Hi list,

I have a firewall using the - very elegant - ipsec.conf to build tunnels to various Cisco's, Watchguards and other OpenBSD machines. My /etc/ipsec.conf is autogenerated and contains lots of:

# bla-bla.router.company.example - router for location bla-bla
ike esp from 192.168.100.0/24 to 192.168.145.0/24 peer xxx.xxx.xxx.xxx \
main auth hmac-sha1 enc 3des group modp1024 \
quick auth hmac-sha1 enc 3des group modp1024 \
psk "IWouldLoveTheGoatThankYouVeryMuch" tag "bla-bla.router.company.example"

To identify the packets belonging to a particular VPN we assign a tag to each connection corresponding to its location name. Recently I had an IP address of a location change so I modified the IP address in ipsec.conf, carefully checked with -n and reloaded. This did not cause a new SA to be created to the new IP address. After much head-scratching I eventually changed the tag to something else and the tunnel was created right away. I thought tags were just tacked onto a packet by PF to facilitate further internal handling but apparently there is more to it than that. Is this by design and am I missing some important point about either ipsec.conf or tagging? (or states?) On a related note, it would be nice to have had a -K flow switch for ipsecctl to delete specific flows. But I imagine there is a good reason for its absence due to the change of requiring -k to show secret keying material. IPSec on this firewall has been absolutely rock-solid by the way, about 60 flows using a mix of 3DES and AES. Much better than the fancy Watchguard box that it replaced.

--
Michiel van der Kraats

Reply via email to