From owner-freebsd-net@freebsd.org Sun May 13 00:05:01 2018 Return-Path: Delivered-To: freebsd-net@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id A66C7FD8DA9 for ; Sun, 13 May 2018 00:05:01 +0000 (UTC) (envelope-from bu7cher@yandex.ru) Received: from forward101o.mail.yandex.net (forward101o.mail.yandex.net [IPv6:2a02:6b8:0:1a2d::601]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "forwards.mail.yandex.net", Issuer "Yandex CA" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 173CC6DEA0 for ; Sun, 13 May 2018 00:05:00 +0000 (UTC) (envelope-from bu7cher@yandex.ru) Received: from mxback3o.mail.yandex.net (mxback3o.mail.yandex.net [IPv6:2a02:6b8:0:1a2d::1d]) by forward101o.mail.yandex.net (Yandex) with ESMTP id 933BC1344263; Sun, 13 May 2018 03:04:50 +0300 (MSK) Received: from smtp1j.mail.yandex.net (smtp1j.mail.yandex.net [2a02:6b8:0:801::ab]) by mxback3o.mail.yandex.net (nwsmtp/Yandex) with ESMTP id 5akQOS91Pn-4o5GkTCG; Sun, 13 May 2018 03:04:50 +0300 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yandex.ru; s=mail; t=1526169890; bh=eGMZyDb77Tq2MiAelyBAGK9gKvP5+qDEemYOlf+PG8o=; h=Subject:To:References:From:Message-ID:Date:In-Reply-To; b=pxf6hJPQpkCVkgYf/M3GWmQWyVtN5j9Zo+2vwC5MxqHhWie+mcPu5YC0aShJLumgr JA+Zh3Aq7xT2nDxXmhbfsWHJEswLj0JEOIEhdsmMPda2y56DjPe+YRKZjrZ4kmsZMU 5/6qYersKz5GaVt6TKdlOi/6DwTc11sBj2jAp5iY= Received: by smtp1j.mail.yandex.net (nwsmtp/Yandex) with ESMTPSA id 63c8bMwQQz-4nwecLoj; Sun, 13 May 2018 03:04:50 +0300 (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (Client certificate not present) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yandex.ru; s=mail; t=1526169890; bh=eGMZyDb77Tq2MiAelyBAGK9gKvP5+qDEemYOlf+PG8o=; h=Subject:To:References:From:Message-ID:Date:In-Reply-To; b=pxf6hJPQpkCVkgYf/M3GWmQWyVtN5j9Zo+2vwC5MxqHhWie+mcPu5YC0aShJLumgr JA+Zh3Aq7xT2nDxXmhbfsWHJEswLj0JEOIEhdsmMPda2y56DjPe+YRKZjrZ4kmsZMU 5/6qYersKz5GaVt6TKdlOi/6DwTc11sBj2jAp5iY= Authentication-Results: smtp1j.mail.yandex.net; dkim=pass header.i=@yandex.ru Subject: Re: Site-to-site IPSec VPN using if_ipsec and racoon To: Andreas Scherrer , freebsd-net@freebsd.org References: <951ef6f6-95d8-8832-1e7a-59fc90434029@gmail.com> From: "Andrey V. Elsukov" Openpgp: id=E6591E1B41DA1516F0C9BC0001C5EA0410C8A17A Autocrypt: addr=bu7cher@yandex.ru; prefer-encrypt=mutual; keydata= xsBNBEwBF1kBCADB9sXFhBEUy8qQ4X63Y8eBatYMHGEFWN9ypS5lI3RE6qQW2EYbxNk7qUC5 21YIIS1mMFVBEfvR7J9uc7yaYgFCEb6Sce1RSO4ULN2mRKGHP3/Sl0ijZEjWHV91hY1YTHEF ZW/0GYinDf56sYpDDehaBF5wkWIo1+QK5nmj3vl0DIDCMNd7QEiWpyLVwECgLX2eOAXByT8B bCqVhJGcG6iFP7/B9Ll6uX5gb8thM9LM+ibwErDBVDGiOgvfxqidab7fdkh893IBCXa82H9N CNwnEtcgzh+BSKK5BgvPohFMgRwjti37TSxwLu63QejRGbZWSz3OK3jMOoF63tCgn7FvABEB AAHNIkFuZHJleSBWLiBFbHN1a292IDxhZUBmcmVlYnNkLm9yZz7CwHsEEwECACUCGwMGCwkI BwMCBhUIAgkKCwQWAgMBAh4BAheABQJMB/ruAhkBAAoJEAHF6gQQyKF6MLwH/3Ri/TZl9uo0 SepYWXOnxL6EaDVXDA+dLb1eLKC4PRBBjX29ttQ0KaWapiE6y5/AfzOPmRtHLrHYHjd/aiHX GMLHcYRXD+5GvdkK8iMALrZ28X0JXyuuZa8rAxWIWmCbYHNSBy2unqWgTI04Erodk90IALgM 9JeHN9sFqTM6zalrMnTzlcmel4kcjT3lyYw3vOKgoYLtsLhKZSbJoVVVlvRlGBpHFJI5AoYJ SyfXoN0rcX6k9X7Isp2K50YjqxV4v78xluh1puhwZyC0p8IShPrmrp9Oy9JkMX90o6UAXdGU KfdExJuGJfUZOFBTtNIMNIAKfMTjhpRhxONIr0emxxDOwE0ETAEXWQEIAJ2p6l9LBoqdH/0J PEFDY2t2gTvAuzz+8zs3R03dFuHcNbOwjvWCG0aOmVpAzkRa8egn5JB4sZaFUtKPYJEQ1Iu+ LUBwgvtXf4vWpzC67zs2dDuiW4LamH5p6xkTD61aHR7mCB3bg2TUjrDWn2Jt44cvoYxj3dz4 S49U1rc9ZPgD5axCNv45j72tggWlZvpefThP7xT1OlNTUqye2gAwQravXpZkl5JG4eOqJVIU X316iE3qso0iXRUtO7OseBf0PiVmk+wCahdreHOeOxK5jMhYkPKVn7z1sZiB7W2H2TojbmcK HZC22sz7Z/H36Lhg1+/RCnGzdEcjGc8oFHXHCxUAEQEAAcLAXwQYAQIACQUCTAEXWQIbDAAK CRABxeoEEMihegkYCAC3ivGYNe2taNm/4Nx5GPdzuaAJGKWksV+w9mo7dQvU+NmI2az5w8vw 98OmX7G0OV9snxMW+6cyNqBrVFTu33VVNzz9pnqNCHxGvj5dL5ltP160JV2zw2bUwJBYsgYQ WfyJJIM7l3gv5ZS3DGqaGIm9gOK1ANxfrR5PgPzvI9VxDhlr2juEVMZYAqPLEJe+SSxbwLoz BcFCNdDAyXcaAzXsx/E02YWm1hIWNRxanAe7Vlg7OL+gvLpdtrYCMg28PNqKNyrQ87LQ49O9 50IIZDOtNFeR0FGucjcLPdS9PiEqCoH7/waJxWp6ydJ+g4OYRBYNM0EmMgy1N85JJrV1mi5i Message-ID: <9a64e1e8-2258-379e-9ed0-4c8d8bf0aea9@yandex.ru> Date: Sun, 13 May 2018 03:02:03 +0300 User-Agent: Mozilla/5.0 (X11; FreeBSD amd64; rv:52.0) Gecko/20100101 Thunderbird/52.6.0 MIME-Version: 1.0 In-Reply-To: <951ef6f6-95d8-8832-1e7a-59fc90434029@gmail.com> Content-Type: multipart/signed; micalg=pgp-sha256; protocol="application/pgp-signature"; boundary="9qSeq07FszvTv7OdCj7mlhNBzLtuVXFCf" X-BeenThere: freebsd-net@freebsd.org X-Mailman-Version: 2.1.25 Precedence: list List-Id: Networking and TCP/IP with FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sun, 13 May 2018 00:05:01 -0000 This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --9qSeq07FszvTv7OdCj7mlhNBzLtuVXFCf Content-Type: multipart/mixed; boundary="NlR6NQ6ZtYCqrgXh0aLvtjxZ1uzHrkhyN"; protected-headers="v1" From: "Andrey V. Elsukov" To: Andreas Scherrer , freebsd-net@freebsd.org Message-ID: <9a64e1e8-2258-379e-9ed0-4c8d8bf0aea9@yandex.ru> Subject: Re: Site-to-site IPSec VPN using if_ipsec and racoon References: <951ef6f6-95d8-8832-1e7a-59fc90434029@gmail.com> In-Reply-To: <951ef6f6-95d8-8832-1e7a-59fc90434029@gmail.com> --NlR6NQ6ZtYCqrgXh0aLvtjxZ1uzHrkhyN Content-Type: text/plain; charset=utf-8 Content-Language: en-US Content-Transfer-Encoding: quoted-printable On 13.05.2018 02:37, Andreas Scherrer wrote: > My interpretation of [2]'s statement: >=20 > "If no security association is found, the packet is put on hold and the= > IKE daemon is asked to negotiate an appropriate one." >=20 > is that it should somehow be automagic. But in my current configuration= , > that does not happen. I never see FreeBSD initiate any IKE traffic > (500/udp) and 'setkey -D' always reports "No SAD entries.". Hi, You need to run racoon in debug mode and then, I think, you will see how ACQUIRE happens, and why it doesn't work. > Can anybody point me in the right direction (be it more documentation o= r > a working config example)? That would be awesome. Recently there was the discussion about it, and a config that worked for one tunnel was published: https://lists.freebsd.org/pipermail/freebsd-net/2018-April/050271.html You can read the entire topic to get additional info. > Best regards > andreas >=20 > Ps.: I have tried the "old" approach which I know better using 'gif' > interfaces. With that I have managed to get racoon negotiate SAs for th= e > same tunnel (i.e. with libreswan on the RPi). Unfortunately I cannot > wrap my head around the routing with that approach (no 'gif' on > Raspbian). And the documentation also mentions this as a limitation of > 'gif' [3]: "you cannot usually use gif to talk with IPsec devices that > use IPsec tunnel mode" You can use gif+IPsec in transport mode from one side, and IPsec device with tunnel mode from other side. Technically this is the same. But I don't know how hard configure this using IKE. --=20 WBR, Andrey V. Elsukov --NlR6NQ6ZtYCqrgXh0aLvtjxZ1uzHrkhyN-- --9qSeq07FszvTv7OdCj7mlhNBzLtuVXFCf Content-Type: application/pgp-signature; name="signature.asc" Content-Description: OpenPGP digital signature Content-Disposition: attachment; filename="signature.asc" -----BEGIN PGP SIGNATURE----- Comment: Using GnuPG with Thunderbird - http://www.enigmail.net/ iQEzBAEBCAAdFiEE5lkeG0HaFRbwybwAAcXqBBDIoXoFAlr3gHsACgkQAcXqBBDI oXpOkAf9GTM242c7O30GU4KPZ4yHM7zWuw6bUzE76m46UEk2xa5G7379G6hEnFmV rTLmeIjZhL6l8/Vy/ikxJAl1DDLbEN5ACiEh7YkvFYc2hP28xldh7w+bJ539Aevo BMoUoM5r5dnf74IU7rXONtGYFez77GGhgst1t4yufS0u4Cadqrpsquk7yDMjYQWi BbdvGdEOD7scfsnxznCftOSSdnyhHiBbFOC9z3yBsx2jYDnO4TE1/XaJh6CQFCUe 717vemY4FIuvIkjRliRNzgDheeSc7lGBOq9l2JRp2isGmc/GdzVJR91eSnHwxVP1 tKvMvAoDpsclI4/ZJK5/KPw5tR4dVg== =VBpB -----END PGP SIGNATURE----- --9qSeq07FszvTv7OdCj7mlhNBzLtuVXFCf--