Date: Sat, 19 May 2007 15:24:17 GMT From: "Dr. Markus Waldeck"<waldeck@gmx.de> To: freebsd-gnats-submit@FreeBSD.org Subject: ports/112791: hash_algorithm sha384 crashs racoon Message-ID: <200705191524.l4JFOHmV017447@www.freebsd.org> Resent-Message-ID: <200705191530.l4JFUBSC027878@freefall.freebsd.org>
next in thread | raw e-mail | index | archive | help
>Number: 112791 >Category: ports >Synopsis: hash_algorithm sha384 crashs racoon >Confidential: no >Severity: serious >Priority: high >Responsible: freebsd-ports-bugs >State: open >Quarter: >Keywords: >Date-Required: >Class: sw-bug >Submitter-Id: current-users >Arrival-Date: Sat May 19 15:30:11 GMT 2007 >Closed-Date: >Last-Modified: >Originator: Dr. Markus Waldeck >Release: 6.2-RELEASE >Organization: >Environment: FreeBSD fb 6.2-RELEASE FreeBSD 6.2-RELEASE #1: Wed Apr 25 14:44:12 CEST 2007 root@fbh:/usr/src/sys/i386/compile/FB62B00 i386 >Description: I tested the IPsec examples from the FreeBSD Handbook. I checked the behavoir of the racoon daemons if stronger algorithms are used. Both racoon daemons work with "hash_algorithm sha1;" and "hash_algorithm sha256;" but die together with "hash_algorithm sha384;" and "hash_algorithm sha512;". Both /var/log/messages files show following entry: pid XYZ (racoon), uid 0: exited on signal 6 >How-To-Repeat: >Fix: >Release-Note: >Audit-Trail: >Unformatted:
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200705191524.l4JFOHmV017447>