[Openswan Users] Migration from RedHat 7 to SuSE 9.2 problematic

Bram Bouwens bbouwens at xs4all.nl
Sun Apr 17 12:36:31 CEST 2005


Alexander Samad wrote:
> On Sat, Apr 16, 2005 at 04:33:53PM +0200, Bram Bouwens wrote:
> 
>>I've been running an IPSEC connection between my home and the office
>>for years, really brilliant. Using RedHat 7.0 on one and 7.3 at the
>>other side with FreeS/WAN 2.06.
>>
>>Now for various reasons it's time to upgrade my home gateway, and
>>I thought SuSE 9.2 would be nice. I also plugged in a DSL card modem.
>>All seems to go smooth, with almost no changes to the configuration,
>>Openswan U2.2.0/K2.6.8-24.14-default looks similar, except that I
>>see no ipsec0 device appearing, so I'm a little puzzled by the
>>routing.
> 
> 
> ipsec interfaces dissapeared in the 2.6 implementation, using the native
> ipsec stack.  I believe you can still build klips for the 2.6 kernel
> which will giv eyou back the ipsecX interfaces, but they are not needed

After more hours of fiddling and trying to get the stuff working with
racoon, I learned that it's just another paradigm. We used to say: send
this package through that ipsec-device, but now it's: wrap up the packet
in ESP and send it through the normal interface. To me that was a
relevant thing to note.
> 
> 
....
>>
>>The firewall shouldn't be a problem I think:
> 
> 
> you will have to change your firewall, ipsec packets go through the
> netfilter chain twice once as an esp packet and once as a decrypted
> packet.  Which mean you might have to attached a script to your ipsec
> config to automatically update your firewall to allow the unencrypted
> packets through.  or mark them in mangle (the esp packets) and then
> allow them through in the filter table.

You have a point there!

In the end I got racoon to set up a SA as well, with the same result:
no traffic going through the tunnel. Then tcpdump showed that when
I did a ping from 192.168.37.5 to 192.168.0.17 there were ICMP requests
going from the PUBLIC IP to the office LAN IP addres going into the
dsl0 device. So: they got MASQ'd, and therefore not wrapped in an ESP 
packet. Then I saw:

Chain POSTROUTING (policy ACCEPT)
target     prot opt source               destination
MASQUERADE  all  --  anywhere             anywhere

which is rather crude if you ask me. After I inserted

ACCEPT     all  --  192.168.37.0/24      192.168.0.0/24

before that rule, it all worked! Now I'll have to convince SuSEFirewall 
to do that for me after the inevitable reboot.

When I figured out which of all the steps I did were relevant I might
write a summary, but that may be off-topic for this mailing list as
I ended up with racoon (yes, using the same RSA keys) instead of
OpenSwan :D

Thanks for your help!

Bram


More information about the Users mailing list