I am attaching a diff to the isakmpd.conf man page that I hope clarifies using 
certificate based authentication.  I found the information in the archives, and 
I thought they might be better documented in the man page.  

I believe the changes to be correct, but please do not take my word on it as I 
am new to IPSec.

l8rZ,
-- 
andrew - ICQ# 253198 - JID: [EMAIL PROTECTED]
     Proud member: http://www.mad-techies.org

BOFH excuse of the day: boss forgot system password
--- isakmpd.conf.5.orig Mon Aug 15 11:24:10 2005
+++ isakmpd.conf.5      Mon Aug 15 12:22:53 2005
@@ -886,12 +886,13 @@
 # Incoming phase 1 negotiations are multiplexed on the source IP address
 [Phase 1]
 10.1.0.1=              ISAKMP-peer-west
+10.1.0.3=              ISAKMP-peer-north
 
 # These connections are walked over after config file parsing and told
 # to the application layer so that it will inform us when traffic wants to
 # pass over them.  This means we can do on-demand keying.
 [Phase 2]
-Connections=           IPsec-east-west
+Connections=           IPsec-east-west,IPsec-east-north
 
 # Default values are commented out.
 [ISAKMP-peer-west]
@@ -905,6 +906,20 @@
 Authentication=                mekmitasdigoat
 #Flags=
 
+# This connection uses certifiates, it assumes you have generated a valid 
+# certificate from your "Private-key", that includes the "subjectAltName" 
+# as used in the ID-east section and placed it in the "Cert-directory".
+[ISAKMP-peer-north]
+Phase=                 1
+#Transport=            udp
+Local-address=         10.1.0.2
+Address=               10.1.0.3
+#Port=                 isakmp
+#Port=                 500
+Configuration=         RSA_SIG-phase-1-configuration
+ID=                                    ID-east
+#Flags=
+
 [IPsec-east-west]
 Phase=                 2
 ISAKMP-peer=           ISAKMP-peer-west
@@ -929,6 +944,19 @@
 EXCHANGE_TYPE=         QUICK_MODE
 Suites=                        
QM-ESP-3DES-SHA-PFS-SUITE,QM-ESP-AES-SHA-PFS-SUITE
 
+# Phase 1 description (Main Mode) using AUTHENTICATION_METHOD= RSA_SIG 
+# RSA_SIG is needed when using certificates for authentication
+
+[RSA_SIG-phase-1-configuration]
+EXCHANGE_TYPE=         ID_PROT
+Transforms=            3DES-SHA-RSA_SIG
+
+# The values here are what would be used by default in this configuration
+# if an ID was not specified in the ISAKMP-peer-north section.
+[ID-east]
+ID-type=                       IPV4_ADDR
+Address=                       10.1.0.2
+
 # Data for an IKE mode-config peer
 [asn1_dn//C=SE/L=SomeCity/O=SomeCompany/CN=SomePeer.company.com]
 Address=               192.168.1.123
@@ -983,6 +1011,13 @@
 GROUP_DESCRIPTION=     MODP_1024
 Life=                  Default-phase-1-lifetime
 
+[DES-MD5-RSA_SIG]
+ENCRYPTION_ALGORITHM=  DES_CBC
+HASH_ALGORITHM=                MD5
+AUTHENTICATION_METHOD= RSA_SIG
+GROUP_DESCRIPTION=     MODP_1024
+Life=                  Default-phase-1-lifetime
+
 [DES-SHA]
 ENCRYPTION_ALGORITHM=  DES_CBC
 HASH_ALGORITHM=                SHA
@@ -990,6 +1025,13 @@
 GROUP_DESCRIPTION=     MODP_1024
 Life=                  Default-phase-1-lifetime
 
+[DES-SHA-RSA_SIG]
+ENCRYPTION_ALGORITHM=  DES_CBC
+HASH_ALGORITHM=                SHA
+AUTHENTICATION_METHOD= RSA_SIG
+GROUP_DESCRIPTION=     MODP_1024
+Life=                  Default-phase-1-lifetime
+
 # 3DES
 
 [3DES-SHA]
@@ -999,6 +1041,13 @@
 GROUP_DESCRIPTION=     MODP_1024
 Life=                  Default-phase-1-lifetime
 
+[3DES-SHA-RSA_SIG]
+ENCRYPTION_ALGORITHM=  3DES_CBC
+HASH_ALGORITHM=                SHA
+AUTHENTICATION_METHOD= RSA_SIG
+GROUP_DESCRIPTION=     MODP_1024
+Life=                  Default-phase-1-lifetime
+
 # Blowfish
 
 [BLF-SHA]
@@ -1006,6 +1055,14 @@
 KEY_LENGTH=            128,96:192
 HASH_ALGORITHM=                SHA
 AUTHENTICATION_METHOD= PRE_SHARED
+GROUP_DESCRIPTION=     MODP_1024
+Life=                  Default-phase-1-lifetime
+
+[BLF-SHA-RSA_SIG]
+ENCRYPTION_ALGORITHM=  BLOWFISH_CBC
+KEY_LENGTH=            128,96:192
+HASH_ALGORITHM=                SHA
+AUTHENTICATION_METHOD= RSA_SIG
 GROUP_DESCRIPTION=     MODP_1024
 Life=                  Default-phase-1-lifetime

Reply via email to