Re: isakmpd ignoring contents of /etc/ipsec.conf

2017-12-07 Thread Bernd
established. What did I overlook here? Looks like ipsec.conf(5) was not loaded, see the manpage, paragraph 4 of DESCRIPTION. Hi, ipsec=YES is set in rc.conf.local: # cat /etc/rc.conf.local isakmpd_flags="-K" ipsec=YES # IPsec OK, then let's go back to you

Re: isakmpd ignoring contents of /etc/ipsec.conf

2017-12-07 Thread Jeremie Courreges-Anglas
;> I overlook here? >> >> Looks like ipsec.conf(5) was not loaded, see the manpage, paragraph >> 4 of >> DESCRIPTION. > > Hi, > > ipsec=YES is set in rc.conf.local: > > # cat /etc/rc.conf.local > isakmpd_flags="-K" > ipsec=YES # I

Re: isakmpd ignoring contents of /etc/ipsec.conf

2017-12-07 Thread Bernd
Am 2017-12-06 18:26, schrieb Jeremie Courreges-Anglas: On Wed, Dec 06 2017, Bernd <be...@kroenchenstadt.de> wrote: Hi @misc, I'm trying to set up a site-to-site IPSec tunnel. I'm using vanilla OpenBSD 6.2 amd64 (dmesg below). My /etc/ipsec.conf looks like this: ike esp from any to an

Re: isakmpd ignoring contents of /etc/ipsec.conf

2017-12-06 Thread Jeremie Courreges-Anglas
On Wed, Dec 06 2017, Bernd <be...@kroenchenstadt.de> wrote: > Hi @misc, > > I'm trying to set up a site-to-site IPSec tunnel. I'm using vanilla > OpenBSD 6.2 amd64 (dmesg below). > > My /etc/ipsec.conf looks like this: > > ike esp from any to any peer x.y.z.0/27 \

isakmpd ignoring contents of /etc/ipsec.conf

2017-12-06 Thread Bernd
Hi @misc, I'm trying to set up a site-to-site IPSec tunnel. I'm using vanilla OpenBSD 6.2 amd64 (dmesg below). My /etc/ipsec.conf looks like this: ike esp from any to any peer x.y.z.0/27 \ main auth hmac-sha2-256 enc aes-256 group modp2048 \ psk "myverygoodsecretPSK" (As can

ipsec.conf

2017-05-26 Thread Hrvoje Popovski
Hi all, i having ipsec.conf like this: ike esp from 10.200.136.0/21 to any \ local 10.64.135.246 peer 10.4.57.68 \ main auth hmac-sha1 enc aes group modp1024 \ quick auth hmac-sha1 enc aes group modp1024 \ psk b9278b3051cd17674305833971c22b11514eac51

Re: Flaw in ipsec.conf(5)?

2016-05-28 Thread Jason McIntyre
o say the idea of filtering enc traffic no longer makes sense and to remove the section. or to tell you what's in ipsec.conf(5) is correct, and why. until that happens, the text will remain, i think. jmc > > Index: sbin/ipsecctl/ipsec.conf.5 > ======

Re: Flaw in ipsec.conf(5)?

2016-05-27 Thread Bruno Flueckiger
192.168.3.1 to 192.168.3.2 pass in on sk0 from 10.0.2.0/24 to 10.0.1.0/24 \ keep state (if-bound) pass out on sk0 from 10.0.1.0/24 to 10.0.2.0/24 \ keep state (if-bound) Index: sbin/ipsecctl/ipsec.conf.5 === RCS file

Re: Flaw in ipsec.conf(5)?

2016-05-27 Thread Bruno Flueckiger
] <> [inet] <> [gw2] <-- vlan20 --> [srv] > > IPsec= > > i think you should provide more details of your setup first. for > example, ipsec.conf(5) shows pf rules for ipencap but you only provide a > small snippet of

Re: Flaw in ipsec.conf(5)?

2016-05-26 Thread Jason McIntyre
IPsec= > > During the testing I think I've found a flaw in ipsec.conf(5). According > to the man page the esp packets need to be passed on interface sk0: > > block on sk0 > block on enc0 > > pass in on sk0 proto udp from 192.168.3.2 to 192.168.3.1 \ >

Re: Flaw in ipsec.conf(5)?

2016-05-24 Thread Philipp Buehler
Am 24.05.2016 10:53 schrieb Bruno Flueckiger: As a result of my tests I've created the diff below for ipsec.conf(5). Is this ok or did I miss something? You missed the 'set skip on enc0' a bit up. -- pb

Flaw in ipsec.conf(5)?

2016-05-24 Thread Bruno Flueckiger
Hi, I've tested IPsec connections in my lab. The setup looks like this: [cli] <-- vlan10 --> [gw1] <> [inet] <> [gw2] <-- vlan20 --> [srv] IPsec= During the testing I think I've found a flaw in ipsec.conf(5). According

reference ipsec.conf in ipsec.4 under SEE ALSO?

2016-03-20 Thread Rob Pierce
16:38:54 - 1.83 +++ ipsec.4 18 Mar 2016 20:51:05 - @@ -378,6 +378,7 @@ allocations). .\".Xr ipcomp 4 , .Xr options 4 , .Xr iked 8 , +.Xr ipsec.conf 5 , .Xr ipsecctl 8 , .Xr isakmpd 8 , .Xr sysctl 8

Re: reference ipsec.conf in ipsec.4 under SEE ALSO?

2016-03-18 Thread Rob Pierce
> From: "Jason McIntyre" <j...@kerhand.co.uk> > To: "misc" <misc@openbsd.org> > Sent: Friday, March 18, 2016 5:40:07 PM > Subject: Re: reference ipsec.conf in ipsec.4 under SEE ALSO? > On Fri, Mar 18, 2016 at 04:59:29PM -0400, Rob Pierce wrote: &g

Re: reference ipsec.conf in ipsec.4 under SEE ALSO?

2016-03-18 Thread Jason McIntyre
+378,7 @@ allocations). > .\".Xr ipcomp 4 , > .Xr options 4 , > .Xr iked 8 , > +.Xr ipsec.conf 5 , > .Xr ipsecctl 8 , > .Xr isakmpd 8 , > .Xr sysctl 8

isakmpd peculiarities, ipsec.conf manpage inaccuracy

2016-02-28 Thread Andrew Lester
Hi all, I'm running OpenBSD 5.8-stable. The ipsec.conf manpage indicates that if no srcid is present in an automatic keying IKE statement, then the value in the identification should be the host IP address, and be an IP address type. I've found this to be incorrect; if no srcid is specified, my

ipsec.conf parsing

2014-03-19 Thread Zé Loff
As far as I can tell, if a commented line on ipsec.conf ends with \ then the following line will also be considered a comment (if the next line also ends with \ the commenting is propagated). For example #ike esp from A.A.A.A to C.C.C.C \ ike esp from A.A.A.A to B.B.B.B \ srcid

Re: ipsec.conf parsing

2014-03-19 Thread mathieu . blanc
On Wed, Mar 19, 2014 at 10:22:43AM +, Zé Loff wrote: As far as I can tell, if a commented line on ipsec.conf ends with \ then the following line will also be considered a comment (if the next line also ends with \ the commenting is propagated). For example #ike esp from A.A.A.A

Re: ipsec.conf parsing

2014-03-19 Thread Stuart Henderson
On 2014-03-19, Zé Loff zel...@zeloff.org wrote: As far as I can tell, if a commented line on ipsec.conf ends with \ then the following line will also be considered a comment (if the next line also ends with \ the commenting is propagated). For example #ike esp from A.A.A.A to C.C.C.C

Re: ipsec.conf parsing

2014-03-19 Thread Jean-Philippe Ouellet
On 3/19/14 6:22 AM, Zé Loff wrote: As far as I can tell, if a commented line on ipsec.conf ends with \ then the following line will also be considered a comment (if the next line also ends with \ the commenting is propagated). For example #ike esp from A.A.A.A to C.C.C.C \ ike esp from

Multiple srcnat for one src in ipsec.conf

2014-03-14 Thread Erwin Schliske
Hello, I've one question. Is it possible to configure two or more srcnat values for one tunnel? I've to hide two of our subnets behind one subnet in a tunnel to a customer. Example: ike esp from 10.30.172.32/29 (10.77.3.0/24,172.30.0.0/16) to 10.78.1.0/24 Is this possible? Thanks.

Re: Interface/IP limit on isakmpd, no listen-on in ipsec.conf, IPSec failover enhancement, IPSec tunnel rebuild enhancement

2014-02-17 Thread Andy
Hi, Does anyone have any ideas on this? How can we configure isakmpd to only listen on certain IP addresses to avoid this limitation when it tries to listen on *every* IP address? I see listen-on in isakmpd.conf, but we are using ipsec.conf and I understand these are mutually-exclusive

Re: Interface/IP limit on isakmpd, no listen-on in ipsec.conf, IPSec failover enhancement, IPSec tunnel rebuild enhancement

2014-02-17 Thread Andy
stability tweaks help someone in return for the misc@ noise Ha Cheers, Andy. Thanks Rogier... On 17/02/14 17:10, Rogier Krieger wrote: It's been a while since I tried, but I seem to recall my setup ran happily with a (minimal) isakmpd.conf and ipsec.conf. I kept my settings limited

Re: Interface/IP limit on isakmpd, no listen-on in ipsec.conf, IPSec failover enhancement, IPSec tunnel rebuild enhancement

2014-02-15 Thread Sebastian Benoit
andy(a...@brandwatch.com) on 2014.02.12 12:22:57 +: Hi, I think this is a fairly simple one. Our firewalls are growing in complexity and the number of interfaces and IPs as time goes on, and we recently hit an isakmpd limit. When isakmpd starts it tries to bind to *every* single IP

Interface/IP limit on isakmpd, no listen-on in ipsec.conf, IPSec failover enhancement, IPSec tunnel rebuild enhancement

2014-02-12 Thread andy
side *unless* it is the carp master. Makes perfect sense.. On the master, isakmpd starts in passive, discovers it is master and so reads and loads ipsec.conf, and starts negotiating with other side On the backup, isakmod starts in passive, does nothing more. If a failover occurs however, the VPNs do

Re: how to compare ipsec.conf and isakmpd.conf settings?

2013-09-27 Thread Daniel Polak
Original message from Stuart Henderson at 26-9-2013 23:58 On 2013-09-26, Daniel Polak dan...@sys.nl wrote: I'd like to see how isakmpd interprets the settings in ipsec.conf and isakmpd.conf and would like to compare those interpretations. ipsecctl -nvf /etc/ipsec.conf shows the settings

Re: how to compare ipsec.conf and isakmpd.conf settings?

2013-09-27 Thread Camiel Dobbelaar
On 9/27/13 10:46 AM, Daniel Polak wrote: What would have helped me solve this is a way to see what the current configuration of isakmpd looks like (irrespective of whether it was loaded from isakmpd.conf or from ipsec.conf). It appears there is no equivalent of a C get all command to the FIFO

how to compare ipsec.conf and isakmpd.conf settings?

2013-09-26 Thread Daniel Polak
On a computer running OpenBSD 5.3 system I am migrating from an isakmpd.conf based configuration to an ipsec.conf based configuration. The tunnel comes up and works correctly when using isakmpd.conf but I can't get the tunnel to come up when I use ipsec.conf. As far as I can see ipsec.conf

Re: how to compare ipsec.conf and isakmpd.conf settings?

2013-09-26 Thread mxb
configuration to an ipsec.conf based configuration. The tunnel comes up and works correctly when using isakmpd.conf but I can't get the tunnel to come up when I use ipsec.conf. As far as I can see ipsec.conf contains the same settings as the settings that are in isakmpd.conf. The error message

Re: how to compare ipsec.conf and isakmpd.conf settings?

2013-09-26 Thread Stuart Henderson
On 2013-09-26, Daniel Polak dan...@sys.nl wrote: On a computer running OpenBSD 5.3 system I am migrating from an isakmpd.conf based configuration to an ipsec.conf based configuration. The tunnel comes up and works correctly when using isakmpd.conf but I can't get the tunnel to come up when

Re: Trouble getting ipsec.conf 'tag' working in 5.3

2013-06-11 Thread Rogier Krieger
a simple 'pass on enc0 tagged PBX' after that. If I was too optimistic or misunderstood ipsec.conf(5), a cluebat is more than welcome. If this is something that should work, I'll try with -current as well. Regards, Rogier # tcpdump -ni pflog0 -s1600 -eee -ttt -v Jun 11 13:36:47.049079 rule 0

Re: Trouble getting ipsec.conf 'tag' working in 5.3

2013-06-11 Thread mxb
table. I expected ipsec to automagically add the 'PBX' tag to traffic it gets handed (in this case, from $if_int) when that traffic fits its SAs. I further expected pf to need no more than a simple 'pass on enc0 tagged PBX' after that. If I was too optimistic or misunderstood ipsec.conf(5

Re: Trouble getting ipsec.conf 'tag' working in 5.3

2013-06-11 Thread Rogier Krieger
On Tue, Jun 11, 2013 at 3:26 PM, mxb m...@alumni.chalmers.se wrote: Tried to tag pkts on $int_if ? Eg match in on $if_int from ($if_int:network) to $pbx_net tag PBX Yes and that works. But shouldn't it already be covered by the 'PBX' tag in ipsec.conf? That's what I expected and what I'm

Re: Trouble getting ipsec.conf 'tag' working in 5.3

2013-06-11 Thread mxb
From ipsec.conf(5): … Add a pf(4) tag to all packets of phase 2 SAs created for this connection. … As I understand it, in your case or any other cases, it is about tagging pkts from one peer to another. Eg. from one vpn_gw to another. But this is my understanding of this. I might be wrong here

Trouble getting ipsec.conf 'tag' working in 5.3

2013-06-10 Thread Rogier Krieger
as expected, outbound traffic appears to be blocked on enc0. What bugs me is that the 'tag' and 'tagged' keywords do not seem to work as I'd expect from ipsec.conf(5). I created the SAs with the 'PBX' tag and would like to be so lazy as to just use: pass on enc keep state (if-bound) tagged PBX

Possible to use UFQDN for peer in ipsec.conf?

2012-09-16 Thread Brian Keefer
aes group modp2048 \ quick auth hmac-sha2-256 enc blowfish \ psk super secret string ipsecctl complains of a syntax error. If anyone has a link to an ipsec.conf that has an example of using UFQDNs to identify peers I would be eternally grateful. It seems nearly every example just

Defining two vpn's in ipsec.conf wich different crypto

2012-06-26 Thread sigge torsten
hi, I've setup a roadwarrior ipsec/l2tp (undeadly guide) that worked fine until I made some new rules in ipsec.conf in order to get a vpn-connection to a FreeBSD machine to work. My ipsec.conf looks like this. When connecting from a roadwarrior ip I still goes to the crypto that it supposed

Re: ipsec.conf ,routers and endpoints - third try

2012-05-09 Thread shadrock
to update the other side... hi stuart having reread your first post on the subject, i now realize when the address of one side changes it's the*other* side that needs to update remote_gw in ipsec.conf and restart. i was considering each end running a script which used ping to check connectivity

Re: ipsec.conf ,routers and endpoints - third try

2012-05-08 Thread Stuart Henderson
On 2012-05-08, shadrock shadr...@ntlworld.com wrote: hi stuart thanks for your answer and advice, i am working on a modified ddns update script to signal a restart of isakmpd when the dynamic ip changes, will implement isakmpd else will follow your suggestion and use openvpn for my net to

Re: ipsec.conf ,routers and endpoints - third try

2012-05-07 Thread shadrock
hi stuart thanks for your answer and advice, i am working on a modified ddns update script to signal a restart of isakmpd when the dynamic ip changes, will implement isakmpd else will follow your suggestion and use openvpn for my net to net link, i had already planned to use openvpn for my

Re: ipsec.conf ,routers and endpoints - third try

2012-05-05 Thread Stuart Henderson
On 2012-05-04, shadrock shadr...@ntlworld.com wrote: firewall dual homed network facing static nic address = 5.5.5.4 (rfc1918/rfc6598) virgin media router facing static nic address = 3.3.3.2 (rfc1918/rfc6598) virgin media router static address = 3.3.3.3 (rfc1918/rfc6598)

ipsec.conf ,routers and endpoints - third try

2012-05-04 Thread shadrock
-- network_a ipsec.conf # Macros local_gw= local_addr # External interface local_net = 5.5.5.0/24 # Local private network remote_gw = remote_addr # Remote IPsec gateway remote_nets = 7.7.7.0/24 # Remote private networks # Set up the VPN between the gateway machines ike esp from

Re: ipsec.conf ,routers and endpoints

2012-05-03 Thread Stuart Henderson
-- network_a ipsec.conf # Macros local_gw= local_addr# External interface local_net = 5.5.5.0/24 # Local private network remote_gw = remote_addr # Remote IPsec gateway remote_nets = 7.7.7.0/24# Remote private networks # Set up the VPN between the gateway machines

ipsec.conf ,routers and endpoints -- corrected

2012-05-03 Thread shadrock
for vpn passthrough network_a connects to firewall_a via a switch firewall_a connects to router_a via a switch router_a connects to virgin media cable -- network_a ipsec.conf # Macros local_gw= local_addr# External interface local_net = 5.5.5.0/24 # Local private network

ipsec.conf ,routers and endpoints

2012-05-02 Thread powell murlene
nic address = 4.4.4.2 virgin media router static address = 4.4.4.4 virgin media dynamic wan address = 2.2.2.2 both firewalls run ipsec both routers configured foe vpn passthrough -- network_a ipsec.conf # Macros local_gw= local_addr # External interface local_net

V5.0 - ipsec -- lifetime dependencies between ipsec.conf (ipsecctl) and isakmpd.conf

2012-04-11 Thread Andre Ruppert
Hello @misc, I'm lost in the documentation of isakmpd.conf and ipsec.conf :-( Situation: I have to set up several ipsec-connections on one system on my side (OBSD 5) to different sites with different VPN-hardware. All external sites offer only PSKs in configuration, no certificates. Problem

Re: V5.0 - ipsec -- lifetime dependencies between ipsec.conf (ipsecctl) and isakmpd.conf

2012-04-11 Thread Christian Weisgerber
Andre Ruppert a...@in-telegence.net wrote: is there any chance (perhaps in the future) to integrate lifetime parameters via ipsecctl -- ipsec.conf or will I be forced to keep on using isakmpd.conf? There is lifetime code in ipsecctl. I don't know if its absence from the man page

Re: V5.0 - ipsec -- lifetime dependencies between ipsec.conf (ipsecctl) and isakmpd.conf

2012-04-11 Thread Stuart Henderson
On 2012-04-11, Christian Weisgerber na...@mips.inka.de wrote: Andre Ruppert a...@in-telegence.net wrote: is there any chance (perhaps in the future) to integrate lifetime parameters via ipsecctl -- ipsec.conf or will I be forced to keep on using isakmpd.conf? There is lifetime code

Re: Manual IPsec setup with ipsec.conf

2012-04-05 Thread Jason McIntyre
On Thu, Apr 05, 2012 at 05:53:27AM +0530, Girish Venkatachalam wrote: Dear all, Such a silly thing is not documented anywhere, no vpn(8) man page and not on the Internet. Subject: Manual IPsec setup with ipsec.conf have you looked at the manual page for ipsec.conf? jmc

Re: Manual IPsec setup with ipsec.conf

2012-04-05 Thread Girish Venkatachalam
with ipsec.conf have you looked at the manual page for ipsec.conf? jmc Sorry I did not mean to antagonize. I did read the section. But an example would be a great addition. -Girish -- G3 Tech Networking appliance company web: http://g3tech.in mail: gir...@g3tech.in

Re: Manual IPsec setup with ipsec.conf

2012-04-05 Thread Jason McIntyre
and not on the Internet. Subject: Manual IPsec setup with ipsec.conf have you looked at the manual page for ipsec.conf? jmc Sorry I did not mean to antagonize. I did read the section. But an example would be a great addition. well, there are examples of both

Re: Manual IPsec setup with ipsec.conf

2012-04-05 Thread Jiri B
and not on the Internet. Subject: Manual IPsec setup with ipsec.conf have you looked at the manual page for ipsec.conf? jmc Sorry I did not mean to antagonize. I did read the section. But an example would be a great addition. Interesting, hasn't been somewhere

Re: Manual IPsec setup with ipsec.conf

2012-04-05 Thread Dewey Hylton
- Original Message - From: Girish Venkatachalam girishvenkatacha...@gmail.com To: OpenBSD general usage list misc@openbsd.org Sent: Wednesday, April 4, 2012 8:23:27 PM Subject: Manual IPsec setup with ipsec.conf Dear all, Such a silly thing is not documented anywhere, no vpn(8

Re: Manual IPsec setup with ipsec.conf

2012-04-05 Thread Aner Perez
On 04/04/2012 08:23 PM, Girish Venkatachalam wrote: # ipsecctl -sa -v FLOWS: flow esp in from 10.1.23.0/24 to 192.168.1.0/24 peer 173.167.82.52 type require flow esp out from 192.168.1.0/24 to 10.1.23.0/24 peer 173.167.82.52 type require flow esp in from 173.167.82.52 to 59.99.242.167 peer

Manual IPsec setup with ipsec.conf

2012-04-04 Thread Girish Venkatachalam
Dear all, Such a silly thing is not documented anywhere, no vpn(8) man page and not on the Internet. I am forced to send this mail though it is embarrassing having worked on the internals of manual IPsec keying back in 2004. But well here goes. on peer A: remoteip=173.167.82.52

troubleshooting shrew vpn client with ipsec.conf

2011-12-15 Thread nuffnough
I am converting over to ipsec.conf from isakmpd.conf|policy. I have a default vpn configuration to allow people from their home pc to access. Under isakmpd.conf it works perfectly well. I can use any number of settings, including the desired aes-256 for both phase 1 and phase 2. My

Re: troubleshooting shrew vpn client with ipsec.conf

2011-12-15 Thread Stuart Henderson
On 2011-12-15, nuffnough nuffno...@gmail.com wrote: ike dynamic from any to 10.10.10.0/24 \ try: ike passive esp from 10.10.10.0/24 to any

Re: troubleshooting shrew vpn client with ipsec.conf

2011-12-15 Thread Stuart Henderson
ps. ipsecctl -nvf /etc/ipsec.conf

need help converting to ipsec.conf

2011-11-20 Thread nuffnough
Hi, I am converting a bunch of VPNs from my isakmpd.[conf|policy] files to ipsec.conf mostly because it seems they're deprecated, but partly because I saw an old thread that spoke of functionality I want to explore. I figured I should work through them one by one. I got my own VPN from one

ipsec.conf macros

2011-11-14 Thread Jakob Alvermark
Hello! In transitioning from isakmpd.conf to ipsec.conf I want to make the configuration file simple and readable by using macros. However, I seems like I can not make use of macros in the way that I want. Example: host_a=192.168.1.1 host_b=192.168.2.2 host_list={ $host_a $host_b } host_a_copy

Re: Ipsec/NAT rules in ipsec.conf

2011-07-01 Thread Stuart Henderson
to a situation where we need access to customer's network from two internal networks. I added an ipsec rule identical to the working one with the different local net defition (se the ipsec.conf sample below) and discovered that only the second rule is actually applied. You can only have one ipsec.conf

Ipsec/NAT rules in ipsec.conf

2011-06-20 Thread Marko Viitanen
internal networks. I added an ipsec rule identical to the working one with the different local net defition (se the ipsec.conf sample below) and discovered that only the second rule is actually applied. ipsecctl -vvf /etc/ipsec.conf shows that both the rules are parsed without errors. ipsecctl

ipsecctl/ipsec.conf: number-only macros not dereferencing

2010-07-22 Thread jared r r spiegel
in 4.2/i386, number-only macros in ipsec.conf worked fine/parsed OK, syntax-wise: --- # cat test.conf cat = dog cow = $cat cat = 1234abc cow = $cat cat = 1234 cow = $cat # uname -msr; ipsecctl -nvvf ./test.conf OpenBSD 4.2 i386 cat = dog cow = dog cat = 1234abc cow = 1234abc cat = 1234 cow

Re: ipsecctl/ipsec.conf: number-only macros not dereferencing

2010-07-22 Thread jared r r spiegel
for what it's worth, pfctl in -current parses this situation fine, but ipsecctl does not: # cat cow.conf cow = 'moo' moo = $cow cow = '1234' moo = $cow cow = ' 1234 ' moo = $cow cow = '12a34' moo = $cow # ipsecctl -nvf ./cow.conf cow = moo moo = moo cow = 1234 ./cow.conf: 4: syntax error cow

Re: ipsecctl/ipsec.conf: number-only macros not dereferencing

2010-07-22 Thread Theo de Raadt
i went on and tested '-nvf ./cow.conf' in each of: bgpd, ldapd, ldpd, ospfd, relayd, ripd, snmpd, smtpd, ypldap. they all errored out only exactly on lines 4 and 6 m4(1) seems to parse the file fine though. assuming these are all supposed to be consistent, is pfctl/m4 the way

Re: ipsecctl/ipsec.conf: number-only macros not dereferencing

2010-07-22 Thread jared r r spiegel
On Thu, Jul 22, 2010 at 08:05:55PM -0600, Theo de Raadt wrote: i went on and tested '-nvf ./cow.conf' in each of: bgpd, ldapd, ldpd, ospfd, relayd, ripd, snmpd, smtpd, ypldap. they all errored out only exactly on lines 4 and 6 m4(1) seems to parse the file fine though.

Re: ipsecctl/ipsec.conf: number-only macros not dereferencing

2010-07-22 Thread jared r r spiegel
On Thu, Jul 22, 2010 at 07:43:55PM -0701, jared r r spiegel wrote: is this specific behaviour the way of the future or accidental? if it helps answer that, ipsecctl/parse.y r1.126 (first ipsecctl/parse.y of 4.2-current) is the first revision that all-number macros can't be used in

Re: ipsec.conf syntax

2010-06-08 Thread Jason McIntyre
and matching ingress flows by using the following ipsec.conf(5) file on bridge1: esp from 1.2.3.4 to 4.3.2.1 spi 0x4242:0x4243 \ authkey file auth1:auth2 enckey file enc1:enc2 flow esp proto etherip from 1.2.3.4 to 4.3.2.1 I was curious

ipsec.conf syntax

2010-06-07 Thread Russell Sutherland
I am trying to set up an ipsec bridge using the template and instructions found in the brconfig man page (OpenBSD 4.6): Create Security Associations (SAs) between the external IP address of each bridge and matching ingress flows by using the following ipsec.conf(5) file

ipsec.conf x509 ( was Re: /etc/ipsec.conf default peer psk/dstid mismatch)

2010-03-31 Thread a b
Hi, I hope someone on-list can give me a few helpful pointers in the right direction. I've setup certs as per X509 AUTHENTICATION section of the isakmpd man page. However it is a bit unclear as to what I need to put in ipsec.conf to make this work. I've tried a bit of Google trawling, however

/etc/ipsec.conf default peer psk/dstid mismatch

2010-03-30 Thread a b
dstid b...@example.com \ +psk another_very_long_and_complicated_key \ tag RoadRunner I am greeted with the following wise words : # ipsecctl -f /etc/ipsec.conf /etc/ipsec.conf: 50: default peer psk mismatch /etc/ipsec.conf: 50: default peer dstid mismatch Delete my newly added block and it's

Re: /etc/ipsec.conf default peer psk/dstid mismatch

2010-03-30 Thread Stuart Henderson
connections). to get a better understanding: try 'ipsecctl -nvf /etc/ipsec.conf' and compare the output with the two rules; notice which section the psk appears in and try setting an address with 'peer 1.1.1.1' instead of 'peer any' to see what happens.

Re: /etc/ipsec.conf default peer psk/dstid mismatch

2010-03-30 Thread a b
Thanks for the wise words Stuart.makes sense now ! Stuart Henderson wrote : you can only have one peer any configured. therefore if you want to have users connecting from unknown addresses, they must either use the same psk, or use keys instead.

IPSEC: trying to understand ipsec.conf(5)

2010-01-24 Thread Toni Mueller
Hi, I'm running an IPSEC setup using iskampd.conf + isakmpd.policy, and would like to move to using ipsec.conf instead. First off, I noticed that, if isakmpd is running w/o the '-K' switch, running 'ipsecctl -f somefile' results in a problem accessing /var/run/isakmpd.fifo, with a file does

Re: IPSEC: trying to understand ipsec.conf(5)

2010-01-24 Thread Toni Mueller
Hi, On Sun, 24.01.2010 at 17:47:22 +0100, Toni Mueller openbsd-m...@oeko.net wrote: First off, I noticed that, if isakmpd is running w/o the '-K' switch, running 'ipsecctl -f somefile' results in a problem accessing /var/run/isakmpd.fifo, with a file does not exist error. scratch that - this

Re: ipsec.conf ipsecctl isakmpd

2009-08-20 Thread Christopher Sean Hilton
On Aug 10, 2009, at 6:37 PM, Christopher Sean Hilton wrote: I have a couple of questions regarding setting up ipsec. I've read the 4 minutes page and modified the older setup to work with 2 OpenBSD 4.5 boxes. That's enough to get me going with an IPsec tunnel by IP addresses but one side

ipsec.conf ipsecctl isakmpd

2009-08-10 Thread Christopher Sean Hilton
I have a couple of questions regarding setting up ipsec. I've read the 4 minutes page and modified the older setup to work with 2 OpenBSD 4.5 boxes. That's enough to get me going with an IPsec tunnel by IP addresses but one side of my connection is a consumer grade DSL line which wants to

Re: ipsec.conf ipsecctl isakmpd

2009-08-10 Thread Mathieu Sauve-Frankel
On Mon, Aug 10, 2009 at 06:37:41PM -0400, Christopher Sean Hilton wrote: I have a couple of questions regarding setting up ipsec. I've read the 4 minutes page and modified the older setup to work with 2 OpenBSD 4.5 boxes. That's enough to get me going with an IPsec tunnel by IP addresses

ipsec.conf + RoadWarrior

2009-04-27 Thread Edvard Fagerholm
this would be done with ipsec.conf? I have previously configured a similar setup using isakmpd.conf, but the examples for ipsec.conf only seem to address cases where both ends have hostnames or IP addresses that are known. In this case I don't have any idea of the client (except the cert). Anyone

Re: ipsec.conf + RoadWarrior

2009-04-27 Thread Stuart Henderson
this would be done with ipsec.conf? I have previously configured a similar setup using isakmpd.conf, but the examples for ipsec.conf only seem to address cases where both ends have hostnames or IP addresses that are known. In this case I don't have any idea of the client (except

migrate from isakmpd.conf to ipsec.conf

2009-01-12 Thread Christoph Leser
I used to configure VPNs using isakmpd.conf, for 2 dozen VPNs, each with a hand crafted set of parameters ( encryption, hmac, key length etc. ). Now I tried to move this setup to ipsec.conf by spelling out the complete line for every VPN like this: ike active esp tunnel from a.b.c.d to e.f.g.h

isakmpd question (isakmpd.conf - ipsec.conf)

2008-09-20 Thread Toni Mueller
clients, but they have to have all the same configuration (ie, the least common denominator wins). Since people recommend using ipsec.conf, I wanted to transform this setup to using ipsec.conf. In my ipsec.conf, I have: myip=1.2.3.4 ike passive esp tunnel from $myip to any \ main auth hmac

Question about tags and ipsec.conf

2008-06-27 Thread Michiel van der Kraats
Hi list, I have a firewall using the - very elegant - ipsec.conf to build tunnels to various Cisco's, Watchguards and other OpenBSD machines. My /etc/ipsec.conf is autogenerated and contains lots of: # bla-bla.router.company.example - router for location bla-bla ike esp from 192.168.100.0/24

Re: ipsec.conf question

2008-05-06 Thread Claer
On Mon, May 05 2008 at 20:14, Prabhu Gurumurthy wrote: All, I have a question regarding ipsec.conf. Example: IPsec peers: 3.3.3.3, 3.3.3.2 Interesting traffic: 1.1.1.1 - 192.168.100.2 2.2.2.2 - 192.168.100.0/24 Main/Quick mode crypto/groups being: aes, sha1

ipsec.conf question

2008-05-05 Thread Prabhu Gurumurthy
All, I have a question regarding ipsec.conf. Example: IPsec peers: 3.3.3.3, 3.3.3.2 Interesting traffic: 1.1.1.1 - 192.168.100.2 2.2.2.2 - 192.168.100.0/24 Main/Quick mode crypto/groups being: aes, sha1 and group2 PSK being test123 How can I define the above concisely

ipsec.conf and ipsecctl

2008-02-25 Thread Michiel van der Kraats
Dear list, I have a firewall and an ipsec.conf with 42 ike esp connections: ike esp from 192.168.100.0/24 to 192.168.129.0/24 peer my.firewall \ main auth hmac-sha1 enc 3des group modp1024 \ quick auth hmac-sha1 enc 3des group modp1024 \ psk mekmitasdigoat tag yet.another.connection ISAkmpd

Re: Suggestion for ipsec.conf(5)

2008-02-11 Thread Jason McIntyre
On Sun, Feb 10, 2008 at 10:43:36PM +0100, Aurilien wrote: In the [manual flows] section of the ipsec.conf man page, the [type modifier] parameter doesn't explain require, use, acquire and dontacq modifiers. The explanation from the old ipsecadm(8) should be use: fixed now. thanks

Suggestion for ipsec.conf(5)

2008-02-10 Thread Aurélien
In the [manual flows] section of the ipsec.conf man page, the [type modifier] parameter doesn't explain require, use, acquire and dontacq modifiers. The explanation from the old ipsecadm(8) should be use: A use flow, specify that packets matching this flow should try to use IPsec if possible

ipsec.conf config for shrew.net client

2008-02-01 Thread Chris Cappuccio
does any have an example ipsec.conf config for a windows shrew.net ipsec client ? in particular, a roaming client? -- It is an old observation that the best writers sometimes disregard the rules of rhetoric. When they do, however, the reader will usually find in the sentence some compensating

ipsec.conf and AES 256

2007-11-19 Thread Mitja Muženič
As far as I can tell, currently in ipsec.conf there is no way to use AES with KEY_LENGHT=256. Is anybody working on adding this? Otherwise I might try it when the time permits. I'm thinking that isakmpd should first learn about a new default transform, let's say AES256 - then adding

Re: ipsec.conf and AES 256

2007-11-19 Thread Hans-Joerg Hoexer
On Mon, Nov 19, 2007 at 12:26:16PM +0100, Mitja Mu?eni? wrote: As far as I can tell, currently in ipsec.conf there is no way to use AES with KEY_LENGHT=256. Is anybody working on adding this? Otherwise I might try it when the time permits. I'm thinking that isakmpd should first learn about

Re: Hoe to specify multiple transform suites in ipsec.conf(5)

2007-10-30 Thread Damon McMahon
From: Heinrich Rebehn [EMAIL PROTECTED] Date: 29 October 2007 9:14:16 PM To: OpenBSD misc@openbsd.org Subject: Hoe to specify multiple transform suites in ipsec.conf(5) Hello list, I am trying to move my IPsec configuration from isakmpd.conf to ipsec.conf. However i cannot find a syntax

Re: Hoe to specify multiple transform suites in ipsec.conf(5)

2007-10-30 Thread Heinrich Rebehn
Damon McMahon wrote: From: Heinrich Rebehn [EMAIL PROTECTED] Date: 29 October 2007 9:14:16 PM To: OpenBSD misc@openbsd.org Subject: Hoe to specify multiple transform suites in ipsec.conf(5) Hello list, I am trying to move my IPsec configuration from isakmpd.conf to ipsec.conf. However i

Hoe to specify multiple transform suites in ipsec.conf(5)

2007-10-29 Thread Heinrich Rebehn
Hello list, I am trying to move my IPsec configuration from isakmpd.conf to ipsec.conf. However i cannot find a syntax to specify multiple transform suites with ipsec.conf I tried something like: ike passive esp from any to any quick enc {aes,3des} but it is rejected. I want something like

aes 256 in ipsec.conf ?

2007-09-19 Thread Christoph Leser
Hi, is AES 256 cipher supported in OBSD 4.1 ipsec implementation? If it is, how can I specify this as input to ipsecctl ( ipsec.conf )? regards Christoph

ipsec.conf - format of key specification

2007-09-13 Thread Jeff Simmons
What is the proper format for entering manual keys directly into the ipsec.conf file? Test file ipsec.test: esp from 10.0.0.1 to 10.0.1.1 \ spi 0x1011:0x1010 \ auth hmac-sha1 enc aes \ authkey 1234567890123456789012345678901234567890 \ enckey 12345678901234567890123456789012

Re: ipsec.conf - format of key specification

2007-09-13 Thread Stuart Henderson
On 2007/09/13 11:43, Jeff Simmons wrote: What is the proper format for entering manual keys directly into the ipsec.conf file? Test file ipsec.test: esp from 10.0.0.1 to 10.0.1.1 \ spi 0x1011:0x1010 \ auth hmac-sha1 enc aes \ authkey 1234567890123456789012345678901234567890

IPSEC.CONF with Dynamic IP address (parse HOST name) doesnt seem to work

2007-09-04 Thread * VLGroup Forums
(a python program) it keeps the DynDns.org DNS servers up-to-date when a IP change occurs. So far, so good. I was hoping to simply use the DynDns host name in the IPSEC.CONF file, but that doesnt seem to work :-(( . For this mail I changed the name to remote5.dyndns.org. The real name pings ok can Ii

Re: IPSEC.CONF with Dynamic IP address (parse HOST name) doesnt seem to work

2007-09-04 Thread Hans-Joerg Hoexer
was hoping to simply use the DynDns host name in the IPSEC.CONF file, but that doesnt seem to work :-(( . For this mail I changed the name to remote5.dyndns.org. The real name pings ok can Ii can use it to SSH into the machine. # # IPSEC to remote location 5 # Active host, remote location

ipsec.conf/ipsecctl interop with Windows XP

2007-09-04 Thread Dan Brosemer
Has anyone got ipsec.conf/ipsecctl to interop with Windows XP? I had this working flawlessly with my isakmpd.conf, but rather like the new syntax and want to switch. I have it to the point of giving me this message when I start isakmpd with '-K -d -vvv' 090413.992346 Default isakmpd: phase 1

  1   2   >