strongSwan on FreeBSD » History » Version 16
Martin Larsson, 25.10.2016 17:40
adding freebsd 11 notes
1 | 1 | Tobias Brunner | h1. strongSwan on FreeBSD |
---|---|---|---|
2 | 1 | Tobias Brunner | |
3 | 13 | Tobias Brunner | {{>toc}} |
4 | 13 | Tobias Brunner | |
5 | 11 | Tobias Brunner | Since [[4.3.4|strongSwan 4.3.4]] the IKE daemon charon runs on "FreeBSD":http://www.freebsd.org. There are still some [[FreeBSD#Limitations|limitations]] but |
6 | 11 | Tobias Brunner | it has since been tested by several users (even with an adapted version of our "test framework":http://www.strongswan.org/uml-testing.html). |
7 | 1 | Tobias Brunner | |
8 | 11 | Tobias Brunner | Please note that releases before [[5.0.0]] don't support IKEv1 because the old pluto IKEv1 daemon was not ported to FreeBSD. |
9 | 1 | Tobias Brunner | |
10 | 1 | Tobias Brunner | h2. Prepare FreeBSD |
11 | 1 | Tobias Brunner | |
12 | 1 | Tobias Brunner | The generic FreeBSD kernel does not come with IPsec support. So you will have to compile your own kernel. |
13 | 1 | Tobias Brunner | |
14 | 8 | Tobias Brunner | Fortunately, starting with FreeBSD 8, the NAT Traversal patch is included in the kernel sources, so you don't |
15 | 8 | Tobias Brunner | have to apply any patches yourself, if you need that feature. |
16 | 8 | Tobias Brunner | |
17 | 16 | Martin Larsson | Starting from FreeBSD 11, IPsec is now default in the kernel. Ff you need NAT Traversal you will have to add |
18 | 16 | Martin Larsson | "options IPSEC_NAT_T" to the kernel. |
19 | 16 | Martin Larsson | |
20 | 3 | Tobias Brunner | h3. Build the Kernel |
21 | 1 | Tobias Brunner | |
22 | 8 | Tobias Brunner | Basic documentation on how to build a custom kernel can be found in the "FreeBSD Handbook":http://www.freebsd.org/doc/handbook/kernelconfig-building.html. |
23 | 3 | Tobias Brunner | |
24 | 8 | Tobias Brunner | To enable IPsec you'll need to add the following options to your kernel configuration file: |
25 | 1 | Tobias Brunner | |
26 | 1 | Tobias Brunner | <pre> |
27 | 1 | Tobias Brunner | options IPSEC |
28 | 1 | Tobias Brunner | device crypto |
29 | 1 | Tobias Brunner | </pre> |
30 | 1 | Tobias Brunner | |
31 | 8 | Tobias Brunner | You can verify that your kernel has IPsec support using the following command, which should print a list of ipsec specific kernel state. |
32 | 2 | Tobias Brunner | |
33 | 3 | Tobias Brunner | <pre> |
34 | 3 | Tobias Brunner | /sbin/sysctl -a | grep ipsec |
35 | 1 | Tobias Brunner | </pre> |
36 | 1 | Tobias Brunner | |
37 | 8 | Tobias Brunner | If you need NAT Traversal, add the following option to your kernel config: |
38 | 1 | Tobias Brunner | |
39 | 7 | Tobias Brunner | <pre> |
40 | 1 | Tobias Brunner | options IPSEC_NAT_T |
41 | 1 | Tobias Brunner | </pre> |
42 | 1 | Tobias Brunner | |
43 | 11 | Tobias Brunner | h2. Install FreeBSD Port / Package |
44 | 11 | Tobias Brunner | |
45 | 11 | Tobias Brunner | The easiest way to install strongSwan on FreeBSD is to use the "security/strongswan":http://www.freshports.org/security/strongswan port |
46 | 11 | Tobias Brunner | |
47 | 11 | Tobias Brunner | <pre> |
48 | 11 | Tobias Brunner | cd /usr/ports/security/strongswan/ && make install clean |
49 | 11 | Tobias Brunner | </pre> |
50 | 11 | Tobias Brunner | |
51 | 15 | Tobias Brunner | or to install the binary package with |
52 | 15 | Tobias Brunner | |
53 | 15 | Tobias Brunner | <pre> |
54 | 15 | Tobias Brunner | pkg install strongswan |
55 | 15 | Tobias Brunner | </pre> |
56 | 15 | Tobias Brunner | |
57 | 15 | Tobias Brunner | or in earlier FreeBSD releases with |
58 | 11 | Tobias Brunner | |
59 | 11 | Tobias Brunner | <pre> |
60 | 11 | Tobias Brunner | pkg_add -r strongswan |
61 | 11 | Tobias Brunner | </pre> |
62 | 11 | Tobias Brunner | |
63 | 11 | Tobias Brunner | h2. Manual Installation |
64 | 11 | Tobias Brunner | |
65 | 1 | Tobias Brunner | h3. Install Packages |
66 | 1 | Tobias Brunner | |
67 | 1 | Tobias Brunner | Our test-system was installed using the Developer and Kern-Developer distributions in sysinstall. So there are maybe additional packages required on your system. |
68 | 8 | Tobias Brunner | |
69 | 8 | Tobias Brunner | The packages required to build strongSwan are as follows: |
70 | 5 | Tobias Brunner | |
71 | 1 | Tobias Brunner | * libgmp (optional, depending on configuration) |
72 | 1 | Tobias Brunner | * openssl (optional, depending on configuration) |
73 | 1 | Tobias Brunner | |
74 | 8 | Tobias Brunner | Notes: |
75 | 11 | Tobias Brunner | * The "printf-Bug":http://www.freebsd.org/cgi/query-pr.cgi?pr=kern/133776 in earlier FreeBSD releases has been fixed and backported to FreeBSD 8. Thus, the *vstr* string library is not required anymore (check the history of this wiki page for details). |
76 | 1 | Tobias Brunner | |
77 | 11 | Tobias Brunner | h3. Building strongSwan |
78 | 1 | Tobias Brunner | |
79 | 8 | Tobias Brunner | Get the "latest tarball":http://www.strongswan.org/download.html and configure strongSwan as follows (this compiles the GMP plugin, so libgmp is required). |
80 | 8 | Tobias Brunner | For details refer to [[InstallationDocumentation]]. |
81 | 1 | Tobias Brunner | |
82 | 1 | Tobias Brunner | <pre> |
83 | 1 | Tobias Brunner | ./configure --enable-kernel-pfkey --enable-kernel-pfroute --disable-kernel-netlink \ |
84 | 14 | Tobias Brunner | --disable-scripts --with-group=wheel |
85 | 8 | Tobias Brunner | </pre> |
86 | 8 | Tobias Brunner | |
87 | 11 | Tobias Brunner | Notes: |
88 | 12 | Tobias Brunner | * For releases before [[5.0.0]] you also need to add @--disable-pluto@. |
89 | 1 | Tobias Brunner | |
90 | 1 | Tobias Brunner | h2. Limitations |
91 | 1 | Tobias Brunner | |
92 | 13 | Tobias Brunner | * Before [[5.1.0]] virtual IPs could not be used on clients due to the lack of policy based routing. Since [[5.1.0]] TUN devices are created to implement this, so that FreeBSD can be used as client in road-warrior setups. |
93 | 13 | Tobias Brunner | * Before [[5.1.0]] the kernel-pfroute interface lacked several features to properly support MOBIKE. |
94 | 13 | Tobias Brunner | * Because there is currently no way to change the IP addresses of an installed IPsec SA in the FreeBSD kernel IPsec SAs are rekeyed when a client's IP address changes. "This discussion":http://forums.freebsd.org/showthread.php?p=226838 on the FreeBSD forums has more on this. |
95 | 9 | Tobias Brunner | |
96 | 9 | Tobias Brunner | h2. Known Problems |
97 | 9 | Tobias Brunner | |
98 | 10 | Tobias Brunner | * Before [[4.6.0|strongSwan 4.6.0]] [[IpsecStarter|starter]] did not use the modular kernel interfaces, thus, when it tried to detect an IPsec stack it failed: |
99 | 9 | Tobias Brunner | <pre> |
100 | 9 | Tobias Brunner | Starting strongSwan 4.x.x IPsec [starter]... |
101 | 9 | Tobias Brunner | no netkey IPsec stack detected |
102 | 9 | Tobias Brunner | no KLIPS IPsec stack detected |
103 | 9 | Tobias Brunner | no known IPsec stack detected, ignoring! |
104 | 9 | Tobias Brunner | </pre> Fortunately, this detection is not really needed on FreeBSD so simply ignore this message. |