[Openswan Users] Openswan as modecfgserver?

Michael Richardson mcr at sandelman.ca
Wed Sep 9 15:27:52 EDT 2009


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1


>>>>> "Paul" == Paul Wouters <paul at xelerance.com> writes:
    >> It seems I can not make openswan to work with clients as a MODECFG
    >> server. Is it supposed to work?

    Paul> Yes. we have testcases for it in testing/pluto/xauth*/*

    >> | p15 state object #1 found, in STATE_MODE_CFG_R1
    >> | processing connection road-warrior-host[1] 192.168.2.66
    >> | last Phase 1 IV:~ d8 3b 77 2d~ d6 49 fe 81
    >> | current Phase 1 IV:~ e4 46 51 94~ 73 5e 2b 22
    >> | computed Phase 2 IV:
    >> |~~ 13 5b bf cc~ e6 30 7a 93~ a5 69 37 61~ 1c 1d 10 1b
    >> "road-warrior-host"[1] 192.168.2.66 #1: received MODECFG
    >> message when in state S
    >> TATE_MODE_CFG_R1, and we aren't xauth client
    >> | * processed 0 messages from cryptographic helpers
    >> ~
    >> A couple of questions:
    >> ~
    >> 1. Why the server tried to push IP settings? Shouldn't it wait for the
    >> client to pull? What if the client side does not have modecfg set? How
    >> can I stop that from happening on the server side?

    Paul> I am not sure.

a) modecfg was never standardized in IKEv1, so it's hard to say what is
   what.

b) having said that, the document says that the server pushes, I think.
   (the server knows the policy, not the client afterall)

c) Cisco clients and access servers do the opposite though.

There is a POLICY_MODECFG_PULL option, which you write as:
      leftmodecfgpull=true/rightmodecfgpull=true

    >> 2. Why the internal IP4 address the server tried to push is the
    >> public IP 
    >> address of the remote peer instead of an 'internal' one?

I do not recall where the list of IP addresses to configure comes from.
Someone was going to write a proper interface to radius to get it all
done properly/sanely.   I think that without using pools, it just pushes
the "subnet" (usually /32) which the gateway's policy is configured for.

    >> 3. Does openswan support the idea of virtual adaptor? I thought the
    >> remote must be in a different subnet, but modecfg seems to allow the
    >> remote to join the local network.

We don't care.
We already have a virtual adaptor called ipsec0.

    >> 4. I couldn't find anything from the document about how to fine control
    >> what is pushed to the client. Can I only push DNS stuff and avoid passing
    >> IP settings?

You would have to write some code to configure this, I think.
In general, in the client pull situation, the server only answers what
the client asked for.

    >> 5. What~kind of changes I need to do to~make modecfg to work with two
    >> openswan boxes?

    Paul> Perhaps Michael can answer these questions beter then me. Though have
    Paul> a look at the testcase configurations and see if those provide
    Paul> further 
    Paul> information.

It certainly has worked. 
I don't know if the current release passes the xauth-* pluto test
cases.  The test cases are also detailed examples.

- -- 
]       He who is tired of Weird Al is tired of life!           |  firewalls  [
]   Michael Richardson, Sandelman Software Works, Ottawa, ON    |net architect[
] mcr at sandelman.ottawa.on.ca http://www.sandelman.ottawa.on.ca/ |device driver[
] panic("Just another Debian GNU/Linux using, kernel hacking, security guy"); [

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)
Comment: Finger me for keys

iQEVAwUBSqgBsoCLcPvd0N1lAQKb0Qf8Dik22kX+ZurvTK/Bv6O5a3gnDr6gC3ZM
iSZo7vTLgCbu1IuhIgG0QSMjYqVQhMTqqFP3YIsLmEWkhnsVl8agW7pWusidN8+g
H1Rq14C1qkS7GdGSdYHx3tvwVVBUHTV8zb/V3eVXOjziAhdbz4e9jWKXFxT5PS1T
iib4Oh11x+YKy6d2za+BG5JJ9cyTGJrHJJLE+lvW0hvHFwlS/c12sOgAJPavv79t
gE2tsmXku0HECZhUIZQpFcTUZ3Fld0k0RRzXFwKpN1x9wHNlJIHv5PBi7In7a1DD
detf/ewyF7yNg36hNl6QkJ6heKoQYTfMuHUp8zskv+kD/q85H+LMoA==
=2FHA
-----END PGP SIGNATURE-----


More information about the Users mailing list