[Swan] additional authentication, like LDAP, Kerberos, RADIUS on tunnels

Brendan Kearney bpk678 at gmail.com
Fri Sep 16 17:50:03 EEST 2022

when it comes to development, i have a negative IQ.  i literally suck 
the intelligence out of the room.  i would not want to inflict myself on 
your code :)

how else can one support this, or any other open source, project without 
code contributions?


On 9/15/22 3:28 PM, Paul Wouters wrote:
> For IKEv2 that would go via EAP.
> Currently, only EAPTLS is implemented. You are looking at EAP-mschapv2. We don’t support that yet. I know strongswan does support it.
> Paul
> ps. Patches or other support always welcomed 😀
> Sent using a virtual keyboard on a phone
>> On Sep 15, 2022, at 13:44, Brendan Kearney <bpk678 at gmail.com> wrote:
>> list members,
>> IKEv1 could employ L2TP and PPP to authenticate a user on one end of a tunnel against RADIUS, for additional security.  i am not seeing any info about IKEv2 being able to do so, and i may have come across write ups saying not to use L2TP at all with IKEv2.
>> is there a way to tie other authentication and authorization (AuthN/Z) mechanisms and policies to a IKEv2 tunnel for road warriors?  i see PSK and certificates as "host" based AuthN, and not specifically identifying a user.   i would want a tunnel to require (PSK || Certificate) + (User/Pass && Group Membership) in order to successfully connect.  is there any way of accomplishing this with IKEv2?
>> thank you,
>> brendan
>> _______________________________________________
>> Swan mailing list
>> Swan at lists.libreswan.org
>> https://lists.libreswan.org/mailman/listinfo/swan

More information about the Swan mailing list