Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 26 Apr 2001 14:48:28 +0900
From:      Shoichi Sakane <sakane@ydc.co.jp>
To:        wollman@khavrinen.lcs.mit.edu
Cc:        gunther@aurora.regenstrief.org, freebsd-net@FreeBSD.ORG
Subject:   Re: VPN tunnel with DHCP ...
Message-ID:  <20010426144828V.sakane@ydc.co.jp>
In-Reply-To: Your message of "Wed, 25 Apr 2001 17:25:29 -0400 (EDT)" <200104252125.RAA12766@khavrinen.lcs.mit.edu>
References:  <200104252125.RAA12766@khavrinen.lcs.mit.edu>

next in thread | previous in thread | raw e-mail | index | archive | help
# This tread is being at three mailing list...

> >> now, the problem is that the ${sohoip} is dynamically assigned
> >> with DHCP. How can the gateway at the headquarter know that
> >> ${sohoip} address?

> I don't know whether this is actually possible to do yet.  But, you
> should be able to configure racoon to use a public-key certificate for
> authentication, and identify your SOHO users by their names rather
> than the random DHCP address.  However, it looks like you will still
> lose because racoon does not appear to have a mechanism to
> automatically add SPD entries based on the authenticated identity of
> an ``anonymous'' connection.

racoon-20010418a can do it experimentally if you specify "generate_policy"
in server's racoon.conf.  racoon generates SP entries from ID payloads
in IKE phase 2 negotiation, then adds these SPs after SA negotiation
will be finished.  In this case, all you have to do is to configure SPD
in the client.

To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-net" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20010426144828V.sakane>