[Openswan Users] Testing Host to Host

Fabien Tivolle fabien.tivolle at phdmedical.com
Mon May 30 09:46:16 CEST 2005


If you want to have your data encrypted all the time you should remove 
this line:
failureshunt=passthrough
"passthrough" here means the data will be in the tunnel but not 
encrypted, not what you want I guess.

 From ref:
http://www.freeswan.nl/freeswan_trees/freeswan-2.00-rc1/doc/manpage.d/ipsec.conf.5.html

*type*
    the type of the connection; currently the accepted values are
    *tunnel* (the default) signifying a host-to-host, host-to-subnet, or
    subnet-to-subnet tunnel; *transport*, signifying host-to-host
    transport mode; *passthrough*, signifying that no IPsec processing
    should be done at all; *drop*, signifying that packets should be
    discarded; and *reject*, signifying that packets should be discarded
    and a diagnostic ICMP returned


Fabien


Greg Lamb wrote:

> I'm trying to get a host-to-host vpn up and running between two 
> servers... and it *appears* to be working however I've been doing some 
> testing with tcpdump to make sure it's actually encrypting the data...
>
> from server-b running `ping -p feedfacedeadbeef server-a`
> i see on server-a with `tcpdump -i eth0 host server-b -x`
>
> 21:03:31.582575 IP server-a > server-b: ESP(spi=0x651bd3dd,seq=0x24)
>        0x0000:  4500 0098 7805 0000 4032 35da 4655 1fc2  
> E...x... at 25.FU <mailto:E...x... at 25.FU>..
>        0x0010:  4655 1fe9 651b d3dd 0000 0024 c029 364e  FU..e......$.)6N
>        0x0020:  cbaa 4234 8db2 0577 10a9 bb8b 905d 2de9  ..B4...w.....]-.
>        0x0030:  57b4 242a 43af 1526 cab9 4e1b 8c2c e71b  W.$*C..&..N..,..
>        0x0040:  a2a2 aa06 fcbc 23b6 0cf0 8667 6d52 a3f6  ......#....gmR..
>        0x0050:  5247                                     RG
> 21:03:32.601102 IP server-b > server-a: ESP(spi=0x4172ce43,seq=0x25)
>        0x0000:  4500 0098 706c 4000 3f32 fe72 4655 1fe9  E...pl at .?2.rFU..
>        0x0010:  4655 1fc2 4172 ce43 0000 0025 7a98 2d71  FU..Ar.C...%z.-q
>        0x0020:  d333 006c 3203 a471 043a 9320 4e63 0b2b  .3.l2..q.:..Nc.+
>        0x0030:  578f b2f4 4c73 cdae 0a31 84ec 7c40 f300  W...Ls...1..|@..
>        0x0040:  1a7d 037b 6880 00a0 21ed 7b3d 6a0a 6d73  .}.{h...!.{=j.ms
>        0x0050:  e4ce                                     ..
> 21:03:32.601102 IP server-b > server-a: icmp 64: echo request seq 56
>        0x0000:  4500 0054 0038 4000 4001 6e1c 4655 1fe9  E..T.8 at .@.n.FU..
>        0x0010:  4655 1fc2 0800 8120 5006 0038 e414 9942  FU......P..8...B
>        0x0020:  142a 0900 feed face dead beef feed face  .*..............
>        0x0030:  dead beef feed face dead beef feed face  ................
>        0x0040:  dead beef feed face dead beef feed face  ................
>        0x0050:  dead                                     ..
>
> Now I've read that if you see the ESP packets... your set... however 
> I'm also seeing the clear text packets... Just want to make sure, is 
> this only because this is a host-to-host tunnel and I'm seeing it also 
> decrypting the packets since I'm on one of the endpoints? 
> Unfortunately in this set up I do have have an ability to get onto 
> these machine's gateways and monitor the packets from there...
>
> What I'm concerned about is whether it could be circumventing the 
> tunnel? Thank you!
>
> From ipsec.conf...
>
> conn servera-to-serverb
>    left=publicipofservera
>    leftid=@servera
>    leftrsasigkey=keyblahblah
>    leftnexthop=serveradefaultgateway failureshunt=passthrough
>    right=publicipofserverb
>    rightid=@serverb
>    rightrsasigkey=keyblahblah
>    rightnexthop=serverbdefaultgateway failureshunt=passthrough
>    auto=start
>    rekey=no
>    failureshunt=passthrough
>    pfs=no
>    compress=no
>    authby=rsasig
>    type=tunnel
>
>
> _______________________________________________
> Users mailing list
> Users at openswan.org
> http://lists.openswan.org/mailman/listinfo/users
>
>



More information about the Users mailing list