Re: [strongSwan] policy mismatch

2018-05-01 Thread Jafar Al-Gharaibeh
The selection is not based on "best", but rather on the order of algorithms at the initiator side first and the responder side second.  AFAIK, strongSwan accepts  the first  proposed algorithm that is also configured configured locally. The first algorithm proposed by windows and also accepted

[strongSwan] policy mismatch

2018-05-01 Thread Christian Salway
version: strongSwan 5.6.2 When I connect from Windows 10, strongSwan replies with a different policy than requested, causing a policy mismatch ```connections {   default {      version = 2      send_cert = always      encap = yes      pools = pool1      unique = replace      proposals = aes256gc

[strongSwan] no matching peer config found

2018-05-01 Thread Christian Salway
Version: strongSwan 5.6.2 using swanctl I am trying to re-use settings so that just the certificate is different (vpnserver uses ECDSA, vpnsever1 uses RSA), which according to the help page [1] should be possible: "connections..local sectionSection for a local authentication round. A local authe

Re: [strongSwan] Tunnel established, but 'no acceptable ENCRYPTION_ALGORITHM found'

2018-05-01 Thread Jafar Al-Gharaibeh
Tobias,     Makes sense, but just to understand what is going on and know how to read the logs, are you saying that each "ESP:" prefix signifies a separate proposal that is parsed independently (log below)? A single proposal might have one or more algorithms separated by slashes, correct ? T

Re: [strongSwan] Tunnel established, but 'no acceptable ENCRYPTION_ALGORITHM found'

2018-05-01 Thread Tobias Brunner
Hi, > I see an error in the strongswan > logs and I'm not sure what is going on here, and what I should do to > correct this: There is nothing to correct as the connection gets successfully established. If you have a closer look at the log you see that the client sends not one, but four ESP prop