Hi Stuart,

On Mon, 28 Nov 2016, Stuart Henderson wrote:

ipsec.conf isn't required for this (or anything that you can do with ipsec.conf; though not all of it is documented in the isakmpd.conf manual, i.e. NAT-ID).

With the kind help of 'mxb' with a Swedish email address, I learned that. Mind you, it uses features of 'isakmpd.conf' that are well beyond my level of knowledge.

I would love to use both concurrently if I can?

Has anybody got any experience with both working well together?

That will be fine.

Yes. I have it working thanks to the list. But not quite as flexibly as I would like.

If I use a particular PSK across 'isakmpd.policy' and 'isakmpd.conf', and then try to use a different PSK for all inbound L2TP/IPSec connections, it fails. If they agree, it works. And I cannot remove the former (.policy) which I assume enforces an 'isakmpd'-wide PSK and try and use different ones in the different files, iaakmpd.conf and ipsec.conf i.e. what I use for IPSec over UDP500 and L2TP/IPSec over 1701 respectively.

For completeness of description, for the latter I use

        ike passive esp transport \
                proto udp from egress to any port 1701 \
                main auth "hmac-sha1" enc "3des" group modp1024 \
                quick auth "hmac-sha1" enc "3des" group modp1024 \
                psk "MY-PRE-SHARED-SECRET"

The above is what I found works for both Windows 10 (which has '3des' hardcoded) and Apple. Why I need the 'group modp1024' for quick-mode I do not know. I must figure out how to obtain a more flexible Windows VPN client. Microsoft says that only the earlier versions of its L2TP client are so inflexible.

        https://support.microsoft.com/en-us/kb/325158

But even my laptop's version for an up-to-date Windows 10 Home does not give me any choice for encryption from what I can see. Although I am far from an expert on Windows 10, in anything and I have used OpenBSD for 20
years.

Though if you have an example ipsec.conf fragment, feed it into "ipsecctl -nv" and it shows the isakmpd fifo commands that it would send to add the config sections,

I noticed. I learned more about the complexity of ISAKMPD commands in that split second of viewing output than I ever really needed to know. Wow. I awe of those that create such networking tools.

which you could clean up and add to isakmpd.conf yourself if you wanted to keep things in one place.

That sounds frought with risk. Not a big fan of jumping into the unknown.

And the future is 'ipsec.conf' so I probably need to learn that. Mind you, one I cannot see is how to nominate a list of CRYPTO TRANSFORMS to the 'enc' keyword inside 'ipsec'. For example how does one achieve the equivalent in 'isakmpd.conf' to the alternatives

        Transforms=  AES-SHA-GRP2,3DES-SHA

or even

        Suites=      QM-ESP-AES-SHA-PFS-GRP2-SUITE, QM-ESP-3DES-SHA-PFS-SUITE

While I am here, I still see on the passive IPSec Port 500 traffic

        got AES_CBC, expected 3DES_CBC

on the IPSec/port500udp even when the originating side (A Billion Router running some version of embedded Linux) is configured to talk AES and only AES. Very weird. But I notice that in the past, even old versions of ISAKMPD (4.6 and 4.7) with both ends the same produced that message it seems. I am clueless as to the cause of that.

Regards - Damian

Pacific Engineering Systems International, 277-279 Broadway, Glebe NSW 2037
Ph:+61-2-8571-0847 .. Fx:+61-2-9692-9623 | unsolicited email not wanted here
Views & opinions here are mine and not those of any past or present employer

Reply via email to