⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 readme

📁 ike协商阶段证书认证补丁 for freeswan
💻
📖 第 1 页 / 共 3 页
字号:
Installation and Configuration Guide------------------------------------     X.509 - Version 1.6.3Contents   1. Summary   2. Acknowledgements   3. Installation	3.1 The X.509 distribution	3.2 Installing the X.509 patch	3.3 Enabling dynamic CRL fetching via LDAP	3.4 Enabling dynamic CRL or OCSP fetching via cURL  (NEW)	3.5 Compiling and installing FreeS/WAN with X.509   4. Configuring the connections - ipsec.conf	4.1 Configuring my side	4.2 Multiple certificates	4.3 Configuring the peer side using CA certificates	4.4 Handling Virtual IPs and wildcard subnets	4.5 Protocol and port selectors  (NEW)	4.6 IPsec policies based on wildcards	4.7 IPsec policies based on CA certificates	4.8 Sending certificate requests   5. Configuring certificates and CRLs	5.1 Installing CA certificates	5.2 Installing optional Certificate Revocation Lists (CRLs)	5.3 Dynamic update of certificates and CRLs	5.4 Online Certificate Status Protocol (OCSP) (NEW)	5.5 CRL policy	5.6 Configuring the peer side using locally stored certificates   6. Configuring the private keys - ipsec.secrets	6.1 Loading private key files in PKCS#1 format	6.2 Entering passphrases interactively	6.3 Multiple private keys   7. Generating X.509 certificates and CRLs with OpenSSL	7.1 Generating a CA certificate	7.2 Generating a host or user certificate	7.3 Generating a CRL	7.4 Revoking a certificate   8. Configuring CA properties - ipsec.conf (NEW)   9. Smartcard Support	9.1 Compiling FreeS/WAN with smartcard support	9.2 Configuring a smartcard-based connection	9.3 Entering the PIN code	9.4 Configuring a smartcard using pkcs15-init  10. Configuring the clients	10.1 FreeS/WAN	10.2 PGPnet	10.3 Safenet/Soft-Remote	10.4 SSH Sentinel	10.5 Windows 2000/XP  11. Monitoring functions  12. Firewall support functions       12.1 Environment variables in the updown script       12.2 Sample updown script for iptables  13. Using the patch with standard FreeS/WAN and raw RSA keys  14. Using the patch with OpenPGP certificates       14.1 OpenPGP certificates       14.2 OpenPGP private keys       14.3 Monitoring functions       14.4 Suppression of certificate request messages1. Summary   -------The X.509 patch supports RSA-based authentication using X.509 or OpenPGPcertificates between a Linux FreeS/WAN security gateway and an unlimitednumber of IPsec peers.  - Version 0.9 of the patch introduced Certification Authorities (CAs),    hierarchical trust chains and Certificate Revocation Lists (CRLs),    thereby eliminating the need to store peer certificates locally on    the Linux security gateway.  - Version 0.9.10 introduced support of multiple certificates and    corresponding private keys as described in sections 4.2 and 6.2.  - Version 1.0.0 improved the support of OpenPGP certificates which    can now be used concurrently with X.509 certificates. For details    consult section 13.  - Version 1.1.0 introduced  dynamic CRL fetching supporting http,    ftp, file and ldap crlDistributionPoints. For details refer to    sections 3.3 and 5.3.  - Version 1.1.1 introduced protocol and port selectors for outbound    IPsec SAs.  - Version 1.2.0 brought IPsec policies based on wildcards(*)    in distinguished names (ID_DER_ASN1_DN). For details see section 4.6.  - Version 1.3.0 introduced IPsec policies based on certification    authorities (several root and/or intermediate CAs). This feature    facilitates the setup of extranets giving restricted VPN access to third    parties (e.g. customers or suppliers). For details refer to section 4.7.      - Version 1.4.0 brought smartcard support. The functionality is based on    the PKCS#15 cryptotoken interface provided by the OpenSC project.    For details see section 8.      - Version 1.5.0 introduces full support of the Online Certificate Status    Protocol (OCSP) defined by RFC 2560 which can serve as an alternative to    CRLS.Compatibility has successfully been tested with peers running the followingIPsec clients:  FreeS/WAN, PGPnet, SafeNet/Soft-PK, SafeNet/SoftRemote, SSH Sentinel,  Microsoft Windows 2000/XP, CheckPoint VPN-1 NG.Furthermore, interoperability with the following VPN gatewayshas been demonstrated during the IPsec 2001 Conference in Paris:  Cisco IOS Routers, Cisco PIX firewall, Cisco VPN3000,  Nortel Contivity VPN Switch, NetScreen (FreeS/WAN as responder only),  OpenBSD with isakmpd, Netasq, Netcelo, and 6WIND.Potentially any IPsec implementation with X.509 certificate support canbe made to cooperate with X.509-enabled FreeS/WAN. The latest addition has been the successful interoperability with the Check Point VPN-1 NG gateway.2. Acknowledgements   ----------------Major contributions to the X.509 patch for Linux FreeS/WAN have come from  - Marco Bertossa, Christoph Gysin, Andreas Hess, Patric Lichtsteiner    Andreas Schleiss, Roger Wegmann, and Simon Zwahlen, all former students    of the Zurich University of Applied Sciences in Winterthur (Switzerland).       - The support of Virtual IPs and the DHCP-over-IPsec protocol was    implemented by Mario Strasser, former research assistant at the ZHW.  - Stephane Laroche from Colubris has contributed dynamic CRL fetching.  - Stephen J. Bevan has contributed the enforcement of port and protocol    selectors on outbound traffic based on extended eroutes.  - Mathieu Lafon contributed the exchange of Notification messages.  - The X.509 patch also integrates the original contribution by Kai Martius    supporting RSA based authentication using OpenPGP certificates and PGP's    proprietary Key IDs.The development of the X.509 patch is coordinated by Andreas Steffen,professor for security and communications at the ZHW.3. Installation   ------------3.1 The X.509 distribution    ----------------------The X.509 patch distribution contains the following files:+----------------------------------------------------------------------------+| README                   This installation and configuration guide         ||----------------------------------------------------------------------------|| CHANGES                  Change history for the X.509 patch                ||----------------------------------------------------------------------------|| freeswan.diff            Patch for the freeswan directory                  ||----------------------------------------------------------------------------|| ipsec.secrets.template   Template for /etc/ipsec.secrets                   |+----------------------------------------------------------------------------+3.2. Installing the X.509 patch     --------------------------Copy the patch freeswan.diff to the FreeS/WAN directory and type:     patch -p1 < freeswan.diffThis applies all necessary changes to the FreeS/WAN source code.3.3 Enabling dynamic CRL fetching via LDAP    --------------------------------------    By default LDAP support will not be compiled into Pluto. In order toenable dynamic LDAP URL fetching on of the two following lines must beuncommented in the programs/pluto/Makefile:  # Uncomment this line to enable dynamic CRL fetching using LDAP V3  LDAP_VERSION=3  # Uncomment this line to enable dynamic CRL fetching using LDAP V2  #LDAP_VERSION=2Compilation will be successful only if the OpenLDAP 2.x header filesand the ldap library are present. The latest OpenLDAP releases requirethe LDAP V3 protocol whereas older versions use LDAP V2.3.4 Enabling dynamic CRL or OCSP fetching via cURL    ----------------------------------------------Dynamic CRL fetching via file, http, and ftp URLs, as well as OCSP queriestransported via http require the libcurl library available from"http://curl.haxx.se". Since libcurl support is not compiled into Pluto bydefault, it must be activated explicitly by uncommenting the following linein programs/pluto/Makefile:  # Uncomment this line to enable OCSP and dynamic CRL fetching using HTTP  LIBCURL=13.5 Compiling and Installing FreeS/WAN with X.509    ---------------------------------------------After you have applied the X.509 patch, compilation and installation is donein exactly the same way as with standard FreeS/WAN. Please consult theFreeS/WAN documentation for the details.In order to compile and install the userland programs, change into theFreeS/WAN top source directory and type    make programsfollowed by    make install.With the introduction of the protocol and port selectors in version 0.9.16it is now also necessary to recompile the kernel part of FreeS/WAN. Ifyou want to build KLIPS as a module then you can do this with the command    make moduleAfter successful module compilation, copy the module   ./linux/net/ipsec/ipsec.ointo the directory   /lib/modules/<kernel version>/kernel/net/ipsecAs a last step you must restart IPsec to enable the X.509 features    ipsec setup restart4. Configuring the connections - ipsec.conf   ----------------------------------------4.1 Configuring my side    -------------------Usually the local side is the same for all connections. Therefore it makessense to put the definitions characterizing the FreeS/WAN security gateway intothe conn %default section of the configuration file /etc/ipsec.conf. If weassume throughout this document that the FreeS/WAN security gateway is left andthe peer is right then we can writeconn %default     # use RSA based authentication with certificates     authby=rsasig     rightrsasigkey=%cert     # my side is left - the freeswan security gateway     left=160.85.22.2     leftcert=pulpoCert.pem     # load connection definitions automatically     auto=addThe X.509 certificate by which the FreeS/WAN security gateway will authenticateitself by sending it in binary form to its peers as part of the Internet KeyExchange (IKE) is specified in the line     leftcert=pulpoCert.pemThe certificate can either be stored in base64 PEM-format or in the binaryDER-format. Irrespective of the file suffix, Pluto "automagically" determinesthe correct format. Therefore     leftcert=pulpoCert.deror     leftcert=pulpoCert.cerwould also be valid alternatives.When using relative pathnames as in the examples above, the certificate filesmust be stored in in the directory /etc/ipsec.d/certs. In order to distinguishFreeS/WAN's own certificates from locally stored trusted peer certificates(see section 5.5 for details), they could also be stored in a subdirectorybelow /etc/ipsec.d/certs as e.g. in    leftcert=mycerts/pulpoCert.pemAbsolute pathnames are also possible as in    leftcert=/usr/ssl/certs/pulpoCert.pemAs an ID for the VPN gateway we recommend the use of a Fully Qualified DomainName (FQDN) of the formconn rw     right=%any     leftid=@pulpo.strongsec.comImportant: When an FQDN identifier is used it must be explicitly included as aso called subjectAltName of type dnsName (DNS:) in the certificate indicatedby leftcert. For details on how to generate certificates with subjectAltNames,

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -