aboutsummaryrefslogtreecommitdiffstats
path: root/conf
diff options
context:
space:
mode:
authorMartin Willi <martin@revosec.ch>2014-04-14 14:42:27 +0200
committerMartin Willi <martin@revosec.ch>2014-04-17 08:52:28 +0200
commitc4c9d291d2aaeccf9d36971de763b0ab60af9e66 (patch)
tree167bfd78fbf9cd11bb1dcb46da9c6fccf9e34fbb /conf
parent4469e3d0507ad869488d3e7524a061e18fb3ee21 (diff)
downloadstrongswan-c4c9d291d2aaeccf9d36971de763b0ab60af9e66.tar.bz2
strongswan-c4c9d291d2aaeccf9d36971de763b0ab60af9e66.tar.xz
ikev1: Add an option to accept unencrypted ID/HASH payloads
Even in Main Mode, some Sonicwall boxes seem to send ID/HASH payloads in unencrypted form, probably to allow PSK lookup based on the ID payloads. We by default reject that, but accept it if the charon.accept_unencrypted_mainmode_messages option is set in strongswan.conf. Initial patch courtesy of Paul Stewart.
Diffstat (limited to 'conf')
-rw-r--r--conf/options/charon.opt15
1 files changed, 15 insertions, 0 deletions
diff --git a/conf/options/charon.opt b/conf/options/charon.opt
index c6f4f1e9e..aaf4fdc14 100644
--- a/conf/options/charon.opt
+++ b/conf/options/charon.opt
@@ -8,6 +8,21 @@ charon {}
**charon-cmd** instead of **charon**). For many options defaults can be
defined in the **libstrongswan** section.
+charon.accept_unencrypted_mainmode_messages = no
+ Accept unencrypted ID and HASH payloads in IKEv1 Main Mode.
+
+ Accept unencrypted ID and HASH payloads in IKEv1 Main Mode.
+
+ Some implementations send the third Main Mode message unencrypted, probably
+ to find the PSKs for the specified ID for authentication. This is very
+ similar to Aggressive Mode, and has the same security implications: A
+ passive attacker can sniff the negotiated Identity, and start brute forcing
+ the PSK using the HASH payload.
+
+ It is recommended to keep this option to no, unless you know exactly
+ what the implications are and require compatibility to such devices (for
+ example, some SonicWall boxes).
+
charon.block_threshold = 5
Maximum number of half-open IKE_SAs for a single peer IP.