Hi All, I have been a happy LRP and LEAF user for a number of years now. Thanks for all the great work! I started messing with LRP for fun and began production use at some offices with LRP 2.9.4. The offices have been updated over the years, moving up through Dachstein and Eiger and using Bering most recently. Fantastic stuff that just works! My best uptime so far has been about 380 days! Nice! Anyway, I've been recently asked to provide some VPN functionality at a couple of offices that are running Bering. I've done a bit of research and spent a bit of time trying to get a working setup on the bench. I can't seem to get past a couple of hitches and it is time to ask the community for a bit of help. I'm certain that it it is my inexperience with IPSec that is causing the problems, so hopefully it will be a quick bit of advice that will put me back on track.
At this point, I have eleminated all of the errors that displayed on the console during the startup phase. When I try to start the VPN connection from the command line with "ipsec auto --up vpn_jim" (vpn_jim is the name of my vpn tunnel, I think), I get "whack: Pluto is not running (no "var/run/pluto.ctl")" as the response. I get that message for most anything that I type that starts with ipsec. When I look in /var/log/daemon.log, I can see a line that says "ipsec__plutorun: !pluto failure: exited with error status 1". When I look in /var/log/auth.log, I can see a line that says "pluto[31029]: FATAL ERROR: unable to malloc 0 bytes for cert". The few previous lines mentioned loading the cacert file and the crl file. There is nothing in the process list about pluto, so I think it's dead. Anybody got any suggestions? Thanks! Jim Walters (952) 474-9215 Here's the bench setup (forgive the bad ASCII art): +-----------------+ | existing | | Bering router +----------------- to cable modem | v1.0, I think | +-------+---------+ | 10.0.0.1/24 | | +---------+-------------+ +---------------------+ netgear switch +--------------------+ | +---------+-------------+ | | 10.0.0.4 | 10.0.0.25 | 10.0.0.3 +------+--------+ +-------+---------+ +--------+--------+ | fw_left | | test PC 3 | | fw_right | +------+--------+ +-----------------+ +--------+--------+ | 192.168.1.1/24 | 192.168.0.1/24 | | | 192.168.1.2 | 192.168.0.2 +------+--------+ +--------+--------+ | test PC 1 | | test PC 2 | +---------------+ +-----------------+ Hardware description of the routers: Each of the three routers in the picture (existing Bering router, fw_left, and fw_right) are identical hardware. They are Siemens small form factor PCs with a C8/233 MHz processor, 64M RAM, 32M Flash Disk in PCMCIA to IDE adapters, Dual Intel Pro100 NICs, standard VGA and keyboard. Nice little units for playing with router stuff, useless for most anything else. They have a free PCI slot (after the NICs are installed) and USB, but I've yet to find the time to add wireless capability and play with those functions at all. Maybe soon! Software Description: The existing Bering router is running an older Bering version, about 1.0, but I'm not sure. Once I get the new stuff running, it will be upgraded. I have enough memory cards that I can play with new versions and if it goes bonk just slide the working version back in. A nice feature that will hopefully guarantee the ability to roll back to a working config. I also thought it might be optimistic of me to reconfigure my one working gateway to the internet. I've played with both Bering 1.2 and Bering uClibc 2.2 beta 2 on the test firewall units and gotten similar results with both versions. That's what is leading me to believe that I am not understanding something about the configuration. Each time I google for variations on "bering, linux, VPN, leaf, ipsec, ... etc" I find a juicy piece of information that gets me closer to a working config, but I'm mostly out of juice at this point. I've focused most of my energy on the Bering uClibc 2.2 beta 2, but I'm willing to try most any version if someone thinks that they know what I'm doing wrong. Configuration Data (tried to do it like the support page said): # uname -a Linux fw_left 2.4.24 #18 Sat Apr 24 10:07:53 CEST 2004 i586 unknown # ip addr show 2: lo: <LOOPBACK,UP> mtu 16436 qdisc noqueue link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 inet 127.0.0.1/8 scope host lo 2: dummy0: <BROADCAST,NOARP> mtu 1500 qdisc noop link/ether 00:00:00:00:00:00 brd ff:ff:ff:ff:ff:ff 3: eth0: <BROADCAST,MULTICAST,UP> mtu 1500 qdisc pfifo_fast qlen 1000 link/ether 08:00:06:25:bc:d2 brd ff:ff:ff:ff:ff:ff inet 10.0.0.4/24 brd 10.0.0.255 scope global eth0 4: eth1: <BROADCAST,MULTICAST,UP> mtu 1500 qdisc pfifo_fast qlen 1000 link/ether 00:a0:c9:39:13:c2 brd ff:ff:ff:ff:ff:ff inet 192.168.1.1/24 brd 192.168.1.255 scope global eth1 5: ipsec0: <NOARP,UP> mtu 16260 qdisc pfifo_fast qlen 10 link/ether 08:00:06:25:bc:d2 brd ff:ff:ff:ff:ff:ff inet 10.0.0.4/24 brd 10.0.0.255 scope global ipsec0 6: ipsec1: <NOARP> mtu 0 qdisc noop qlen 10 link/ipip 7: ipsec2: <NOARP> mtu 0 qdisc noop qlen 10 link/ipip 8: ipsec3: <NOARP> mtu 0 qdisc noop qlen 10 link/ipip # ip route show 10.0.0.0/24 dev eth0 proto kernel scope link src 10.0.0.4 10.0.0.0/24 dev ipsec0 proto kernel scope link src 10.0.0.4 192.168.1.0/24 dev eth1 proto kernel scope link src 192.168.1.1 default via 10.0.0.1 dev eth0 # lsmod Module Size Used by Not tainted ipsec 256416 1 softdog 1508 1 ipt_state 368 36 ipt_helper 496 0 (unused) ipt_conntrack 852 0 ipt_REDIRECT 544 0 (unused) ipt_MASQUERADE 1088 1 ip_nat_irc 2152 0 (unused) ip_nat_ftp 2792 0 (unused) iptable_nat 15556 3 [ipt_REDIRECT ipt_MASQUERADE ip_nat_irc ip_nat_ftp] ip_conntrack_irc 2876 1 ip_conntrack_ftp 3484 1 ip_conntrack 17864 6 [ipt_state ipt_helper ipt_conntrack ipt_REDIRECT ipt_MASQUERADE ip_nat_irc ip_nat_ftp iptable_nat ip_conntrack_irc ip_conntrack_ftp] eepro100 17740 2 mii 2108 0 [eepro100] isofs 17012 0 (unused) ide-detect 144 0 (unused) ide-cd 28572 0 ide-disk 12492 1 ide-core 88752 1 [ide-detect ide-cd ide-disk] cdrom 26976 0 [ide-cd] # shorewall status Shorewall-1.4.10e Status at fw_left - Fri Jun 4 17:56:25 UTC 2004 Counters reset Fri Jun 4 17:51:46 UTC 2004 Chain INPUT (policy DROP 0 packets, 0 bytes) pkts bytes target prot opt in out source destination 4 336 ACCEPT all -- lo * 0.0.0.0/0 0.0.0.0/0 0 0 DROP !icmp -- * * 0.0.0.0/0 0.0.0.0/0 state INVALID 5 1054 eth0_in all -- eth0 * 0.0.0.0/0 0.0.0.0/0 0 0 eth1_in all -- eth1 * 0.0.0.0/0 0.0.0.0/0 0 0 ipsec0_in all -- ipsec0 * 0.0.0.0/0 0.0.0.0/0 0 0 common all -- * * 0.0.0.0/0 0.0.0.0/0 0 0 ULOG all -- * * 0.0.0.0/0 0.0.0.0/0 ULOG copy_range 0 nlgroup 1 prefix `Shorewall:INPUT:REJECT:' queue_threshold 1 0 0 reject all -- * * 0.0.0.0/0 0.0.0.0/0 Chain FORWARD (policy DROP 0 packets, 0 bytes) pkts bytes target prot opt in out source destination 0 0 DROP !icmp -- * * 0.0.0.0/0 0.0.0.0/0 state INVALID 0 0 eth0_fwd all -- eth0 * 0.0.0.0/0 0.0.0.0/0 0 0 eth1_fwd all -- eth1 * 0.0.0.0/0 0.0.0.0/0 0 0 ipsec0_fwd all -- ipsec0 * 0.0.0.0/0 0.0.0.0/0 0 0 common all -- * * 0.0.0.0/0 0.0.0.0/0 0 0 ULOG all -- * * 0.0.0.0/0 0.0.0.0/0 ULOG copy_range 0 nlgroup 1 prefix `Shorewall:FORWARD:REJECT:' queue_threshold 1 0 0 reject all -- * * 0.0.0.0/0 0.0.0.0/0 Chain OUTPUT (policy DROP 0 packets, 0 bytes) pkts bytes target prot opt in out source destination 4 336 ACCEPT all -- * lo 0.0.0.0/0 0.0.0.0/0 0 0 DROP !icmp -- * * 0.0.0.0/0 0.0.0.0/0 state INVALID 5 420 fw2net all -- * eth0 0.0.0.0/0 0.0.0.0/0 0 0 fw2loc all -- * eth1 0.0.0.0/0 0.0.0.0/0 0 0 all2all all -- * ipsec0 0.0.0.0/0 0.0.0.0/0 0 0 common all -- * * 0.0.0.0/0 0.0.0.0/0 0 0 ULOG all -- * * 0.0.0.0/0 0.0.0.0/0 ULOG copy_range 0 nlgroup 1 prefix `Shorewall:OUTPUT:REJECT:' queue_threshold 1 0 0 reject all -- * * 0.0.0.0/0 0.0.0.0/0 Chain all2all (6 references) pkts bytes target prot opt in out source destination 0 0 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0 state RELATED,ESTABLISHED 0 0 common all -- * * 0.0.0.0/0 0.0.0.0/0 0 0 ULOG all -- * * 0.0.0.0/0 0.0.0.0/0 ULOG copy_range 0 nlgroup 1 prefix `Shorewall:all2all:REJECT:' queue_threshold 1 0 0 reject all -- * * 0.0.0.0/0 0.0.0.0/0 Chain common (5 references) pkts bytes target prot opt in out source destination 0 0 icmpdef icmp -- * * 0.0.0.0/0 0.0.0.0/0 0 0 DROP udp -- * * 0.0.0.0/0 0.0.0.0/0 udp dpt:135 5 1054 DROP udp -- * * 0.0.0.0/0 0.0.0.0/0 udp dpts:137:139 0 0 DROP udp -- * * 0.0.0.0/0 0.0.0.0/0 udp dpt:445 0 0 DROP tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:139 0 0 DROP tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:445 0 0 DROP tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:135 0 0 DROP udp -- * * 0.0.0.0/0 0.0.0.0/0 udp dpt:1900 0 0 DROP all -- * * 0.0.0.0/0 255.255.255.255 0 0 DROP all -- * * 0.0.0.0/0 224.0.0.0/4 0 0 reject tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:113 0 0 DROP udp -- * * 0.0.0.0/0 0.0.0.0/0 udp spt:53 state NEW 0 0 DROP icmp -- * * 0.0.0.0 0.0.0.0/0 0 0 DROP icmp -- * * 0.0.0.0/0 0.0.0.0 0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp flags:0x10/0x10 0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp flags:0x04/0x04 0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp flags:0x01/0x01 0 0 DROP all -- * * 0.0.0.0/0 10.0.0.255 0 0 DROP all -- * * 0.0.0.0/0 192.168.1.255 Chain dynamic (6 references) pkts bytes target prot opt in out source destination Chain eth0_fwd (1 references) pkts bytes target prot opt in out source destination 0 0 dynamic all -- * * 0.0.0.0/0 0.0.0.0/0 state NEW 0 0 net2all all -- * eth1 0.0.0.0/0 0.0.0.0/0 0 0 net2all all -- * ipsec0 0.0.0.0/0 0.0.0.0/0 Chain eth0_in (1 references) pkts bytes target prot opt in out source destination 5 1054 dynamic all -- * * 0.0.0.0/0 0.0.0.0/0 state NEW 5 1054 net2fw all -- * * 0.0.0.0/0 0.0.0.0/0 Chain eth1_fwd (1 references) pkts bytes target prot opt in out source destination 0 0 dynamic all -- * * 0.0.0.0/0 0.0.0.0/0 state NEW 0 0 loc2net all -- * eth0 0.0.0.0/0 0.0.0.0/0 0 0 loc2vpn all -- * ipsec0 0.0.0.0/0 0.0.0.0/0 Chain eth1_in (1 references) pkts bytes target prot opt in out source destination 0 0 dynamic all -- * * 0.0.0.0/0 0.0.0.0/0 state NEW 0 0 loc2fw all -- * * 0.0.0.0/0 0.0.0.0/0 Chain fw2loc (1 references) pkts bytes target prot opt in out source destination 0 0 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0 state RELATED,ESTABLISHED 0 0 ACCEPT icmp -- * * 0.0.0.0/0 0.0.0.0/0 icmp type 8 0 0 all2all all -- * * 0.0.0.0/0 0.0.0.0/0 Chain fw2net (1 references) pkts bytes target prot opt in out source destination 0 0 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0 state RELATED,ESTABLISHED 0 0 ACCEPT esp -- * * 0.0.0.0/0 10.0.0.3 0 0 ACCEPT ah -- * * 0.0.0.0/0 10.0.0.3 0 0 ACCEPT udp -- * * 0.0.0.0/0 10.0.0.3 udp spt:500 dpt:500 state NEW 0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 state NEW tcp dpt:53 0 0 ACCEPT udp -- * * 0.0.0.0/0 0.0.0.0/0 state NEW udp dpt:53 5 420 ACCEPT icmp -- * * 0.0.0.0/0 0.0.0.0/0 icmp type 8 0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 state NEW tcp dpt:50 0 0 ACCEPT udp -- * * 0.0.0.0/0 0.0.0.0/0 state NEW udp dpt:50 0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 state NEW tcp dpt:51 0 0 ACCEPT udp -- * * 0.0.0.0/0 0.0.0.0/0 state NEW udp dpt:51 0 0 ACCEPT udp -- * * 0.0.0.0/0 0.0.0.0/0 state NEW udp dpt:500 0 0 all2all all -- * * 0.0.0.0/0 0.0.0.0/0 Chain icmpdef (1 references) pkts bytes target prot opt in out source destination Chain ipsec0_fwd (1 references) pkts bytes target prot opt in out source destination 0 0 dynamic all -- * * 0.0.0.0/0 0.0.0.0/0 state NEW 0 0 all2all all -- * eth0 0.0.0.0/0 0.0.0.0/0 0 0 vpn2loc all -- * eth1 0.0.0.0/0 0.0.0.0/0 Chain ipsec0_in (1 references) pkts bytes target prot opt in out source destination 0 0 dynamic all -- * * 0.0.0.0/0 0.0.0.0/0 state NEW 0 0 all2all all -- * * 0.0.0.0/0 0.0.0.0/0 Chain loc2fw (1 references) pkts bytes target prot opt in out source destination 0 0 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0 state RELATED,ESTABLISHED 0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 state NEW tcp dpt:22 0 0 ACCEPT icmp -- * * 0.0.0.0/0 0.0.0.0/0 icmp type 8 0 0 ACCEPT udp -- * * 0.0.0.0/0 0.0.0.0/0 state NEW udp dpt:53 0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 state NEW tcp dpt:80 0 0 all2all all -- * * 0.0.0.0/0 0.0.0.0/0 Chain loc2net (1 references) pkts bytes target prot opt in out source destination 0 0 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0 state RELATED,ESTABLISHED 0 0 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0 Chain loc2vpn (1 references) pkts bytes target prot opt in out source destination 0 0 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0 state RELATED,ESTABLISHED 0 0 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0 Chain net2all (3 references) pkts bytes target prot opt in out source destination 0 0 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0 state RELATED,ESTABLISHED 5 1054 common all -- * * 0.0.0.0/0 0.0.0.0/0 0 0 ULOG all -- * * 0.0.0.0/0 0.0.0.0/0 ULOG copy_range 0 nlgroup 1 prefix `Shorewall:net2all:DROP:' queue_threshold 1 0 0 DROP all -- * * 0.0.0.0/0 0.0.0.0/0 Chain net2fw (1 references) pkts bytes target prot opt in out source destination 0 0 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0 state RELATED,ESTABLISHED 0 0 ACCEPT esp -- * * 10.0.0.3 0.0.0.0/0 0 0 ACCEPT ah -- * * 10.0.0.3 0.0.0.0/0 0 0 ACCEPT udp -- * * 10.0.0.3 0.0.0.0/0 udp spt:500 dpt:500 state NEW 0 0 ACCEPT icmp -- * * 0.0.0.0/0 0.0.0.0/0 icmp type 8 0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 state NEW tcp dpt:50 0 0 ACCEPT udp -- * * 0.0.0.0/0 0.0.0.0/0 state NEW udp dpt:50 0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 state NEW tcp dpt:51 0 0 ACCEPT udp -- * * 0.0.0.0/0 0.0.0.0/0 state NEW udp dpt:51 0 0 ACCEPT udp -- * * 0.0.0.0/0 0.0.0.0/0 state NEW udp dpt:500 5 1054 net2all all -- * * 0.0.0.0/0 0.0.0.0/0 Chain reject (5 references) pkts bytes target prot opt in out source destination 0 0 DROP all -- * * 0.0.0.0/0 0.0.0.0/0 PKTTYPE = broadcast 0 0 DROP all -- * * 0.0.0.0/0 0.0.0.0/0 PKTTYPE = multicast 0 0 DROP all -- * * 10.0.0.255 0.0.0.0/0 0 0 DROP all -- * * 192.168.1.255 0.0.0.0/0 0 0 DROP all -- * * 255.255.255.255 0.0.0.0/0 0 0 DROP all -- * * 224.0.0.0/4 0.0.0.0/0 0 0 REJECT tcp -- * * 0.0.0.0/0 0.0.0.0/0 reject-with tcp-reset 0 0 REJECT udp -- * * 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable 0 0 REJECT icmp -- * * 0.0.0.0/0 0.0.0.0/0 reject-with icmp-host-unreachable 0 0 REJECT all -- * * 0.0.0.0/0 0.0.0.0/0 reject-with icmp-host-prohibited Chain shorewall (0 references) pkts bytes target prot opt in out source destination Chain vpn2loc (1 references) pkts bytes target prot opt in out source destination 0 0 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0 state RELATED,ESTABLISHED 0 0 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0 NAT Table Chain PREROUTING (policy ACCEPT 5 packets, 1054 bytes) pkts bytes target prot opt in out source destination Chain POSTROUTING (policy ACCEPT 3 packets, 252 bytes) pkts bytes target prot opt in out source destination 1 84 eth0_masq all -- * eth0 0.0.0.0/0 0.0.0.0/0 Chain OUTPUT (policy ACCEPT 3 packets, 252 bytes) pkts bytes target prot opt in out source destination Chain eth0_masq (1 references) pkts bytes target prot opt in out source destination 0 0 MASQUERADE all -- * * 192.168.1.0/24 0.0.0.0/0 Mangle Table Chain PREROUTING (policy ACCEPT 9 packets, 1390 bytes) pkts bytes target prot opt in out source destination 9 1390 pretos all -- * * 0.0.0.0/0 0.0.0.0/0 Chain INPUT (policy ACCEPT 9 packets, 1390 bytes) pkts bytes target prot opt in out source destination Chain FORWARD (policy ACCEPT 0 packets, 0 bytes) pkts bytes target prot opt in out source destination Chain OUTPUT (policy ACCEPT 9 packets, 756 bytes) pkts bytes target prot opt in out source destination 9 756 outtos all -- * * 0.0.0.0/0 0.0.0.0/0 Chain POSTROUTING (policy ACCEPT 9 packets, 756 bytes) pkts bytes target prot opt in out source destination Chain outtos (1 references) pkts bytes target prot opt in out source destination 0 0 TOS tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:22 TOS set 0x10 0 0 TOS tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp spt:22 TOS set 0x10 0 0 TOS tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:21 TOS set 0x10 0 0 TOS tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp spt:21 TOS set 0x10 0 0 TOS tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp spt:20 TOS set 0x08 0 0 TOS tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:20 TOS set 0x08 Chain pretos (1 references) pkts bytes target prot opt in out source destination 0 0 TOS tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:22 TOS set 0x10 0 0 TOS tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp spt:22 TOS set 0x10 0 0 TOS tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:21 TOS set 0x10 0 0 TOS tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp spt:21 TOS set 0x10 0 0 TOS tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp spt:20 TOS set 0x08 0 0 TOS tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:20 TOS set 0x08 Configuration Files: Here are some of my configuration files. I deleted the standard shorewall comments, but left the default items in place so that the syntax of the files are complete. <contents of interfaces> # # Shorewall 1.4 -- Interfaces File # # /etc/shorewall/interfaces # ############################################################################ ## #ZONE INTERFACE BROADCAST OPTIONS net eth0 detect loc eth1 detect vpn ipsec0 #LAST LINE -- ADD YOUR ENTRIES BEFORE THIS ONE -- DO NOT REMOVE <contents of policy> # # Shorewall 1.4 -- Policy File # # /etc/shorewall/policy # ############################################################################ ### #SOURCE DEST POLICY LOG LIMIT:BURST # LEVEL loc net ACCEPT net all DROP ULOG # If you want open access to the Internet from your Firewall # remove the comment from the following line. #fw net ACCEPT loc vpn ACCEPT vpn loc ACCEPT # # THE FOLLOWING POLICY MUST BE LAST # all all REJECT ULOG #LAST LINE -- DO NOT REMOVE <contents of tunnels> # # Shorewall 1.4 - /etc/shorewall/tunnels # # TYPE ZONE GATEWAY GATEWAY # ZONE ipsec net 10.0.0.3 #LAST LINE -- ADD YOUR ENTRIES BEFORE THIS ONE -- DO NOT REMOVE <contents of zones> # # Shorewall 1.4 /etc/shorewall/zones # #ZONE DISPLAY COMMENTS net Net Internet loc Local Local networks vpn VPN Remote Subnet #dmz DMZ Demilitarized zone #LAST LINE - ADD YOUR ENTRIES ABOVE THIS ONE - DO NOT REMOVE <contents of rules> # # Shorewall version 1.4 - Rules File # # /etc/shorewall/rules # ############################################################################ ######################## #ACTION SOURCE DEST PROTO DEST SOURCE ORIGINAL RATE USER # PORT PORT(S) DEST LIMIT # Accept DNS connections from the firewall to the network # ACCEPT fw net tcp 53 ACCEPT fw net udp 53 # Accept SSH connections from the local network for administration # ACCEPT loc fw tcp 22 # Allow Ping To And From Firewall # ACCEPT loc fw icmp 8 ACCEPT net fw icmp 8 ACCEPT fw loc icmp 8 ACCEPT fw net icmp 8 # # Bering specific rules: # allow loc to fw udp/53 for dnscache to work # allow loc to fw tcp/80 for weblet to work # ACCEPT loc fw udp 53 ACCEPT loc fw tcp 80 # # jwalters 20040604 # added rules to allow IPSec VPN # ACCEPT net fw tcp 50 ACCEPT net fw udp 50 ACCEPT net fw tcp 51 ACCEPT net fw udp 51 ACCEPT fw net tcp 50 ACCEPT fw net udp 50 ACCEPT fw net tcp 51 ACCEPT fw net udp 51 ACCEPT net fw udp 500 ACCEPT fw net udp 500 # # #LAST LINE -- ADD YOUR ENTRIES BEFORE THIS ONE -- DO NOT REMOVE <contents of ipsec.conf> # /etc/ipsec.conf - FreeS/WAN IPsec configuration file # basic configuration config setup # THIS SETTING MUST BE CORRECT or almost nothing will work; # %defaultroute is okay for most simple cases. interfaces=%defaultroute # Debug-logging controls: "none" for (almost) none, "all" for lots. klipsdebug=none plutodebug=none # Use auto= parameters in conn descriptions to control startup actions. plutoload=%search plutostart=%search # Close down old connection when new one using same ID shows up. uniqueids=yes # defaults for subsequent connection descriptions conn vpn_jim # How persistent to be in (re)keying negotiations (0 means very). keyingtries=0 # RSA authentication with keys from DNS. authby=secret left=10.0.0.4 leftsubnet=192.168.1.0/24 right=10.0.0.3 rightsubnet=192.168.0.0/24 auto=add <contents of ipsec.secrets> # This file holds shared secrets or RSA private keys for inter-Pluto # authentication. See ipsec_pluto(8) manpage, and HTML documentation. # RSA private key for this host, authenticating it to any other host # which knows the public part. Suitable public keys, for ipsec.conf, DNS, # or configuration of other implementations, can be extracted conveniently # with "ipsec showhostkey". #: RSA { # -- Create your own RSA key with "ipsec rsasigkey" # } # do not change the indenting of that "}" 10.0.0.4 %any : PSK "jwalters" : RSA { Modulus: 0xC2B434219819415BEAB6B058BFBC13B4C4B2CB04E9D7B006FCFC21954ECD4B985A0F4013DF EA48FBD0FBC23678DDD8FEABE11AAFF71B20C18F364E5A9553782405E8E0AB4557CBC204AD16 9F4019B746914A996FD60EEF49F4BDEF428A32751457AC4DABA8990617F1C9880C6C50F5649A 5A2912D0520B5C0D52D41775D4FDEC29FDD6209E0D2D0B294C7709FD484E88197FFAC0D7FBD7 2866317D7911E36AD9267EA2017694B936345AE586795B86962CF964803EC1B715BDC65CA369 28A6D9D2F76BB55DF932D45930143A49204A81817B809F4458B2D83C20FE4FE59A2C716DA04E 407C30944816B756EB308A935A0DC0819314471393869793A38B3F8285 PublicExponent: 0x010001 PrivateExponent: 0x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rime1: 0xE3A1EFE0BBB09D796D0036633DCA5C143938147B7E0D4ADBD2D8D02B251A295CC4768F80D7 330B0957483788F117685B0DE5C8A83DE18B189B4DBFEBBD12102448320100FA1B4A167875AA AE1577BEFF9ECC0935B9DD66E95C91D2185C40E7379E1581096EAD5943D72CFD51EEE7ECED0C F2A0FE9588D6C78B232CD49D2FCEA9 Prime2: 0xDAF7C220ADA79D346AB3169C6292DAB0B93302992D07F86360425FA9399C9B7E4178578AFF C77F12BB72B14782C1580FD96F0B51DDFFB85C962EE00076A1E86215D16E293D9D7DC79C9FBA 4956187DE36490A49D2202E9982D4FE089E3EE4EFADF666DD84D6415EA339CD4238250FB83C9 723FD1ED7F62917496F40E244D0A7D Exponent1: 0xC38F48D4EA8A660F7E8C732D3955935BB078B4680FB7FDBAF2DE5FA0E164236AD642013130 3062E7E87B5B72A3A5777ADA6AB1C3903E2750C183BF411892DF193C88F101D4DD02FE6108BD D4870EF421095CC300CC282094957995646645401F3109CA6CBF0FE0237F45E06FB66EBBC63F 9C66A1B0F7F9853ECCBE63FE92A6D9 Exponent2: 0xBE820ED115A51E1E2BB312BA0EFD4BEDB3C3D0BFEA30E407BA0925677B2B6911A8EE85E3F6 73E07830C431BF50E0DCB83569EA8458CC92DF62FEF77F0FB80011CE7FBF037C8B1892E20F0A 29A2117EFDA7523D16453019827FF1DE1EBA436D4DD1AE31659EB7B46566704D1573DCF7670A 8E2F3E7B0E7878AAE2670622C93095 Coefficient: 0x6AA715CAB57C177DBEC27A24C826BB36F2D2A5B32DE68FEEFDD1C44CF7DACD9FFDB6AC374A D2BA796208DDA16F07937480DE4934838E623B29356009476F463AE25A6DEDEA560D63B8DDA6 3BAA7A643E4E2A9027C4AB94B6815A0412649F5CA75059A57C729FEA7D2339249210B218B9AB 76EC39DA14CE4D9D45799F048FE2E9 } ------------------------------------------------------- This SF.Net email is sponsored by the new InstallShield X. >From Windows to Linux, servers to mobile, InstallShield X is the one installation-authoring solution that does it all. Learn more and evaluate today! http://www.installshield.com/Dev2Dev/0504 ------------------------------------------------------------------------ leaf-user mailing list: [EMAIL PROTECTED] https://lists.sourceforge.net/lists/listinfo/leaf-user SR FAQ: http://leaf-project.org/pub/doc/docmanager/docid_1891.html