mirror of
https://github.com/trailofbits/algo.git
synced 2025-09-04 02:53:06 +02:00
clarified file sources
This commit is contained in:
parent
74d873e702
commit
88336879f1
1 changed files with 5 additions and 5 deletions
10
README.md
10
README.md
|
@ -133,11 +133,11 @@ Set-VpnConnectionIPsecConfiguration -ConnectionName "Algo" -AuthenticationTransf
|
|||
#### Ubuntu Server 16.04 example
|
||||
|
||||
1. Install Strongswan: `sudo apt-get install strongswan strongswan-plugin-openssl` Plugin required per [StrongSwan Documentation](https://wiki.strongswan.org/projects/strongswan/wiki/IKEv2CipherSuites), as the ECP_256 DH group is supported by the openssl plugin.
|
||||
2. `/etc/ipsec.d/certs`: copy `user.crt` here
|
||||
3. `/etc/ipsec.d/private`: copy `user.key` here
|
||||
4. `/etc/ipsec.secrets`: add your `user.key` to the list, e.g. `xx.xxx.xx.xxx : ECDSA user.key`, like in `ipsec_user.secrets` but matching the `user.key` filename.
|
||||
5. `/etc/ipsec.conf`: add the connection from `ipsec_user.conf` and update the value for `leftcert` to match the `user.crt` filename.
|
||||
6. `/etc/ipsec.d/cacerts`: copy `cacert.pem` here
|
||||
2. `/etc/ipsec.d/certs`: copy `user.crt` here from `algo-master/configs/<name>/pki/certs/`.
|
||||
3. `/etc/ipsec.d/private`: copy `user.key` here from `algo-master/configs/<name>/pki/private`.
|
||||
4. `/etc/ipsec.d/cacerts`: copy `cacert.pem` here from `algo-master/configs/<name>/cacert.pem`.
|
||||
5. `/etc/ipsec.secrets`: add your `user.key` to the list, e.g. `xx.xxx.xx.xxx : ECDSA user.key`, like in `ipsec_user.secrets` but matching the `user.key` filename.
|
||||
6. `/etc/ipsec.conf`: add the connection from `ipsec_user.conf` and update the value for `leftcert` to match the `user.crt` filename.
|
||||
7. `sudo ipsec restart`: pick up config changes
|
||||
8. `sudo ipsec up <conn-name>`: start the ipsec tunnel
|
||||
9. `sudo ipsec down <conn-name>`: shutdown the ipsec tunnel
|
||||
|
|
Loading…
Add table
Reference in a new issue