[Openswan Users] build openswan 2.6.26 rpm with klips kernel module

Michael H. Warfield mhw at WittsEnd.com
Thu Jun 3 15:14:49 EDT 2010


On Thu, 2010-06-03 at 11:01 -0700, Steve Zeng wrote: 
> I Finally got feedback from amazon guys regarding this problem:
>   1) All traffic to/from instances in your VPC flows through the VPN Connection (169.254.255.0/30); no other IPSec tunnels are involved
>   2) There is no NAT involved from the instance in your VPC to your network
>   3) Could you verify that there is a route in the workstation ( 192.168.1.39 ) within your network that directs traffic addressed to your VPC into the tunnel interface?
> 
> I do have a route entry established by BGP that directs traffic to
> amazon VPC into the tunnel IP (but not tunnel interface since I don't
> have one). It sounds like amazon needs only one tunnel:
> 169.254.255.2(my end) <==> 169.254.255.2 (amazon end). I remember mike
> mentioned Openswan is policy-based vpn instead of route based. Does it
> mean it may not be doable with linux/openswan? 

A slight misunderstanding.  IPSec is policy based, not just Openswan.
IOW, it works on a fully specified match of source and destination
addresses (host or network) not merely the destination address (route).
It means that when a packet matches a policy in the policy database, an
action takes place based on that, which may be to encapsulate a packet
for a particular tunnel or to bypass the encapsulation.  The
encapsulated (encrypted) packet is then routed through the normal
routing mechanisms to the other end-point where a matching security
association then triggers the de-encapsulation.  This is why merely
routing a packet through an interface doesn't work.  It doesn't trigger
a policy to encapsulate the packet or associate that packet with a
security association.  You could sort of think of a routed VPN as the
degenerate case of a policy VPN where the source address specifier is
0.0.0.0/0, sort of kind of, but not really...

> Thanks for any thoughts,

> Steve

Regards,
Mike

> -----Original Message-----
> From: Paul Wouters [mailto:paul at xelerance.com] 
> Sent: May 28, 2010 5:38 PM
> To: Steve Zeng
> Cc: mhw at wittsend.com; Users at openswan.org
> Subject: Re: [Openswan Users] build openswan 2.6.26 rpm with klips kernel module
> 
> On Fri, 28 May 2010, Steve Zeng wrote:
> 
> > the problem for this config is, ping between 169.254.255.2 and 169.254.255.1 got about 50% loss. The good thing is, I will be able to ping from my network (192.168.1.0/24) to amazon vpc (10.0.0.0/24) with 50% packet loss as well.
> >
> > If I replace leftsubnets= and rightsubnets= with the following configs:
> >
> > #        leftsubnets=    {169.254.255.2/30,192.168.1.0/24}
> > #        rightsubnets=   {169.254.255.1/30,10.0.0.0/24}
> >       leftsubnet=    169.254.255.2/30
> >       rightsubnet=   169.254.255.1/30
> >
> > the ping test between 169.254.255.2 and 169.254.255.1 is 100% success. BGP still works. but I lose the ability to ping from my network (192.168.1.0/24) to amazon vpc (10.0.0.0/24). It is a puzzle to me.
> 
> Odd. I guess you can try making 4 seperate conns with all combinations of left/right and
> see how that works.
> 
> Paul
> 

-- 
Michael H. Warfield (AI4NB) | (770) 985-6132 |  mhw at WittsEnd.com
   /\/\|=mhw=|\/\/          | (678) 463-0932 |  http://www.wittsend.com/mhw/
   NIC whois: MHW9          | An optimist believes we live in the best of all
 PGP Key: 0x674627FF        | possible worlds.  A pessimist is sure of it!
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 482 bytes
Desc: This is a digitally signed message part
Url : http://lists.openswan.org/pipermail/users/attachments/20100603/5b81c52d/attachment.bin 


More information about the Users mailing list