On 12/15/2017 09:41 AM, Colony.three via Shorewall-users wrote: > >> I'll look at what you say below Bill. >> >> But keep in mind that the attacks I'm concerned about are typically >> buffer overflows and other sideband attacks. Directness rarely >> succeeds in hacking these days. There are always unknown vulns. >> >> I'm suspicioning that the reason Tom says that only the router can >> sponsor the ipsec gateway, is that ports other than 4500 are used, >> although he doesn't specify. I know that at least with LibreSwan >> there is a setting to constrain it to 4500 for this reason. Not sure >> about StrongSwan, but I'll look into it today. >> > Now I remember. Tom said the reason an incoming remote could not access > the rest of the LAN is something about IPsec SAs. I couldn't understand it. > > But it may be that his experience is with LibreSwan. StrongSwan > ostensibly does have support for NAT traversal > <https://wiki.strongswan.org/projects/strongswan/wiki/NatTraversal>, and > I'm trying to understand that now. >
I did not mention IPSEC SAs. The problem with trying to access the rest
of the LAN is that response packets from other LAN systems aren't routed
back through the IPEC endpoint. As I mentioned, you can force that to
happen by using SNAT on the endpoint host, if you are willing to accept
that traffic from the remote laptop appears to originate on the endpoint
host.
Here are StrongSwan configuration files that I've tested to my laptop to
access my LAN using the SNAT kludge. The endpoint is in the zone called
'apps' and has local IP 172.20.2.44.
Warning -- my mailer has folded the long '*subnet' lines.
Laptop ipsec.conf:
conn %default
ikelifetime=60m
keylife=20m
rekeymargin=3m
keyingtries=3
keyexchange=ikev2
authby=pubkey
dpdaction=restart
conn vpn4
left=%any
leftcert=debianvmCert.der
leftid=debianvm.shorewall.net
leftsourceip=%config
right=172.20.2.44
rightid=irssi.shorewall.net
rightsubnet=172.20.1.0/24,172.20.2.0/24,70.90.191.122/31,70.90.191.124/31
auto=start
Local Endpoint ipsec.conf:
conn %default
ikelifetime=60m
keylife=20m
rekeymargin=3m
keyingtries=3
keyexchange=ikev2
authby=pubkey
conn ipv4
left=172.20.2.44
leftid=irssi.shorewall.net
leftsubnet=172.20.1.0/24,172.20.2.0/24,70.90.191.122/31,70.90.191.124/31
leftcert=irssiCert.der
right=%any
rightsourceip=172.20.3.0/24
rightdns=172.20.1.253
auto=add
The following rule is present in /etc/shorewall/rules on the router:
DNAT { SOURCE=net, DEST=apps:172.20.2.44, PROTO=udp, \
DPORT=500,4500, ORIGDEST=$IPSEC_IP }
There are other rules/policies between apps:172.20.2.44 and the other
local zones.
On the endpoint system, I executed the following command:
iptables -t nat -A POSTROUTING -j MASQUERADE
Warning to readers: I have been unable to get a similar IPv6 config to
work, but I suspect that has to do with the fact that the local IPSEC
endpoint is in an LXC container. Packets that have had IPv6 SNAT applied
can be seen leaving the container's eth0, but are not seen on the
connected bridge hosted in the router!!??
FWIW, my normal IPSEC local endpoint is on my router; the above configs
were created just to test my SNAT hypothisis.
-Tom
--
Tom Eastep \ Q: What do you get when you cross a mobster with
Shoreline, \ an international standard?
Washington, USA \ A: Someone who makes you an offer you can't
http://shorewall.org \ understand
\_______________________________________________
signature.asc
Description: OpenPGP digital signature
------------------------------------------------------------------------------ Check out the vibrant tech community on one of the world's most engaging tech sites, Slashdot.org! http://sdm.link/slashdot
_______________________________________________ Shorewall-users mailing list [email protected] https://lists.sourceforge.net/lists/listinfo/shorewall-users
