Tim Stewart <t...@stoo.org> writes:

> A sample configuration:
>
> ikev2 "win10host" passive esp \
>   from 0.0.0.0/0 to 10.1.1.51 \
>   local any peer any \
>   ikesa auth hmac-sha2-384 enc aes-256 prf hmac-sha2-384 group modp2048 \
>   childsa enc aes-256-gcm group modp2048 \
>   srcid "/C=US/ST=New York/L=NYC/O=Stoo Labs/OU=iked/CN=foo.stoo.org" \
>   dstid "/C=US/ST=New York/L=NYC/O=Stoo Labs/OU=iked/CN=bar.stoo.org" \
>   rsa \
>   config address 10.1.1.51 \
>   config name-server 10.1.1.5 \
>   config name-server 10.1.1.6 \
>   tag "$name-$id"
>
> The above configuration worked fine with iked in OpenBSD 6.0.  It broke
> as of 6.1 with the following error:
>
> set_policy_auth_method: ikeauth policy mismatch, rsa specified, but only 
> rfc7427 possible
> set_policy: failed to set policy auth method for
> /etc/iked.conf: 17: create_ike failed
> /etc/iked.conf: no valid configuration rules found
>
> I use a CA certificate and signed host certificates generated using a
> process like the EXAMPLES section in ikectl(8).  I'm a bit surprised
> that I could not find anyone else who has seen this problem, so maybe
> I'm doing something strange without realizing it.

Is there any more information that I can provide about this issue, or
possibly suggestions for changes to the patch?  Some guidance would help
me as I am new to this code.

Perhaps this should be moved to bugs?  (I posted to tech because I had a
patch).

Thanks,

-TimS

--
Tim Stewart
-----------
Mail:   t...@stoo.org
Matrix: @tim:stoo.org

Reply via email to