I have not tried ECDSA, however I've had iOS and macOS devices
running with iked since it came into OpenBSD using certificate auth
with RSA 2048 certs and a RSA 4096 CA.

I just recently wrote a blog post on it, it includes a general overview
of how I did it and a fragment of my .mobileconfig and iked.conf.

https://www.going-flying.com/blog/protecting-my-macos-and-ios-devices-with-an-openbsd-vpn.html

My VPN endpoint is currently running:
OpenBSD 6.4 (GENERIC) #7: Thu Feb 28 18:10:07 CET 2019
    r...@syspatch-64-amd64.openbsd.org:/usr/src/sys/arch/amd64/compile/GENERIC

--Matt


> On Apr 4, 2019, at 20:08, Tim Stewart <t...@stoo.org> wrote:
> 
> Hi Ted,
> 
> On 6/2/18 12:26 PM, Theodore Wynnychenko wrote:
>> Hello
>> Last year (before about 3/27/2017 when "Add support for RFC4754 (ECDSA) and
>> RFC7427 authentication" diff was committed to current), I had set up and had
>> been able to connect iOS devices (iphone/ipad) to OpenBSD's iked, and have 
>> ikev2
>> VPN's happen, almost as if by, magic.
>> Authentication was accomplished using certificates signed by a local 
>> authority
>> and then distributed to the iOS devices.
>> Since 3/27/17, this has not been working.  I sent a couple of emails about 
>> this
>> last year (the initial one:
>> https://marc.info/?l=openbsd-bugs&m=149706080419488&w=2).
>> Over the last year, I have tried many things.  Even though I don't know 
>> anything
>> about programming (or C), I tried making little changes to the iked source, 
>> all
>> without success.  (Is that any surprise? No.  I was amazed at times that my
>> changes even resulted in a program that would actually start up and run.)
>> I have tried creating several different CA's and certificates, using various
>> different algorithms (ECDSA and RSA, with varying key lengths), all without
>> success.  For example, I just tried creating a CA and certificates with
>> ECDSA384/SHA2-384; I distribute those to the iOS device (which supports 
>> them),
>> but, iked will not accept them and create a tunnel.
>> In iked.conf, if I don't explicitly state something like "ecdsa384" as the
>> authentication method (and, this requires having a local copy of the public 
>> key
>> on the openbsd machine), iked falls back to rfc7427 for authentication, but 
>> it
>> appears that iOS does not support this (yet?).
>> I have been downgrading iked to a version before the 3/27/17 (every time I
>> update -current), and this still allows my old certificates to work.  But, 
>> that
>> doesn't seem sustainable.
>> I have no idea how to proceed?
>> Has anyone been able to get -current (or at least, a snapshot after 3/27/17)
>> version of iked to work with any iOS devices using certificates successfully?
>> If so, I would really appreciate some advice on how it can be done.
>> Thanks
>> Ted
> 
> Last night I tried to set up my iPad for the first time and ran into a 
> similar issue.  Today I remembered writing a patch for a similar issue after 
> RFC7427 was added:
> 
>  https://marc.info/?l=openbsd-tech&m=149499973130985
> 
> After applying this, and adding the `rsa' ikeauth parameter to the policy, 
> the iPad successfully connected.
> 
> Can you try applying that patch and see if it resolves your issue?  If it 
> also works for you, I'll reply on that thread and see if anyone wants to 
> opine on the patch.
> 
> -TimS
> 
> -- 
> Tim Stewart
> t...@stoo.org
> 

Reply via email to