,7 @@ static status_t checkout_by_hosts(private_ike_sa_manager_t *this, host_t *me, ho
ike_sa_id = current->ike_sa_id;
}
}
- else if (other->is_default_route(other))
+ else if (other->is_anyaddr(other))
{
if (me->equals(me, sa_me))
{
diff --git a/src/charon/threads/receiver.c b/src/charon/threads/receiver.c
index 0cf8b7bde..598657724 100644
--- a/src/charon/threads/receiver.c
+++ b/src/charon/threads/receiver.c
@@ -74,7 +74,7 @@ static void receive_packets(private_receiver_t * this)
/* cancellation disabled by default */
pthread_setcancelstate(PTHREAD_CANCEL_DISABLE, NULL);
- this->logger->log(this->logger, CONTROL, "Receiver thread running, thread_id %u", (int)pthread_self());
+ this->logger->log(this->logger, CONTROL, "receiver thread running, thread_ID: %06d", (int)pthread_self());
while (1)
{
diff --git a/src/charon/threads/scheduler.c b/src/charon/threads/scheduler.c
index 47c5d6fb9..9bbe5c9b9 100644
--- a/src/charon/threads/scheduler.c
+++ b/src/charon/threads/scheduler.c
@@ -72,7 +72,7 @@ static void get_events(private_scheduler_t * this)
/* cancellation disabled by default */
pthread_setcancelstate(PTHREAD_CANCEL_DISABLE, NULL);
- this->logger->log(this->logger, CONTROL, "Scheduler thread running, thread_id %u", (int)pthread_self());
+ this->logger->log(this->logger, CONTROL, "scheduler thread running, thread_ID: %06d", (int)pthread_self());
for (;;)
{
diff --git a/src/charon/threads/sender.c b/src/charon/threads/sender.c
index 42d11beb9..4f5f7e117 100644
--- a/src/charon/threads/sender.c
+++ b/src/charon/threads/sender.c
@@ -73,7 +73,7 @@ static void send_packets(private_sender_t * this)
/* cancellation disabled by default */
pthread_setcancelstate(PTHREAD_CANCEL_DISABLE, NULL);
- this->logger->log(this->logger, CONTROL, "Sender thread running, thread_id %u", (int)pthread_self());
+ this->logger->log(this->logger, CONTROL, "sender thread running, thread_ID: %06d", (int)pthread_self());
while (1)
{
diff --git a/src/charon/threads/stroke_interface.c b/src/charon/threads/stroke_interface.c
index a9c55673b..f8db7ad8e 100755
--- a/src/charon/threads/stroke_interface.c
+++ b/src/charon/threads/stroke_interface.c
@@ -240,9 +240,6 @@ static void stroke_add_conn(private_stroke_t *this, stroke_msg_t *msg)
my_id = cert->get_subject(cert);
my_id = my_id->clone(my_id);
cert->destroy(cert);
- this->logger->log(this->logger, CONTROL,
- "valid certificate with ID \"%s\"",
- my_id->get_string(my_id));
}
}
if (msg->add_conn.other.cert)
@@ -256,9 +253,6 @@ static void stroke_add_conn(private_stroke_t *this, stroke_msg_t *msg)
other_id = cert->get_subject(cert);
other_id = other_id->clone(other_id);
cert->destroy(cert);
- this->logger->log(this->logger, CONTROL,
- "valid certificate with ID \"%s\"",
- other_id->get_string(other_id));
}
}
@@ -278,8 +272,15 @@ static void stroke_add_conn(private_stroke_t *this, stroke_msg_t *msg)
proposal->add_algorithm(proposal, PROTO_IKE, DIFFIE_HELLMAN_GROUP, MODP_4096_BIT, 0);
proposal->add_algorithm(proposal, PROTO_IKE, DIFFIE_HELLMAN_GROUP, MODP_8192_BIT, 0);
connection->add_proposal(connection, proposal);
+
/* add to global connection list */
charon->connections->add_connection(charon->connections, connection);
+ this->logger->log(this->logger, CONTROL, "added connection \"%s\": %s[%s]...%s[%s]",
+ msg->add_conn.name,
+ my_host->get_address(my_host),
+ my_id->get_string(my_id),
+ other_host->get_address(other_host),
+ other_id->get_string(other_id));
policy = policy_create(my_id, other_id);
proposal = proposal_create(1);
@@ -289,10 +290,10 @@ static void stroke_add_conn(private_stroke_t *this, stroke_msg_t *msg)
policy->add_proposal(policy, proposal);
policy->add_my_traffic_selector(policy, my_ts);
policy->add_other_traffic_selector(policy, other_ts);
+
/* add to global policy list */
charon->policies->add_policy(charon->policies, policy);
- this->stroke_logger->log(this->stroke_logger, CONTROL|LEVEL1, "connection \"%s\" added", msg->add_conn.name);
}
/**
diff --git a/src/charon/threads/thread_pool.c b/src/charon/threads/thread_pool.c
index 4482e795f..0a39c2e9e 100644
--- a/src/charon/threads/thread_pool.c
+++ b/src/charon/threads/thread_pool.c
@@ -144,7 +144,7 @@ static void process_jobs(private_thread_pool_t *this)
/* cancellation disabled by default */
pthread_setcancelstate(PTHREAD_CANCEL_DISABLE, NULL);
- this->worker_logger->log(this->worker_logger, CONTROL, "Worker thread running, thread_id: %u", (int)pthread_self());
+ this->worker_logger->log(this->worker_logger, CONTROL, "worker thread running, thread_ID: %06d", (int)pthread_self());
for (;;) {
@@ -600,7 +600,7 @@ thread_pool_t *thread_pool_create(size_t pool_size)
{
if (pthread_create(&(this->threads[current]), NULL, (void*(*)(void*))this->process_jobs, this) == 0)
{
- this->pool_logger->log(this->pool_logger, CONTROL, "Created worker thread #%d", current+1);
+ this->pool_logger->log(this->pool_logger, CONTROL, "created worker thread #%d", current+1);
}
else
{
diff --git a/src/libstrongswan/Makefile.am b/src/libstrongswan/Makefile.am
index e9827a860..85e6e97b6 100644
--- a/src/libstrongswan/Makefile.am
+++ b/src/libstrongswan/Makefile.am
@@ -65,7 +65,7 @@ library.c \
types.c \
library.h
-LDADD = -lgmp -lpthread
+libstrongswan_la_LIBADD = -lgmp -lpthread
INCLUDES = -I$(top_srcdir)/src/libstrongswan
EXTRA_DIST = asn1/oid.txt asn1/oid.pl
diff --git a/src/libstrongswan/utils/host.c b/src/libstrongswan/utils/host.c
index b85dc07a5..53b69328a 100644
--- a/src/libstrongswan/utils/host.c
+++ b/src/libstrongswan/utils/host.c
@@ -77,21 +77,17 @@ static socklen_t *get_sockaddr_len(private_host_t *this)
}
/**
- * Implementation of host_t.is_default_route.
+ * Implementation of host_t.is_anyaddr.
*/
-static bool is_default_route (private_host_t *this)
+static bool is_anyaddr(private_host_t *this)
{
switch (this->family)
{
case AF_INET:
{
- static u_int8_t default_route[4] = {0x00,0x00,0x00,0x00};
+ static u_int8_t default_route[4] = {0x00, 0x00, 0x00, 0x00};
- if (memcmp(default_route,&(this->address4.sin_addr.s_addr),4) == 0)
- {
- return TRUE;
- }
- return FALSE;
+ return !memcmp(default_route, &(this->address4.sin_addr.s_addr), 4);
}
default:
{
@@ -114,10 +110,12 @@ static char *get_address(private_host_t *this)
/* we need to clone it, since inet_ntoa overwrites
* internal buffer on subsequent calls
*/
- free(this->string);
- string = inet_ntoa(this->address4.sin_addr);
- this->string = malloc(strlen(string)+1);
- strcpy(this->string, string);
+ if (this->string == NULL)
+ {
+ string = is_anyaddr(this)? "%any" : inet_ntoa(this->address4.sin_addr);
+ this->string = malloc(strlen(string)+1);
+ strcpy(this->string, string);
+ }
return this->string;
}
default:
@@ -275,7 +273,7 @@ static private_host_t *host_create_empty(void)
this->public.get_port = (u_int16_t (*) (host_t *))get_port;
this->public.ip_equals = (bool (*) (host_t *,host_t *)) ip_equals;
this->public.equals = (bool (*) (host_t *,host_t *)) equals;
- this->public.is_default_route = (bool (*) (host_t *)) is_default_route;
+ this->public.is_anyaddr = (bool (*) (host_t *)) is_anyaddr;
this->public.destroy = (void (*) (host_t*))destroy;
this->string = NULL;
diff --git a/src/libstrongswan/utils/host.h b/src/libstrongswan/utils/host.h
index d81efffa6..0ca7d5738 100644
--- a/src/libstrongswan/utils/host.h
+++ b/src/libstrongswan/utils/host.h
@@ -126,7 +126,7 @@ struct host_t {
* - TRUE if host has IP 0.0.0.0 for default route
* - FALSE otherwise
*/
- bool (*is_default_route) (host_t *this);
+ bool (*is_anyaddr) (host_t *this);
/**
* @brief get the address of this host as chunk_t
diff --git a/src/libstrongswan/utils/logger.c b/src/libstrongswan/utils/logger.c
index 151fbfd50..728892b17 100644
--- a/src/libstrongswan/utils/logger.c
+++ b/src/libstrongswan/utils/logger.c
@@ -122,9 +122,9 @@ static void prepend_prefix(private_logger_t *this, log_level_t loglevel, const c
if (this->log_thread_id)
{
- snprintf(thread_id, sizeof(thread_id), " @%d", (int)pthread_self());
+ snprintf(thread_id, sizeof(thread_id), "%06d", (int)pthread_self());
}
- snprintf(buffer, MAX_LOG, "[%c%c:%s]%s %s", log_type, log_details, this->name, thread_id, string);
+ snprintf(buffer, MAX_LOG, "%s[%c%c:%s] %s", thread_id, log_type, log_details, this->name, string);
}
/**
@@ -200,7 +200,7 @@ static void log_bytes(private_logger_t *this, log_level_t loglevel, const char *
if (this->log_thread_id)
{
- snprintf(thread_id, sizeof(thread_id), " @%d", (int)pthread_self());
+ snprintf(thread_id, sizeof(thread_id), "%06d", (int)pthread_self());
}
/* since me can't do multi-line output to syslog,
@@ -244,11 +244,11 @@ static void log_bytes(private_logger_t *this, log_level_t loglevel, const char *
if (this->output == NULL)
{
- syslog(get_priority(loglevel), "[ :%5d]%s %s %s", line_start, thread_id, buffer, ascii_buffer);
+ syslog(get_priority(loglevel), "%s[ :%5d] %s %s", thread_id, line_start, buffer, ascii_buffer);
}
else
{
- fprintf(this->output, "[ :%5d]%s %s %s\n", line_start, thread_id, buffer, ascii_buffer);
+ fprintf(this->output, "%s[ :%5d] %s %s\n", thread_id, line_start, buffer, ascii_buffer);
}
buffer_pos = buffer;
line_start += MAX_BYTES;
diff --git a/src/libstrongswan/utils/logger_manager.c b/src/libstrongswan/utils/logger_manager.c
index 62956c7cd..bc093e7a7 100644
--- a/src/libstrongswan/utils/logger_manager.c
+++ b/src/libstrongswan/utils/logger_manager.c
@@ -66,14 +66,14 @@ struct {
{ "SAMGR", ERROR|CONTROL|AUDIT|LEVEL0, TRUE }, /* IKE_SA_MANAGER */
{ "CHDSA", ERROR|CONTROL|AUDIT|LEVEL0, TRUE }, /* CHILD_SA */
{ "MESSG", ERROR|CONTROL|AUDIT|LEVEL0, TRUE }, /* MESSAGE */
- { "TPOOL", ERROR|CONTROL|AUDIT|LEVEL0, FALSE}, /* THREAD_POOL */
+ { "TPOOL", ERROR|CONTROL|AUDIT|LEVEL0, TRUE }, /* THREAD_POOL */
{ "WORKR", ERROR|CONTROL|AUDIT|LEVEL0, TRUE }, /* WORKER */
- { "SCHED", ERROR|CONTROL|AUDIT|LEVEL0, FALSE}, /* SCHEDULER */
- { "SENDR", ERROR|CONTROL|AUDIT|LEVEL0, FALSE}, /* SENDER */
- { "RECVR", ERROR|CONTROL|AUDIT|LEVEL0, FALSE}, /* RECEIVER */
- { "SOCKT", ERROR|CONTROL|AUDIT|LEVEL0, FALSE}, /* SOCKET */
- { "TESTR", ERROR|CONTROL|AUDIT|LEVEL0, FALSE}, /* TESTER */
- { "DAEMN", ERROR|CONTROL|AUDIT|LEVEL0, FALSE}, /* DAEMON */
+ { "SCHED", ERROR|CONTROL|AUDIT|LEVEL0, TRUE }, /* SCHEDULER */
+ { "SENDR", ERROR|CONTROL|AUDIT|LEVEL0, TRUE }, /* SENDER */
+ { "RECVR", ERROR|CONTROL|AUDIT|LEVEL0, TRUE }, /* RECEIVER */
+ { "SOCKT", ERROR|CONTROL|AUDIT|LEVEL0, TRUE }, /* SOCKET */
+ { "TESTR", ERROR|CONTROL|AUDIT|LEVEL0, TRUE }, /* TESTER */
+ { "DAEMN", ERROR|CONTROL|AUDIT|LEVEL0, TRUE }, /* DAEMON */
{ "CONFG", ERROR|CONTROL|AUDIT|LEVEL0, TRUE }, /* CONFIG */
{ "ENCPL", ERROR|CONTROL|AUDIT|LEVEL0, TRUE }, /* ENCRYPTION_PAYLOAD */
{ "PAYLD", ERROR|CONTROL|AUDIT|LEVEL0, TRUE }, /* PAYLOAD */
@@ -81,7 +81,7 @@ struct {
{ "DEREC", ERROR|CONTROL|AUDIT|LEVEL0, TRUE }, /* DER_ENCODER */
{ "ASN_1", ERROR|CONTROL|AUDIT|LEVEL0, TRUE }, /* ASN1 */
{ "XFRM ", ERROR|CONTROL|AUDIT|LEVEL0, TRUE }, /* XFRM */
- { "LEAKD", ERROR|CONTROL|AUDIT|LEVEL0, FALSE}, /* LEAK_DETECT */
+ { "LEAKD", ERROR|CONTROL|AUDIT|LEVEL0, TRUE }, /* LEAK_DETECT */
};
diff --git a/src/pluto/fetch.c b/src/pluto/fetch.c
index 075b88fd2..4bfb6031b 100644
--- a/src/pluto/fetch.c
+++ b/src/pluto/fetch.c
@@ -12,7 +12,7 @@
* or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License
* for more details.
*
- * RCSID $Id: fetch.c,v 1.11 2005/11/25 10:08:00 as Exp $
+ * RCSID $Id: fetch.c,v 1.12 2006/05/16 14:19:27 as Exp $
*/
#include <stdlib.h>
@@ -339,7 +339,7 @@ fetch_curl(char *url, chunk_t *blob)
}
curl_easy_cleanup(curl);
/* not using freeanychunk because of realloc (no leak detective) */
- free(response.ptr);
+ curl_free(response.ptr);
}
return strlen(errorbuffer) > 0 ? "libcurl error" : NULL;
#else /* !LIBCURL */
@@ -728,7 +728,7 @@ fetch_ocsp_status(ocsp_location_t* location)
curl_easy_cleanup(curl);
pfree(uri);
/* not using freeanychunk because of realloc (no leak detective) */
- free(response.ptr);
+ curl_free(response.ptr);
}
freeanychunk(location->nonce);
freeanychunk(request);
diff --git a/src/pluto/vendor.c b/src/pluto/vendor.c
index 1616fed28..fe19cc467 100644
--- a/src/pluto/vendor.c
+++ b/src/pluto/vendor.c
@@ -198,7 +198,10 @@ static struct vid_struct _vid_tab[] = {
/*
* strongSwan
*/
- DEC_MD5_VID(STRONGSWAN, "strongSwan 4.0.0")
+ DEC_MD5_VID(STRONGSWAN, "strongSwan 4.0.1")
+ DEC_MD5_VID(STRONGSWAN_4_0_0, "strongSwan 4.0.0")
+
+ DEC_MD5_VID(STRONGSWAN_2_7_1, "strongSwan 2.7.1")
DEC_MD5_VID(STRONGSWAN_2_7_0, "strongSwan 2.7.0")
DEC_MD5_VID(STRONGSWAN_2_6_4, "strongSwan 2.6.4")
DEC_MD5_VID(STRONGSWAN_2_6_3, "strongSwan 2.6.3")
diff --git a/src/pluto/vendor.h b/src/pluto/vendor.h
index 7c2030d76..c512560df 100644
--- a/src/pluto/vendor.h
+++ b/src/pluto/vendor.h
@@ -77,6 +77,9 @@ enum known_vendorid {
VID_STRONGSWAN_2_6_3 = 56,
VID_STRONGSWAN_2_6_4 = 57,
VID_STRONGSWAN_2_7_0 = 58,
+ VID_STRONGSWAN_2_7_1 = 59,
+
+ VID_STRONGSWAN_4_0_0 = 70,
/* 101 - 200 : NAT-Traversal */
VID_NATT_STENBERG_01 =101,
diff --git a/src/starter/starterstroke.c b/src/starter/starterstroke.c
index 9ef4b7577..67a0995a3 100644
--- a/src/starter/starterstroke.c
+++ b/src/starter/starterstroke.c
@@ -38,135 +38,136 @@
static char* push_string(stroke_msg_t **strm, char *string)
{
- stroke_msg_t *stroke_msg;
- size_t string_length;
-
- if (string == NULL)
- {
- return NULL;
- }
- stroke_msg = *strm;
- string_length = strlen(string) + 1;
- stroke_msg->length += string_length;
-
- stroke_msg = realloc(stroke_msg, stroke_msg->length);
- strcpy((char*)stroke_msg + stroke_msg->length - string_length, string);
-
- *strm = stroke_msg;
- return (char*)(u_int)stroke_msg->length - string_length;
+ stroke_msg_t *stroke_msg;
+ size_t string_length;
+
+ if (string == NULL)
+ {
+ return NULL;
+ }
+ stroke_msg = *strm;
+ string_length = strlen(string) + 1;
+ stroke_msg->length += string_length;
+
+ stroke_msg = realloc(stroke_msg, stroke_msg->length);
+ strcpy((char*)stroke_msg + stroke_msg->length - string_length, string);
+
+ *strm = stroke_msg;
+ return (char*)(u_int)stroke_msg->length - string_length;
}
static int
send_stroke_msg (stroke_msg_t *msg)
{
- struct sockaddr_un ctl_addr = { AF_UNIX, CHARON_CTL_FILE };
- int sock;
- int byte_count;
- char buffer[64];
-
- sock = socket(AF_UNIX, SOCK_STREAM, 0);
- if (sock < 0)
- {
- plog("socket() failed: %s", strerror(errno));
- return -1;
- }
- if (connect(sock, (struct sockaddr *)&ctl_addr,
- offsetof(struct sockaddr_un, sun_path) + strlen(ctl_addr.sun_path)) < 0)
- {
- plog("connect(charon_ctl) failed: %s", strerror(errno));
- close(sock);
- return -1;
- }
-
- /* send message */
+ struct sockaddr_un ctl_addr = { AF_UNIX, CHARON_CTL_FILE };
+ int sock;
+ int byte_count;
+ char buffer[64];
+
+ sock = socket(AF_UNIX, SOCK_STREAM, 0);
+ if (sock < 0)
+ {
+ plog("socket() failed: %s", strerror(errno));
+ return -1;
+ }
+ if (connect(sock, (struct sockaddr *)&ctl_addr,
+ offsetof(struct sockaddr_un, sun_path) + strlen(ctl_addr.sun_path)) < 0)
+ {
+ plog("connect(charon_ctl) failed: %s", strerror(errno));
+ close(sock);
+ return -1;
+ }
+
+ /* send message */
if (write(sock, msg, msg->length) != msg->length)
- {
- plog("write(charon_ctl) failed: %s", strerror(errno));
+ {
+ plog("write(charon_ctl) failed: %s", strerror(errno));
+ close(sock);
+ return -1;
+ }
+ while ((byte_count = read(sock, buffer, sizeof(buffer)-1)) > 0)
+ {
+ buffer[byte_count] = '\0';
+ plog("%s", buffer);
+ }
+ if (byte_count < 0)
+ {
+ plog("read() failed: %s", strerror(errno));
+ }
+
close(sock);
- return -1;
- }
- while ((byte_count = read(sock, buffer, sizeof(buffer)-1)) > 0)
- {
- buffer[byte_count] = '\0';
- plog("%s", buffer);
- }
- if (byte_count < 0)
- {
- plog("read() failed: %s", strerror(errno));
- }
-
- close(sock);
- return 0;
+ return 0;
}
static char *
connection_name(starter_conn_t *conn)
{
- /* if connection name is '%auto', create a new name like conn_xxxxx */
- static char buf[32];
-
- if (streq(conn->name, "%auto"))
- {
- sprintf(buf, "conn_%ld", conn->id);
- return buf;
- }
- return conn->name;
+ /* if connection name is '%auto', create a new name like conn_xxxxx */
+ static char buf[32];
+
+ if (streq(conn->name, "%auto"))
+ {
+ sprintf(buf, "conn_%ld", conn->id);
+ return buf;
+ }
+ return conn->name;
}
int starter_stroke_add_conn(starter_conn_t *conn)
{
- stroke_msg_t *msg = malloc(sizeof(stroke_msg_t));
- int res;
+ stroke_msg_t *msg = malloc(sizeof(stroke_msg_t));
+ int res;
- msg->length = sizeof(stroke_msg_t);
- msg->type = STR_ADD_CONN;
+ msg->length = sizeof(stroke_msg_t);
+ msg->type = STR_ADD_CONN;
- msg->add_conn.name = push_string(&msg, connection_name(conn));
+ msg->add_conn.name = push_string(&msg, connection_name(conn));
- msg->add_conn.me.id = push_string(&msg, conn->left.id);
- msg->add_conn.me.cert = push_string(&msg, conn->left.cert);
- msg->add_conn.me.address = push_string(&msg, inet_ntoa(conn->left.addr.u.v4.sin_addr));
- msg->add_conn.me.subnet = push_string(&msg, inet_ntoa(conn->left.subnet.addr.u.v4.sin_addr));
- msg->add_conn.me.subnet_mask = conn->left.subnet.maskbits;
+ msg->add_conn.me.id = push_string(&msg, conn->left.id);
+ msg->add_conn.me.cert = push_string(&msg, conn->left.cert);
+ msg->add_conn.me.address = push_string(&msg, inet_ntoa(conn->left.addr.u.v4.sin_addr));
+ msg->add_conn.me.subnet = push_string(&msg, inet_ntoa(conn->left.subnet.addr.u.v4.sin_addr));
+ msg->add_conn.me.subnet_mask = conn->left.subnet.maskbits;
- msg->add_conn.other.id = push_string(&msg, conn->right.id);
- msg->add_conn.other.cert = push_string(&msg, conn->right.cert);
- msg->add_conn.other.address = push_string(&msg, inet_ntoa(conn->right.addr.u.v4.sin_addr));
- msg->add_conn.other.subnet = push_string(&msg, inet_ntoa(conn->right.subnet.addr.u.v4.sin_addr));
- msg->add_conn.other.subnet_mask = conn->right.subnet.maskbits;
+ msg->add_conn.other.id = push_string(&msg, conn->right.id);
+ msg->add_conn.other.cert = push_string(&msg, conn->right.cert);
+ msg->add_conn.other.address = push_string(&msg, inet_ntoa(conn->right.addr.u.v4.sin_addr));
+ msg->add_conn.other.subnet = push_string(&msg, inet_ntoa(conn->right.subnet.addr.u.v4.sin_addr));
+ msg->add_conn.other.subnet_mask = conn->right.subnet.maskbits;
- res = send_stroke_msg(msg);
- free(msg);
- return res;
+ res = send_stroke_msg(msg);
+ free(msg);
+ return res;
}
int starter_stroke_del_conn(starter_conn_t *conn)
{
- return 0;
+ return 0;
}
+
int starter_stroke_route_conn(starter_conn_t *conn)
{
- stroke_msg_t *msg = malloc(sizeof(stroke_msg_t));
- int res;
-
- msg->length = sizeof(stroke_msg_t);
- msg->type = STR_INSTALL;
- msg->install.name = push_string(&msg, connection_name(conn));
- res = send_stroke_msg(msg);
- free(msg);
- return res;
+ stroke_msg_t *msg = malloc(sizeof(stroke_msg_t));
+ int res;
+
+ msg->length = sizeof(stroke_msg_t);
+ msg->type = STR_INSTALL;
+ msg->install.name = push_string(&msg, connection_name(conn));
+ res = send_stroke_msg(msg);
+ free(msg);
+ return res;
}
int starter_stroke_initiate_conn(starter_conn_t *conn)
{
- stroke_msg_t *msg = malloc(sizeof(stroke_msg_t));
- int res;
-
- msg->length = sizeof(stroke_msg_t);
- msg->type = STR_INITIATE;
- msg->initiate.name = push_string(&msg, connection_name(conn));
- res = send_stroke_msg(msg);
- free(msg);
- return res;
+ stroke_msg_t *msg = malloc(sizeof(stroke_msg_t));
+ int res;
+
+ msg->length = sizeof(stroke_msg_t);
+ msg->type = STR_INITIATE;
+ msg->initiate.name = push_string(&msg, connection_name(conn));
+ res = send_stroke_msg(msg);
+ free(msg);
+ return res;
}
diff --git a/src/stroke/Makefile.am b/src/stroke/Makefile.am
index 611f2a808..2f183495d 100644
--- a/src/stroke/Makefile.am
+++ b/src/stroke/Makefile.am
@@ -1,4 +1,3 @@
ipsec_PROGRAMS = stroke
stroke_SOURCES = stroke.c stroke.h
-stroke_INCLUDES = -I$(top_srcdir)/src/libstrongswan
diff --git a/src/whack/Makefile.am b/src/whack/Makefile.am
index 7eabef588..5583defc8 100644
--- a/src/whack/Makefile.am
+++ b/src/whack/Makefile.am
@@ -2,4 +2,4 @@ ipsec_PROGRAMS = whack
whack_SOURCES = whack.c whack.h
INCLUDES = -I$(top_srcdir)/src/libfreeswan -I$(top_srcdir)/src/pluto
-LDADD = $(top_builddir)/src/libfreeswan/libfreeswan.a
+whack_LDADD = $(top_builddir)/src/libfreeswan/libfreeswan.a
diff --git a/testing/hosts/alice/etc/ipsec.conf b/testing/hosts/alice/etc/ipsec.conf
index d6cdbba7b..da909d8ac 100755
--- a/testing/hosts/alice/etc/ipsec.conf
+++ b/testing/hosts/alice/etc/ipsec.conf
@@ -7,6 +7,7 @@ config setup
crlcheckinterval=180
strictcrlpolicy=no
nat_traversal=yes
+ charonstart=no
conn %default
ikelifetime=60m
diff --git a/testing/hosts/bob/etc/ipsec.conf b/testing/hosts/bob/etc/ipsec.conf
index cdef4e042..0bbd405f6 100755
--- a/testing/hosts/bob/etc/ipsec.conf
+++ b/testing/hosts/bob/etc/ipsec.conf
@@ -7,6 +7,7 @@ config setup
crlcheckinterval=180
strictcrlpolicy=no
nat_traversal=yes
+ charonstart=no
conn %default
ikelifetime=60m
diff --git a/testing/hosts/carol/etc/ipsec.conf b/testing/hosts/carol/etc/ipsec.conf
index 3228f4e16..656ef7012 100755
--- a/testing/hosts/carol/etc/ipsec.conf
+++ b/testing/hosts/carol/etc/ipsec.conf
@@ -6,6 +6,7 @@ config setup
plutodebug=control
crlcheckinterval=180
strictcrlpolicy=no
+ charonstart=no
conn %default
ikelifetime=60m
diff --git a/testing/hosts/dave/etc/ipsec.conf b/testing/hosts/dave/etc/ipsec.conf
index 76623491c..781322761 100755
--- a/testing/hosts/dave/etc/ipsec.conf
+++ b/testing/hosts/dave/etc/ipsec.conf
@@ -6,6 +6,7 @@ config setup
plutodebug=control
crlcheckinterval=180
strictcrlpolicy=no
+ charonstart=no
conn %default
ikelifetime=60m
diff --git a/testing/hosts/moon/etc/ipsec.conf b/testing/hosts/moon/etc/ipsec.conf
index a0e97e057..a230d3cbb 100755
--- a/testing/hosts/moon/etc/ipsec.conf
+++ b/testing/hosts/moon/etc/ipsec.conf
@@ -6,13 +6,14 @@ config setup
plutodebug=control
crlcheckinterval=180
strictcrlpolicy=no
+ charonstart=no
conn %default
ikelifetime=60m
keylife=20m
rekeymargin=3m
keyingtries=1
- left=192.168.0.1
+ left=PH_IP_MOON
leftnexthop=%direct
leftcert=moonCert.pem
leftid=@moon.strongswan.org
@@ -20,13 +21,13 @@ conn %default
conn net-net
leftsubnet=10.1.0.0/16
- right=192.168.0.2
+ right=PH_IP_SUN
rightsubnet=10.2.0.0/16
rightid=@sun.strongswan.org
auto=add
conn host-host
- right=192.168.0.2
+ right=PH_IP_SUN
rightid=@sun.strongswan.org
auto=add
diff --git a/testing/hosts/sun/etc/ipsec.conf b/testing/hosts/sun/etc/ipsec.conf
index 4d0299a08..f09aa76cf 100755
--- a/testing/hosts/sun/etc/ipsec.conf
+++ b/testing/hosts/sun/etc/ipsec.conf
@@ -7,6 +7,7 @@ config setup
crlcheckinterval=180
strictcrlpolicy=no
nat_traversal=yes
+ charonstart=no
conn %default
ikelifetime=60m
diff --git a/testing/hosts/venus/etc/ipsec.conf b/testing/hosts/venus/etc/ipsec.conf
index 35f264f82..f5be61bb2 100755
--- a/testing/hosts/venus/etc/ipsec.conf
+++ b/testing/hosts/venus/etc/ipsec.conf
@@ -7,6 +7,7 @@ config setup
crlcheckinterval=180
strictcrlpolicy=no
nat_traversal=yes
+ charonstart=no
conn %default
ikelifetime=60m
diff --git a/testing/testing.conf b/testing/testing.conf
index 92a138288..d3ed1129a 100755
--- a/testing/testing.conf
+++ b/testing/testing.conf
@@ -21,7 +21,7 @@ UMLTESTDIR=~/strongswan-testing
# Bzipped kernel sources
# (file extension .tar.bz2 required)
-KERNEL=$UMLTESTDIR/linux-2.6.16.9.tar.bz2
+KERNEL=$UMLTESTDIR/linux-2.6.16.16.tar.bz2
# Extract kernel version
KERNELVERSION=`basename $KERNEL .tar.bz2 | sed -e 's/linux-//'`
@@ -34,7 +34,7 @@ KERNELCONFIG=$UMLTESTDIR/.config-2.6.16
UMLPATCH=
# Bzipped source of strongSwan
-STRONGSWAN=$UMLTESTDIR/strongswan-2.7.0.tar.bz2
+STRONGSWAN=$UMLTESTDIR/strongswan-4.0.1.tar.bz2
# strongSwan compile options (use "yes" or "no")
USE_LIBCURL="yes"
diff --git a/testing/tests/alg-blowfish/hosts/carol/etc/ipsec.conf b/testing/tests/alg-blowfish/hosts/carol/etc/ipsec.conf
index fa68c9d3d..82b466a0b 100755
--- a/testing/tests/alg-blowfish/hosts/carol/etc/ipsec.conf
+++ b/testing/tests/alg-blowfish/hosts/carol/etc/ipsec.conf
@@ -6,6 +6,7 @@ config setup
plutodebug="control crypt"
crlcheckinterval=180
strictcrlpolicy=no
+ charonstart=no
conn %default
ikelifetime=60m
diff --git a/testing/tests/alg-blowfish/hosts/moon/etc/ipsec.conf b/testing/tests/alg-blowfish/hosts/moon/etc/ipsec.conf
index 39916a7ba..77a72f200 100755
--- a/testing/tests/alg-blowfish/hosts/moon/etc/ipsec.conf
+++ b/testing/tests/alg-blowfish/hosts/moon/etc/ipsec.conf
@@ -6,6 +6,7 @@ config setup
plutodebug="control crypt"
crlcheckinterval=180
strictcrlpolicy=no
+ charonstart=no
conn %default
ikelifetime=60m
diff --git a/testing/tests/alg-serpent/hosts/carol/etc/ipsec.conf b/testing/tests/alg-serpent/hosts/carol/etc/ipsec.conf
index 5d2369924..e814499cb 100755
--- a/testing/tests/alg-serpent/hosts/carol/etc/ipsec.conf
+++ b/testing/tests/alg-serpent/hosts/carol/etc/ipsec.conf
@@ -6,6 +6,7 @@ config setup
plutodebug="control crypt"
crlcheckinterval=180
strictcrlpolicy=no
+ charonstart=no
conn %default
ikelifetime=60m
diff --git a/testing/tests/alg-serpent/hosts/moon/etc/ipsec.conf b/testing/tests/alg-serpent/hosts/moon/etc/ipsec.conf
index 7bdddf008..f53cdf21a 100755
--- a/testing/tests/alg-serpent/hosts/moon/etc/ipsec.conf
+++ b/testing/tests/alg-serpent/hosts/moon/etc/ipsec.conf
@@ -6,7 +6,8 @@ config setup
plutodebug="control crypt"
crlcheckinterval=180
strictcrlpolicy=no
-
+ charonstart=no
+
conn %default
ikelifetime=60m
keylife=20m
diff --git a/testing/tests/alg-sha2_256/hosts/carol/etc/ipsec.conf b/testing/tests/alg-sha2_256/hosts/carol/etc/ipsec.conf
index c55ae8ab1..a90e07444 100755
--- a/testing/tests/alg-sha2_256/hosts/carol/etc/ipsec.conf
+++ b/testing/tests/alg-sha2_256/hosts/carol/etc/ipsec.conf
@@ -6,6 +6,7 @@ config setup
plutodebug="control crypt"
crlcheckinterval=180
strictcrlpolicy=no
+ charonstart=no
conn %default
ikelifetime=60m
diff --git a/testing/tests/alg-sha2_256/hosts/moon/etc/ipsec.conf b/testing/tests/alg-sha2_256/hosts/moon/etc/ipsec.conf
index 748b1b85c..7cff7b3f3 100755
--- a/testing/tests/alg-sha2_256/hosts/moon/etc/ipsec.conf
+++ b/testing/tests/alg-sha2_256/hosts/moon/etc/ipsec.conf
@@ -6,6 +6,7 @@ config setup
plutodebug="control crypt"
crlcheckinterval=180
strictcrlpolicy=no
+ charonstart=no
conn %default
ikelifetime=60m
diff --git a/testing/tests/alg-twofish/hosts/carol/etc/ipsec.conf b/testing/tests/alg-twofish/hosts/carol/etc/ipsec.conf
index 8e3037a3b..1d6d3b29c 100755
--- a/testing/tests/alg-twofish/hosts/carol/etc/ipsec.conf
+++ b/testing/tests/alg-twofish/hosts/carol/etc/ipsec.conf
@@ -6,6 +6,7 @@ config setup
plutodebug="control crypt"
crlcheckinterval=180
strictcrlpolicy=no
+ charonstart=no
conn %default
ikelifetime=60m
diff --git a/testing/tests/alg-twofish/hosts/moon/etc/ipsec.conf b/testing/tests/alg-twofish/hosts/moon/etc/ipsec.conf
index 01004e94e..3467c495d 100755
--- a/testing/tests/alg-twofish/hosts/moon/etc/ipsec.conf
+++ b/testing/tests/alg-twofish/hosts/moon/etc/ipsec.conf
@@ -6,6 +6,7 @@ config setup
plutodebug="control crypt"
crlcheckinterval=180
strictcrlpolicy=no
+ charonstart=no
conn %default
ikelifetime=60m
diff --git a/testing/tests/attr-cert/hosts/carol/etc/ipsec.conf b/testing/tests/attr-cert/hosts/carol/etc/ipsec.conf
index 62fc49868..8f92ef45e 100755
--- a/testing/tests/attr-cert/hosts/carol/etc/ipsec.conf
+++ b/testing/tests/attr-cert/hosts/carol/etc/ipsec.conf
@@ -6,6 +6,7 @@ config setup
plutodebug=control
crlcheckinterval=180
strictcrlpolicy=no
+ charonstart=no
conn %default
ikelifetime=60m
diff --git a/testing/tests/attr-cert/hosts/dave/etc/ipsec.conf b/testing/tests/attr-cert/hosts/dave/etc/ipsec.conf
index 9d932dc54..b0d770016 100755
--- a/testing/tests/attr-cert/hosts/dave/etc/ipsec.conf
+++ b/testing/tests/attr-cert/hosts/dave/etc/ipsec.conf
@@ -6,6 +6,7 @@ config setup
plutodebug=control
crlcheckinterval=180
strictcrlpolicy=no
+ charonstart=no
conn %default
ikelifetime=60m
diff --git a/testing/tests/attr-cert/hosts/moon/etc/ipsec.conf b/testing/tests/attr-cert/hosts/moon/etc/ipsec.conf
index bd72715ff..4a526f5f7 100755
--- a/testing/tests/attr-cert/hosts/moon/etc/ipsec.conf
+++ b/testing/tests/attr-cert/hosts/moon/etc/ipsec.conf
@@ -6,6 +6,7 @@ config setup
plutodebug=control
crlcheckinterval=180
strictcrlpolicy=no
+ charonstart=no
conn %default
ikelifetime=60m
diff --git a/testing/tests/compress/hosts/carol/etc/ipsec.conf b/testing/tests/compress/hosts/carol/etc/ipsec.conf
index 9462ba5e6..1c6cdbe82 100755
--- a/testing/tests/compress/hosts/carol/etc/ipsec.conf
+++ b/testing/tests/compress/hosts/carol/etc/ipsec.conf
@@ -6,6 +6,7 @@ config setup
plutodebug="control crypt"
crlcheckinterval=180
strictcrlpolicy=no
+ charonstart=no
conn %default
ikelifetime=60m
diff --git a/testing/tests/compress/hosts/moon/etc/ipsec.conf b/testing/tests/compress/hosts/moon/etc/ipsec.conf
index b8dfae646..25d789a6d 100755
--- a/testing/tests/compress/hosts/moon/etc/ipsec.conf
+++ b/testing/tests/compress/hosts/moon/etc/ipsec.conf
@@ -6,6 +6,7 @@ config setup
plutodebug="control crypt"
crlcheckinterval=180
strictcrlpolicy=no
+ charonstart=no
conn %default
ikelifetime=60m
diff --git a/testing/tests/crl-from-cache/hosts/carol/etc/ipsec.conf b/testing/tests/crl-from-cache/hosts/carol/etc/ipsec.conf
index 93c4d7956..44930d30b 100755
--- a/testing/tests/crl-from-cache/hosts/carol/etc/ipsec.conf
+++ b/testing/tests/crl-from-cache/hosts/carol/etc/ipsec.conf
@@ -7,6 +7,7 @@ config setup
crlcheckinterval=180
strictcrlpolicy=yes
cachecrls=yes
+ charonstart=no
conn %default
ikelifetime=60m
diff --git a/testing/tests/crl-from-cache/hosts/moon/etc/ipsec.conf b/testing/tests/crl-from-cache/hosts/moon/etc/ipsec.conf
index ef9237518..6b1d4c1e9 100755
--- a/testing/tests/crl-from-cache/hosts/moon/etc/ipsec.conf
+++ b/testing/tests/crl-from-cache/hosts/moon/etc/ipsec.conf
@@ -7,6 +7,7 @@ config setup
crlcheckinterval=180
strictcrlpolicy=yes
cachecrls=yes
+ charonstart=no
conn %default
ikelifetime=60m
diff --git a/testing/tests/crl-ldap/hosts/carol/etc/ipsec.conf b/testing/tests/crl-ldap/hosts/carol/etc/ipsec.conf
index 669a47d06..f867d3c14 100755
--- a/testing/tests/crl-ldap/hosts/carol/etc/ipsec.conf
+++ b/testing/tests/crl-ldap/hosts/carol/etc/ipsec.conf
@@ -7,6 +7,7 @@ config setup
crlcheckinterval=180
strictcrlpolicy=yes
cachecrls=yes
+ charonstart=no
ca strongswan
cacert=strongswanCert.pem
diff --git a/testing/tests/crl-ldap/hosts/moon/etc/ipsec.conf b/testing/tests/crl-ldap/hosts/moon/etc/ipsec.conf
index d5c0dd163..323500801 100755
--- a/testing/tests/crl-ldap/hosts/moon/etc/ipsec.conf
+++ b/testing/tests/crl-ldap/hosts/moon/etc/ipsec.conf
@@ -7,6 +7,7 @@ config setup
crlcheckinterval=180
strictcrlpolicy=yes
cachecrls=yes
+ charonstart=no
ca strongswan
cacert=strongswanCert.pem
diff --git a/testing/tests/crl-revoked/hosts/carol/etc/ipsec.conf b/testing/tests/crl-revoked/hosts/carol/etc/ipsec.conf
index 5a1d246a6..b81adef9b 100755
--- a/testing/tests/crl-revoked/hosts/carol/etc/ipsec.conf
+++ b/testing/tests/crl-revoked/hosts/carol/etc/ipsec.conf
@@ -6,6 +6,7 @@ config setup
plutodebug=control
crlcheckinterval=180
strictcrlpolicy=yes
+ charonstart=no
conn %default
ikelifetime=60m
diff --git a/testing/tests/crl-revoked/hosts/moon/etc/ipsec.conf b/testing/tests/crl-revoked/hosts/moon/etc/ipsec.conf
index a8953f557..ac302a5a4 100755
--- a/testing/tests/crl-revoked/hosts/moon/etc/ipsec.conf
+++ b/testing/tests/crl-revoked/hosts/moon/etc/ipsec.conf
@@ -6,6 +6,7 @@ config setup
plutodebug=control
crlcheckinterval=180
strictcrlpolicy=yes
+ charonstart=no
conn %default
ikelifetime=60m
diff --git a/testing/tests/crl-strict/hosts/carol/etc/ipsec.conf b/testing/tests/crl-strict/hosts/carol/etc/ipsec.conf
index 6d0aee86a..156ea9bb3 100755
--- a/testing/tests/crl-strict/hosts/carol/etc/ipsec.conf
+++ b/testing/tests/crl-strict/hosts/carol/etc/ipsec.conf
@@ -6,6 +6,7 @@ config setup
plutodebug=control
crlcheckinterval=180
strictcrlpolicy=yes
+ charonstart=no
conn %default
ikelifetime=60m
diff --git a/testing/tests/crl-strict/hosts/moon/etc/ipsec.conf b/testing/tests/crl-strict/hosts/moon/etc/ipsec.conf
index a8953f557..ac302a5a4 100755
--- a/testing/tests/crl-strict/hosts/moon/etc/ipsec.conf
+++ b/testing/tests/crl-strict/hosts/moon/etc/ipsec.conf
@@ -6,6 +6,7 @@ config setup
plutodebug=control
crlcheckinterval=180
strictcrlpolicy=yes
+ charonstart=no
conn %default
ikelifetime=60m
diff --git a/testing/tests/crl-to-cache/hosts/carol/etc/ipsec.conf b/testing/tests/crl-to-cache/hosts/carol/etc/ipsec.conf
index 955f08b1f..3a0ddd545 100755
--- a/testing/tests/crl-to-cache/hosts/carol/etc/ipsec.conf
+++ b/testing/tests/crl-to-cache/hosts/carol/etc/ipsec.conf
@@ -6,6 +6,7 @@ config setup
plutodebug=control
crlcheckinterval=180
cachecrls=yes
+ charonstart=no
conn %default
ikelifetime=60m
diff --git a/testing/tests/crl-to-cache/hosts/moon/etc/ipsec.conf b/testing/tests/crl-to-cache/hosts/moon/etc/ipsec.conf
index 885354ab5..d52084f21 100755
--- a/testing/tests/crl-to-cache/hosts/moon/etc/ipsec.conf
+++ b/testing/tests/crl-to-cache/hosts/moon/etc/ipsec.conf
@@ -6,6 +6,7 @@ config setup
plutodebug=control
crlcheckinterval=180
cachecrls=yes
+ charonstart=no
conn %default
ikelifetime=60m
diff --git a/testing/tests/default-keys/hosts/carol/etc/ipsec.conf b/testing/tests/default-keys/hosts/carol/etc/ipsec.conf
index c4bb10a65..26ea4dfab 100755
--- a/testing/tests/default-keys/hosts/carol/etc/ipsec.conf
+++ b/testing/tests/default-keys/hosts/carol/etc/ipsec.conf
@@ -7,6 +7,7 @@ config setup
crlcheckinterval=0
strictcrlpolicy=no
nocrsend=yes
+ charonstart=no
conn %default
ikelifetime=60m
diff --git a/testing/tests/default-keys/hosts/moon/etc/ipsec.conf b/testing/tests/default-keys/hosts/moon/etc/ipsec.conf
index eeeec645b..52d0853e6 100755
--- a/testing/tests/default-keys/hosts/moon/etc/ipsec.conf
+++ b/testing/tests/default-keys/hosts/moon/etc/ipsec.conf
@@ -7,6 +7,7 @@ config setup
crlcheckinterval=0
strictcrlpolicy=no
nocrsend=yes
+ charonstart=no
conn %default
ikelifetime=60m
@@ -15,7 +16,7 @@ conn %default
keyingtries=1
conn carol
- left=192.168.0.1
+ left=PH_IP_MOON
leftnexthop=%direct
leftcert=selfCert.der
leftsendcert=never
diff --git a/testing/tests/double-nat-net/hosts/alice/etc/ipsec.conf b/testing/tests/double-nat-net/hosts/alice/etc/ipsec.conf
index 395e62e7c..35ce73c77 100755
--- a/testing/tests/double-nat-net/hosts/alice/etc/ipsec.conf
+++ b/testing/tests/double-nat-net/hosts/alice/etc/ipsec.conf
@@ -7,6 +7,7 @@ config setup
crlcheckinterval=180
strictcrlpolicy=no
nat_traversal=yes
+ charonstart=no
conn %default
ikelifetime=60m
diff --git a/testing/tests/double-nat-net/hosts/bob/etc/ipsec.conf b/testing/tests/double-nat-net/hosts/bob/etc/ipsec.conf
index 6927a5ce4..6b2863b84 100755
--- a/testing/tests/double-nat-net/hosts/bob/etc/ipsec.conf
+++ b/testing/tests/double-nat-net/hosts/bob/etc/ipsec.conf
@@ -7,6 +7,7 @@ config setup
crlcheckinterval=180
strictcrlpolicy=no
nat_traversal=yes
+ charonstart=no
conn %default
ikelifetime=60m
diff --git a/testing/tests/double-nat/hosts/alice/etc/ipsec.conf b/testing/tests/double-nat/hosts/alice/etc/ipsec.conf
index 5b3cddb63..bba11a5f6 100755
--- a/testing/tests/double-nat/hosts/alice/etc/ipsec.conf
+++ b/testing/tests/double-nat/hosts/alice/etc/ipsec.conf
@@ -7,6 +7,7 @@ config setup
crlcheckinterval=180
strictcrlpolicy=no
nat_traversal=yes
+ charonstart=no
conn %default
ikelifetime=60m
diff --git a/testing/tests/dpd-clear/hosts/moon/etc/ipsec.conf b/testing/tests/dpd-clear/hosts/moon/etc/ipsec.conf
index cac521c8f..641f2ae53 100755
--- a/testing/tests/dpd-clear/hosts/moon/etc/ipsec.conf
+++ b/testing/tests/dpd-clear/hosts/moon/etc/ipsec.conf
@@ -6,6 +6,7 @@ config setup
plutodebug=control
crlcheckinterval=180
strictcrlpolicy=no
+ charonstart=no
conn %default
ikelifetime=60m
diff --git a/testing/tests/esp-ah-transport/hosts/carol/etc/ipsec.conf b/testing/tests/esp-ah-transport/hosts/carol/etc/ipsec.conf
index 13ab3e07f..794186638 100755
--- a/testing/tests/esp-ah-transport/hosts/carol/etc/ipsec.conf
+++ b/testing/tests/esp-ah-transport/hosts/carol/etc/ipsec.conf
@@ -6,6 +6,7 @@ config setup
plutodebug=control
crlcheckinterval=180
strictcrlpolicy=no
+ charonstart=no
conn %default
ikelifetime=60m
diff --git a/testing/tests/esp-ah-transport/hosts/moon/etc/ipsec.conf b/testing/tests/esp-ah-transport/hosts/moon/etc/ipsec.conf
index 809f3c74b..926221f3e 100755
--- a/testing/tests/esp-ah-transport/hosts/moon/etc/ipsec.conf
+++ b/testing/tests/esp-ah-transport/hosts/moon/etc/ipsec.conf
@@ -6,6 +6,7 @@ config setup
plutodebug=control
crlcheckinterval=180
strictcrlpolicy=no
+ charonstart=no
conn %default
ikelifetime=60m
diff --git a/testing/tests/esp-ah-tunnel/hosts/carol/etc/ipsec.conf b/testing/tests/esp-ah-tunnel/hosts/carol/etc/ipsec.conf
index 98cdaab7a..655a0c186 100755
--- a/testing/tests/esp-ah-tunnel/hosts/carol/etc/ipsec.conf
+++ b/testing/tests/esp-ah-tunnel/hosts/carol/etc/ipsec.conf
@@ -6,6 +6,7 @@ config setup
plutodebug=control
crlcheckinterval=180
strictcrlpolicy=no
+ charonstart=no
conn %default
ikelifetime=60m
diff --git a/testing/tests/esp-ah-tunnel/hosts/moon/etc/ipsec.conf b/testing/tests/esp-ah-tunnel/hosts/moon/etc/ipsec.conf
index 7f976376d..446d1a7ad 100755
--- a/testing/tests/esp-ah-tunnel/hosts/moon/etc/ipsec.conf
+++ b/testing/tests/esp-ah-tunnel/hosts/moon/etc/ipsec.conf
@@ -6,6 +6,7 @@ config setup
plutodebug=control
crlcheckinterval=180
strictcrlpolicy=no
+ charonstart=no
conn %default
ikelifetime=60m
diff --git a/testing/tests/esp-alg-des/hosts/carol/etc/ipsec.conf b/testing/tests/esp-alg-des/hosts/carol/etc/ipsec.conf
index b4f067b6d..ff74715eb 100755
--- a/testing/tests/esp-alg-des/hosts/carol/etc/ipsec.conf
+++ b/testing/tests/esp-alg-des/hosts/carol/etc/ipsec.conf
@@ -6,6 +6,7 @@ config setup
plutodebug="control crypt"
crlcheckinterval=180
strictcrlpolicy=no
+ charonstart=no
conn %default
ikelifetime=60m
diff --git a/testing/tests/esp-alg-des/hosts/moon/etc/ipsec.conf b/testing/tests/esp-alg-des/hosts/moon/etc/ipsec.conf
index 9513f810d..300b8974f 100755
--- a/testing/tests/esp-alg-des/hosts/moon/etc/ipsec.conf
+++ b/testing/tests/esp-alg-des/hosts/moon/etc/ipsec.conf
@@ -6,6 +6,7 @@ config setup
plutodebug="control crypt"
crlcheckinterval=180
strictcrlpolicy=no
+ charonstart=no
conn %default
ikelifetime=60m
diff --git a/testing/tests/esp-alg-null/hosts/carol/etc/ipsec.conf b/testing/tests/esp-alg-null/hosts/carol/etc/ipsec.conf
index b732eba93..79202c043 100755
--- a/testing/tests/esp-alg-null/hosts/carol/etc/ipsec.conf
+++ b/testing/tests/esp-alg-null/hosts/carol/etc/ipsec.conf
@@ -6,6 +6,7 @@ config setup
plutodebug=control
crlcheckinterval=180
strictcrlpolicy=no
+ charonstart=no
conn %default
ikelifetime=60m
diff --git a/testing/tests/esp-alg-null/hosts/moon/etc/ipsec.conf b/testing/tests/esp-alg-null/hosts/moon/etc/ipsec.conf
index af11591a1..adbc542cb 100755
--- a/testing/tests/esp-alg-null/hosts/moon/etc/ipsec.conf
+++ b/testing/tests/esp-alg-null/hosts/moon/etc/ipsec.conf
@@ -6,6 +6,7 @@ config setup
plutodebug=control
crlcheckinterval=180
strictcrlpolicy=no
+ charonstart=no
conn %default
ikelifetime=60m
diff --git a/testing/tests/esp-alg-strict-fail/hosts/carol/etc/ipsec.conf b/testing/tests/esp-alg-strict-fail/hosts/carol/etc/ipsec.conf
index ae8d2b772..da824ca1d 100755
--- a/testing/tests/esp-alg-strict-fail/hosts/carol/etc/ipsec.conf
+++ b/testing/tests/esp-alg-strict-fail/hosts/carol/etc/ipsec.conf
@@ -6,6 +6,7 @@ config setup
plutodebug=control
crlcheckinterval=180
strictcrlpolicy=no
+ charonstart=no
conn %default
ikelifetime=60m
diff --git a/testing/tests/esp-alg-strict-fail/hosts/moon/etc/ipsec.conf b/testing/tests/esp-alg-strict-fail/hosts/moon/etc/ipsec.conf
index 2dd1c763a..0d34ff225 100755
--- a/testing/tests/esp-alg-strict-fail/hosts/moon/etc/ipsec.conf
+++ b/testing/tests/esp-alg-strict-fail/hosts/moon/etc/ipsec.conf
@@ -6,6 +6,7 @@ config setup
plutodebug=control
crlcheckinterval=180
strictcrlpolicy=no
+ charonstart=no
conn %default
ikelifetime=60m
diff --git a/testing/tests/esp-alg-strict/hosts/carol/etc/ipsec.conf b/testing/tests/esp-alg-strict/hosts/carol/etc/ipsec.conf
index 5a14de070..f49e2ebb8 100755
--- a/testing/tests/esp-alg-strict/hosts/carol/etc/ipsec.conf
+++ b/testing/tests/esp-alg-strict/hosts/carol/etc/ipsec.conf
@@ -6,6 +6,7 @@ config setup
plutodebug=control
crlcheckinterval=180
strictcrlpolicy=no
+ charonstart=no
conn %default
ikelifetime=60m
diff --git a/testing/tests/esp-alg-strict/hosts/moon/etc/ipsec.conf b/testing/tests/esp-alg-strict/hosts/moon/etc/ipsec.conf
index 2dd1c763a..0d34ff225 100755
--- a/testing/tests/esp-alg-strict/hosts/moon/etc/ipsec.conf
+++ b/testing/tests/esp-alg-strict/hosts/moon/etc/ipsec.conf
@@ -6,6 +6,7 @@ config setup
plutodebug=control
crlcheckinterval=180
strictcrlpolicy=no
+ charonstart=no
conn %default
ikelifetime=60m
diff --git a/testing/tests/esp-alg-weak/hosts/carol/etc/ipsec.conf b/testing/tests/esp-alg-weak/hosts/carol/etc/ipsec.conf
index b4f067b6d..ff74715eb 100755
--- a/testing/tests/esp-alg-weak/hosts/carol/etc/ipsec.conf
+++ b/testing/tests/esp-alg-weak/hosts/carol/etc/ipsec.conf
@@ -6,6 +6,7 @@ config setup
plutodebug="control crypt"
crlcheckinterval=180
strictcrlpolicy=no
+ charonstart=no
conn %default
ikelifetime=60m
diff --git a/testing/tests/esp-alg-weak/hosts/moon/etc/ipsec.conf b/testing/tests/esp-alg-weak/hosts/moon/etc/ipsec.conf
index 3f07213ae..735af8671 100755
--- a/testing/tests/esp-alg-weak/hosts/moon/etc/ipsec.conf
+++ b/testing/tests/esp-alg-weak/hosts/moon/etc/ipsec.conf
@@ -6,6 +6,7 @@ config setup
plutodebug="control crypt"
crlcheckinterval=180
strictcrlpolicy=no
+ charonstart=no
conn %default
ikelifetime=60m
diff --git a/testing/tests/host2host-swapped/hosts/moon/etc/ipsec.conf b/testing/tests/host2host-swapped/hosts/moon/etc/ipsec.conf
index 4b66a5ecb..a51b1b215 100755
--- a/testing/tests/host2host-swapped/hosts/moon/etc/ipsec.conf
+++ b/testing/tests/host2host-swapped/hosts/moon/etc/ipsec.conf
@@ -6,6 +6,7 @@ config setup
plutodebug=control
crlcheckinterval=180
strictcrlpolicy=no
+ charonstart=no
conn %default
ikelifetime=60m
diff --git a/testing/tests/host2host-swapped/hosts/sun/etc/ipsec.conf b/testing/tests/host2host-swapped/hosts/sun/etc/ipsec.conf
index a58894b33..2605628c2 100755
--- a/testing/tests/host2host-swapped/hosts/sun/etc/ipsec.conf
+++ b/testing/tests/host2host-swapped/hosts/sun/etc/ipsec.conf
@@ -7,6 +7,7 @@ config setup
crlcheckinterval=180
strictcrlpolicy=no
nat_traversal=yes
+ charonstart=no
conn %default
ikelifetime=60m
diff --git a/testing/tests/host2host-transport/hosts/moon/etc/ipsec.conf b/testing/tests/host2host-transport/hosts/moon/etc/ipsec.conf
index af5000fa8..f1fc0695e 100755
--- a/testing/tests/host2host-transport/hosts/moon/etc/ipsec.conf
+++ b/testing/tests/host2host-transport/hosts/moon/etc/ipsec.conf
@@ -6,6 +6,7 @@ config setup
plutodebug=control
crlcheckinterval=180
strictcrlpolicy=no
+ charonstart=no
conn %default
ikelifetime=60m
diff --git a/testing/tests/host2host-transport/hosts/sun/etc/ipsec.conf b/testing/tests/host2host-transport/hosts/sun/etc/ipsec.conf
index 10bea9847..766fc39c4 100755
--- a/testing/tests/host2host-transport/hosts/sun/etc/ipsec.conf
+++ b/testing/tests/host2host-transport/hosts/sun/etc/ipsec.conf
@@ -6,6 +6,7 @@ config setup
plutodebug=control
crlcheckinterval=180
strictcrlpolicy=no
+ charonstart=no
conn %default
ikelifetime=60m
diff --git a/testing/tests/ike-alg-sha2_512/hosts/carol/etc/ipsec.conf b/testing/tests/ike-alg-sha2_512/hosts/carol/etc/ipsec.conf
index 1f73cdc21..ec6dfe2c1 100755
--- a/testing/tests/ike-alg-sha2_512/hosts/carol/etc/ipsec.conf
+++ b/testing/tests/ike-alg-sha2_512/hosts/carol/etc/ipsec.conf
@@ -6,6 +6,7 @@ config setup
plutodebug="control crypt"
crlcheckinterval=180
strictcrlpolicy=no
+ charonstart=no
conn %default
ikelifetime=60m
diff --git a/testing/tests/ike-alg-sha2_512/hosts/moon/etc/ipsec.conf b/testing/tests/ike-alg-sha2_512/hosts/moon/etc/ipsec.conf
index 90911997e..8433fabbe 100755
--- a/testing/tests/ike-alg-sha2_512/hosts/moon/etc/ipsec.conf
+++ b/testing/tests/ike-alg-sha2_512/hosts/moon/etc/ipsec.conf
@@ -6,6 +6,7 @@ config setup
plutodebug="control crypt"
crlcheckinterval=180
strictcrlpolicy=no
+ charonstart=no
conn %default
ikelifetime=60m
diff --git a/testing/tests/ike-alg-strict-fail/hosts/carol/etc/ipsec.conf b/testing/tests/ike-alg-strict-fail/hosts/carol/etc/ipsec.conf
index ae8d2b772..da824ca1d 100755
--- a/testing/tests/ike-alg-strict-fail/hosts/carol/etc/ipsec.conf
+++ b/testing/tests/ike-alg-strict-fail/hosts/carol/etc/ipsec.conf
@@ -6,6 +6,7 @@ config setup
plutodebug=control
crlcheckinterval=180
strictcrlpolicy=no
+ charonstart=no
conn %default
ikelifetime=60m
diff --git a/testing/tests/ike-alg-strict-fail/hosts/moon/etc/ipsec.conf b/testing/tests/ike-alg-strict-fail/hosts/moon/etc/ipsec.conf
index 85cd235dc..50c0d0051 100755
--- a/testing/tests/ike-alg-strict-fail/hosts/moon/etc/ipsec.conf
+++ b/testing/tests/ike-alg-strict-fail/hosts/moon/etc/ipsec.conf
@@ -6,6 +6,7 @@ config setup
plutodebug=control
crlcheckinterval=180
strictcrlpolicy=no
+ charonstart=no
conn %default
ikelifetime=60m
diff --git a/testing/tests/ike-alg-strict/hosts/carol/etc/ipsec.conf b/testing/tests/ike-alg-strict/hosts/carol/etc/ipsec.conf
index 5a14de070..f49e2ebb8 100755
--- a/testing/tests/ike-alg-strict/hosts/carol/etc/ipsec.conf
+++ b/testing/tests/ike-alg-strict/hosts/carol/etc/ipsec.conf
@@ -6,6 +6,7 @@ config setup
plutodebug=control
crlcheckinterval=180
strictcrlpolicy=no
+ charonstart=no
conn %default
ikelifetime=60m
diff --git a/testing/tests/ike-alg-strict/hosts/moon/etc/ipsec.conf b/testing/tests/ike-alg-strict/hosts/moon/etc/ipsec.conf
index 85cd235dc..50c0d0051 100755
--- a/testing/tests/ike-alg-strict/hosts/moon/etc/ipsec.conf
+++ b/testing/tests/ike-alg-strict/hosts/moon/etc/ipsec.conf
@@ -6,6 +6,7 @@ config setup
plutodebug=control
crlcheckinterval=180
strictcrlpolicy=no
+ charonstart=no
conn %default
ikelifetime=60m
diff --git a/testing/tests/ikev2-net2net/description.txt b/testing/tests/ikev2-net2net/description.txt
index 1f371c95e..0dd1b77a8 100644
--- a/testing/tests/ikev2-net2net/description.txt
+++ b/testing/tests/ikev2-net2net/description.txt
@@ -1,5 +1,5 @@
A connection between the subnets behind the gateways <b>moon</b> and <b>sun</b>
is set up using the IKEv2 key exchange protocol. The authentication is based on
-locally importerd <b>X.509 certificates</b>.
+locally imported <b>X.509 certificates</b>.
In order to test the established tunnel, client <b>alice</b> behind gateway <b>moon</b>
pings client <b>bob</b> located behind gateway <b>sun</b>.
diff --git a/testing/tests/ikev2-net2net/hosts/moon/etc/ipsec.conf b/testing/tests/ikev2-net2net/hosts/moon/etc/ipsec.conf
index 16f46cf8d..9c763e9a9 100644
--- a/testing/tests/ikev2-net2net/hosts/moon/etc/ipsec.conf
+++ b/testing/tests/ikev2-net2net/hosts/moon/etc/ipsec.conf
@@ -6,10 +6,10 @@ config setup
plutostart=no
conn net-net
- left=192.168.0.1
+ left=PH_IP_MOON
leftcert=moonCert.pem
leftsubnet=10.1.0.0/16
- right=192.168.0.2
+ right=PH_IP_SUN
rightcert=sunCert.pem
rightsubnet=10.2.0.0/16
keyexchange=ikev2
diff --git a/testing/tests/ikev2-net2net/hosts/sun/etc/ipsec.conf b/testing/tests/ikev2-net2net/hosts/sun/etc/ipsec.conf
index a90a4ce7d..defccb9ea 100644
--- a/testing/tests/ikev2-net2net/hosts/sun/etc/ipsec.conf
+++ b/testing/tests/ikev2-net2net/hosts/sun/etc/ipsec.conf
@@ -6,10 +6,10 @@ config setup
plutostart=no
conn net-net
- left=192.168.0.2
+ left=PH_IP_SUN
leftcert=sunCert.pem
leftsubnet=10.2.0.0/16
- right=192.168.0.1
+ right=PH_IP_MOON
rightcert=moonCert.pem
rightsubnet=10.1.0.0/16
keyexchange=ikev2
diff --git a/testing/tests/mode-config-swapped/hosts/carol/etc/ipsec.conf b/testing/tests/mode-config-swapped/hosts/carol/etc/ipsec.conf
index bee23f4df..ca53709cc 100755
--- a/testing/tests/mode-config-swapped/hosts/carol/etc/ipsec.conf
+++ b/testing/tests/mode-config-swapped/hosts/carol/etc/ipsec.conf
@@ -6,6 +6,7 @@ config setup
plutodebug=control
crlcheckinterval=180
strictcrlpolicy=no
+ charonstart=no
conn %default
ikelifetime=60m
diff --git a/testing/tests/mode-config-swapped/hosts/dave/etc/ipsec.conf b/testing/tests/mode-config-swapped/hosts/dave/etc/ipsec.conf
index 698cd9673..e4846008e 100755
--- a/testing/tests/mode-config-swapped/hosts/dave/etc/ipsec.conf
+++ b/testing/tests/mode-config-swapped/hosts/dave/etc/ipsec.conf
@@ -6,6 +6,7 @@ config setup
plutodebug=control
crlcheckinterval=180
strictcrlpolicy=no
+ charonstart=no
conn %default
ikelifetime=60m
diff --git a/testing/tests/mode-config-swapped/hosts/moon/etc/ipsec.conf b/testing/tests/mode-config-swapped/hosts/moon/etc/ipsec.conf
index b9e401080..a449130cd 100755
--- a/testing/tests/mode-config-swapped/hosts/moon/etc/ipsec.conf
+++ b/testing/tests/mode-config-swapped/hosts/moon/etc/ipsec.conf
@@ -6,6 +6,7 @@ config setup
plutodebug=control
crlcheckinterval=180
strictcrlpolicy=no
+ charonstart=no
conn %default
ikelifetime=60m
diff --git a/testing/tests/mode-config/hosts/carol/etc/ipsec.conf b/testing/tests/mode-config/hosts/carol/etc/ipsec.conf
index 598997b45..b1d9a0813 100755
--- a/testing/tests/mode-config/hosts/carol/etc/ipsec.conf
+++ b/testing/tests/mode-config/hosts/carol/etc/ipsec.conf
@@ -6,6 +6,7 @@ config setup
plutodebug=control
crlcheckinterval=180
strictcrlpolicy=no
+ charonstart=no
conn %default
ikelifetime=60m
diff --git a/testing/tests/mode-config/hosts/dave/etc/ipsec.conf b/testing/tests/mode-config/hosts/dave/etc/ipsec.conf
index da601389c..fcf690fb1 100755
--- a/testing/tests/mode-config/hosts/dave/etc/ipsec.conf
+++ b/testing/tests/mode-config/hosts/dave/etc/ipsec.conf
@@ -6,6 +6,7 @@ config setup
plutodebug=control
crlcheckinterval=180
strictcrlpolicy=no
+ charonstart=no
conn %default
ikelifetime=60m
diff --git a/testing/tests/mode-config/hosts/moon/etc/ipsec.conf b/testing/tests/mode-config/hosts/moon/etc/ipsec.conf
index 49333e217..d83b2d976 100755
--- a/testing/tests/mode-config/hosts/moon/etc/ipsec.conf
+++ b/testing/tests/mode-config/hosts/moon/etc/ipsec.conf
@@ -6,6 +6,7 @@ config setup
plutodebug=control
crlcheckinterval=180
strictcrlpolicy=no
+ charonstart=no
conn %default
ikelifetime=60m
diff --git a/testing/tests/multi-level-ca-ldap/hosts/carol/etc/ipsec.conf b/testing/tests/multi-level-ca-ldap/hosts/carol/etc/ipsec.conf
index 222c3cf67..5149fcfd0 100755
--- a/testing/tests/multi-level-ca-ldap/hosts/carol/etc/ipsec.conf
+++ b/testing/tests/multi-level-ca-ldap/hosts/carol/etc/ipsec.conf
@@ -6,6 +6,7 @@ config setup
plutodebug=control
crlcheckinterval=180
strictcrlpolicy=no
+ charonstart=no
ca strongswan
cacert=strongswanCert.pem
diff --git a/testing/tests/multi-level-ca-ldap/hosts/dave/etc/ipsec.conf b/testing/tests/multi-level-ca-ldap/hosts/dave/etc/ipsec.conf
index bfa0ebba3..d04667fc8 100755
--- a/testing/tests/multi-level-ca-ldap/hosts/dave/etc/ipsec.conf
+++ b/testing/tests/multi-level-ca-ldap/hosts/dave/etc/ipsec.conf
@@ -6,6 +6,7 @@ config setup
plutodebug=control
crlcheckinterval=180
strictcrlpolicy=no
+ charonstart=no
ca strongswan
cacert=strongswanCert.pem
diff --git a/testing/tests/multi-level-ca-ldap/hosts/moon/etc/ipsec.conf b/testing/tests/multi-level-ca-ldap/hosts/moon/etc/ipsec.conf
index e2b60589b..3754c2e90 100755
--- a/testing/tests/multi-level-ca-ldap/hosts/moon/etc/ipsec.conf
+++ b/testing/tests/multi-level-ca-ldap/hosts/moon/etc/ipsec.conf
@@ -6,6 +6,7 @@ config setup
plutodebug=control
crlcheckinterval=180
strictcrlpolicy=yes
+ charonstart=no
ca strongswan
cacert=strongswanCert.pem
diff --git a/testing/tests/multi-level-ca-loop/hosts/carol/etc/ipsec.conf b/testing/tests/multi-level-ca-loop/hosts/carol/etc/ipsec.conf
index c56678b59..621dca270 100755
--- a/testing/tests/multi-level-ca-loop/hosts/carol/etc/ipsec.conf
+++ b/testing/tests/multi-level-ca-loop/hosts/carol/etc/ipsec.conf
@@ -6,6 +6,7 @@ config setup
plutodebug=control
crlcheckinterval=180
strictcrlpolicy=no
+ charonstart=no
conn %default
ikelifetime=60m
diff --git a/testing/tests/multi-level-ca-loop/hosts/moon/etc/ipsec.conf b/testing/tests/multi-level-ca-loop/hosts/moon/etc/ipsec.conf
index 343042f15..c0b9b6a2b 100755
--- a/testing/tests/multi-level-ca-loop/hosts/moon/etc/ipsec.conf
+++ b/testing/tests/multi-level-ca-loop/hosts/moon/etc/ipsec.conf
@@ -6,6 +6,7 @@ config setup
plutodebug=control
crlcheckinterval=180
strictcrlpolicy=yes
+ charonstart=no
conn %default
ikelifetime=60m
diff --git a/testing/tests/multi-level-ca-revoked/hosts/carol/etc/ipsec.conf b/testing/tests/multi-level-ca-revoked/hosts/carol/etc/ipsec.conf
index 6d0aee86a..156ea9bb3 100755
--- a/testing/tests/multi-level-ca-revoked/hosts/carol/etc/ipsec.conf
+++ b/testing/tests/multi-level-ca-revoked/hosts/carol/etc/ipsec.conf
@@ -6,6 +6,7 @@ config setup
plutodebug=control
crlcheckinterval=180
strictcrlpolicy=yes
+ charonstart=no
conn %default
ikelifetime=60m
diff --git a/testing/tests/multi-level-ca-revoked/hosts/moon/etc/ipsec.conf b/testing/tests/multi-level-ca-revoked/hosts/moon/etc/ipsec.conf
index 39a298de9..e48a7f1a8 100755
--- a/testing/tests/multi-level-ca-revoked/hosts/moon/etc/ipsec.conf
+++ b/testing/tests/multi-level-ca-revoked/hosts/moon/etc/ipsec.conf
@@ -6,6 +6,7 @@ config setup
plutodebug=control
crlcheckinterval=180
strictcrlpolicy=yes
+ charonstart=no
ca strongswan
cacert=strongswanCert.pem
diff --git a/testing/tests/multi-level-ca-strict/hosts/carol/etc/ipsec.conf b/testing/tests/multi-level-ca-strict/hosts/carol/etc/ipsec.conf
index de179c565..1240dbfe7 100755
--- a/testing/tests/multi-level-ca-strict/hosts/carol/etc/ipsec.conf
+++ b/testing/tests/multi-level-ca-strict/hosts/carol/etc/ipsec.conf
@@ -6,6 +6,7 @@ config setup
plutodebug=control
crlcheckinterval=180
strictcrlpolicy=no
+ charonstart=no
conn %default
ikelifetime=60m
diff --git a/testing/tests/multi-level-ca-strict/hosts/dave/etc/ipsec.conf b/testing/tests/multi-level-ca-strict/hosts/dave/etc/ipsec.conf
index 2fb6a301e..eb972c854 100755
--- a/testing/tests/multi-level-ca-strict/hosts/dave/etc/ipsec.conf
+++ b/testing/tests/multi-level-ca-strict/hosts/dave/etc/ipsec.conf
@@ -6,6 +6,7 @@ config setup
plutodebug=control
crlcheckinterval=180
strictcrlpolicy=no
+ charonstart=no
conn %default
ikelifetime=60m
diff --git a/testing/tests/multi-level-ca-strict/hosts/moon/etc/ipsec.conf b/testing/tests/multi-level-ca-strict/hosts/moon/etc/ipsec.conf
index 6ed262d20..2242cab54 100755
--- a/testing/tests/multi-level-ca-strict/hosts/moon/etc/ipsec.conf
+++ b/testing/tests/multi-level-ca-strict/hosts/moon/etc/ipsec.conf
@@ -6,6 +6,7 @@ config setup
plutodebug=control
crlcheckinterval=180
strictcrlpolicy=yes
+ charonstart=no
ca strongswan
cacert=strongswanCert.pem
diff --git a/testing/tests/multi-level-ca/hosts/carol/etc/ipsec.conf b/testing/tests/multi-level-ca/hosts/carol/etc/ipsec.conf
index e851a82f0..2a753b98f 100755
--- a/testing/tests/multi-level-ca/hosts/carol/etc/ipsec.conf
+++ b/testing/tests/multi-level-ca/hosts/carol/etc/ipsec.conf
@@ -6,6 +6,7 @@ config setup
plutodebug=control
crlcheckinterval=180
strictcrlpolicy=no
+ charonstart=no
conn %default
ikelifetime=60m
diff --git a/testing/tests/multi-level-ca/hosts/dave/etc/ipsec.conf b/testing/tests/multi-level-ca/hosts/dave/etc/ipsec.conf
index 458a4ca5e..cabdfeaeb 100755
--- a/testing/tests/multi-level-ca/hosts/dave/etc/ipsec.conf
+++ b/testing/tests/multi-level-ca/hosts/dave/etc/ipsec.conf
@@ -6,6 +6,7 @@ config setup
plutodebug=control
crlcheckinterval=180
strictcrlpolicy=no
+ charonstart=no
conn %default
ikelifetime=60m
diff --git a/testing/tests/multi-level-ca/hosts/moon/etc/ipsec.conf b/testing/tests/multi-level-ca/hosts/moon/etc/ipsec.conf
index e60bbc016..dcc0296a7 100755
--- a/testing/tests/multi-level-ca/hosts/moon/etc/ipsec.conf
+++ b/testing/tests/multi-level-ca/hosts/moon/etc/ipsec.conf
@@ -6,6 +6,7 @@ config setup
plutodebug=control
crlcheckinterval=180
strictcrlpolicy=no
+ charonstart=no
ca strongswan
cacert=strongswanCert.pem
diff --git a/testing/tests/net2net-pgp/hosts/moon/etc/ipsec.conf b/testing/tests/net2net-pgp/hosts/moon/etc/ipsec.conf
index e7de6cf0b..4194c57ef 100755
--- a/testing/tests/net2net-pgp/hosts/moon/etc/ipsec.conf
+++ b/testing/tests/net2net-pgp/hosts/moon/etc/ipsec.conf
@@ -5,6 +5,7 @@ version 2.0 # conforms to second version of ipsec.conf specification
config setup
plutodebug=control
nocrsend=yes
+ charonstart=no
conn %default
ikelifetime=60m
diff --git a/testing/tests/net2net-pgp/hosts/sun/etc/ipsec.conf b/testing/tests/net2net-pgp/hosts/sun/etc/ipsec.conf
index 5dd8a8587..1a4484020 100755
--- a/testing/tests/net2net-pgp/hosts/sun/etc/ipsec.conf
+++ b/testing/tests/net2net-pgp/hosts/sun/etc/ipsec.conf
@@ -5,6 +5,7 @@ version 2.0 # conforms to second version of ipsec.conf specification
config setup
plutodebug=control
nocrsend=yes
+ charonstart=no
conn %default
ikelifetime=60m
diff --git a/testing/tests/net2net-psk-fail/hosts/moon/etc/ipsec.conf b/testing/tests/net2net-psk-fail/hosts/moon/etc/ipsec.conf
index 87396e455..acc336a4e 100755
--- a/testing/tests/net2net-psk-fail/hosts/moon/etc/ipsec.conf
+++ b/testing/tests/net2net-psk-fail/hosts/moon/etc/ipsec.conf
@@ -4,6 +4,7 @@ version 2.0 # conforms to second version of ipsec.conf specification
config setup
plutodebug=control
+ charonstart=no
conn %default
ikelifetime=60m
diff --git a/testing/tests/net2net-psk-fail/hosts/sun/etc/ipsec.conf b/testing/tests/net2net-psk-fail/hosts/sun/etc/ipsec.conf
index 7e102b25c..4b2645370 100755
--- a/testing/tests/net2net-psk-fail/hosts/sun/etc/ipsec.conf
+++ b/testing/tests/net2net-psk-fail/hosts/sun/etc/ipsec.conf
@@ -4,6 +4,7 @@ version 2.0 # conforms to second version of ipsec.conf specification
config setup
plutodebug=control
+ charonstart=no
conn %default
ikelifetime=60m
diff --git a/testing/tests/net2net-psk/hosts/moon/etc/ipsec.conf b/testing/tests/net2net-psk/hosts/moon/etc/ipsec.conf
index 51c53a505..ddfce35cd 100755
--- a/testing/tests/net2net-psk/hosts/moon/etc/ipsec.conf
+++ b/testing/tests/net2net-psk/hosts/moon/etc/ipsec.conf
@@ -4,6 +4,7 @@ version 2.0 # conforms to second version of ipsec.conf specification
config setup
plutodebug=control
+ charonstart=no
conn %default
ikelifetime=60m
diff --git a/testing/tests/net2net-psk/hosts/sun/etc/ipsec.conf b/testing/tests/net2net-psk/hosts/sun/etc/ipsec.conf
index 9c3695178..ed3fe259f 100755
--- a/testing/tests/net2net-psk/hosts/sun/etc/ipsec.conf
+++ b/testing/tests/net2net-psk/hosts/sun/etc/ipsec.conf
@@ -4,6 +4,7 @@ version 2.0 # conforms to second version of ipsec.conf specification
config setup
plutodebug=control
+ charonstart=no
conn %default
ikelifetime=60m
diff --git a/testing/tests/net2net-route/hosts/moon/etc/ipsec.conf b/testing/tests/net2net-route/hosts/moon/etc/ipsec.conf
index 4063ae05f..a16129085 100755
--- a/testing/tests/net2net-route/hosts/moon/etc/ipsec.conf
+++ b/testing/tests/net2net-route/hosts/moon/etc/ipsec.conf
@@ -6,6 +6,7 @@ config setup
plutodebug=control
crlcheckinterval=180
strictcrlpolicy=no
+ charonstart=no
conn %default
ikelifetime=60m
diff --git a/testing/tests/net2net-rsa/hosts/moon/etc/ipsec.conf b/testing/tests/net2net-rsa/hosts/moon/etc/ipsec.conf
index 772762321..7eaea4945 100755
--- a/testing/tests/net2net-rsa/hosts/moon/etc/ipsec.conf
+++ b/testing/tests/net2net-rsa/hosts/moon/etc/ipsec.conf
@@ -4,6 +4,7 @@ version 2.0 # conforms to second version of ipsec.conf specification
config setup
plutodebug=control
+ charonstart=no
conn %default
ikelifetime=60m
diff --git a/testing/tests/net2net-rsa/hosts/sun/etc/ipsec.conf b/testing/tests/net2net-rsa/hosts/sun/etc/ipsec.conf
index 9626ef168..018ea65a5 100755
--- a/testing/tests/net2net-rsa/hosts/sun/etc/ipsec.conf
+++ b/testing/tests/net2net-rsa/hosts/sun/etc/ipsec.conf
@@ -4,6 +4,7 @@ version 2.0 # conforms to second version of ipsec.conf specification
config setup
plutodebug=control
+ charonstart=no
conn %default
ikelifetime=60m
diff --git a/testing/tests/net2net-start/hosts/moon/etc/ipsec.conf b/testing/tests/net2net-start/hosts/moon/etc/ipsec.conf
index 677955bc1..64b11a2fc 100755
--- a/testing/tests/net2net-start/hosts/moon/etc/ipsec.conf
+++ b/testing/tests/net2net-start/hosts/moon/etc/ipsec.conf
@@ -6,6 +6,7 @@ config setup
plutodebug=control
crlcheckinterval=180
strictcrlpolicy=no
+ charonstart=no
conn %default
ikelifetime=60m
diff --git a/testing/tests/ocsp-revoked/hosts/carol/etc/ipsec.conf b/testing/tests/ocsp-revoked/hosts/carol/etc/ipsec.conf
index 7d4384767..2f495395e 100755
--- a/testing/tests/ocsp-revoked/hosts/carol/etc/ipsec.conf
+++ b/testing/tests/ocsp-revoked/hosts/carol/etc/ipsec.conf
@@ -6,6 +6,7 @@ config setup
plutodebug=control
crlcheckinterval=180
strictcrlpolicy=yes
+ charonstart=no
ca strongswan
cacert=strongswanCert.pem
diff --git a/testing/tests/ocsp-revoked/hosts/moon/etc/ipsec.conf b/testing/tests/ocsp-revoked/hosts/moon/etc/ipsec.conf
index 7134b6ee9..9236234ab 100755
--- a/testing/tests/ocsp-revoked/hosts/moon/etc/ipsec.conf
+++ b/testing/tests/ocsp-revoked/hosts/moon/etc/ipsec.conf
@@ -6,6 +6,7 @@ config setup
plutodebug=control
crlcheckinterval=180
strictcrlpolicy=yes
+ charonstart=no
ca strongswan
cacert=strongswanCert.pem
diff --git a/testing/tests/ocsp-strict/hosts/carol/etc/ipsec.conf b/testing/tests/ocsp-strict/hosts/carol/etc/ipsec.conf
index b34719401..1bdb0ac2f 100755
--- a/testing/tests/ocsp-strict/hosts/carol/etc/ipsec.conf
+++ b/testing/tests/ocsp-strict/hosts/carol/etc/ipsec.conf
@@ -6,6 +6,7 @@ config setup
plutodebug=control
crlcheckinterval=180
strictcrlpolicy=yes
+ charonstart=no
ca strongswan
cacert=strongswanCert.pem
diff --git a/testing/tests/ocsp-strict/hosts/moon/etc/ipsec.conf b/testing/tests/ocsp-strict/hosts/moon/etc/ipsec.conf
index 7134b6ee9..9236234ab 100755
--- a/testing/tests/ocsp-strict/hosts/moon/etc/ipsec.conf
+++ b/testing/tests/ocsp-strict/hosts/moon/etc/ipsec.conf
@@ -6,6 +6,7 @@ config setup
plutodebug=control
crlcheckinterval=180
strictcrlpolicy=yes
+ charonstart=no
ca strongswan
cacert=strongswanCert.pem
diff --git a/testing/tests/protoport-dual/hosts/carol/etc/ipsec.conf b/testing/tests/protoport-dual/hosts/carol/etc/ipsec.conf
index 9e05ecf61..b9e60c224 100755
--- a/testing/tests/protoport-dual/hosts/carol/etc/ipsec.conf
+++ b/testing/tests/protoport-dual/hosts/carol/etc/ipsec.conf
@@ -6,6 +6,7 @@ config setup
plutodebug=control
crlcheckinterval=180
strictcrlpolicy=no
+ charonstart=no
conn %default
ikelifetime=60m
diff --git a/testing/tests/protoport-dual/hosts/moon/etc/ipsec.conf b/testing/tests/protoport-dual/hosts/moon/etc/ipsec.conf
index 84b9b0ba3..4597f96f4 100755
--- a/testing/tests/protoport-dual/hosts/moon/etc/ipsec.conf
+++ b/testing/tests/protoport-dual/hosts/moon/etc/ipsec.conf
@@ -6,6 +6,7 @@ config setup
plutodebug=control
crlcheckinterval=180
strictcrlpolicy=no
+ charonstart=no
conn %default
ikelifetime=60m
diff --git a/testing/tests/protoport-pass/hosts/carol/etc/ipsec.conf b/testing/tests/protoport-pass/hosts/carol/etc/ipsec.conf
index ade7308f6..a19bc6dbf 100755
--- a/testing/tests/protoport-pass/hosts/carol/etc/ipsec.conf
+++ b/testing/tests/protoport-pass/hosts/carol/etc/ipsec.conf
@@ -6,6 +6,7 @@ config setup
plutodebug=control
crlcheckinterval=180
strictcrlpolicy=no
+ charonstart=no
conn %default
ikelifetime=60m
diff --git a/testing/tests/protoport-pass/hosts/moon/etc/ipsec.conf b/testing/tests/protoport-pass/hosts/moon/etc/ipsec.conf
index fd67e2b4b..8c46e894f 100755
--- a/testing/tests/protoport-pass/hosts/moon/etc/ipsec.conf
+++ b/testing/tests/protoport-pass/hosts/moon/etc/ipsec.conf
@@ -6,6 +6,7 @@ config setup
plutodebug=control
crlcheckinterval=180
strictcrlpolicy=no
+ charonstart=no
conn %default
ikelifetime=60m
diff --git a/testing/tests/protoport-route/hosts/carol/etc/ipsec.conf b/testing/tests/protoport-route/hosts/carol/etc/ipsec.conf
index 31c25c12f..94a78081a 100755
--- a/testing/tests/protoport-route/hosts/carol/etc/ipsec.conf
+++ b/testing/tests/protoport-route/hosts/carol/etc/ipsec.conf
@@ -6,6 +6,7 @@ config setup
plutodebug=control
crlcheckinterval=180
strictcrlpolicy=no
+ charonstart=no
conn %default
ikelifetime=60m
diff --git a/testing/tests/protoport-route/hosts/moon/etc/ipsec.conf b/testing/tests/protoport-route/hosts/moon/etc/ipsec.conf
index 84b9b0ba3..4597f96f4 100755
--- a/testing/tests/protoport-route/hosts/moon/etc/ipsec.conf
+++ b/testing/tests/protoport-route/hosts/moon/etc/ipsec.conf
@@ -6,6 +6,7 @@ config setup
plutodebug=control
crlcheckinterval=180
strictcrlpolicy=no
+ charonstart=no
conn %default
ikelifetime=60m
diff --git a/testing/tests/req-pkcs10/hosts/carol/etc/ipsec.conf b/testing/tests/req-pkcs10/hosts/carol/etc/ipsec.conf
index 58e2f1e5b..95d5bdebd 100755
--- a/testing/tests/req-pkcs10/hosts/carol/etc/ipsec.conf
+++ b/testing/tests/req-pkcs10/hosts/carol/etc/ipsec.conf
@@ -6,6 +6,7 @@ config setup
plutodebug=control
crlcheckinterval=180
strictcrlpolicy=no
+ charonstart=no
conn %default
ikelifetime=60m
diff --git a/testing/tests/rw-psk-fqdn-named/hosts/carol/etc/ipsec.conf b/testing/tests/rw-psk-fqdn-named/hosts/carol/etc/ipsec.conf
index da5e198a8..9ae925cf6 100755
--- a/testing/tests/rw-psk-fqdn-named/hosts/carol/etc/ipsec.conf
+++ b/testing/tests/rw-psk-fqdn-named/hosts/carol/etc/ipsec.conf
@@ -4,6 +4,7 @@ version 2.0 # conforms to second version of ipsec.conf specification
config setup
plutodebug=control
+ charonstart=no
conn %default
ikelifetime=60m
diff --git a/testing/tests/rw-psk-fqdn-named/hosts/moon/etc/ipsec.conf b/testing/tests/rw-psk-fqdn-named/hosts/moon/etc/ipsec.conf
index c32dfaf9b..6244e04fb 100755
--- a/testing/tests/rw-psk-fqdn-named/hosts/moon/etc/ipsec.conf
+++ b/testing/tests/rw-psk-fqdn-named/hosts/moon/etc/ipsec.conf
@@ -4,6 +4,7 @@ version 2.0 # conforms to second version of ipsec.conf specification
config setup
plutodebug=control
+ charonstart=no
conn %default
ikelifetime=60m
diff --git a/testing/tests/rw-psk-fqdn/hosts/carol/etc/ipsec.conf b/testing/tests/rw-psk-fqdn/hosts/carol/etc/ipsec.conf
index da5e198a8..9ae925cf6 100755
--- a/testing/tests/rw-psk-fqdn/hosts/carol/etc/ipsec.conf
+++ b/testing/tests/rw-psk-fqdn/hosts/carol/etc/ipsec.conf
@@ -4,6 +4,7 @@ version 2.0 # conforms to second version of ipsec.conf specification
config setup
plutodebug=control
+ charonstart=no
conn %default
ikelifetime=60m
diff --git a/testing/tests/rw-psk-fqdn/hosts/moon/etc/ipsec.conf b/testing/tests/rw-psk-fqdn/hosts/moon/etc/ipsec.conf
index 9a894806c..bb0eec7f1 100755
--- a/testing/tests/rw-psk-fqdn/hosts/moon/etc/ipsec.conf
+++ b/testing/tests/rw-psk-fqdn/hosts/moon/etc/ipsec.conf
@@ -4,6 +4,7 @@ version 2.0 # conforms to second version of ipsec.conf specification
config setup
plutodebug=control
+ charonstart=no
conn %default
ikelifetime=60m
diff --git a/testing/tests/rw-psk-ipv4/hosts/carol/etc/ipsec.conf b/testing/tests/rw-psk-ipv4/hosts/carol/etc/ipsec.conf
index 2c0227b7a..57ae965c9 100755
--- a/testing/tests/rw-psk-ipv4/hosts/carol/etc/ipsec.conf
+++ b/testing/tests/rw-psk-ipv4/hosts/carol/etc/ipsec.conf
@@ -4,6 +4,7 @@ version 2.0 # conforms to second version of ipsec.conf specification
config setup
plutodebug=control
+ charonstart=no
conn %default
ikelifetime=60m
diff --git a/testing/tests/rw-psk-ipv4/hosts/moon/etc/ipsec.conf b/testing/tests/rw-psk-ipv4/hosts/moon/etc/ipsec.conf
index a75d4e222..fd6d6192a 100755
--- a/testing/tests/rw-psk-ipv4/hosts/moon/etc/ipsec.conf
+++ b/testing/tests/rw-psk-ipv4/hosts/moon/etc/ipsec.conf
@@ -4,6 +4,7 @@ version 2.0 # conforms to second version of ipsec.conf specification
config setup
plutodebug=control
+ charonstart=no
conn %default
ikelifetime=60m
diff --git a/testing/tests/rw-psk-no-policy/hosts/carol/etc/ipsec.conf b/testing/tests/rw-psk-no-policy/hosts/carol/etc/ipsec.conf
index 413eff762..8d402d740 100755
--- a/testing/tests/rw-psk-no-policy/hosts/carol/etc/ipsec.conf
+++ b/testing/tests/rw-psk-no-policy/hosts/carol/etc/ipsec.conf
@@ -4,6 +4,7 @@ version 2.0 # conforms to second version of ipsec.conf specification
config setup
plutodebug=control
+ charonstart=no
conn %default
ikelifetime=60m
diff --git a/testing/tests/rw-psk-no-policy/hosts/moon/etc/ipsec.conf b/testing/tests/rw-psk-no-policy/hosts/moon/etc/ipsec.conf
index ac63abdc9..196968e07 100755
--- a/testing/tests/rw-psk-no-policy/hosts/moon/etc/ipsec.conf
+++ b/testing/tests/rw-psk-no-policy/hosts/moon/etc/ipsec.conf
@@ -4,6 +4,7 @@ version 2.0 # conforms to second version of ipsec.conf specification
config setup
plutodebug=control
+ charonstart=no
conn %default
ikelifetime=60m
diff --git a/testing/tests/rw-psk-rsa-mixed/hosts/carol/etc/ipsec.conf b/testing/tests/rw-psk-rsa-mixed/hosts/carol/etc/ipsec.conf
index 69e13b538..d1abc5b6d 100755
--- a/testing/tests/rw-psk-rsa-mixed/hosts/carol/etc/ipsec.conf
+++ b/testing/tests/rw-psk-rsa-mixed/hosts/carol/etc/ipsec.conf
@@ -4,6 +4,7 @@ version 2.0 # conforms to second version of ipsec.conf specification
config setup
plutodebug=control
+ charonstart=no
conn %default
ikelifetime=60m
diff --git a/testing/tests/rw-psk-rsa-mixed/hosts/moon/etc/ipsec.conf b/testing/tests/rw-psk-rsa-mixed/hosts/moon/etc/ipsec.conf
index b23248b5b..3268b1f7c 100755
--- a/testing/tests/rw-psk-rsa-mixed/hosts/moon/etc/ipsec.conf
+++ b/testing/tests/rw-psk-rsa-mixed/hosts/moon/etc/ipsec.conf
@@ -4,6 +4,7 @@ version 2.0 # conforms to second version of ipsec.conf specification
config setup
plutodebug=control
+ charonstart=no
conn %default
ikelifetime=60m
diff --git a/testing/tests/self-signed/hosts/carol/etc/ipsec.conf b/testing/tests/self-signed/hosts/carol/etc/ipsec.conf
index fcf7a1754..cb831c436 100755
--- a/testing/tests/self-signed/hosts/carol/etc/ipsec.conf
+++ b/testing/tests/self-signed/hosts/carol/etc/ipsec.conf
@@ -7,6 +7,7 @@ config setup
crlcheckinterval=0
strictcrlpolicy=no
nocrsend=yes
+ charonstart=no
conn %default
ikelifetime=60m
diff --git a/testing/tests/self-signed/hosts/moon/etc/ipsec.conf b/testing/tests/self-signed/hosts/moon/etc/ipsec.conf
index 7d7f42b06..7665e7cf6 100755
--- a/testing/tests/self-signed/hosts/moon/etc/ipsec.conf
+++ b/testing/tests/self-signed/hosts/moon/etc/ipsec.conf
@@ -7,6 +7,7 @@ config setup
crlcheckinterval=0
strictcrlpolicy=no
nocrsend=yes
+ charonstart=no
conn %default
ikelifetime=60m
@@ -15,7 +16,7 @@ conn %default
keyingtries=1
conn carol
- left=192.168.0.1
+ left=PH_IP_MOON
leftnexthop=%direct
leftcert=moonCert.der
leftid=@moon.strongswan.org
diff --git a/testing/tests/starter-also-loop/hosts/moon/etc/ipsec.conf b/testing/tests/starter-also-loop/hosts/moon/etc/ipsec.conf
index e1d210253..e7731ddb9 100755
--- a/testing/tests/starter-also-loop/hosts/moon/etc/ipsec.conf
+++ b/testing/tests/starter-also-loop/hosts/moon/etc/ipsec.conf
@@ -6,6 +6,7 @@ config setup
plutodebug=control
crlcheckinterval=180
strictcrlpolicy=no
+ charonstart=no
conn %default
ikelifetime=60m
@@ -30,7 +31,7 @@ conn rw
auto=add
conn moon
- left=192.168.0.1
+ left=PH_IP_MOON
leftnexthop=%direct
leftcert=moonCert.pem
leftid=@moon.strongswan.org
@@ -41,7 +42,7 @@ conn moon-net
leftsubnet=10.1.0.0/16
conn sun
- right=192.168.0.2
+ right=PH_IP_SUN
rightid=@sun.strongswan.org
conn sun-net
diff --git a/testing/tests/starter-also/hosts/moon/etc/ipsec.conf b/testing/tests/starter-also/hosts/moon/etc/ipsec.conf
index 74d009cfa..7da271636 100755
--- a/testing/tests/starter-also/hosts/moon/etc/ipsec.conf
+++ b/testing/tests/starter-also/hosts/moon/etc/ipsec.conf
@@ -6,6 +6,7 @@ config setup
plutodebug=control
crlcheckinterval=180
strictcrlpolicy=no
+ charonstart=no
conn %default
ikelifetime=60m
@@ -30,7 +31,7 @@ conn rw
auto=add
conn moon
- left=192.168.0.1
+ left=PH_IP_MOON
leftnexthop=%direct
leftcert=moonCert.pem
leftid=@moon.strongswan.org
@@ -40,7 +41,7 @@ conn moon-net
leftsubnet=10.1.0.0/16
conn sun
- right=192.168.0.2
+ right=PH_IP_SUN
rightid=@sun.strongswan.org
conn sun-net
diff --git a/testing/tests/starter-includes/hosts/carol/etc/ipsec.conf b/testing/tests/starter-includes/hosts/carol/etc/ipsec.conf
index 598997b45..b1d9a0813 100755
--- a/testing/tests/starter-includes/hosts/carol/etc/ipsec.conf
+++ b/testing/tests/starter-includes/hosts/carol/etc/ipsec.conf
@@ -6,6 +6,7 @@ config setup
plutodebug=control
crlcheckinterval=180
strictcrlpolicy=no
+ charonstart=no
conn %default
ikelifetime=60m
diff --git a/testing/tests/starter-includes/hosts/dave/etc/ipsec.conf b/testing/tests/starter-includes/hosts/dave/etc/ipsec.conf
index da601389c..fcf690fb1 100755
--- a/testing/tests/starter-includes/hosts/dave/etc/ipsec.conf
+++ b/testing/tests/starter-includes/hosts/dave/etc/ipsec.conf
@@ -6,6 +6,7 @@ config setup
plutodebug=control
crlcheckinterval=180
strictcrlpolicy=no
+ charonstart=no
conn %default
ikelifetime=60m
diff --git a/testing/tests/starter-includes/hosts/moon/etc/ipsec.conf b/testing/tests/starter-includes/hosts/moon/etc/ipsec.conf
index aa9116252..f8f78aa11 100755
--- a/testing/tests/starter-includes/hosts/moon/etc/ipsec.conf
+++ b/testing/tests/starter-includes/hosts/moon/etc/ipsec.conf
@@ -6,5 +6,6 @@ config setup
plutodebug=control
crlcheckinterval=180
strictcrlpolicy=no
+ charonstart=no
include /etc/ipsec.connections
diff --git a/testing/tests/virtual-ip-swapped/hosts/carol/etc/ipsec.conf b/testing/tests/virtual-ip-swapped/hosts/carol/etc/ipsec.conf
index 0e239b707..980552d36 100755
--- a/testing/tests/virtual-ip-swapped/hosts/carol/etc/ipsec.conf
+++ b/testing/tests/virtual-ip-swapped/hosts/carol/etc/ipsec.conf
@@ -6,6 +6,7 @@ config setup
plutodebug=control
crlcheckinterval=180
strictcrlpolicy=no
+ charonstart=no
conn %default
ikelifetime=60m
diff --git a/testing/tests/virtual-ip-swapped/hosts/moon/etc/ipsec.conf b/testing/tests/virtual-ip-swapped/hosts/moon/etc/ipsec.conf
index db6effbac..253c2989e 100755
--- a/testing/tests/virtual-ip-swapped/hosts/moon/etc/ipsec.conf
+++ b/testing/tests/virtual-ip-swapped/hosts/moon/etc/ipsec.conf
@@ -6,6 +6,7 @@ config setup
plutodebug=control
crlcheckinterval=180
strictcrlpolicy=no
+ charonstart=no
conn %default
ikelifetime=60m
diff --git a/testing/tests/virtual-ip/hosts/carol/etc/ipsec.conf b/testing/tests/virtual-ip/hosts/carol/etc/ipsec.conf
index 2f1170a6b..73f2189b0 100755
--- a/testing/tests/virtual-ip/hosts/carol/etc/ipsec.conf
+++ b/testing/tests/virtual-ip/hosts/carol/etc/ipsec.conf
@@ -6,6 +6,7 @@ config setup
plutodebug=control
crlcheckinterval=180
strictcrlpolicy=no
+ charonstart=no
conn %default
ikelifetime=60m
diff --git a/testing/tests/virtual-ip/hosts/moon/etc/ipsec.conf b/testing/tests/virtual-ip/hosts/moon/etc/ipsec.conf
index 1cd8aab25..5cdd21530 100755
--- a/testing/tests/virtual-ip/hosts/moon/etc/ipsec.conf
+++ b/testing/tests/virtual-ip/hosts/moon/etc/ipsec.conf
@@ -6,6 +6,7 @@ config setup
plutodebug=control
crlcheckinterval=180
strictcrlpolicy=no
+ charonstart=no
conn %default
ikelifetime=60m
diff --git a/testing/tests/wildcards/hosts/carol/etc/ipsec.conf b/testing/tests/wildcards/hosts/carol/etc/ipsec.conf
index de179c565..1240dbfe7 100755
--- a/testing/tests/wildcards/hosts/carol/etc/ipsec.conf
+++ b/testing/tests/wildcards/hosts/carol/etc/ipsec.conf
@@ -6,6 +6,7 @@ config setup
plutodebug=control
crlcheckinterval=180
strictcrlpolicy=no
+ charonstart=no
conn %default
ikelifetime=60m
diff --git a/testing/tests/wildcards/hosts/dave/etc/ipsec.conf b/testing/tests/wildcards/hosts/dave/etc/ipsec.conf
index 2fb6a301e..eb972c854 100755
--- a/testing/tests/wildcards/hosts/dave/etc/ipsec.conf
+++ b/testing/tests/wildcards/hosts/dave/etc/ipsec.conf
@@ -6,6 +6,7 @@ config setup
plutodebug=control
crlcheckinterval=180
strictcrlpolicy=no
+ charonstart=no
conn %default
ikelifetime=60m
diff --git a/testing/tests/wildcards/hosts/moon/etc/ipsec.conf b/testing/tests/wildcards/hosts/moon/etc/ipsec.conf
index ee7bc8115..90bf48d83 100755
--- a/testing/tests/wildcards/hosts/moon/etc/ipsec.conf
+++ b/testing/tests/wildcards/hosts/moon/etc/ipsec.conf
@@ -6,6 +6,7 @@ config setup
plutodebug=control
crlcheckinterval=180
strictcrlpolicy=no
+ charonstart=no
conn %default
ikelifetime=60m
diff --git a/testing/tests/wlan/hosts/alice/etc/ipsec.conf b/testing/tests/wlan/hosts/alice/etc/ipsec.conf
index a658e4fe8..9c3003f43 100755
--- a/testing/tests/wlan/hosts/alice/etc/ipsec.conf
+++ b/testing/tests/wlan/hosts/alice/etc/ipsec.conf
@@ -7,6 +7,7 @@ config setup
crlcheckinterval=180
strictcrlpolicy=no
nat_traversal=no
+ charonstart=no
conn %default
ikelifetime=60m
diff --git a/testing/tests/wlan/hosts/moon/etc/ipsec.conf b/testing/tests/wlan/hosts/moon/etc/ipsec.conf
index f873479e8..0a6c491b1 100755
--- a/testing/tests/wlan/hosts/moon/etc/ipsec.conf
+++ b/testing/tests/wlan/hosts/moon/etc/ipsec.conf
@@ -7,6 +7,7 @@ config setup
crlcheckinterval=180
strictcrlpolicy=no
nat_traversal=no
+ charonstart=no
conn %default
ikelifetime=60m
diff --git a/testing/tests/wlan/hosts/venus/etc/ipsec.conf b/testing/tests/wlan/hosts/venus/etc/ipsec.conf
index 742c1dbce..bf0f423c6 100755
--- a/testing/tests/wlan/hosts/venus/etc/ipsec.conf
+++ b/testing/tests/wlan/hosts/venus/etc/ipsec.conf
@@ -7,6 +7,7 @@ config setup
crlcheckinterval=180
strictcrlpolicy=no
nat_traversal=no
+ charonstart=no
conn %default
ikelifetime=60m