On Sep 16, 2022, at 10:50, Brendan Kearney <[email protected]> wrote:
> 
> 
> how else can one support this, or any other open source, project without code 
> contributions?

Write documentation ?
Be helpful on mailing list, irc  and GitHub issues to others
Testing new (pre)release versions
Report bugs and issues
Packaging for different distros
Promote via word of mouth, blog articles, etc
Donate money to developers 😀

Paul


> 
> brendan
> 
>> On 9/15/22 3:28 PM, Paul Wouters wrote:
>> For IKEv2 that would go via EAP.
>> Currently, only EAPTLS is implemented. You are looking at EAP-mschapv2. We 
>> don’t support that yet. I know strongswan does support it.
>> 
>> Paul
>> ps. Patches or other support always welcomed 😀
>> 
>> Sent using a virtual keyboard on a phone
>> 
>>>> On Sep 15, 2022, at 13:44, Brendan Kearney <[email protected]> wrote:
>>> 
>>> list members,
>>> 
>>> IKEv1 could employ L2TP and PPP to authenticate a user on one end of a 
>>> tunnel against RADIUS, for additional security.  i am not seeing any info 
>>> about IKEv2 being able to do so, and i may have come across write ups 
>>> saying not to use L2TP at all with IKEv2.
>>> 
>>> is there a way to tie other authentication and authorization (AuthN/Z) 
>>> mechanisms and policies to a IKEv2 tunnel for road warriors?  i see PSK and 
>>> certificates as "host" based AuthN, and not specifically identifying a 
>>> user.   i would want a tunnel to require (PSK || Certificate) + (User/Pass 
>>> && Group Membership) in order to successfully connect.  is there any way of 
>>> accomplishing this with IKEv2?
>>> 
>>> thank you,
>>> 
>>> brendan
>>> 
>>> _______________________________________________
>>> Swan mailing list
>>> [email protected]
>>> https://lists.libreswan.org/mailman/listinfo/swan
_______________________________________________
Swan mailing list
[email protected]
https://lists.libreswan.org/mailman/listinfo/swan

Reply via email to