Skip site navigation (1)Skip section navigation (2)
Date:      Sun, 21 Jul 2002 19:48:47 +0100
From:      "chris scott" <chris.scott@uk.tiscali.com>
To:        "John Howie" <JHowie@msn.com>, <admin@gbinetwork.com>, <freebsd-questions@freebsd.org>, <freebsd-security@freebsd.org>
Subject:   Re: roaming ipsec policies and racoon
Message-ID:  <001001c230e7$3f22f770$a4102c0a@viper>
References:  <DAEF28A9E7214B46AE7C7C66861F6308DF88@STKSRV1.securitytoolkit.com>

next in thread | previous in thread | raw e-mail | index | archive | help
thanks for all the advice, looks like a much bigger job than I inteneded 8(
If only MS gave us the openness of bsd, the whole thing would be so much
simpler
----- Original Message -----
From: "John Howie" <JHowie@msn.com>
To: "'chris scott'" <chris.scott@uk.tiscali.com>; <admin@gbinetwork.com>
Sent: Sunday, July 21, 2002 6:44 PM
Subject: RE: roaming ipsec policies and racoon


> Folks,
>
> Windows 2000 Server & Advanced Server come with Certificate Services.
> You can create either an Enterprise CA (integrated with AD) or a
> Standalone CA. When using a Standalone CA you can create your own Root
> CA self-signed certificate during the installation process (the
> Enterprise CA always issues itself a Root CA self-signed certificate).
>
> John
>
> P.S. I didn't post this back to the list - you may want to, though.
>
> -----Original Message-----
> From: owner-freebsd-security@FreeBSD.ORG
> [mailto:owner-freebsd-security@FreeBSD.ORG] On Behalf Of chris scott
> Sent: Saturday, July 20, 2002 5:35 PM
> To: admin@gbinetwork.com
> Cc: freebsd-security@FreeBSD.ORG; freebsd-questions@FreeBSD.ORG
> Subject: Re: roaming ipsec policies and racoon
>
> yes it does I believe. I have not looked into this ye thought, does this
> mean I have to have a proper one from an authority that will cost me and
> arm
> and a leg?
>
> ----- Original Message -----
> From: "James Bristle" <admin@gbinetwork.com>
> To: <chris.scott@uk.tiscali.com>
> Sent: Sunday, July 21, 2002 1:24 AM
> Subject: Re: roaming ipsec policies and racoon
>
>
> > does windows support certs ?
> >
> >
> > > Hi,
> > >
> > > I am currently trying playing with IPSEC and racoon to provide a
> secure
> > > services for my users. They all use either freebsd or windows 2k/XP
> > > clients. They unfortunately all have dynamic ips 8(. I have
> > > successfully configured the ipsec policies and have got round the
> > > dynamic IP problem with the freebsd clients by using  racoons peer
> and
> > > my identifier  features to initiate the shared key communication.
> This
> > > all works fine. However I don't know how to do the same thing with
> > > windows 2000/XP. I can setup the ipsec policies on the clients
> easily
> > > enough, as I can the preshared key. I have no idea how to set the
> > > identifiers though. Without this racoon doesn't match a key on the
> > > psk.txt file as it uses the hosts ip rather than whatever@this.com
> and
> > > hence fails the key exchange. Has anyone got any clues to point me
> in
> > > the correct direction?
> > >
> > > sample og the severs racoon conf
> > >
> > > remote anonymous
> > > {
> > >        #exchange_mode main,aggressive;
> > >        exchange_mode aggressive,main;
> > >        doi ipsec_doi;
> > >        situation identity_only;
> > >
> > >        #my_identifier address;
> > >        my_identifier user_fqdn "random@wirdo.com";
> > >        peers_identifier user_fqdn "grebbit@wolly.com";
> > >        #certificate_type x509 "mycert" "mypriv";
> > >
> > >        nonce_size 16;
> > >        lifetime time 1 hour;   # sec,min,hour
> > >        initial_contact on;
> > >        support_mip6 on;
> > >        proposal_check obey;    # obey, strict or claim
> > >
> > >        proposal {
> > >                encryption_algorithm 3des;
> > >                hash_algorithm sha1;
> > >                authentication_method pre_shared_key ;
> > >                dh_group 2 ;
> > >        }
> > > }
> > >
> > > corresponding psk entry
> > > grebbit@wolly.com myrandomkey
> > >
> > >
> > > sample of freebsd clients racoon config
> > >
> > > remote anonymous
> > > {
> > >        #exchange_mode main,aggressive;
> > >        exchange_mode aggressive,main;
> > >        doi ipsec_doi;
> > >        situation identity_only;
> > >
> > >        #my_identifier address;
> > >        my_identifier user_fqdn grebbit@wolly.com;
> > >        peers_identifier user_fqdn "random@wirdo.com";
> > >        #certificate_type x509 "mycert" "mypriv";
> > >
> > >        nonce_size 16;
> > >        lifetime time 1 hour;   # sec,min,hour
> > >        initial_contact on;
> > >        support_mip6 on;
> > >        proposal_check obey;    # obey, strict or claim
> > >
> > >        proposal {
> > >                encryption_algorithm 3des;
> > >                hash_algorithm sha1;
> > >                authentication_method pre_shared_key ;
> > >                dh_group 2 ;
> > >        }
> > > }
> > >
> > >
> > >
> > >
> > >
> > >
> > >
> > >
> > >
> > >
> > > regards
> > >
> > >
> > > Chris Scott
> > >
> > >
> > > IMPORTANT NOTICE:
> > > This email may be confidential, may be legally privileged, and is
> for
> > > the intended recipient only.  Access, disclosure, copying,
> > > distribution, or reliance on any of it by anyone else is prohibited
> and
> > > may be a criminal offence.  Please delete if obtained in error and
> > > email confirmation to the sender.
> >
> >
> >
> >
> >
> >
>
>
>
> To Unsubscribe: send mail to majordomo@FreeBSD.org
> with "unsubscribe freebsd-security" in the body of the message
>
>
>
>



To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-questions" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?001001c230e7$3f22f770$a4102c0a>