[Openswan Users] Bringing up ipsec breaks my routing <solved>
Josef wells
Josefwells at alumni.utexas.net
Thu Jan 3 13:05:02 EST 2008
I jumped on IRC yesterday and got some help.
I did:
ip addr list
and found that ipsec was adding my routers ip to the list of ips on eth0.
This stayed around even after stopping ipsec, and didn't get removed
until a full restart of networking.
This was added because my leftsourceip was set to my router rather
than my openswan host.
I fixed my leftsourceip and my tunnel came up.
Thanks for the help!
Josef
On Dec 27, 2007 9:50 AM, Josef wells <Josefwells at alumni.utexas.net> wrote:
> Hello all,
>
> I have been using openswan for a long time (since freeswan) to connect
> to a work vpn.
>
> I had been on a 172.16.0.1 network, but the office is moving to a
> 10.0.0.1 network so I decided to change my home network as well.
>
> I am running a debian unstable 2.6.22, behind a linksys wrt-dd router.
> When I bring up ipsec, I get to here in authlog:
> pluto[20914]: "jwells-conn" #2: STATE_QUICK_I2: sent QI2, IPsec SA
> established {ESP=>0xe32f52b
> 3 <0xb2d6c6a6 xfrm=3DES_0-HMAC_SHA1 NATD=none DPD=none}
>
> 10.90.105.241 is my router
> 10.90.105.242 is my linux machine
>
> When I attempt to connect to the router at all, it somehow gets routed
> back to the localhost.
>
> From 10.90.105.242, ssh 10.90.105.241 actually connects to 10.90.105.242 again!
>
> As you can imagine, this pretty much breaks everything. The only way
> to fix it is to stop ipsec and restart networking!
>
> route before starting ipsec:
> 10.90.105.240 * 255.255.255.248 U 0 0 0 eth0
> default Router 0.0.0.0 UG 0 0 0 eth0
>
> route after starting ipsec:
> Kernel IP routing table
> Destination Gateway Genmask Flags Metric Ref Use Iface
> 10.90.105.240 * 255.255.255.248 U 0 0 0 eth0
> 10.0.0.0 * 255.0.0.0 U 0 0 0 eth0
> default 10.90.105.241 0.0.0.0 UG 0 0 0 eth0
>
> iptables -L shows (all the time):
> Chain INPUT (policy ACCEPT)
> target prot opt source destination
>
> Chain FORWARD (policy ACCEPT)
> target prot opt source destination
>
> Chain OUTPUT (policy ACCEPT)
> target prot opt source destination
>
> ipsec.conf:
> config setup
> interfaces=%defaultroute
> klipsdebug=none
> plutodebug=none
>
> conn %default
> left=0.0.0.0
> keyingtries=0
> authby=rsasig
>
> conn jwells-adi10
> leftid=@jwells
> left=%defaultroute
> leftsubnet=10.90.105.240/29
> leftsourceip=10.90.105.241
> leftrsasigkey=blah
> right=vpn_server_ip
> rightnexthop=next_hop_ip
> rightrsasigkey=blah
> rightsubnet=10.0.0.0/8
> auto=start
>
> Thanks for any help,
> Josef
>
More information about the Users
mailing list