Troy,
It's not a dumb question. I just figured it out myself. In the connection
defaults, or in the specific connection you want to use aes, just add
esp=aes. Of course the ipsec-aes.o module must be loaded.
Roger
Troy Aden <Troy.Aden
@VCom.com>
04/14/2004 10:13 AM
To: Roger E McClurg/CEG/[EMAIL PROTECTED], Charles Steinkuehler
<[EMAIL PROTECTED]>
cc: [EMAIL PROTECTED]
Subject: RE: [leaf-user] Bering 1.2 Throughput Test Results
I am sure this question is a silly one but here it goes.
How do I go about changing the Encryption algorithm in Freeswan IPSec?
I am using Bering Uclibc 2.0. I am using FreeSwan IPSec with PSK's for my
connections. I did not see anything in the procedures for changing the
encryption algorithms that this package uses. I am assuming that I would
add
the module (ipsec_aes.o) to /lib/modules/. But can anyone please tell me
the
command that I need to put in the IPSec config file to tell it
specifically
what algorithm to use?
Thanks in advance!
Troy
Here is what my config looks like:
config setup
# THIS SETTING MUST BE CORRECT or almost nothing will work;
# %defaultroute is okay for most simple cases.
interfaces=%defaultroute
# Debug-logging controls: "none" for (almost) none, "all" for
lots.
klipsdebug=none
plutodebug=none
# Use auto= parameters in conn descriptions to control startup
actions.
plutoload=%search
plutostart=%search
# Close down old connection when new one using same ID shows up.
uniqueids=yes
# defaults for subsequent connection descriptions
conn %default
# How persistent to be in (re)keying negotiations (0 means very).
keyingtries=0
# RSA authentication with keys from DNS.
authby=secret
right=132.125.107.155
rightsubnet=192.168.55.0/16
rightnexthop=132.125.107.254
pfs=yes
conn block
auto=ignore
conn private
auto=ignore
conn private-or-clear
auto=ignore
conn clear
auto=ignore
conn packetdefault
auto=ignore
conn troy
left=139.145.45.166
leftsubnet=10.10.65.0/24
leftnexthop=139.145.45.129
auto=start
Here is what comes up when I start a connection:
ipsec whack --initiate --name test
002 "troy" #152: initiating Main Mode
104 "troy" #152: STATE_MAIN_I1: initiate
106 "troy" #152: STATE_MAIN_I2: sent MI2, expecting MR2
108 "troy" #152: STATE_MAIN_I3: sent MI3, expecting MR3
002 "troy" #152: Main mode peer ID is ID_IPV4_ADDR: '139.145.45.166'
002 "troy" #152: ISAKMP SA established
004 "troy" #152: STATE_MAIN_I4: ISAKMP SA established
002 "troy" #153: initiating Quick Mode
PSK+ENCRYPT+TUNNEL+PFS+DISABLEARRIVALCHECK
117 "troy" #153: STATE_QUICK_I1: initiate
002 "troy" #153: sent QI2, IPsec SA established
004 "troy" #153: STATE_QUICK_I2: sent QI2, IPsec SA established
-----Original Message-----
From: Roger E McClurg [mailto:[EMAIL PROTECTED]
Sent: Wednesday, April 14, 2004 7:13 AM
To: Charles Steinkuehler
Cc: [EMAIL PROTECTED]
Subject: Re: [leaf-user] Bering 1.2 Throughput Test Results
My apologies. I should have looked before I asked. It is in the Bering
modules, right where it should be.
Roger
-=-=-=--=-=-=-=-=-=-=-=
Charles,
I'd love to run the tests. Where can I find the ipsec_aes.o module for
Bering 1.2?
Roger
Charles Steinkuehler <charles
@steinkuehler.net>
04/13/2004 04:13 PM
To: Roger E McClurg/CEG/[EMAIL PROTECTED]
cc: [EMAIL PROTECTED]
Subject: Re: [leaf-user] Bering 1.2 Throughput Test Results
Roger E McClurg wrote:
<snip>
> The next test was to FTP from the PC connected to the OpenBrick E to the
> PC connected to a 500 Mhz P III running Bering 1.2. The transfer rate
was
> only 12.67 Mb/sec. The 3DES IPSEC encryption was certainly taking it's
> toll.
>
> Next we replaced both Bering machines with Nortel Contivity 1500 VPN
> devices. The Contivity is a popular VPN concentrator for small branch
> offices. It was designed specifically for the purpose of a VPN
> concentrator. Imagine our surprise when the Contivity transfer rate was
> only 4.45 Mb/sec. The Bering boxes were running weblet, shorewall,
> dnscache, dhcpd, ssh, sshd, sftp, snmp, and snmpd in addition to IPSEC,
> and yet they were almost three times faster than commercial VPN
> concentrators.
If you want to have a bit more fun, switch your IPSec links to the new
AES (ipsec_aes.o) encryption algorithm. Designed to be more friendly to
modern CPU's with wide registers and SIMD (Single Instruction Multiple
Data) instruction sets (3DES is optimized for hardware, and doesn't
translate nicely into a byte/word oriented general-purpose CPU
algorithm), you should see a substantial increase in your transfer rates.
3DES is usually not much of a bottleneck (even with the 'slow' Nortel
devices), as usually the upstream WAN link is substantially slower than
the potential CPU throughput when compressing, but if you've got fast
pipes, you'll notice a drastic difference by choosing an alternate
encryption scheme.
--
Charles Steinkuehler
[EMAIL PROTECTED]
-------------------------------------------------------
This SF.Net email is sponsored by: IBM Linux Tutorials
Free Linux tutorial presented by Daniel Robbins, President and CEO of
GenToo technologies. Learn everything from fundamentals to system
administration.http://ads.osdn.com/?ad_id=1470&alloc_id=3638&op=click
------------------------------------------------------------------------
leaf-user mailing list: [EMAIL PROTECTED]
https://lists.sourceforge.net/lists/listinfo/leaf-user
SR FAQ: http://leaf-project.org/pub/doc/docmanager/docid_1891.html
-------------------------------------------------------
This SF.Net email is sponsored by: IBM Linux Tutorials
Free Linux tutorial presented by Daniel Robbins, President and CEO of
GenToo technologies. Learn everything from fundamentals to system
administration.http://ads.osdn.com/?ad_id=1470&alloc_id=3638&op=click
------------------------------------------------------------------------
leaf-user mailing list: [EMAIL PROTECTED]
https://lists.sourceforge.net/lists/listinfo/leaf-user
SR FAQ: http://leaf-project.org/pub/doc/docmanager/docid_1891.html