In M57 we bumped the strongSwan version to 5.5.0. This passed autotests and also passed manual tests using a cloud based VPN gateway based on Ubuntu 16.04 (also strongSwan). However, in bug 707139 , several customers reported a regression. The gateways they use were mentioned in the comments:
OP: Cisco ASA 5505
OP, c#1: Sophos UTM
c#7: Draytek Vigor 2850 SMB router (discontinued model)
c#10: Draytek Vigor 2960 SMB router (available on Amazon)
c#11: Cisco Meraki
c#12: Astrill consumer VPN service
c#13: Witopia consumer VPN service
c#20: PureVPN consumer VPN service
c#22: Customer OpenSwan installation on Ubuntu
The easiest way for me to reproduce the bug and control both sides of the connection was to set up a trial version of Sophos UTM in a VM. I did so, and found two less-than-obvious compatibility issues, which have been corrected. I do not have a way to test the other configurations, so there may be additional problems lurking.
At the very minimum I would like to add tests that cover the two items that have been fixed, so that if they regress again, we will catch the problem. It would also be nice to test some of the other combinations listed above.
The three consumer services can be tested by purchasing a subscription, then verifying:
a) M57 fails
b) ToT passes
c) Both fixes (not just one or the other) are required to pass. This requires a little hacking.
Comment 1 by cernekee@chromium.org
, May 1 2017