> > conn headq
> >    left=%defaultroute
> >    leftcert=remotehost1
> >    leftid=%fromcert
> >    right=198.51.100.33
> >    rightid=%fromcert
> >    leftsubnet=0.0.0.0/0
> >    rightsubnet=0.0.0.0/0
> 
> What are you trying to do here? Where does 0.0.0.0/0 live? It cannot
> live at both sides of the tunnel. Where would a packet for 1.2.3.4
> need to go? To left or to right?
> 
> Are you trying to make a route based VPN without using an ipsec interface?

No. Honestly, I just added {left,right}subnet based on your advice regarding 
the SSH passthrough conn. Admittedly, without really understanding what is 
behind those two - I got quite confused about the 0.0.0.0/0 options.

However, the goal is as described before: keep the working ipsec connection 
to hosts living inside 192.168.1.0/24 and additionally establish a 
connection from remotehost1.privlan (initiator, 10.0.1.138 locally, sitting 
behind a public 203.0.113.55) to server.privlan (responder, 192.168.1.253 
locally, public 198.51.100.33). Although the configuration of 
remotehost[xx].privlan may vary, you can safely assume remotehost1.privlan 
to have just one network interface with the usual configuration.

I hope to have made it less confusing now, at least for you.

Phil
_______________________________________________
Swan mailing list
Swan@lists.libreswan.org
https://lists.libreswan.org/mailman/listinfo/swan

Reply via email to