Description of problem:
Several bugs in latest ipsec-tools-0.7 prevent successful use as
a remote-access (road-warrior) client to a Cisco ASA 5500 vpn concentrator.
Attached are three patches which were also submitted to the upstream mailing
list which fix this problem.
Also attached are some packaging improvements: a phase1 mode config script,
an init script for the racoon daemon, and patches for the spec file to
incorporate the above mentioned patches and scripts.
Version-Release number of selected component (if applicable):
0.7
How reproducible:
Attempt to connect to a Cisco ASA in remote-access client mode with racoon.
Steps to Reproduce:
1. Configure racoon to connect to a Cisco ASA as suggested in the enclosed
racoon.conf example.
2. Start racoon daemon
3. run 'racoonctl vc <IP-of-Cisco-ASA>
Actual results:
vpn session fails to be established
Expected results:
successfully establish a vpn session
Additional info:
uploading tarball with the following content:
ipsec-tools.spec.diff changes to spec file
racoon.conf.diff changes to included config.file
ipsec-tools-0.7-cvs-dupmode.patch patch to handle dupe mode config packets
ipsec-tools-0.7-cvs-dupsplit.patch patch to handle dupe split networks
ipsec-tools-0.7-cvs-iface.patch patch to set SO_REUSEADDR on sockets
p1_up_down phase1 mode config script
racoon.init init script for racoon daemon
Description of problem:
Several bugs in latest ipsec-tools-0.7 prevent successful use as
a remote-access (road-warrior) client to a Cisco ASA 5500 vpn concentrator.
Attached are three patches which were also submitted to the upstream mailing
list which fix this problem.
Also attached are some packaging improvements: a phase1 mode config script,
an init script for the racoon daemon, and patches for the spec file to
incorporate the above mentioned patches and scripts.
Version-Release number of selected component (if applicable):
0.7
How reproducible:
Attempt to connect to a Cisco ASA in remote-access client mode with racoon.
Steps to Reproduce:
1. Configure racoon to connect to a Cisco ASA as suggested in the enclosed
racoon.conf example.
2. Start racoon daemon
3. run 'racoonctl vc <IP-of-Cisco-ASA>
Actual results:
vpn session fails to be established
Expected results:
successfully establish a vpn session
Additional info:
uploading tarball with the following content:
ipsec-tools. spec.diff changes to spec file 0.7-cvs- dupmode. patch patch to handle dupe mode config packets 0.7-cvs- dupsplit. patch patch to handle dupe split networks 0.7-cvs- iface.patch patch to set SO_REUSEADDR on sockets
racoon.conf.diff changes to included config.file
ipsec-tools-
ipsec-tools-
ipsec-tools-
p1_up_down phase1 mode config script
racoon.init init script for racoon daemon