On Sun, Aug 16, 2015 at 11:28:24PM +0300, Or Elimelech wrote: > Hello misc, > > Has anyone connected successfully between the new OS X ikev2 impl. To an > OpenBSD box? > > Thanks in advance. >
I got the official update and I successfully connected from El Capitan to OSX. I did it without using profiles, just with the GUI in network settings. ON OPENBSD: - Get -current from yesterday (small fix went in) - Configure an IP on enc0 directly (eg. 10.2.0.2 in this case), a dns cache, forwarding, PF etc. - Configure iked.conf, for example: user "user1" "password123" ikev2 "ios9" passive esp \ from 0.0.0.0/0 to 0.0.0.0/0 \ local any peer any \ childsa enc 3des \ eap "mschap-v2" \ config address 10.2.0.1/24 \ config name-server 10.2.0.2 \ tag "$name-$id" - Yes, 3DES. As you see in your log, El Capitan currently only accepts 3DES by default. You can probably change it with the external security profiles program. iOS9 uses AES-128 instead. ON OSX: - Use "ikectl ca" (or other CA tool) to create ca, keys and certs for the gateway and peers. I recommend to use FQDNs for the certs. - Install the ca.pfx and $CERT.pfx on OSX from keychain (import objects). Trust the CA for EAP and IPsec. - I tested different options in OSX, user-based, "without" auth + shared secret, "without" auth + certificate. Certificate-based auth doesn't work since it is two factor EAP-TLS. User-based is EAP-MSCHAPv2. Select the installed certificate. In summary, the GUI part is very easy but certificate configuration is a bit difficult. It's the same complexity as in Windows. But much better compared to earlier IPsec configurations. Reyk