# Server (WAN IP 100.100.100.100, VPN IP 10.9.255.1)
Certificates
We will install the CA and certificates in /etc/racoon/conf.
mkdir /etc/racoon/conf, then copy the following files:
### build_ca.sh
Build root CA
build_cert.sh
make_crl.sh
### revoke.sh
Before you can create certificates, you need to create a CA; a
self-signed one will serve our purpose just as well:
./build_ca.sh
Then, create certificates:
./build_cert.sh peter
Also, don’t forget to create the CRL by doing: ./make_crl.sh
The following file can be used to keep tracked of all certificates
(whether still valid or revoked): ca/index.txt
In order to revoke a certificate, get its serial number from
ca/index.txt (the third column, a two-digit number), then use:
./revoke.sh <serial number>
If the serial number appears as “03”, then you MUST include the leading
zero: ./revoke.sh 03
Once you’ve revoked a certificate, you need to refresh the CRL:
./make_crl.sh
B) Network configuration (tap interface + iptables)
Note: you won’t see the traffic on the ipsec0 interface; instead, you
will it see it on the WAN interface,
and you will see both encrypted and decrypted packets.
C) Racoon
Linux Client (WAN IP 200.200.200.200, VPN IP 10.9.255.254)
Certificate
We will put the certificate (peter.pem), private key (peter.key) and
server certificate (ipsec_ca.pem) in /etc/racoon/cert.