On Fri, 26 Apr 2013, Axel Rau wrote:

Am 24.04.2013 um 04:54 schrieb David Lang <[email protected]>:

On Tue, 23 Apr 2013, Axel Rau wrote:

Why do you say this? I've managed hundreds of multi-homed firewalls (some with 
as many as 20 physical interfaces) and have never found that I needed to set 
the source IP.
Unless you have multiple interfaces to the same network, there is no ambiguity, 
the system will always use the same interface (and will use the main IP on that 
interface for outbound messages when you have multiple IPs on one interface)
If you have an IPsec VPN, terminated on an OpenBSD firewall, and want to log
firewall activity to a log host, reached through the VPN, you will see the 
sending socket of your syslogd binding to the interface, pointing at your 
default route (which carries the encapsulated VPN traffic).
actually, you should not need to do this.
It seems to be an OpenBSD quirk.
Just make sure you start rsyslog after the VPN is up and when it establishes 
the connection, it will get routed over the VPN and will auto-select the 
correct source IP.
Which one? enc0 has no ip, so it selects the parent interface.
I suspect that what's happening is that you are starting rsyslog before the 
VPN, so it's getting the TCP connection established over the Internet before 
your routing changes.
I would be happy to agree, but no, it binds to the external interface, even if 
IPSEC tunnel is up.

what do your routes look like with the tunnel up?

OpenBSD IPsec VPN has no routes but flows, maintained by kernel on tunnel up/down. netstat -rnfencap shows the flows like ipsecctl -s all here
        http://www.kernel-panic.it/openbsd/vpn/vpn3.html

If you really have to set the source IP manually for rsyslog, then you would 
need to do the same thing for your browser, for ssh, and every other program 
that you want to have go through the VPN. I just don't see that as a reasonable 
requirement to make things work with the VPN

We are talking about traffic initiated by the firewall itself, not 
route-through traffic.
From those only 2 applications connect through the vpn tunnel: syslog and the 
network backup client.

So you are saying that if you start a VPN, you then cannot ssh to something through the VPN without explicitly configuring SSH to use a specific source IP?

this doesn't sound like a sane VPN configuration to me. If you have to modify every app that will talk through the VPN, and expicitly configure the app to use the VPN, that VPN is pretty worthless.

David Lang
_______________________________________________
rsyslog mailing list
http://lists.adiscon.net/mailman/listinfo/rsyslog
http://www.rsyslog.com/professional-services/
What's up with rsyslog? Follow https://twitter.com/rgerhards
NOTE WELL: This is a PUBLIC mailing list, posts are ARCHIVED by a myriad of 
sites beyond our control. PLEASE UNSUBSCRIBE and DO NOT POST if you DON'T LIKE 
THAT.

Reply via email to