<feed xmlns='http://www.w3.org/2005/Atom'>
<title>packages/net/strongswan/files, branch master</title>
<subtitle>Mirror of packages feed</subtitle>
<id>https://git.openwrt.org/feed/packages/atom?h=master</id>
<link rel='self' href='https://git.openwrt.org/feed/packages/atom?h=master'/>
<link rel='alternate' type='text/html' href='https://git.openwrt.org/feed/packages/'/>
<updated>2026-01-11T18:34:18Z</updated>
<entry>
<title>strongswan: Add support for EAP-TLS authentication</title>
<updated>2026-01-11T18:34:18Z</updated>
<author>
<name>Torbjorn Tyridal</name>
</author>
<published>2025-11-18T14:02:25Z</published>
<link rel='alternate' type='text/html' href='https://git.openwrt.org/feed/packages/commit/?id=a2eec1a5684d6e3cf38930f741638834986703be'/>
<id>urn:sha1:a2eec1a5684d6e3cf38930f741638834986703be</id>
<content type='text'>
Support for configuring EAP-TLS authentication scheme is added.

Similar to EAP-MSCHAPv2, this one is usually asymmetric
in the way that server auth method (pubkey) is different from
the client auth method (eap-tls).
The code handles this asymmetry automatically.

Signed-off-by: Torbjorn Tyridal &lt;torbjorn@tyridal.no&gt;
</content>
</entry>
<entry>
<title>strongswan: swanctl: Add support for send_certreq</title>
<updated>2025-05-18T17:35:35Z</updated>
<author>
<name>Kevin Locke</name>
</author>
<published>2024-11-30T21:36:49Z</published>
<link rel='alternate' type='text/html' href='https://git.openwrt.org/feed/packages/commit/?id=5be8d85937352e4edb5bedc8d9f09511e60ab817'/>
<id>urn:sha1:5be8d85937352e4edb5bedc8d9f09511e60ab817</id>
<content type='text'>
Support the [send_certreq] connection configuration option to disable
offering trusted root CA certificates and reduce the size of the initial
IKE packets.

This work is based on a patch by @aleks-mariusz in
https://forum.openwrt.org/t/confusion-regarding-setting-up-ikev2-vpn-service-with-strongswan-using-ipsec-and-swanctl/169587/9

[send_certreq]: https://docs.strongswan.org/docs/latest/swanctl/swanctlConf.html#_connections

Signed-off-by: Kevin Locke &lt;kevin@kevinlocke.name&gt;
</content>
</entry>
<entry>
<title>strongswan: swanctl: make overtime local</title>
<updated>2025-04-27T19:40:39Z</updated>
<author>
<name>Kevin Locke</name>
</author>
<published>2024-11-30T21:28:31Z</published>
<link rel='alternate' type='text/html' href='https://git.openwrt.org/feed/packages/commit/?id=e7aa0272db48af438a6338e52c77cd506a5d93ac'/>
<id>urn:sha1:e7aa0272db48af438a6338e52c77cd506a5d93ac</id>
<content type='text'>
$overtime has been used since swanctl.init was added in f9d91f1f47.
However, there's no need for it to be global.  Make it local like the
other config variables to avoid polluting the global namespace and make
the code easier to reason about.

Fixes: f9d91f1f470a ("strongswan: migrate to swanctl configs")
Signed-off-by: Kevin Locke &lt;kevin@kevinlocke.name&gt;
</content>
</entry>
<entry>
<title>strongswan: swanctl: make send_cert local</title>
<updated>2025-04-27T19:40:39Z</updated>
<author>
<name>Kevin Locke</name>
</author>
<published>2024-11-30T21:23:08Z</published>
<link rel='alternate' type='text/html' href='https://git.openwrt.org/feed/packages/commit/?id=62032567d38050b95bdfd8e4fd7958ccd69e8963'/>
<id>urn:sha1:62032567d38050b95bdfd8e4fd7958ccd69e8963</id>
<content type='text'>
When support for send_cert was added in 4b9453b9a4, the $send_cert
variable was inadvertently global.  Make it local to avoid polluting the
global namespace and make the code easier to reason about.

Fixes: 4b9453b9a4c8 ("strongswan: Add support for send_cert option")
Signed-off-by: Kevin Locke &lt;kevin@kevinlocke.name&gt;
</content>
</entry>
<entry>
<title>strongswan: swanctl: Add support for encap</title>
<updated>2025-04-27T19:35:50Z</updated>
<author>
<name>Kevin Locke</name>
</author>
<published>2024-11-30T21:30:54Z</published>
<link rel='alternate' type='text/html' href='https://git.openwrt.org/feed/packages/commit/?id=c1cfb36e50ed79b6befdb80f3595877cb90d9f7a'/>
<id>urn:sha1:c1cfb36e50ed79b6befdb80f3595877cb90d9f7a</id>
<content type='text'>
Support the [encap] connection configuration option to force UDP
encapsulation of ESP packets to work around connectivity issues with
middleboxes which block ESP packets.

This work is based on a patch by @aleks-mariusz in
https://forum.openwrt.org/t/confusion-regarding-setting-up-ikev2-vpn-service-with-strongswan-using-ipsec-and-swanctl/169587/9

[encap]: https://docs.strongswan.org/docs/latest/swanctl/swanctlConf.html#_connections

Signed-off-by: Kevin Locke &lt;kevin@kevinlocke.name&gt;
</content>
</entry>
<entry>
<title>strongswan: Add support for EAP-MSCHAPv2 authentication</title>
<updated>2024-11-19T16:05:33Z</updated>
<author>
<name>Martin Pecka</name>
</author>
<published>2024-01-08T00:24:07Z</published>
<link rel='alternate' type='text/html' href='https://git.openwrt.org/feed/packages/commit/?id=88d1876f382f3fad99502679abb9914c429c7a7d'/>
<id>urn:sha1:88d1876f382f3fad99502679abb9914c429c7a7d</id>
<content type='text'>
Support for EAP-MSCHAPv2 authentication scheme is added.

Different from the previously supported schemes, this one is
usually asymmetric in the way that server auth method (pubkey) is
different from the client auth method (eap-mschapv2).
The code handles this asymmetry automatically.

A new UCI config section mschapv2_secrets is added where the user
can specify the EAP identities and their passwords that are
accepted by the server. AFAIK, there is no way to select which
EAP IDs should be accepted by which remote, except setting
`eap_id` to something different than `%any`. But `eap_id`
does not support template matching, so either only a single
identity or all can be configured for one remote. This is why
the EAP identities are not subsections of remotes, but are
a standalone section.

Signed-off-by: Martin Pecka &lt;peci1@seznam.cz&gt;
Signed-off-by: Martin Pecka &lt;peckama2@fel.cvut.cz&gt;
</content>
</entry>
<entry>
<title>strongswan: Fix pools to be only generated once</title>
<updated>2024-11-19T16:05:33Z</updated>
<author>
<name>Martin Pecka</name>
</author>
<published>2024-01-07T22:23:57Z</published>
<link rel='alternate' type='text/html' href='https://git.openwrt.org/feed/packages/commit/?id=6b824ee7d71f6c4e001a8ec41aa47d97860c9fae'/>
<id>urn:sha1:6b824ee7d71f6c4e001a8ec41aa47d97860c9fae</id>
<content type='text'>
Before this commit, if a user configures multiple remotes in UCI,
each remote generates one output section of pools.
This doesn't hurt because swanctl just merges all of them,
but it is apparently not needed to have N copies of the same.

This commit changes the behavior to only create one pools
section at the end of the generated swanctl config.

Signed-off-by: Martin Pecka &lt;peci1@seznam.cz&gt;
Signed-off-by: Martin Pecka &lt;peckama2@fel.cvut.cz&gt;
</content>
</entry>
<entry>
<title>strongswan: Add support for send_cert option</title>
<updated>2024-11-19T16:05:33Z</updated>
<author>
<name>Martin Pecka</name>
</author>
<published>2024-01-07T22:00:07Z</published>
<link rel='alternate' type='text/html' href='https://git.openwrt.org/feed/packages/commit/?id=4b9453b9a4c865f5eb722761a1f7120d954a1b57'/>
<id>urn:sha1:4b9453b9a4c865f5eb722761a1f7120d954a1b57</id>
<content type='text'>
This option is required by some clients, e.g. iOS.

Signed-off-by: Martin Pecka &lt;peci1@seznam.cz&gt;
</content>
</entry>
<entry>
<title>strongswan: comma separated list for {left,right}subnet</title>
<updated>2024-07-28T21:56:17Z</updated>
<author>
<name>Stephen Baker</name>
</author>
<published>2024-06-24T20:07:03Z</published>
<link rel='alternate' type='text/html' href='https://git.openwrt.org/feed/packages/commit/?id=292f29474be38afe941cf136ff1122a94bd937bf'/>
<id>urn:sha1:292f29474be38afe941cf136ff1122a94bd937bf</id>
<content type='text'>
Translate local_subnet and remote_subnet in /etc/config/ipsec into a comma separated list for leftsubnet and rightsubnet in /var/ipsec/ipsec.conf
</content>
</entry>
<entry>
<title>strongswan: Add missing declarations in swanctl</title>
<updated>2024-05-07T02:51:12Z</updated>
<author>
<name>Philip Prindeville</name>
</author>
<published>2024-05-06T20:14:55Z</published>
<link rel='alternate' type='text/html' href='https://git.openwrt.org/feed/packages/commit/?id=d95f6625e3fbb25f3f42401864268ae722a6c410'/>
<id>urn:sha1:d95f6625e3fbb25f3f42401864268ae722a6c410</id>
<content type='text'>
Signed-off-by: Philip Prindeville &lt;philipp@redfish-solutions.com&gt;
</content>
</entry>
</feed>
