||This article appears to be written like an advertisement. (January 2012)|
|Developer(s)||Andreas Steffen, Martin Willi & Tobias Brunner|
|Stable release||5.2.2 / January 5, 2015|
|Operating system||Linux, Android, Maemo, FreeBSD, OS X, Windows|
|License||GNU General Public License|
strongSwan is a complete IPsec implementation for Linux 2.6 and 3.x kernels. The focus of the project is on strong authentication mechanisms using X.509 public key certificates and optional secure storage of private keys on smartcards through a standardized PKCS#11 interface.
As a descendant of the FreeS/WAN project, strongSwan continues to be released under the GPL license. It supports certificate revocation lists and the Online Certificate Status Protocol (OCSP). A unique feature is the use of X.509 attribute certificates to implement access control schemes based on group memberships. StrongSwan interoperates with other IPsec implementations, including various Microsoft Windows and Mac OS X VPN clients. The modular strongSwan 5.0 branch fully implements the Internet Key Exchange (IKEv2) protocol defined by RFC 5996.
StrongSwan supports IKEv1 and fully implements IKEv2.
IKEv1 and IKEv2 features
- strongSwan offers plugins, enhancing its functionality. The user can choose among three crypto libraries (legacy [non-US] FreeS/WAN, OpenSSL, and gcrypt).
- Using the openssl plugin, strongSwan supports Elliptic Curve Cryptography (ECDH groups and ECDSA certificates and signatures) both for IKEv2 and IKEv1, so that interoperability with Microsoft's Suite B implementation on Vista, Win 7, Server 2008, etc. is possible.
- Automatic assignment of virtual IP addresses to VPN clients from one or several address pools using either the IKEv1 ModeConfig or IKEv2 Configuration payload. The pools are either volatile (i.e. RAM-based) or stored in a SQLite or MySQL database (with configurable lease-times).
- The ipsec pool command line utility allows the management of IP address pools and configuration attributes like internal DNS and NBNS servers.
IKEv2 only features
- The IKEv2 daemon is inherently multi-threaded (16 threads by default). It has been shown that up to 20,000 concurrent IPsec tunnels can be handled on industry-grade VPN gateways.
- The IKEv2 daemon comes with a High-Availability option based on Cluster IP where currently a cluster of two hosts does active load-sharing and each host can take over the ESP and IKEv2 states without rekeying if the other host fails.
- The following EAP authentication methods are supported: AKA and SIM including the management of multiple [U]SIM cards, MD5, MSCHAPv2, GTC, TLS, TTLS. EAP-MSCHAPv2 authentication based on user passwords and EAP-TLS with user certificates are interoperable with the Windows 7 Agile VPN Client.
- The EAP-RADIUS plugin relays EAP packets to one or multiple AAA servers (e.g. FreeRADIUS or Active Directory).
- Support of RFC 5998 EAP-Only Authentication in conjunction with strong mutual authentication methods like e.g. EAP-TLS.
- Support of RFC 4739 IKEv2 Multiple Authentication Exchanges.
- Support of the RFC 4555 Mobility and Multihoming Protocol (MOBIKE) which allows dynamic changes of the IP address and/or network interface without IKEv2 rekeying. MOBIKE is also supported by the Windows 7 Agile VPN Client.
- The strongSwan IKEv2 NetworkManager applet supports EAP, X.509 certificate and PKCS#11 smartcard based authentication. Assigned DNS servers are automatically installed and removed again in /etc/resolv.conf.
- Support of Trusted Network Connect (TNC). A strongSwan VPN client can act as a TNC client and a strongSwan VPN gateway as a Policy Enforcement Point (PEP) and optionally as a co-located TNC server. The following TCG interfaces are supported: IF-IMC 1.2, IF-IMV 1.2, IF-PEP 1.1, IF-TNCCS 1.1, IF-TNCCS 2.0 (RFC 5793 PB-TNC), IF-M 1.0 (RFC 5792 PA-TNC), and IF-MAP 2.0.
- The IKEv2 daemon has been fully ported to the Android operating system including integration into the Android VPN applet. It has also been ported to the Maemo, FreeBSD and Mac OS X operating systems.
KVM simulation environment
The focus of the strongSwan project lies on the strong Authentication by means of X.509-Certificates, as well as the optional safe storage of private key on smart cards with help of the standardized PKCS#11 interface, strongSwan certificate check lists and On-line Certificate Status Protocol (OCSP).
An important capability is the use of X.509 Certificate Attributes, which permits it to realize complex access control mechanisms on the basis of group memberships.
strongSwan is however simple to configure and works smoothly with nearly all other IPsec implementations, in particular also with various Microsoft Windows and Mac OS X-VPN-products.
- strongSwan website
- strongSwan with Trusted Network Connect (TNC)
- strongSwan UML testing environment
- LinuxTag 2008 Paper: strongSwan VPNs - modularized and scalable!
- LinuxTag 2007 Paper: strongSwan - the new IKEv2 VPN Solution
- LinuxTag 2005 Paper: Advanced Features of Linux strongSwan
- DFN 2005 Paper: Advanced Network Simulation under User-Mode Linux
- "Advisors: Prof. Dr. Andreas Steffen". University of Applied Sciences. Retrieved 2014-03-31.
- "strongSwan: License statement". 2014-03-22. Retrieved 2014-03-31.
- "strongSwan: the OpenSource IPsec-based VPN Solution". 2014-02-28. Retrieved 2014-03-31.