diff --git a/README.md b/README.md index 151655fe6..4fb1ebe99 100644 --- a/README.md +++ b/README.md @@ -1,4 +1,4 @@ -# strongSwan Configuration # +## Patched version, containing patch to disable parsing of AUTH payload in IKEv2 Phase2, because we only want EAP-AKA ## ## Overview ## diff --git a/src/libstrongswan/credentials/auth_cfg.c b/src/libstrongswan/credentials/auth_cfg.c index e278bba39..90dc9aa74 100644 --- a/src/libstrongswan/credentials/auth_cfg.c +++ b/src/libstrongswan/credentials/auth_cfg.c @@ -944,6 +944,7 @@ METHOD(auth_cfg_t, complies, bool, id1 = (identification_t*)value; id2 = get(this, t1); +/* if (!id2 || !id2->matches(id2, id1)) { if (t1 == AUTH_RULE_IDENTITY && @@ -965,6 +966,10 @@ METHOD(auth_cfg_t, complies, bool, "EAP ", id1); } } +*/ + DBG1(DBG_CFG, "constraint check failed, but we are ignoring it for now: %sidentity '%Y'" + " required ", t1 == AUTH_RULE_IDENTITY ? "" : + "EAP ", id1); break; } case AUTH_RULE_AUTH_CLASS: