Huh? ipsec(4)On FreeBSD not so easy. Lack of IPSec.
That thing is just an implementation of Cisco AnyConnect protocol. Cisco in turn uses an ancient version of OpenSSL to "encrypt" the traffic. Typically AnyConnect server can be commonly found at the organizations which are poorly staffed because the turn key appliance can be bought fairly inexpensively (couple thousands dollars). I would not use AnyConnect for anything that requires serious security. Beyond the point the client for AnyConnect server is anything but commonly found even for "normal" OSs let alone for hand held devices. Hand held devices typically come only with L2PT/IPsec clients. You can check your smart phone, Kindel or whatever you have if you don't trust me. That is why I suggested L2PT/IPsec. Configuring L2PT/IPsec server is trivial on OpenBSD but next to impossible on FreeBSD due to the lack of native IPSec client and npppd daemon. The easiest VPN solution is OpenVPN server but installing and using OpenVPN client on hand held devices is no something my grand mother or for that mater most of users are capable of doing.You can try net/ocserv.
That thing is just an implementation of Cisco AnyConnect protocol. Cisco in turn uses an ancient version of OpenSSL to "encrypt" the traffic. Typically AnyConnect server can be commonly found at the organizations which are poorly staffed because the turn key appliance can be bought fairly inexpensively (couple thousands dollars). I would not use AnyConnect for anything that requires serious security. Beyond the point the client for AnyConnect server is anything but commonly found even for "normal" OSs let alone for hand held devices.
Hand held devices typically come only with L2PT/IPsec clients. You can check your smart phone, Kindel or whatever you have if you don't trust me. That is why I suggested L2PT/IPsec. Configuring L2PT/IPsec server is trivial on OpenBSD but next to impossible on FreeBSD due to the lack of native IPSec client and npppd daemon..
Only my curiosity, for what would I need several routes on my smartphone? I set up L2TP/IPsec on my FreeBSD home server and when on travel I usually connect to the internet via VPN and let all the traffic goe over the VPN. So, why would I need some VPN traffic going another route and which route might this be? Sorry for the lack of my imagination....
What if I want to push several routes to a VPN client ? If I am not mistaken L2TP just adds a classful route and there is no way to add another routes automatically. If this needs to be done on a smartphone or a tablet, it becomes a hard quest for a simple user. ...
... Regarding L2TP/IPSEC, you need to patch kernel and racoon sources to get it working (did not test it yet using strongswan), but if 2 devices will attempt to connect to the same router behind one NAT, that will destroy work for both user. Plus SAs sometimes are not deleted automatically so you are not able reconnect immediately. ...
I don't need to patch anything. I use OpenBSD and configuring L2PT/IPsec is a 5 minutes thingRegarding L2TP/IPSEC, you need to patch kernel and racoon sources to get it working
... I just don't get why in the world FreeBSD people prefer Strongswan over OpenIKED
Unless my wife is putting something funny into my meals to make me hallucinate I am pretty sure that at this very moment I have over 50 L2PT/IPsec clients on several network I manage connected via OpenBSD gateway running OpenIKED and npppd.
- OpenIKED does IKEv2 only, strongSwan does IKEv1 and IKEv2,
the built-in L2TP/IPsec clients that I know of, require IKEv1 in transport mode,
and OpenIKED cannot be used for that.
http://www.openiked.org said:OpenIKED is a FREE implementation of the Internet Key Exchange (IKEv2) protocol which performs mutual authentication and which establishes and maintains IPsec VPN security policies and associations (SAs) between peers. The IKEv2 protocol is defined in RFC 5996, which combines and updates the previous standards: ISAKMP/Oakley (RFC 2408), IKE (RFC 2409), and the Internet DOI (RFC 2407). OpenIKED only supports the IKEv2 protocol; support for ISAKMP/Oakley and IKEv1 is provided by OpenBSD's isakmpd(8) or other implementations on non-OpenBSD platforms.
Only my curiosity, for what would I need several routes on my smartphone? I set up L2TP/IPsec on my FreeBSD home server and when on travel I usually connect to the internet via VPN and let all the traffic goe over the VPN. So, why would I need some VPN traffic going another route and which route might this be? Sorry for the lack of my imagination.
For Windows L2TP/IPsec connectivity with StrongSwan, a single kernel patch is needed, after this it works well. I can concurrently connect several clients, namely Mac OS X and iOS and ONE Windows, from behind the same NAT to the L2TP/IPsec server (net/mpd5 + security/strongswan). I got only one Windows client, and therefore I could not test my system with several Windows clients, however some I have some doubts that this would work, because the built-in Windows client does not change NAT-T traffic from 4500 to an ephemeral port, Mac OS X and iOS do.
Without patching the kernel, I managed to connect Windows via IKEv2-IPsec to my home server running StrongSwan.
I don't need to patch anything. I use OpenBSD and configuring L2PT/IPsec is a 5 minutes thing.
I just don't get why in the world FreeBSD people prefer Strongswan over OpenIKED
That is a good point for personal usage. If we are talking about business, usually VPN clients do not have access to internet over VPN. They only need to have access to appropriate resources. Regarding several routes. Lets say I need access to:
1. Server mgmt vlan
2. Voice vlan
3. Remote access vlan (access to your PC or terminal server)
Each vlan is a separate subnet. How do I suppose to have 3 routes with L2TP ? Adding static routes on a smartphone is a real pain in the ass.