-
Notifications
You must be signed in to change notification settings - Fork 218
Issues: libreswan/libreswan
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Author
Label
Projects
Milestones
Assignee
Sort
Issues list
create bridges directly to avoid firewalld
test framework
problems with the test framework (KVM, NS, WWW, ...)
upstream
The problem is in code we depend on
IKEv2 in CTR mode uses Crypto (typically connected to NSS)
FIPS
FIPS compliance
PK11_Encrypt()
, should it use PK11_CipherOp()
crypto
#1743
opened Jun 21, 2024 by
cagney
1 task
Segfault while using authnull OE
untested
lacks test demonstrating issue in the testsuite
v5.0
#1734
opened Jun 14, 2024 by
The-Mule
./kvm upgrade should not rebuild VM
test framework
problems with the test framework (KVM, NS, WWW, ...)
boot directly into FIPS mode
blocked
Could be waiting on upstream, more information from submitter, ...
FIPS
FIPS compliance
linux
Linux, notably the XFRM(I) kernel interface
test framework
problems with the test framework (KVM, NS, WWW, ...)
ipsec up
doesn't work with non-standard location of ipsec.conf
regression
ERROR: ESP encryption algorithm 'mars' is not supported
isn't robust
crypto
Crash (with corefile) in Libreswan git head (98de0aee47024c277048851b1f427424603b021d)
crossing-streams
when initiator/responder establish simultaneously
regression
Functionality that was tested and working.
v5.0
when including addconn and connection.c's add_connection()
leftid=dns.name
put unoriented connection on the DNS resolver queue
ipsec.conf
reject connections that have the same remote host but different marks
kernel
Code manipulating kernel policy/state (generic and kernel specific)
linux
Linux, notably the XFRM(I) kernel interface
whack-delete-01-ikev1-child-1then2
leaves an SA behind on east
IKEv1
ipsec.conf
test all auto keywords and how they show up in connectionstatus
ipsec.conf
including addconn and connection.c's add_connection()
untested
lacks test demonstrating issue in the testsuite
what does including addconn and connection.c's add_connection()
ipsec add auto=start
mean?
ipsec.conf
Previous Next
ProTip!
What’s not been updated in a month: updated:<2024-05-26.