howto/IPsecWithPublicKeys/strongSwan5Example.md
... ...
@@ -47,7 +47,7 @@ In this example, we'll use the following settings:
47 47
48 48
1. Add your peer's public key
49 49
50
- root@debian:~# cat << EOF > /etc/ipsec.d/public/peerkey.pub
50
+ root@debian:~# cat << EOF > /etc/ipsec.d/public/peerkey.pem
51 51
-----BEGIN PUBLIC KEY-----
52 52
MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAuQ1hX3+AEiLis4p5jvmY
53 53
IfEgaq9488GU2nkuR1gZK4/CphrccmztgADU/TkiE5IOOo7zKPparcl8dZwJfX+j
... ...
@@ -76,8 +76,8 @@ In this example, we'll use the following settings:
76 76
ikelifetime=28800s
77 77
# authentication
78 78
authby=pubkey
79
- leftrsasigkey=/etc/ipsec.d/public/mykey.pub
80
- rightrsasigkey=/etc/ipsec.d/public/peerkey.pub
79
+ leftrsasigkey=/etc/ipsec.d/public/mykey.pem
80
+ rightrsasigkey=/etc/ipsec.d/public/peerkey.pem
81 81
EOF
82 82
83 83
3. All done! Configure the phase 2 parameters as you otherwise would.
... ...
@@ -108,8 +108,8 @@ In this example, we'll use the following settings:
108 108
ikelifetime=28800s
109 109
# authentication
110 110
authby=pubkey
111
- leftrsasigkey=/etc/ipsec.d/public/mykey.pub
112
- rightrsasigkey=/etc/ipsec.d/public/peerkey.pub
111
+ leftrsasigkey=/etc/ipsec.d/public/mykey.pem
112
+ rightrsasigkey=/etc/ipsec.d/public/peerkey.pem
113 113
# phase 2 parameters
114 114
esp=aes128-sha1-modp1536!
115 115
lifetime=3600s