From owner-freebsd-net@freebsd.org Tue Feb 27 09:59:52 2018 Return-Path: Delivered-To: freebsd-net@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 6CD57F363BB for ; Tue, 27 Feb 2018 09:59:52 +0000 (UTC) (envelope-from freebsd@omnilan.de) Received: from mx0.gentlemail.de (mx0.gentlemail.de [IPv6:2a00:e10:2800::a130]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id E46DE6CD38 for ; Tue, 27 Feb 2018 09:59:51 +0000 (UTC) (envelope-from freebsd@omnilan.de) Received: from mh0.gentlemail.de (ezra.dcm1.omnilan.net [78.138.80.135]) by mx0.gentlemail.de (8.14.5/8.14.5) with ESMTP id w1R9xo7Z005344 for ; Tue, 27 Feb 2018 10:59:50 +0100 (CET) (envelope-from freebsd@omnilan.de) Received: from titan.inop.mo1.omnilan.net (s1.omnilan.de [217.91.127.234]) (using TLSv1 with cipher ECDHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by mh0.gentlemail.de (Postfix) with ESMTPSA id BE275D64; Tue, 27 Feb 2018 10:59:50 +0100 (CET) Message-ID: <5A952C16.4080005@omnilan.de> Date: Tue, 27 Feb 2018 10:59:50 +0100 From: Harry Schmalzbauer Organization: OmniLAN User-Agent: Mozilla/5.0 (X11; U; FreeBSD i386; de-DE; rv:1.9.2.8) Gecko/20100906 Lightning/1.0b2 Thunderbird/3.1.2 MIME-Version: 1.0 To: freebsd-net@freebsd.org Subject: Re: if_ipsec(4) and IKEv1 [security/ipsec-tools, racoon.conf] References: <5A952B38.8060007@omnilan.de> In-Reply-To: <5A952B38.8060007@omnilan.de> Content-Type: text/plain; charset=ISO-8859-15 Content-Transfer-Encoding: 8bit X-Greylist: ACL 130 matched, not delayed by milter-greylist-4.2.7 (mx0.gentlemail.de [78.138.80.130]); Tue, 27 Feb 2018 10:59:50 +0100 (CET) X-Milter: Spamilter (Reciever: mx0.gentlemail.de; Sender-ip: 78.138.80.135; Sender-helo: mh0.gentlemail.de; ) X-BeenThere: freebsd-net@freebsd.org X-Mailman-Version: 2.1.25 Precedence: list List-Id: Networking and TCP/IP with FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 27 Feb 2018 09:59:52 -0000 Bezüglich Harry Schmalzbauer's Nachricht vom 27.02.2018 10:56 (localtime): > Hello, > > I'm out of ideas how to quick-start with if_ipsec(4) and IKEv1. > > I'm familar with security/ipsec-tools, but I couldn't find out how > racoon(8) would interact with cloned if_ipsec(4) interfaces yet. > > Also, how to tell racoon(8) to generate such tunnel interfaces, hence > policies? > I guess the latter isn't implemented in racoon(8) (yet). > > But is racoon(8) supposed to work with static policies generated by > if_ipsec(4)? I doubt, since with 'ifconfig ipsec', I have to specify reqid. How to tell racoon(8) which reqid to insert keys to ? Thanks, -harry