NetBSD-Users archive
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]
Re: Tunneling in NetBSD
On Thu, Nov 19, 2020 at 07:08:38AM +1030, Brett Lymn wrote:
>
> I will dig up the document I wrote about the setup. My fuzzy memory is that there
> were no hacks required.
Little wonder my memory was fuzzy - I did this 13 years ago. I found
the documentation. I did use a radius server as the backend auth along
with a self-signed certificate for hybrid rsa-xauth.
Unfortunately, the document I have not not generic and contains some
confidential details but I am happy to provide sanitised snippets to
help out.
Below is the racoon.conf, if you need to see the radiusd.conf I have
that too but it is fairly long.
This is the racoon.conf, there were 3 classes of users, the data entry
people, admin staff and developers. The radius server was used to map
the user to the appropriate class depending on group membership:
========================================================================
path certificate "/etc/openssl/certs";
listen {
adminsock "/var/racoon/racoon.sock";
isakmp 192.168.1.253 [500];
isakmp_natt 192.168.1.253 [4500];
}
timer {
counter 30;
phase1 60 seconds;
phase2 40 seconds;
natt_keepalive 20 seconds;
}
remote anonymous {
exchange_mode aggressive;
certificate_type x509 "vpngw.crt" "vpngw.key";
my_identifier asn1dn;
proposal_check claim;
generate_policy on; # automatically generate IPsec policies
dpd_delay 20; # DPD poll every 20 seconds
dpd_maxfail 50; # Wait a long time to consider things dead
nat_traversal force; # always use NATT
ike_frag on; # use IKE fragmentation
passive on;
proposal {
encryption_algorithm aes;
hash_algorithm sha1;
authentication_method hybrid_rsa_server;
dh_group 2;
}
}
mode_cfg {
pool_size 25; # size of the VPN IP pool: 253 addresses
auth_source radius; # login validated against RADIUS
conf_source radius; # IPv4 address obtained by RADIUS
accounting radius; # RADIUS accounting
dns4 192.168.2.254; # IPv4 DNS server
wins4 192.168.2.254; # IPv4 WINS server
default_domain "corporate.local";
split_network include 192.168.0.0/24,192.168.1.0/24,192.168.2.0/24;
banner "/etc/racoon/motd"; # Banner message for clients
pfs_group 2;
}
sainfo anonymous {
pfs_group 2;
lifetime time 1 hour;
encryption_algorithm aes;
authentication_algorithm hmac_sha1;
compression_algorithm deflate;
}
--
Brett Lymn
--
Sent from my NetBSD device.
"We are were wolves",
"You mean werewolves?",
"No we were wolves, now we are something else entirely",
"Oh"
Home |
Main Index |
Thread Index |
Old Index