from ::0/0 to ::0/0 \
local egress peer any \
psk "X" \
config address 172.24.24.0/24 \
config address 2001:470:8c78:a0::/64 \
config name-server 172.24.24.1 \
config name-server 2001:470:8c78:a0:: \
tag "vpn" tap enc0
Many thanks for the pointer!
--
Aram Hăvărneanu
_flags=-6
unbound_flags=
--
Aram Hăvărneanu
Hello,
I am trying to set-up an dual-stack IKEv2/IPsec VPN. The server is
OpenBSD (obviously). The clients are macs (so far). IPv4 works, but
I can't get IPv6 working for the clients. The clients get a v6 IP
and a good route, but it seems routing doesn't work on OpenBSD's
side.
I am using an /48
wm0 up
> ifconfig trunk0 trunkport iwm0
Thanks, this works!
For the record, this is my config now:
$ cat /etc/hostname.em0
up
$ cat /etc/hostname.iwm0
nwid
wpakey
up
$ cat /etc/hostname.trunk0
trunkproto failover trunkport iwm0 trunkport em0
-trunkport iwm0
!/sbin/ifconfig iwm0 up
tr
ge.us/SDaD
Is it my fault? How can I debug this further? Thanks.
[1] http://www.openbsd.org/faq/faq6.html#Wireless
--
Aram Hăvărneanu
operation.
OpenBSD is not like this, the hardware claimed supported is actually
supported. All the people suggesting emulators remember this.
--
Aram Hăvărneanu
On Mon, Feb 22, 2010 at 3:51 PM, Aram HDvDrneanu wrote:
> EAL4 is meaningless. The auditor is not required to view the software
> in any way (binary or source). Any vendor with money can get its OS to
> be certified at least at EAL 4 because all that means is that the OS
> has some mechanisms in
EAL4 is meaningless. The auditor is not required to view the software
in any way (binary or source). Any vendor with money can get its OS to
be certified at least at EAL 4 because all that means is that the OS
has some mechanisms in place for implementing security. It does not
guarantee that those
8 matches
Mail list logo