Date: Thu, 13 Sep 2001 15:32:18 -0500 From: Paul Root <proot@iaces.com> To: Brooks Davis <brooks@one-eyed-alien.net>, security@freebsd.org Subject: Re: IPSEC config Message-ID: <3BA117D2.ECF38713@iaces.com> References: <3BA10B3F.610E6FB3@iaces.com> <20010913124438.A19163@Odin.AC.HMC.Edu>
next in thread | previous in thread | raw e-mail | index | archive | help
Ok, I'm making progress. This is what I've come up with:
#!/bin/sh
# These commands need to be run on acesfbsd to
# connect to lorax, in a IPSEC test
#
# Setup the tunnel device.
#gifconfig gif0 10.20.30.4 172.28.56.82
ifconfig gif0 destroy
ifconfig gif0 create tunnel 10.20.30.4 172.28.56.82
#
# The next 2 lines delete all existing entries
# from the SPD and SAD
setkey -FP
setkey -F
# Add the policy
setkey -c <<EOF
spdadd 10.20.30.0/24 172.28.56.0/23 any -P out ipsec
esp/transport/10.20.30.4-172.28.56.82/require;
spdadd 172.28.56.0/23 10.20.30.0/24 any -P in ipsec
esp/transport/172.28.56.82-10.20.30.4/require;
EOF
And it seems to work for the routing machines, here's some
tcpdump output:
tcpdump: listening on fxp0
15:23:36.388756 lorax.isakmp > acesfbsd.isakmp: isakmp: phase 1 I agg:
[|sa]
15:23:36.439595 acesfbsd.isakmp > lorax.isakmp: isakmp: phase 1 R agg:
[|sa]
15:23:36.744202 lorax.isakmp > acesfbsd.isakmp: isakmp: phase 1 I agg:
(hash: len=20)
15:23:37.884653 lorax.isakmp > acesfbsd.isakmp: isakmp: phase 2/others I
oakley-
quick[E]: [|hash]
15:23:37.906233 acesfbsd.isakmp > lorax.isakmp: isakmp: phase 2/others R
oakley-
quick[E]: [|hash]
15:23:37.970725 lorax.isakmp > acesfbsd.isakmp: isakmp: phase 2/others I
oakley-
quick[E]: [|hash]
15:23:42.160046 lorax > acesfbsd: ESP(spi=0x0343e661,seq=0x1)
15:23:49.717717 acesfbsd > lorax: ESP(spi=0x0d914c06,seq=0x1)
15:23:49.718980 lorax > acesfbsd: ESP(spi=0x0343e661,seq=0x2)
15:23:50.725920 acesfbsd > lorax: ESP(spi=0x0d914c06,seq=0x2)
15:23:50.727104 lorax > acesfbsd: ESP(spi=0x0343e661,seq=0x3)
15:23:51.735860 acesfbsd > lorax: ESP(spi=0x0d914c06,seq=0x3)
15:23:51.737023 lorax > acesfbsd: ESP(spi=0x0343e661,seq=0x4)
15:24:14.698044 sunburn.42072 > acesfbsd.33435: udp 12 (DF) [ttl 1]
15:24:18.927721 sunburn > acesfbsd: icmp: echo request (DF)
15:24:19.923220 sunburn > acesfbsd: icmp: echo request (DF)
So that's cool. Could it be I'm down to routing?
My route table looks like this:
Routing tables
Internet:
Destination Gateway Flags Refs Use Netif
Expire
default 10.20.30.1 UGSc 7 63 fxp0
10.20.30/24 link#1 UC 7 0 fxp0
10.20.30.1 0:c0:95:e0:b3:69 UHLW 7 0 fxp0
1191
10.20.30.3 8:0:20:7e:85:d4 UHLW 1 35 fxp0
796
10.20.30.5 8:0:20:ab:bb:69 UHLW 1 50 fxp0
937
10.20.30.13 0:4:76:2b:4a:92 UHLW 1 12 fxp0
1166
10.20.30.16 0:30:65:b2:87:ae UHLW 0 0 fxp0
745
10.20.30.50 0:2:b3:30:1f:ad UHLW 1 36 fxp0
987
10.20.30.255 ff:ff:ff:ff:ff:ff UHLWb 0 44 fxp0
127.0.0.1 127.0.0.1 UH 2 40 lo0
172.28.56/24 gif0 USc 0 0 gif0
and ifconfig:
fxp0: flags=8943<UP,BROADCAST,RUNNING,PROMISC,SIMPLEX,MULTICAST> mtu
1500
inet 10.20.30.4 netmask 0xffffff00 broadcast 10.20.30.255
inet6 fe80::2a0:c9ff:fe08:1f21%fxp0 prefixlen 64 scopeid 0x1
ether 00:a0:c9:08:1f:21
media: Ethernet autoselect (100baseTX)
status: active
lp0: flags=8810<POINTOPOINT,SIMPLEX,MULTICAST> mtu 1500
lo0: flags=8049<UP,LOOPBACK,RUNNING,MULTICAST> mtu 16384
inet6 ::1 prefixlen 128
inet6 fe80::1%lo0 prefixlen 64 scopeid 0x3
inet 127.0.0.1 netmask 0xff000000
gif0: flags=8051<UP,POINTOPOINT,RUNNING,MULTICAST> mtu 1280
tunnel inet 10.20.30.4 --> 172.28.56.82
inet6 fe80::2a0:c9ff:fe08:1f21%gif0 prefixlen 64 scopeid 0x4
I'm not using ipv6, I guess I should take it out of the kernel. The
other
end does not have ipv6 in the kernel.
Then I have two machines on these nets that have routing pointing to
these machines. Is that right?
Thanks,
Paul.
Brooks Davis wrote:
>
> On Thu, Sep 13, 2001 at 02:38:39PM -0500, Paul Root wrote:
> > Hi,
> > I'm trying to setup a IPSec tunnel and am having trouble.
> > Both machines are 4.4 RC3 (I think, last week). And when I set it up
> > for a transport between the two machines it works fine, so racoon
> > must be fine.
> >
> > I'm following the IPsec mini-HOWTO from January 2001 daemonnews.
> > Here's my config on one end:
> >
> > #!/bin/sh
> > # These commands need to be run on acesfbsd to
> > # connect to lorax, in a IPSEC test
> > #
> > # Setup the tunnel device.
> > gifconfig gif0 10.20.30.4 172.28.56.82
>
> This won't work in 4.4. There's no gif0 device at this point because gif
> devices are now created at runtime. Also, while gifconfig still works,
> it's obsolete. Instead use:
>
> ifconfig gif0 create tunnel 10.20.30.4 172.28.56.82
>
> These addresses should be the local machine's address and the remote
> machines address (is the local machine really a 10.x address?)
>
> -- Brooks
>
> --
> Any statement of the form "X is the one, true Y" is FALSE.
> PGP fingerprint 655D 519C 26A7 82E7 2529 9BF0 5D8E 8BE9 F238 1AD4
>
> ------------------------------------------------------------------------
> Part 1.2Type: application/pgp-signature
--
Paul T. Root E/Mail: proot@iaces.com
600 Stinson Blvd, Fl 1S PAG: +1 (877) 693-7155
Minneapolis, MN 55413 WRK: +1 (612) 664-3385
NIC: PTR FAX: +1 (612) 664-4779
To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?3BA117D2.ECF38713>
