[prev in list] [next in list] [prev in thread] [next in thread] 

List:       openswan-users
Subject:    Re: [Openswan Users] Openswan does not appear to create the correct routes on both sides
From:       Paul Young <paul () arkig ! com>
Date:       2013-09-21 5:52:59
Message-ID: CAAEtRDVqMcP=z1PW1kwxscNY8wYEExZmZWEvvsQhG-DxvPV-yA () mail ! gmail ! com
[Download RAW message or body]

Thanks for the reply Nick,

Well I can bring them up despite their types being different - perhaps
theory is removed from practice in this case.

I have set up the iptables rules already at this point. And depending on of
I try a host to site connection or a site to site connection I change them.

So far I have been able to get host to site working. But not site to site
for reasons already stated - 4G dongle appears to behave differently than
what a standard fixed IP carrier connection would.

I'll try your previous suggestion as well as continue with the host to site
idea.

Thanks,
Paul


On 21 September 2013 06:32, Nick Howitt <n1ck.h0w1tt@gmail.com> wrote:

> You can't use the oldoffice conn for connection to the new office. For a
> start they have different transport types.
> 
> You do need internal firewall rules. I have one set like this:
> 
> iptables -t nat -I POSTROUTING -m policy --dir out --pol ipsec -j ACCEPT
> 
> Nick
> 
> 
> On 20/09/2013 09:39, Paul Young wrote:
> 
> Hi Nick,
> 
> Yes the new office appears to create the correct xfrm policies\routing
> info.
> 
> Part of the complexity here would be that the new office has no
> permanent IP or infrastructure. So the path looks like this from new to old
> 
> server running Openswan in new office------------->Asus router\switch
> N55U running DHCP etc------------>4G dongle acting as modem for the
> Asus--------------->INTERNET-------------->outside NIC of server running
> Openswan in old office.
> 
> From what I can tell there is some machinations going on within the 4G
> dongle so that nmap against the internet routable address the dongle comes
> up with always returns "all 1000 scanned ports on <address blah> are
> filtered" - which could be making things difficult.
> 
> So today I played some more (I will try your suggestions on the weekend
> though) with these configs-
> 
> new office side:
> 
> conn newoffice
> authby=secret
> left=192.168.3.3
> leftid=@newoffice
> leftnexthop=%defaultroute <- the ASUS router
> leftsourceip=192.168.3.3
> leftsubnet=192.168.3.0/24
> right=<outside address of old office>
> rightsubnet=192.168.1.0/24
> type=tunnel
> auto=start
> pfs=no
> salifetime=28800s
> ikelifetime=86400s
> 
> new office side:
> 
> conn oldoffice
> authby=secret
> pfs=no
> auto=add
> keyingtries=3
> type=transport
> forceencaps=yes
> right=%any
> rightprotoport=17/%any
> # Using the magic port of "0" means "any one single port". This is
> # a work around required for Apple OSX clients that use a randomly
> # high port, but propose "0" instead of their port. Could also be
> 17/%any
> #leftprotoport=17/1701
> left=<outside address of old office>
> leftnexthop=<outside address of old office next hop>
> leftsubnet=192.168.1.0/24
> rightsubnet=192.168.3.0/24
> # Apple iOS doesn't send delete notify so we need dead peer
> detection
> # to detect vanishing clients
> dpddelay=10
> dpdtimeout=90
> dpdaction=clear
> 
> In this case once I created a static route on my workstation like so:
> 
> Network Destination        Netmask          Gateway       Interface
> Metric
> 192.168.1.0    255.255.255.0      192.168.3.3    192.168.3.101     11
> 
> I was able to ping anything on the 192.168.1.0/24 subnet in the old
> office.
> 
> BUT - if I add more subnets to see the networks that are currently
> configured as site to site connections in the old office I am unable to see
> those in terms of ping and connectivity.
> 
> Paul
> 
> 
> On 19 September 2013 17:25, Nick Howitt <n1ck.h0w1tt@gmail.com> wrote:
> 
> > In conn current your leftsubnet should be a leftsubnets to match the
> > rightsubnets. While right is not fixed, you may want to try %any but you
> > will have to use the same psk as your roadwarriors. You will also want DPD
> > with dpdaction=clear for when the remote IP changes. I also prefer pfs=yes
> > (or remove it). I don't think any of these issues are causing your problem,
> > however, as you are getting your tunnels.
> > 
> > Can you ping between the two Openswan devices?
> > 
> > In your new office, does your gateway device have routes redirecting
> > traffic 192.168.1.0/24, 10.134.210.64/28 and 10.134.162.59 via
> > 1192.168.3.3?
> > 
> > I'd need to check firewalling when I'm at home. Is "new" running a
> > firewall. Presumably it is just a standalone PC on the "new" LAN.
> > 
> > 
> > 
> > Nick
> > 
> > On 2013-09-19 02:45, Paul Young wrote:
> > 
> > Hi Nick,
> > 
> > Thanks for the response. I have confused the situation as you have
> > suggested.
> > 
> > So now my configs looks like this:
> > 
> > In the current office Openswan (one interface connects directly to the
> > outside world)-
> > 
> > conn current
> > authby=secret
> > left=<my fixed internet IP>
> > leftid=@current
> > leftnexthop=<my fixed internet IP next hop>
> > leftsubnet=192.168.1.0/24
> > leftsourceip=192.168.1.2
> > right=<non fixed IP of the new office router>
> > rightsubnets= { 192.168.3.0/24 }
> > type=tunnel
> > auto=start
> > pfs=no
> > ikelifetime=86400s
> > salifetime=28800s
> > 
> > note that the new office does not have a fixed IP address (it will in the
> > future, but people are moving in before the carrier has that ready)
> > 
> > The current config of the new office-
> > 
> > conn new
> > authby=secret
> > left=192.168.3.3
> > leftid=@new
> > leftnexthop=%defaultroute
> > leftsourceip=192.168.3.3
> > leftsubnet=192.168.3.0/24
> > right=<my fixed internet IP of current office>
> > rightsubnets={10.134.162.59/32 10.134.210.64/28 192.168.1.0/24}
> > type=tunnel
> > auto=start
> > pfs=no
> > salifetime=28800s
> > ikelifetime=86400s
> > 
> > So far I can bring up the new office tunnel but can't ping anything on
> > the other side.
> > 
> > 000 initiating all conns with alias='new'
> > 104 "new/0x3" #25: STATE_MAIN_I1: initiate
> > 003 "new/0x3" #25: received Vendor ID payload [Openswan (this version)
> > 2.6.32 ]
> > 003 "new/0x3" #25: received Vendor ID payload [Dead Peer Detection]
> > 003 "new/0x3" #25: received Vendor ID payload [RFC 3947] method set to=109
> > 106 "new/0x3" #25: STATE_MAIN_I2: sent MI2, expecting MR2
> > 003 "new/0x3" #25: NAT-Traversal: Result using RFC 3947 (NAT-Traversal):
> > both are NATed
> > 108 "new/0x3" #25: STATE_MAIN_I3: sent MI3, expecting MR3
> > 003 "new/0x3" #25: received Vendor ID payload [CAN-IKEv2]
> > 004 "new/0x3" #25: STATE_MAIN_I4: ISAKMP SA established
> > {auth=OAKLEY_PRESHARED_KEY cipher=aes_128 prf=oakley_sha group=modp2048}
> > 117 "new/0x1" #26: STATE_QUICK_I1: initiate
> > 117 "new/0x2" #27: STATE_QUICK_I1: initiate
> > 117 "new/0x3" #28: STATE_QUICK_I1: initiate
> > 004 "new/0x1" #26: STATE_QUICK_I2: sent QI2, IPsec SA established tunnel
> > mode {ESP=>0x28d68261 <0x554dc93f xfrm=AES_128-HMAC_SHA1 NATOA=none
> > NATD=<my fixed internet IP of current office>:4500 DPD=none}
> > 004 "new/0x2" #27: STATE_QUICK_I2: sent QI2, IPsec SA established tunnel
> > mode {ESP=>0x0021555f <0xa7d4a5fb xfrm=AES_128-HMAC_SHA1 NATOA=none
> > NATD=<my fixed internet IP of current office>:4500 DPD=none}
> > 004 "new/0x3" #28: STATE_QUICK_I2: sent QI2, IPsec SA established tunnel
> > mode {ESP=>0xb1e4e80f <0xa82a3d85 xfrm=AES_128-HMAC_SHA1 NATOA=none
> > NATD=<my fixed internet IP of current office>:4500 DPD=none}
> > 
> > I can't bring up the tunnel from the current office to the new office
> > though - I suspect IPtables might be involved there but am not sure as I
> > would of thought these rules would be fine which are in place for road
> > runner types:
> > 
> > -A INPUT -p udp --dport 500 -j ACCEPT
> > -A INPUT -p udp --dport 4500 -j ACCEPT
> > 
> > and on the new office side I have
> > 
> > -A INPUT -p udp --dport 500 -s <my fixed internet IP of current
> > office> -j ACCEPT
> > -A INPUT -p udp --dport 4500 -s <my fixed internet IP of current
> > office> -j ACCEPT
> > 
> > Thanks for trying to help me here.
> > 
> > Paul
> > 
> > 
> > 
> > 
> > 
> > 
> > 
> > On 18 September 2013 22:25, Nick Howitt <n1ck.h0w1tt@gmail.com> wrote:
> > 
> > > Your server and aconns do not match at all. I would rename the server
> > > connto something like roadwarrior and move some of the settings into conn
> > > %default - the ones which would apply to every conn such as left,
> > > leftnexthop (probably not needed) possibly pfs and auto and add
> > > leftsourceip (the server's LAN IP). Create a new conn which you could call
> > > aconn if you wanted. The server's aconn should pretty much match the
> > > remote's aconn with left and right reversed. (Generally wou don't need to
> > > reverse left and right at each end but the use of conn %default means you
> > > must). I would also suggest enabling PFS for aconn.
> > > 
> > > On 2013-09-18 09:49, Paul Young wrote:
> > > 
> > > Hi Everyone,
> > > 
> > > I am in the deep end with Openswan and possibly the following will show
> > > that. Apologies!
> > > 
> > > So far I have been relying heavily on this -
> > > http://www.jacco2.dds.nl/networking/openswan-l2tp.html
> > > 
> > > A little bit of background first. We have a just opened a new office and
> > > not all the infrastructure is in place as yet.
> > > 
> > > So the idea is to use a site to site VPN back to the current office so
> > > that all resources can be reached.
> > > 
> > > There is a server acting as the openswan VPN\gateway etc in both offices
> > > - current office and new office.
> > > 
> > > The current office has a number of site to site configs already in place
> > > to third parties. I have configured a server side which looks like this:
> > > 
> > > *conn server*
> > > *        authby=secret*
> > > *        pfs=no*
> > > *        auto=add*
> > > *        keyingtries=3*
> > > *        type=transport*
> > > *        forceencaps=yes*
> > > *        right=%any*
> > > *        #rightsubnet=vhost:%priv,%no*
> > > *        rightprotoport=17/%any*
> > > *        # Using the magic port of "0" means "any one single port".
> > > This is*
> > > *        # a work around required for Apple OSX clients that use a
> > > randomly*
> > > *        # high port, but propose "0" instead of their port. Could also
> > > be 17/%any*
> > > *        left=<my outside fixed IP address>*
> > > *        leftnexthop=<my outside fixed IP address next hop>*
> > > *        leftprotoport=17/1701*
> > > *        # Apple iOS doesn't send delete notify so we need dead peer
> > > detection*
> > > *        # to detect vanishing clients*
> > > *        dpddelay=10*
> > > *        dpdtimeout=90*
> > > *        dpdaction=clear*
> > > 
> > > behind that is some ppp and xl2tp settings that work well for some of
> > > our remote types. but I am looking at pure Ipsec at this point.
> > > 
> > > In the new office I have set up a conn like this:
> > > 
> > > *conn aconn*
> > > *        authby=secret*
> > > *        left=192.168.3.3*
> > > *        #left=%any*
> > > *        leftid=@vpn*
> > > *        leftnexthop=%defaultroute*
> > > *        leftsourceip=192.168.3.3*
> > > *        leftsubnet=192.168.3.0/24*
> > > *        right=**<my outside fixed IP address>*
> > > *        rightsubnets={10.134.162.59/32 10.134.210.64/28 192.168.1.0/24}
> > > *
> > > *        type=tunnel*
> > > *        auto=start*
> > > *        pfs=no*
> > > *        salifetime=28800s*
> > > *        ikelifetime=86400s*
> > > 
> > > It sits behind a router so left is the local interface. And the subnets
> > > are back in the current office.
> > > 
> > > It comes up ok:
> > > 
> > > *# service ipsec status*
> > > *IPsec running  - pluto pid: 11869*
> > > *pluto pid 11869*
> > > *3 tunnels up*
> > > *some eroutes exist*
> > > 
> > > I see the routes come up ok on the new office side:
> > > 
> > > *# ip xfrm policy*
> > > *src 192.168.3.0/24 dst 10.134.162.59/32*
> > > *        dir out priority 2336 ptype main*
> > > *        tmpl src 192.168.3.3 dst 203.215.150.142*
> > > *                proto esp reqid 16385 mode tunnel*
> > > *src 10.134.162.59/32 dst 192.168.3.0/24*
> > > *        dir fwd priority 2336 ptype main*
> > > *        tmpl src 203.215.150.142 dst 192.168.3.3*
> > > *                proto esp reqid 16385 mode tunnel*
> > > *src 10.134.162.59/32 dst 192.168.3.0/24*
> > > *        dir in priority 2336 ptype main*
> > > *        tmpl src 203.215.150.142 dst 192.168.3.3*
> > > *                proto esp reqid 16385 mode tunnel*
> > > *src 192.168.3.0/24 dst 10.134.210.64/28*
> > > *        dir out priority 2340 ptype main*
> > > *        tmpl src 192.168.3.3 dst 203.215.150.142*
> > > *                proto esp reqid 16389 mode tunnel*
> > > *src 10.134.210.64/28 dst 192.168.3.0/24*
> > > *        dir fwd priority 2340 ptype main*
> > > *        tmpl src 203.215.150.142 dst 192.168.3.3*
> > > *                proto esp reqid 16389 mode tunnel*
> > > *src 10.134.210.64/28 dst 192.168.3.0/24*
> > > *        dir in priority 2340 ptype main*
> > > *        tmpl src 203.215.150.142 dst 192.168.3.3*
> > > *                proto esp reqid 16389 mode tunnel*
> > > *src 192.168.3.0/24 dst 192.168.1.0/24*
> > > *        dir out priority 2344 ptype main*
> > > *        tmpl src 192.168.3.3 dst 203.215.150.142*
> > > *                proto esp reqid 16393 mode tunnel*
> > > *src 192.168.1.0/24 dst 192.168.3.0/24*
> > > *        dir fwd priority 2344 ptype main*
> > > *        tmpl src 203.215.150.142 dst 192.168.3.3*
> > > *                proto esp reqid 16393 mode tunnel*
> > > *src 192.168.1.0/24 dst 192.168.3.0/24*
> > > *        dir in priority 2344 ptype main*
> > > *        tmpl src 203.215.150.142 dst 192.168.3.3*
> > > *                proto esp reqid 16393 mode tunnel*
> > > 
> > > Can't ping anything back in the current office from the new office even
> > > though I can see encapsulated traffic going across at the time of my ping -
> > > nothing comes back.
> > > 
> > > I also don't see anything being created in the xfrm policy for the
> > > current office and if I add a rightsubnet(s) line to the current office
> > > config then the road runners types can't connect.
> > > 
> > > Is what I am trying to do even possible?
> > > 
> > > Thanks,
> > > Paul
> > > 
> > > _______________________________________________Users@lists.openswan.orghttps://lists.openswan.org/mailman/listinfo/users
> > >                 
> > > Micropayments: https://flattr.com/thing/38387/IPsec-for-Linux-made-easy
> > > Building and Integrating Virtual Private Networks with \
> > > Openswan:http://www.amazon.com/gp/product/1904811256/104-3099591-2946327?n=283155
> > >  
> > > 
> > > _______________________________________________
> > > Users@lists.openswan.org
> > > https://lists.openswan.org/mailman/listinfo/users
> > > Micropayments: https://flattr.com/thing/38387/IPsec-for-Linux-made-easy
> > > Building and Integrating Virtual Private Networks with Openswan:
> > > http://www.amazon.com/gp/product/1904811256/104-3099591-2946327?n=283155
> > > 
> > > 
> 
> 


[Attachment #3 (text/html)]

<div dir="ltr">Thanks for the reply Nick,<div><br></div><div>Well I can bring them up \
despite their types being different - perhaps theory is removed from practice in this \
case.</div><div><br></div><div>I have set up the iptables rules already at this \
point. And depending on of I try a host to site connection or a site to site \
connection I change them.</div> <div><br></div><div>So far I have been able to get \
host to site working. But not site to site for reasons already stated - 4G dongle \
appears to behave differently than what a standard fixed IP carrier connection \
would.</div> <div><br></div><div>I&#39;ll try your previous suggestion as well as \
continue with the host to site \
idea.</div><div><br></div><div>Thanks,</div><div>Paul</div></div><div \
class="gmail_extra"><br><br><div class="gmail_quote"> On 21 September 2013 06:32, \
Nick Howitt <span dir="ltr">&lt;<a href="mailto:n1ck.h0w1tt@gmail.com" \
target="_blank">n1ck.h0w1tt@gmail.com</a>&gt;</span> wrote:<br><blockquote \
class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc \
solid;padding-left:1ex">

  
    
  
  <div text="#000000" bgcolor="#FFFFFF">
    You can&#39;t use the oldoffice conn for connection to the new office.
    For a start they have different transport types.<br>
    <br>
    You do need internal firewall rules. I have one set like this:<br>
    <br>
    <font face="Courier New">iptables -t nat -I POSTROUTING -m policy
      --dir out --pol ipsec -j ACCEPT<span class="HOEnZb"><font color="#888888"><br>
    </font></span></font><span class="HOEnZb"><font color="#888888"><br>
    Nick</font></span><div><div class="h5"><br>
    <br>
    <div>On 20/09/2013 09:39, Paul Young wrote:<br>
    </div>
    <blockquote type="cite">
      <div dir="ltr">Hi Nick,
        <div><br>
        </div>
        <div>Yes the new office appears to create the correct xfrm
          policies\routing info.</div>
        <div><br>
        </div>
        <div>Part of the complexity here would be that the new office
          has no permanent IP or infrastructure. So the path looks like
          this from new to old</div>
        <div><br>
        </div>
        <div>server running Openswan in new office-------------&gt;Asus
          router\switch N55U running DHCP etc------------&gt;4G dongle
          acting as modem for the
          Asus---------------&gt;INTERNET--------------&gt;outside NIC
          of server running Openswan in old office.</div>
        <div><br>
        </div>
        <div>From what I can tell there is some machinations going on
          within the 4G dongle so that nmap against the internet
          routable address the dongle comes up with always returns &quot;all
          1000 scanned ports on &lt;address blah&gt; are filtered&quot; -
          which could be making things difficult.</div>
        <div><br>
        </div>
        <div>So today I played some more (I will try your suggestions on
          the weekend though) with these configs-</div>
        <div><br>
        </div>
        <div>new office side:</div>
        <div><br>
        </div>
        <div>
          <div>conn newoffice</div>
          <div>        authby=secret</div>
          <div>        left=192.168.3.3</div>
          <div>        leftid=@newoffice</div>
          <div>        leftnexthop=%defaultroute &lt;- the ASUS router</div>
          <div>        leftsourceip=192.168.3.3</div>
          <div>        leftsubnet=<a href="http://192.168.3.0/24" \
target="_blank">192.168.3.0/24</a></div>  <div>        right=&lt;outside address of \
                old office&gt;</div>
          <div>        rightsubnet=<a href="http://192.168.1.0/24" \
target="_blank">192.168.1.0/24</a></div>  <div>        type=tunnel</div>
          <div>        auto=start</div>
          <div>        pfs=no</div>
          <div>        salifetime=28800s</div>
          <div>        ikelifetime=86400s</div>
        </div>
        <div><br>
        </div>
        <div>new office side:</div>
        <div><br>
        </div>
        <div>
          <div>conn oldoffice</div>
          <div>        authby=secret</div>
          <div>        pfs=no</div>
          <div>        auto=add</div>
          <div>        keyingtries=3</div>
          <div>        type=transport</div>
          <div>        forceencaps=yes</div>
          <div>        right=%any</div>
          <div>        rightprotoport=17/%any</div>
          <div>        # Using the magic port of &quot;0&quot; means &quot;any one
            single port&quot;. This is</div>
          <div>        # a work around required for Apple OSX clients
            that use a randomly</div>
          <div>        # high port, but propose &quot;0&quot; instead of their
            port. Could also be 17/%any</div>
          <div>        #leftprotoport=17/1701</div>
          <div>        left=&lt;outside address of old office&gt;</div>
          <div>        leftnexthop=&lt;outside address of old office
            next hop&gt;</div>
          <div>        leftsubnet=<a href="http://192.168.1.0/24" \
target="_blank">192.168.1.0/24</a></div>  <div>
                    rightsubnet=<a href="http://192.168.3.0/24" \
                target="_blank">192.168.3.0/24</a></div>
          <div>        # Apple iOS doesn&#39;t send delete notify so we need
            dead peer detection</div>
          <div>        # to detect vanishing clients</div>
          <div>
                    dpddelay=10</div>
          <div>        dpdtimeout=90</div>
          <div>        dpdaction=clear</div>
        </div>
        <div><br>
        </div>
        <div>In this case once I created a static route on my
          workstation like so:</div>
        <div><br>
        </div>
        <div>
          <div>Network Destination        Netmask          Gateway      
            Interface  Metric</div>
          <div>      192.168.1.0    255.255.255.0      192.168.3.3  
             192.168.3.101     11</div>
          <div>      </div>
        </div>
        <div>I was able to ping anything on the <a href="http://192.168.1.0/24" \
target="_blank">192.168.1.0/24</a>  subnet in the old office.</div>
        <div><br>
        </div>
        <div>BUT - if I add more subnets to see the networks that are
          currently configured as site to site connections in the old
          office I am unable to see those in terms of ping and
          connectivity.</div>
        <div><br>
        </div>
        <div>Paul</div>
      </div>
      <div class="gmail_extra"><br>
        <br>
        <div class="gmail_quote">On 19 September 2013 17:25, Nick Howitt
          <span dir="ltr">&lt;<a href="mailto:n1ck.h0w1tt@gmail.com" \
target="_blank">n1ck.h0w1tt@gmail.com</a>&gt;</span>  wrote:<br>
          <blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px \
#ccc solid;padding-left:1ex">  <div style="font-family:Arial,Helvetica,sans-serif">
              <p>In conn current your leftsubnet should be a leftsubnets
                to match the rightsubnets. While right is not fixed, you
                may want to try %any but you will have to use the same
                psk as your roadwarriors. You will also want DPD with
                dpdaction=clear for when the remote IP changes. I also
                prefer pfs=yes (or remove it). I don&#39;t think any of
                these issues are causing your problem, however, as you
                are getting your tunnels.</p>
              <p>Can you ping between the two Openswan devices?</p>
              <p>In your new office, does your gateway device have
                routes redirecting traffic <a href="http://192.168.1.0/24" \
                target="_blank">192.168.1.0/24</a>,
                <a href="http://10.134.210.64/28" \
target="_blank">10.134.210.64/28</a> and 10.134.162.59  via 1192.168.3.3?</p>
              <p>I&#39;d need to check firewalling when I&#39;m at home. Is
                &quot;new&quot; running a firewall. Presumably it is just a
                standalone PC on the &quot;new&quot; LAN.</p>
              <span><font color="#888888">
                  <p> </p>
                  <p>Nick</p>
                </font></span>
              <div>
                <div>
                  <p>On 2013-09-19 02:45, Paul Young wrote:</p>
                  <blockquote type="cite" style="padding-left:5px;border-left:#1010ff \
2px solid;margin-left:5px">  <div dir="ltr">Hi Nick,
                      <div> </div>
                      <div>Thanks for the response. I have confused the
                        situation as you have suggested.</div>
                      <div> </div>
                      <div>So now my configs looks like this:</div>
                      <div> </div>
                      <div>In the current office Openswan (one interface
                        connects directly to the outside world)-</div>
                      <div> </div>
                      <div>
                        <div>conn current</div>
                        <div>        authby=secret</div>
                        <div>        left=&lt;my fixed internet IP&gt;</div>
                        <div>        leftid=@current</div>
                        <div>        leftnexthop=&lt;my fixed internet
                          IP next hop&gt;</div>
                        <div>        leftsubnet=<a href="http://192.168.1.0/24" \
target="_blank">192.168.1.0/24</a></div>  <div>        leftsourceip=192.168.1.2</div>
                        <div>        right=&lt;non fixed IP of the new
                          office router&gt;</div>
                        <div>        rightsubnets= { <a href="http://192.168.3.0/24" \
target="_blank">192.168.3.0/24</a>  }</div>
                        <div>        type=tunnel</div>
                        <div>        auto=start</div>
                        <div>        pfs=no</div>
                        <div>        ikelifetime=86400s</div>
                        <div>        salifetime=28800s</div>
                      </div>
                      <div> </div>
                      <div>note that the new office does not have a
                        fixed IP address (it will in the future, but
                        people are moving in before the carrier has that
                        ready)</div>
                      <div> </div>
                      <div>The current config of the new office-</div>
                      <div> </div>
                      <div>
                        <div>conn new</div>
                        <div>        authby=secret</div>
                        <div>        left=192.168.3.3</div>
                        <div>        leftid=@new</div>
                        <div>        leftnexthop=%defaultroute</div>
                        <div>        leftsourceip=192.168.3.3</div>
                        <div>        leftsubnet=<a href="http://192.168.3.0/24" \
target="_blank">192.168.3.0/24</a></div>  <div>        right=&lt;my fixed internet IP \
of  current office&gt;</div>
                        <div>        rightsubnets={<a href="http://10.134.162.59/32" \
target="_blank">10.134.162.59/32</a> <a href="http://10.134.210.64/28" \
target="_blank">10.134.210.64/28</a> <a href="http://192.168.1.0/24" \
target="_blank">192.168.1.0/24</a>}</div>

                        <div>        type=tunnel</div>
                        <div>        auto=start</div>
                        <div>        pfs=no</div>
                        <div>        salifetime=28800s</div>
                        <div>        ikelifetime=86400s</div>
                      </div>
                      <div> </div>
                      <div>So far I can bring up the new office tunnel
                        but can&#39;t ping anything on the other side.</div>
                      <div> </div>
                      <div>
                        <div>000 initiating all conns with alias=&#39;new&#39;</div>
                        <div>104 &quot;new/0x3&quot; #25: STATE_MAIN_I1: \
                initiate</div>
                        <div>003 &quot;new/0x3&quot; #25: received Vendor ID
                          payload [Openswan (this version) 2.6.32 ]</div>
                        <div>003 &quot;new/0x3&quot; #25: received Vendor ID
                          payload [Dead Peer Detection]</div>
                        <div>003 &quot;new/0x3&quot; #25: received Vendor ID
                          payload [RFC 3947] method set to=109</div>
                        <div>106 &quot;new/0x3&quot; #25: STATE_MAIN_I2: sent MI2,
                          expecting MR2</div>
                        <div>003 &quot;new/0x3&quot; #25: NAT-Traversal: Result
                          using RFC 3947 (NAT-Traversal): both are NATed</div>
                        <div>108 &quot;new/0x3&quot; #25: STATE_MAIN_I3: sent MI3,
                          expecting MR3</div>
                        <div>003 &quot;new/0x3&quot; #25: received Vendor ID
                          payload [CAN-IKEv2]</div>
                        <div>004 &quot;new/0x3&quot; #25: STATE_MAIN_I4: ISAKMP SA
                          established {auth=OAKLEY_PRESHARED_KEY
                          cipher=aes_128 prf=oakley_sha group=modp2048}</div>
                        <div>117 &quot;new/0x1&quot; #26: STATE_QUICK_I1: \
                initiate</div>
                        <div>117 &quot;new/0x2&quot; #27: STATE_QUICK_I1: \
                initiate</div>
                        <div>117 &quot;new/0x3&quot; #28: STATE_QUICK_I1: \
                initiate</div>
                        <div>004 &quot;new/0x1&quot; #26: STATE_QUICK_I2: sent
                          QI2, IPsec SA established tunnel mode
                          {ESP=&gt;0x28d68261 &lt;0x554dc93f
                          xfrm=AES_128-HMAC_SHA1 NATOA=none NATD=&lt;my
                          fixed internet IP of current office&gt;:4500
                          DPD=none}</div>
                        <div>004 &quot;new/0x2&quot; #27: STATE_QUICK_I2: sent
                          QI2, IPsec SA established tunnel mode
                          {ESP=&gt;0x0021555f &lt;0xa7d4a5fb
                          xfrm=AES_128-HMAC_SHA1 NATOA=none NATD=&lt;my
                          fixed internet IP of current office&gt;:4500
                          DPD=none}</div>
                        <div>004 &quot;new/0x3&quot; #28: STATE_QUICK_I2: sent
                          QI2, IPsec SA established tunnel mode
                          {ESP=&gt;0xb1e4e80f &lt;0xa82a3d85
                          xfrm=AES_128-HMAC_SHA1 NATOA=none NATD=&lt;my
                          fixed internet IP of current office&gt;:4500
                          DPD=none}</div>
                        <div> </div>
                      </div>
                      <div>I can&#39;t bring up the tunnel from the current
                        office to the new office though - I suspect
                        IPtables might be involved there but am not sure
                        as I would of thought these rules would be fine
                        which are in place for road runner types:</div>
                      <div> </div>
                      <div>
                        <div>-A INPUT -p udp --dport 500 -j ACCEPT</div>
                        <div>-A INPUT -p udp --dport 4500 -j ACCEPT</div>
                      </div>
                      <div> </div>
                      <div>and on the new office side I have</div>
                      <div> </div>
                      <div>
                        <div>-A INPUT -p udp --dport 500 -s &lt;my fixed
                          internet IP of current office&gt; -j ACCEPT</div>
                        <div>-A INPUT -p udp --dport 4500 -s &lt;my
                          fixed internet IP of current office&gt; -j
                          ACCEPT</div>
                      </div>
                      <div> </div>
                      <div>Thanks for trying to help me here.</div>
                      <div> </div>
                      <div>Paul</div>
                      <div> </div>
                      <div> </div>
                      <div> </div>
                      <div> </div>
                      <div> </div>
                    </div>
                    <div class="gmail_extra"><br>
                      <br>
                      <div class="gmail_quote">On 18 September 2013
                        22:25, Nick Howitt <span>&lt;<a \
href="mailto:n1ck.h0w1tt@gmail.com" \
target="_blank">n1ck.h0w1tt@gmail.com</a>&gt;</span>  wrote:<br>
                        <blockquote class="gmail_quote" style="margin:0 0 0 \
.8ex;border-left:1px #ccc solid;padding-left:1ex"><span \
                style="text-decoration:underline"></span>
                          <div style="font-family:Arial,Helvetica,sans-serif">
                            <p>Your server and aconns do not match at
                              all. I would rename the server connto
                              something like roadwarrior and move some
                              of the settings into conn %default - the
                              ones which would apply to every conn such
                              as left, leftnexthop (probably not needed)
                              possibly pfs and auto and add leftsourceip
                              (the server&#39;s LAN IP). Create a new conn
                              which you could call aconn if you wanted.
                              The server&#39;s aconn should pretty much
                              match the remote&#39;s aconn with left and
                              right reversed. (Generally wou don&#39;t need
                              to reverse left and right at each end but
                              the use of conn %default means you must).
                              I would also suggest enabling PFS for
                              aconn.</p>
                            <div>
                              <div>
                                <p>On 2013-09-18 09:49, Paul Young
                                  wrote:</p>
                              </div>
                            </div>
                            <blockquote style="padding-left:5px;border-left:#1010ff \
2px solid;margin-left:5px">  <div>
                                <div>
                                  <div dir="ltr">Hi Everyone,
                                    <div> </div>
                                    <div>I am in the deep end with
                                      Openswan and possibly the
                                      following will show that.
                                      Apologies!</div>
                                    <div> </div>
                                    <div>So far I have been relying
                                      heavily on this - <a \
href="http://www.jacco2.dds.nl/networking/openswan-l2tp.html" \
target="_blank">http://www.jacco2.dds.nl/networking/openswan-l2tp.html</a></div>  \
<div> </div>  <div>A little bit of background
                                      first. We have a just opened a new
                                      office and not all the
                                      infrastructure is in place as yet.</div>
                                    <div> </div>
                                    <div>So the idea is to use a site to
                                      site VPN back to the current
                                      office so that all resources can
                                      be reached.</div>
                                    <div> </div>
                                    <div>There is a server acting as the
                                      openswan VPN\gateway etc in both
                                      offices - current office and new
                                      office.</div>
                                    <div> </div>
                                    <div>The current office has a number
                                      of site to site configs already in
                                      place to third parties. I have
                                      configured a server side which
                                      looks like this:</div>
                                    <div> </div>
                                    <div>
                                      <div><em>conn server</em></div>
                                      <div><em>        authby=secret</em></div>
                                      <div><em>        pfs=no</em></div>
                                      <div><em>        auto=add</em></div>
                                      <div><em>        keyingtries=3</em></div>
                                      <div><em>        type=transport</em></div>
                                      <div><em>        forceencaps=yes</em></div>
                                      <div><em>        right=%any</em></div>
                                      <div><em>       
                                          #rightsubnet=vhost:%priv,%no</em></div>
                                      <div><em>       
                                          rightprotoport=17/%any</em></div>
                                      <div><em>        # Using the magic
                                          port of &quot;0&quot; means &quot;any one
                                          single port&quot;. This is</em></div>
                                      <div><em>        # a work around
                                          required for Apple OSX clients
                                          that use a randomly</em></div>
                                      <div><em>        # high port, but
                                          propose &quot;0&quot; instead of their
                                          port. Could also be 17/%any</em></div>
                                      <div><em>        left=&lt;my
                                          outside fixed IP address&gt;</em></div>
                                      <div><em>       
                                          leftnexthop=&lt;my outside
                                          fixed IP address next hop&gt;</em></div>
                                      <div><em>       
                                          leftprotoport=17/1701</em></div>
                                      <div><em>        # Apple iOS
                                          doesn&#39;t send delete notify so
                                          we need dead peer detection</em></div>
                                      <div><em>        # to detect
                                          vanishing clients</em></div>
                                      <div><em>        dpddelay=10</em></div>
                                      <div><em>        dpdtimeout=90</em></div>
                                      <div><em>        dpdaction=clear</em></div>
                                    </div>
                                    <div> </div>
                                    <div>behind that is some ppp and
                                      xl2tp settings that work well for
                                      some of our remote types. but I am
                                      looking at pure Ipsec at this
                                      point.</div>
                                    <div> </div>
                                    <div>In the new office I have set up
                                      a conn like this:</div>
                                    <div> </div>
                                    <div>
                                      <div><em>conn aconn</em></div>
                                      <div><em>        authby=secret</em></div>
                                      <div><em>        left=192.168.3.3</em></div>
                                      <div><em>        #left=%any</em></div>
                                      <div><em>        leftid=@vpn</em></div>
                                      <div><em>       
                                          leftnexthop=%defaultroute</em></div>
                                      <div><em>       
                                          leftsourceip=192.168.3.3</em></div>
                                      <div><em>        leftsubnet=<a \
                href="http://192.168.3.0/24" \
                target="_blank">192.168.3.0/24</a></em></div>
                                      <div><em>        right=</em><em>&lt;my
                                          outside fixed IP address&gt;</em></div>
                                      <div><em>        rightsubnets={<a \
                href="http://10.134.162.59/32" target="_blank">10.134.162.59/32</a>
                                          <a href="http://10.134.210.64/28" \
                target="_blank">10.134.210.64/28</a>
                                          <a href="http://192.168.1.0/24" \
                target="_blank">192.168.1.0/24</a>}</em></div>
                                      <div><em>        type=tunnel</em></div>
                                      <div><em>        auto=start</em></div>
                                      <div><em>        pfs=no</em></div>
                                      <div><em>        salifetime=28800s</em></div>
                                      <div><em>       
                                          ikelifetime=86400s</em></div>
                                    </div>
                                    <div> </div>
                                    <div>It sits behind a router so left
                                      is the local interface. And the
                                      subnets are back in the current
                                      office.</div>
                                    <div> </div>
                                    <div>It comes up ok:</div>
                                    <div> </div>
                                    <div>
                                      <div><em># service ipsec status</em></div>
                                      <div><em>IPsec running  - pluto
                                          pid: 11869</em></div>
                                      <div><em>pluto pid 11869</em></div>
                                      <div><em>3 tunnels up</em></div>
                                      <div><em>some eroutes exist</em></div>
                                    </div>
                                    <div> </div>
                                    <div>I see the routes come up ok on
                                      the new office side:</div>
                                    <div> </div>
                                    <div>
                                      <div><em># ip xfrm policy</em></div>
                                      <div><em>src <a href="http://192.168.3.0/24" \
                target="_blank">192.168.3.0/24</a>
                                          dst <a href="http://10.134.162.59/32" \
target="_blank">10.134.162.59/32</a></em></div>  <div><em>        dir out priority
                                          2336 ptype main</em></div>
                                      <div><em>        tmpl src
                                          192.168.3.3 dst
                                          203.215.150.142</em></div>
                                      <div><em>                proto esp
                                          reqid 16385 mode tunnel</em></div>
                                      <div><em>src <a href="http://10.134.162.59/32" \
                target="_blank">10.134.162.59/32</a>
                                          dst <a href="http://192.168.3.0/24" \
target="_blank">192.168.3.0/24</a></em></div>  <div><em>        dir fwd priority
                                          2336 ptype main</em></div>
                                      <div><em>        tmpl src
                                          203.215.150.142 dst
                                          192.168.3.3</em></div>
                                      <div><em>                proto esp
                                          reqid 16385 mode tunnel</em></div>
                                      <div><em>src <a href="http://10.134.162.59/32" \
                target="_blank">10.134.162.59/32</a>
                                          dst <a href="http://192.168.3.0/24" \
target="_blank">192.168.3.0/24</a></em></div>  <div><em>        dir in priority
                                          2336 ptype main</em></div>
                                      <div><em>        tmpl src
                                          203.215.150.142 dst
                                          192.168.3.3</em></div>
                                      <div><em>                proto esp
                                          reqid 16385 mode tunnel</em></div>
                                      <div><em>src <a href="http://192.168.3.0/24" \
                target="_blank">192.168.3.0/24</a>
                                          dst <a href="http://10.134.210.64/28" \
target="_blank">10.134.210.64/28</a></em></div>  <div><em>        dir out priority
                                          2340 ptype main</em></div>
                                      <div><em>        tmpl src
                                          192.168.3.3 dst
                                          203.215.150.142</em></div>
                                      <div><em>                proto esp
                                          reqid 16389 mode tunnel</em></div>
                                      <div><em>src <a href="http://10.134.210.64/28" \
                target="_blank">10.134.210.64/28</a>
                                          dst <a href="http://192.168.3.0/24" \
target="_blank">192.168.3.0/24</a></em></div>  <div><em>        dir fwd priority
                                          2340 ptype main</em></div>
                                      <div><em>        tmpl src
                                          203.215.150.142 dst
                                          192.168.3.3</em></div>
                                      <div><em>                proto esp
                                          reqid 16389 mode tunnel</em></div>
                                      <div><em>src <a href="http://10.134.210.64/28" \
                target="_blank">10.134.210.64/28</a>
                                          dst <a href="http://192.168.3.0/24" \
target="_blank">192.168.3.0/24</a></em></div>  <div><em>        dir in priority
                                          2340 ptype main</em></div>
                                      <div><em>        tmpl src
                                          203.215.150.142 dst
                                          192.168.3.3</em></div>
                                      <div><em>                proto esp
                                          reqid 16389 mode tunnel</em></div>
                                      <div><em>src <a href="http://192.168.3.0/24" \
                target="_blank">192.168.3.0/24</a>
                                          dst <a href="http://192.168.1.0/24" \
target="_blank">192.168.1.0/24</a></em></div>  <div><em>        dir out priority
                                          2344 ptype main</em></div>
                                      <div><em>        tmpl src
                                          192.168.3.3 dst
                                          203.215.150.142</em></div>
                                      <div><em>                proto esp
                                          reqid 16393 mode tunnel</em></div>
                                      <div><em>src <a href="http://192.168.1.0/24" \
                target="_blank">192.168.1.0/24</a>
                                          dst <a href="http://192.168.3.0/24" \
target="_blank">192.168.3.0/24</a></em></div>  <div><em>        dir fwd priority
                                          2344 ptype main</em></div>
                                      <div><em>        tmpl src
                                          203.215.150.142 dst
                                          192.168.3.3</em></div>
                                      <div><em>                proto esp
                                          reqid 16393 mode tunnel</em></div>
                                      <div><em>src <a href="http://192.168.1.0/24" \
                target="_blank">192.168.1.0/24</a>
                                          dst <a href="http://192.168.3.0/24" \
target="_blank">192.168.3.0/24</a></em></div>  <div><em>        dir in priority
                                          2344 ptype main</em></div>
                                      <div><em>        tmpl src
                                          203.215.150.142 dst
                                          192.168.3.3</em></div>
                                      <div><em>                proto esp
                                          reqid 16393 mode tunnel</em></div>
                                    </div>
                                    <div> </div>
                                    <div>Can&#39;t ping anything back in the
                                      current office from the new office
                                      even though I can see encapsulated
                                      traffic going across at the time
                                      of my ping - nothing comes back.</div>
                                    <div> </div>
                                    <div>I also don&#39;t see anything being
                                      created in the xfrm policy for the
                                      current office and if I add a
                                      rightsubnet(s) line to the current
                                      office config then the road
                                      runners types can&#39;t connect.</div>
                                    <div> </div>
                                    <div>Is what I am trying to do even
                                      possible?</div>
                                    <div> </div>
                                    <div>Thanks,</div>
                                    <div>Paul</div>
                                  </div>
                                </div>
                              </div>
                              <pre>_______________________________________________
<a href="mailto:Users@lists.openswan.org" \
target="_blank">Users@lists.openswan.org</a> <a \
href="https://lists.openswan.org/mailman/listinfo/users" \
                target="_blank">https://lists.openswan.org/mailman/listinfo/users</a>
Micropayments: <a href="https://flattr.com/thing/38387/IPsec-for-Linux-made-easy" \
target="_blank">https://flattr.com/thing/38387/IPsec-for-Linux-made-easy</a> Building \
and Integrating Virtual Private Networks with Openswan: <a \
href="http://www.amazon.com/gp/product/1904811256/104-3099591-2946327?n=283155" \
target="_blank">http://www.amazon.com/gp/product/1904811256/104-3099591-2946327?n=283155</a>
 </pre>
                            </blockquote>
                          </div>
                          <br>
_______________________________________________<br>
                          <a href="mailto:Users@lists.openswan.org" \
                target="_blank">Users@lists.openswan.org</a><br>
                          <a href="https://lists.openswan.org/mailman/listinfo/users" \
target="_blank">https://lists.openswan.org/mailman/listinfo/users</a><br>  \
Micropayments: <a href="https://flattr.com/thing/38387/IPsec-for-Linux-made-easy" \
target="_blank">https://flattr.com/thing/38387/IPsec-for-Linux-made-easy</a><br>  \
Building and Integrating Virtual Private  Networks with Openswan:<br>
                          <a \
href="http://www.amazon.com/gp/product/1904811256/104-3099591-2946327?n=283155" \
target="_blank">http://www.amazon.com/gp/product/1904811256/104-3099591-2946327?n=283155</a><br>
  <br>
                        </blockquote>
                      </div>
                    </div>
                  </blockquote>
                </div>
              </div>
            </div>
          </blockquote>
        </div>
        <br>
      </div>
    </blockquote>
    <br>
  </div></div></div>

</blockquote></div><br></div>



[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic