[Openswan Users] Openswan 2.4, FC4 Question
Darren Ellis
darren at ieworks.net
Sun Sep 18 10:54:42 CEST 2005
Hi,
I'm stumped by the kernel 2.6 changes to openswan use.
On the server end, I have a Fedora Core 4 (FC4) linux server with
openswan 2.4 installed. Eth0 is on the Internet, Eth1 is private. I
can ping eth0 from the outside; I can ping eth1 from the inside. IP
forwarding is enabled.
VPN Server:
Eth0 x.y.z.58/27, gw x.y.z.33 (External, public)
Eth1 172.20.7.145/21
The 172.20.0.0 LAN has it's default route s 172.20.0.1. Name servers
are internal at 172.20.7.194 and 172.20.7.194. They resolve against an
internal domain and then recurse anything not found in the internal domain.
ipsec verify looks good:
[root at vpn ~]# ipsec verify
Checking your system to see if IPsec got installed and started correctly:
Version check and ipsec on-path [OK]
Linux Openswan U2.4.0/K2.6.12-1.1447_FC4 (netkey)
Checking for IPsec support in kernel [OK]
Checking for RSA private key (/etc/ipsec.secrets) [OK]
Checking that pluto is running [OK]
Two or more interfaces found, checking IP forwarding [OK]
Checking NAT and MASQUERADEing
Checking for 'ip' command [OK]
Checking for 'iptables' command [OK]
Checking for 'curl' command for CRL fetching [OK]
Checking for 'setkey' command for NETKEY IPsec stack support [OK]
Opportunistic Encryption Support [DISABLED]
[root at vpn ~]#
On the client end, I have Windows 2000 and the Greenbow VPN client. The
Win2K workstation is behind a Linux firewall providing NAT via Shorewall
firewall. I have a self-signed CA built and certificates properly
generated and signed.
Client side:
Win2K: 192.168.0.62/24 (DHCP), gw 192.168.0.1, name servers are Adelphias.
Linux-Shorewall firewall:
Eth1: 192.168.0.1
Eth0: Dynamic, Adelphia, currently 70.33.197.36
I have openswan and greenbow correctly configured in that I have a
successful tunnel. Below is my ipsec.conf.
version 2.0 # conforms to second version of ipsec.conf specification
# basic configuration
config setup
# plutodebug / klipsdebug = "all", "none" or a combation from below:
# "raw crypt parsing emitting control klips pfkey natt x509 private"
# eg:
# plutodebug="control parsing"
#
# Only enable klipsdebug=all if you are a developer
#
# NAT-TRAVERSAL support, see README.NAT-Traversal
# nat_traversal=yes
# virtual_private=%v4:10.0.0.0/8,%v4:192.168.0.0/16,%4:172.16.0.0/12
# Debug-logging controls: "none" for (almost) none, "all" for lots.
interfaces=%defaultroute
nat_traversal=yes
# crlcheckinterval=600
# strictcrlpolicy=yes
# klipsdebug=all
klipsdebug=none
# plutodebug="control parse"
plutodebug=none
virtual_private=%v4:10.0.0.0/8,%v4:172.16.0.0/12,%v4:192.168.0.0/16
conn %default
leftrsasigkey=%cert
rightrsasigkey=%cert
# Left security gateway, subnet behind it, next hop toward right.
rekey=no
keyingtries=1
compress=yes
disablearrivalcheck=no
left=%defaultroute
authby=rsasig
#Disable Opportunistic Encryption
include /etc/ipsec.d/examples/no_oe.conf
# left = local (vpn)
# right = remote (DGE Win2K Box, dynamic)
conn dgevpn-net
leftsubnet=172.20.0.0/21
also=dgevpn
conn dgevpn
# VPN connection from Darren's Win2K machine
rekey=yes
keyingtries=1
authby=rsasig
leftrsasigkey=%cert
left=%defaultroute
rightrsasigkey=%cert
rightsubnet=vhost:%no,%priv
leftcert=vpn.pem
rightcert=dgecert.pem
right=%any
pfs=yes
auto=add
There is a server on the 172.20.0.0/21 LAN, 172.200.7.193 that I am
trying to access. I am unable to ping it. I found that I had an
asymetric routing problem as the VPN server is not the default gateway.
So, I added a route to the default gateway to forward all traffice
destined for the 192.168.0.0/24 LAN back to the VPN server.
Ethereal reports pings reaching 172.20.7.193 from 192.168.0.62 and
172.20.7.193 replies to 192.168.0.62. The replies are routed to
172.20.0.1, which forwards them to 172.20.7.145 via a simple static route.
Clearly, I misunderstand somethig or have misconfigured something as I
am not able to get traffic to flow properly over the established
tunnel. I have googled for help, as well as reviewed the openswan 2.4
docs. Unfortunately, I am using 2.6.11 or newer kernels, and there
seems to be very little documenation on the "new" way of doing things.
I have successfully used openswan 2.3.1 with 2.4 kernels, but they had
ipsec0 interfaces to work with.
My questions are as follows:
1. What other information do I need to provide to the list? This is a
fairly complex configuration, at least for me, though it's real-world
common, and I'm sure I omitted a detail or three.
2. Do I need to be using racoon or KLIPS? I think I should be using
KLIPS and am doing so at the moment.
[root at vpn ~]# rpm -qa | grep openswan
openswan-2.4.0-1
openswan-klips-2.4.0-2.6.12_1.1447_FC4_1
openswan-doc-2.4.0-1
[root at vpn ~]#
3. Is there a HOWTO doc somewhere that details the steps and requirements?
Thanks.
Darren
-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://lists.openswan.org/pipermail/users/attachments/20050918/b55cb64e/attachment.htm
More information about the Users
mailing list