Here be dragons. This section should cover the basics:
OpenBSD generates keys suitables for IPSec usage during the installation. The public key can be found in
If you don't want to use a pre-generated key, refer to isakmpd(8).
Send your public key to your peer, preferrably digitally signed. A signature can be created with
gpg -sb -a local.pub and checked with
gpg --verify local.pub.asc. Since the key is not private, it can be transmitted in the open and on a public forum, such as a Pastebin service.
Once your peer sent you their public key, it under
/etc/isakmpd/ipv6, depending on the ID type the peer is using. The key file should be named after the peers ID. For example, if your peer is
220.127.116.11, you place their public key under
If your peers public key is not in PEM format, you can use pubkey-converter to convert between key formats.
Change the value of the
isakmpd_flags variable in
"-K", or add the
"-K" flag if you already have flags in there.
Next, add the right flow parameters to
/etc/ipsec.conf. We are using the following parameters in this example:
The configuration file should look like this:
mymachine = "18.104.22.168" mypeer = "22.214.171.124" ike esp transport proto gre from $mymachine to $mypeer \ main auth hmac-sha1 enc aes-128 group modp1536 lifetime 28800 \ quick auth hmac-sha1 enc aes-128 group modp1536 lifetime 3600
Load the configuration file into isakmpd:
ipsecctl -f /etc/ipsec.conf. Once the connection is established, the IPSec flows can be listed with
# ipsecctl -sa FLOWS: flow esp in proto gre from 126.96.36.199 to 188.8.131.52 peer 184.108.40.206 srcid 220.127.116.11/32 dstid 18.104.22.168/32 type use flow esp out proto gre from 22.214.171.124 to 126.96.36.199 peer 188.8.131.52 srcid 184.108.40.206/32 dstid 220.127.116.11/32 type require SAD: esp transport from 18.104.22.168 to 22.214.171.124 spi 0xdeadbeef auth hmac-sha1 enc aes esp transport from 126.96.36.199 to 188.8.131.52 spi 0xf00df00d auth hmac-sha1 enc aes
Next, we will set up the GRE device. The gre(4) device encapsulates IPv4 and IPv6 traffic, which allows you to speak both address families over one tunnel if you only have native connectivity for one address family. The addresses configured onto the GRE device should come from a private address range that is not used anywhere in DN42, or a registered transfer net. For IPv6, you should use either ULAs or Link-Local addresses. In this example, we assume you are using 10.20.30.0/31 as the IPv4 transfer "net" (it has only two addresses, so calling it a network is a bit of an overstatement) and Link-Local addresses for IPv6.
# ifconfig gre0 tunnel 184.108.40.206 220.127.116.11 # ifconfig gre0 inet 10.20.30.0 10.20.30.1 # reverse these on your peer's side # ifconfig gre0 inet6 eui64
These settings should also be added to
tunnel 18.104.22.168 22.214.171.124 inet 10.20.30.0 10.20.30.1 inet6 eui64
Last edited by KIOUBIT-MNT, 2021-05-31 21:48:53