when it comes to development, i have a negative IQ.  i literally suck the intelligence out of the room.  i would not want to inflict myself on your code :)

how else can one support this, or any other open source, project without code contributions?

brendan

On 9/15/22 3:28 PM, Paul Wouters wrote:
For IKEv2 that would go via EAP.
Currently, only EAPTLS is implemented. You are looking at EAP-mschapv2. We 
don’t support that yet. I know strongswan does support it.

Paul
ps. Patches or other support always welcomed 😀

Sent using a virtual keyboard on a phone

On Sep 15, 2022, at 13:44, Brendan Kearney <[email protected]> wrote:

list members,

IKEv1 could employ L2TP and PPP to authenticate a user on one end of a tunnel 
against RADIUS, for additional security.  i am not seeing any info about IKEv2 
being able to do so, and i may have come across write ups saying not to use 
L2TP at all with IKEv2.

is there a way to tie other authentication and authorization (AuthN/Z) mechanisms and policies to 
a IKEv2 tunnel for road warriors?  i see PSK and certificates as "host" based AuthN, 
and not specifically identifying a user.   i would want a tunnel to require (PSK || Certificate) 
+ (User/Pass && Group Membership) in order to successfully connect.  is there any way of 
accomplishing this with IKEv2?

thank you,

brendan

_______________________________________________
Swan mailing list
[email protected]
https://lists.libreswan.org/mailman/listinfo/swan
_______________________________________________
Swan mailing list
[email protected]
https://lists.libreswan.org/mailman/listinfo/swan

Reply via email to