commit | 071afec15fe9ded6e4ebd8aa78b244949a39df25 | [log] [tgz] |
---|---|---|
author | Kevin Cernekee <cernekee@chromium.org> | Tue Apr 25 19:33:01 2017 -0700 |
committer | Kevin Cernekee <cernekee@chromium.org> | Sun Apr 30 01:34:42 2017 +0000 |
tree | ce891d542e88a7fe213cd3e8e7e7a231aca0143e | |
parent | a70a6ee1c8e0cc1a20a88b27503b1c49d6ea4e2a [diff] |
vpn: Only use AES GCM for Phase 2 Per [1] this does not seem to be supported in IKEv1 Phase 1. Specifying it causes strongSwan to quietly send a malformed proposal, which breaks interop with older clients. [1] https://wiki.strongswan.org/projects/1/wiki/CipherSuiteExamples BUG=chromium:707139 TEST=manually connect to Sophos VPN Change-Id: I6a7dff956659cccab53ca8a78f43852fbdfe8e4b Reviewed-on: https://chromium-review.googlesource.com/487738 Commit-Ready: Kevin Cernekee <cernekee@chromium.org> Tested-by: Kevin Cernekee <cernekee@chromium.org> Reviewed-by: Mattias Nissler <mnissler@chromium.org> Reviewed-by: Maksim Ivanov <emaxx@chromium.org> (cherry picked from commit c48ff6b7ff70a14e3538d7742ab25401ebcc5935) Reviewed-on: https://chromium-review.googlesource.com/490691 Reviewed-by: Kevin Cernekee <cernekee@chromium.org> Commit-Queue: Kevin Cernekee <cernekee@chromium.org>