Heureka, es ist ist möglich eine VPN-Verbindung mit SSH Sentinel und einem preshared secret auf ein folgendermassen konfiguriertes OpenBSD Gateway zu etablieren.
Verwendet wurde OpenBSD 3.3
# vi /etc/sysctl.conf
net.inet.esp.enable=1
net.inet.ah.enable=1
# sysctl -w net.inet.esp.enable=1
# sysctl -w net.inet.ah.enable=1
# vi /etc/isakmpd/isakmpd.conf
[Phase 1]
Default= ISAKMP-clients
[Phase 2]
Passive-Connections= IPsec-clients
[ISAKMP-clients]
Phase= 1
Configuration= Default-main-mode
Authentication= some-secret-passphrase
[IPsec-clients]
Phase= 2
Configuration= Default-quick-mode
Local-ID= Local-net
Remote-ID= Remote-host
[Local-net]
ID-type= IPV4_ADDR_SUBNET
Network= 192.168.1.0
Netmask= 255.255.255.0
[Remote-host]
ID-type= IPV4_ADDR_SUBNET
Network= 0.0.0.0
Netmask= 0.0.0.0
[Default-main-mode]
EXCHANGE_TYPE= ID_PROT
Transforms= 3DES-SHA
[Default-quick-mode]
DOID= IPSEC
EXCHANGE_TYPE= QUICK_MODE
Transforms= 3DES-SHA
Suites= QM-ESP-3DES-SHA-PFS-SUITE
# vi /etc/isakmpd/isakmpd.policy
Keynote-version: 2
Authorizer: “POLICY”
Conditions: app_domain == “IPsec policy” &&
esp_present == “yes” &&
esp_enc_alg != “null” -> “true”;
# vi /etc/pf.conf
# VPN
pass in proto esp from any to any
pass in on $ext_if proto udp from any to any port = 500
# /sbin/isakmpd
# echo /sbin/isakmpd >> /etc/rc.local