diff options
author | Alexander Bluhm <bluhm@cvs.openbsd.org> | 2008-07-01 15:00:55 +0000 |
---|---|---|
committer | Alexander Bluhm <bluhm@cvs.openbsd.org> | 2008-07-01 15:00:55 +0000 |
commit | ec17add7bc79551b55da5b3f390fa5e620127244 (patch) | |
tree | d6dd3dac752697b62aeac06e0d235f2631a6fcfd /regress/sbin/ipsecctl/ike22.ok | |
parent | 9c78cb2146f35e6ffd5b0e0a09831b3f586c8f15 (diff) |
Isakmpd acquire mode did not work with a config generated from
ipsec.conf. The config created by isakmpd dynamically was different
from the config that ipsecctl generated out of ipsec.conf.
Both config formats are changed so that they match. One needs a
passive ike line and a require flow line with the same parameters
in the ipsec.conf. Then the acquire message generated by the kernel
will trigger isakmpd to generate a config that matches the one that
ipsecctl generated from the ike line.
ok hshoexer, 'sounds good' todd
Diffstat (limited to 'regress/sbin/ipsecctl/ike22.ok')
-rw-r--r-- | regress/sbin/ipsecctl/ike22.ok | 34 |
1 files changed, 17 insertions, 17 deletions
diff --git a/regress/sbin/ipsecctl/ike22.ok b/regress/sbin/ipsecctl/ike22.ok index b83f728152f..e037df8f198 100644 --- a/regress/sbin/ipsecctl/ike22.ok +++ b/regress/sbin/ipsecctl/ike22.ok @@ -1,20 +1,20 @@ C set [Phase 1]:3ffe::1=peer-3ffe::1 force C set [peer-3ffe::1]:Phase=1 force C set [peer-3ffe::1]:Address=3ffe::1 force -C set [peer-3ffe::1]:Configuration=mm-3ffe::1 force -C set [mm-3ffe::1]:EXCHANGE_TYPE=ID_PROT force -C add [mm-3ffe::1]:Transforms=AES-SHA-RSA_SIG force -C set [IPsec-10.1.1.0/24-10.1.2.0/24]:Phase=2 force -C set [IPsec-10.1.1.0/24-10.1.2.0/24]:ISAKMP-peer=peer-3ffe::1 force -C set [IPsec-10.1.1.0/24-10.1.2.0/24]:Configuration=qm-10.1.1.0/24-10.1.2.0/24 force -C set [IPsec-10.1.1.0/24-10.1.2.0/24]:Local-ID=lid-10.1.1.0/24 force -C set [IPsec-10.1.1.0/24-10.1.2.0/24]:Remote-ID=rid-10.1.2.0/24 force -C set [qm-10.1.1.0/24-10.1.2.0/24]:EXCHANGE_TYPE=QUICK_MODE force -C set [qm-10.1.1.0/24-10.1.2.0/24]:Suites=QM-ESP-AES-SHA2-256-PFS-SUITE force -C set [lid-10.1.1.0/24]:ID-type=IPV4_ADDR_SUBNET force -C set [lid-10.1.1.0/24]:Network=10.1.1.0 force -C set [lid-10.1.1.0/24]:Netmask=255.255.255.0 force -C set [rid-10.1.2.0/24]:ID-type=IPV4_ADDR_SUBNET force -C set [rid-10.1.2.0/24]:Network=10.1.2.0 force -C set [rid-10.1.2.0/24]:Netmask=255.255.255.0 force -C add [Phase 2]:Connections=IPsec-10.1.1.0/24-10.1.2.0/24 +C set [peer-3ffe::1]:Configuration=phase1-peer-3ffe::1 force +C set [phase1-peer-3ffe::1]:EXCHANGE_TYPE=ID_PROT force +C add [phase1-peer-3ffe::1]:Transforms=AES-SHA-RSA_SIG force +C set [from-10.1.1.0/24-to-10.1.2.0/24]:Phase=2 force +C set [from-10.1.1.0/24-to-10.1.2.0/24]:ISAKMP-peer=peer-3ffe::1 force +C set [from-10.1.1.0/24-to-10.1.2.0/24]:Configuration=phase2-from-10.1.1.0/24-to-10.1.2.0/24 force +C set [from-10.1.1.0/24-to-10.1.2.0/24]:Local-ID=from-10.1.1.0/24 force +C set [from-10.1.1.0/24-to-10.1.2.0/24]:Remote-ID=to-10.1.2.0/24 force +C set [phase2-from-10.1.1.0/24-to-10.1.2.0/24]:EXCHANGE_TYPE=QUICK_MODE force +C set [phase2-from-10.1.1.0/24-to-10.1.2.0/24]:Suites=QM-ESP-AES-SHA2-256-PFS-SUITE force +C set [from-10.1.1.0/24]:ID-type=IPV4_ADDR_SUBNET force +C set [from-10.1.1.0/24]:Network=10.1.1.0 force +C set [from-10.1.1.0/24]:Netmask=255.255.255.0 force +C set [to-10.1.2.0/24]:ID-type=IPV4_ADDR_SUBNET force +C set [to-10.1.2.0/24]:Network=10.1.2.0 force +C set [to-10.1.2.0/24]:Netmask=255.255.255.0 force +C add [Phase 2]:Connections=from-10.1.1.0/24-to-10.1.2.0/24 |