Skip site navigation (1)Skip section navigation (2)
Date:      Tue, 29 May 2018 16:50:35 +0000
From:      bugzilla-noreply@freebsd.org
To:        bugs@FreeBSD.org
Subject:   [Bug 222684] IPv6 AH hmac-sha2-384 is incompatible with Linux AH hmac(sha384)
Message-ID:  <bug-222684-227-uejkqzHHag@https.bugs.freebsd.org/bugzilla/>
In-Reply-To: <bug-222684-227@https.bugs.freebsd.org/bugzilla/>
References:  <bug-222684-227@https.bugs.freebsd.org/bugzilla/>

next in thread | previous in thread | raw e-mail | index | archive | help
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D222684

--- Comment #6 from Jason Mader <jasonmader@gmail.com> ---
(In reply to Conrad Meyer from comment #5)

Nope, only because I don't believe Linux ip xfrm has that algorithm,=20

>From IP-XFRM(8):

Authentication algorithms include digest_null, hmac(md5), hmac(sha1),
hmac(sha256), hmac(sha384), hmac(sha512), hmac(rmd610), and xcbc(aes).


Here's what I saw yesterday about the security audit,
http://blog.netbsd.org/tnf/entry/network_security_audit

--=20
You are receiving this mail because:
You are the assignee for the bug.=



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?bug-222684-227-uejkqzHHag>