Racoon ipsec configuration with GSSAPI/kerberos
Anandan
anandhm_psg at yahoo.com
Mon May 25 22:59:23 EDT 2009
T. M. Pederson-5 wrote:
>
> In article <mailman.70.1242326363.9729.kerberos at mit.edu>,
> Anandan <anandhm_psg at yahoo.com> writes:
>>
>> Hi,
>> I have been trying to configure ipsec between two machines with
>> kerberos..I
>> have one Windows 2003 server which has active directory configured...
>> these
>> two linux machines are connected to that Windows machine...
>> I am not able to get any proper documentation on how to use kerberos with
>> racoon..
>> Any help would be appreciated..
>
> Racoon works with Kerberos through GSSAPI, and only for Phase 1. I've
> been working with some Racoon/Heimdal installations on *BSD and the
> occasional Linux box, where the configuration (racoon.conf) has generally
> had the phase 1 section as:
> --------
> # No address lookup by name in this implementation, so this file needs
> # a remote inherit section for EACH OTHER ADDRESS a host has.
>
> remote <host_address> {
> exchange_mode main;
>
> lifetime time 24 hour;
>
> proposal {
> encryption_algorithm 3des;
> hash_algorithm sha1;
> authentication_method gssapi_krb;
> # For compatibility, use the GSS-API ID "host/fqdn",
> # where fqdn is the output of the hostname(1)
> # command. You probably want this to match your system's
> # host principal. ktutil(8)'s "list" command will list
> # the principals in your system's keytab. If you need
> # to, you can change the GSS-API ID here.
> # Older implementations used "ike/fqdn"
> gss_id "host/fqdn";
>
> dh_group 1;
> }
>
> # Used by client hosts (initiators). Should be off for servers.
> generate_policy on;
> }
>
> --------
>
> Note that you could instead use the usual "anonymous" instead of an
> address if you're going with the same phase 1 between all machines.
>
> Also, depending on implementation, encyrption_algorithm may be 3des
> or aes (I've been working with both).
>
> The rest of the Racoon configuration (phase 2, etc.) is independent
> of Kerberos and is covered by the standard documentation.
>
> Just had a jump from Heimdal 0.x to 1.1 and it looks like racoon
> needs to adjust for an API change to work with the new Heimdal. Still
> tracking down what's going on with that combo. Otherwise, Racoon
> w/Heimdal 0.6 and 0.7 has been working just fine. I have no experience
> with Racoon interacting with MIT or MS Kerberos implementations.
> --
> T. M. Pederson <tmp+rnpc at disfinite.org>
> GPG key fingerprint = FFAF D056 F12B E03F 7084 1288 EF8B E1FE 1693 21EB
> +Accept: text/plain; charset=ISO-8859-*,UTF-*
> ________________________________________________
> Kerberos mailing list Kerberos at mit.edu
> https://mailman.mit.edu/mailman/listinfo/kerberos
>
>
Thanks for the information. I think this case will work between two linux
machines.
Is it possible to configure racoon with kerberos between a linux machine and
a windows machine??
Thanks,
Anandan
--
View this message in context: http://www.nabble.com/Racoon-ipsec-configuration-with-GSSAPI-kerberos-tp23538533p23716179.html
Sent from the Kerberos - General mailing list archive at Nabble.com.
More information about the Kerberos
mailing list