Hi All,
I have been a happy LRP and LEAF user for a number of years now. Thanks for
all the great work! I started messing with LRP for fun and began production
use at some offices with LRP 2.9.4. The offices have been updated over the
years, moving up through Dachstein and Eiger and using Bering most recently.
Fantastic stuff that just works! My best uptime so far has been about 380
days! Nice! Anyway, I've been recently asked to provide some VPN
functionality at a couple of offices that are running Bering. I've done a
bit of research and spent a bit of time trying to get a working setup on the
bench. I can't seem to get past a couple of hitches and it is time to ask
the community for a bit of help. I'm certain that it it is my inexperience
with IPSec that is causing the problems, so hopefully it will be a quick bit
of advice that will put me back on track.
At this point, I have eleminated all of the errors that displayed on the
console during the startup phase. When I try to start the VPN connection
from the command line with "ipsec auto --up vpn_jim" (vpn_jim is the name of
my vpn tunnel, I think), I get "whack: Pluto is not running (no
"var/run/pluto.ctl")" as the response. I get that message for most anything
that I type that starts with ipsec. When I look in /var/log/daemon.log, I
can see a line that says "ipsec__plutorun: !pluto failure: exited with error
status 1". When I look in /var/log/auth.log, I can see a line that says
"pluto[31029]: FATAL ERROR: unable to malloc 0 bytes for cert". The few
previous lines mentioned loading the cacert file and the crl file. There is
nothing in the process list about pluto, so I think it's dead.
Anybody got any suggestions?
Thanks!
Jim Walters
(952) 474-9215
Here's the bench setup (forgive the bad ASCII art):
+-----------------+
| existing |
| Bering router +----------------- to
cable modem
| v1.0, I think |
+-------+---------+
|
10.0.0.1/24 |
|
+---------+-------------+
+---------------------+ netgear switch
+--------------------+
| +---------+-------------+
|
| 10.0.0.4 | 10.0.0.25
| 10.0.0.3
+------+--------+ +-------+---------+
+--------+--------+
| fw_left | | test PC 3 | |
fw_right |
+------+--------+ +-----------------+
+--------+--------+
| 192.168.1.1/24
| 192.168.0.1/24
|
|
| 192.168.1.2
| 192.168.0.2
+------+--------+
+--------+--------+
| test PC 1 | | test
PC 2 |
+---------------+
+-----------------+
Hardware description of the routers:
Each of the three routers in the picture (existing Bering router, fw_left,
and fw_right) are identical hardware. They are Siemens small form factor
PCs with a C8/233 MHz processor, 64M RAM, 32M Flash Disk in PCMCIA to IDE
adapters, Dual Intel Pro100 NICs, standard VGA and keyboard. Nice little
units for playing with router stuff, useless for most anything else. They
have a free PCI slot (after the NICs are installed) and USB, but I've yet to
find the time to add wireless capability and play with those functions at
all. Maybe soon!
Software Description:
The existing Bering router is running an older Bering version, about 1.0,
but I'm not sure. Once I get the new stuff running, it will be upgraded. I
have enough memory cards that I can play with new versions and if it goes
bonk just slide the working version back in. A nice feature that will
hopefully guarantee the ability to roll back to a working config. I also
thought it might be optimistic of me to reconfigure my one working gateway
to the internet.
I've played with both Bering 1.2 and Bering uClibc 2.2 beta 2 on the test
firewall units and gotten similar results with both versions. That's what
is leading me to believe that I am not understanding something about the
configuration. Each time I google for variations on "bering, linux, VPN,
leaf, ipsec, ... etc" I find a juicy piece of information that gets me
closer to a working config, but I'm mostly out of juice at this point. I've
focused most of my energy on the Bering uClibc 2.2 beta 2, but I'm willing
to try most any version if someone thinks that they know what I'm doing
wrong.
Configuration Data (tried to do it like the support page said):
# uname -a
Linux fw_left 2.4.24 #18 Sat Apr 24 10:07:53 CEST 2004 i586 unknown
# ip addr show
2: lo: <LOOPBACK,UP> mtu 16436 qdisc noqueue
link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
inet 127.0.0.1/8 scope host lo
2: dummy0: <BROADCAST,NOARP> mtu 1500 qdisc noop
link/ether 00:00:00:00:00:00 brd ff:ff:ff:ff:ff:ff
3: eth0: <BROADCAST,MULTICAST,UP> mtu 1500 qdisc pfifo_fast qlen 1000
link/ether 08:00:06:25:bc:d2 brd ff:ff:ff:ff:ff:ff
inet 10.0.0.4/24 brd 10.0.0.255 scope global eth0
4: eth1: <BROADCAST,MULTICAST,UP> mtu 1500 qdisc pfifo_fast qlen 1000
link/ether 00:a0:c9:39:13:c2 brd ff:ff:ff:ff:ff:ff
inet 192.168.1.1/24 brd 192.168.1.255 scope global eth1
5: ipsec0: <NOARP,UP> mtu 16260 qdisc pfifo_fast qlen 10
link/ether 08:00:06:25:bc:d2 brd ff:ff:ff:ff:ff:ff
inet 10.0.0.4/24 brd 10.0.0.255 scope global ipsec0
6: ipsec1: <NOARP> mtu 0 qdisc noop qlen 10
link/ipip
7: ipsec2: <NOARP> mtu 0 qdisc noop qlen 10
link/ipip
8: ipsec3: <NOARP> mtu 0 qdisc noop qlen 10
link/ipip
# ip route show
10.0.0.0/24 dev eth0 proto kernel scope link src 10.0.0.4
10.0.0.0/24 dev ipsec0 proto kernel scope link src 10.0.0.4
192.168.1.0/24 dev eth1 proto kernel scope link src 192.168.1.1
default via 10.0.0.1 dev eth0
# lsmod
Module Size Used by Not tainted
ipsec 256416 1
softdog 1508 1
ipt_state 368 36
ipt_helper 496 0 (unused)
ipt_conntrack 852 0
ipt_REDIRECT 544 0 (unused)
ipt_MASQUERADE 1088 1
ip_nat_irc 2152 0 (unused)
ip_nat_ftp 2792 0 (unused)
iptable_nat 15556 3 [ipt_REDIRECT ipt_MASQUERADE ip_nat_irc
ip_nat_ftp]
ip_conntrack_irc 2876 1
ip_conntrack_ftp 3484 1
ip_conntrack 17864 6 [ipt_state ipt_helper ipt_conntrack
ipt_REDIRECT ipt_MASQUERADE ip_nat_irc ip_nat_ftp iptable_nat
ip_conntrack_irc ip_conntrack_ftp]
eepro100 17740 2
mii 2108 0 [eepro100]
isofs 17012 0 (unused)
ide-detect 144 0 (unused)
ide-cd 28572 0
ide-disk 12492 1
ide-core 88752 1 [ide-detect ide-cd ide-disk]
cdrom 26976 0 [ide-cd]
# shorewall status
Shorewall-1.4.10e Status at fw_left - Fri Jun 4 17:56:25 UTC 2004
Counters reset Fri Jun 4 17:51:46 UTC 2004
Chain INPUT (policy DROP 0 packets, 0 bytes)
pkts bytes target prot opt in out source
destination
4 336 ACCEPT all -- lo * 0.0.0.0/0
0.0.0.0/0
0 0 DROP !icmp -- * * 0.0.0.0/0
0.0.0.0/0 state INVALID
5 1054 eth0_in all -- eth0 * 0.0.0.0/0
0.0.0.0/0
0 0 eth1_in all -- eth1 * 0.0.0.0/0
0.0.0.0/0
0 0 ipsec0_in all -- ipsec0 * 0.0.0.0/0
0.0.0.0/0
0 0 common all -- * * 0.0.0.0/0
0.0.0.0/0
0 0 ULOG all -- * * 0.0.0.0/0
0.0.0.0/0 ULOG copy_range 0 nlgroup 1 prefix
`Shorewall:INPUT:REJECT:' queue_threshold 1
0 0 reject all -- * * 0.0.0.0/0
0.0.0.0/0
Chain FORWARD (policy DROP 0 packets, 0 bytes)
pkts bytes target prot opt in out source
destination
0 0 DROP !icmp -- * * 0.0.0.0/0
0.0.0.0/0 state INVALID
0 0 eth0_fwd all -- eth0 * 0.0.0.0/0
0.0.0.0/0
0 0 eth1_fwd all -- eth1 * 0.0.0.0/0
0.0.0.0/0
0 0 ipsec0_fwd all -- ipsec0 * 0.0.0.0/0
0.0.0.0/0
0 0 common all -- * * 0.0.0.0/0
0.0.0.0/0
0 0 ULOG all -- * * 0.0.0.0/0
0.0.0.0/0 ULOG copy_range 0 nlgroup 1 prefix
`Shorewall:FORWARD:REJECT:' queue_threshold 1
0 0 reject all -- * * 0.0.0.0/0
0.0.0.0/0
Chain OUTPUT (policy DROP 0 packets, 0 bytes)
pkts bytes target prot opt in out source
destination
4 336 ACCEPT all -- * lo 0.0.0.0/0
0.0.0.0/0
0 0 DROP !icmp -- * * 0.0.0.0/0
0.0.0.0/0 state INVALID
5 420 fw2net all -- * eth0 0.0.0.0/0
0.0.0.0/0
0 0 fw2loc all -- * eth1 0.0.0.0/0
0.0.0.0/0
0 0 all2all all -- * ipsec0 0.0.0.0/0
0.0.0.0/0
0 0 common all -- * * 0.0.0.0/0
0.0.0.0/0
0 0 ULOG all -- * * 0.0.0.0/0
0.0.0.0/0 ULOG copy_range 0 nlgroup 1 prefix
`Shorewall:OUTPUT:REJECT:' queue_threshold 1
0 0 reject all -- * * 0.0.0.0/0
0.0.0.0/0
Chain all2all (6 references)
pkts bytes target prot opt in out source
destination
0 0 ACCEPT all -- * * 0.0.0.0/0
0.0.0.0/0 state RELATED,ESTABLISHED
0 0 common all -- * * 0.0.0.0/0
0.0.0.0/0
0 0 ULOG all -- * * 0.0.0.0/0
0.0.0.0/0 ULOG copy_range 0 nlgroup 1 prefix
`Shorewall:all2all:REJECT:' queue_threshold 1
0 0 reject all -- * * 0.0.0.0/0
0.0.0.0/0
Chain common (5 references)
pkts bytes target prot opt in out source
destination
0 0 icmpdef icmp -- * * 0.0.0.0/0
0.0.0.0/0
0 0 DROP udp -- * * 0.0.0.0/0
0.0.0.0/0 udp dpt:135
5 1054 DROP udp -- * * 0.0.0.0/0
0.0.0.0/0 udp dpts:137:139
0 0 DROP udp -- * * 0.0.0.0/0
0.0.0.0/0 udp dpt:445
0 0 DROP tcp -- * * 0.0.0.0/0
0.0.0.0/0 tcp dpt:139
0 0 DROP tcp -- * * 0.0.0.0/0
0.0.0.0/0 tcp dpt:445
0 0 DROP tcp -- * * 0.0.0.0/0
0.0.0.0/0 tcp dpt:135
0 0 DROP udp -- * * 0.0.0.0/0
0.0.0.0/0 udp dpt:1900
0 0 DROP all -- * * 0.0.0.0/0
255.255.255.255
0 0 DROP all -- * * 0.0.0.0/0
224.0.0.0/4
0 0 reject tcp -- * * 0.0.0.0/0
0.0.0.0/0 tcp dpt:113
0 0 DROP udp -- * * 0.0.0.0/0
0.0.0.0/0 udp spt:53 state NEW
0 0 DROP icmp -- * * 0.0.0.0
0.0.0.0/0
0 0 DROP icmp -- * * 0.0.0.0/0 0.0.0.0
0 0 ACCEPT tcp -- * * 0.0.0.0/0
0.0.0.0/0 tcp flags:0x10/0x10
0 0 ACCEPT tcp -- * * 0.0.0.0/0
0.0.0.0/0 tcp flags:0x04/0x04
0 0 ACCEPT tcp -- * * 0.0.0.0/0
0.0.0.0/0 tcp flags:0x01/0x01
0 0 DROP all -- * * 0.0.0.0/0
10.0.0.255
0 0 DROP all -- * * 0.0.0.0/0
192.168.1.255
Chain dynamic (6 references)
pkts bytes target prot opt in out source
destination
Chain eth0_fwd (1 references)
pkts bytes target prot opt in out source
destination
0 0 dynamic all -- * * 0.0.0.0/0
0.0.0.0/0 state NEW
0 0 net2all all -- * eth1 0.0.0.0/0
0.0.0.0/0
0 0 net2all all -- * ipsec0 0.0.0.0/0
0.0.0.0/0
Chain eth0_in (1 references)
pkts bytes target prot opt in out source
destination
5 1054 dynamic all -- * * 0.0.0.0/0
0.0.0.0/0 state NEW
5 1054 net2fw all -- * * 0.0.0.0/0
0.0.0.0/0
Chain eth1_fwd (1 references)
pkts bytes target prot opt in out source
destination
0 0 dynamic all -- * * 0.0.0.0/0
0.0.0.0/0 state NEW
0 0 loc2net all -- * eth0 0.0.0.0/0
0.0.0.0/0
0 0 loc2vpn all -- * ipsec0 0.0.0.0/0
0.0.0.0/0
Chain eth1_in (1 references)
pkts bytes target prot opt in out source
destination
0 0 dynamic all -- * * 0.0.0.0/0
0.0.0.0/0 state NEW
0 0 loc2fw all -- * * 0.0.0.0/0
0.0.0.0/0
Chain fw2loc (1 references)
pkts bytes target prot opt in out source
destination
0 0 ACCEPT all -- * * 0.0.0.0/0
0.0.0.0/0 state RELATED,ESTABLISHED
0 0 ACCEPT icmp -- * * 0.0.0.0/0
0.0.0.0/0 icmp type 8
0 0 all2all all -- * * 0.0.0.0/0
0.0.0.0/0
Chain fw2net (1 references)
pkts bytes target prot opt in out source
destination
0 0 ACCEPT all -- * * 0.0.0.0/0
0.0.0.0/0 state RELATED,ESTABLISHED
0 0 ACCEPT esp -- * * 0.0.0.0/0 10.0.0.3
0 0 ACCEPT ah -- * * 0.0.0.0/0 10.0.0.3
0 0 ACCEPT udp -- * * 0.0.0.0/0 10.0.0.3
udp spt:500 dpt:500 state NEW
0 0 ACCEPT tcp -- * * 0.0.0.0/0
0.0.0.0/0 state NEW tcp dpt:53
0 0 ACCEPT udp -- * * 0.0.0.0/0
0.0.0.0/0 state NEW udp dpt:53
5 420 ACCEPT icmp -- * * 0.0.0.0/0
0.0.0.0/0 icmp type 8
0 0 ACCEPT tcp -- * * 0.0.0.0/0
0.0.0.0/0 state NEW tcp dpt:50
0 0 ACCEPT udp -- * * 0.0.0.0/0
0.0.0.0/0 state NEW udp dpt:50
0 0 ACCEPT tcp -- * * 0.0.0.0/0
0.0.0.0/0 state NEW tcp dpt:51
0 0 ACCEPT udp -- * * 0.0.0.0/0
0.0.0.0/0 state NEW udp dpt:51
0 0 ACCEPT udp -- * * 0.0.0.0/0
0.0.0.0/0 state NEW udp dpt:500
0 0 all2all all -- * * 0.0.0.0/0
0.0.0.0/0
Chain icmpdef (1 references)
pkts bytes target prot opt in out source
destination
Chain ipsec0_fwd (1 references)
pkts bytes target prot opt in out source
destination
0 0 dynamic all -- * * 0.0.0.0/0
0.0.0.0/0 state NEW
0 0 all2all all -- * eth0 0.0.0.0/0
0.0.0.0/0
0 0 vpn2loc all -- * eth1 0.0.0.0/0
0.0.0.0/0
Chain ipsec0_in (1 references)
pkts bytes target prot opt in out source
destination
0 0 dynamic all -- * * 0.0.0.0/0
0.0.0.0/0 state NEW
0 0 all2all all -- * * 0.0.0.0/0
0.0.0.0/0
Chain loc2fw (1 references)
pkts bytes target prot opt in out source
destination
0 0 ACCEPT all -- * * 0.0.0.0/0
0.0.0.0/0 state RELATED,ESTABLISHED
0 0 ACCEPT tcp -- * * 0.0.0.0/0
0.0.0.0/0 state NEW tcp dpt:22
0 0 ACCEPT icmp -- * * 0.0.0.0/0
0.0.0.0/0 icmp type 8
0 0 ACCEPT udp -- * * 0.0.0.0/0
0.0.0.0/0 state NEW udp dpt:53
0 0 ACCEPT tcp -- * * 0.0.0.0/0
0.0.0.0/0 state NEW tcp dpt:80
0 0 all2all all -- * * 0.0.0.0/0
0.0.0.0/0
Chain loc2net (1 references)
pkts bytes target prot opt in out source
destination
0 0 ACCEPT all -- * * 0.0.0.0/0
0.0.0.0/0 state RELATED,ESTABLISHED
0 0 ACCEPT all -- * * 0.0.0.0/0
0.0.0.0/0
Chain loc2vpn (1 references)
pkts bytes target prot opt in out source
destination
0 0 ACCEPT all -- * * 0.0.0.0/0
0.0.0.0/0 state RELATED,ESTABLISHED
0 0 ACCEPT all -- * * 0.0.0.0/0
0.0.0.0/0
Chain net2all (3 references)
pkts bytes target prot opt in out source
destination
0 0 ACCEPT all -- * * 0.0.0.0/0
0.0.0.0/0 state RELATED,ESTABLISHED
5 1054 common all -- * * 0.0.0.0/0
0.0.0.0/0
0 0 ULOG all -- * * 0.0.0.0/0
0.0.0.0/0 ULOG copy_range 0 nlgroup 1 prefix
`Shorewall:net2all:DROP:' queue_threshold 1
0 0 DROP all -- * * 0.0.0.0/0
0.0.0.0/0
Chain net2fw (1 references)
pkts bytes target prot opt in out source
destination
0 0 ACCEPT all -- * * 0.0.0.0/0
0.0.0.0/0 state RELATED,ESTABLISHED
0 0 ACCEPT esp -- * * 10.0.0.3
0.0.0.0/0
0 0 ACCEPT ah -- * * 10.0.0.3
0.0.0.0/0
0 0 ACCEPT udp -- * * 10.0.0.3
0.0.0.0/0 udp spt:500 dpt:500 state NEW
0 0 ACCEPT icmp -- * * 0.0.0.0/0
0.0.0.0/0 icmp type 8
0 0 ACCEPT tcp -- * * 0.0.0.0/0
0.0.0.0/0 state NEW tcp dpt:50
0 0 ACCEPT udp -- * * 0.0.0.0/0
0.0.0.0/0 state NEW udp dpt:50
0 0 ACCEPT tcp -- * * 0.0.0.0/0
0.0.0.0/0 state NEW tcp dpt:51
0 0 ACCEPT udp -- * * 0.0.0.0/0
0.0.0.0/0 state NEW udp dpt:51
0 0 ACCEPT udp -- * * 0.0.0.0/0
0.0.0.0/0 state NEW udp dpt:500
5 1054 net2all all -- * * 0.0.0.0/0
0.0.0.0/0
Chain reject (5 references)
pkts bytes target prot opt in out source
destination
0 0 DROP all -- * * 0.0.0.0/0
0.0.0.0/0 PKTTYPE = broadcast
0 0 DROP all -- * * 0.0.0.0/0
0.0.0.0/0 PKTTYPE = multicast
0 0 DROP all -- * * 10.0.0.255
0.0.0.0/0
0 0 DROP all -- * * 192.168.1.255
0.0.0.0/0
0 0 DROP all -- * * 255.255.255.255
0.0.0.0/0
0 0 DROP all -- * * 224.0.0.0/4
0.0.0.0/0
0 0 REJECT tcp -- * * 0.0.0.0/0
0.0.0.0/0 reject-with tcp-reset
0 0 REJECT udp -- * * 0.0.0.0/0
0.0.0.0/0 reject-with icmp-port-unreachable
0 0 REJECT icmp -- * * 0.0.0.0/0
0.0.0.0/0 reject-with icmp-host-unreachable
0 0 REJECT all -- * * 0.0.0.0/0
0.0.0.0/0 reject-with icmp-host-prohibited
Chain shorewall (0 references)
pkts bytes target prot opt in out source
destination
Chain vpn2loc (1 references)
pkts bytes target prot opt in out source
destination
0 0 ACCEPT all -- * * 0.0.0.0/0
0.0.0.0/0 state RELATED,ESTABLISHED
0 0 ACCEPT all -- * * 0.0.0.0/0
0.0.0.0/0
NAT Table
Chain PREROUTING (policy ACCEPT 5 packets, 1054 bytes)
pkts bytes target prot opt in out source
destination
Chain POSTROUTING (policy ACCEPT 3 packets, 252 bytes)
pkts bytes target prot opt in out source
destination
1 84 eth0_masq all -- * eth0 0.0.0.0/0
0.0.0.0/0
Chain OUTPUT (policy ACCEPT 3 packets, 252 bytes)
pkts bytes target prot opt in out source
destination
Chain eth0_masq (1 references)
pkts bytes target prot opt in out source
destination
0 0 MASQUERADE all -- * * 192.168.1.0/24
0.0.0.0/0
Mangle Table
Chain PREROUTING (policy ACCEPT 9 packets, 1390 bytes)
pkts bytes target prot opt in out source
destination
9 1390 pretos all -- * * 0.0.0.0/0
0.0.0.0/0
Chain INPUT (policy ACCEPT 9 packets, 1390 bytes)
pkts bytes target prot opt in out source
destination
Chain FORWARD (policy ACCEPT 0 packets, 0 bytes)
pkts bytes target prot opt in out source
destination
Chain OUTPUT (policy ACCEPT 9 packets, 756 bytes)
pkts bytes target prot opt in out source
destination
9 756 outtos all -- * * 0.0.0.0/0
0.0.0.0/0
Chain POSTROUTING (policy ACCEPT 9 packets, 756 bytes)
pkts bytes target prot opt in out source
destination
Chain outtos (1 references)
pkts bytes target prot opt in out source
destination
0 0 TOS tcp -- * * 0.0.0.0/0
0.0.0.0/0 tcp dpt:22 TOS set 0x10
0 0 TOS tcp -- * * 0.0.0.0/0
0.0.0.0/0 tcp spt:22 TOS set 0x10
0 0 TOS tcp -- * * 0.0.0.0/0
0.0.0.0/0 tcp dpt:21 TOS set 0x10
0 0 TOS tcp -- * * 0.0.0.0/0
0.0.0.0/0 tcp spt:21 TOS set 0x10
0 0 TOS tcp -- * * 0.0.0.0/0
0.0.0.0/0 tcp spt:20 TOS set 0x08
0 0 TOS tcp -- * * 0.0.0.0/0
0.0.0.0/0 tcp dpt:20 TOS set 0x08
Chain pretos (1 references)
pkts bytes target prot opt in out source
destination
0 0 TOS tcp -- * * 0.0.0.0/0
0.0.0.0/0 tcp dpt:22 TOS set 0x10
0 0 TOS tcp -- * * 0.0.0.0/0
0.0.0.0/0 tcp spt:22 TOS set 0x10
0 0 TOS tcp -- * * 0.0.0.0/0
0.0.0.0/0 tcp dpt:21 TOS set 0x10
0 0 TOS tcp -- * * 0.0.0.0/0
0.0.0.0/0 tcp spt:21 TOS set 0x10
0 0 TOS tcp -- * * 0.0.0.0/0
0.0.0.0/0 tcp spt:20 TOS set 0x08
0 0 TOS tcp -- * * 0.0.0.0/0
0.0.0.0/0 tcp dpt:20 TOS set 0x08
Configuration Files:
Here are some of my configuration files. I deleted the standard shorewall
comments, but left the default items in place so that the syntax of the
files are complete.
<contents of interfaces>
#
# Shorewall 1.4 -- Interfaces File
#
# /etc/shorewall/interfaces
#
############################################################################
##
#ZONE INTERFACE BROADCAST OPTIONS
net eth0 detect
loc eth1 detect
vpn ipsec0
#LAST LINE -- ADD YOUR ENTRIES BEFORE THIS ONE -- DO NOT REMOVE
<contents of policy>
#
# Shorewall 1.4 -- Policy File
#
# /etc/shorewall/policy
#
############################################################################
###
#SOURCE DEST POLICY LOG LIMIT:BURST
# LEVEL
loc net ACCEPT
net all DROP ULOG
# If you want open access to the Internet from your Firewall
# remove the comment from the following line.
#fw net ACCEPT
loc vpn ACCEPT
vpn loc ACCEPT
#
# THE FOLLOWING POLICY MUST BE LAST
#
all all REJECT ULOG
#LAST LINE -- DO NOT REMOVE
<contents of tunnels>
#
# Shorewall 1.4 - /etc/shorewall/tunnels
#
# TYPE ZONE GATEWAY GATEWAY
# ZONE
ipsec net 10.0.0.3
#LAST LINE -- ADD YOUR ENTRIES BEFORE THIS ONE -- DO NOT REMOVE
<contents of zones>
#
# Shorewall 1.4 /etc/shorewall/zones
#
#ZONE DISPLAY COMMENTS
net Net Internet
loc Local Local networks
vpn VPN Remote Subnet
#dmz DMZ Demilitarized zone
#LAST LINE - ADD YOUR ENTRIES ABOVE THIS ONE - DO NOT REMOVE
<contents of rules>
#
# Shorewall version 1.4 - Rules File
#
# /etc/shorewall/rules
#
############################################################################
########################
#ACTION SOURCE DEST PROTO DEST SOURCE ORIGINAL RATE
USER
# PORT PORT(S) DEST LIMIT
# Accept DNS connections from the firewall to the network
#
ACCEPT fw net tcp 53
ACCEPT fw net udp 53
# Accept SSH connections from the local network for administration
#
ACCEPT loc fw tcp 22
# Allow Ping To And From Firewall
#
ACCEPT loc fw icmp 8
ACCEPT net fw icmp 8
ACCEPT fw loc icmp 8
ACCEPT fw net icmp 8
#
# Bering specific rules:
# allow loc to fw udp/53 for dnscache to work
# allow loc to fw tcp/80 for weblet to work
#
ACCEPT loc fw udp 53
ACCEPT loc fw tcp 80
#
# jwalters 20040604
# added rules to allow IPSec VPN
#
ACCEPT net fw tcp 50
ACCEPT net fw udp 50
ACCEPT net fw tcp 51
ACCEPT net fw udp 51
ACCEPT fw net tcp 50
ACCEPT fw net udp 50
ACCEPT fw net tcp 51
ACCEPT fw net udp 51
ACCEPT net fw udp 500
ACCEPT fw net udp 500
#
#
#LAST LINE -- ADD YOUR ENTRIES BEFORE THIS ONE -- DO NOT REMOVE
<contents of ipsec.conf>
# /etc/ipsec.conf - FreeS/WAN IPsec configuration file
# basic configuration
config setup
# THIS SETTING MUST BE CORRECT or almost nothing will work;
# %defaultroute is okay for most simple cases.
interfaces=%defaultroute
# Debug-logging controls: "none" for (almost) none, "all" for lots.
klipsdebug=none
plutodebug=none
# Use auto= parameters in conn descriptions to control startup actions.
plutoload=%search
plutostart=%search
# Close down old connection when new one using same ID shows up.
uniqueids=yes
# defaults for subsequent connection descriptions
conn vpn_jim
# How persistent to be in (re)keying negotiations (0 means very).
keyingtries=0
# RSA authentication with keys from DNS.
authby=secret
left=10.0.0.4
leftsubnet=192.168.1.0/24
right=10.0.0.3
rightsubnet=192.168.0.0/24
auto=add
<contents of ipsec.secrets>
# This file holds shared secrets or RSA private keys for inter-Pluto
# authentication. See ipsec_pluto(8) manpage, and HTML documentation.
# RSA private key for this host, authenticating it to any other host
# which knows the public part. Suitable public keys, for ipsec.conf, DNS,
# or configuration of other implementations, can be extracted conveniently
# with "ipsec showhostkey".
#: RSA {
# -- Create your own RSA key with "ipsec rsasigkey"
# }
# do not change the indenting of that "}"
10.0.0.4 %any : PSK "jwalters"
: RSA {
Modulus:
0xC2B434219819415BEAB6B058BFBC13B4C4B2CB04E9D7B006FCFC21954ECD4B985A0F4013DF
EA48FBD0FBC23678DDD8FEABE11AAFF71B20C18F364E5A9553782405E8E0AB4557CBC204AD16
9F4019B746914A996FD60EEF49F4BDEF428A32751457AC4DABA8990617F1C9880C6C50F5649A
5A2912D0520B5C0D52D41775D4FDEC29FDD6209E0D2D0B294C7709FD484E88197FFAC0D7FBD7
2866317D7911E36AD9267EA2017694B936345AE586795B86962CF964803EC1B715BDC65CA369
28A6D9D2F76BB55DF932D45930143A49204A81817B809F4458B2D83C20FE4FE59A2C716DA04E
407C30944816B756EB308A935A0DC0819314471393869793A38B3F8285
PublicExponent: 0x010001
PrivateExponent:
0xA2952176EFF01EE0A724F82A93A874781D4C03354E231A4D2B914A65C810ABD0435BBAB11D
E8201B8E8DBBC60AB58D8E536E3BFFB603041E3CFD26FE82F4D93C9366BBBCA8C1C05679DB23
29C5B7F38FCCA113710CB919DD92ADCB8DAFA2A49B60FE73392526EAACB1ED0C5AFB53BB25CF
B1FBDC46F24BA4094821EC992B4B0025BED05EF27F2A66FC4D3E8ABABE60F047C12CC0481A1E
66BB8F2334A59D61DACBCBD95D6371B76545B0B7B032F7D98CA6B1DD30F50CA1E0ED64615E47
17F0BDA5CA5B16C2D145BFF06CABEED4DE8650D395DF866AB223C3AB42296A8DD7BC5A1FE2EF
744A4F7786C1710C619F698DA302E3D360C5324BBE5581B36202D836E1
Prime1:
0xE3A1EFE0BBB09D796D0036633DCA5C143938147B7E0D4ADBD2D8D02B251A295CC4768F80D7
330B0957483788F117685B0DE5C8A83DE18B189B4DBFEBBD12102448320100FA1B4A167875AA
AE1577BEFF9ECC0935B9DD66E95C91D2185C40E7379E1581096EAD5943D72CFD51EEE7ECED0C
F2A0FE9588D6C78B232CD49D2FCEA9
Prime2:
0xDAF7C220ADA79D346AB3169C6292DAB0B93302992D07F86360425FA9399C9B7E4178578AFF
C77F12BB72B14782C1580FD96F0B51DDFFB85C962EE00076A1E86215D16E293D9D7DC79C9FBA
4956187DE36490A49D2202E9982D4FE089E3EE4EFADF666DD84D6415EA339CD4238250FB83C9
723FD1ED7F62917496F40E244D0A7D
Exponent1:
0xC38F48D4EA8A660F7E8C732D3955935BB078B4680FB7FDBAF2DE5FA0E164236AD642013130
3062E7E87B5B72A3A5777ADA6AB1C3903E2750C183BF411892DF193C88F101D4DD02FE6108BD
D4870EF421095CC300CC282094957995646645401F3109CA6CBF0FE0237F45E06FB66EBBC63F
9C66A1B0F7F9853ECCBE63FE92A6D9
Exponent2:
0xBE820ED115A51E1E2BB312BA0EFD4BEDB3C3D0BFEA30E407BA0925677B2B6911A8EE85E3F6
73E07830C431BF50E0DCB83569EA8458CC92DF62FEF77F0FB80011CE7FBF037C8B1892E20F0A
29A2117EFDA7523D16453019827FF1DE1EBA436D4DD1AE31659EB7B46566704D1573DCF7670A
8E2F3E7B0E7878AAE2670622C93095
Coefficient:
0x6AA715CAB57C177DBEC27A24C826BB36F2D2A5B32DE68FEEFDD1C44CF7DACD9FFDB6AC374A
D2BA796208DDA16F07937480DE4934838E623B29356009476F463AE25A6DEDEA560D63B8DDA6
3BAA7A643E4E2A9027C4AB94B6815A0412649F5CA75059A57C729FEA7D2339249210B218B9AB
76EC39DA14CE4D9D45799F048FE2E9
}
-------------------------------------------------------
This SF.Net email is sponsored by the new InstallShield X.
>From Windows to Linux, servers to mobile, InstallShield X is the one
installation-authoring solution that does it all. Learn more and
evaluate today! http://www.installshield.com/Dev2Dev/0504
------------------------------------------------------------------------
leaf-user mailing list: [EMAIL PROTECTED]
https://lists.sourceforge.net/lists/listinfo/leaf-user
SR FAQ: http://leaf-project.org/pub/doc/docmanager/docid_1891.html