Date: Sun, 21 Jul 2002 01:16:18 +0100 From: "chris scott" <chris.scott@uk.tiscali.com> To: <freebsd-questions@freebsd.org>, <freebsd-security@freebsd.org> Subject: roaming ipsec policies and racoon Message-ID: <008501c2304c$59fbd800$a4102c0a@viper>
next in thread | raw e-mail | index | archive | help
This is a multi-part message in MIME format. ------=_NextPart_000_0082_01C23054.373A02D0 Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable Hi, I am currently trying playing with IPSEC and racoon to provide a secure = services for my users. They all use either freebsd or windows 2k/XP = clients. They unfortunately all have dynamic ips 8(. I have successfully = configured the ipsec policies and have got round the dynamic IP problem = with the freebsd clients by using racoons peer and my identifier = features to initiate the shared key communication. This all works fine. = However I don't know how to do the same thing with windows 2000/XP. I = can setup the ipsec policies on the clients easily enough, as I can the = preshared key. I have no idea how to set the identifiers though. Without = this racoon doesn't match a key on the psk.txt file as it uses the hosts = ip rather than whatever@this.com and hence fails the key exchange. Has = anyone got any clues to point me in the correct direction? sample og the severs racoon conf remote anonymous { #exchange_mode main,aggressive; exchange_mode aggressive,main; doi ipsec_doi; situation identity_only; #my_identifier address; my_identifier user_fqdn "random@wirdo.com"; peers_identifier user_fqdn "grebbit@wolly.com"; #certificate_type x509 "mycert" "mypriv"; nonce_size 16; lifetime time 1 hour; # sec,min,hour initial_contact on; support_mip6 on; proposal_check obey; # obey, strict or claim proposal { encryption_algorithm 3des; hash_algorithm sha1; authentication_method pre_shared_key ; dh_group 2 ; } } corresponding psk entry grebbit@wolly.com myrandomkey sample of freebsd clients racoon config remote anonymous { #exchange_mode main,aggressive; exchange_mode aggressive,main; doi ipsec_doi; situation identity_only; #my_identifier address; my_identifier user_fqdn grebbit@wolly.com; peers_identifier user_fqdn "random@wirdo.com"; #certificate_type x509 "mycert" "mypriv"; nonce_size 16; lifetime time 1 hour; # sec,min,hour initial_contact on; support_mip6 on; proposal_check obey; # obey, strict or claim proposal { encryption_algorithm 3des; hash_algorithm sha1; authentication_method pre_shared_key ; dh_group 2 ; } } regards Chris Scott IMPORTANT NOTICE: This email may be confidential, may be legally privileged, and is for = the intended recipient only. Access, disclosure, copying, distribution, or reliance on any of it by anyone else is prohibited and may be a criminal offence. Please delete if obtained in error and email confirmation to = the sender. ------=_NextPart_000_0082_01C23054.373A02D0 Content-Type: text/html; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN"> <HTML><HEAD> <META http-equiv=3DContent-Type content=3D"text/html; = charset=3Diso-8859-1"> <META content=3D"MSHTML 6.00.2716.2200" name=3DGENERATOR> <STYLE></STYLE> </HEAD> <BODY bgColor=3D#ffffff> <DIV><FONT face=3DArial size=3D2>Hi,</FONT></DIV> <DIV><FONT face=3DArial size=3D2></FONT> </DIV> <DIV><FONT face=3DArial size=3D2>I am currently trying playing with = IPSEC and racoon=20 to provide a secure services for my users. They all use either freebsd = or=20 windows 2k/XP clients. They unfortunately all have dynamic ips 8(. I = have=20 successfully configured the ipsec policies and have got round the = dynamic IP=20 problem with the freebsd clients by using racoons peer and my = identifier features to initiate the shared key = communication.=20 This all works fine. However I don't know how to do the same thing with = windows=20 2000/XP. I can setup the ipsec policies on the clients easily enough, as = I can=20 the preshared key. I have no idea how to set the identifiers though. = Without=20 this racoon doesn't match a key on the psk.txt file as it uses the hosts = ip=20 rather than <A = href=3D"mailto:whatever@this.com">whatever@this.com</A> and=20 hence fails the key exchange. Has anyone got any clues to point me in = the=20 correct direction?</FONT></DIV> <DIV><FONT face=3DArial size=3D2></FONT> </DIV> <DIV><FONT face=3DArial size=3D2>sample og the severs racoon = conf</FONT></DIV> <DIV><FONT face=3DArial size=3D2></FONT> </DIV> <DIV><FONT face=3DArial size=3D2>remote=20 anonymous<BR>{<BR> = #exchange_mode=20 main,aggressive;<BR> = exchange_mode=20 aggressive,main;<BR> doi=20 ipsec_doi;<BR> situation=20 identity_only;</FONT></DIV> <DIV><FONT face=3DArial size=3D2></FONT> </DIV> <DIV><FONT face=3DArial = size=3D2> =20 #my_identifier address;<BR> =20 my_identifier user_fqdn "random<A=20 href=3D"mailto:random@wirdo.com">@wirdo.com</A>";<BR> &n= bsp; =20 peers_identifier user_fqdn "grebbit@wolly<A=20 href=3D"mailto:ardvark@antheaven.com">.com</A>";<BR> &nb= sp; =20 #certificate_type x509 "mycert" "mypriv";</FONT></DIV> <DIV><FONT face=3DArial size=3D2></FONT> </DIV> <DIV><FONT face=3DArial = size=3D2> =20 nonce_size 16;<BR> lifetime = time 1=20 hour; # = sec,min,hour<BR> =20 initial_contact on;<BR> = support_mip6=20 on;<BR> proposal_check=20 obey; # obey, strict or claim</FONT></DIV> <DIV><FONT face=3DArial size=3D2></FONT> </DIV> <DIV><FONT face=3DArial = size=3D2> proposal=20 {<BR> &n= bsp; =20 encryption_algorithm=20 3des;<BR> &nbs= p; =20 hash_algorithm=20 sha1;<BR> &nbs= p; =20 authentication_method pre_shared_key=20 ;<BR> &n= bsp; =20 dh_group 2 ;<BR> = }<BR>}</FONT></DIV> <DIV><FONT face=3DArial size=3D2></FONT> </DIV> <DIV><FONT face=3DArial size=3D2>corresponding psk entry</FONT></DIV> <DIV><FONT face=3DArial size=3D2>grebbit@wolly<A=20 href=3D"mailto:ardvark@antheaven.com">.com</A> myrandomkey</FONT></D= IV> <DIV><FONT face=3DArial size=3D2></FONT> </DIV> <DIV><FONT face=3DArial size=3D2></FONT> </DIV> <DIV><FONT face=3DArial size=3D2>sample of freebsd clients racoon=20 config</FONT></DIV> <DIV><FONT face=3DArial size=3D2></FONT> </DIV> <DIV><FONT face=3DArial size=3D2>remote=20 anonymous<BR>{<BR> = #exchange_mode=20 main,aggressive;<BR> = exchange_mode=20 aggressive,main;<BR> doi=20 ipsec_doi;<BR> situation=20 identity_only;</FONT></DIV> <DIV><FONT face=3DArial size=3D2></FONT> </DIV> <DIV><FONT face=3DArial = size=3D2> =20 #my_identifier address;<BR> =20 my_identifier user_fqdn <A = href=3D"mailto:grebbit@wolly.com">grebbit@wolly<A=20 href=3D"mailto:ardvark@antheaven.com">.com</A></A>;<BR> = =20 peers_identifier user_fqdn "random<A=20 href=3D"mailto:random@wirdo.com">@wirdo.com</A>";<BR> &n= bsp; =20 #certificate_type x509 "mycert" "mypriv";</FONT></DIV> <DIV><FONT face=3DArial size=3D2></FONT> </DIV> <DIV><FONT face=3DArial = size=3D2> =20 nonce_size 16;<BR> lifetime = time 1=20 hour; # = sec,min,hour<BR> =20 initial_contact on;<BR> = support_mip6=20 on;<BR> proposal_check=20 obey; # obey, strict or claim</FONT></DIV> <DIV><FONT face=3DArial size=3D2></FONT> </DIV> <DIV><FONT face=3DArial = size=3D2> proposal=20 {<BR> &n= bsp; =20 encryption_algorithm=20 3des;<BR> &nbs= p; =20 hash_algorithm=20 sha1;<BR> &nbs= p; =20 authentication_method pre_shared_key=20 ;<BR> &n= bsp; =20 dh_group 2 ;<BR> = }<BR>}</FONT></DIV> <DIV><FONT face=3DArial size=3D2></FONT> </DIV> <DIV><FONT face=3DArial size=3D2></FONT> </DIV> <DIV><FONT face=3DArial size=3D2></FONT> </DIV> <DIV><FONT face=3DArial size=3D2></FONT> </DIV> <DIV><FONT face=3DArial size=3D2></FONT> </DIV> <DIV><FONT face=3DArial size=3D2></FONT> </DIV> <DIV><FONT face=3DArial size=3D2></FONT> </DIV> <DIV><FONT face=3DArial size=3D2></FONT> </DIV> <DIV><FONT face=3DArial size=3D2></FONT> </DIV> <DIV><FONT face=3DArial size=3D2></FONT> </DIV> <DIV><FONT face=3DArial size=3D2>regards</FONT></DIV> <DIV><FONT face=3DArial size=3D2></FONT> </DIV><FONT face=3DArial = size=3D2> <DIV><BR>Chris Scott<BR></DIV> <DIV><BR>IMPORTANT NOTICE:<BR>This email may be confidential, may be = legally=20 privileged, and is for the<BR>intended recipient only. Access, = disclosure,=20 copying, distribution, or<BR>reliance on any of it by anyone else is = prohibited=20 and may be a criminal<BR>offence. Please delete if obtained in = error and=20 email confirmation to the<BR>sender.</FONT></DIV></BODY></HTML> ------=_NextPart_000_0082_01C23054.373A02D0-- To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-questions" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?008501c2304c$59fbd800$a4102c0a>