Hello Tarhon-Onu,


TOV>         Ideea la VPN este ca sa poti transporta pachete intre 2 retele
TOV> fara ca cineva de pe drum sa poata arunca vreo privire in ce date
TOV> trimiti tu. Daca vpn-ul ti-e jos atunci vei trimite necriptat prin
TOV> retea.
TOV>         Nu este obligatoriu ca un VPN sa aiba ca si capete 2 retele
TOV> dintre care cel putin una sa fie neroutabila. Pot fi ambele neroutabile,
TOV> sau una si una, sau ambele routabile.

>> Cand pornesc VPN-ul am observat ca se adauga o ruta la 192.168.10.0/24
>> prin eth1 (care e conectata la net).

TOV>         Ia da matale un tcpdump -i eth1 host 192.168.10.1, vezi, ce
TOV> zice? Zice datele in clar sau se fac transmisii de date doar pe proto
TOV> 50?

  Scuze ca raspund asa tarziu, am fost plecat din localitate putin :)

  Am dat tcpdump... si transmisiile de fac in clar. Acum nu stiu daca
  e foarte relevant, am citit ca in anumite conditii tcpdump nu poate
  arata traficul criptat. (versiune, distributie )

  Era usor cred daca aveam interfata ipsec0, dar pe 2.6sec nu exista -
  din cate am citit pe net - ca altfel puteam sa rutez traficul.
  Maine, cand va fi cineva la munca in capatul celalalt, o sa-i pun sa
  dea un ping, sa vedem daca merge de la ei spre mine.

  ip route get 192.168.10.1 imi arata doar ca traficul se duce prin
  gateway-ul de la connex - ceea ce e normal cred.

  Aaa, si inca ceva, LAN-ul de la mine iese in net prin SNAT pe eth1,
  credeti ca sut probleme din cauza asta?
  

  Va dau mai jos si output-ul de la ipsec auto status:

000 interface eth0/eth0 192.168.0.1
000 interface lo/lo 127.0.0.1
000 interface eth1/eth1 81.12.xxx.xxx
000 %myid = (none)
000 debug none
000  
000 algorithm ESP encrypt: id=2, name=ESP_DES, ivlen=8, keysizemin=64, 
keysizemax=64
000 algorithm ESP encrypt: id=3, name=ESP_3DES, ivlen=8, keysizemin=192, 
keysizemax=192
000 algorithm ESP encrypt: id=7, name=ESP_BLOWFISH, ivlen=8, keysizemin=40, 
keysizemax=448
000 algorithm ESP encrypt: id=11, name=ESP_NULL, ivlen=0, keysizemin=0, 
keysizemax=0
000 algorithm ESP encrypt: id=12, name=ESP_AES, ivlen=8, keysizemin=128, 
keysizemax=256
000 algorithm ESP encrypt: id=252, name=ESP_SERPENT, ivlen=8, keysizemin=128, 
keysizemax=256
000 algorithm ESP encrypt: id=253, name=ESP_TWOFISH, ivlen=8, keysizemin=128, 
keysizemax=256
000 algorithm ESP auth attr: id=1, name=AUTH_ALGORITHM_HMAC_MD5, 
keysizemin=128, keysizemax=128
000 algorithm ESP auth attr: id=2, name=AUTH_ALGORITHM_HMAC_SHA1, 
keysizemin=160, keysizemax=160
000 algorithm ESP auth attr: id=5, name=AUTH_ALGORITHM_HMAC_SHA2_256, 
keysizemin=256, keysizemax=256
000 algorithm ESP auth attr: id=251, name=(null), keysizemin=0, keysizemax=0
000  
000 algorithm IKE encrypt: id=5, name=OAKLEY_3DES_CBC, blocksize=8, 
keydeflen=192
000 algorithm IKE encrypt: id=7, name=OAKLEY_AES_CBC, blocksize=16, 
keydeflen=128
000 algorithm IKE hash: id=1, name=OAKLEY_MD5, hashsize=16
000 algorithm IKE hash: id=2, name=OAKLEY_SHA1, hashsize=20
000 algorithm IKE dh group: id=2, name=OAKLEY_GROUP_MODP1024, bits=1024
000 algorithm IKE dh group: id=5, name=OAKLEY_GROUP_MODP1536, bits=1536
000 algorithm IKE dh group: id=14, name=OAKLEY_GROUP_MODP2048, bits=2048
000 algorithm IKE dh group: id=15, name=OAKLEY_GROUP_MODP3072, bits=3072
000 algorithm IKE dh group: id=16, name=OAKLEY_GROUP_MODP4096, bits=4096
000 algorithm IKE dh group: id=17, name=OAKLEY_GROUP_MODP6144, bits=6144
000 algorithm IKE dh group: id=18, name=OAKLEY_GROUP_MODP8192, bits=8192
000  
000 stats db_ops.c: {curr_cnt, total_cnt, maxsz} :context={0,60,36} 
trans={0,60,336} attrs={0,60,224} 
000  
000 "conn": 192.168.0.0/24===81.12.xxx.xxx...213.82.xxx.xxx===192.168.10.0/24; 
erouted; eroute owner: #82
000 "conn":     srcip=unset; dstip=unset; srcup=ipsec _updown; dstup=ipsec 
_updown;
000 "conn":   ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; 
rekey_fuzz: 100%; keyingtries: 0
000 "conn":   policy: PSK+ENCRYPT+TUNNEL+PFS+UP; prio: 24,24; interface: eth1;
000 "conn":   newest ISAKMP SA: #86; newest IPsec SA: #82;
000 "conn":   IKE algorithm newest: 3DES_CBC_192-SHA1-MODP1024
000 "conn":   ESP algorithms wanted: 3_000-2, flags=-strict
000 "conn":   ESP algorithms loaded: 3_000-2, flags=-strict
000 "conn":   ESP algorithm newest: 3DES_0-HMAC_SHA1; pfsgroup=<Phase1>
000  
000 #85: "conn":500 STATE_MAIN_I4 (ISAKMP SA established); EVENT_SA_EXPIRE in 
154s; nodpd
000 #86: "conn":500 STATE_MAIN_I4 (ISAKMP SA established); EVENT_SA_REPLACE in 
2237s; newest ISAKMP; nodpd
000 #82: "conn":500 STATE_QUICK_I2 (sent QI2, IPsec SA established); 
EVENT_SA_REPLACE in 16649s; newest IPSEC; eroute owner
000 #82: "conn" [EMAIL PROTECTED] [EMAIL PROTECTED]
[EMAIL PROTECTED] [EMAIL PROTECTED]


-- 
Best regards,
 theologu                            mailto:[EMAIL PROTECTED]


_______________________________________________
RLUG mailing list
[email protected]
http://lists.lug.ro/mailman/listinfo/rlug

Raspunde prin e-mail lui