Re: IPSec Keylifetime using ipsecctl and ipsec.conf?

2007-07-26 Thread Hans-Joerg Hoexer
Hi,

On Thu, Jul 26, 2007 at 10:04:31AM +0200, [EMAIL PROTECTED] wrote:
 Hi,
 
 I am using ipsecctl and /etc/ipsec.conf to create an IPSec tunnel to a  
 WatchGuard Firebox X700 in my company. It works fine, but the  
 re-keying always makes some trouble, it does not always work. My  
 question now is, how can I set the keylifetimes for phase 1 and 2 in  
 /etc/ipsec.conf? Is there a way to do this? The manpage does not give  
 any more info...

sorry, you can't.

However, you can use isakmpd.conf to set the default lifetimes.  Please
see isakmpd.conf(5) for details.

isakmpd.conf:
[General]
Default-phase-1-lifetime=   3600,60:86400
Default-phase-2-lifetime=   1200,60:86400

 
 I am running an OpenBSD 4.1 current. My ipsec.conf file looks like this:
 
 ike esp from 10.240.1.0/24 to 192.168.128.0/24 \
   peer 1.2.3.4 \
   main auth hmac-sha1 enc 3des group modp1024 \
   quick auth hmac-sha1 enc 3des group none \
   psk 
 
 Regards,
 James



Re: IPSec Keylifetime using ipsecctl and ipsec.conf?

2007-07-26 Thread James Lepthien

Am 26.07.2007 um 19:09 schrieb Mitja MuEeniD
:


Coincidentally I have exactly same symptoms connecting 4.1-stable
(using
isakmpd.conf and AES SHA1) to an unknown remote Firebox VPN gateway
running
firebox software 8.3 (very sketchy information because I had to
prie it
out of the IT people at the remote end).

Rekeying occasionaly fails, Phase 2 is down but Phase 1 SA remains
active.
The Firebox side does not reply to my Phase 2 proposals until I
manually
kill the Phase 1 SA on my end and reestablish everything.

I'm inclined to assume the problem lies at Firebox's end. But I
have no
access to Watchguard's support pages to see if it is a known problem.

Mitja




Hi!

The problem with the WatchGuard Firewalls is that they are pretty
strict. They are really great.
So your end is running Fireware 8.3. On my end it is the old software
version 7.3 which can only do 3DES.
I think I will have to try to use isakmpd as well and see how this
works.

You should also supply the DH Groups for both phases.
As far as I know the WatchGuard Firewalls only support DH1 and DH2 so
do not forget to set this in
your isakmpd.conf file.

James



Re: IPSec Keylifetime using ipsecctl and ipsec.conf?

2007-07-26 Thread Mitja Muženič
Coincidentally I have exactly same symptoms connecting 4.1-stable (using
isakmpd.conf and AES SHA1) to an unknown remote Firebox VPN gateway running
firebox software 8.3 (very sketchy information because I had to prie it
out of the IT people at the remote end).

Rekeying occasionaly fails, Phase 2 is down but Phase 1 SA remains active.
The Firebox side does not reply to my Phase 2 proposals until I manually
kill the Phase 1 SA on my end and reestablish everything. 

I'm inclined to assume the problem lies at Firebox's end. But I have no
access to Watchguard's support pages to see if it is a known problem.

Mitja


 -Original Message-
 From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] 
 On Behalf Of [EMAIL PROTECTED]
 Sent: Thursday, July 26, 2007 10:05 AM
 To: misc@openbsd.org
 Subject: IPSec Keylifetime using ipsecctl and ipsec.conf?
 
 Hi,
 
 I am using ipsecctl and /etc/ipsec.conf to create an IPSec 
 tunnel to a  
 WatchGuard Firebox X700 in my company. It works fine, but the  
 re-keying always makes some trouble, it does not always work. My  
 question now is, how can I set the keylifetimes for phase 1 and 2 in  
 /etc/ipsec.conf? Is there a way to do this? The manpage does 
 not give  
 any more info...
 
 I am running an OpenBSD 4.1 current. My ipsec.conf file looks 
 like this:
 
 ike esp from 10.240.1.0/24 to 192.168.128.0/24 \
peer 1.2.3.4 \
main auth hmac-sha1 enc 3des group modp1024 \
quick auth hmac-sha1 enc 3des group none \
psk 
 
 Regards,
 James