Dear misc@,

Recently I've been playing around with creating some OpenBSD tunnels on
a couple of firewalls I manage. My only problem with them is the very
long reconnection timeout after a flush (with ipsecctl -F).

I've tried both active and dynamic modes, and they seem to act the same way.

A sample config of a peer from ipsec.conf:
> ike esp from $src to $dst  \
>   local $localip peer $remoteip \
>   main auth hmac-sha1 enc 3des group modp1024 lifetime 86400 \
>   quick auth hmac-sha1 enc 3des group modp1024 lifetime 3600 \
>   psk "thepassword"

After some googling I managed to find a site
(http://www.richweb.com/book/export/html/182) which explains the long
reconnection time with using long key lifetime expiry times. 

Is there a way to reduce the reconnection time, save for asking the
other side of the tunnel to do a hard clear and reducing lifetimes?

If not, are there any downsides to reducing the key lifetime? What would be a
good value?

-- 
with regards, 

Wiesław Kielas

Reply via email to