Re: ssh tunnels or openvpn/IPsec?

2015-05-11 Thread Johann Spies
Thanks to everybody who contributed to this thread.  It is valuable.

Regards.
Johann


Re: ssh tunnels or openvpn/IPsec?

2015-05-10 Thread Joel Wirāmu Pauling
Normally for ssh tunnels I use -D

which creates a local socks tunnel listener (i.e -D1080) and means you can
do away with manual port forwards, you can then use a sockswrapper
(tsocks/dsocks) pointing at localhost to transparently proxify most
applications. Note that for UDP based things neither -L or -D works (you
have to use ssh's VPN mode for that). Since remote syslog is UDP by default
this means ssh isn't a great option (you can tunnel it via nc etc but...
anoying to setup).



On 10 May 2015 at 16:15, Joel Wirāmu Pauling j...@aenertia.net wrote:

 Also consider tincd

 On 10 May 2015 at 04:51, Bonno Bloksma b.blok...@tio.nl wrote:

 Hello Peter


  Petter Adsen wrote:
   Now the question becomes; AFAIK, I could do this with ssh tunnels
   and forward the ports on my router/firewall, or I could use
   something like openvpn or IPsec (strongswan).
 
  Yes.  Exactly.
 
  Also 'stunnel4' is useful too.
 
  Thanks, I didn't know about that one.
 
  []
 
  Thank you for your insight, that was very informative. From what I
  gather from this, it might be just as well to go straight to openvpn.
 
  Let me explain. Already I need rsyslog, munin, and collectd. That would
  require three separate ssh/ssl tunnels. However, if I set up openvpn on
  the router I will just need the one tunnel, and I can set up remote
  access to my home network at the same time, with the same bits and
 pieces.

 [...]

  One thing I forgot to ask, though: how intensive is openvpn on
 resources,
  especially CPU and memory? I was initially thinking of setting it up on
 the
  router, but I am a little worried that it might be too much for it to
 handle.
  Would it be feasible/better to set it up on a more powerful machine on
 the
  inside and forward the traffic?

 Lots of people set up open vpn on the router if the router is capable of
 it. In your case the amount of traffic is definitely something a regular
 router should be able to handle. The most cpu is used when openvpn
 (re)negotiates a session key which is does by default every hour.
 If you find out you need more power simply create a rule on your router
 to forward udp 1194 to an inside machine and have openvpn running there.

 It is very easy to setup, for ssl keys there is a separate set of scripts
 called easy-rsa that will let you create the keys with the proper settings
 in no-time.

 If you want information more about openvpn use the openvpn users list (
 openvpn-us...@lists.sourceforge.net)
 There is a commercial version too which has commercial support but you
 want the community version which comes with Debian.

 Bonno Bloksma


 --
 To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org
 with a subject of unsubscribe. Trouble? Contact
 listmas...@lists.debian.org
 Archive:
 https://lists.debian.org/89d1798a7351d040b4e74e0a043c69d7d72e1...@hglexch-01.tio.nl





Re: ssh tunnels or openvpn/IPsec?

2015-05-10 Thread Petter Adsen
On Sat, 9 May 2015 18:49:27 -0600
Bob Proulx b...@proulx.com wrote:

 Petter Adsen wrote:
  Now the question becomes; AFAIK, I could do this with ssh tunnels
  and forward the ports on my router/firewall, or I could use
  something like openvpn or IPsec (strongswan).
 
 Yes.  Exactly.
 
 Also 'stunnel4' is useful too.

Thanks, I didn't know about that one.

 I would avoid IPsec.  Last I looked there were more than 55 RFCs that
 had some impact on IPsec.  It has traditionally been rather of a messy
 thing.

Urgh, that sounds painful. I think I will steer clear of that, then.
That would also explain why there is so little info on it on both the
Debian and the Arch wikis.

  The problem is that I haven't really messed with any of these before
  - what would be the best choice in this situation?
 
  Note that I'm not asking for a complete configuration, all I want is
  some advice as to which of these technologies I should begin to
  read up on. The IPsec article on the Debian wiki is from Sarge, so
  it is quite outdated, but the openvpn article is recent and seems
  helpful.
  
  Any insights/advice/links, etc?
 
 Using ssh tunnels will get you 80% with 20% of the work.  Using
 OpenVPN will get you 100% with 100% of the work.  Using 'autossh' to
 manage ssh tunnels is very reliable to run and very quick and easy to
 set up.
 
 I use all of autossh/ssh tunnels, stunnel4, openvpn in different
 places.  I tend to like and use the autossh/ssh tunnels because they
 are quick and easy and work well enough that I can move along to
 something else without spending a lifetime managing them.  It doesn't
 require any routing table modifications.

Not requiring explicit routing is a bonus, but not really a
dealbreaker for me. Besides, I am sure the Debian wiki will give me
enough hints to get it right.

 I like stunnel4 for some things because it also is very easy to set up
 and very reliable.  Either ssh or stunnel would seem to be good simple
 effective choices for remote sysloging.  I might lean toward stunnel
 for this.  It all depends.  Using stunnel benefits if you have signed
 https ssl certificates already that can be verified by stunnel.

I don't already have certificates, so I would need to generate some. As
I already have a little experience with ssh and keys, it would probably
be a wiser choice.

 Both ssh and stunnel use TCP which means that in terms of ultimate
 performance and ultimate efficiency you are ending up with TCP over
 TCP and that isn't perfect.  TCP over TCP will use some resources and
 time transporting packets somewhat inefficiently.  I think for your
 example of using remote syslog logging I wouldn't worry about it.  It
 is a non-interactive task and the machines won't care when talking to
 each other.  No one will ever notice the inefficiency.
 
 When operating interactively such as working from my laptop to my
 remote servers I am usually interactive.  That is when transport
 artifacts of latency become noticeable and annoying.  There I have put
 in the extra work to set up openvpn for the 100% solution.  It uses
 UDP for the transport avoiding the TCP over TCP issues.  It is more
 work to set up initially due to dealing with setting up ssl
 certificates and routing.  But having set it up it is a high
 performance solution that does 100% of the job.
 
 I would probably start your remote syslog task using autossh/ssh and
 then worry about doing something more when the need for more arises
 and not before.

Thank you for your insight, that was very informative. From what I
gather from this, it might be just as well to go straight to openvpn.
Let me explain. Already I need rsyslog, munin, and collectd. That would
require three separate ssh/ssl tunnels. However, if I set up openvpn on
the router I will just need the one tunnel, and I can set up remote
access to my home network at the same time, with the same bits and
pieces.

Actually, I won't even need to set up anything special to reach my home
network, as I would be able to reach it from the VPS - which already
has ssh open. The need to reach my home network is already here, as I
don't really have a good way of doing it currently.

One thing I forgot to ask, though: how intensive is openvpn on
resources, especially CPU and memory? I was initially thinking of
setting it up on the router, but I am a little worried that it might be
too much for it to handle. Would it be feasible/better to set it up on
a more powerful machine on the inside and forward the traffic?

And again - thanks, Bob.

Petter

-- 
I'm ionized
Are you sure?
I'm positive.


pgpqAhmga5tlg.pgp
Description: OpenPGP digital signature


Re: ssh tunnels or openvpn/IPsec?

2015-05-10 Thread Pascal Hambourg
Bob Proulx a écrit :
 
 Both ssh and stunnel use TCP which means that in terms of ultimate
 performance and ultimate efficiency you are ending up with TCP over
 TCP and that isn't perfect.

SSH local or remote port forwarding (-L/-R) does stream forwarding ;  it
is not a layer-3 tunnel (-w), so does not have the disadvantages of TCP
over TCP.


-- 
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org 
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/554f220d.3050...@plouf.fr.eu.org



RE: ssh tunnels or openvpn/IPsec?

2015-05-10 Thread Bonno Bloksma
Hello Peter


 Petter Adsen wrote:
  Now the question becomes; AFAIK, I could do this with ssh tunnels 
  and forward the ports on my router/firewall, or I could use 
  something like openvpn or IPsec (strongswan).
 
 Yes.  Exactly.
 
 Also 'stunnel4' is useful too.

 Thanks, I didn't know about that one.

 []

 Thank you for your insight, that was very informative. From what I
 gather from this, it might be just as well to go straight to openvpn.

 Let me explain. Already I need rsyslog, munin, and collectd. That would
 require three separate ssh/ssl tunnels. However, if I set up openvpn on
 the router I will just need the one tunnel, and I can set up remote
 access to my home network at the same time, with the same bits and pieces.

[...]

 One thing I forgot to ask, though: how intensive is openvpn on resources,
 especially CPU and memory? I was initially thinking of setting it up on the
 router, but I am a little worried that it might be too much for it to handle.
 Would it be feasible/better to set it up on a more powerful machine on the
 inside and forward the traffic?

Lots of people set up open vpn on the router if the router is capable of it. In 
your case the amount of traffic is definitely something a regular router should 
be able to handle. The most cpu is used when openvpn (re)negotiates a session 
key which is does by default every hour.
If you find out you need more power simply create a rule on your router to 
forward udp 1194 to an inside machine and have openvpn running there.

It is very easy to setup, for ssl keys there is a separate set of scripts 
called easy-rsa that will let you create the keys with the proper settings in 
no-time.

If you want information more about openvpn use the openvpn users list 
(openvpn-us...@lists.sourceforge.net)
There is a commercial version too which has commercial support but you want the 
community version which comes with Debian.

Bonno Bloksma


--
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
https://lists.debian.org/89d1798a7351d040b4e74e0a043c69d7d72e1...@hglexch-01.tio.nl



Re: ssh tunnels or openvpn/IPsec?

2015-05-10 Thread Joel Wirāmu Pauling
Also consider tincd

On 10 May 2015 at 04:51, Bonno Bloksma b.blok...@tio.nl wrote:

 Hello Peter


  Petter Adsen wrote:
   Now the question becomes; AFAIK, I could do this with ssh tunnels
   and forward the ports on my router/firewall, or I could use
   something like openvpn or IPsec (strongswan).
 
  Yes.  Exactly.
 
  Also 'stunnel4' is useful too.
 
  Thanks, I didn't know about that one.
 
  []
 
  Thank you for your insight, that was very informative. From what I
  gather from this, it might be just as well to go straight to openvpn.
 
  Let me explain. Already I need rsyslog, munin, and collectd. That would
  require three separate ssh/ssl tunnels. However, if I set up openvpn on
  the router I will just need the one tunnel, and I can set up remote
  access to my home network at the same time, with the same bits and
 pieces.

 [...]

  One thing I forgot to ask, though: how intensive is openvpn on resources,
  especially CPU and memory? I was initially thinking of setting it up on
 the
  router, but I am a little worried that it might be too much for it to
 handle.
  Would it be feasible/better to set it up on a more powerful machine on
 the
  inside and forward the traffic?

 Lots of people set up open vpn on the router if the router is capable of
 it. In your case the amount of traffic is definitely something a regular
 router should be able to handle. The most cpu is used when openvpn
 (re)negotiates a session key which is does by default every hour.
 If you find out you need more power simply create a rule on your router to
 forward udp 1194 to an inside machine and have openvpn running there.

 It is very easy to setup, for ssl keys there is a separate set of scripts
 called easy-rsa that will let you create the keys with the proper settings
 in no-time.

 If you want information more about openvpn use the openvpn users list (
 openvpn-us...@lists.sourceforge.net)
 There is a commercial version too which has commercial support but you
 want the community version which comes with Debian.

 Bonno Bloksma


 --
 To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org
 with a subject of unsubscribe. Trouble? Contact
 listmas...@lists.debian.org
 Archive:
 https://lists.debian.org/89d1798a7351d040b4e74e0a043c69d7d72e1...@hglexch-01.tio.nl




Re: ssh tunnels or openvpn/IPsec?

2015-05-09 Thread Bob Proulx
Petter Adsen wrote:
 Now the question becomes; AFAIK, I could do this with ssh tunnels and
 forward the ports on my router/firewall, or I could use something like
 openvpn or IPsec (strongswan).

Yes.  Exactly.

Also 'stunnel4' is useful too.

I would avoid IPsec.  Last I looked there were more than 55 RFCs that
had some impact on IPsec.  It has traditionally been rather of a messy
thing.

 The problem is that I haven't really messed with any of these before
 - what would be the best choice in this situation?

 Note that I'm not asking for a complete configuration, all I want is
 some advice as to which of these technologies I should begin to read up
 on. The IPsec article on the Debian wiki is from Sarge, so it is quite
 outdated, but the openvpn article is recent and seems helpful.
 
 Any insights/advice/links, etc?

Using ssh tunnels will get you 80% with 20% of the work.  Using
OpenVPN will get you 100% with 100% of the work.  Using 'autossh' to
manage ssh tunnels is very reliable to run and very quick and easy to
set up.

I use all of autossh/ssh tunnels, stunnel4, openvpn in different
places.  I tend to like and use the autossh/ssh tunnels because they
are quick and easy and work well enough that I can move along to
something else without spending a lifetime managing them.  It doesn't
require any routing table modifications.

I like stunnel4 for some things because it also is very easy to set up
and very reliable.  Either ssh or stunnel would seem to be good simple
effective choices for remote sysloging.  I might lean toward stunnel
for this.  It all depends.  Using stunnel benefits if you have signed
https ssl certificates already that can be verified by stunnel.

Both ssh and stunnel use TCP which means that in terms of ultimate
performance and ultimate efficiency you are ending up with TCP over
TCP and that isn't perfect.  TCP over TCP will use some resources and
time transporting packets somewhat inefficiently.  I think for your
example of using remote syslog logging I wouldn't worry about it.  It
is a non-interactive task and the machines won't care when talking to
each other.  No one will ever notice the inefficiency.

When operating interactively such as working from my laptop to my
remote servers I am usually interactive.  That is when transport
artifacts of latency become noticeable and annoying.  There I have put
in the extra work to set up openvpn for the 100% solution.  It uses
UDP for the transport avoiding the TCP over TCP issues.  It is more
work to set up initially due to dealing with setting up ssl
certificates and routing.  But having set it up it is a high
performance solution that does 100% of the job.

I would probably start your remote syslog task using autossh/ssh and
then worry about doing something more when the need for more arises
and not before.

Bob


signature.asc
Description: Digital signature


ssh tunnels or openvpn/IPsec?

2015-05-09 Thread Petter Adsen
I have a VPS running Jessie, and would like to set up rsyslog to
forward log messages to another Jessie box at home. At the same time, I
want to set up a munin node and collectd also on the VPS, and grab data
from those.

Now the question becomes; AFAIK, I could do this with ssh tunnels and
forward the ports on my router/firewall, or I could use something like
openvpn or IPsec (strongswan). The problem is that I haven't really
messed with any of these before - what would be the best choice in this
situation?

Note that I'm not asking for a complete configuration, all I want is
some advice as to which of these technologies I should begin to read up
on. The IPsec article on the Debian wiki is from Sarge, so it is quite
outdated, but the openvpn article is recent and seems helpful.

Any insights/advice/links, etc?

Petter

-- 
I'm ionized
Are you sure?
I'm positive.


pgpdTRx_JqQ6t.pgp
Description: OpenPGP digital signature