Skip site navigation (1)Skip section navigation (2)
Date:      Mon, 10 Oct 2022 12:59:50 -0300
From:      =?UTF-8?Q?Andr=C3=A9_S=2E_Almeida?= <andre@andre.adm.br>
To:        pf@freebsd.org
Subject:   Re: PF: nat on ipsec
Message-ID:  <CADsrzyaXoD9a86q1a3GD=kfUZtscYsgK1uBf0a5v3=e3AqWL2w@mail.gmail.com>
In-Reply-To: <bfb2f2d0-8fdb-52b4-1d9b-2baea2a5d983@shrew.net>
References:  <c35f847b-60cd-fa48-66ae-66c48e3729b1@gmx.at> <e3d77559-8894-5b49-0993-b2988d6fd553@shrew.net> <1ba3e340-e204-15b0-d395-a942c97c39f5@gmx.at> <bfb2f2d0-8fdb-52b4-1d9b-2baea2a5d983@shrew.net>

index | next in thread | previous in thread | raw e-mail

[-- Attachment #1 --]
Take a look at the sysctl option "net.inet.ipsec.filtertunnel", it needs to
be active for NAT to work with IPSec

 - Andre

Em seg., 10 de out. de 2022 às 12:52, Matthew Grooms <mgrooms@shrew.net>
escreveu:

> On 10/10/22 10:38, infoomatic wrote:
> > On 10.10.22 17:01, Matthew Grooms wrote:
> >>
> >> I'm not sure if I understood all the details here, but: NAT happens on
> >> egress. For traffic to be processed by IPsec, your traffic must have
> >> source and destination addresses that match the appropriate IPsec
> >> policy. Waiting until its being sent outbound ( where NAT occurs ) is
> >> usually too late.
> >>
> > thanks for your response. The source and destination addresses in the
> > configuration are OK. Every non-ipsec packet coming from opnsense is
> > translated as in the pf.conf on the host. The problem is: as soon as it
> > is an ipsec packet, the host does not translate it but instead forwards
> > the packet with the original private ip through the physical interface
> > with the public ip address (which of course is prohibited by a rule
> > further down in pf.conf). I have tried to add various nat + rdr rules
> > which explicitly use various protocols from /etc/protocols e.g. "proto
> > ipencap" but this does not change the behaviour. It seems like the host
> > realizes it is an ipsec packet and just refuses to nat that packet.
> >
> >
> > Out of curiosity I ordered another hardware host where I installed
> > Linux, created a VM with opnsense (with the same config, the only
> > adaption was the public ip-address in the ipsec configuration) and a
> > client on opnsense's LAN interface. I used iptables and it worked as
> > expected ... every packet on egress is translated to the outgoing ip
> > address.
> >
>
> IPsec traffic flow is complicated. Have a look at enc. It's been
> instrumental in helping me fix this class of issue in several instances.
> YMMV.
>
> https://www.freebsd.org/cgi/man.cgi?query=enc&sektion=4
>
> Good luck! :)
>
> -Matthew
>
> --
André S. Almeida
http://www.andre.adm.br
+55 (48) 98812-3932

[-- Attachment #2 --]
<div dir="auto">Take a look at the sysctl option &quot;net.inet.ipsec.filtertunnel&quot;, it needs to be active for NAT to work with IPSec<br></div><div><br></div><div dir="auto"> - Andre </div><div dir="auto"><br><div class="gmail_quote"><div dir="ltr" class="gmail_attr">Em seg., 10 de out. de 2022 às 12:52, Matthew Grooms &lt;<a href="mailto:mgrooms@shrew.net">mgrooms@shrew.net</a>&gt; escreveu:<br></div><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">On 10/10/22 10:38, infoomatic wrote:<br>
&gt; On 10.10.22 17:01, Matthew Grooms wrote:<br>
&gt;&gt;<br>
&gt;&gt; I&#39;m not sure if I understood all the details here, but: NAT happens on<br>
&gt;&gt; egress. For traffic to be processed by IPsec, your traffic must have<br>
&gt;&gt; source and destination addresses that match the appropriate IPsec<br>
&gt;&gt; policy. Waiting until its being sent outbound ( where NAT occurs ) is<br>
&gt;&gt; usually too late.<br>
&gt;&gt;<br>
&gt; thanks for your response. The source and destination addresses in the<br>
&gt; configuration are OK. Every non-ipsec packet coming from opnsense is<br>
&gt; translated as in the pf.conf on the host. The problem is: as soon as it<br>
&gt; is an ipsec packet, the host does not translate it but instead forwards<br>
&gt; the packet with the original private ip through the physical interface<br>
&gt; with the public ip address (which of course is prohibited by a rule<br>
&gt; further down in pf.conf). I have tried to add various nat + rdr rules<br>
&gt; which explicitly use various protocols from /etc/protocols e.g. &quot;proto<br>
&gt; ipencap&quot; but this does not change the behaviour. It seems like the host<br>
&gt; realizes it is an ipsec packet and just refuses to nat that packet.<br>
&gt;<br>
&gt;<br>
&gt; Out of curiosity I ordered another hardware host where I installed<br>
&gt; Linux, created a VM with opnsense (with the same config, the only<br>
&gt; adaption was the public ip-address in the ipsec configuration) and a<br>
&gt; client on opnsense&#39;s LAN interface. I used iptables and it worked as<br>
&gt; expected ... every packet on egress is translated to the outgoing ip<br>
&gt; address.<br>
&gt;<br>
<br>
IPsec traffic flow is complicated. Have a look at enc. It&#39;s been <br>
instrumental in helping me fix this class of issue in several instances. <br>
YMMV.<br>
<br>
<a href="https://www.freebsd.org/cgi/man.cgi?query=enc&amp;sektion=4" rel="noreferrer" target="_blank">https://www.freebsd.org/cgi/man.cgi?query=enc&amp;sektion=4</a><br>;
<br>
Good luck! :)<br>
<br>
-Matthew<br>
<br>
</blockquote></div></div>-- <br><div dir="ltr" class="gmail_signature" data-smartmail="gmail_signature"><div dir="ltr"><div><div>André S. Almeida</div><div><a href="http://www.andre.adm.br" target="_blank">http://www.andre.adm.br</a></div><div>+55 (48) 98812-3932</div></div></div></div>
home | help

Want to link to this message? Use this
URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?CADsrzyaXoD9a86q1a3GD=kfUZtscYsgK1uBf0a5v3=e3AqWL2w>