From owner-freebsd-stable Wed Jul 5 14: 3:53 2000 Delivered-To: freebsd-stable@freebsd.org Received: from enigma.whacky.net (enigma.whacky.net [194.109.204.120]) by hub.freebsd.org (Postfix) with ESMTP id F15F237C424 for ; Wed, 5 Jul 2000 14:03:40 -0700 (PDT) (envelope-from stephanb@whacky.net) Received: (from stephanb@localhost) by enigma.whacky.net (8.9.3/8.9.3) id XAA52202 for freebsd-stable@FreeBSD.ORG; Wed, 5 Jul 2000 23:03:36 +0200 (CEST) (envelope-from stephanb) Date: Wed, 5 Jul 2000 22:29:52 +0200 From: Stephan van Beerschoten To: questions@FreeBSD.ORG Subject: ipsec/4.0-STABLE Message-ID: <20000705222952.A51824@enigma.whacky.net> Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline User-Agent: Mutt/1.2i Sender: owner-freebsd-stable@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.ORG Currently I am having a secure tunnel from my host to a friend's. We used to have /usr/ports/net/pipsecd installed for this link, which was working perfectly. But now I have remotely upgraded my machine from 3.x to 4.0-STABLE and I have included IPSEC options in the kernel. My friends config hasn't changed, he is still using pipsecd. Can I communicate through kernel/ipsec with his userland pipsecd? if so, how? I have tried getting setkey to work with several parameters, and even trying to 'copy' settings from ${wwwserver}/handbook/ipsec.html but with no efffect. Anyone ? -- Stephan van Beerschoten stephanb@whacky.net PGP fingerprint: 4557 9761 B212 FB4C 778D 3529 C42A 2D27 "This email was brought to you by your local pop server" To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-stable" in the body of the message