On 2024-05-30, Radek <r...@int.pl> wrote:
> Thank you all for your replies. 
>
> Actually, I did not know that providing seamless switching VPN solutions is 
> so problematic. If it can't be done in a simple way, then it doesn't have to 
> be seamless at any cost. Users will manually reconnect to this VPN when CARP 
> does switchover and there will be no drama. 
>
> I am currently using IPSEC/L2TP, but I do not insist on switching to 
> wireguard. IPSEC/L2TP simply works smoothly on win10/11/mac. About 2020 I 
> switched IKEv2 to IPSEC/L2TP when my CA certificate expired and I couldn't 
> cope with updating it to get a VPN back to work. It was a pandemic, and 
> everybody worked remotely. Then I quickly switched IKEv2 to IPSEC/L2TP to 
> allow users to work remotely again, and so it remains to this day. Maybe it's 
> time to replace IPSEC/L2TP with other/newer VPN solution - on the occasion of 
> CARP deployment.

IKEv2 with certs signed by a publically trusted CA is fairly easy
to work with on the client side. The server side is a bit fiddly on
OpenBSD; iked can send the necessary intermediate certs now but it's not
obvious which file they need to go in (and I forgot the details..)

> I also need to assign to users static IP addresses per user - if I remember 
> that IKEv2 assigned to users random addresses from the entire VPN pool and I 
> couldn't cope with IP/user assignment. 

IKEv2 certainly can, it depends on the software. The in-tree
version of iked doesn't have a way to do it yet, but the patches at
https://marc.info/?l=openbsd-tech&m=170895540813042&w=2 allow doing that
via RADIUS config.


Reply via email to