Wow, thanks for this... For some reason I always thought that anything VPN 
related would require a rooted Android phone to mess with interfaces and 
routing, but clearly it doesn't.
It took about 10 minutes to read https://www.openbsd.org/faq/faq17.html and 
configure a successful IKEv2 connection from strongSwan on the phone to the 
router.

One more thing, how do I know what IP address my client has gotten? 
`ipsecctl(8) -vsa` doesn't show that, and iked(8) output in /var/log/daemon 
doesn't either. Right now I'm pinging my router from my phone and tcpdump-ing 
the enc0 interface for icmp packets :)


Dani

‐‐‐‐‐‐‐ Original Message ‐‐‐‐‐‐‐
On Monday, 1 July 2019 19:34, Stuart Henderson <s...@spacehopper.org> wrote:

> On 2019-06-30, Lévai Dániel l...@ecentrum.hu wrote:
>
> > I know (saw) this has come up numerous times, and someone has been 
> > successful, others weren't. I thought I'd try this out myself, and not 
> > surprisingly it wasn't successful :)
> > I've been using these howtos [1] -- I know these can be outdated and/or 
> > simply wrong, I just wanted to get the general idea on how to tackle this.
> > I've made it through a couple of hurdles but now I'm stuck and thought I'd 
> > ask some questions here.
>
> L2TP+IPsec can be made to work, but to be perfectly honest, unless you
> have a special reason (e.g. need to run this on a box which is also
> doing other tunnels which have to be IKEv1), then I would switch to
> IKEv2/iked and strongswan on Android (or the built-in client on Windows
> or iOS), it is fast to connect and generally much more pleasant to use...
>
> (I still use IKEv1/isakmpd for lan-to-lan tunnels but now try to avoid
> it for standard "roaming client" type connections).


Attachment: publickey - leva@ecentrum.hu - 0x66E1F716.asc
Description: application/pgp-keys

Reply via email to