Re: Grouping windows in CWM

2021-05-21 Thread Jonathan Drews
On Fri, May 21, 2021 at 07:00:13PM -0600, Jonathan Drews wrote:
> Hi Folks:
>
>  I am looking for a tutorial on grouping xterms in CWM. I

Never mind. I found a good tutorial:

Getting started with cwm
https://undeadly.org/cgi?action=article=20090502141551
 I just have to figure out some other minor details.

> the sticky function (CM-s) and it's use in creating virtual desktops.
>
> I am running OpenBSD 6.9 GENERIC.MP#0 amd64
>
> Kind regards,
> Jonathan
>
>
>



Grouping windows in CWM

2021-05-21 Thread Jonathan Drews
Hi Folks:

 I am looking for a tutorial on grouping xterms in CWM. I
undestand how to group one set of xterms using CM-g and CM-a. How
do I do it if I have two sets of xterms? How would I designate a
group "A" and group "B". I looked at the man page for cwm and read
the section in Michael Lucas' "absolute OpenBSD' but I am still
not sure how to do this. Also I am not understanding the use of
the sticky function (CM-s) and it's use in creating virtual desktops.

I am running OpenBSD 6.9 GENERIC.MP#0 amd64

Kind regards,
Jonathan





Bugs running 6.9-CURRENT on MacBook Pro Touchbar 2017

2021-05-21 Thread Joel Carnat

Hi,

I went back on testing OpenBSD on my MacBookPro14,3.
I just installed 6.9-CURRENT and here's a list of non-working stuff.
- keyboard and touchpad don't work. I have to use a USB keyboard/mouse.
  internal keyboard does work in the boot loader. but stops working 
after the kernel is loaded.

- Xorg works but only in wsfb mode.
- when I install the amdgpu-firmware, the console and Xorg gets black. 
And I have to force shutdown using the power button.
- the wireless card can scan the SSID around me. but I can't connect to 
mine. it references the SSID in ifconfig but the status is "no network".

- sleep, using zzz, drops the system to the debugger.

If you have ideas, I'll be glad to test patches on it.

Regards,
Jo

OpenBSD 6.9-current (RAMDISK_CD) #28: Fri May 21 13:27:21 MDT 2021
dera...@amd64.openbsd.org:/usr/src/sys/arch/amd64/compile/RAMDISK_CD
real mem = 17055719424 (16265MB)
avail mem = 16534794240 (15768MB)
random: good seed from bootblocks
mainbus0 at root
bios0 at mainbus0: SMBIOS rev. 3.0 @ 0x7aedf000 (37 entries)
bios0: vendor Apple Inc. version "429.100.7.0.0" date 02/26/2021
bios0: Apple Inc. MacBookPro14,3
acpi0 at bios0: ACPI 5.0
acpi0: tables DSDT FACP UEFI ECDT HPET APIC MCFG SBST SSDT SSDT SSDT SSDT SSDT 
SSDT SSDT SSDT SSDT SSDT SSDT SSDT SSDT DMAR VFCT
acpiec0 at acpi0
acpihpet0 at acpi0: 2399 Hz
acpimadt0 at acpi0 addr 0xfee0: PC-AT compat
cpu0 at mainbus0: apid 0 (boot processor)
cpu0: Intel(R) Core(TM) i7-7700HQ CPU @ 2.80GHz, 3792.96 MHz, 06-9e-09
cpu0: 
FPU,VME,DE,PSE,TSC,MSR,PAE,MCE,CX8,APIC,SEP,MTRR,PGE,MCA,CMOV,PAT,PSE36,CFLUSH,DS,ACPI,MMX,FXSR,SSE,SSE2,SS,HTT,TM,PBE,SSE3,PCLMUL,DTES64,MWAIT,DS-CPL,VMX,EST,TM2,SSSE3,SDBG,FMA3,CX16,xTPR,PDCM,PCID,SSE4.1,SSE4.2,x2APIC,MOVBE,POPCNT,DEADLINE,AES,XSAVE,OSXSAVE,AVX,F16C,RDRAND,NXE,PAGE1GB,RDTSCP,LONG,LAHF,ABM,3DNOWP,PERF,ITSC,FSGSBASE,TSC_ADJUST,SGX,BMI1,AVX2,SMEP,BMI2,ERMS,INVPCID,MPX,RDSEED,ADX,SMAP,CLFLUSHOPT,PT,SRBDS_CTRL,MD_CLEAR,TSXFA,IBRS,IBPB,STIBP,L1DF,SSBD,SENSOR,ARAT,XSAVEOPT,XSAVEC,XGETBV1,XSAVES,MELTDOWN
cpu0: 256KB 64b/line 8-way L2 cache
cpu0: apic clock running at 24MHz
cpu0: mwait min=64, max=64, C-substates=0.2.1.2.4.1.1.1, IBE
cpu at mainbus0: not configured
cpu at mainbus0: not configured
cpu at mainbus0: not configured
cpu at mainbus0: not configured
cpu at mainbus0: not configured
cpu at mainbus0: not configured
cpu at mainbus0: not configured
ioapic0 at mainbus0: apid 2 pa 0xfec0, version 20, 24 pins
acpiprt0 at acpi0: bus 0 (PCI0)
acpiprt1 at acpi0: bus 1 (PEG0)
acpiprt2 at acpi0: bus 4 (PEG1)
acpiprt3 at acpi0: bus 122 (PEG2)
acpiprt4 at acpi0: bus 3 (RP01)
acpiprt5 at acpi0: bus 2 (RP17)
acpipci0 at acpi0 PCI0: 0x0004 0x0011 0x0001
acpicmos0 at acpi0
"APP0001" at acpi0 not configured
"APP0003" at acpi0 not configured
"ACPI0001" at acpi0 not configured
"ACPI0002" at acpi0 not configured
"APP000B" at acpi0 not configured
"APP000D" at acpi0 not configured
"BCM2E7C" at acpi0 not configured
"APP" at acpi0 not configured
"ACPI0003" at acpi0 not configured
"PNP0C0D" at acpi0 not configured
"PNP0C0C" at acpi0 not configured
"APP0002" at acpi0 not configured
"PNP0C0E" at acpi0 not configured
acpicpu at acpi0 not configured
cpu0: using VERW MDS workaround
pci0 at mainbus0 bus 0
pchb0 at pci0 dev 0 function 0 "Intel Xeon E3-1200 v6/7 Host" rev 0x05
ppb0 at pci0 dev 1 function 0 "Intel Core 6G PCIE" rev 0x05: msi
pci1 at ppb0 bus 1
"ATI Polaris 11" rev 0xc7 at pci1 dev 0 function 0 not configured
"ATI Radeon Pro Audio" rev 0x00 at pci1 dev 0 function 1 not configured
ppb1 at pci0 dev 1 function 1 "Intel Core 6G PCIE" rev 0x05: msi
pci2 at ppb1 bus 4
ppb2 at pci2 dev 0 function 0 vendor "Intel", unknown product 0x1578 rev 0x02
pci3 at ppb2 bus 5
ppb3 at pci3 dev 0 function 0 "Intel JHL6540 Thunderbolt" rev 0x02: msi
pci4 at ppb3 bus 6
"Intel JHL6540 Thunderbolt" rev 0x02 at pci4 dev 0 function 0 not configured
ppb4 at pci3 dev 1 function 0 "Intel JHL6540 Thunderbolt" rev 0x02: msi
pci5 at ppb4 bus 8
ppb5 at pci3 dev 2 function 0 "Intel JHL6540 Thunderbolt" rev 0x02: msi
pci6 at ppb5 bus 7
xhci0 at pci6 dev 0 function 0 "Intel JHL6540 Thunderbolt" rev 0x02: msi, xHCI 
1.10
usb0 at xhci0: USB revision 3.0
uhub0 at usb0 configuration 1 interface 0 "Intel xHCI root hub" rev 3.00/1.00 
addr 1
ppb6 at pci3 dev 4 function 0 "Intel JHL6540 Thunderbolt" rev 0x02: msi
pci7 at ppb6 bus 65
ppb7 at pci0 dev 1 function 2 "Intel Core 6G PCIE" rev 0x05: msi
pci8 at ppb7 bus 122
ppb8 at pci8 dev 0 function 0 vendor "Intel", unknown product 0x1578 rev 0x02
pci9 at ppb8 bus 123
ppb9 at pci9 dev 0 function 0 "Intel JHL6540 Thunderbolt" rev 0x02: msi
pci10 at ppb9 bus 124
"Intel JHL6540 Thunderbolt" rev 0x02 at pci10 dev 0 function 0 not configured
ppb10 at pci9 dev 1 function 0 "Intel JHL6540 Thunderbolt" rev 0x02: msi
pci11 at ppb10 bus 126
ppb11 at pci9 dev 2 function 0 "Intel JHL6540 Thunderbolt" rev 0x02: msi
pci12 at ppb11 bus 125
xhci1 at pci12 dev 0 function 0 "Intel JHL6540 Thunderbolt" rev 0x02: 

Re: Relayd TLS inspection and SNI

2021-05-21 Thread BS Daemon
Perhaps I will try squid or HaProxy. I was unaware I could filter by User_Agent 
in squid.
 
It may be appropriate to update the relevant documentation if the support is 
not possible:
 
*** relayd.conf.8.orig  Fri May 21 13:19:06 2021
--- relayd.conf.8   Fri May 21 13:23:09 2021
***
*** 500,506 
 filter TLS connections as a man-in-the-middle.  This combined
 mode is also called "TLS inspection".  The configuration requires
 additional X.509 certificate settings; see the ca key description
!    in the PROTOCOLS section for more details.
   When configured for "TLS inspection" mode, relayd(8) will listen for
   incoming connections which have been diverted to the local socket by PF.
--- 500,510 
 filter TLS connections as a man-in-the-middle.  This combined
 mode is also called "TLS inspection".  The configuration requires
 additional X.509 certificate settings; see the ca key description
!    in the PROTOCOLS section for more details. Note that this feature
!    currently does not support Server Name Identification (SNI) making
!    it inappropriate for use as a general Internet TLS Inspection
!    gateway.
!
   When configured for "TLS inspection" mode, relayd(8) will listen for
   incoming connections which have been diverted to the local socket by PF.
 
 
TLS Inspection (Man in the Middle) may be ancient, and certificate pinning may 
make it less useful some places, but there is still enough demand that many 
Internet security gateway vendors support it, even with TLS1.3.*, which I 
understand was one of the things which slowed its standardization.
 
Work has been done to deprecate TLS1.0 and TLS1.1 for some time. I'm guessing 
it will be at least a few years before TLS1.2 is deprecated or obsoleted (not 
used by clients), not months. **

For my purpose, I can probably work around pinning issues and TLS1.3 
certificate encryption by bypassing relayd based on IP as opposed to 
certificate content, or perhaps by restricting to TLS1.2. I don't think relayd 
TLS Intercept can make decisions based on the certificate anyway, at least I 
didn't notice reference in the documentation.
 
* 
https://www.zscaler.com/blogs/product-insights/tls-13-busting-myths-and-debunking-fear-uncertainty-doubt
* 
https://docs.paloaltonetworks.com/pan-os/10-0/pan-os-admin/decryption/decryption-concepts/tlsv13-ssl-decryption-support.html

** https://datatracker.ietf.org/doc/rfc8996/
** https://www.ssllabs.com/ssl-pulse/
   as of today, 46.4% of surveyed sites support TLSv1.0
   and 54.1% of surveyed sites support TLSv1.2 as their best protocol.
 
Thanks!


> Sent: Friday, May 21, 2021 at 3:08 AM
> From: "Stuart Henderson" 
> To: misc@openbsd.org
> Subject: Re: Relayd TLS inspection and SNI
> On 2021-05-18, BS Daemon  wrote:
>> I like using the base OpenBSD utilities, and was
>> wondering if I'm doing something wrong, if relayd could be made to
>> support SNI for man-in-the-middle, or if there is an alternative
>> tool for doing this which would work.
>
> I can't help with relayd, but this does work with squid (and you can
> filter on user-agent in ACLs).
 
 
From: Martin [https://marc.info/?a=15813524301=1=2] Date: 2021-05-21 
7:26:16[https://marc.info/?l=openbsd-misc=1=202105=2]
> Hi,
> 
> MITM is an ancient attack technique and it is not a good idea because it 
> breaks \
> original cert chain. So client (application) will see that cert is different 
> on its \
> end. Most people and apps reject connection to a resource with fake cert 
> which you're \
> going to send to them.

> But you can use Squid for MITM as Stuart recommended, from my side 
> HaProxy/Nginx can \
> help you too to do this. For SNI Snort/Suricata can be useful but for TLS up 
> to v1.2 \
> only.
> 
> Sniffing the traffic that way is a bad idea, most of services uses TLSv1.3 
> with \
> encrypted SNI. So your work will disappear in months.
>
> Martin



Re: Relayd TLS inspection and SNI

2021-05-21 Thread Stuart Henderson
On 2021-05-21, Martin  wrote:
> Hi,
>
> MITM is an ancient attack technique and it is not a good idea because it 
> breaks original cert chain. So client (application) will see that cert is 
> different on its end. Most people and apps reject connection to a resource 
> with fake cert which you're going to send to them.

This is about providing monitored/filtered internet access to systems
that are particularly configured to use it. The way this works is that
you install the MITM-signing certificate on the machines accessing the
web via that proxy. Typically in that case browsers automatically
disable certificate pinning if the cert is signed by a locally
administered CA.

> But you can use Squid for MITM as Stuart recommended, from my side
> HaProxy/Nginx can help you too to do this. For SNI Snort/Suricata can be
> useful but for TLS up to v1.2 only.
>
> Sniffing the traffic that way is a bad idea, most of services uses
> TLSv1.3 with encrypted SNI. So your work will disappear in months.

There aren't many services which require TLSv1.3 with encrypted SNI
yet, so the interception proxy can restrict to TLS 1.2 to bypass this.




Usage of .note.openbsd.ident

2021-05-21 Thread George Brown
It seems this ELF note was used for the now dead compat_linux feature.
Aside from compat systems in other operating systems that may wish to
identify OpenBSD binaries does this note have any other active uses?



Re: IKEv2: CHILD_SA is not created

2021-05-21 Thread Денис Давыдов
Ok, thanks for the clarification!

On Fri, May 21, 2021 at 12:30 PM csszep  wrote:

> Hi!
>
> Not only Cisco ASA. Checkpoint, Fortinet, Juniper only support single set
> of subnets per CHILD_SA too.
>
> https://wiki.strongswan.org/projects/strongswan/wiki/Checkpoint
> https://wiki.strongswan.org/projects/strongswan/wiki/Fortinet
> https://wiki.strongswan.org/projects/strongswan/wiki/Juniper
> https://wiki.strongswan.org/projects/strongswan/wiki/CiscoInteroperability
>
> Unfortunately the workaround does not always work. IKED established multiple 
> IKE SA to the same peer if set up separate connection per subnet.
>
> For example Strongswan drop multiple IKE SA from the same peer if 
> uniqueid=yes (default setup):
>
> *Uniqueness* of an IKE_SA, used to drop multiple connections with one peer.
>
> Of course, for Strongswan, this is not a problem because it handles multiple 
> SAs per CHILD SA, but other implementation this can be a problem.
>
>
>
>
>
>
> Денис Давыдов  ezt írta (időpont: 2021. máj. 21., P,
> 10:02):
>
>> It turns out that the Cisco ASA has a bug CSCue42170 with open status that
>> prevents multiple traffic selectors from being supported in one child SA
>> in
>> IKEv2.
>>
>> For more information:
>>
>> https://bst.cloudapps.cisco.com/bugsearch/bug/CSCue42170/?reffering_site=dumpcr
>>
>> Known affected releases: 8.6(1), 9.1(7.13), 9.4(3.6)
>>
>> On Wed, May 12, 2021 at 7:44 PM Денис Давыдов  wrote:
>>
>> > Finally solved! Tried TS one after another. To put it mildly, I'm
>> > surprised. it turns out that the equipment on the remote side is
>> configured
>> > in such a way that for each TS I had to set up a separate connection.
>> This
>> > configuration working fine now:
>> >
>> > ikev2 crypto-primary active esp \
>> >   from 10.21.139.8/30 to 2.2.2.2 \
>> >   peer 7.7.7.7 \
>> >   ikesa auth hmac-sha2-256 enc aes-256 prf hmac-sha2-256 group
>> > modp2048 \
>> >   childsa auth hmac-sha2-256 enc aes-256 group modp2048 \
>> >   ikelifetime 86400 lifetime 28800 \
>> >   psk "*"
>> >
>> > ikev2 crypto-primary active esp \
>> >   from 10.21.139.8/30 to 3.3.3.3 \
>> >   peer 7.7.7.7 \
>> >   ikesa auth hmac-sha2-256 enc aes-256 prf hmac-sha2-256 group
>> > modp2048 \
>> >   childsa auth hmac-sha2-256 enc aes-256 group modp2048 \
>> >   ikelifetime 86400 lifetime 28800 \
>> >   psk "*"
>> >
>> > Tobias, thanks for your time and attention to my problem.
>> >
>> > On Wed, May 12, 2021 at 3:36 PM Денис Давыдов 
>> wrote:
>> >
>> >> Tobias,
>> >>
>> >> I replaced the OpenBSD with the same configuration:
>> >> -> % uname -r -p
>> >> 6.9 amd64
>> >>
>> >> Now, with this configuration:
>> >>
>> >> ikev2 crypto-primary active esp \
>> >>   from any to any \
>> >>   peer 7.7.7.7 \
>> >>   ikesa auth hmac-sha2-256 enc aes-256 prf hmac-sha2-256 group
>> >> modp2048 \
>> >>   childsa auth hmac-sha2-256 enc aes-256 group modp2048 \
>> >>   ikelifetime 86400 lifetime 28800 \
>> >>   psk "*"
>> >>
>> >> I got NO_PROPOSAL_CHOSEN: https://pastebin.com/Puhx41DZ
>> >>
>> >> And with the original configuration, which was agreed with the
>> provider:
>> >>
>> >> ikev2 crypto-primary active esp \
>> >>   from 10.21.139.8/30 to 2.2.2.2 \
>> >>   from 10.21.139.8/30 to 3.3.3.3 \
>> >>   peer 7.7.7.7 \
>> >>   ikesa auth hmac-sha2-256 enc aes-256 prf hmac-sha2-256 group
>> >> modp2048 \
>> >>   childsa auth hmac-sha2-256 enc aes-256 group modp2048 \
>> >>   ikelifetime 86400 lifetime 28800 \
>> >>   psk "*"
>> >>
>> >> I still got TS_UNACCEPTABLE: https://pastebin.com/nw0usUJi
>> >>
>> >> I don't know where to dig anymore. The remote side is not responding
>> yet.
>> >> I contacted another provider who shared their configuration from the
>> same
>> >> Cisco model ASA 5585 (IKEv2 works with that hardware without
>> problems). The
>> >> only difference is that they have no these two options (although, I am
>> not
>> >> an expert in Cisco IKEv2 configuration either):
>> >>
>> >> crypto map outside_map 2470 set connection-type answer-only
>> >> crypto map outside_map 2470 set reverse-route
>> >>
>> >> I understand that everyone is already tired of this topic. I will be in
>> >> close contact with this provider. If I can connect to their equipment,
>> I'll
>> >> write what the problem was. Most likely the problem is in their
>> >> configuration, rather than the problem in iked itself. I am sorry for
>> the
>> >> time wasted.
>> >>
>> >> Oh! One more question: Can iked work with the same TS but different
>> peers
>> >> at the same time?  Am I correct in understanding that this is not
>> possible?
>> >> The remote side just offers the same settings for two public IP
>> addresses
>> >> from their side (they have two different crypto peers). So far, I just
>> >> commented out the configuration with the second peer.
>> >>
>> >>
>> >> On Wed, May 12, 2021 at 12:33 PM Tobias Heider <
>> tobias.hei...@stusta.de>
>> >> 

Re: pf: antispoof with dynamic IP address?

2021-05-21 Thread Peter N. M. Hansteen
On Fri, May 21, 2021 at 05:32:32AM +, Mogens Jensen wrote:
> The antispoof directive will expand to two block rules with IP address
> of the interface, so I would think that with a dynamic IP, the interface
> should be surrounded in parentheses like this:
> 
> antispoof for (wi0)

quoting pf.conf(5):

"The antispoof directive expands to a set of filter rules which will block
 all traffic with a source IP from the network(s) directly connected to
 the specified interface(s) from entering the system through any other
 interface."

This means essentially that the sample rules would fail to be effective 
only if the interface you antispoof for has switched networks.  I think
that is a relatively rare event for running firewalls and not doing a ruleset
reload.

> ===
> The simplest mechanism to block everything by default and only pass
> packets that match explicit rules is specify a first filter rule of:
> 
> block all
> ===
> 
> Is it not even simpler to just specify the filter rule as block without
> all, they seem to expand identical?

You're right, they expand to the exact same thing:

[Fri May 21 10:19:50] peter@zelda:~$ cat blockonly
block
[Fri May 21 10:19:57] peter@zelda:~$ cat blockall
block all
[Fri May 21 10:20:01] peter@zelda:~$ doas pfctl -vnf blockall 
block drop all
[Fri May 21 10:20:11] peter@zelda:~$ doas pfctl -vnf blockonly
block drop all

(also see eg http://home.nuug.no/~peter/pf/newest/simplest-secure.html)
 
Cheers,
Peter

-- 
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/ http://www.nuug.no/
"Remember to set the evil bit on all malicious network traffic"
delilah spamd[29949]: 85.152.224.147: disconnected after 42673 seconds.



Re: Relayd TLS inspection and SNI

2021-05-21 Thread Martin
Hi,

MITM is an ancient attack technique and it is not a good idea because it breaks 
original cert chain. So client (application) will see that cert is different on 
its end. Most people and apps reject connection to a resource with fake cert 
which you're going to send to them.

But you can use Squid for MITM as Stuart recommended, from my side 
HaProxy/Nginx can help you too to do this. For SNI Snort/Suricata can be useful 
but for TLS up to v1.2 only.

Sniffing the traffic that way is a bad idea, most of services uses TLSv1.3 with 
encrypted SNI. So your work will disappear in months.

Martin

‐‐‐ Original Message ‐‐‐
On Friday, May 21, 2021 7:08 AM, Stuart Henderson  wrote:

> On 2021-05-18, BS Daemon b...@post.com wrote:
>
> >I like using the base OpenBSD utilities, and was
> >
> >
> > wondering if I'm doing something wrong, if relayd could be made to
> > support SNI for man-in-the-middle, or if there is an alternative
> > tool for doing this which would work.
>
> I can't help with relayd, but this does work with squid (and you can
> filter on user-agent in ACLs).




pf: antispoof with dynamic IP address?

2021-05-21 Thread Mogens Jensen
The antispoof directive will expand to two block rules with IP address
of the interface, so I would think that with a dynamic IP, the interface
should be surrounded in parentheses like this:

antispoof for (wi0)

But this seems to be wrong, as I have not read any guide or FAQ that
does this, e.g. the "Building a router" guide found at
https://www.openbsd.org/faq/pf/example1.html#pf

In the gateway configuration, egress group is surrounded with
parentheses in multiple places, but not with antispoof:

antispoof quick for { egress $wired $wifi }

Why should this not be

antispoof quick for { (egress) $wired $wifi }

or

antispoof quick for { (egress:0) $wired $wifi }

Another thing I was wondering about while reading the manpage for
pf.conf:

===
The simplest mechanism to block everything by default and only pass
packets that match explicit rules is specify a first filter rule of:

block all
===

Is it not even simpler to just specify the filter rule as block without
all, they seem to expand identical?

Thanks.

Mogens Jensen



Re: IKEv2: CHILD_SA is not created

2021-05-21 Thread csszep
Hi!

Not only Cisco ASA. Checkpoint, Fortinet, Juniper only support single set
of subnets per CHILD_SA too.

https://wiki.strongswan.org/projects/strongswan/wiki/Checkpoint
https://wiki.strongswan.org/projects/strongswan/wiki/Fortinet
https://wiki.strongswan.org/projects/strongswan/wiki/Juniper
https://wiki.strongswan.org/projects/strongswan/wiki/CiscoInteroperability

Unfortunately the workaround does not always work. IKED established
multiple IKE SA to the same peer if set up separate connection per
subnet.

For example Strongswan drop multiple IKE SA from the same peer if
uniqueid=yes (default setup):

*Uniqueness* of an IKE_SA, used to drop multiple connections with one peer.

Of course, for Strongswan, this is not a problem because it handles
multiple SAs per CHILD SA, but other implementation this can be a
problem.






Денис Давыдов  ezt írta (időpont: 2021. máj. 21., P,
10:02):

> It turns out that the Cisco ASA has a bug CSCue42170 with open status that
> prevents multiple traffic selectors from being supported in one child SA in
> IKEv2.
>
> For more information:
>
> https://bst.cloudapps.cisco.com/bugsearch/bug/CSCue42170/?reffering_site=dumpcr
>
> Known affected releases: 8.6(1), 9.1(7.13), 9.4(3.6)
>
> On Wed, May 12, 2021 at 7:44 PM Денис Давыдов  wrote:
>
> > Finally solved! Tried TS one after another. To put it mildly, I'm
> > surprised. it turns out that the equipment on the remote side is
> configured
> > in such a way that for each TS I had to set up a separate connection.
> This
> > configuration working fine now:
> >
> > ikev2 crypto-primary active esp \
> >   from 10.21.139.8/30 to 2.2.2.2 \
> >   peer 7.7.7.7 \
> >   ikesa auth hmac-sha2-256 enc aes-256 prf hmac-sha2-256 group
> > modp2048 \
> >   childsa auth hmac-sha2-256 enc aes-256 group modp2048 \
> >   ikelifetime 86400 lifetime 28800 \
> >   psk "*"
> >
> > ikev2 crypto-primary active esp \
> >   from 10.21.139.8/30 to 3.3.3.3 \
> >   peer 7.7.7.7 \
> >   ikesa auth hmac-sha2-256 enc aes-256 prf hmac-sha2-256 group
> > modp2048 \
> >   childsa auth hmac-sha2-256 enc aes-256 group modp2048 \
> >   ikelifetime 86400 lifetime 28800 \
> >   psk "*"
> >
> > Tobias, thanks for your time and attention to my problem.
> >
> > On Wed, May 12, 2021 at 3:36 PM Денис Давыдов  wrote:
> >
> >> Tobias,
> >>
> >> I replaced the OpenBSD with the same configuration:
> >> -> % uname -r -p
> >> 6.9 amd64
> >>
> >> Now, with this configuration:
> >>
> >> ikev2 crypto-primary active esp \
> >>   from any to any \
> >>   peer 7.7.7.7 \
> >>   ikesa auth hmac-sha2-256 enc aes-256 prf hmac-sha2-256 group
> >> modp2048 \
> >>   childsa auth hmac-sha2-256 enc aes-256 group modp2048 \
> >>   ikelifetime 86400 lifetime 28800 \
> >>   psk "*"
> >>
> >> I got NO_PROPOSAL_CHOSEN: https://pastebin.com/Puhx41DZ
> >>
> >> And with the original configuration, which was agreed with the provider:
> >>
> >> ikev2 crypto-primary active esp \
> >>   from 10.21.139.8/30 to 2.2.2.2 \
> >>   from 10.21.139.8/30 to 3.3.3.3 \
> >>   peer 7.7.7.7 \
> >>   ikesa auth hmac-sha2-256 enc aes-256 prf hmac-sha2-256 group
> >> modp2048 \
> >>   childsa auth hmac-sha2-256 enc aes-256 group modp2048 \
> >>   ikelifetime 86400 lifetime 28800 \
> >>   psk "*"
> >>
> >> I still got TS_UNACCEPTABLE: https://pastebin.com/nw0usUJi
> >>
> >> I don't know where to dig anymore. The remote side is not responding
> yet.
> >> I contacted another provider who shared their configuration from the
> same
> >> Cisco model ASA 5585 (IKEv2 works with that hardware without problems).
> The
> >> only difference is that they have no these two options (although, I am
> not
> >> an expert in Cisco IKEv2 configuration either):
> >>
> >> crypto map outside_map 2470 set connection-type answer-only
> >> crypto map outside_map 2470 set reverse-route
> >>
> >> I understand that everyone is already tired of this topic. I will be in
> >> close contact with this provider. If I can connect to their equipment,
> I'll
> >> write what the problem was. Most likely the problem is in their
> >> configuration, rather than the problem in iked itself. I am sorry for
> the
> >> time wasted.
> >>
> >> Oh! One more question: Can iked work with the same TS but different
> peers
> >> at the same time?  Am I correct in understanding that this is not
> possible?
> >> The remote side just offers the same settings for two public IP
> addresses
> >> from their side (they have two different crypto peers). So far, I just
> >> commented out the configuration with the second peer.
> >>
> >>
> >> On Wed, May 12, 2021 at 12:33 PM Tobias Heider  >
> >> wrote:
> >>
> >>> On Wed, May 12, 2021 at 12:06:21PM +0300, Денис Давыдов wrote:
> >>> > I tried to specify an explicit parameter -T to disable NAT-Traversal
> >>> > auto-detection and use `local' parameter. Also according to your
> advice
> >>> > tried a configuration like 

Re: IKEv2: CHILD_SA is not created

2021-05-21 Thread Денис Давыдов
It turns out that the Cisco ASA has a bug CSCue42170 with open status that
prevents multiple traffic selectors from being supported in one child SA in
IKEv2.

For more information:
https://bst.cloudapps.cisco.com/bugsearch/bug/CSCue42170/?reffering_site=dumpcr

Known affected releases: 8.6(1), 9.1(7.13), 9.4(3.6)

On Wed, May 12, 2021 at 7:44 PM Денис Давыдов  wrote:

> Finally solved! Tried TS one after another. To put it mildly, I'm
> surprised. it turns out that the equipment on the remote side is configured
> in such a way that for each TS I had to set up a separate connection. This
> configuration working fine now:
>
> ikev2 crypto-primary active esp \
>   from 10.21.139.8/30 to 2.2.2.2 \
>   peer 7.7.7.7 \
>   ikesa auth hmac-sha2-256 enc aes-256 prf hmac-sha2-256 group
> modp2048 \
>   childsa auth hmac-sha2-256 enc aes-256 group modp2048 \
>   ikelifetime 86400 lifetime 28800 \
>   psk "*"
>
> ikev2 crypto-primary active esp \
>   from 10.21.139.8/30 to 3.3.3.3 \
>   peer 7.7.7.7 \
>   ikesa auth hmac-sha2-256 enc aes-256 prf hmac-sha2-256 group
> modp2048 \
>   childsa auth hmac-sha2-256 enc aes-256 group modp2048 \
>   ikelifetime 86400 lifetime 28800 \
>   psk "*"
>
> Tobias, thanks for your time and attention to my problem.
>
> On Wed, May 12, 2021 at 3:36 PM Денис Давыдов  wrote:
>
>> Tobias,
>>
>> I replaced the OpenBSD with the same configuration:
>> -> % uname -r -p
>> 6.9 amd64
>>
>> Now, with this configuration:
>>
>> ikev2 crypto-primary active esp \
>>   from any to any \
>>   peer 7.7.7.7 \
>>   ikesa auth hmac-sha2-256 enc aes-256 prf hmac-sha2-256 group
>> modp2048 \
>>   childsa auth hmac-sha2-256 enc aes-256 group modp2048 \
>>   ikelifetime 86400 lifetime 28800 \
>>   psk "*"
>>
>> I got NO_PROPOSAL_CHOSEN: https://pastebin.com/Puhx41DZ
>>
>> And with the original configuration, which was agreed with the provider:
>>
>> ikev2 crypto-primary active esp \
>>   from 10.21.139.8/30 to 2.2.2.2 \
>>   from 10.21.139.8/30 to 3.3.3.3 \
>>   peer 7.7.7.7 \
>>   ikesa auth hmac-sha2-256 enc aes-256 prf hmac-sha2-256 group
>> modp2048 \
>>   childsa auth hmac-sha2-256 enc aes-256 group modp2048 \
>>   ikelifetime 86400 lifetime 28800 \
>>   psk "*"
>>
>> I still got TS_UNACCEPTABLE: https://pastebin.com/nw0usUJi
>>
>> I don't know where to dig anymore. The remote side is not responding yet.
>> I contacted another provider who shared their configuration from the same
>> Cisco model ASA 5585 (IKEv2 works with that hardware without problems). The
>> only difference is that they have no these two options (although, I am not
>> an expert in Cisco IKEv2 configuration either):
>>
>> crypto map outside_map 2470 set connection-type answer-only
>> crypto map outside_map 2470 set reverse-route
>>
>> I understand that everyone is already tired of this topic. I will be in
>> close contact with this provider. If I can connect to their equipment, I'll
>> write what the problem was. Most likely the problem is in their
>> configuration, rather than the problem in iked itself. I am sorry for the
>> time wasted.
>>
>> Oh! One more question: Can iked work with the same TS but different peers
>> at the same time?  Am I correct in understanding that this is not possible?
>> The remote side just offers the same settings for two public IP addresses
>> from their side (they have two different crypto peers). So far, I just
>> commented out the configuration with the second peer.
>>
>>
>> On Wed, May 12, 2021 at 12:33 PM Tobias Heider 
>> wrote:
>>
>>> On Wed, May 12, 2021 at 12:06:21PM +0300, Денис Давыдов wrote:
>>> > I tried to specify an explicit parameter -T to disable NAT-Traversal
>>> > auto-detection and use `local' parameter. Also according to your advice
>>> > tried a configuration like this:
>>> >
>>> > ikev2 crypto-primary active esp \
>>> >   from any to any \
>>> >   local 1.1.1.1 peer 7.7.7.7 \
>>> >   ikesa auth hmac-sha2-256 enc aes-256 prf hmac-sha2-256 group
>>> modp2048
>>> > \
>>> >   childsa auth hmac-sha2-256 enc aes-256 group modp2048 \
>>> >   ikelifetime 86400 lifetime 28800 \
>>> >   psk "secret"
>>> >
>>> > And I got:
>>> >
>>> > May 12 08:45:17 crypto-gw2 iked[17640]: ikev2_pld_payloads: decrypted
>>> > payload TSi nextpayload TSr critical 0x00 length 8
>>> > May 12 08:45:17 crypto-gw2 iked[17640]: ikev2_pld_tss: count 1 length 0
>>> > May 12 08:45:17 crypto-gw2 iked[17640]: ikev2_validate_ts: malformed
>>> > payload: too short for header (0 < 8)
>>> > May 12 08:45:17 crypto-gw2 iked[17640]: ikev2_validate_pld: malformed
>>> > payload: shorter than minimum header size (0 < 4)
>>>
>>> This looks like you're running < 6.9 where any doesn't work for traffic
>>> selectors.  Either try using 0.0.0.0/0 instead or even better update
>>> to the latest version.
>>>
>>> >
>>> > Full log: https://pastebin.com/MLC4VXSs
>>> >
>>> > P.S. Tried removing the 

Re: Relayd TLS inspection and SNI

2021-05-21 Thread Stuart Henderson
On 2021-05-18, BS Daemon  wrote:
>I like using the base OpenBSD utilities, and was
> wondering if I'm doing something wrong, if relayd could be made to
> support SNI for man-in-the-middle, or if there is an alternative
> tool for doing this which would work.

I can't help with relayd, but this does work with squid (and you can
filter on user-agent in ACLs).