[Openswan Users] build openswan 2.6.26 rpm with klips kernel module
Steve Zeng
SteveZ at airg.com
Thu Jun 3 17:40:45 EDT 2010
> IPSec is policy based, not just Openswan.
Good point. Thus I don't see any feasibility here if what amazon guys said is true. "All traffic to/from instances in your VPC flows through the VPN Connection".
When openswan is up and running it give us the following 4 tunnels:
169.254.255.0/30===x.x.x.x[+S=C]...y.y.y.y[+S=C]===169.254.255.0/30; erouted;
169.254.255.0/30===x.x.x.x[+S=C]...y.y.y.y[+S=C]===10.0.0.0/24; erouted;
192.168.1.0/24===x.x.x.x[+S=C]...y.y.y.y[+S=C]===169.254.255.0/30; erouted;
169.254.255.0/30===x.x.x.x[+S=C]...y.y.y.y[+S=C]===10.0.0.0/24; erouted;
what amazon needs sounds like as follows:
192.168.1.0/24 --> 169.254.255.0/30===x.x.x.x[+S=C]...y.y.y.y[+S=C]===169.254.255.0/30 --> 10.0.0.0/24
I don't see how it will happen.
With our configurations, However, we do get about 50% ping packets back... sorry, I could not explain it. :-)
Steve
-----Original Message-----
From: Michael H. Warfield [mailto:mhw at WittsEnd.com]
Sent: June 3, 2010 12:15 PM
To: Steve Zeng
Cc: mhw at WittsEnd.com; Paul Wouters; Users at openswan.org
Subject: RE: [Openswan Users] build openswan 2.6.26 rpm with klips kernel module
On Thu, 2010-06-03 at 11:01 -0700, Steve Zeng wrote:
> I Finally got feedback from amazon guys regarding this problem:
> 1) All traffic to/from instances in your VPC flows through the VPN Connection (169.254.255.0/30); no other IPSec tunnels are involved
> 2) There is no NAT involved from the instance in your VPC to your network
> 3) Could you verify that there is a route in the workstation ( 192.168.1.39 ) within your network that directs traffic addressed to your VPC into the tunnel interface?
>
> I do have a route entry established by BGP that directs traffic to
> amazon VPC into the tunnel IP (but not tunnel interface since I don't
> have one). It sounds like amazon needs only one tunnel:
> 169.254.255.2(my end) <==> 169.254.255.2 (amazon end). I remember mike
> mentioned Openswan is policy-based vpn instead of route based. Does it
> mean it may not be doable with linux/openswan?
A slight misunderstanding. IPSec is policy based, not just Openswan.
IOW, it works on a fully specified match of source and destination addresses (host or network) not merely the destination address (route).
It means that when a packet matches a policy in the policy database, an action takes place based on that, which may be to encapsulate a packet for a particular tunnel or to bypass the encapsulation. The encapsulated (encrypted) packet is then routed through the normal routing mechanisms to the other end-point where a matching security association then triggers the de-encapsulation. This is why merely routing a packet through an interface doesn't work. It doesn't trigger a policy to encapsulate the packet or associate that packet with a security association. You could sort of think of a routed VPN as the degenerate case of a policy VPN where the source address specifier is 0.0.0.0/0, sort of kind of, but not really...
> Thanks for any thoughts,
> Steve
Regards,
Mike
> -----Original Message-----
> From: Paul Wouters [mailto:paul at xelerance.com]
> Sent: May 28, 2010 5:38 PM
> To: Steve Zeng
> Cc: mhw at wittsend.com; Users at openswan.org
> Subject: Re: [Openswan Users] build openswan 2.6.26 rpm with klips
> kernel module
>
> On Fri, 28 May 2010, Steve Zeng wrote:
>
> > the problem for this config is, ping between 169.254.255.2 and 169.254.255.1 got about 50% loss. The good thing is, I will be able to ping from my network (192.168.1.0/24) to amazon vpc (10.0.0.0/24) with 50% packet loss as well.
> >
> > If I replace leftsubnets= and rightsubnets= with the following configs:
> >
> > # leftsubnets= {169.254.255.2/30,192.168.1.0/24}
> > # rightsubnets= {169.254.255.1/30,10.0.0.0/24}
> > leftsubnet= 169.254.255.2/30
> > rightsubnet= 169.254.255.1/30
> >
> > the ping test between 169.254.255.2 and 169.254.255.1 is 100% success. BGP still works. but I lose the ability to ping from my network (192.168.1.0/24) to amazon vpc (10.0.0.0/24). It is a puzzle to me.
>
> Odd. I guess you can try making 4 seperate conns with all combinations
> of left/right and see how that works.
>
> Paul
>
--
Michael H. Warfield (AI4NB) | (770) 985-6132 | mhw at WittsEnd.com
/\/\|=mhw=|\/\/ | (678) 463-0932 | http://www.wittsend.com/mhw/
NIC whois: MHW9 | An optimist believes we live in the best of all
PGP Key: 0x674627FF | possible worlds. A pessimist is sure of it!
More information about the Users
mailing list