On Thu, 11/25/10, Andrea Parazzini <[email protected]> wrote:
> Hi,
> we have a vpn connection with a customer.
> The remote peer is not under our management.
> Our box is an OpenBSD 4.7 i386.
> We have configured the vpn as follows:
> 
> /etc/rc.conf.local
> ipsec=YES
> isakmpd_flags="-K -v"
> 
> /etc/ipsec.conf
> ike active esp tunnel \
>   from 10.1.0.0/16 (0.0.0.0/0) to 192.168.90.0/24 \
>   local A.B.C.D peer W.X.Y.Z \
>   main auth hmac-sha1 enc 3des group modp1024 \
>   quick auth hmac-sha1 enc 3des group modp1024 \
>   psk "PRESHAREDKEY"
> 
> 
> The vpn works fine, but there is a strange thing.
> Whith "netstat -nrf encap" I see something like:
> 
> Source         Port  Destination    Port  Proto  SA
> 192.168.71/24  0     10.1/16        0     0      W.X.Y.Z/esp/use/in
> 10.1/16        0     192.168.71/24  0     0      W.X.Y.Z/esp/require/out
> 192.168.90/24  0     default        0     0      W.X.Y.Z/esp/use/in
> default        0     192.168.90/24  0     0      W.X.Y.Z/esp/require/out
> 
> As you can see there is a flow that is not configured on our box.
> It is probably configured on the remote peer.
> Is a normal behavior?
> How can I protect myself from an incorrect configuration on the remote
> peer?


On Fri, 26 Nov 2010 12:58:09 +0000 (UTC), Stuart Henderson>
<[email protected]> wrote:
> isakmpd.policy(5), and have some aspirin ready for the inevitable
> headache.


Stuart is right.
I tried to play with isakmpd.policy and it's rather complicated.
Reading the manuals again I noticed the -a option of isakmpd.
So my new configuration could be the following:

/etc/rc.conf.local
ipsec=YES
isakmpd_flags="-a -K -v"

/etc/ipsec.conf
ike active esp tunnel \
  from 10.1.0.0/16 to 192.168.90.0/24 \
  local A.B.C.D peer W.X.Y.Z \
  main auth hmac-sha1 enc 3des group modp1024 \
  quick auth hmac-sha1 enc 3des group modp1024 \
  psk "PRESHAREDKEY"
flow esp from 0.0.0.0/0 to 192.168.90.0/24 \
  local A.B.C.D peer W.X.Y.Z

It might work? What do you think?

Thanks.

Regards,
Andrea

Reply via email to