I am attaching a diff to the isakmpd.conf man page that I hope clarifies using
certificate based authentication. I found the information in the archives, and
I thought they might be better documented in the man page.
I believe the changes to be correct, but please do not take my word on it as I
am new to IPSec.
l8rZ,
--
andrew - ICQ# 253198 - JID: [EMAIL PROTECTED]
Proud member: http://www.mad-techies.org
BOFH excuse of the day: boss forgot system password
--- isakmpd.conf.5.orig Mon Aug 15 11:24:10 2005
+++ isakmpd.conf.5 Mon Aug 15 12:22:53 2005
@@ -886,12 +886,13 @@
# Incoming phase 1 negotiations are multiplexed on the source IP address
[Phase 1]
10.1.0.1= ISAKMP-peer-west
+10.1.0.3= ISAKMP-peer-north
# These connections are walked over after config file parsing and told
# to the application layer so that it will inform us when traffic wants to
# pass over them. This means we can do on-demand keying.
[Phase 2]
-Connections= IPsec-east-west
+Connections= IPsec-east-west,IPsec-east-north
# Default values are commented out.
[ISAKMP-peer-west]
@@ -905,6 +906,20 @@
Authentication= mekmitasdigoat
#Flags=
+# This connection uses certifiates, it assumes you have generated a valid
+# certificate from your "Private-key", that includes the "subjectAltName"
+# as used in the ID-east section and placed it in the "Cert-directory".
+[ISAKMP-peer-north]
+Phase= 1
+#Transport= udp
+Local-address= 10.1.0.2
+Address= 10.1.0.3
+#Port= isakmp
+#Port= 500
+Configuration= RSA_SIG-phase-1-configuration
+ID= ID-east
+#Flags=
+
[IPsec-east-west]
Phase= 2
ISAKMP-peer= ISAKMP-peer-west
@@ -929,6 +944,19 @@
EXCHANGE_TYPE= QUICK_MODE
Suites=
QM-ESP-3DES-SHA-PFS-SUITE,QM-ESP-AES-SHA-PFS-SUITE
+# Phase 1 description (Main Mode) using AUTHENTICATION_METHOD= RSA_SIG
+# RSA_SIG is needed when using certificates for authentication
+
+[RSA_SIG-phase-1-configuration]
+EXCHANGE_TYPE= ID_PROT
+Transforms= 3DES-SHA-RSA_SIG
+
+# The values here are what would be used by default in this configuration
+# if an ID was not specified in the ISAKMP-peer-north section.
+[ID-east]
+ID-type= IPV4_ADDR
+Address= 10.1.0.2
+
# Data for an IKE mode-config peer
[asn1_dn//C=SE/L=SomeCity/O=SomeCompany/CN=SomePeer.company.com]
Address= 192.168.1.123
@@ -983,6 +1011,13 @@
GROUP_DESCRIPTION= MODP_1024
Life= Default-phase-1-lifetime
+[DES-MD5-RSA_SIG]
+ENCRYPTION_ALGORITHM= DES_CBC
+HASH_ALGORITHM= MD5
+AUTHENTICATION_METHOD= RSA_SIG
+GROUP_DESCRIPTION= MODP_1024
+Life= Default-phase-1-lifetime
+
[DES-SHA]
ENCRYPTION_ALGORITHM= DES_CBC
HASH_ALGORITHM= SHA
@@ -990,6 +1025,13 @@
GROUP_DESCRIPTION= MODP_1024
Life= Default-phase-1-lifetime
+[DES-SHA-RSA_SIG]
+ENCRYPTION_ALGORITHM= DES_CBC
+HASH_ALGORITHM= SHA
+AUTHENTICATION_METHOD= RSA_SIG
+GROUP_DESCRIPTION= MODP_1024
+Life= Default-phase-1-lifetime
+
# 3DES
[3DES-SHA]
@@ -999,6 +1041,13 @@
GROUP_DESCRIPTION= MODP_1024
Life= Default-phase-1-lifetime
+[3DES-SHA-RSA_SIG]
+ENCRYPTION_ALGORITHM= 3DES_CBC
+HASH_ALGORITHM= SHA
+AUTHENTICATION_METHOD= RSA_SIG
+GROUP_DESCRIPTION= MODP_1024
+Life= Default-phase-1-lifetime
+
# Blowfish
[BLF-SHA]
@@ -1006,6 +1055,14 @@
KEY_LENGTH= 128,96:192
HASH_ALGORITHM= SHA
AUTHENTICATION_METHOD= PRE_SHARED
+GROUP_DESCRIPTION= MODP_1024
+Life= Default-phase-1-lifetime
+
+[BLF-SHA-RSA_SIG]
+ENCRYPTION_ALGORITHM= BLOWFISH_CBC
+KEY_LENGTH= 128,96:192
+HASH_ALGORITHM= SHA
+AUTHENTICATION_METHOD= RSA_SIG
GROUP_DESCRIPTION= MODP_1024
Life= Default-phase-1-lifetime