Hi,

On Tue, 13.04.2010 at 17:42:52 +0200, Toni Mueller <openbsd-t...@oeko.net> 
wrote:
> Authorizer: "mobile-certs"
> Comment: need to list all certificates for mobile users in the licensees 
> section
> Licensees: "DN:/Cert/Of/User1" ||
>           "DN:/Cert/Of/User2"
> Conditions: app_domain == "IPsec policy"
>         && esp_present == "yes"
>         && esp_enc_alg == "aes"
>         && phase_1 == "main"
>         && phase1_group_desc == "5"
>         && esp_encapsulation == "tunnel"
>         && esp_auth_alg == "hmac-sha"
>         && ( esp_key_length == "256" || esp_key_length == "128" )
>         && remote_filter_type == "IPv4 address"
>         && remote_filter == "192.168.003.000-192.168.003.255"
>         && remote_filter_addr_lower == "192.168.003.000"
>         && remote_filter_addr_upper == "192.168.003.255"
>         && pfs == "yes" 
>         && remote_id_type == "User FQDN"
>         && ( remote_id == "us...@example.com" || remote_id == 
> "us...@example.com" ) -> "true";

I've now made sure to retry with "IPv4 subnet" instead of "IPv4
address", but with exactly the same result. Isakmpd logs the following,
which I have to find out whether this is generated somewhere within
isakmpd, or sent by the client:

...
@400000004bc5aacc2ce2c2c4 134506.752860 Plcy 80 remote_filter_type == IPv4 
subnet
@400000004bc5aacc2ce2da34 134506.752864 Plcy 80 remote_filter_addr_upper == 
255.255.255.255
@400000004bc5aacc2ce30cfc 134506.752870 Plcy 80 remote_filter_addr_lower == 
000.000.000.000
@400000004bc5aacc2ce3340c 134506.752882 Plcy 80 remote_filter == 
000.000.000.000-255.255.255.255
@400000004bc5aacc2ce343ac 134506.752888 Plcy 80 remote_filter_port == 0
@400000004bc5aacc2ce37a5c 134506.752894 Plcy 80 remote_filter_proto == 0
@400000004bc5aacc2ce3ad24 134506.752904 Plcy 80 local_filter_type == IPv4 subnet
@400000004bc5aacc2ce3cc64 134506.752914 Plcy 80 local_filter_addr_upper == 
255.255.255.255
@400000004bc5aacc2ce3eba4 134506.752921 Plcy 80 local_filter_addr_lower == 
000.000.000.000
@400000004bc5aacc2ce3fb44 134506.752933 Plcy 80 local_filter == 
000.000.000.000-255.255.255.255
@400000004bc5aacc2ce40ecc 134506.752942 Plcy 80 local_filter_port == 0
@400000004bc5aacc2ce44d4c 134506.752949 Plcy 80 local_filter_proto == 0
@400000004bc5aacc2ce4745c 134506.752972 Plcy 80 remote_id_type == User FQDN
@400000004bc5aacc2ce48bcc 134506.752980 Plcy 80 remote_id_addr_upper == 
@400000004bc5aacc2ce4c664 134506.752989 Plcy 80 remote_id_addr_lower == 
@400000004bc5aacc2ce4d9ec 134506.752995 Plcy 80 remote_id == us...@example.com
@400000004bc5aacc2ce51484 134506.753003 Plcy 80 remote_id_port == 0
@400000004bc5aacc2ce53f7c 134506.753022 Plcy 80 remote_id_proto == 0
@400000004bc5aacc2ce54f1c 134506.753028 Plcy 80 remote_negotiation_address == 
088.128.046.032
@400000004bc5aacc2ce5c44c 134506.753038 Plcy 80 local_negotiation_address == 
193.221.127.062
@400000004bc5aacc2ce5d3ec 134506.753044 Plcy 80 pfs == yes
@400000004bc5aacc2ce6397c 134506.753053 Plcy 80 initiator == no
@400000004bc5aacc2ce66474 134506.753057 Plcy 80 phase1_group_desc == 5
@400000004bc5aacc2ce677fc 134506.753155 Plcy 40 check_policy: kn_do_query 
returned 1


Stay tuned for another hack... :/


-- 
Kind regards,
--Toni++

Reply via email to