March 2020 Archives by date
Starting: Mon Mar 2 14:22:33 UTC 2020
Ending: Mon Mar 30 16:07:17 UTC 2020
Messages: 56
- [Swan-dev] clarify ikev2_ts_r_desc length field
D. Hugh Redelmeier
- [Swan-dev] clarify ikev2_ts_r_desc length field
Paul Wouters
- [Swan-dev] Set keyingtries to 1 for Opportunistic Encryption connections
D. Hugh Redelmeier
- [Swan-dev] Set keyingtries to 1 for Opportunistic Encryption connections
Paul Wouters
- [Swan-dev] clarify ikev2_ts_r_desc length field
Andrew Cagney
- [Swan-dev] clarify ikev2_ts_r_desc length field
Paul Wouters
- [Swan-dev] ikev2-32-nat-rw-rekey broken by TS bug?
Paul Wouters
- [Swan-dev] Set keyingtries to 1 for Opportunistic Encryption connections
Antony Antony
- [Swan-dev] Set keyingtries to 1 for Opportunistic Encryption connections
Paul Wouters
- [Swan-dev] Set keyingtries to 1 for Opportunistic Encryption connections
Paul Wouters
- [Swan-dev] attributing IKE problems to the IKE SA
Andrew Cagney
- [Swan-dev] attributing IKE problems to the IKE SA
Paul Wouters
- [Swan-dev] [Swan-announce] libreswan-3.31 released
The Libreswan Team
- [Swan-dev] can an IKEv1 aggressive initial request contain a cert?
Andrew Cagney
- [Swan-dev] can an IKEv1 aggressive initial request contain a cert?
Paul Wouters
- [Swan-dev] can an IKEv1 aggressive initial request contain a cert?
Andrew Cagney
- [Swan-dev] Set keyingtries to 1 for Opportunistic Encryption connections
Antony Antony
- [Swan-dev] Set keyingtries to 1 for Opportunistic Encryption connections
Paul Wouters
- [Swan-dev] Set keyingtries to 1 for Opportunistic Encryption connections
D. Hugh Redelmeier
- [Swan-dev] can an IKEv1 aggressive initial request contain a cert?
Andrew Cagney
- [Swan-dev] not happy due sockaddr_to_endpoint check
Antony Antony
- [Swan-dev] not happy due sockaddr_to_endpoint check
Andrew Cagney
- [Swan-dev] GSoC 2020 - Introduction
Paul Wouters
- [Swan-dev] not happy due sockaddr_to_endpoint check
Antony Antony
- [Swan-dev] GSoC 2020 - Introduction
nupur agarwal
- [Swan-dev] Set keyingtries to 1 for Opportunistic Encryption connections
Paul Wouters
- [Swan-dev] Set keyingtries to 1 for Opportunistic Encryption connections
D. Hugh Redelmeier
- [Swan-dev] ikev2_hash_algorithm , was Fwd: [Swan-commit] Changes to ref refs/heads/master
Paul Wouters
- [Swan-dev] ikev2_hash_algorithm , was Fwd: [Swan-commit] Changes to ref refs/heads/master
Andrew Cagney
- [Swan-dev] clarify ikev2_ts_r_desc length field
Andrew Cagney
- [Swan-dev] [Swan] Setting up LibreSwan VPN router for remote clients
Yadav, Ravinder
- [Swan-dev] 182 "westnet-eastnet-ikev2" #2: STATE_PARENT_I2: sent v2I2, expected v2R2 {auth=IKEv2 cipher=AES_GCM_16_256 integ=n/a prf=HMAC_SHA2_512 group=MODP2048}
Andrew Cagney
- [Swan-dev] 182 "westnet-eastnet-ikev2" #2: STATE_PARENT_I2: sent v2I2, expected v2R2 {auth=IKEv2 cipher=AES_GCM_16_256 integ=n/a prf=HMAC_SHA2_512 group=MODP2048}
Paul Wouters
- [Swan-dev] 182 "westnet-eastnet-ikev2" #2: STATE_PARENT_I2: sent v2I2, expected v2R2 {auth=IKEv2 cipher=AES_GCM_16_256 integ=n/a prf=HMAC_SHA2_512 group=MODP2048}
Andrew Cagney
- [Swan-dev] GSoC 2020 - Implementing Multiple Key Exchanges in IKEv2
Yulia K
- [Swan-dev] GSoC 2020 - Implementing Multiple Key Exchanges in IKEv2
Paul Wouters
- [Swan-dev] 182 "westnet-eastnet-ikev2" #2: STATE_PARENT_I2: sent v2I2, expected v2R2 {auth=IKEv2 cipher=AES_GCM_16_256 integ=n/a prf=HMAC_SHA2_512 group=MODP2048}
Antony Antony
- [Swan-dev] 182 "westnet-eastnet-ikev2" #2: STATE_PARENT_I2: sent v2I2, expected v2R2 {auth=IKEv2 cipher=AES_GCM_16_256 integ=n/a prf=HMAC_SHA2_512 group=MODP2048}
Andrew Cagney
- [Swan-dev] 182 "westnet-eastnet-ikev2" #2: STATE_PARENT_I2: sent v2I2, expected v2R2 {auth=IKEv2 cipher=AES_GCM_16_256 integ=n/a prf=HMAC_SHA2_512 group=MODP2048}
Paul Wouters
- [Swan-dev] 182 "westnet-eastnet-ikev2" #2: STATE_PARENT_I2: sent v2I2, expected v2R2 {auth=IKEv2 cipher=AES_GCM_16_256 integ=n/a prf=HMAC_SHA2_512 group=MODP2048}
Andrew Cagney
- [Swan-dev] 182 "westnet-eastnet-ikev2" #2: STATE_PARENT_I2: sent v2I2, expected v2R2 {auth=IKEv2 cipher=AES_GCM_16_256 integ=n/a prf=HMAC_SHA2_512 group=MODP2048}
Paul Wouters
- [Swan-dev] 182 "westnet-eastnet-ikev2" #2: STATE_PARENT_I2: sent v2I2, expected v2R2 {auth=IKEv2 cipher=AES_GCM_16_256 integ=n/a prf=HMAC_SHA2_512 group=MODP2048}
Antony Antony
- [Swan-dev] 182 "westnet-eastnet-ikev2" #2: STATE_PARENT_I2: sent v2I2, expected v2R2 {auth=IKEv2 cipher=AES_GCM_16_256 integ=n/a prf=HMAC_SHA2_512 group=MODP2048}
Andrew Cagney
- [Swan-dev] kernel_ops
Antony Antony
- [Swan-dev] kernel_ops
Paul Wouters
- [Swan-dev] helper threads can log to whack
Andrew Cagney
- [Swan-dev] helper threads can log to whack
Paul Wouters
- [Swan-dev] Set keyingtries to 1 for Opportunistic Encryption connections
Andrew Cagney
- [Swan-dev] Connect with the mentor on iOS VPN app for libreswan to configure native IPsec stack GSoC
Arjun.V
- [Swan-dev] Connect with the mentor on iOS VPN app for libreswan to configure native IPsec stack GSoC
Paul Wouters
- [Swan-dev] GSoC 2020 - Introduction
Raunak Kumar
- [Swan-dev] Set keyingtries to 1 for Opportunistic Encryption connections
Andrew Cagney
- [Swan-dev] Set keyingtries to 1 for Opportunistic Encryption connections
Paul Wouters
- [Swan-dev] sanitize retransmission; will wait line
Andrew Cagney
- [Swan-dev] sanitize retransmission; will wait line
Andrew Cagney
- [Swan-dev] impair variable names
Andrew Cagney
Last message date:
Mon Mar 30 16:07:17 UTC 2020
Archived on: Mon Mar 30 16:07:34 UTC 2020
This archive was generated by
Pipermail 0.09 (Mailman edition).