----- Original Message -----
> From: "Girish Venkatachalam" <girishvenkatacha...@gmail.com>
> To: "OpenBSD general usage list" <misc@openbsd.org>
> Sent: Wednesday, April 4, 2012 8:23:27 PM
> Subject: Manual IPsec setup with ipsec.conf
> 
> Dear all,
> 
> Such a silly thing is not documented anywhere, no vpn(8) man page and
>  not on the Internet.
> 
> I am forced to send this mail though it is embarrassing having worked
> on the
>  internals of manual IPsec keying back in 2004. But well here goes.
> 
> on peer A:
> 
> remoteip="173.167.82.52"
> remotenet="10.1.23.0/24"
> 
> flow esp from 59.99.242.167 to $remoteip
> flow esp from 192.168.1.0/24 to $remotenet peer $remoteip
> esp from 59.99.242.167 to $remoteip spi 0xdeadbeef:0xbeefdead auth
> hmac-sha1 \
>        authkey
>        0xeda8f06463b2d0fed008ccc474216dba8c463a7c:0x91c763de940ce1745215c84b7
> 535269acaef516d
>        \
>        enckey
>        0xb341aa065c3850edd6a61e150d6a5fd3:0xf7795f6bdd697a43a4d28dcf1b79062d
> 
> on peer B:
> 
> localnet="192.168.0.0/16"
> remoteip="59.99.242.167"
> 
> flow esp from 173.167.82.52 to 59.99.242.167
> flow esp from 10.1.23.0/24 to 192.168.1.0/24 peer $remoteip
> esp from 173.167.82.52 to 59.99.242.167 spi 0xbeefdead:0xdeadbeef
> auth
> hmac-sha1 \
>        authkey
>        0x91c763de940ce1745215c84b7535269acaef516d:0xeda8f06463b2d0fed008ccc47
> 4216dba8c463a7c
>        \
>        enckey
>        0xf7795f6bdd697a43a4d28dcf1b79062d:0xb341aa065c3850edd6a61e150d6a5fd3
> 
> 
> It is a test. I don't care about the keys and IP addresses.
> 
> pf(4) is disabled both sides and here is the output of
> 
> #ipsecctl -sa on peer B
> 
> # ipsecctl -sa -v
> FLOWS:
> flow esp in from 192.168.1.0/24 to 10.1.23.0/24 peer 59.99.242.167
> type
> require
> flow esp out from 10.1.23.0/24 to 192.168.1.0/24 peer 59.99.242.167
> type
> require
> flow esp in from 59.99.242.167 to 173.167.82.52 peer 59.99.242.167
> type
> require
> flow esp out from 173.167.82.52 to 59.99.242.167 peer 59.99.242.167
> type
> require
> 
> SAD:
> esp tunnel from 173.167.82.52 to 59.99.242.167 spi 0xbeefdead auth
> hmac-sha1 enc aes
>         sa: spi 0xbeefdead auth hmac-sha1 enc aes
>                 state mature replay 0 flags 4
>         lifetime_cur: alloc 0 bytes 0 add 1333585323 first 0
>         address_src: 173.167.82.52
>         address_dst: 59.99.242.167
> esp tunnel from 59.99.242.167 to 173.167.82.52 spi 0xdeadbeef auth
> hmac-sha1 enc aes
>         sa: spi 0xdeadbeef auth hmac-sha1 enc aes
>                 state mature replay 0 flags 4
>         lifetime_cur: alloc 0 bytes 0 add 1333585323 first 0
>         address_src: 59.99.242.167
>         address_dst: 173.167.82.52
> 
> And peer A:
> 
> # ipsecctl -sa -v
> FLOWS:
> flow esp in from 10.1.23.0/24 to 192.168.1.0/24 peer 173.167.82.52
> type
> require
> flow esp out from 192.168.1.0/24 to 10.1.23.0/24 peer 173.167.82.52
> type
> require
> flow esp in from 173.167.82.52 to 59.99.242.167 peer 173.167.82.52
> type
> require
> flow esp out from 59.99.242.167 to 173.167.82.52 peer 173.167.82.52
> type
> require
> 
> SAD:
> esp tunnel from 173.167.82.52 to 59.99.242.167 spi 0xbeefdead auth
> hmac-sha1 enc aes
>         sa: spi 0xbeefdead auth hmac-sha1 enc aes
>                 state mature replay 0 flags 4
>         lifetime_cur: alloc 0 bytes 0 add 1333585275 first 0
>         address_src: 173.167.82.52
>         address_dst: 59.99.242.167
> esp tunnel from 59.99.242.167 to 173.167.82.52 spi 0xdeadbeef auth
> hmac-sha1 enc aes
>         sa: spi 0xdeadbeef auth hmac-sha1 enc aes
>                 state mature replay 0 flags 4
>         lifetime_cur: alloc 0 bytes 196 add 1333585275 first
>         1333585277
>         address_src: 59.99.242.167
>         address_dst: 173.167.82.52
>         lifetime_lastuse: alloc 0 bytes 0 add 0 first 1333585277
> 
> I cannot ping between 192.168.1.50 and 10.1.23.2
> 
> What is going on?
> 
> -Girish
> 
> --
> G3 Tech
> Networking appliance company
> web: http://g3tech.in  mail: gir...@g3tech.in

two very basic questions, both of which have bitten me at some point:

1) is ip forwarding enabled on both boxes?
2) do you have the appropriate routes setup on both sides?

Reply via email to