Annotation of embedaddon/ipsec-tools/src/racoon/doc/FAQ, revision 1.1.1.1
1.1 misho 1: This document is derived from the KAME racoon FAQ. Some answers do not
2: apply to ipsec-tools (they are obsolete or not up to date). They are
3: tagged [KAME]
4:
5: Q: With what other IKE/IPsec implementation racoon is known to be interoperable?
6:
7: A: [KAME]
8: See "IMPLEMENTATION" document supplied with KAME kit, or:
9: http://www.kame.net/dev/cvsweb.cgi/kame/IMPLEMENTATION
10: As we have tested/got test reports in the past, and our end and
11: the other end may have changed their implemenations, we are not sure
12: if we can interoperate with them today (we hope them to interoperate,
13: but we are not sure).
14: Also note that, IKE interoperability highly depends on configuration
15: on both ends. You must configure both ends exactly the same.
16:
17: Q: How can I make racoon interoperate with <IKE/IPsec implementation>?
18:
19: A:
20: Configure both ends exactly the same. With just a tiny little
21: difference, you will be in trouble.
22:
23: Q: How to build racoon on my platform?
24:
25: A:
26: As usual: configure && make && make install
27: ipsec-tools is also available as a package in the NetBSD pkgsrc
28:
29: Q: Describe me the options to "configure".
30:
31: A:
32: --enable-adminport:
33: Lets racoon to listen to racoon admin port, which is to
34: be contacted by racoonctl(8).
35: --enable-natt:
36: Enable NAT-Traversal. This needs kernel support, which is
37: available on Linux. On NetBSD, NAT-Traversal kernel support
38: has not been integrated yet, you can get it from here:
39: http://ipsec-tools.sourceforge.net/netbsd_nat-t.diff
40: If you live in a country where software patents are legal,
41: using NAT-Traversal might infringe a patent.
42: --enable-broken-natt:
43: When ipsec-tools is built with --enable-natt, racoon
44: sets IKE ports in SAD and SPD so that the kernel is
45: able to ditinguish peers hidden behind the same NAT.
46: Some kernel will not cope with that ports. Use that
47: option to force the ports to 0 in SAD ans SPD. Of
48: course this means that you cannot have multiple peers
49: behind the same NAT.
50: --enable-frag:
51: Enable IKE fragmentation, which is a workaround for
52: broken routers that drop fragmented packets
53: --enable-hybrid:
54: Enable hybrid authentication, and ISAKMP mode config and
55: Xauth as well. Note that plain Xauth (without hybrid auth)
56: is not implemented.
57: --with-libradius:
58: Enable the use of RADIUS with hybrid authentication on the
59: server side. RADIUS is used for authentication, configuration
60: and accounting.
61: --with-libpam:
62: Enable the use of PAM with hybrid authentication on the
63: server side. PAM can be used for authentication and accounting.
64: --enable-gssapi:
65: Enable GSS-API, for Kerberos V support.
66: --enable-stats:
67: Enable statistics logging function.
68: --enable-samode-unspec:
69: Enable to use unspecified a mode of SA.
70: --enable-ipv6:
71: Enable IPv6 support.
72: --with-kernel-headers:
73: Supply the location of Linux kernel headers.
74: --with-readline:
75: Support readline input (yes by default).
76: --with-openssl:
77: Specify OpenSSL directory.
78: --sysconfdir:
79: Where racoon config file goes. Default is /etc, which means
80: that racoon will look for /etc/racoon.conf
81: --localstatedir:
82: Where is the directory where racoon stores the control socket
83: (when using --enable-adminport). Default is /var, which
84: means racoon will use /var/racoon/racoon.sock
85: --prefix:
86: Where racoon gets installed.
87:
88: Q: How can I get help?
89:
90: A:
91: Always identify your operating system platforms, the versions you are
92: using (like "ipsec-tools-0.5"), and information to repeat the
93: problem. The more revelant information you supply, the better your
94: chances of getting help are. Useful informations include, depending
95: of the problem:
96: - version identification
97: - trace from racoon, taken by "racoon -d 0xffffffff"
98: (maximum debug level)
99: - configuration file you are using
100: - probabaly, tcpdump trace
101: http://orange.kame.net/dev/send-pr.html has the guideline.
102:
103: If your question is not confidential, send your questions to:
104: <ipsec-tools-devel@lists.sourceforge.net>
105:
106: If your question is confidential, send your questions to:
107: <ipsec-tools-core@lists.sourceforge.net>
108:
109: Q: Other documents to look at?
110:
111: A:
112: http://www.NetBSD.org/docs/network/ipsec/
113: http://www.kame.net/
114: http://www.kame.net/newsletter/
FreeBSD-CVSweb <freebsd-cvsweb@FreeBSD.org>