diff options
author | Martin Willi <martin@strongswan.org> | 2009-11-26 15:58:55 +0100 |
---|---|---|
committer | Martin Willi <martin@strongswan.org> | 2009-11-26 16:03:06 +0100 |
commit | 2b2c69e992d5e279ecde7d3ebf20804d59b8bf0d (patch) | |
tree | c55fafe62b0b97c5a4d34c09040a56d482bb7b4d /src/charon/plugins/kernel_netlink/kernel_netlink_ipsec.c | |
parent | 52fd0ef9e09d0bb7362e521c04e59b4712703f75 (diff) | |
download | strongswan-2b2c69e992d5e279ecde7d3ebf20804d59b8bf0d.tar.bz2 strongswan-2b2c69e992d5e279ecde7d3ebf20804d59b8bf0d.tar.xz |
Use transport mode ESP SA if IPcomp is used, IPcomp already applies outer IP header
Diffstat (limited to 'src/charon/plugins/kernel_netlink/kernel_netlink_ipsec.c')
-rw-r--r-- | src/charon/plugins/kernel_netlink/kernel_netlink_ipsec.c | 14 |
1 files changed, 11 insertions, 3 deletions
diff --git a/src/charon/plugins/kernel_netlink/kernel_netlink_ipsec.c b/src/charon/plugins/kernel_netlink/kernel_netlink_ipsec.c index cff5611d4..d96d6fc61 100644 --- a/src/charon/plugins/kernel_netlink/kernel_netlink_ipsec.c +++ b/src/charon/plugins/kernel_netlink/kernel_netlink_ipsec.c @@ -946,6 +946,8 @@ static status_t add_sa(private_kernel_netlink_ipsec_t *this, ENCR_UNDEFINED, chunk_empty, AUTH_UNDEFINED, chunk_empty, mode, ipcomp, 0, FALSE, inbound); ipcomp = IPCOMP_NONE; + /* use transport mode ESP SA, IPComp uses tunnel mode */ + mode = MODE_TRANSPORT; } memset(&request, 0, sizeof(request)); @@ -1663,6 +1665,15 @@ static status_t add_policy(private_kernel_netlink_ipsec_t *this, } tmpl++; + + /* use transport mode for ESP if we have a tunnel mode IPcomp SA */ + mode = MODE_TRANSPORT; + } + else + { + /* when using IPcomp, only the IPcomp SA uses tmp src/dst addresses */ + host2xfrm(src, &tmpl->saddr); + host2xfrm(dst, &tmpl->id.daddr); } tmpl->reqid = reqid; @@ -1671,9 +1682,6 @@ static status_t add_policy(private_kernel_netlink_ipsec_t *this, tmpl->mode = mode2kernel(mode); tmpl->family = src->get_family(src); - host2xfrm(src, &tmpl->saddr); - host2xfrm(dst, &tmpl->id.daddr); - if (this->socket_xfrm->send_ack(this->socket_xfrm, hdr) != SUCCESS) { DBG1(DBG_KNL, "unable to add policy %R === %R %N", src_ts, dst_ts, |