Skip site navigation (1)Skip section navigation (2)
Date:      Tue, 09 Jan 2001 18:01:43 -0200
From:      Jorge Peixoto Vasquez <jorge@aker.com.br>
To:        freebsd-net@freebsd.org, freebsd-security@freebsd.org
Subject:   IPSEC: racoon and Win2K
Message-ID:  <3A5B6E27.5787D716@aker.com.br>

next in thread | raw e-mail | index | archive | help
This is a multi-part message in MIME format.
--------------2BB9B253F9FAFFDCA0F7B238
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit

I've read the mini-howto on how to setup IPSEC on the FreeBSD
(http://asherah.dyndns.org/~josh/ipsec-howto.txt) and have been most
succesful so far. 

I would be very glad if anyone could help me on the following matter: 

The only problem I've encountered is that, when making Win2K and FreeBSD
interoperate, the IKE's phase 2 only suceeds if
Win2K initiates the process. If racoon is to start it, Win2k will not
accept any proposal for phase 2, complaining  that the dh group number
(which should correctly be either 1 or 2) received is 1 or 2 (depending
on the pfs_group setting in racoon.conf) and not null(0). If I try
setting pfs_group to null, I get a parse error. 

All the docs I found in the kame site (www.kame.net), the handbook, and
the man pages haven't been of any help too.

Thank you very much for your attention, 

Sincerely, 

jOrge 

p.s. I am using FreeBSD 4.2-Stable, racoon 20001111a and (YES) I got the
high-encryption pack and SP1 installed on the Win2K box. 
-- 
Jorge Peixoto Vasquez, Elet. Eng.
Aker Security Solutions
tel. +55 - 61 - 340 9083
--------------2BB9B253F9FAFFDCA0F7B238
Content-Type: text/plain; charset=us-ascii;
 name="racoon.conf"
Content-Transfer-Encoding: 7bit
Content-Disposition: inline;
 filename="racoon.conf"


# search this file for pre_shared_key with various ID key.
path pre_shared_key "/usr/local/etc/racoon/psk.txt" ;

# "log" specifies logging level.  It is followed by either "info", "notify",
# "debug" or "debug2".
log debug;

# "padding" defines some parameter of padding.  You should not touch these.
padding
{
	maximum_length 20;	# maximum padding length.
	randomize off;		# enable randomize length.
	strict_check off;	# enable strict check.
	exclusive_tail off;	# extract last one octet.
}

# Specification of default various timer.
timer
{
	# These value can be changed per remote node.
	counter 5;		# maximum trying count to send.
	interval 20 sec;	# maximum interval to resend.
	persend 1;		# the number of packets per a send.

	# timer for waiting to complete each phase.
	phase1 30 sec;
	phase2 20 sec;
}

remote anonymous
{
	exchange_mode main;
	doi ipsec_doi;
	situation identity_only;

	nonce_size 16;
	lifetime time 1 min;	# sec,min,hour
	lifetime byte 5 MB;	# B,KB,GB
	initial_contact on;
	support_mip6 on;
	proposal_check obey;	# obey, strict or claim

	proposal 
	{
		encryption_algorithm 3des;
		hash_algorithm sha1;
		authentication_method pre_shared_key ;
		dh_group 2;
	}
}


sainfo anonymous
{
#	does not matter if 1 or 2, zero (expected by Win2K) won't parse.
	pfs_group 2;

	lifetime time 36000 sec;
	lifetime byte 50000 KB;
	encryption_algorithm 3des,des ;
	authentication_algorithm hmac_sha1,hmac_md5;
	compression_algorithm deflate ;
}



--------------2BB9B253F9FAFFDCA0F7B238--



To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?3A5B6E27.5787D716>