[Openswan Users] Testing Host to Host
Greg Lamb
greg at linuxbin.com
Sun May 29 16:11:53 CEST 2005
I'm trying to get a host-to-host vpn up and running between two
servers... and it *appears* to be working however I've been doing some
testing with tcpdump to make sure it's actually encrypting the data...
from server-b running `ping -p feedfacedeadbeef server-a`
i see on server-a with `tcpdump -i eth0 host server-b -x`
21:03:31.582575 IP server-a > server-b: ESP(spi=0x651bd3dd,seq=0x24)
0x0000: 4500 0098 7805 0000 4032 35da 4655 1fc2 E...x... at 25.FU
<mailto:E...x... at 25.FU>..
0x0010: 4655 1fe9 651b d3dd 0000 0024 c029 364e FU..e......$.)6N
0x0020: cbaa 4234 8db2 0577 10a9 bb8b 905d 2de9 ..B4...w.....]-.
0x0030: 57b4 242a 43af 1526 cab9 4e1b 8c2c e71b W.$*C..&..N..,..
0x0040: a2a2 aa06 fcbc 23b6 0cf0 8667 6d52 a3f6 ......#....gmR..
0x0050: 5247 RG
21:03:32.601102 IP server-b > server-a: ESP(spi=0x4172ce43,seq=0x25)
0x0000: 4500 0098 706c 4000 3f32 fe72 4655 1fe9 E...pl at .?2.rFU..
0x0010: 4655 1fc2 4172 ce43 0000 0025 7a98 2d71 FU..Ar.C...%z.-q
0x0020: d333 006c 3203 a471 043a 9320 4e63 0b2b .3.l2..q.:..Nc.+
0x0030: 578f b2f4 4c73 cdae 0a31 84ec 7c40 f300 W...Ls...1..|@..
0x0040: 1a7d 037b 6880 00a0 21ed 7b3d 6a0a 6d73 .}.{h...!.{=j.ms
0x0050: e4ce ..
21:03:32.601102 IP server-b > server-a: icmp 64: echo request seq 56
0x0000: 4500 0054 0038 4000 4001 6e1c 4655 1fe9 E..T.8 at .@.n.FU..
0x0010: 4655 1fc2 0800 8120 5006 0038 e414 9942 FU......P..8...B
0x0020: 142a 0900 feed face dead beef feed face .*..............
0x0030: dead beef feed face dead beef feed face ................
0x0040: dead beef feed face dead beef feed face ................
0x0050: dead ..
Now I've read that if you see the ESP packets... your set... however I'm
also seeing the clear text packets... Just want to make sure, is this
only because this is a host-to-host tunnel and I'm seeing it also
decrypting the packets since I'm on one of the endpoints? Unfortunately
in this set up I do have have an ability to get onto these machine's
gateways and monitor the packets from there...
What I'm concerned about is whether it could be circumventing the
tunnel? Thank you!
From ipsec.conf...
conn servera-to-serverb
left=publicipofservera
leftid=@servera
leftrsasigkey=keyblahblah
leftnexthop=serveradefaultgateway
right=publicipofserverb
rightid=@serverb
rightrsasigkey=keyblahblah
rightnexthop=serverbdefaultgateway
auto=start
rekey=no
failureshunt=passthrough
pfs=no
compress=no
authby=rsasig
type=tunnel
More information about the Users
mailing list