On Fri, Nov 24, 2006 at 12:38:46AM -0600, Albert Chin wrote:
> On Thu, Nov 23, 2006 at 08:21:33AM -0600, Albert Chin wrote:
> > I'm trying to connect an FC5 laptop behind a firewall to an OpenBSD
> > 4.0 VPN server running isakmpd. I already have things working with
> > Openswan but would like to get it working with racoon for our Mac OS
> > clients.
> >
> > The OpenBSD /etc/ipsec.conf config:
> > ike passive esp from 192.168.1.0/24 to 192.168.6.0/24 \
> > main auth hmac-sha1 enc aes group modp1024 \
> > quick auth hmac-sha1 enc aes \
> > srcid [vpn server FQDN] dstid [FC5 laptop FQDN]
> >
> > ...
> >
> > Am I getting the sainfo section wrong in racoon.conf? With the sainfo
> > section, do I still need setkey?
>
> I've made some more changes but still cannot get it working. Looks
> like I do need to use setkey. I modified the OpenBSD /etc/ipsec.conf
> to:
> ike passive esp from 192.168.10.0/24 to any \
> main auth hmac-sha1 enc aes group modp1024 \
> quick auth hmac-sha1 enc aes \
> srcid vpn-server.thewrittenword.com dstid [EMAIL PROTECTED]
>
> and racoon.conf:
> remote 67.95.107.100 {
> exchange_mode main;
> my_identifier user_fqdn "[EMAIL PROTECTED]";
> peers_identifier fqdn "vpn-server.thewrittenword.com";
> certificate_type x509 "[EMAIL PROTECTED]"
> "/etc/ipsec.d/private/local.key";
> ca_type x509 "/etc/ipsec.d/cacerts/ca.crt";
>
> nat_traversal on;
>
> proposal {
> encryption_algorithm aes;
> hash_algorithm sha1;
> dh_group modp1024;
> authentication_method rsasig;
> }
> }
>
> sainfo anonymous {
> pfs_group 2;
> encryption_algorithm aes, 3des, blowfish;
> authentication_algorithm hmac_sha256, hmac_sha1, hmac_md5;
> compression_algorithm deflate;
> }
>
> and /etc/racoon/ipsec.conf:
> flush;
> spdflush;
>
> spdadd -4 192.168.6.1 192.168.10.0/24 any -P out ipsec
> esp/tunnel/192.168.6.1-67.95.107.100/require;
> spdadd -4 192.168.10.0/24 192.168.6.1 any -P in ipsec
> esp/tunnel/67.95.107.100-192.168.6.1/require;
Ok, this actually does work. On Linux, the SAs don't get authenticated
until after you issue a network connection to the remote end. Ugh! So,
with the above, "ping 192.168.10.13" x2 gets past Phase 2.
--
albert chin ([EMAIL PROTECTED])