<feed xmlns='http://www.w3.org/2005/Atom'>
<title>vyos-1x.git/data/templates/ipsec, branch 1.4.0-rc2</title>
<subtitle>VyOS command definitions, scripts, and utilities (mirror of https://github.com/vyos/vyos-1x.git)
</subtitle>
<id>https://git.amelek.net/vyos/vyos-1x.git/atom?h=1.4.0-rc2</id>
<link rel='self' href='https://git.amelek.net/vyos/vyos-1x.git/atom?h=1.4.0-rc2'/>
<link rel='alternate' type='text/html' href='https://git.amelek.net/vyos/vyos-1x.git/'/>
<updated>2023-12-30T21:58:26+00:00</updated>
<entry>
<title>T5870: ipsec remote access VPN: add x509 ("pubkey") authentication.</title>
<updated>2023-12-30T21:58:26+00:00</updated>
<author>
<name>Lucas Christian</name>
<email>lucas@lucasec.com</email>
</author>
<published>2023-12-29T06:07:07+00:00</published>
<link rel='alternate' type='text/html' href='https://git.amelek.net/vyos/vyos-1x.git/commit/?id=6cfcef98b8a8fbfa107ecfbb741cfb268ea8340f'/>
<id>urn:sha1:6cfcef98b8a8fbfa107ecfbb741cfb268ea8340f</id>
<content type='text'>
(cherry picked from commit 656934e85cee799dba5b495d143f6be445ac22d5)
</content>
</entry>
<entry>
<title>ipsec: T4593: Migrate and remove legacy `include-ipsec` nodes</title>
<updated>2023-02-15T11:57:25+00:00</updated>
<author>
<name>sarthurdev</name>
<email>965089+sarthurdev@users.noreply.github.com</email>
</author>
<published>2023-02-15T11:57:25+00:00</published>
<link rel='alternate' type='text/html' href='https://git.amelek.net/vyos/vyos-1x.git/commit/?id=45b16864b11ea49087ce4a279e2c0e741a97c0ee'/>
<id>urn:sha1:45b16864b11ea49087ce4a279e2c0e741a97c0ee</id>
<content type='text'>
Not supported with swanctl
</content>
</entry>
<entry>
<title>T4916: Rewrite IPsec peer authentication and psk migration</title>
<updated>2023-01-26T11:28:03+00:00</updated>
<author>
<name>Viacheslav Hletenko</name>
<email>v.gletenko@vyos.io</email>
</author>
<published>2023-01-17T11:04:08+00:00</published>
<link rel='alternate' type='text/html' href='https://git.amelek.net/vyos/vyos-1x.git/commit/?id=7ae0b404ad9fdefa856c7e450b224b47d854a4eb'/>
<id>urn:sha1:7ae0b404ad9fdefa856c7e450b224b47d854a4eb</id>
<content type='text'>
Rewrite strongswan IPsec authentication to reflect structure
from swanctl.conf
The most important change is that more than one local/remote ID in the
same auth entry should be allowed

replace: 'ipsec site-to-site peer &lt;tag&gt; authentication pre-shared-secret xxx'
      =&gt; 'ipsec authentication psk &lt;tag&gt; secret xxx'

set vpn ipsec authentication psk &lt;tag&gt; id '192.0.2.1'
set vpn ipsec authentication psk &lt;tag&gt; id '192.0.2.2'
set vpn ipsec authentication psk &lt;tag&gt; secret 'xxx'
set vpn ipsec site-to-site peer &lt;tag&gt; authentication local-id '192.0.2.1'
set vpn ipsec site-to-site peer &lt;tag&gt; authentication mode 'pre-shared-secret'
set vpn ipsec site-to-site peer &lt;tag&gt; authentication remote-id '192.0.2.2'

Add template filter for Jinja2 'generate_uuid4'
</content>
</entry>
<entry>
<title>T4118: Add default value any for connection remote-id</title>
<updated>2023-01-12T17:47:53+00:00</updated>
<author>
<name>Viacheslav Hletenko</name>
<email>v.gletenko@vyos.io</email>
</author>
<published>2023-01-12T13:00:05+00:00</published>
<link rel='alternate' type='text/html' href='https://git.amelek.net/vyos/vyos-1x.git/commit/?id=01386606982352de7eb51f55acc11c6a58ed4cef'/>
<id>urn:sha1:01386606982352de7eb51f55acc11c6a58ed4cef</id>
<content type='text'>
If IPsec "peer &lt;tag&gt; authentication remote-id" is not set
it should be "%any" by default
https://docs.strongswan.org/docs/5.9/swanctl/swanctlConf.html#_connections_conn_remote

Set XML default value in use it in the python vpn_ipsec.py script
</content>
</entry>
<entry>
<title>T4823: Fix IPsec transport mode remote TS</title>
<updated>2022-11-21T18:42:41+00:00</updated>
<author>
<name>Viacheslav Hletenko</name>
<email>v.gletenko@vyos.io</email>
</author>
<published>2022-11-21T18:42:41+00:00</published>
<link rel='alternate' type='text/html' href='https://git.amelek.net/vyos/vyos-1x.git/commit/?id=2ac4a8a5fed9db471b7ffac0f54e6741c6f87834'/>
<id>urn:sha1:2ac4a8a5fed9db471b7ffac0f54e6741c6f87834</id>
<content type='text'>
Remote TS for transport mode GRE must be remote-address and
not peer name
</content>
</entry>
<entry>
<title>ipsec: T4787: add support for road-warrior/remote-access RADIUS timeout</title>
<updated>2022-10-31T14:10:39+00:00</updated>
<author>
<name>Christian Poessinger</name>
<email>christian@poessinger.com</email>
</author>
<published>2022-10-31T14:09:58+00:00</published>
<link rel='alternate' type='text/html' href='https://git.amelek.net/vyos/vyos-1x.git/commit/?id=22c3dcbb01d731f0dab0ffefa2e5a0be7009baf1'/>
<id>urn:sha1:22c3dcbb01d731f0dab0ffefa2e5a0be7009baf1</id>
<content type='text'>
This enabled users to also use 2FA/MFA authentication with a radius backend as
there is enough time to enter the second factor.
</content>
</entry>
<entry>
<title>op-mode: ipsec: T4719: bugfix IKEv2 road-warrior profile generator</title>
<updated>2022-09-28T17:35:48+00:00</updated>
<author>
<name>Christian Poessinger</name>
<email>christian@poessinger.com</email>
</author>
<published>2022-09-28T17:33:40+00:00</published>
<link rel='alternate' type='text/html' href='https://git.amelek.net/vyos/vyos-1x.git/commit/?id=d5e84fab2e66fb4452516e3a5adc00c6ed772de1'/>
<id>urn:sha1:d5e84fab2e66fb4452516e3a5adc00c6ed772de1</id>
<content type='text'>
Commit bd4588827b ("ipsec: T4118: Change vpn ipsec syntax for IKE ESP and peer")
changed the CLI syntax of ipsec. This resulted in a node not renamed in the
op-mode generator when generating IKEv2 IPSec iOS configuration profiles.
</content>
</entry>
<entry>
<title>ipsec: T4118: bugfix migration of IKEv2 road-warrior "id" CLI option</title>
<updated>2022-09-20T18:32:57+00:00</updated>
<author>
<name>Christian Poessinger</name>
<email>christian@poessinger.com</email>
</author>
<published>2022-09-20T18:32:55+00:00</published>
<link rel='alternate' type='text/html' href='https://git.amelek.net/vyos/vyos-1x.git/commit/?id=2eb0ddc54ea8bf50f62cc381eb3356363194c6fd'/>
<id>urn:sha1:2eb0ddc54ea8bf50f62cc381eb3356363194c6fd</id>
<content type='text'>
The "authentication id" option for road-warriors did not get migrated to
the new local-id CLI node. This has been fixed.
</content>
</entry>
<entry>
<title>Merge pull request #1463 from sever-sever/T4118</title>
<updated>2022-09-16T17:16:42+00:00</updated>
<author>
<name>Daniil Baturin</name>
<email>daniil@vyos.io</email>
</author>
<published>2022-09-16T17:16:42+00:00</published>
<link rel='alternate' type='text/html' href='https://git.amelek.net/vyos/vyos-1x.git/commit/?id=748dab43b87c3993bdd5c697e7b778ed7a8e48a1'/>
<id>urn:sha1:748dab43b87c3993bdd5c697e7b778ed7a8e48a1</id>
<content type='text'>
ipsec: T4118: Change vpn ipsec syntax for IKE ESP and peer</content>
</entry>
<entry>
<title>ipsec: T4118: Change vpn ipsec syntax for IKE ESP and peer</title>
<updated>2022-09-16T11:53:41+00:00</updated>
<author>
<name>Viacheslav Hletenko</name>
<email>v.gletenko@vyos.io</email>
</author>
<published>2022-08-10T19:51:48+00:00</published>
<link rel='alternate' type='text/html' href='https://git.amelek.net/vyos/vyos-1x.git/commit/?id=bd4588827b563022ce5fb98b1345b787b9194176'/>
<id>urn:sha1:bd4588827b563022ce5fb98b1345b787b9194176</id>
<content type='text'>
Migration and Change boolean nodes "enable/disable" to
disable-xxxx, enable-xxxx and just xxx for VPN IPsec
configurations

  - IKE changes:
      - replace 'ipsec ike-group &lt;tag&gt; mobike disable'
             =&gt; 'ipsec ike-group &lt;tag&gt; disable-mobike'
      - replace 'ipsec ike-group &lt;tag&gt; ikev2-reauth yes|no'
             =&gt; 'ipsec ike-group &lt;tag&gt; ikev2-reauth'
  - ESP changes:
      - replace 'ipsec esp-group &lt;tag&gt; compression enable'
             =&gt; 'ipsec esp-group &lt;tag&gt; compression'
  - PEER changes:
      - replace: 'peer &lt;tag&gt; id xxx'
              =&gt; 'peer &lt;tag&gt; local-id xxx'
      - replace: 'peer &lt;tag&gt; force-encapsulation enable'
              =&gt; 'peer &lt;tag&gt; force-udp-encapsulation'
      - add option: 'peer &lt;tag&gt; remote-address x.x.x.x'

Add 'peer &lt;name&gt; remote-address &lt;name&gt;' via migration script
</content>
</entry>
</feed>
