On Sun, Aug 16, 2015 at 11:28:24PM +0300, Or Elimelech wrote:
> Hello misc,
> 
> Has anyone connected successfully between the new OS X ikev2 impl. To an 
> OpenBSD box?
> 
> Thanks in advance.
> 

I got the official update and I successfully connected from El Capitan
to OSX.  I did it without using profiles, just with the GUI in network
settings.

ON OPENBSD:

- Get -current from yesterday (small fix went in)

- Configure an IP on enc0 directly (eg. 10.2.0.2 in this case), a dns
cache, forwarding, PF etc.

- Configure iked.conf, for example:

user "user1" "password123"
ikev2 "ios9" passive esp \
       from 0.0.0.0/0 to 0.0.0.0/0 \
       local any peer any \
       childsa enc 3des \
       eap "mschap-v2" \
       config address 10.2.0.1/24 \
       config name-server 10.2.0.2 \
       tag "$name-$id"

- Yes, 3DES. As you see in your log, El Capitan currently only accepts
3DES by default.  You can probably change it with the external
security profiles program.  iOS9 uses AES-128 instead.

ON OSX:

- Use "ikectl ca" (or other CA tool) to create ca, keys and certs for
the gateway and peers.  I recommend to use FQDNs for the certs.

- Install the ca.pfx and $CERT.pfx on OSX from keychain (import
objects). Trust the CA for EAP and IPsec.

- I tested different options in OSX, user-based, "without" auth + shared
secret, "without" auth + certificate.  Certificate-based auth doesn't
work since it is two factor EAP-TLS.  User-based is EAP-MSCHAPv2.
Select the installed certificate. 

In summary, the GUI part is very easy but certificate configuration is
a bit difficult.  It's the same complexity as in Windows.  But much
better compared to earlier IPsec configurations.

Reyk

Reply via email to