blob: 0ab49f000364560735fdd68b0068aa72669f13a3 [file] [log] [blame]
This document is derived from the KAME racoon FAQ. Some answers do not
apply to ipsec-tools (they are obsolete or not up to date). They are
tagged [KAME]
Q: With what other IKE/IPsec implementation racoon is known to be interoperable?
A: [KAME]
See "IMPLEMENTATION" document supplied with KAME kit, or:
http://www.kame.net/dev/cvsweb.cgi/kame/IMPLEMENTATION
As we have tested/got test reports in the past, and our end and
the other end may have changed their implemenations, we are not sure
if we can interoperate with them today (we hope them to interoperate,
but we are not sure).
Also note that, IKE interoperability highly depends on configuration
on both ends. You must configure both ends exactly the same.
Q: How can I make racoon interoperate with <IKE/IPsec implementation>?
A:
Configure both ends exactly the same. With just a tiny little
differnce, you will be in trouble.
Q: How to build racoon on my platform?
A:
As usual: configure && make && make install
ipsec-tools is also available as a package in the NetBSD pkgsrc
Q: Describe me the options to "configure".
A:
--enable-adminport:
Lets racoon to listen to racoon admin port, which is to
be contacted by racoonctl(8).
--enable-natt:
Enable NAT-Traversal. This needs kernel support, which is
available on Linux. On NetBSD, NAT-Traversal kernel support
has not been integrated yet, you can get it from here:
http://ipsec-tools.sourceforge.net/netbsd_nat-t.diff
If you live in a country where software patents are legal,
using NAT-Traversal might infringe a patent.
--enable-broken-natt:
When ipsec-tools is built with --enable-natt, racoon
sets IKE ports in SAD and SPD so that the kernel is
able to ditinguish peers hidden behind the same NAT.
Some kernel will not cope with that ports. Use that
option to force the ports to 0 in SAD ans SPD. Of
course this means that you cannot have multiple peers
behind the same NAT.
--enable-frag:
Enable IKE fragmentation, which is a workaround for
broken routers that drop fragmented packets
--enable-hybrid:
Enable hybrid authentication, and ISAKMP mode config and
Xauth as well. Note that plain Xauth (without hybrid auth)
is not implemented.
--with-libradius:
Enable the use of RADIUS with hybrid authentication on the
server side. RADIUS is used for authentication, configuration
and accounting.
--with-libpam:
Enable the use of PAM with hybrid authentication on the
server side. PAM can be used for authentication and accounting.
--enable-gssapi:
Enable GSS-API, for Kerberos V support.
--enable-stats:
Enable statistics logging function.
--enable-samode-unspec:
Enable to use unspecified a mode of SA.
--enable-ipv6:
Enable IPv6 support.
--with-kernel-headers:
Supply the location of Linux kernel headers.
--with-readline:
Support readline input (yes by default).
--with-openssl:
Specify OpenSSL directory.
--sysconfdir:
Where racoon config file goes. Default is /etc, which means
that racoon will look for /etc/racoon.conf
--localstatedir:
Where is the directory where racoon stores the control socket
(when using --enable-adminport). Default is /var, which
means racoon will use /var/racoon/racoon.sock
--prefix:
Where racoon gets installed.
Q: How can I get help?
A:
Always identify your operating system platforms, the versions you are
using (like "ipsec-tools-0.5"), and information to repeat the
problem. The more revelant information you supply, the better your
chances of getting help are. Useful informations include, depending
of the problem:
- version identification
- trace from racoon, taken by "racoon -d 0xffffffff"
(maximum debug level)
- configuration file you are using
- probabaly, tcpdump trace
http://orange.kame.net/dev/send-pr.html has the guideline.
If your question is not confidential, send your questions to:
<ipsec-tools-devel@lists.sourceforge.net>
If your question is confidential, send your questions to:
<ipsec-tools-core@lists.sourceforge.net>
Q: Other documents to look at?
A:
http://www.netbsd.org/Documentation/network/ipsec/
http://www.kame.net/
http://www.kame.net/newsletter/