Victor Sudakov <v...@sibptus.ru> wrote:
> Michael Grimm wrote:

First of all, I'd like to thank all of you for your input, which helped a lot.

>> I am running ipsec-tools to implement a VPN tunnel (esp) between two hosts 
>> for years now.
>> 
>> But this statement on http://ipsec-tools.sourceforge.net makes me think 
>> about an alternative:
>>      The development of ipsec-tools has been ABANDONED. 
>>      ipsec-tools has security issues, and you should not use it. Please 
>> switch to a secure alternative! 
>> 
>> Could you provide me with links where I could find more details about the 
>> above mentioned 'security issues'? I want to find out, if my specific setup 
>> has security issues at all. Thanks.

Well, now I do know that security patches have been applied to 
security/ipsec-tools. Thus one can ignore "Please switch to a secure 
alternative!"

>> What would be a secure alternative if one is needed? 
>>      #) security/racoon2
>>      #) security/strongswan
>>      #) something else?
> 
> There was also security/isakmpd but is marked as BROKEN now.
> 
> I've been told that strongswan works on FreeBSD. I've tried installing
> strongswan, but it looks too complex and tricky in comparison with
> racoon.
> 
> If you ever find good documentation/howto  for strongswan on FreeBSD,
> please share with me.

Sorry, but I never tried strongswan as a replacement, mainly due to the reasons 
you mentioned as well: I couldn't get it running. Thus I used racoon instead.

Kurt mentioned wireguard. I could get the tunnel running, but I failed in 
getting the routing at both sites running (in my preliminary tests).

Then this mail made my day:

>> What do I need?
>>      #) a VPN tunnel between two hosts
>>      #) both local networks reachable from the remote host
> 
> That is what kernel IPSec is for, you can even do it on static keys
> without any ISAKMP daemon like racoon. See an example in if_ipsec(4).

I did install my IPSEC/racoon tunnel many years ago and missed the recent 
implementation of if_ipsec completely. 

Victor, thank you very, very much for pointing me to this interface. Now, my 
tunnel is far less complicated to implement[1], and I will no longer need 
security/ipsec-tools at all! 

[1] Following if_ipsec(4) and 
https://github.com/opnsense/core/issues/2332#issuecomment-379181820, because 
the example with "right" and "left" notation helped to understand if_ipsec(4) 
better (for me).

Thanks and regards,
Michael 


_______________________________________________
freebsd-ports@freebsd.org mailing list
https://lists.freebsd.org/mailman/listinfo/freebsd-ports
To unsubscribe, send any mail to "freebsd-ports-unsubscr...@freebsd.org"

Reply via email to