[Openswan dev] First pass README update

Harald Jenny harald at a-little-linux-box.at
Wed Oct 13 14:47:29 EDT 2010


On Wed, Oct 13, 2010 at 02:15:52PM -0400, Paul Wouters wrote:
> 
> 
> My comments :)
> 
> >#########################################################################
> >#            Openswan 2.X Release Notes
> >#########################################################################
> >************ See docs/RELEASE-NOTES.txt for more information ************
> >
> >Openswan is an IPsec implementation for Linux. It has support for most
> >of the extensions (RFC + IETF drafts) related to IPsec, including
> >IKEv2, X.509 Digital Certificates, NAT Traversal, and many others.
> >
> >Openswan was originally based on FreeS/WAN 2.04 CVS, along with some
> >minor bug fixes from 2.05 and 2.06.  See CREDITS for the history.
> 
> I would probably say FreeS/WAN 2.04 CVS with the X.509 Patch from Andreas
> and the NAT-T patch from Arkoon networks. I know Andreas doesn't like to
> credit us for anything, but we try give proper credits.
> 
> >Download it from http://www.openswan.org/code
> 
> or ftp://ftp.openswan.org/openswan/

Hmmmm but that's rather a little bit unclean...

> 
> >1. libgmp + libgmp-devel headers.  (GNU Math Precision Library)
> 
> Maybe explain this is gmp/gmp-devel on rpm and libgmp3/libgmp3-devel on apt distros?

Perhaps a good idea.

> 
> >2. gawk, flex and bison (usually included in all distributions)
> 
> Perhaps add runtime requirements too? iproute2, iptables, if used on embedded
> systems a busybox with enough features enabled to get a mostly full /bin/sh

Sound ok to me too.

> 
> >#########################################################################
> ># HOW TO INSTALL on Kernel 2.6 (And Kernels with 2.6 IPsec backport)
> >#########################################################################
> >
> >NETKEY (Native linux IPsec stack)
> >---------------------------------
> >
> >To use Openswan with the linux native (builtin) IPsec stack,  then the
> >following steps should be all that are needed. Please use at least kernel
> >version 2.6.6, as prior versions of the kernel have serious bugs in the
> 
> I would say 2.6.9 as the earliest version.
> 
> >native IPsec stack.  From the openswan directory:
> >
> >   make programs
> >   sudo make install
> 
> This reminds me we should fix not creating man pages as root in the install phase......

:-)

> 
> >Note: The ipsec-tools package is no longer needed. Instead iproute2 >= 2.6.8
> >is required. For backported kernels, setkey and thus ipsec-tools might still
> >be required. Run 'ipsec verify' to determine if your system has either one
> >of the requirements.
> 
> of course "ipsec verify" requires perl (and I'd like to redo it in python)

Why?

> 
> >KLIPS (Openswan IPsec stack)
> >----------------------------
> >
> >To use the Openswan KLIPS IPsec stack (ipsec0 devices) for Linux
> >Kernels 2.6.23 and higher, the following steps should work.  From the
> >openswan directory:
> >
> >   make programs
> >   make KERNELSRC=/lib/modules/`uname -r`/build module
> >   sudo make KERNELSRC=/lib/modules/`uname -r`/build install minstall
> >
> >For Linux 2.6 Kernels before 2.6.23, the kernel requires patching if
> >NAT-T support is required.
> 
> Perhaps say "including linux 2.4 kernels"
> 
> >   Add NAT-T support.
> >
> >       NAT-T support needs to patch the kernel and build a new bzImage.
> >       From the Openswan source directory:
> >
> >         make KERNELSRC=/lib/modules/`uname -r`/build nattpatch | \
> >           (cd /usr/src/linux-2.6 && patch -p1 && make bzImage)
> 
> Add the bit about make sarefpatch here for KLIPSNG (Mast) support with SAref tracking?
> 
> Premade patches for some (distro kernels) are found in patches/kernel/
> Recommended kernel is 2.6.32 and up. Documentation on SAref/MAST can be found in
> docs/HACKING/Mast* and doc/klips/mast.xml. To understand what SAref tracking does,
> take a look at doc/ipsecsaref.png and the overlapip= entry in the ipsec.conf man page.

This is a very good idea!

> 
> >       Note: Build and install kernel as normal, as you have modified
> >       the TCP/IP stack in the kernel, so it needs to be recompiled and
> >       installed.
> >
> >         eg: cd /usr/src/linux-2.6 && make dep bzImage install
> >
> >       See your distribution documentation on how to install a new kernel
> >
> >   From the openswan directory:
> >
> >       make programs
> >       make KERNELSRC=/lib/modules/`uname -r`/build module
> >       sudo make KERNELSRC=/lib/modules/`uname -r`/build install minstall
> 
> Stacks can be switched at runtime using protostack=<klips|netkey|mast>
> 
> >   For OCF HW offloading support, you need a patched kernel
> >   See: http://ocf-linux.sourceforge.net/
> >
> >#########################################################################
> ># HOW TO INSTALL on Linux Kernel 2.4 systems
> >#########################################################################
> >
> >The following instructions assume the kernel source tree is in
> >/usr/src/linux-2.4.  If this isn't the case, simply change the
> >parameters in the instructions below.
> >
> >1)  Uncompress linux-2.#.#.tar.bz2 in /usr/src (or elsewhere), build a
> >   normal working kernel.  This ensures any compiliation problems
> >   that occur are isolated and resolved *before* any Openswan patches
> >   are applied to the kernel.
> >
> >2)  If you want NAT-T support, you need to patch your kernel and build
> >   a new bzImage.  From the Openswan source directory:
> >
> >   make KERNELSRC=/usr/src/linux-2.4 nattpatch | \
> >       (cd /usr/src/linux-2.4 && patch -p1 && make bzImage)
> >
> >   Note: Build and install kernel as normal, as you have modified
> >   the TCP/IP stack in the kernel, so it needs to be recompiled and
> >   installed.
> >
> >       eg: cd /usr/src/linux-2.4 && make dep bzImage install
> 
> The only difference here is the "make dep" step right? Why not integrate in the
> text above to avoid repeats?
> 
> >3)  From the openswan source directory, build the userland tools, and
> >   ipsec.o kernel module:
> 
> well the one other diff is ipsec.o vs ipsec.ko I guess.

Yes

> 
> >Bugs with the package can be filed into our Mantis system, at
> >http://bugs.openswan.org
> 
> redmine :)

*ggg*

> 
> >#########################################################################
> ># SECURITY HOLES
> >#########################################################################
> >
> >Hopefully none :-)  If you find one, please email vuln at xelerance.com with
> >details.  Please use GPG (finger vuln at xelerance.com for GPG key) for this.
> 
> I'd say:
> 
> All security vulnerabilities found that require public disclosure

Isn't that true for every one?

> will receive
> proper CVE tracking numbers (see http://mitre.org/) and co-ordinated via the
> vendor-sec mailing list. A complete list of known security vulnerabilities is
> available at: http://www.openswan.org/security/
> 
> >#########################################################################
> ># DEVELOPMENT
> >#########################################################################
> >
> >Those interested in the development, patches, beta releases of Openswan
> >can join the development mailing list (http://lists.openswan.org -
> >dev at lists.openswan.org) or join the development team on IRC in
> >#openswan-dev on irc.freenode.net
> 
> For those who want to track things a bit more closely, the commits@ mailinglist
> will mail all the commit messages.
> 
> >#########################################################################
> ># DOCUMENTATION
> >#########################################################################
> >
> >The most up to date docs are at http://wiki.openswan.org.
> 
> No trailing dots on urls please :)

Well it's the end of the sentence... but it may irritate people.

> 
> Paul

Harald


More information about the Dev mailing list