[Openswan Users] Security of xl2tpd without KLIPS?
Paul Wouters
paul at xelerance.com
Tue Dec 4 13:34:57 EST 2007
On Sun, 2 Dec 2007, Aaron Gage wrote:
> I have been trying to set up IPSec/L2TP on Fedora 5 (i.e. NETKEY in
> kernel 2.6.20) for XP and OSX 10.4 roadwarriors that will probably be
> behind NAT.
> * Using Fedora 5 as my router/firewall/VPN server, which has kernel
> 2.6.20 and NETKEY. Also using xl2tpd that ships with Fedora 5 so that
> I don't need a RADIUS server and addresses are allocated on my
> internal network automatically.
Should work, though you need openswan 2.4.10+ to be able to support OSX
using rightprotoport=17/0 (instead of the old 17/%any causing problems)
> * Using NETKEY means leaving L2TP vulnerable if OpenSwan goes down (my
> current status is very much like this poster's:
> http://lists.openswan.org/pipermail/users/2004-December/003147.html).
> I can't use the trick of routing ipsec0 to the internal network to let
> xl2tpd listen to an internal address. I could get ipsec0 if I used
> KLIPS.
You can mark all ESP packets, then have a rule to accept all marked packets,
and append a rule that drops all udp port 1701 packets.
> * Using NAT-T for the roadwarriors. I expect to be using the
> roadwarriors from behind cable modem or DSL routers while on travel.
> * Using KLIPS with NAT-T is not recommended/possible with kernel
> 2.6.20 (http://lists.openswan.org/pipermail/users/2007-May/012486.html).
That has been resolver in later versions. You should be fine with any kernel
up to 2.6.22 (as long as the pppol2tp kernel patch is not applied)
> * pluto that ships with Fedora 5 crashes if I use:
> rightprotoport=17/%any right=%any rightsubnet=vhost:%priv,%no
> which means that OSX probably will not work (and if it did, I would
> have to edit the registry to make XP work by adding
> forceenccaps=yes).
If openswan server is behind NAT, you will always have to patch some XP systems.
> configuration, but only if I set listen-addr= the external (in this
> case, DMZ between the router and the access point) address in
> xl2tpd.conf. I would rather have no VPN than have listen-addr= the
> real outside address (I don't need this badly enough to compromise
> security).
Are you trying to hand out IP addresses via l2tp in the same subnet as
where you already are? That will not work.
> My question is this: what is the state of the art with respect to
> IPSec/L2TP, NETKEY, kernel 2.6.20 or newer, NAT-T, not exposing L2TP
> to the hostile interface, and getting the whole ball of wax to work
> with XP and OSX 10.4 roadwarriors?
The best solution would be KLIPS on 2.6.22 with openswan 2.4.10+ and
xl2tpd 1.1.12.
> If there is simply no way to do all of this at once, please let me
> know so I can stop trying. About the only thing I am not doing to
> make this as hard as possible is to have the VPN server also behind
> NAT...and if I want OSX to work, I may as well. I shouldn't mention
> that the VPN server is also on a dynamic IP -- I was just going to
> brazen that one out and hope that dyndns.org would help.
Make sure to restart openswan when its public ip changes in some ip.local
script.
> I can post my various config files if desired, but they are all based
> on Jacco de Leeuw's very informative web pages. Also, it works, just
> not the way I'd like (L2TP vulnerable, OSX might not work).
OSX works as of 2.4.10+
Paul
--
Building and integrating Virtual Private Networks with Openswan:
http://www.amazon.com/gp/product/1904811256/104-3099591-2946327?n=283155
More information about the Users
mailing list