Discussion:
Racoon patch for mode_cfg with rsasig authentication
(too old to reply)
Frank Wille
2016-03-09 17:39:56 UTC
Permalink
Hi!

First of all thanks to christos@ for his latest NAT-T SA patches! I'm sure
my company will grant a donation to the NetBSD project, when everything is
finally up and running.

Now I was able to write a small patch for Racoon, which requests "IKE mode
config" in "rsasig" (certificates on both sides only) authentication mode,
providing "mode_cfg" was configured to "on".

Today I successfully tested it with a Lancom router, using the following
configuration:

---8<---
path include "/etc/racoon";
path certificate "/etc/racoon/certs";
path script "/etc/racoon/scripts";

remote "wpsd"
{
remote_address 1.2.3.4;
exchange_mode main,base;

my_identifier asn1dn;
certificate_type x509 "vpnclient15.crt" "vpnclient15.key";
ca_type x509 "ca.crt";

mode_cfg on;
dpd_delay 20;
nat_traversal on;
lifetime time 8 hour;
script "phase1-up.sh" phase1_up;
script "phase1-down.sh" phase1_down;

proposal {
encryption_algorithm aes;
hash_algorithm md5;
authentication_method rsasig;
dh_group 2;
}
proposal_check obey;
}

sainfo anonymous
{
pfs_group 2;
lifetime time 8 hour;
encryption_algorithm aes;
authentication_algorithm hmac_md5;
compression_algorithm deflate;
}
---8<---


How do we handle modifications in ipsec-tools? Just commit them locally into
the repository? Or do we also send patches to the ipsec-tools sourceforge
project?

Somebody familiar with the racoon source (maybe manu@?) should check my
patches first, to make sure they are really ok.

The last four lines were not required for the Lancom, but for testing with
an "rsasig" NetBSD/racoon gateway, which didn't identify itself with an
XAUTH vendor-id in this mode (while the Lancom does).


Sorry for all the logs and questions over the last days. I learned a lot
about IPsec during this time. :)
--
Frank Wille
Emmanuel Dreyfus
2016-03-09 19:58:47 UTC
Permalink
Post by Frank Wille
How do we handle modifications in ipsec-tools? Just commit them locally into
the repository? Or do we also send patches to the ipsec-tools sourceforge
project?
I have not followed the situation very closely, but last time I was
aware, the upstream source was the NetBSD repository, and the
sourceforge project was dead. I heard of project to move somewhere else,
making NetBSD repo downstream, but I have not tracked where this went.

Your patch seems good to me. If nobody opposes, I will commit it in
NetBSD repo (please bug me in a few days if I forgot to do it)
--
Emmanuel Dreyfus
http://hcpnet.free.fr/pubz
***@netbsd.org

--
Posted automagically by a mail2news gateway at muc.de e.V.
Please direct questions, flames, donations, etc. to news-***@muc.de
Frank Wille
2016-03-10 10:35:13 UTC
Permalink
Post by Emmanuel Dreyfus
Your patch seems good to me. If nobody opposes, I will commit it in
NetBSD repo (please bug me in a few days if I forgot to do it)
My patch doesn't play very well with the ENABLE_HYBRID compiler option (I
didn't care during my tests). Mode config packets are only processed when
ENABLE_HYBRID is defined, but "rsasig" should work independant from it.

This is irrelevant, of course, as we always build with ENABLED_HYBRID
defined.

There should be a pullup for NetBSD-6 and -7 after I did some more testing
during the following days. :)
--
Frank Wille


--
Posted automagically by a mail2news gateway at muc.de e.V.
Please direct questions, flames, donations, etc. to news-***@muc.de
Christos Zoulas
2016-03-09 22:27:39 UTC
Permalink
-=-=-=-=-=-
Hi!
my company will grant a donation to the NetBSD project, when everything is
finally up and running.
Now I was able to write a small patch for Racoon, which requests "IKE mode
config" in "rsasig" (certificates on both sides only) authentication mode,
providing "mode_cfg" was configured to "on".
Thanks, I committed it!

christos


--
Posted automagically by a mail2news gateway at muc.de e.V.
Please direct questions, flames, donations, etc. to news-***@muc.de
Loading...