Re: OpenBSD 4.7 as VPN Gateway for Road Warriors, Preferred Configuration

2010-06-01 Thread Pete Vickers
Hi,

Transport mode IPSec has many legit uses. The first one which springs to mind
is gateway-gateway encryption, over which you can use your favourite tunneling
protocol e.g.  L2TP or GRE. Especially useful if you're transporting multicast
traffic over the VPN.

Also one of the most popular remote access VPN solutions (works 'out of the
box' on Windows, OS.X  Cisco routers) is L2TP over IPSec. This provides
both static  dynamically addressed clients with an IPSec tunnel back to the
VPN server, over which L2TP is tunneled, providing DHCP for tunnel IP
addressing, and multi-protocol (IPX or IPv6 anyone ?) support.


It's also ideal for ubiquitous IP level any to any encryption if you spend the
effort on key management issues.


/Pete


On 31. mai 2010, at 18.56, Toni Mueller wrote:


 I'd say that transport mode is a design error in IPSEC and should be
 avoided at all costs. It also complicates network setup quite a bit,
 imho.


 Kind regards,
 --Toni++



Re: OpenBSD 4.7 as VPN Gateway for Road Warriors, Preferred Configuration

2010-05-31 Thread Toni Mueller
Hi,

On Sun, 23.05.2010 at 11:41:27 +0200, Martin PelikC!n 
martin.peli...@gmail.com wrote:
 It really depends on what you need - most road warriors are okay with
 transport mode (where obviously DHCP doesn't make any sense). If

I'd say that transport mode is a design error in IPSEC and should be
avoided at all costs. It also complicates network setup quite a bit,
imho.


Kind regards,
--Toni++



Re: OpenBSD 4.7 as VPN Gateway for Road Warriors, Preferred Configuration

2010-05-23 Thread Martin Pelikán
2010/5/22, dontek don...@gmail.com:
 Yes, thanks, I've read the man pages.  I've even made the proposed
 connection
 work both ways. (less the DHCP working)  What I was hoping for was a few
 that
 have more experience than I do to share their experiences and tell me some
 of
 the potential benefits and/or drawbacks of doing it one way or the other;
 preferably specific to multiple roaming clients, with the intention of using
 DHCP over IPSec, and with any OpenBSD-4.7-specific nuances.

The only OpenBSD-4.7-specific nuance that I know of, is the fixed bug
in HMAC-SHA-256, that makes it incompatible with older releases. From
what I tried, single point-to-point tunnel works even with Racoon on
Gentoo Linux. The painful three-hundred-clicks setup under Windows I
didn't find time to test against 4.7 or -current.
It really depends on what you need - most road warriors are okay with
transport mode (where obviously DHCP doesn't make any sense). If
you're planning to connect the whole network to a single IPsec gateway
(I have IPv6-over-IPv4 tunnel like this), you might want to pay
attention to *what traffic do you actually want* to encrypt and add
something like flow esp from local-net to local-net type bypass,
so only packets the right way are secure. But all this comes from
common sense and observing what's happening. OpenBSD does this a
clever way - you have enc(4) interface where you can observe whats's
inside your tunnel and it doesn't mix up with what you want to see on
your *real* interface. (typically only ESP/isakmp traffic)

-- 
Martin Pelikan



Re: OpenBSD 4.7 as VPN Gateway for Road Warriors, Preferred Configuration

2010-05-22 Thread dontek
-Original Message-
From: Martin PelikC!n [mailto:martin.peli...@gmail.com]
Sent: Friday, May 21, 2010 8:19 AM
To: dontek
Cc: Misc OpenBSD
Subject: Re: OpenBSD 4.7 as VPN Gateway for Road Warriors, Preferred
Configuration

 Hi
 did you actually read any piece of documentation about the topic?
 Manual pages like ipsec(4) for overview, ipsec.conf(5) for
 configuration and isakmpd(8) + keynote(3,4,5) + openssl(1) + authpf(8)
 for possible ways of authenticating your warriors.

Yes, thanks, I've read the man pages.  I've even made the proposed connection
work both ways. (less the DHCP working)  What I was hoping for was a few that
have more experience than I do to share their experiences and tell me some of
the potential benefits and/or drawbacks of doing it one way or the other;
preferably specific to multiple roaming clients, with the intention of using
DHCP over IPSec, and with any OpenBSD-4.7-specific nuances.

 I've found many examples via Google.  Some are using isakmpd.conf, while
 others use the isakmpd -K switch and defer to ipsec.conf for
configuration.

 Choose what you prefer. ipsec.conf is less typing (about ten times).

 In my situation with multiple Road Warriors, is one way more correct than
 the other..?  Easier..?

 All the situations are easy if you know what are doing :-) And guess
 where the place to learn is...

 What's the preferred method in the day of OpenBSD 4.7?

 To search before typing?

 --
 Martin Pelikan



Re: OpenBSD 4.7 as VPN Gateway for Road Warriors, Preferred Configuration

2010-05-22 Thread dontek
-Original Message-
From: Wouter Slegers [mailto:wou...@yourcreativesolutions.nl] 
Sent: Saturday, May 22, 2010 5:23 AM
To: dontek
Subject: Re: OpenBSD 4.7 as VPN Gateway for Road Warriors, Preferred
Configuration

 In my situation with multiple Road Warriors, is one way more correct than
 the other..?  Easier..?


My advise is to really consider OpenVPN. I know it is not the
OpenBSD quality software, but IPSec is really difficult to get through
most hotel NAT and firewall layers. OpenVPN with the UDP and TCP
tunnelling is way more robust in that regard. It has good failover and
recovery options, built in DHCPlike features and such, and clients for
*BSD, Linux, Windows, MacOSX.

Thanks for the suggestion, I would like to try OpenBSD straight-IPSec first
and see how it goes in the field.  Fortunately my chosen client supports
both setups, so if I start to see problems, your solution should just be a
quick configuration change once it's setup on the gateway.

With kind regards,
Wouter



Re: OpenBSD 4.7 as VPN Gateway for Road Warriors, Preferred Configuration

2010-05-21 Thread Martin Pelikán
Hi
did you actually read any piece of documentation about the topic?
Manual pages like ipsec(4) for overview, ipsec.conf(5) for
configuration and isakmpd(8) + keynote(3,4,5) + openssl(1) + authpf(8)
for possible ways of authenticating your warriors.

 I've found many examples via Google.  Some are using isakmpd.conf, while
 others use the isakmpd -K switch and defer to ipsec.conf for configuration.

Choose what you prefer. ipsec.conf is less typing (about ten times).

 In my situation with multiple Road Warriors, is one way more correct than
 the other..?  Easier..?

All the situations are easy if you know what are doing :-) And guess
where the place to learn is...

 What's the preferred method in the day of OpenBSD 4.7?

To search before typing?

-- 
Martin Pelikan



Re: OpenBSD 4.7 as VPN Gateway for Road Warriors, Preferred Configuration

2010-05-21 Thread J Sisson
2010/5/21 Martin Pelikan martin.peli...@gmail.com:
 What's the preferred method in the day of OpenBSD 4.7?

 To search before typing?

+1



OpenBSD 4.7 as VPN Gateway for Road Warriors, Preferred Configuration

2010-05-20 Thread dontek
Hey guys:

 

I'm looking for a little direction here, as the preferred method of setting
up a VPN for these types of connections seems to have changed many times
throughout the version history of OpenBSD and changes to IPSec, isakmpd, pf,
etc..

 

So as you've probably gleaned from the subject, I want multiple clients to
be able to connect to the OpenBSD 4.7 VPN Gateway.  I'd also like to use
DHCP over IPSec.

 

I've found many examples via Google.  Some are using isakmpd.conf, while
others use the isakmpd -K switch and defer to ipsec.conf for configuration.

 

In my situation with multiple Road Warriors, is one way more correct than
the other..?  Easier..?

 

What's the preferred method in the day of OpenBSD 4.7?

 

Thanks,

 

don..