On 2019-01-10, Daniel Ouellet <dan...@presscom.net> wrote:
>> OpenBSD's implementation of ipsec doesn't use the routing table, if you
>> want that (unless you make code changes) you will need to use a
>> different tunnel interface (gif or others) and just use ipsec to protect
>> the gif traffic.
>
> The point is to keep the configuration simple and gif doesn't make it
> so. But when the source is with changing IP's often it end up not being
> very possible is it...
>
> So not really an option.
>
> May be time to check wireguard instead then. But not having it into the
> kernel or fully mature yet on OpenBSD is also limiting.

Or OpenVPN, or openconnect/ocserv, or ssh vpn, or strongswan, or [...]

>> Sounds like you want bypass flows for 66.63.44.96/27 <> 66.63.44.64/27.
>> IIRC you can still use ipsecctl/ipsec.conf to configure them even
>> with iked running (the only bypass flows iked will add itself are the
>> automatic "mess with v6 traffic" ones, there's no iked.conf way to do
>> this flexibly).
>
> The point of ikev2 was to keep things simple and light. Doing the full
> ipsec even doable is really a real pain in the butts.

ikev2 is full ipsec.

Maybe you misunderstood - I am just talking about a couple of lines in
ipsec.conf to setup the bypass flow, but still use iked for the
actual vpn connection.


Reply via email to