I have what I thought would be an easy problem to figure out but is not,
well for me anyways. I'm hoping someone will be in a kind and generous frame
of mind so as to point out the error of my ways! To begin, I am using Leaf
1.2 in an attempt to evaluate it's ipsec performance in no more than a
firewall/vpn sort of role. I have no problems setting it up, making it work
and establishing a connection.
the problem manifests itself when I attempt to ping anything on either
subnet - all I can see are the nics on the Bering machines themselves,
nothing beyond.
Subnet Local Net Gateway
Gateway Net Local Subnet
192.168.0.0/24<>192.168.0.25<>142.59.65.140<>142.59.64.1<>THE
INTERNET<>216.123.215.81<>216.123.215.94<>192.168.2.4<>192.168.2.0/24
Please excuse the crudity of my above network topology layout where the ip
addresses have not been concealed to protect the innocent. To better
explain, if I am tring to ping from a machine on the 192.168.2.0/24 subnet
to another machine on the 192.168.0.0/24 subnet as far as I can get is to
192.168.0.25 address on the leaf box, if I try vice versa I can only go as
far as 192.168.2.4.
I am unsure what information would best assist you in determining where my
problem lies, what I am hoping is that as this is being read someone,
somewhere is smirking and already knows why. In the event that I have
actually found a bona fida tear jerker (hah!) I will send along some stuff.
I made the follow alterations to the shorewall configuration from what it
came with 'out of the box':
zones file:
vpn VPN Remote Subnet
policy file:
loc vpn ACCEPT
vpn loc ACCEPT
tunnels file:
ipsec net 216.123.215.94 on one machine and 142.59.65.140 on the
other, I have also tried 0.0.0.0/0 for both
Here is ipsec.conf for the sake of simplicity and lack of full blown Linux
machine I am using Pre Shared Keys.
config setup
# THIS SETTING MUST BE CORRECT or almost nothing will work;
# %defaultroute is okay for most simple cases.
interfaces=%defaultroute
# Debug-logging controls: "none" for (almost) none, "all" for lots.
klipsdebug=none
plutodebug=none
# Use auto= parameters in conn descriptions to control startup
actions.
plutoload=%search
plutostart=%search
# Close down old connection when new one using same ID shows up.
uniqueids=yes
# defaults for subsequent connection descriptions
conn %default
# How persistent to be in (re)keying negotiations (0 means very).
keyingtries=0
# RSA authentication with keys from DNS.
authby=secret
pfs=yes
auto=add
# sample VPN connection
conn home-edm
# Left security gateway, subnet behind it, next hop toward right.
left=216.123.215.94
leftsubnet=192.168.2.0/24
leftnexthop=216.123.215.81
# Right security gateway, subnet behind it, next hop toward left.
right=142.59.65.140
rightsubnet=192.168.0.0/24
rightnexthop=142.59.64.1
# To authorize this connection, but not actually start it, at
startup,
# uncomment this.
auto=start
Upon starting either machine a connection is made pretty much as soon as
ipsec is running the tail end of the barf file is like so:
May 30 11:49:40 firewall pluto[2212]: added connection description
"home-edm"
May 30 11:49:40 firewall pluto[2212]: listening for IKE messages
May 30 11:49:40 firewall pluto[2212]: adding interface ipsec0/eth0
216.123.215.94
May 30 11:49:40 firewall pluto[2212]: loading secrets from
"/etc/ipsec.secrets"
May 30 11:49:40 firewall pluto[2212]: "home-edm" #1: initiating Main Mode
May 30 11:49:41 firewall pluto[2212]: "home-edm" #1: Peer ID is
ID_IPV4_ADDR: '142.59.65.140'
May 30 11:49:41 firewall pluto[2212]: "home-edm" #1: ISAKMP SA established
May 30 11:49:41 firewall pluto[2212]: "home-edm" #2: initiating Quick Mode
PSK+ENCRYPT+TUNNEL+PFS+DISABLEARRIVALCHECK
May 30 11:49:41 firewall pluto[2212]: "home-edm" #2: sent QI2, IPsec SA
established
According to Freeswan.org this is as it should be. Here is a copy of ipsec
look after the conenction has been established:
firewall Fri May 30 11:55:19 UTC 2003
0192168 0 024:0:192.168.2.0/24:0 -> 192.168.0.0/24:0 =>
[EMAIL PROTECTED]:0 (4)
ipsec0->eth0 mtu=16260(1443)->1500
[EMAIL PROTECTED] ESP_3DES_HMAC_MD5: dir=in src=142.59.65.140
iv_bits=64bits iv=0x639a27d1364f4faa ooowin=64 seq=4 bit=0xf alen=128
aklen=128 eklen=192
life(c,s,h)=bytes(432,0,0)addtime(338,0,0)usetime(333,0,0)packets(4,0,0)
idle=330
[EMAIL PROTECTED] ESP_3DES_HMAC_MD5: dir=out src=216.123.215.94
iv_bits=64bits iv=0x652c19db3099b60f ooowin=64 seq=4 alen=128 aklen=128
eklen=192
life(c,s,h)=bytes(448,0,0)addtime(338,0,0)usetime(333,0,0)packets(4,0,0)
idle=330
[EMAIL PROTECTED] IPIP: dir=in src=142.59.65.140
life(c,s,h)=bytes(432,0,0)addtime(338,0,0)usetime(333,0,0)packets(4,0,0)
idle=330
[EMAIL PROTECTED] IPIP: dir=out src=216.123.215.94
life(c,s,h)=bytes(320,0,0)addtime(338,0,0)usetime(333,0,0)packets(4,0,0)
idle=330
==================================================
216.123.215.80/28 dev eth0 proto kernel scope link src 216.123.215.94
216.123.215.80/28 dev ipsec0 proto kernel scope link src 216.123.215.94
192.168.0.0/24 via 216.123.215.81 dev ipsec0
default via 216.123.215.81 dev eth0
Here is some route output from one side:
216.123.215.80/28 dev eth0 proto kernel scope link src 216.123.215.94
216.123.215.80/28 dev ipsec0 proto kernel scope link src 216.123.215.94
192.168.2.0/24 dev eth1 proto kernel scope link src 192.168.2.4
192.168.0.0/24 via 216.123.215.81 dev ipsec0
default via 216.123.215.81 dev eth0
And the other:
192.168.2.0/24 via 142.59.64.1 dev ipsec0
192.168.0.0/24 dev eth1 proto kernel scope link src 192.168.0.25
142.59.64.0/21 dev eth0 proto kernel scope link src 142.59.65.140
142.59.64.0/21 dev ipsec0 proto kernel scope link src 142.59.65.140
default via 142.59.64.1 dev eth0
I have tried a number of smallish changes with no joy and or happiness,
things like ip forwarding off or on, allowing access to the proper ports
through the rules file instead of everything through the policy file, things
like that. If there is someone out there who has the patience to look
through all this crap, and has finished having a good chuckle, please let me
know what you think!
TIA!
-------------------------------------------------------
This SF.net email is sponsored by: eBay
Get office equipment for less on eBay!
http://adfarm.mediaplex.com/ad/ck/711-11697-6916-5
------------------------------------------------------------------------
leaf-user mailing list: [EMAIL PROTECTED]
https://lists.sourceforge.net/lists/listinfo/leaf-user
SR FAQ: http://leaf-project.org/pub/doc/docmanager/docid_1891.html