diff options
author | 2006-06-10 19:21:10 +0000 | |
---|---|---|
committer | 2006-06-10 19:21:10 +0000 | |
commit | cc07e6b7f0396181f46c34a8c7232bdfdb794c6a (patch) | |
tree | c219c0e2b39e9f93a4eab7998738828ffba5939d | |
parent | shorten a name for bioctl (diff) | |
download | wireguard-openbsd-cc07e6b7f0396181f46c34a8c7232bdfdb794c6a.tar.xz wireguard-openbsd-cc07e6b7f0396181f46c34a8c7232bdfdb794c6a.zip |
switch back to original defaults regarding DH groups. modp3072 is to
heavyweight. Testing by Jason George, thanks!
-rw-r--r-- | sbin/ipsecctl/ike.c | 42 |
1 files changed, 19 insertions, 23 deletions
diff --git a/sbin/ipsecctl/ike.c b/sbin/ipsecctl/ike.c index 01601c06fdc..fa422c8604f 100644 --- a/sbin/ipsecctl/ike.c +++ b/sbin/ipsecctl/ike.c @@ -1,4 +1,4 @@ -/* $OpenBSD: ike.c,v 1.40 2006/06/08 22:34:30 hshoexer Exp $ */ +/* $OpenBSD: ike.c,v 1.41 2006/06/10 19:21:10 hshoexer Exp $ */ /* * Copyright (c) 2005 Hans-Joerg Hoexer <hshoexer@openbsd.org> * @@ -249,40 +249,38 @@ ike_section_qm(struct ipsec_addr_wrap *src, struct ipsec_addr_wrap *dst, } } else fprintf(fd, "SHA2-256"); - fprintf(fd, "-PFS-"); if (qmxfs && qmxfs->groupxf) { switch (qmxfs->groupxf->id) { case GROUPXF_768: - fprintf(fd, "GRP1"); + fprintf(fd, "-PFS-GRP1"); break; case GROUPXF_1024: - fprintf(fd, "GRP2"); + fprintf(fd, "-PFS-GRP2"); break; case GROUPXF_1536: - fprintf(fd, "GRP5"); + fprintf(fd, "-PFS-GRP5"); break; case GROUPXF_2048: - fprintf(fd, "GRP14"); + fprintf(fd, "-PFS-GRP14"); break; case GROUPXF_3072: - fprintf(fd, "GRP15"); + fprintf(fd, "-PFS-GRP15"); break; case GROUPXF_4096: - fprintf(fd, "GRP16"); + fprintf(fd, "-PFS-GRP16"); break; case GROUPXF_6144: - fprintf(fd, "GRP17"); + fprintf(fd, "-PFS-GRP17"); break; case GROUPXF_8192: - fprintf(fd, "GRP18"); + fprintf(fd, "-PFS-GRP18"); break; default: warnx("illegal group %s", qmxfs->groupxf->name); return (-1); }; - } else - fprintf(fd, "GRP15"); + } fprintf(fd, "-SUITE force\n"); return (0); @@ -343,40 +341,38 @@ ike_section_mm(struct ipsec_addr_wrap *peer, struct ipsec_transforms *mmxfs, } } else fprintf(fd, "SHA"); - fprintf(fd, "-"); if (mmxfs && mmxfs->groupxf) { switch (mmxfs->groupxf->id) { case GROUPXF_768: - fprintf(fd, "GRP1"); + fprintf(fd, "-GRP1"); break; case GROUPXF_1024: - fprintf(fd, "GRP2"); + fprintf(fd, "-GRP2"); break; case GROUPXF_1536: - fprintf(fd, "GRP5"); + fprintf(fd, "-GRP5"); break; case GROUPXF_2048: - fprintf(fd, "GRP14"); + fprintf(fd, "-GRP14"); break; case GROUPXF_3072: - fprintf(fd, "GRP15"); + fprintf(fd, "-GRP15"); break; case GROUPXF_4096: - fprintf(fd, "GRP16"); + fprintf(fd, "-GRP16"); break; case GROUPXF_6144: - fprintf(fd, "GRP17"); + fprintf(fd, "-GRP17"); break; case GROUPXF_8192: - fprintf(fd, "GRP18"); + fprintf(fd, "-GRP18"); break; default: warnx("illegal group %s", mmxfs->groupxf->name); return (-1); }; - } else - fprintf(fd, "GRP15"); + } if (auth->type == IKE_AUTH_RSA) fprintf(fd, "-RSA_SIG"); |