On 2019-03-13, Fedor Piecka <teplav...@gmail.com> wrote:
> I understood that ipsecctl and ipsec.conf are supposed to free the user 
> from configuring keynotes manually.

That's not correct. ipsec.conf can take the place of isakmpd.conf in
some limited cases. It doesn't replace keynote in any way.

> Doesn't the parameter "-K" of 
> isakmpd mean it won't read keynote policy at all?

That is correct. As the manual puts it,

   -K      When this option is given, isakmpd does not read the policy
           configuration file and no keynote(4) policy check is accomplished.
                              ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^

> Could you please clarify a bit further on how do keynote policies and 
> ipsec.conf automatic keying work together? I understand an option of not 
> using ipsec.conf at all, but I don't understand how to use both 
> ipsec.conf and isakmpd configuration for a single ESP tunnel.

keynote interacts exactly the same with ipsec.conf as it does with
isakmpd.conf.

ipsecctl -f isn't particularly clever, it's a basic config generator.
It reads ipsec.conf, generates isakmpd.conf sections based on the
config, and feeds these to isakmpd over a fifo. It is missing quite
a lot of configurability that isakmpd.conf allows (for example
allowing multiple encryption suites in the same "default peer"
config).

Run "ipsecctl -vf /etc/ipsec.conf" to see what it's sending,
the output from that can be reformatted slightly and written to
isakmpd.conf.

Yes keynote is a pain but it's the only available method to get this done.

> Iked doesn't have the same problem. No SAs/flows will be created if the 
> networks aren't configured in iked.conf. However isakmpd->iked migration 
> is painful in OpenBSD as their use at the same time isn't straightforward.

Still unsure about that, "from 0.0.0.0/0 to 0.0.0.0/0" is not that
uncommon a setup with iked when you have roaming clients needing to
access "the internet" via vpn, in which case the networks do match ..


Reply via email to