Hi,

If someone can help me on...

<workstations>---rl0--[obsdGW]--rl1--INTERNET---(win7)

i tried an other config file for iked.conf :
ikev2 "win7" passive esp \
        from 10.10.0.0/24 to 0.0.0.0/0 \
        local any peer any \
        eap "mschap-v2" \
        config address 10.10.0.7 \
        tag "$name-$id"

'/sbin/iked -n' give me "Configuration OK"

Now if i run /sbin/iked -dvv :
/etc/iked.conf: loaded 2 configuration rules
config_new_user: inserting new user bandit
user "bandit" "numbers"
ca_reload: loaded ca file ca.crt
ca_reload: /C=FR/ST=REUNION/L=Sainte Clotilde/O=e-solutions/CN=vpn.solutions.lan
ca_reload: loaded 1 ca certificate
ca_reload: loaded cert file 81.255.127.115.crt
ca_validate_cert: /C=FR/ST=REUNION/L=Sainte Clotilde/O=e-solutions ok
ikev2_dispatch_cert: updated local CERTREQ signatures length 20
config_getpolicy: received policy
ikev2 "win7" passive esp from 10.10.0.0/24 to 0.0.0.0/0 local any peer any ikesa enc aes-256,aes-192,aes-128,3des prf hmac-sha2-256,hmac-sha1,hmac-md5 auth hmac-sha2-256,hmac-sha1,hmac-md5 group modp2048-256,modp2048,modp1536,modp1024 childsa enc aes-256,aes-192,aes-128 auth hmac-sha2-256,hmac-sha1 lifetime 10800 bytes 536870912 eap "MSCHAP_V2" config address 10.10.0.7 tag "$name-$id"
config_getpfkey: received pfkey fd 4
config_getcompile: compilation done
config_getsocket: received socket fd 11
config_getsocket: received socket fd 12
config_getsocket: received socket fd 14
config_getsocket: received socket fd 20


When i try to connect using the win7 workstation (road warrior) :
a "tail -f /var/log/daemon" give me :
Apr 3 14:32:57 vpn iked[15924]: ikev2_recv: IKE_SA_INIT from initiator RR.WW.RR.WW:52711 to AA.BB.CC.DD:500 policy 'win7', 528 bytes Apr 3 14:32:57 vpn iked[15924]: ikev2_msg_send: IKE_SA_INIT from AA.BB.CC.DD:500 to RR.WW.RR.WW:52711, 325 bytes Apr 3 14:32:57 vpn iked[15924]: ikev2_recv: IKE_AUTH from initiator RR.WW.RR.WW:53054 to AA.BB.CC.DD:4500 policy 'win7', 1164 bytes


I can't connect on.

Thank you very much.

Wesley.



Le 2012-04-02 16:37, mxb a C)critB :
On 04/02/2012 10:17 AM, Wesley wrote:
Hi,

I'm using an OpenBSD Gateway running :
OpenBSD vpn.area.lan
5.1 GENERIC.MP#214 i386

So what i'm trying to build
:
<10.10.0.0/24>----rl0----[obsd]----rl1----(INTERNET)----(win7 with
dynamic IP)

IP Address (INTERNET, rl1) : AA.BB.CC.DD
Dynamic IP for
win7 : RR.WW.RR.WW

I start the ikev2 vpn (it stop on password and user
verification) and have this on the OBSD gateway :

tail -f
/var/log/daemon :
Apr 2 12:13:22 vpn iked[19494]: ikev2_recv:
IKE_SA_INIT from initiator RR.WW.RR.WW:59317 to AA.BB.CC.DD:500 policy
'win7', 528 bytes
Apr 2 12:13:22 vpn iked[19494]: ikev2_msg_send:
IKE_SA_INIT fromAA.BB.CC.DD:500 to RR.WW.RR.WW:59317, 325 bytes
Apr 2
12:13:22 vpn iked[19494]: ikev2_recv: IKE_AUTH from initiator
RR.WW.RR.WW:58268 to AA.BB.CC.DD:4500 policy 'win7', 1164 bytes

Any
idea ?
Thank you very much.

-- OpenBSD Gateway :

rl0 group : lan
rl1
group : egress

IP Address (INTERNET, rl1) : AA.BB.CC.DD

iked.conf
:
user "bandit" "123456"
ikev2 "win7" passive esp
  from 10.10.3.0/24 to
10.10.0.0/24
  local any peer any
  eap "mschap-v2"
  config address
10.10.3.7
  config name-server 10.10.0.51
  tag "$name-$id"

pf.conf
:
set skip on {lo,enc0}
set block-policy drop
match out on egress from
lan:network to any nat-to egress
block log all
pass out
pass in on
egress proto esp
pass in on egress proto udp to port 500
pass in on
egress proto udp to port 4500
pass in on egress proto tcp to port
22
pass in on lan inet from lan:network to any

net.inet.ip.forwarding
= 1

What i have done about certificates :
ikectl ca vpn create
ikectl
ca vpn certificate AA:BB:CC:DD create
ikectl ca vpn install
ikectl ca
vpn certificate AA:BB:CC:DD install
ikectl ca vpn certificate
AA:BB:CC:DD export

I put the certs exported on the win7 workstation.


And then run iked.

-- Win7 workstation
Import certificate in mmc
snap (Certificates/Authority)

Wesley.

Hi,

try to run iked with '-vd' and see what you get.

An alternative could be to run experimental npppd, eg L2TP over IPSec.
Work fine here.

//maxim

Reply via email to