openbsd-ports/net/strongswan/pkg
..
DESCR
PFRAG.aesni
PLIST
README

$OpenBSD: README,v 1.1.1.1 2019/03/31 19:47:28 sthen Exp $

+-------------------------------------------------------------------------------
| Running ${PKGSTEM} on OpenBSD
+-------------------------------------------------------------------------------

Caveats
=======
This package currently provides only the "kernel-ipsec" plugin which operates
in userland via tun(4) devices and uses strongSwan's own IPsec implementation
rather than OpenBSD's kernel IPsec. It is not recommended for production use
on security gateways.

To use this plugin, kernel ESP handling must be disabled:

# sysctl net.inet.esp.enable=0
# sysctl net.inet.esp.udpencap=0

The kernel-pfkey plugin (which interfaces with kernel IPsec) has not yet
been ported to OpenBSD.

Example configuration
---------------------
This is for an IKEv2 client with EAP username/password authentication:

# cat /etc/strongswan/ipsec.conf
conn ikev2-eap-mschapv2
    dpdaction=restart
    dpddelay=30
    dpdtimeout=90
    fragmentation=yes
    leftsourceip=%config
    keyexchange=ikev2
    leftauth=eap-mschapv2
    eap_identity=username
    rightauth=pubkey
    right=vpn.example.net
    rightid=@vpn.example.net
    rightca="C=GB, ST=Cornwall, O=Example Net, CN=Example CA, E=hostmaster@example.net"
    rightsubnet=10.71.0.0/18
    auto=add

# cat /etc/strongswan/ipsec.secrets
username : EAP "password"

# ls -l /etc/strongswan/ipsec.d/cacerts/
total 8
-rw-r--r--  1 root  wheel  2106 Mar 30 00:05 example-ca.pem

# ipsec start
# ipsec up ikev2-eap-mschapv2