From owner-freebsd-net@freebsd.org Tue Feb 27 09:56:11 2018 Return-Path: Delivered-To: freebsd-net@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id E2E9EF35F41 for ; Tue, 27 Feb 2018 09:56:10 +0000 (UTC) (envelope-from freebsd@omnilan.de) Received: from mx0.gentlemail.de (mx0.gentlemail.de [IPv6:2a00:e10:2800::a130]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 6BAEE6CAC1 for ; Tue, 27 Feb 2018 09:56:10 +0000 (UTC) (envelope-from freebsd@omnilan.de) Received: from mh0.gentlemail.de (mh0.gentlemail.de [IPv6:2a00:e10:2800::a135]) by mx0.gentlemail.de (8.14.5/8.14.5) with ESMTP id w1R9u9ef005302 for ; Tue, 27 Feb 2018 10:56:09 +0100 (CET) (envelope-from freebsd@omnilan.de) Received: from titan.inop.mo1.omnilan.net (s1.omnilan.de [217.91.127.234]) (using TLSv1 with cipher ECDHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by mh0.gentlemail.de (Postfix) with ESMTPSA id 2AFBCD60; Tue, 27 Feb 2018 10:56:09 +0100 (CET) Message-ID: <5A952B38.8060007@omnilan.de> Date: Tue, 27 Feb 2018 10:56:08 +0100 From: Harry Schmalzbauer Organization: OmniLAN User-Agent: Mozilla/5.0 (X11; U; FreeBSD i386; de-DE; rv:1.9.2.8) Gecko/20100906 Lightning/1.0b2 Thunderbird/3.1.2 MIME-Version: 1.0 To: freebsd-net@freebsd.org Subject: if_ipsec(4) and IKEv1 [security/ipsec-tools, racoon.conf] Content-Type: text/plain; charset=ISO-8859-15 Content-Transfer-Encoding: 7bit X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.2.7 (mx0.gentlemail.de [IPv6:2a00:e10:2800::a130]); Tue, 27 Feb 2018 10:56:09 +0100 (CET) X-Milter: Spamilter (Reciever: mx0.gentlemail.de; Sender-ip: ; Sender-helo: mh0.gentlemail.de; ) X-BeenThere: freebsd-net@freebsd.org X-Mailman-Version: 2.1.25 Precedence: list List-Id: Networking and TCP/IP with FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 27 Feb 2018 09:56:11 -0000 Hello, I'm out of ideas how to quick-start with if_ipsec(4) and IKEv1. I'm familar with security/ipsec-tools, but I couldn't find out how racoon(8) would interact with cloned if_ipsec(4) interfaces yet. Also, how to tell racoon(8) to generate such tunnel interfaces, hence policies? I guess the latter isn't implemented in racoon(8) (yet). But is racoon(8) supposed to work with static policies generated by if_ipsec(4)? Thanks, -harry