Hi,

There are many IPsec related standards, and I was hoping to use the combined experience of the list to tell me if in fact, these new apple devices have a bug, or whether it is an RFC or draft anywhere.

When using L2TP/IPsec mode with IKEv1, the latest iphones/OSX machines, when on public IP, and when no NAT is detected, send UDP_ENCAP packets where the inner IP is the same as the outer IP.

On the server, this is a problem. We now need to build tunnels to a random publicly addressable IP. Since that is dangerous and could be hijacking a real IP address, openwan only limits per default to RFC1918 space (and 25/8 since too many North American telco's use this and the UK MoD seems to not care). As a result, to make this work, we need to allow basically any public IP to be tunnelled.

Is this indeed a bug in these devices? If so, is there anyone from Apple here that I can talk to and resolve this. Or if this is a feature/draft/rfc, could someone point me to it?

Thanks,

Paul

_______________________________________________
IPsec mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/ipsec

Reply via email to