Rickard Borgmäster wrote:
 > I've established a tunnel between my home FreeBSD host and a corporate
 > OpenBSD firewall.

IPsec tunnel I assume?

 > I can see this at OpenBSD box:
 > # netstat -rn
 > [...]
 > Port  Destination        Port  Proto SA(Address/Proto/Type/Direction)
 > 192.168.2/24       0     10.0.0/24          0     0
 > 130.236.218.63/50/use/in 10.0.0/24          0     192.168.2/24 
0
 > 0     130.236.218.63/50/require/out
 >
 > However, on the FreeBSD side, netstat -rn won't show anything about
 > 10.0.0.0/24. Maybe Encap routes won't show in the ordinary routing table
 > on FreeBSD?

It looks like the OpenBSD IPsec implementation integrates IPsec tunnel 
mode SAs with the routing table (good!) FreeBSD's KAME doesn't (yet; 
more recent KAME SNAPs have "device sec" which looks promising).

 > From either the OpenBSD or FreeBSD box, I am unable to reach the private
 > net behind the other IPSec node. Ie, from FreeBSD box, I cannot reach
 > 10.0.0.0/24. And from OpenBSD box, I cannot reach 192.168.2.0/24.

I bet your boxes pick the wrong source address when you generate packets 
on them to go to the other net, because you don't have any interfaces 
configured on these nets (IPsec SAs aren't interfaces, at least on 
FreeBSD). Try tcpdumping and tell me what you get.

Lars
-- 
Lars Eggert <[EMAIL PROTECTED]>               Information Sciences Institute
http://www.isi.edu/larse/              University of Southern California

Attachment: smime.p7s
Description: S/MIME Cryptographic Signature

Reply via email to