Date: Fri, 29 Jun 2001 13:44:24 -0400 From: Jim Mock <jim@compete.com> To: questions@FreeBSD.org Subject: more on VPN Message-ID: <20010629134423.A2536@cartman.boston.geekhouse.net>
next in thread | raw e-mail | index | archive | help
I've made some progress on the VPN since the mail I sent to the list a few days ago. The two machines are now exchanging keys with racoon quite happily and I see traffic on gif0, but I still can't ping either side from the other. Here's the setup as it currently stands: aa.aaa.aaa.aa is the Boston firewall's external IP address. bb.bbb.bbb.bbb is the San Francisco firewall's external IP address. Boston ------ On the firewall, I have the following script in /usr/local/etc/rc.d: % more vpn.sh #!/bin/sh # set up the tunnel device gifconfig gif0 aa.aaa.aaa.aa bb.bbb.bbb.bbb # set up the internal side of the tunnel ifconfig gif0 192.168.0.10 192.168.1.1 netmask 255.255.255.0 # add a route route add -net 192.168.1.0/24 192.168.1.1 # set up the keys setkey -f /etc/ipsec.conf % This produces the following: % ifconfig gif0 gif0: flags=8051<UP,POINTOPOINT,RUNNING,MULTICAST> mtu 1280 inet 192.168.0.10 --> 192.168.1.1 netmask 0xffffff00 % % netstat -rn | grep gif0 192.168.1 192.168.1.1 UGSc 0 227 gif0 192.168.1.1 192.168.0.10 UH 2 20 gif0 % /etc/ipsec.conf contains the following: % more /etc/ipsec.conf flush; spdflush; spdadd 192.168.0.0/24 192.168.1.0/24 any -P out ipsec esp/tunnel/aa.aaa.aaa.aa-bb.bbb.bbb.bbb/require; spdadd 192.168.1.0/24 192.168.0.0/24 any -P in ipsec esp/tunnel/bb.bbb.bbb.bbb-aa.aaa.aaa.aa/require; % setkey -D produces the following output: % setkey -D aa.aaa.aaa.aa bb.bbb.bbb.bbb esp mode=tunnel spi=149552552(0x08e9fda8) reqid=0(0x00000000) E: 3des-cbc 1b204067 464bfc6f 7b392ce5 ced431d2 81f3e3e5 34a8191c A: hmac-sha1 0f7debd3 dd057e35 3cc76a30 1c986de3 76e24268 replay=4 flags=0x00000000 state=mature seq=1 pid=1000 created: Jun 29 13:01:25 2001 current: Jun 29 13:20:53 2001 diff: 1168(s) hard: 3600(s) soft: 2880(s) last: Jun 29 13:09:26 2001 hard: 0(s) soft: 0(s) current: 4368(bytes) hard: 51200000(bytes) soft: 40960000(bytes) allocated: 33 hard: 0 soft: 0 refcnt=2 bb.bbb.bbb.bbb aa.aaa.aaa.aa esp mode=tunnel spi=122421204(0x074bffd4) reqid=0(0x00000000) E: 3des-cbc 8540f84a 71bbf61d 397bc0a2 c7a1ea64 2a089d7d df1a34c7 A: hmac-sha1 3b258495 2c8f1a23 fa0d8595 4621c53d 6ecaac1d replay=4 flags=0x00000000 state=mature seq=0 pid=1000 created: Jun 29 13:01:25 2001 current: Jun 29 13:20:53 2001 diff: 1168(s) hard: 3600(s) soft: 2880(s) last: Jun 29 13:20:49 2001 hard: 0(s) soft: 0(s) current: 7704(bytes) hard: 51200000(bytes) soft: 40960000(bytes) allocated: 138 hard: 0 soft: 0 refcnt=1 The output of ipfw show tells me packets are going through: 03100 0 0 allow esp from aa.aaa.aaa.aa to bb.bbb.bbb.bbb 03200 186 19880 allow esp from bb.bbb.bbb.bbb to aa.aaa.aaa.aa 03300 3 764 allow udp from aa.aaa.aaa.aa 500 to bb.bbb.bbb.bbb 500 03400 5 1160 allow udp from bb.bbb.bbb.bbb 500 to aa.aaa.aaa.aa 500 03500 0 0 allow ipencap from aa.aaa.aaa.aa to bb.bbb.bbb.bbb 03600 0 0 allow ipencap from bb.bbb.bbb.bbb to aa.aaa.aaa.aa 03700 33 2652 allow ip from any to any via gif0 None of the deny rules I have set up are activated when I try to ping a machine on either side. San Francisco ------------- % more vpn.sh #!/bin/sh # set up the tunnel device gifconfig gif0 bb.bbb.bbb.bbb aa.aaa.aaa.aa # set up the internal side of the tunnel ifconfig gif0 inet 192.168.1.1 192.168.0.10 netmask 255.255.255.0 # add a route route add -net 192.168.0.0/24 192.168.0.10 # set up the keys setkey -f /etc/ipsec.conf % This gives me: % ifconfig gif0 gif0: flags=8051<UP,POINTOPOINT,RUNNING,MULTICAST> mtu 1280 inet 192.168.1.1 --> 192.168.0.10 netmask 0xffffff00 % % netstat -rn | grep gif0 192.168 192.168.0.10 UGSc 0 677 gif0 192.168.0.10 192.168.1.1 UH 1 132 gif0 % In /etc/ipsec.conf: % more /etc/ipsec.conf flush; spdflush; spdadd 192.168.1.0/24 192.168.0.0/24 any -P out ipsec esp/tunnel/bb.bbb.bbb.bbb-aa.aaa.aaa.aa/require; spdadd 192.168.0.0/24 192.168.1.0/24 any -P in ipsec esp/tunnel/aa.aaa.aaa.aa-bb.bbb.bbb.bbb/require; % Output of setkey -D: % setkey -D bb.bbb.bbb.bbb aa.aaa.aaa.aa esp mode=tunnel spi=18868878(0x011fea8e) reqid=0(0x00000000) E: 3des-cbc a1070723 ca19fd9c a58d53bc be46fe0d 87511fd8 e20996a5 A: hmac-sha1 ae0afab2 0fddc4f8 d9f43058 c9a9653e 849b7bc5 replay=4 flags=0x00000000 state=mature seq=1 pid=300 created: Jun 29 10:41:38 2001 current: Jun 29 10:41:55 2001 diff: 17(s) hard: 3600(s) soft: 2880(s) last: Jun 29 10:41:52 2001 hard: 0(s) soft: 0(s) current: 520(bytes) hard: 51200000(bytes) soft: 40960000(bytes) allocated: 5 hard: 0 soft: 0 refcnt=2 aa.aaa.aaa.aa bb.bbb.bbb.bbb esp mode=tunnel spi=160142316(0x098b93ec) reqid=0(0x00000000) E: 3des-cbc f4dd081d 029f81d4 f07580e0 dfaee2a4 7cd81489 647c818d A: hmac-sha1 bc18c39b 557321e8 c76925b9 561e64a4 5ea38d3e replay=4 flags=0x00000000 state=mature seq=0 pid=300 created: Jun 29 10:41:38 2001 current: Jun 29 10:41:55 2001 diff: 17(s) hard: 3600(s) soft: 2880(s) last: hard: 0(s) soft: 0(s) current: 0(bytes) hard: 51200000(bytes) soft: 40960000(bytes) allocated: 0 hard: 0 soft: 0 refcnt=1 % And here's the ipfw show output showing traffic: 02500 0 0 allow esp from 66.122.112.198 to 64.211.217.66 02600 11 1496 allow esp from 64.211.217.66 to 66.122.112.198 02700 5 1160 allow udp from 66.122.112.198 500 to 64.211.217.66 500 02800 3 764 allow udp from 64.211.217.66 500 to 66.122.112.198 500 02900 0 0 allow ipencap from 66.122.112.198 to 64.211.217.66 03000 0 0 allow ipencap from 64.211.217.66 to 66.122.112.198 03100 23 1500 allow ip from any to any via gif0 I've been banging my head against a wall with this for 3 or 4 days now... trying various things. This is the closest I've come to it actually working. Any ideas? - jim -- - jim mock <jim@compete.com> www.compete.com - jim@FreeBSD.org - - senior systems administrator - Compete, Inc. - ph: 1.617.867.7035 - To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-questions" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20010629134423.A2536>