On Tue, Oct 28, 2014 at 09:49:58AM -0400, I wrote:
> On 2014-10-28 08:09, Vincent Gross wrote:
[snip]
> >I had the very same issue on my own setup. I did not investigate the
> >source, but I think there is a bug in the code that handles PSK authn,
> >because it worked perfectly fine when I switched to RSA key authn.
> 
> Thank you, Vincent.  I will return to simple certificate testing.

I have re-tested with RSA keys and certificates.  This time, I 
was successful ... perhaps because the lab machines are clean
snapshots; prior cert testing was on living systems.

As you reported, removing "psk <key>" from the configurations and
using the RSA keys worked!  Thank you!

I do have further testing to do for my use case, now that I have a 
successful esp tunnel established.  One of the things I have discovered 
in early testing is that using "proto <protocol>" works syntactically, 
but the Flows are still unrestricted by protocol.  e.g.:

ikev2 a2b proto udp from a.lab to b.lab 

results in (wrapped for Email):

ikev2 "a2b" passive esp proto 17 inet from 10.0.0.1 to 10.0.0.2 local 
10.0.0.1 peer 10.0.0.2 ikesa enc aes-256,aes-192,aes-128,3des prf 
hmac-sha2-256,hmac-sha1,hmac-md5 auth hmac-sha2-256,hmac-sha1,hmac-md5 
group modp2048-256,modp2048,modp1536,modp1024 childsa enc aes-256,
aes-192,aes-128 auth hmac-sha2-256,hmac-sha1 lifetime 10800 bytes 
536870912 rsa

But the flows are not established by protocol. All traffic is
encapsulated.

Encap:
Source             Port  Destination        Port  Proto 
SA(Address/Proto/Type/Direction)
10.0.0.2/32        0     10.0.0.1/32        0     0     10.0.0.2/esp/use/in
10.0.0.1/32        0     10.0.0.2/32        0     0     10.0.0.2/esp/require/out
default                            0     default                            0   
  0     none/esp/deny/out

It looks like this is similar to what sthen@ mentioned in 

http://marc.info/?l=openbsd-misc&m=140879041225874&w=2

Reply via email to