Date: Thu, 25 Mar 1999 23:36:43 -0500 From: "Jim Flowers" <jflowers@ezo.net> To: <freebsd-security@freebsd.org> Subject: Fw: Skip configuration Message-ID: <002101be7742$400997f0$23b197ce@ezo.net>
index | next in thread | raw e-mail
----- Original Message -----
From: Jim Flowers <jflowers@ezo.net>
To: Jean M. Vandette <vandj@securenet.net>
Sent: Thursday, March 25, 1999 11:35 PM
Subject: Re: Skip configuration
> Easier to analyze with info on both ends but I infer that you have:
>
> =============10.10.10.0/24======ethernet
> |
> [mtl] #.#.#.# KeyID 6b9d...
> |
> {Internet}
> |
> [tor] 209.167.132.39 KeyID c79f...
> |
> =============10.10.11.0/24======ethernet
>
> Most of your setup looks OK. I would also add the skiphosts to your ACLs
on
> both ends:
>
> On mtl:
>
> skiphost -a 209.167.132.39 -k DES-EDE-K3 -t DES-CBC -m MD5 -s 8 -r 8 -R
> 0xc79...
>
> On tor:
>
> skiphost -a #.#.#.# -k DES-EDE-K3 -t DES-CBC -m MD5 -s 8 -r 8 -R 0x6b9d...
>
> If you only have one key for each skiphost, it is in slot 0 and you don't
> need to include the sender KeyID. It is very important, however, that the
> keys on both ends have the same length and that they are generated with
both
> skiphosts having the correct time and date and timezone set first.
>
> I also recommend using `tcpdump proto 57 or host skiphost.address to see
> what is happening (may require rebuilding kernel with bpfilter).
>
> Here is my general procedure:
>
> On skiphost A
>
> 1. Set timezone with `/stand/sysinstall`.
> 2. Set time/date with `ntpdate isp.ntp.server`.
> 3. Delete all local keys with `skiplocal rm slot`.
> 4. Make one new key with length M using `skiplocal keygen -m M`.
> 5. Generate script with `skiplocal export > add_A`.
> 6. Copy for a template with `cp add_A add_A_net`.
> 7. Edit add_A_net to put in the network and netmask and identify the
> tunnel
> Original: skiphost -a skip.host.B.address ...
> Edited: skiphost -a sub.net.B.address -M sub.net.B.netmask -A
> skip.host.B.address ...
> 8. ftp add_A and add_A_net to skiphost B.
> 9. `skiphost -a default`
> 10. `skiphost -a sub.net.A.address -M sub.net.A.netmask`
> 11. `sh add_B`
> 12. `sh add_B_net`
> 13. `skipif -s`
> 14. `skipd_restart`
>
> On skiphost B
>
> 1. Set timezone with `/stand/sysinstall`.
> 2. Set time/date with `ntpdate isp.ntp.server`.
> 3. Delete all local keys with `skiplocal rm slot`.
> 4. Make one new key with length M (SAME AS ON A) using `skiplocal
> keygen -m M`.
> 5. Generate script with `skiplocal export > add_B`.
> 6. Copy for a template with `cp add_B add_B_net`.
> 7. Edit add_B_net to put in the network and netmask and identify the
> tunnel
> Original: skiphost -a skip.host.A.address ...
> Edited: skiphost -a sub.net.A.address -M sub.net.A.netmask -A
> skip.host.A.address ...
> 8. ftp add_B and add_B_net to skiphost A.
> 9. `skiphost -a default`
> 10. `skiphost -a sub.net.B.address -M sub.net.B.netmask`
> 11. `sh add_A`
> 12. `sh add_A_net`
> 13. `skipif -s`
> 14. `skipd_restart`
>
> The reason for saving it all before turning it on is so that you can have
> someone at the far end just boot the machine when it doesn't work and it
> will come up OK. Once you're confident that you're through with debugging
> you can save it with SKIP turned on.
>
> I also find it convenient to telnet to an intermediate device and from
there
> to the distant skiphost so that my telnet session will not be interrupted
by
> an erroneous entry.
>
> Now just issue `skiphost -o on` for the distant skiphost and then the
local
> skiphost and you should be up and tunneling.
>
> If it still doesn't work it could be that some intermediate isp is not
> forwarding your packets in one direction or the other because they have
> non-routable addresses as the source address (might be an indication of an
> attacker). Use the -f flag in the most recent ports to specify the
address
> of the local skiphost as the source. Something like:
>
> skiphost -a 10.10.11.0 -M 255.255.255.0 -A 209.167.132.39 -k DES-EDE-K3 -t
> DES-CBC -m MD5 -s 8 -r 8 -R 0xc79f... -f #.#.#.#
>
> This could well be the cause given that you can communicate skiphost to
> skiphost OK. The only place I have run into this, however, is Taiwan and
on
> my TWC RoadRunner cable system at home.
>
> Finally, do remember that the hosts on the network have to know how to get
> back to the skiphost in order to respond so you should be using routed or
> gated or have them configured with static routes for each distant network
or
> a default route pointing back to the skiphost. If you have them all
> pointing at some other machine then it should know to route responses back
> to the skiphost.
>
> That pretty well covers the lot. I would say that more than 70% of the
> problems that I have encountered relate to routing problems, not SKIP
> problems.
>
> Good luck.
>
> Jim
>
> ----- Original Message -----
> From: Jean M. Vandette <vandj@securenet.net>
> To: <jflowers@ezo.net>
> Sent: Thursday, March 25, 1999 9:16 PM
> Subject: Skip configuration
>
>
> > Greetings....
> >
> > I was given you name by Mike Smith (a good friend of mine) at FreeBSD or
> > CDROM.com whichever name you prefer as the person to talk to about
setting
> up
> > skipd for a VPN. I got skip running from one end to the other for
> pinging.
> > however the hidden private networks do not seem to see each other.
>
> > mtl# skiphost
> > fxp0: access control enabled, only authorized SKIP hosts can connect
> > default: cleartext
> > 10.10.11.*: SKIP params:
> > IP mode: tunneling
> > Tunnel address: tor
> > Kij alg: DES-EDE-K3
> > Crypt alg: DES-CBC
> > MAC alg: MD5
> > Receiver NSID: MD5 (DH Pub.Value)
> > Receiver key id: 0xc79fa41f17a16bec2e9fabedd23f6a55
> > Sender NSID: MD5 (DH Pub.Value)
> > Sender key id: 0x6b9da71fe7cc8ca40c01c8e4b7be05af
> > mtl# ping 10.10.11.1
> > PING 10.10.11.1 (10.10.11.1): 56 data bytes
> > Mar 25 19:02:37 mtl skipd: Calculating Shared secret for
> > c79fa41f17a16bec2e9fabedd23f6a55
> > Mar 25 19:02:37 mtl skipd: Done
> > ^C
> > --- 10.10.11.1 ping statistics ---
> > 8 packets transmitted, 0 packets received, 100% packet loss
>
> > The machine in tor is set the same only in reverse of course. Gateway
> > forwarding is set
> > on and as you can see when I ping the other machine, the packets seem to
> be
> > lost.
> >
> > Can you give me some pointers as to what could be wrong.
> >
> > Regards
> >
> > Jean M. Vandette
>
To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message
home |
help
Want to link to this message? Use this
URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?002101be7742$400997f0$23b197ce>
