On Fri, Nov 24, 2006 at 12:38:46AM -0600, Albert Chin wrote:
> On Thu, Nov 23, 2006 at 08:21:33AM -0600, Albert Chin wrote:
> > I'm trying to connect an FC5 laptop behind a firewall to an OpenBSD
> > 4.0 VPN server running isakmpd. I already have things working with
> > Openswan but would like to get it working with racoon for our Mac OS
> > clients.
> > 
> > The OpenBSD /etc/ipsec.conf config:
> >   ike passive esp from 192.168.1.0/24 to 192.168.6.0/24 \
> >     main auth hmac-sha1 enc aes group modp1024 \
> >     quick auth hmac-sha1 enc aes \
> >     srcid [vpn server FQDN] dstid [FC5 laptop FQDN]
> > 
> > ...
> > 
> > Am I getting the sainfo section wrong in racoon.conf? With the sainfo
> > section, do I still need setkey?
> 
> I've made some more changes but still cannot get it working. Looks
> like I do need to use setkey. I modified the OpenBSD /etc/ipsec.conf
> to:
>   ike passive esp from 192.168.10.0/24 to any \
>     main auth hmac-sha1 enc aes group modp1024 \
>     quick auth hmac-sha1 enc aes \
>     srcid vpn-server.thewrittenword.com dstid [EMAIL PROTECTED]
> 
> and racoon.conf:
>   remote 67.95.107.100 {
>     exchange_mode main;
>     my_identifier user_fqdn "[EMAIL PROTECTED]";
>     peers_identifier fqdn "vpn-server.thewrittenword.com";
>     certificate_type x509 "[EMAIL PROTECTED]" 
> "/etc/ipsec.d/private/local.key";
>     ca_type x509 "/etc/ipsec.d/cacerts/ca.crt";
> 
>     nat_traversal on;
> 
>     proposal {
>       encryption_algorithm aes;
>       hash_algorithm sha1;
>       dh_group modp1024;
>       authentication_method rsasig;
>     }
>   }
> 
>   sainfo anonymous {
>     pfs_group 2;
>     encryption_algorithm aes, 3des, blowfish;
>     authentication_algorithm hmac_sha256, hmac_sha1, hmac_md5;
>     compression_algorithm deflate;
>   }
> 
> and /etc/racoon/ipsec.conf:
>   flush;
>   spdflush;
> 
>   spdadd -4 192.168.6.1 192.168.10.0/24 any -P out ipsec
>     esp/tunnel/192.168.6.1-67.95.107.100/require;
>   spdadd -4 192.168.10.0/24 192.168.6.1 any -P  in ipsec
>     esp/tunnel/67.95.107.100-192.168.6.1/require;

Ok, this actually does work. On Linux, the SAs don't get authenticated
until after you issue a network connection to the remote end. Ugh! So,
with the above, "ping 192.168.10.13" x2 gets past Phase 2.

-- 
albert chin ([EMAIL PROTECTED])

Reply via email to