aes128gcm16
aes256gcm16
I did it for testing to null/sha265 and that works then correctly but then setting to no encryption is a sound idea.
AEAD (Authenticated Encryption with Associated Data) algorithms can’t be combined with classic encryption ciphers in the same proposal. No separate integrity algorithm must be proposed and therefore Pseudo-Random Functions (PRFs) have to be included explicitly in such proposals.
P1: aes128gcm16-sha384-x25519P2: aes128gcm16-x25519
P1: aes256gcm16-sha512-x448P2: aes256gcm16-x448
The following cryptographic algorithms are weak and prone to attacks and therefore must not be used.https://docs.strongswan.org/docs/5.9/howtos/securityRecommendations.html
P1: aes128gcm16-sha256-ecp256 [Enum 3/1/2]P2: aes128gcm16-ecp256 [Enum 0/0/4]
P1: aes256gcm16-sha384-ecp384 [Enum 4/1/3]P2: aes256gcm16-ecp384 [Enum 2/2/5]
But at least its not giving me now no proposlas errors, so I assume that part is correct now.
Doesnt the custom setting state that there is no limitation to PFS?
That's nice! You probably need to provide some more details about your config to say something useful. Those cryptic Microsoft error codes doesn't make much sense.https://docs.strongswan.org/docs/5.9/interop/microsoftStatusNotify.html
<|1844> querying policy 0.0.0.0/0 === 0.0.0.0/0 out failed, not found