Date: 06 Aug 2002 21:49:42 -0400 From: Brian McDonald <brianmcd@columbus.rr.com> To: Julian Elischer <julian@elischer.org> Cc: net@FreeBSD.ORG Subject: Re: racoon and transport mode... Message-ID: <1028684984.73196.17.camel@nivomede.internal.lustygrapes.net> In-Reply-To: <Pine.BSF.4.21.0208061820330.65715-100000@InterJet.elischer.org> References: <Pine.BSF.4.21.0208061820330.65715-100000@InterJet.elischer.org>
next in thread | previous in thread | raw e-mail | index | archive | help
IKE works over UDP port 500, using it's own crypto for authentication of the remote peer. Once they've decided they like each other, they can exchange a key and use the kernel interfaces to install it in the IPSEC stack and allow ESP or AH traffic. Brian On Tue, 2002-08-06 at 21:27, Julian Elischer wrote: > > I am probably confused here but is it > possible to use IKE via racoon on a tranport mode ipsec > connection? > > > how does racoon communicate across the transport connection > to set the key if there is no key to start with..? > > (seems like a catch 22, and I certainly can't make it work here..) > > > > > To Unsubscribe: send mail to majordomo@FreeBSD.org > with "unsubscribe freebsd-net" in the body of the message -- Brian McDonald CCNA(tm) Certified Tandemedia, Inc. http://www.tandemedia.com/ To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-net" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?1028684984.73196.17.camel>