From owner-freebsd-net@freebsd.org Tue Jun 9 23:49:08 2020 Return-Path: Delivered-To: freebsd-net@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 9B25E3408B3 for ; Tue, 9 Jun 2020 23:49:08 +0000 (UTC) (envelope-from jmg@gold.funkthat.com) Received: from gold.funkthat.com (gate2.funkthat.com [208.87.223.18]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "gate2.funkthat.com", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 49hRfW5K6fz44ZN; Tue, 9 Jun 2020 23:49:07 +0000 (UTC) (envelope-from jmg@gold.funkthat.com) Received: from gold.funkthat.com (localhost [127.0.0.1]) by gold.funkthat.com (8.15.2/8.15.2) with ESMTPS id 059Nn0ZG094967 (version=TLSv1.2 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=NO); Tue, 9 Jun 2020 16:49:00 -0700 (PDT) (envelope-from jmg@gold.funkthat.com) Received: (from jmg@localhost) by gold.funkthat.com (8.15.2/8.15.2/Submit) id 059NmxZ3094966; Tue, 9 Jun 2020 16:48:59 -0700 (PDT) (envelope-from jmg) Date: Tue, 9 Jun 2020 16:48:59 -0700 From: John-Mark Gurney To: Tom Marcoen Cc: Julian Elischer , freebsd-net@freebsd.org Subject: Re: On Netgraph Message-ID: <20200609234859.GR4213@funkthat.com> Mail-Followup-To: Tom Marcoen , Julian Elischer , freebsd-net@freebsd.org References: MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: X-Operating-System: FreeBSD 11.3-STABLE amd64 X-PGP-Fingerprint: D87A 235F FB71 1F3F 55B7 ED9B D5FF 5A51 C0AC 3D65 X-Files: The truth is out there X-URL: https://www.funkthat.com/ X-Resume: https://www.funkthat.com/~jmg/resume.html X-TipJar: bitcoin:13Qmb6AeTgQecazTWph4XasEsP7nGRbAPE X-to-the-FBI-CIA-and-NSA: HI! HOW YA DOIN? can i haz chizburger? User-Agent: Mutt/1.6.1 (2016-04-27) X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.4.3 (gold.funkthat.com [127.0.0.1]); Tue, 09 Jun 2020 16:49:00 -0700 (PDT) X-Rspamd-Queue-Id: 49hRfW5K6fz44ZN X-Spamd-Bar: + Authentication-Results: mx1.freebsd.org; dkim=none; dmarc=none; spf=none (mx1.freebsd.org: domain of jmg@gold.funkthat.com has no SPF policy when checking 208.87.223.18) smtp.mailfrom=jmg@gold.funkthat.com X-Spamd-Result: default: False [1.88 / 15.00]; RCVD_TLS_ALL(0.00)[]; ARC_NA(0.00)[]; MID_RHS_MATCH_FROM(0.00)[]; FROM_HAS_DN(0.00)[]; RCPT_COUNT_THREE(0.00)[3]; TO_DN_SOME(0.00)[]; TAGGED_RCPT(0.00)[]; MIME_GOOD(-0.10)[text/plain]; DMARC_NA(0.00)[funkthat.com]; AUTH_NA(1.00)[]; NEURAL_SPAM_MEDIUM(0.25)[0.254]; TO_MATCH_ENVRCPT_SOME(0.00)[]; NEURAL_HAM_SHORT(-0.17)[-0.168]; NEURAL_SPAM_LONG(0.59)[0.593]; R_SPF_NA(0.00)[no SPF record]; FREEMAIL_TO(0.00)[gmail.com]; FORGED_SENDER(0.30)[jmg@funkthat.com,jmg@gold.funkthat.com]; R_DKIM_NA(0.00)[]; MIME_TRACE(0.00)[0:+]; RCVD_COUNT_TWO(0.00)[2]; ASN(0.00)[asn:32354, ipnet:208.87.216.0/21, country:US]; FROM_NEQ_ENVFROM(0.00)[jmg@funkthat.com,jmg@gold.funkthat.com] X-BeenThere: freebsd-net@freebsd.org X-Mailman-Version: 2.1.33 Precedence: list List-Id: Networking and TCP/IP with FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 09 Jun 2020 23:49:08 -0000 Tom Marcoen wrote this message on Tue, Jun 09, 2020 at 12:53 +0200: > That is what I had in mind. Though I was hoping I could put the encryption > in NetGraph too so that I would not see that interface on my host where I > do not need to see it. You wouldn't see any interface if you're encrypting and authenticating a UDP tunnel with IPsec... the Security Association (SA) is transparent and does not appear on the interface list of your host.. > On Tue, 9 Jun 2020 at 05:28, Julian Elischer wrote: > > > On 5/27/20 4:20 AM, Eugene Grosbein wrote: > > > 27.05.2020 15:06, Tom Marcoen wrote: > > > > > >> Hey all, > > >> > > >> I'm new to this mailing list and also quite new to FreeBSD (huray, > > welcome > > >> to me!) so bare with me, please. > > >> > > >> I'm reading up on Netgraph on how I can integrate it with FreeBSD jails > > and > > >> I was looking at some of the examples provided in > > >> /usr/share/examples/netgraph and now have the following question. > > >> The udp.tunnel example shows an iface point-to-point connection but it > > is > > >> unencrypted. Of course I could encrypt it with an IPsec tunnel on the > > host > > >> or tunnel it through SSH, but I was wondering whether there exists a > > nice > > >> Netgraph solution, e.g. a node with two hooks, receiving unencrypted > > >> traffic on the inside hook and sending out encrypted traffic on the > > outside > > >> hook. > > > There is ng_mppc(4) netgraph node capable to perform relatively weak > > MPPE encryption > > > (and/or compression) but it is designed to work with ng_ppp(4) node > > encapsulating IP packets into PPP frames. > > > I doubt it's very efficient for inter-jail traffic. > > > > > > Why do you need encryption for inter-jails traffic in first place? > > > Encryption is needed for traffic passing untrusted channels where data > > interception is possible > > > but inter-jail traffic does not leave the kernel at all until it hits > > destination jail. > > Once you have a udp tunnel set up you just need to set up an IPSEC SA > > to to encrypt just that tunnel. > > It's not required to do the encryption in netgraph. > > there is a script to make the tunnel in > > /usr/share/examples.netgraph/udp.tunnel > > you just need to set up the SA to catch it.. > > you can also if you desire you can also put a netgraph bridge at both > > ends of the tunnel and have a single subnet connected by the link. The > > bridge nodes are "learning" so they will learn when to send packets over > > the link and when not to. > > You can also play tricks with FIBs so that tunnel envelope packets and all > > other packets use different routing tables. -- John-Mark Gurney Voice: +1 415 225 5579 "All that I will do, has been done, All that I have, has not."