Annotation of embedaddon/ipsec-tools/src/racoon/doc/FAQ, revision 1.1
1.1 ! misho 1: This document is derived from the KAME racoon FAQ. Some answers do not
! 2: apply to ipsec-tools (they are obsolete or not up to date). They are
! 3: tagged [KAME]
! 4:
! 5: Q: With what other IKE/IPsec implementation racoon is known to be interoperable?
! 6:
! 7: A: [KAME]
! 8: See "IMPLEMENTATION" document supplied with KAME kit, or:
! 9: http://www.kame.net/dev/cvsweb.cgi/kame/IMPLEMENTATION
! 10: As we have tested/got test reports in the past, and our end and
! 11: the other end may have changed their implemenations, we are not sure
! 12: if we can interoperate with them today (we hope them to interoperate,
! 13: but we are not sure).
! 14: Also note that, IKE interoperability highly depends on configuration
! 15: on both ends. You must configure both ends exactly the same.
! 16:
! 17: Q: How can I make racoon interoperate with <IKE/IPsec implementation>?
! 18:
! 19: A:
! 20: Configure both ends exactly the same. With just a tiny little
! 21: difference, you will be in trouble.
! 22:
! 23: Q: How to build racoon on my platform?
! 24:
! 25: A:
! 26: As usual: configure && make && make install
! 27: ipsec-tools is also available as a package in the NetBSD pkgsrc
! 28:
! 29: Q: Describe me the options to "configure".
! 30:
! 31: A:
! 32: --enable-adminport:
! 33: Lets racoon to listen to racoon admin port, which is to
! 34: be contacted by racoonctl(8).
! 35: --enable-natt:
! 36: Enable NAT-Traversal. This needs kernel support, which is
! 37: available on Linux. On NetBSD, NAT-Traversal kernel support
! 38: has not been integrated yet, you can get it from here:
! 39: http://ipsec-tools.sourceforge.net/netbsd_nat-t.diff
! 40: If you live in a country where software patents are legal,
! 41: using NAT-Traversal might infringe a patent.
! 42: --enable-broken-natt:
! 43: When ipsec-tools is built with --enable-natt, racoon
! 44: sets IKE ports in SAD and SPD so that the kernel is
! 45: able to ditinguish peers hidden behind the same NAT.
! 46: Some kernel will not cope with that ports. Use that
! 47: option to force the ports to 0 in SAD ans SPD. Of
! 48: course this means that you cannot have multiple peers
! 49: behind the same NAT.
! 50: --enable-frag:
! 51: Enable IKE fragmentation, which is a workaround for
! 52: broken routers that drop fragmented packets
! 53: --enable-hybrid:
! 54: Enable hybrid authentication, and ISAKMP mode config and
! 55: Xauth as well. Note that plain Xauth (without hybrid auth)
! 56: is not implemented.
! 57: --with-libradius:
! 58: Enable the use of RADIUS with hybrid authentication on the
! 59: server side. RADIUS is used for authentication, configuration
! 60: and accounting.
! 61: --with-libpam:
! 62: Enable the use of PAM with hybrid authentication on the
! 63: server side. PAM can be used for authentication and accounting.
! 64: --enable-gssapi:
! 65: Enable GSS-API, for Kerberos V support.
! 66: --enable-stats:
! 67: Enable statistics logging function.
! 68: --enable-samode-unspec:
! 69: Enable to use unspecified a mode of SA.
! 70: --enable-ipv6:
! 71: Enable IPv6 support.
! 72: --with-kernel-headers:
! 73: Supply the location of Linux kernel headers.
! 74: --with-readline:
! 75: Support readline input (yes by default).
! 76: --with-openssl:
! 77: Specify OpenSSL directory.
! 78: --sysconfdir:
! 79: Where racoon config file goes. Default is /etc, which means
! 80: that racoon will look for /etc/racoon.conf
! 81: --localstatedir:
! 82: Where is the directory where racoon stores the control socket
! 83: (when using --enable-adminport). Default is /var, which
! 84: means racoon will use /var/racoon/racoon.sock
! 85: --prefix:
! 86: Where racoon gets installed.
! 87:
! 88: Q: How can I get help?
! 89:
! 90: A:
! 91: Always identify your operating system platforms, the versions you are
! 92: using (like "ipsec-tools-0.5"), and information to repeat the
! 93: problem. The more revelant information you supply, the better your
! 94: chances of getting help are. Useful informations include, depending
! 95: of the problem:
! 96: - version identification
! 97: - trace from racoon, taken by "racoon -d 0xffffffff"
! 98: (maximum debug level)
! 99: - configuration file you are using
! 100: - probabaly, tcpdump trace
! 101: http://orange.kame.net/dev/send-pr.html has the guideline.
! 102:
! 103: If your question is not confidential, send your questions to:
! 104: <ipsec-tools-devel@lists.sourceforge.net>
! 105:
! 106: If your question is confidential, send your questions to:
! 107: <ipsec-tools-core@lists.sourceforge.net>
! 108:
! 109: Q: Other documents to look at?
! 110:
! 111: A:
! 112: http://www.NetBSD.org/docs/network/ipsec/
! 113: http://www.kame.net/
! 114: http://www.kame.net/newsletter/
FreeBSD-CVSweb <freebsd-cvsweb@FreeBSD.org>