Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 1 Aug 2018 15:15:36 +0200
From:      Christian Mauderer <christian.mauderer@embedded-brains.de>
To:        freebsd-hackers@freebsd.org
Subject:   Configuration for IPSec Loop-Back Test
Message-ID:  <20127f75-c6d6-463e-046f-3844502f3da9@embedded-brains.de>

next in thread | raw e-mail | index | archive | help
Hello,

I'm working on a port for IPSec and ipsec-tools (racoon, setkey,
libipsec) to an embedded operating system (RTEMS). RTEMS uses the
FreeBSD network stack via a compatibility layer (rtems-libbsd).

I can already create a IPSec connection on some real hardware with some
real peer. To prevent regression in a future version, I would like to
add a test that would check that the port still works. That test would
have to run on a system _without_ a real hardware peer. Therefore I
would like to create some IPSec loop back connection. In that case
racoon would have to talk to itself because I currently only support one
instance.

Do you have any hints how I could create such a network?

My current thought would be something along a virtual network device
(maybe tun?) that can be connected to some other virtual network device
via for example a bridge device. Maybe I could then try to configure two
gif-devices that would use this tunnel. racoon would have to listen on
both devices (maybe on different ports).

Currently I have trouble setting this up. Are there any simpler ideas
for an IPSec loop back connection that would use most of the stack layers=
?

Thanks in advance for every answer.

With kind regards

Christian Mauderer



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20127f75-c6d6-463e-046f-3844502f3da9>