I finally got this working with Openswan and X.509 certificates.

On the OpenBSD side:
ipsec.conf:
ike passive esp from 86.134.74.32 to any

Linux/Openswan side:
ipsec.conf:
version 2
include /etc/ipsec.d/examples/no_oe.conf
config work
        auto=add
        left=%defaultroute
        leftcert=roadwarrior.crt
        leftrsasigkey=%cert
        [EMAIL PROTECTED]
        right=SERVER_IP
        rightcert=server.crt
        rightrsasigkey=%cert
        [EMAIL PROTECTED]
        forceencaps=yes
        ike=aes128-sha1-modp1024
        esp=aes128-sha1

This is working between 2 peers fine, haven't tried multiple peers yet.

As for certificates, both hosts need the public keys and CA cert as
well as thier own private key.

I am tempted to get this working with CAcert.org eventually.

Tom

Reply via email to