[Openswan Users] Fedora 8 and Netscreen

Peter McGill petermcgill at goco.net
Thu May 8 15:03:55 EDT 2008


Michael,

I believe the missing leftsourceip was half your problem, keep it.

I also noticed in your barf that your MASQing on ppp0.
> Chain POSTROUTING (policy ACCEPT 68625 packets, 6027K bytes)
>  pkts bytes target     prot opt in     out     source               destination         
>  1643  531K MASQUERADE  all  --  *      eth1    0.0.0.0/0            0.0.0.0/0           
> 1279K   79M MASQUERADE  all  --  *      ppp0    0.0.0.0/0            0.0.0.0/0           

This is undoing what leftsourceip does, making it ineffective.
You fix it by exempting your ipsec traffic from the MASQing.
In your firewall script you should have a rule similar too...
iptables -t nat -A POSTROUTING -o ppp0 -j MASQUERADE
Insert the following rule before that existing rule.
iptables -t nat -A POSTROUTING -o ppp0 -s 192.168.3.1/32 -d 192.127.220.100/32 -j ACCEPT
This will exempt your vpn traffic from the MASQ rule, which you should always do.

Peter McGill
IT Systems Analyst
Gra Ham Energy Limited 

> -----Original Message-----
> From: Michael Lavallee [mailto:mlavalle at hotmail.com] 
> Sent: May 8, 2008 2:43 PM
> To: petermcgill at goco.net; users at openswan.org
> Subject: Re: [Openswan Users] Fedora 8 and Netscreen
> 
> Peter McGill wrote:
> > However, the subnet definitions your using only route traffic
> > between two computers (192.168.3.1 and 192.127.220.100) 
> through the tunnel.
> > All other traffic will use the internet without encryption.
> > You need to run the traceroute and telnet from your 
> 192.168.3.1 machine.
> > And you can only communicate with 192.127.220.100 on the 
> remote end, nothing else.
> > If 192.168.3.1 is also the computer which runs openswan 
> then add this:
> > 	leftsourceip=192.168.3.1
> > Otherwise linux will default to the internet address as the 
> source and it won't go
> > through the tunnel.
> >   
> 
> 192.168.3.1 is the computer that runs openswan, so I added the 
> leftsourceip and restarted the service and the tunnel came back up 
> okay.  From that box (192.168.3.1) I tried to telnet to the 
> other side 
> (192.127.220.100) but it failed, so I ran a traceroute, and it still 
> shows the traffic going outside the tunnel, which from what I think I 
> know, is wrong.
> 
> traceroute to 192.127.220.100 (192.127.220.100), 30 hops max, 40 byte 
> packets
>  1  nrba-dsl.onlink.net (209.105.204.1)  28.219 ms  28.181 ms 
>  29.970 ms
>  2  10.127.2.1 (10.127.2.1)  32.134 ms  34.034 ms  37.471 ms
>  3  10.127.0.22 (10.127.0.22)  37.885 ms  39.817 ms  41.228 ms
>  4  sdbrem02.ontera.ca (209.105.192.217)  42.153 ms * *
>  5  * * *
>  
> I have the ipsec_barf, I wasn't sure if it was appropriate to post it 
> here (message size) so I stuck it up at 
> http://www.stellarimagination.com/ipsec_barf.txt



More information about the Users mailing list