Dennis Pedersen (trm) writes:
> 
> Uhm, you can also use a email add and a password
> [EMAIL PROTECTED]        thekeything
> There are a bit about certificates in a kame newsletter, try looking on the
> site :)
> 
> How did you solve the setkey setup if the ip adress is dynamic, do you have
> an example?

        That's the problem.

        See:

        
http://www.google.com/url?sa=U&start=1&q=http://archives.neohapsis.com/archives/freebsd/2000-12/0009.html&e=922

        Normally, you use SPDUPDATE messages to the kernel to update the security
        policy.

        o Client side -- normally you would use this in the CLIENT racoon.conf:

-----8<-----8<-----8<-----8<-----8<-----8<-----8<-----8<-----8<-----8<----- 
remote IP.OF.MY.OFFICE-GW
{
        [...]
        my_identifier address;
-----8<-----8<-----8<-----8<-----8<-----8<-----8<-----8<-----8<-----8<----- 


        ... to identify yourself using your IP address.  Since it's dynamic,
        we use this instead:

my_identifier user_fqdn "[EMAIL PROTECTED]" ;

        (could also be an X.509 ASN.1 identifier with a certificate payload
        -- haven't tried it yet with racoon...)

        o On the office GW:

        In psk.txt, you add:

[EMAIL PROTECTED]    MyPreSharedKeySecret

        Then in the racoon.conf, you define a remote anonymous as follows:

-----8<-----8<-----8<-----8<-----8<-----8<-----8<-----8<-----8<-----8<----- 
remote anonymous {
        [...]

    passive on;
        generate_policy on;
    my_identifier address;
-----8<-----8<-----8<-----8<-----8<-----8<-----8<-----8<-----8<-----8<----- 

        Idea: the passive on tells the office GW to listen to requests and
        never initiate negotiation.  Perfect since you don't know the IP address
        in advance.

        generate_policy is there to fix that: it will generate a policy (SP)
        in the SPD dynamically if it the authentication info + PSK (pre shared
        key) or cert ID matches -- as racoon.conf(5) says:

generate_policy (on | off);
         This directive is for the responder.  Therefore you
         should set passive on in order that racoon(8) only
         becomes a responder.  If the responder does not have any
         policy in SPD during phase 2 negotiation, and the direc-
         tive is set on, then racoon(8) will choice the first pro-
         posal in the SA payload from the initiator, and generate
         policy entries from the proposal.  It is useful to nego-
         tiate with the client which is allocated IP address
         dynamically.


        Unfortunately, this doesn't work.

        Running racoon -F you will see the server (GW) side complain
        with something in the form (don't have it in front of me):

X_SPDUPDATE: no such file or directory

        ... and after a short while the phase 1 will time out, with no
        phase 2 negotiated.

        And that's it :(   So it looks like KAME either doesn't fully implement
        this or racoon doesn't -- I'm not really sure which, and haven't
        had time to try with isakmpd yet (ports/net/isakmpd).

        Any ideas ?


To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-net" in the body of the message

Reply via email to