Annotation of embedaddon/ipsec-tools/src/racoon/doc/FAQ, revision 1.1.1.1

1.1       misho       1: This document is derived from the KAME racoon FAQ. Some answers do not
                      2: apply to ipsec-tools (they are obsolete or not up to date). They are
                      3: tagged [KAME]
                      4: 
                      5: Q: With what other IKE/IPsec implementation racoon is known to be interoperable?
                      6: 
                      7: A: [KAME]
                      8:        See "IMPLEMENTATION" document supplied with KAME kit, or:
                      9:        http://www.kame.net/dev/cvsweb.cgi/kame/IMPLEMENTATION
                     10:        As we have tested/got test reports in the past, and our end and
                     11:        the other end may have changed their implemenations, we are not sure
                     12:        if we can interoperate with them today (we hope them to interoperate,
                     13:        but we are not sure).
                     14:        Also note that, IKE interoperability highly depends on configuration
                     15:        on both ends.  You must configure both ends exactly the same.
                     16: 
                     17: Q: How can I make racoon interoperate with <IKE/IPsec implementation>?
                     18: 
                     19: A:
                     20:        Configure both ends exactly the same.  With just a tiny little
                     21:        difference, you will be in trouble.
                     22: 
                     23: Q: How to build racoon on my platform?
                     24: 
                     25: A: 
                     26:        As usual: configure && make && make install
                     27:        ipsec-tools is also available as a package in the NetBSD pkgsrc
                     28: 
                     29: Q: Describe me the options to "configure".
                     30: 
                     31: A:
                     32:        --enable-adminport:
                     33:                Lets racoon to listen to racoon admin port, which is to
                     34:                be contacted by racoonctl(8).
                     35:        --enable-natt:
                     36:                Enable NAT-Traversal. This needs kernel support, which is
                     37:                available on Linux. On NetBSD, NAT-Traversal kernel support
                     38:                has not been integrated yet, you can get it from here:
                     39:                http://ipsec-tools.sourceforge.net/netbsd_nat-t.diff
                     40:                If you live in a country where software patents are legal,
                     41:                using NAT-Traversal might infringe a patent. 
                     42:        --enable-broken-natt:
                     43:                When ipsec-tools is built with --enable-natt, racoon 
                     44:                sets IKE ports in SAD and SPD so that the kernel is 
                     45:                able to ditinguish peers hidden behind the same NAT.
                     46:                Some kernel will not cope with that ports. Use that
                     47:                option to force the ports to 0 in SAD ans SPD. Of 
                     48:                course this means that you cannot have multiple peers
                     49:                behind the same NAT.
                     50:        --enable-frag:
                     51:                Enable IKE fragmentation, which is a workaround for 
                     52:                broken routers that drop fragmented packets
                     53:        --enable-hybrid:
                     54:                Enable hybrid authentication, and ISAKMP mode config and
                     55:                Xauth as well. Note that plain Xauth (without hybrid auth)
                     56:                is not implemented.
                     57:        --with-libradius:
                     58:                Enable the use of RADIUS with hybrid authentication on the
                     59:                server side. RADIUS is used for authentication, configuration
                     60:                and accounting.
                     61:        --with-libpam:
                     62:                Enable the use of PAM with hybrid authentication on the 
                     63:                server side. PAM can be used for authentication and accounting.
                     64:        --enable-gssapi:
                     65:                Enable GSS-API, for Kerberos V support.
                     66:        --enable-stats: 
                     67:                Enable statistics logging function.
                     68:        --enable-samode-unspec: 
                     69:                Enable to use unspecified a mode of SA.
                     70:        --enable-ipv6:
                     71:                Enable IPv6 support.
                     72:        --with-kernel-headers:
                     73:                Supply the location of Linux kernel headers.
                     74:        --with-readline:
                     75:                Support readline input (yes by default).
                     76:        --with-openssl:
                     77:                Specify OpenSSL directory.
                     78:        --sysconfdir:
                     79:                Where racoon config file goes. Default is /etc, which means
                     80:                that racoon will look for /etc/racoon.conf
                     81:        --localstatedir:
                     82:                Where is the directory where racoon stores the control socket
                     83:                (when using --enable-adminport). Default is /var, which 
                     84:                means racoon will use /var/racoon/racoon.sock
                     85:        --prefix:
                     86:                Where racoon gets installed. 
                     87: 
                     88: Q: How can I get help?
                     89: 
                     90: A: 
                     91:        Always identify your operating system platforms, the versions you are
                     92:        using (like "ipsec-tools-0.5"), and information to repeat the
                     93:        problem.  The more revelant information you supply, the better your 
                     94:        chances of getting help are. Useful informations include, depending
                     95:        of the problem: 
                     96:        - version identification
                     97:        - trace from racoon, taken by "racoon -d 0xffffffff"
                     98:                (maximum debug level)
                     99:        - configuration file you are using
                    100:        - probabaly, tcpdump trace
                    101:        http://orange.kame.net/dev/send-pr.html has the guideline.
                    102: 
                    103:        If your question is not confidential, send your questions to:
                    104:        <ipsec-tools-devel@lists.sourceforge.net>
                    105: 
                    106:        If your question is confidential, send your questions to:
                    107:        <ipsec-tools-core@lists.sourceforge.net>
                    108: 
                    109: Q: Other documents to look at?
                    110: 
                    111: A:
                    112:        http://www.NetBSD.org/docs/network/ipsec/
                    113:        http://www.kame.net/
                    114:        http://www.kame.net/newsletter/

FreeBSD-CVSweb <freebsd-cvsweb@FreeBSD.org>