From owner-freebsd-questions Sun Mar 11 3:30:25 2001 Delivered-To: freebsd-questions@freebsd.org Received: from bugs.elitsat.net (bugs.elitsat.net [209.239.78.230]) by hub.freebsd.org (Postfix) with ESMTP id 5809837B719 for ; Sun, 11 Mar 2001 03:30:01 -0800 (PST) (envelope-from amour@bugs.elitsat.net) Received: from localhost (amour@localhost) by bugs.elitsat.net (8.11.1/8.11.1) with ESMTP id f2BBTl500690 for ; Sun, 11 Mar 2001 13:29:50 +0200 (EET) (envelope-from amour@bugs.elitsat.net) Date: Sun, 11 Mar 2001 13:29:45 +0200 (EET) From: Alexander To: freebsd-questions@freebsd.org Subject: IPSEC Message-ID: MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII Sender: owner-freebsd-questions@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.ORG What is the usual way to create tunnel between 2 gateways ? I've read some howtos that I found on some bsd sites and there is said about encrypting already made tunnel but nowhere is said how to create that tunnel ? (like brining up tun0 devices) I also found howto about pipsecd but it doesn't work. Somehow when I compile "options IPSEC" in the kernel the pipsecd doesn't want to run. It tells me that it can't get SOCK_RAW And when I remove IPSEC from the kernel it doesn't work propertly. I configure both sides of the tunnel and run pipsecd and it tells me that hmac authorization failed. (and the configs on both sides are correct, keys are correct, I took them from a working howto) I also read about making tunnel using ppp and encrypting it with ssh but it sux. There should be other way because there is alot of howtos about IPSEC and the pipsecd and ppp with ssh doesn't include it. ( I mean setting your keys with setkey and running racoon etc..) To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-questions" in the body of the message