strongSwan on FreeBSD » History » Version 4

Version 3 (Tobias Brunner, 14.07.2009 18:07) → Version 4/21 (Tobias Brunner, 14.07.2009 22:13)

h1. strongSwan on FreeBSD

The IKEv2 daemon charon has recently been ported to "FreeBSD": There are some [[FreeBSD#Limitations|limitations]] and it is not thoroughly tested.

This document describes how to install strongSwan on FreeBSD 7.2.

h2. Prepare FreeBSD

The generic FreeBSD kernel does not come with IPsec support. So you will have to compile your own kernel.
Also, the kernel sources do not include NAT traversal. If you need that, you'll have to apply a patch.
Then you will also need some additional packages to compile strongSwan.

h3. Build the Kernel

Basic information on how to build a custom kernel can be found in the "FreeBSD Handbook": Handbook":

You'll need to add the following options to your kernel configuration file:

options IPSEC
device crypto

You can verify that your kernel has IPsec support using the following command. Which should print a list of ipsec specific kernel state.

/sbin/sysctl -a | grep ipsec

If you need NAT Traversal, apply one of the "patches": provided by Yvan Vanhullebus. Then add the following option to your kernel config.

options IPSEC_NAT_T

h3. Install Packages

Our test-system was installed using the Developer and Kern-Developer distributions in sysinstall. So there are maybe additional packages required on your system.

The packages required to build strongSwan are as follows:

* Build system:
** automake110
** automake-wrapper
** autoconf262
** autoconf-wrapper
** libtool
** bison
* Libraries
** vstr
** libgmp
** libgcrypt

* *bison* is required because our parsers are not fully YACC compatible.
* Although FreeBSD supports the GNU specific register_printf_function function, the implementation in the C library contains a "bug": that prevents this from working in a multi-thread program. Therefore the *vstr* string library is required.
* *libgcrypt* is required because our configure script depends on some M4 macros provided by it.

h2. Building strongSwan

Get the latest tarball and configure strongSwan as follows:

./configure --enable-kernel-pfkey --enable-kernel-pfroute --disable-kernel-netlink --enable-vstr --disable-tools --disable-pluto --with-lib-prefix=/usr/local

h2. Limitations

* Due to the lack of policy based routes, virtual IPs can not be used (client-side).
* The kernel-pfroute interface lacks some final tweaks to fully support MOBIKE.