[Openswan Users] overlapping networks with nat-t
Jacco de Leeuw
jacco2 at dds.nl
Thu Jan 19 13:39:53 CET 2006
John A. Sullivan III wrote:
> we went with openswan for our LAN-to-LAN connections and OpenVPN for
> our RoadWarriors now
>
> 2) There is no need to regulate the home IP address space. All
> addresses are virtualized. This gets us around the problem of multiple
> users behind the same NAT gateway when using L2TP or multiple users with
> the same internal address behind different NAT gateways when using
> IPSec.
I understand that this is in the pipeline for Openswan 2.5.x.
> 4) Even though it uses virtual addresses, there are no problems with NAT
> or any broken functionality such as network browsing.
> breaks certain protocols, e.g., network neighborhood browsing (as an
> aside, this is one of the very few things that iptables can't do that a
> PIX can, i.e., NAT NetBIOS packets with embedded IP information in the
> NetBIOS header).
The upcoming Openswan 2.4.5 should fix a lot of these NAT-T problems.
I've never heard about NetBIOS packets with IP addresses in them. Wouldn't
that violate the OSI layer principle? Anyway, with L2TP/IPsec the client
gets an IP address on the internal network so NAT is not needed.
> 5) It does not break the local network. In other words, [...]
> preserves the safety of not allowing simultaneous Internet access but
> still allows access to local printers, etc.
This works on L2TP/IPsec too but you would have to use IP addresses
instead of hostnames because the DNS and WINS servers (may) change
when the VPN connection goes up.
> 6) The product works from virtually anywhere -- private addresses,
> public addresses, even behind the most stringent firewalls. The primary
> connection uses a UDP connection but the firewall doesn't allow anything
> except web browsing, we have a secondary connection which works over
> HTTPS - like an SSL VPN.
That brings up a fundamental discussion about firewalls. "This pesky firewall
prevents me from connecting so let's disguise everything as HTTP so the
firewall won't notice".
> 7) It allows the keys to be password protected and allows the user to
> change the password mitigating the exposure in the event of a stolen or
> improperly discarded computer.
Good point. This is a limitation of the Microsoft IPsec client. You cannot
put a password on the private key of a 'machine certificate'. Nor can you
store the private key of a machine certificate on a hardware token. However,
the second stage (PPP) authentication is protected by a password. Of course,
nothing prevents the user from taking advantage of Windows suggesting to
'remember' the password for him. I would not be suprised if OpenVPN sports
this feature as well...
The built-in IPsec client of Mac OS X does protect private keys with a
password through its Keychain application.
> 10) It involves no complicated importing of keys and certs. In fact,
> one does not even have to extract the keys and certs from the PKCS#12
> file (the bundle of encrypted keys and certs). One simply copies the
> PKCS#12 file into the proper directory and names it keys.p12.
>
> 11) Maintenance costs are dramatically less.
You still have to roll out the client software and keys to your users.
I don't see how that is any different from distributing and importing
PKCS#12 keys in the (L2TP/)IPsec case. I agree that the MMC route is
dreadful for importing a certificate but it can be automated using
a command line utility or a GUI.
> 12) It does not require the Windows patch and registry change to permit
> Windows authentication to work through the VPN.
See above. Patching the registry is at least as much effort as rolling out
client software.
> 13) 14) It does not require that we walk the user through manually changing
> their DNS / WINS settings.
This is automatic with L2TP/IPsec because it is based on PPP (dial-up
networking).
I think you forgot to mention OpenVPN's unique Ethernet bridging support.
It should help solve a lot of connectivity problems, at the expense of
some network efficiency.
Jacco
--
Jacco de Leeuw mailto:jacco2 at dds.nl
Zaandam, The Netherlands http://www.jacco2.dds.nl
More information about the Users
mailing list