summaryrefslogtreecommitdiff
path: root/doc/2.6.known-issues
diff options
context:
space:
mode:
Diffstat (limited to 'doc/2.6.known-issues')
-rw-r--r--doc/2.6.known-issues112
1 files changed, 112 insertions, 0 deletions
diff --git a/doc/2.6.known-issues b/doc/2.6.known-issues
new file mode 100644
index 000000000..397c4f957
--- /dev/null
+++ b/doc/2.6.known-issues
@@ -0,0 +1,112 @@
+Known issues with FreeS/WAN on a 2.6 kernel Claudia Schmeing
+-------------------------------------------
+
+
+This is an overview of known issues with FreeS/WAN on the 2.6 kernel codebase
+(also 2.5.x), which includes native Linux IPsec code.
+
+More information on the native IPsec code is available here:
+
+ http://lartc.org/howto/lartc.ipsec.html
+
+Tools for use with that code are here:
+
+ http://ipsec-tools.sourceforge.net/
+
+
+* As of FreeS/WAN 2.03, FreeS/WAN ships with some support for the 2.6 kernel
+ IPsec code. In 2.03, this support is preliminary, but we expect to develop
+ it fully. Many thanks to Herbert Xu for the initial code patches.
+
+* Use the most recent Linux FreeS/WAN 2.x release from ftp.xs4all.nl
+ to try our 2.6 kernel support.
+
+* The installation procedure for use with 2.6 kernel IPsec is a little
+ different from a traditional FreeS/WAN installation. Please see
+ the latest doc/install.html.
+
+* Please see the design and users' mailing lists
+ (http://www.freeswan.org/mail.html) for more detail and the latest reports.
+
+
+
+DESIGN-RELATED ISSUES
+
+
+* In 2.6, IPsec policies are detached from routing decisions. Because of this
+ design, Opportunistic Encryption on the local LAN will be possible with 2.6.
+
+ One side effect: When contacting a node on the local LAN which is protected
+ by gateway OE, you will get asymmetrical routing (one way through the gateway,
+ one way direct), and IPsec will drop the return packets.
+
+
+
+CURRENT ISSUES
+
+
+* For the moment, users wishing to test FreeS/WAN with 2.6 will require
+ ipsec-tools' "setkey" program. Though FreeS/WAN's keying daemon, Pluto,
+ directly sets IPsec policy, setkey is currently required to reset kernel SPD
+ (Security Policy Database) states when Pluto restarts. We will likely add
+ this basic functionality to an upcoming FreeS/WAN release.
+
+* State information is not available to the user, eg. ipsec
+ eroute/ipsec spi/ipsec look do not work. The exception: ipsec auto --status
+ This will be fixed in a future release.
+
+* If you're running Opportunistic Encryption, connectivity to new hosts will
+ immediately fail. You may receive a message similar to this:
+
+ connect: Resource temporarily unavailable
+
+ The reason for this lies in the kernel code. Fairly complex discussion:
+
+ http://lists.freeswan.org/archives/design/2003-September/msg00073.html
+
+ As of 2.6.0-test6, this has not been fixed.
+
+* This initial connectivity failure has an unintended side effect on DNS queries.
+ This will result in a rekey failure for OE connections; a %pass will be
+ installed for your destination IP before a %pass is re-instituted to your
+ DNS server. As a workaround, please add your DNS servers to
+ /etc/ipsec.d/policies/clear.
+
+* Packets on all interfaces are considered for OE, including loopback. If you're
+ running a local nameserver, you'll still need to exempt localhost DNS traffic
+ as per the previous point. Since this traffic has a source of 127.0.0.1/32,
+ the "clear" policy group will not suffice; you'll need to add the following
+ %passthrough conn to ipsec.conf:
+
+ conn exclude-lo
+ authby=never
+ left=127.0.0.1
+ leftsubnet=127.0.0.0/8
+ right=127.0.0.2
+ rightsubnet=127.0.0.0/8
+ type=passthrough
+ auto=route
+
+
+
+OLD ISSUES
+
+
+None, yet.
+
+
+
+RELATED DOCUMENTS
+
+
+FreeS/WAN Install web page doc/install.html
+
+FreeS/WAN Install guide INSTALL
+
+FreeS/WAN mailing list posts, including:
+
+ http://lists.freeswan.org/archives/design/2003-September/msg00057.html
+
+To sign up for our mailing lists, see http://www.freeswan.org/mail.html
+
+