> I'm still trying to make this work, when I ping from OpenBSD system internal 
> facing network to Linux internal network running tcpdump on both systems I 
> see packets entering the OpenBSD enc interface and exiting the OpenWRT xfrn 
> interface. So I know packets are going across the tunnel. Pinging from the 
> other direction nothing.
> 
> Your firewall zone hint has me chasing firewall configuration, it is obvious 
> OpenWRT developers could care less about IPsec functionality.

Did you add a static route on the OpenWRT side?

OpenWRT uses a few layers of abstraction, where an "interface" may contain one 
or more physical interfaces, and these virtual interfaces are each assigned to 
a firewall zone, which by default shares a name with the virtual interface, 
adding to the confusion.

All of this is parsed to spit out nftables configs and other assorted bits in 
the end.

The problem when you try and do something outside the OpenWRT system, like 
running StrongSwan on its own, it may conflict with or be overwritten by the 
automated configuration. I would suggest making all configuration changes in 
the GUI or via the 'uci' command if at all possible. Make sure of the following:

1. Your xfrm0 interface is associated with a virtual interface
2. That virtual interface has a firewall zone associated.
3. The firewall zone is appropriately configured (e.g. default forwards from 
lan->vpn or policies in place)
4. Your virtual interface has a static route associated to send traffic over 
the tunnel
5. Wonder why this isn't as easy as pf.

The reason I suggested Wireguard as an alternative is because it is integrated 
into the OpenWRT GUI, all you need to do is paste your keys and the endpoint IP 
and you're good to go. It's widely used by their community so receives more 
scrutiny and TLC.

Regards
Lloyd

Reply via email to