[Openswan Users] really basic peer-to-peer setup
Alan McKay
alan.mckay at gmail.com
Fri May 3 18:07:35 UTC 2013
On Fri, May 3, 2013 at 1:41 PM, Simon Deziel <simon at xelerance.com> wrote:
> This should give you a list of the man pages:
> dpkg -L openswan| grep man
Aha, that was rather stupid of me. I found only these which were not
very helpful :
root at firewall03:/etc/shorewall# man openswan
No manual entry for openswan
root at firewall03:/etc/shorewall# man -k openswan
ipsec__copyright (8) - prints Openswan copyright
ipsec__realsetup (8) - internal routine to start Openswan.
ipsec_look (8) - get a quick summary of Openswan status
> You can enable forwarding with:
>
> sysctl net.ipv4.ip_forward=1
>
> And add it to /etc/sysctl.conf to have it setup on each reboot.
I forgot to mention that I already found this and it still reports the
same thing. And the googling I had done there were a lot of hits that
came up and said "that is nothing to worry about". Seems odd to me
that it would not be something to worry about.
root at solexa1:~# cat /proc/sys/net/ipv4/conf/*/forwarding
1
1
1
1
1
root at solexa1:~# ls !$
ls /proc/sys/net/ipv4/conf/*/forwarding
/proc/sys/net/ipv4/conf/all/forwarding
/proc/sys/net/ipv4/conf/default/forwarding
/proc/sys/net/ipv4/conf/eth0/forwarding
/proc/sys/net/ipv4/conf/eth1/forwarding
/proc/sys/net/ipv4/conf/lo/forwarding
root at solexa1:~#
I'm also wondering about this error when I restart :
root at solexa1:~# /etc/init.d/ipsec restart
ipsec_setup: Stopping Openswan IPsec...
Warning: ignored obsolete keyword forwardcontrol
ipsec_setup: Starting Openswan IPsec 2.6.37...
ipsec_setup: No KLIPS support found while requested, desperately
falling back to netkey
ipsec_setup: NETKEY support found. Use protostack=netkey in
/etc/ipsec.conf to avoid attempts to use KLIPS. Attempting to continue
with NETKEY
ipsec_setup: Warning: ignored obsolete keyword forwardcontrol
And finally, what should I be able to ping and from where? Right now
I'm trying from the firewalls. I have this :
(imagine this all one one line)
192.168.160.0/24 --- Switch --- (192.168.160.11-LinuxBox-10.246.159.41)
----- Intranet 10.0.0.0
---- (10.242.182.88-LinuxBox-172.30.0.1) ---- Switch
Right now I don't have any nodes at the 2nd site so it ends at the
switch. Simply because I want to have my VPN running before I start
moving gear over there otherwise I can't move the gear. So I'm
trying to ping from 10.242.182.88 (firewall03) over to 192.168.160.10
which is on the other subnet on the left (behind solexa1 /
10.246.159.41)
And I am just not sure how to start debugging this since it is showing
the tunnel is up, and forwarding is on ...
root at firewall03:/etc/shorewall# ping 192.168.160.10
PING 192.168.160.10 (192.168.160.10) 56(84) bytes of data.
^C
--- 192.168.160.10 ping statistics ---
3 packets transmitted, 0 received, 100% packet loss, time 2015ms
root at firewall03:/etc/shorewall# ssh !$
ssh 192.168.160.10
^C
root at firewall03:/etc/shorewall#
Oh but here is the output of "look"
root at solexa1:~# ipsec look
Warning: ignored obsolete keyword forwardcontrol
solexa1 Fri May 3 14:06:37 EDT 2013
XFRM state:
src 10.242.182.88 dst 10.246.159.41
proto esp spi 0xfd714993 reqid 16385 mode tunnel
replay-window 32 flag af-unspec
auth-trunc hmac(sha1) 0x5e82ad2189e1c0b7d457a00356386cd89a93979a 96
enc cbc(aes) 0xe821bf4be3afa8232018736e6cc75a1eed04b80eda195562535a0902b9c2b9dd
src 10.246.159.41 dst 10.242.182.88
proto esp spi 0x8d0f2aee reqid 16385 mode tunnel
replay-window 32 flag af-unspec
auth-trunc hmac(sha1) 0xa355768e6dd7ad7383157ebd8cc0a435f96c9fef 96
enc cbc(aes) 0xe609399474365e14b1b41a867ce87c93960c9a2649530aa59c32d382878b746d
XFRM policy:
src 192.168.160.0/24 dst 172.30.0.0/24
dir out priority 2344
tmpl src 10.246.159.41 dst 10.242.182.88
proto esp reqid 16385 mode tunnel
src 172.30.0.0/24 dst 192.168.160.0/24
dir fwd priority 2344
tmpl src 10.242.182.88 dst 10.246.159.41
proto esp reqid 16385 mode tunnel
src 172.30.0.0/24 dst 192.168.160.0/24
dir in priority 2344
tmpl src 10.242.182.88 dst 10.246.159.41
proto esp reqid 16385 mode tunnel
src ::/0 dst ::/0
socket out priority 0
src ::/0 dst ::/0
socket in priority 0
src 0.0.0.0/0 dst 0.0.0.0/0
socket out priority 0
src 0.0.0.0/0 dst 0.0.0.0/0
socket in priority 0
src 0.0.0.0/0 dst 0.0.0.0/0
socket out priority 0
src 0.0.0.0/0 dst 0.0.0.0/0
socket in priority 0
src 0.0.0.0/0 dst 0.0.0.0/0
socket out priority 0
src 0.0.0.0/0 dst 0.0.0.0/0
socket in priority 0
src 0.0.0.0/0 dst 0.0.0.0/0
socket out priority 0
src 0.0.0.0/0 dst 0.0.0.0/0
socket in priority 0
src 0.0.0.0/0 dst 0.0.0.0/0
socket out priority 0
src 0.0.0.0/0 dst 0.0.0.0/0
socket in priority 0
src 0.0.0.0/0 dst 0.0.0.0/0
socket out priority 0
src 0.0.0.0/0 dst 0.0.0.0/0
socket in priority 0
XFRM done
IPSEC mangle TABLES
iptables: No chain/target/match by that name.
ip6tables: No chain/target/match by that name.
NEW_IPSEC_CONN mangle TABLES
iptables: No chain/target/match by that name.
ip6tables: No chain/target/match by that name.
ROUTING TABLES
default via 10.246.159.1 dev eth1 metric 100
10.246.159.0/24 dev eth1 proto kernel scope link src 10.246.159.41
fe80::/64 dev eth1 proto kernel metric 256
root at solexa1:~#
--
“Don't eat anything you've ever seen advertised on TV”
- Michael Pollan, author of "In Defense of Food"
More information about the Users
mailing list