Thanks, verified and works great!
> On 3 Oct 2015, at 3:32 PM, Reyk Floeter <r...@openbsd.org> wrote:
> 
> On Sun, Aug 16, 2015 at 11:28:24PM +0300, Or Elimelech wrote:
>> Hello misc,
>> 
>> Has anyone connected successfully between the new OS X ikev2 impl. To an 
>> OpenBSD box?
>> 
>> Thanks in advance.
>> 
> 
> I got the official update and I successfully connected from El Capitan
> to OSX.  I did it without using profiles, just with the GUI in network
> settings.
> 
> ON OPENBSD:
> 
> - Get -current from yesterday (small fix went in)
> 
> - Configure an IP on enc0 directly (eg. 10.2.0.2 in this case), a dns
> cache, forwarding, PF etc.
> 
> - Configure iked.conf, for example:
> 
> user "user1" "password123"
> ikev2 "ios9" passive esp \
>       from 0.0.0.0/0 to 0.0.0.0/0 \
>       local any peer any \
>       childsa enc 3des \
>       eap "mschap-v2" \
>       config address 10.2.0.1/24 \
>       config name-server 10.2.0.2 \
>       tag "$name-$id"
> 
> - Yes, 3DES. As you see in your log, El Capitan currently only accepts
> 3DES by default.  You can probably change it with the external
> security profiles program.  iOS9 uses AES-128 instead.
> 
> ON OSX:
> 
> - Use "ikectl ca" (or other CA tool) to create ca, keys and certs for
> the gateway and peers.  I recommend to use FQDNs for the certs.
> 
> - Install the ca.pfx and $CERT.pfx on OSX from keychain (import
> objects). Trust the CA for EAP and IPsec.
> 
> - I tested different options in OSX, user-based, "without" auth + shared
> secret, "without" auth + certificate.  Certificate-based auth doesn't
> work since it is two factor EAP-TLS.  User-based is EAP-MSCHAPv2.
> Select the installed certificate. 
> 
> In summary, the GUI part is very easy but certificate configuration is
> a bit difficult.  It's the same complexity as in Windows.  But much
> better compared to earlier IPsec configurations.
> 
> Reyk

Reply via email to