There is work in progress on this . 
We have an ipsec module which handles points 1. and 2. 
We have a daemon that talks with the kamailio module which handles point 3 and is managing SAs via XFRM . 
Last point is a little bit harder without NAT, but possible, and likely we'll have that too.
When the ipsec module is ready we plan to release it but the manager which handles ipsec states and policies might be 
closed source. The protocol to communicate with the ipsec manger will be open and based on simple json queries . 

One of the problems we ran into is that we don't have any good UE to reference to and to test our implementation with, both the iPhone and the Android are full of bugs and don't respect the specs . 

Regards,
Dragos



From: Vikram Chhibber <vikram.chhibber@gmail.com>
To: sr-dev@lists.sip-router.org
Sent: Wednesday, June 29, 2016 11:33 PM
Subject: [sr-dev] Gm interface ipsec support

Hi All,

I recently asked question on whether the pcscf module supports transport mode ipsec with UE along with AKAv1/v2-MD5 authentication and the answer came no.

I just want to open a discussion on how much effort would be neede to support this or whether this work is already in progress or in roadmap.
Basically, at PCSCF end, we need to support following:
1. RFC 3329 - "Security Mechanism Agreement for SIP" that includes processing of Security-Client, Security-Server and Security-Verify headers.
2. Support for processing of WWW-Authenticate header to extract CK and IK keys for ipsec.
3. Support for creating, updating and deleting ipsec security-associations using setkey or something else.
3. Management of secure sockets for ipsec communication.

and on SCSCF side, support for AKAv1/v2-MD5.

Please let me know the your thoughts.

Thanks


_______________________________________________
sr-dev mailing list
sr-dev@lists.sip-router.org
http://lists.sip-router.org/cgi-bin/mailman/listinfo/sr-dev