Hi Paul,

I did some research. It may be impossible to log IKEv2 sessions in utmp and wtmp, for libreswan doesn't appear to be calling pam_open_session(3) after authenticating the certificate and the user and pam_close_session(3) after the connection is severed.

I am not confident enough to attempt to add the session management calls to the libreswan source, or not yet :-)

And leaving it the utmp entry to linger forever upon the breakup of the connection doesn't seem prudent, so I'll think I'll take a break at this point and "stand on the ball".

Tell me, did I miss something, or is the utmp/wtmp connection logging entirely impossible withing the current libreswan framework? I would like to have some handy connection logging apart from /var/log/pluto.log ...

Thanks!

Kind regards,
Mirsad

On 1/25/2022 9:36 PM, Mirsad Goran Todorovac wrote:
Is there a particular reason why you switched from the POST URL request to a GET one? AFAIK, GET used to be less safe as it encoded password in URL which might be visible in some web server logs ... Any idea why you did that? :-/

I thought that your idea of using a CN=username@hostname,O=myorg.tld convention is a good one, but I would have to reissue all of the certificates, and my current system already works partially deployed. (Only to the testing people, of course ...).

What I was actually looking for is a means to get username from the script (and it seems to allow only OK or ACCESS DENIED), or should I call getpwnam() from PHP. But it didn't seem right to modify utmp from PHP, did it? That breaks modularity paradigm IMHO ... Still looking for a way to do things "kosher" way ... :-)

On 1/25/2022 4:24 AM, Paul Wouters wrote:
On Mon, 24 Jan 2022, Mirsad Goran Todorovac wrote:

I can publish a patch diff. I have really made very small modifications. A couple of lines.

I would also want to map certificate subject lines to unix usernames, put the user into utmp and display the connected user with `w`
or `who` commands. But I'm not sure how it's done yet.

Attached is what I had gobbled together to pull IDs from certificates inside pam_url for IKEv2.

Maybe I should think of forking pam_url and supplying a Debian .deb package, since only .rpm exists in the wild?

I don't think it is well maintained or active upstream?

pam-authenticate is a very practical method of access control. I would like to clear the doubts that it decreased the security of IKEv2 VPN, and that it is unprofessional, because pam_url calls a cgi-bin script in .php over a TLSv1.3 connection.

It still beats 10 round trips of EAPTLS on Windows :)

Paul

--
Mirsad Goran Todorovac
CARNet sistem inženjer
Grafički fakultet | Akademija likovnih umjetnosti
Sveučilište u Zagrebu

--
Mirsad Goran Todorovac
CARNet sistem inženjer
Grafički fakultet | Akademija likovnih umjetnosti
Sveučilište u Zagrebu
--
CARNet system engineer
Faculty of Graphic Arts | Academy of Fine Arts
University of Zagreb, Republic of Croatia
tel. +385 (0)1 3711 451
mob. +385 91 57 88 355

_______________________________________________
Swan mailing list
[email protected]
https://lists.libreswan.org/mailman/listinfo/swan

Reply via email to