Re: VPN through BSD for Win2k, totally baffled
From: Greg Panula (greg.panula_at_dolaninformation.com)
Date: Thu, 08 May 2003 06:39:15 -0500 To: Michael Collette <firstname.lastname@example.org>
Michael Collette wrote:
> FreeBSD box running IPFW acting as a gateway to private network. The private
> network is made up of entirely routeable IP addresses. External users
> running Win2k and XP on DSL connections with dynamic IPs.
> To have the FreeBSD gateway securely authenticate and encrypt the traffic
> between the outside users and the internal network.
> I've spent the last 3 days running up and down Google and reading any books
> that approach the subject of setting up a VPN. The further down this road
> I've travelled the more confused I am.
> I assume the following:
> * Need to have a certificate setup with OpenSSL.
> * Racoon needs to deal with a key exchange.
> * Some kind of tunneling gets put into play.
> * Setkey needs appropriate policies.
> I happened across the Google cache of a tutorial that seems to cover this
> subject. There seems to be a couple of key points missing, as well as some
> apparently out of date syntax. I did manage to create a CA and client cert
> from a mix of this tutorial and the AbsoluteBSD book.
> Managed to get a certificate generated from that process installed on a test
> XP box per the following...
> Where I totally lost it was on the FreeBSD setup. The author is referring to
> certificates that he never described how they should be created. I didn't
> know what in the heck to do here.
> Am I even on the right path? Aside from this one tutorial I've been through
> several others, as well as looking at a variety of IPSec related pages.
> There's obviously a number of different approaches out there to take, but I'm
> simply looking for one that works. Just to know that I'm heading in the
> correct direction or not would be an incredible help.
Handy links, thanks. <warning>Haven't done certs+ipsec, yet... only
It looks like you are on the right path.
The first link walks one thru creating the needed certs; CA aka
Certificate Authority(_the_ source for all certs), cert for the
gateway(vpn server) and cert for the user.
Second link walks one thru importing two Certs into the windows box; CA
and user cert.
Third link where you get lost talks about where to put the gateway & CA
cert. The gateway certificate is the one you created under section 2.4
on the first link. Look at the last two openssl lines in section 2.4 on
that first link. It is creating a certificate for the vpn
server(server-signed.pem) signed by the CA you created and the last line
outputs a decrypted private key(server-key.pem) for racoon to use with
the signed certificate.
Hope that helps,
email@example.com mailing list
To unsubscribe, send any mail to "firstname.lastname@example.org"