Re: Experience with isakmpd/ipsec in production?

2006-10-05 Thread Toni Mueller
Hi,

On Mon, 21.08.2006 at 10:23:43 -0400, Melameth, Daniel D. [EMAIL PROTECTED] 
wrote:
 We have since changed how we're doing this, but we had a Cisco and
 OpenBSD VPN running for a few years.

why, and how did you change? What's better now?


Best,
--Toni++



Re: Experience with isakmpd/ipsec in production?

2006-10-05 Thread Toni Mueller
Hi,

On Mon, 21.08.2006 at 15:43:14 +0200, Sven Ingebrigt Ulland [EMAIL PROTECTED] 
wrote:
 How long have you been running openbsd isakmpd/ipsec (in production)?

I think I run this stuff since around 2000, or 2001 at the latest.

 What problems, if any, have you had with the openbsd vpn
 implementations? Which of them are the most recurring? How do you
 usually fix them?

There were some compatibility issues in earlier releases which were
fixed quite fast (MANY thanks!).

We had a few cases where isakmpd went down, but decided early to fix
these by using process supervisors (also years ago, I don't know if
these problems are still there). We use almost all easy features
isakmpd has.

Otherwise, I can't remember a problem.

 Have you experienced any interoperability problems when establishing
 tunnels with peers that run other implementations (cisco, checkpoint,
 etc)? And if so, how do you work around those?

My experience is that most other devices I encountered so far are much
less flexible and powerful than is OpenBSD. So, interoperating often
means finding out what the other side can't, and then take the best out
of what remains.

I can only say that OpenBSD is very much recommended for serious IPSEC
usage.


Best,
--Toni++



Re: Experience with isakmpd/ipsec in production?

2006-10-05 Thread Sven Ulland

Sven Ingebrigt Ulland wrote:

[...]


Thanks to all of you who have contributed with your
experiences with isakmpd/ipsec in OpenBSD. After some time
now, I've seen some more of the good and bad sides of our
VPN setup, and I'll share it with you.


How long have you been running openbsd isakmpd/ipsec (in production)?


It's been running for over a year now, and it's been very
stable.


What problems, if any, have you had with the openbsd vpn
implementations? Which of them are the most recurring? How do you
usually fix them?


There are a few issues that I've seen with the
implementation, or more aptly, my lack of detailed knowledge
of the IPSec specs:

1) isakmpd isn't easily debuggable. When some error occurs,
or when something expected does not occur, it is hard to
know what debug level to increase in isakmpd. Of course, it
would help a great deal to have detailed knowledge of the
IPSec specs here, but I haven't found the time to get to
know them very well. In that respect, I find the man page
for isakmpd to be somewhat lacking.

Not knowing how to debug properly leads to problems
determining on which side the error is located, or if the
fault is in an intermediate network. This can lead to a
blame game with the other side, which doesn't do anyone much
good. About that, I'm interested in hearing of good tips on
debugging stuff like this. I use the normal tools like ping,
{tcp,udp,icmp} traceroute, hping, tcpdump filtering on udp
port 500 || proto 50 and isakmpd logging, but still fall
short of determining the exact cause most of the time. Maybe
I'm using the tools the wrong way.

2) A common problem is that we simply stop seeing data from
one or more peers. (Our endpoint is set up as a slave for
all the connections, so it is our peers that initiate
connections.) What we usually do then, is to dump packets on
the network interface to determine whether the peer is
completely dead or if it's hung.

3) On some occations, the peer is hung up somehow, and keeps
trying to send us an invalid SPI. Our IPSec rejects those,
but it keeps sending them. What we then do is to stop
isakmpd and then start it again. For some reason, this fixes
the problem. We haven't dumped the traffic while restarting
isakmpd yet, but it probably sends some seize and desist
signal to all the peers. I'm wondering if it's possible to
send this signal to just one peer.. that would keep the
other tunnels alive.


Have you experienced any interoperability problems when establishing
tunnels with peers that run other implementations (cisco, checkpoint,
etc)? And if so, how do you work around those?


Our peers mostly run cisco or checkpoint equipment. In the
isakmpd logs we see a *lot* of the following messages:

dropped message from 172.29.9.43 port 500 due to notification type 
PAYLOAD_MALFORMED

dropped message from 172.29.9.43 port 500 due to notification type 
INVALID_PAYLOAD_TYPE

message_parse_payloads: invalid next payload type Unknown 111 in payload of type 
8
(the number 111 varies from ~25 to ~125)

message_parse_payloads: reserved field non-zero: 17
(the number varies from 0x00 to 0xff).

Having a look through the IPSec specs (33 RFCs! Damn, where
to start?) would probably explain some of this behaviour.
I'm guessing the proprietary boxes use some in-house
extensions. Tips are greatly welcome!

regards,
Sven U



Re: Experience with isakmpd/ipsec in production?

2006-10-05 Thread Trombley
On Thu, Oct 05, 2006 at 09:59:27PM +0200, Sven Ulland wrote:
 Sven Ingebrigt Ulland wrote:
 [...]
 
 Thanks to all of you who have contributed with your
 experiences with isakmpd/ipsec in OpenBSD. After some time
 now, I've seen some more of the good and bad sides of our
 VPN setup, and I'll share it with you.
 
 How long have you been running openbsd isakmpd/ipsec (in production)?
 
 It's been running for over a year now, and it's been very
 stable.
 
 What problems, if any, have you had with the openbsd vpn
 implementations? Which of them are the most recurring? How do you
 usually fix them?
 
 There are a few issues that I've seen with the
 implementation, or more aptly, my lack of detailed knowledge
 of the IPSec specs:
 
 1) isakmpd isn't easily debuggable. When some error occurs,
 or when something expected does not occur, it is hard to
 know what debug level to increase in isakmpd. Of course, it
 would help a great deal to have detailed knowledge of the
 IPSec specs here, but I haven't found the time to get to
 know them very well. In that respect, I find the man page
 for isakmpd to be somewhat lacking.
 
 Not knowing how to debug properly leads to problems
 determining on which side the error is located, or if the
 fault is in an intermediate network. This can lead to a
 blame game with the other side, which doesn't do anyone much
 good. About that, I'm interested in hearing of good tips on
 debugging stuff like this. I use the normal tools like ping,
 {tcp,udp,icmp} traceroute, hping, tcpdump filtering on udp
 port 500 || proto 50 and isakmpd logging, but still fall
 short of determining the exact cause most of the time. Maybe
 I'm using the tools the wrong way.
 
 2) A common problem is that we simply stop seeing data from
 one or more peers. (Our endpoint is set up as a slave for
 all the connections, so it is our peers that initiate
 connections.) What we usually do then, is to dump packets on
 the network interface to determine whether the peer is
 completely dead or if it's hung.
 
 3) On some occations, the peer is hung up somehow, and keeps
 trying to send us an invalid SPI. Our IPSec rejects those,
 but it keeps sending them. What we then do is to stop
 isakmpd and then start it again. For some reason, this fixes
 the problem. We haven't dumped the traffic while restarting
 isakmpd yet, but it probably sends some seize and desist
 signal to all the peers. I'm wondering if it's possible to
 send this signal to just one peer.. that would keep the
 other tunnels alive.
 
 Have you experienced any interoperability problems when establishing
 tunnels with peers that run other implementations (cisco, checkpoint,
 etc)? And if so, how do you work around those?
 
 Our peers mostly run cisco or checkpoint equipment. In the
 isakmpd logs we see a *lot* of the following messages:
 
 dropped message from 172.29.9.43 port 500 due to notification type 
 PAYLOAD_MALFORMED
 
 dropped message from 172.29.9.43 port 500 due to notification type 
 INVALID_PAYLOAD_TYPE
 
 message_parse_payloads: invalid next payload type Unknown 111 in payload 
 of type 8
 (the number 111 varies from ~25 to ~125)
 
 message_parse_payloads: reserved field non-zero: 17
 (the number varies from 0x00 to 0xff).
 
 Having a look through the IPSec specs (33 RFCs! Damn, where
 to start?) would probably explain some of this behaviour.
 I'm guessing the proprietary boxes use some in-house
 extensions. Tips are greatly welcome!

I found the references to the isakmpd.fifo mentioned in 
/usr/src/sbin/isakmpd/DESIGN-NOTES useful for tearing down
specific tunnels. The part I found useful was about 57% through
the file under User control.

Hope this helps with your situation.



Re: Experience with isakmpd/ipsec in production?

2006-08-22 Thread Massimo Lusetti
On Mon, 2006-08-21 at 15:43 +0200, Sven Ingebrigt Ulland wrote:


 How long have you been running openbsd isakmpd/ipsec (in production)?

We've been using them since 3.9 and got small quirks mostly due to our
misunderstanding of protocols and implementations, a little also due to
the initial lack of openbsd-standard-level documentation :)
Any issue was resolved with a small search on code or mailing list
archive or as a last resource asking directly to [EMAIL PROTECTED]
Now we got a 10 node VPN lan based totally on -current as of mid of
August with more the 70 tunnels in it. I will add 8 more peers during
September.
So far very happy with reliability and maintenance facility.

A small side note, I'm waiting the 'fix' for totally take advantage of
Via C3/C7 crypto features and hope they will be in for 4.0 or just a
little after :) even if my users are very happy with the current
performance.

Regards
-- 
Massimo.run();



Re: Experience with isakmpd/ipsec in production?

2006-08-22 Thread Andreas Bihlmaier
On Tue, Aug 22, 2006 at 04:10:22PM +0200, Massimo Lusetti wrote:
 On Mon, 2006-08-21 at 15:43 +0200, Sven Ingebrigt Ulland wrote:

snip

I'm making heavy usage of VPN to mount NFS over (so there are huge
amounts of traffic going over the tunnel at maximum speed the CPUs can
handle) and IPSEC itself works very reliable (at least compared to
openvpn, which I never had real luck with).

The only issue, which remains:
I have to reboot ALL clients, which have an active NFS mount after the
server went down. But that has nothing to do with IPSEC, thus I shut up
about it at this point.

 A small side note, I'm waiting the 'fix' for totally take advantage of
 Via C3/C7 crypto features and hope they will be in for 4.0 or just a
 little after :) even if my users are very happy with the current
 performance.

Is there development going on with the VIA issue?
Would be great I'm eager for near-line-speed (100mbit) @25W :)

Regards,
ahb



Experience with isakmpd/ipsec in production?

2006-08-21 Thread Sven Ingebrigt Ulland
We are about to deploy some fairly critical VPN functionality in our
network, and for that purpose we're considering using OpenBSD with
isakmp/ipsec. We've had a test setup running for some time now with
no problems, but I'm interested in hearing about your long-term
experiences with running openbsd ipsec/isakmpd in critical production
environments. My excuses for the survey-ish feeling of this post.

How long have you been running openbsd isakmpd/ipsec (in production)?

What problems, if any, have you had with the openbsd vpn
implementations? Which of them are the most recurring? How do you
usually fix them?

Have you experienced any interoperability problems when establishing
tunnels with peers that run other implementations (cisco, checkpoint,
etc)? And if so, how do you work around those?

On the outside, it seems to me that the vpn implementation in openbsd
is good and stable, which could also stem from the corporate funding
it received. And the relevant files in cvs seem to be changed rather
infrequently.. also a good sign. But I'm not familiar with the inside,
which is what i was hoping you could help out with.

regards,
Sven U



Re: Experience with isakmpd/ipsec in production?

2006-08-21 Thread Melameth, Daniel D.
Sven Ingebrigt Ulland wrote:
 We are about to deploy some fairly critical VPN functionality in our
 network, and for that purpose we're considering using OpenBSD with
 isakmp/ipsec. We've had a test setup running for some time now with
 no problems, but I'm interested in hearing about your long-term
 experiences with running openbsd ipsec/isakmpd in critical production
 environments. My excuses for the survey-ish feeling of this post.
 
 How long have you been running openbsd isakmpd/ipsec (in production)?

We have since changed how we're doing this, but we had a Cisco and
OpenBSD VPN running for a few years.

 What problems, if any, have you had with the openbsd vpn
 implementations? Which of them are the most recurring? How do you
 usually fix them?

We had zero problems--with the exception of a couple rare MTU issues
and, while probably not the ideal resolution, fixing the MTU on the
affected hosts resolved these.

 Have you experienced any interoperability problems when establishing
 tunnels with peers that run other implementations (cisco, checkpoint,
 etc)? And if so, how do you work around those?

None--after finding the correct initial configuration everything just
worked and continued to.



Re: Experience with isakmpd/ipsec in production?

2006-08-21 Thread Will H. Backman

Have you experienced any interoperability problems when establishing
tunnels with peers that run other implementations (cisco, checkpoint,
etc)? And if so, how do you work around those?



None--after finding the correct initial configuration everything just
worked and continued to.

  
One example of our finding the correct initial configuration when 
connecting OpenBSD VPN to a SonicWall VPN.

http://cisx1.uma.maine.edu/~wbackman/vpn/
Things are a lot more simple now, thanks to ipsecctl.



Re: Experience with isakmpd/ipsec in production?

2006-08-21 Thread Dag Richards

Sven Ingebrigt Ulland wrote:

We are about to deploy some fairly critical VPN functionality in our
network, and for that purpose we're considering using OpenBSD with
isakmp/ipsec. We've had a test setup running for some time now with
no problems, but I'm interested in hearing about your long-term
experiences with running openbsd ipsec/isakmpd in critical production
environments. My excuses for the survey-ish feeling of this post.

How long have you been running openbsd isakmpd/ipsec (in production)?

What problems, if any, have you had with the openbsd vpn
implementations? Which of them are the most recurring? How do you
usually fix them?

Have you experienced any interoperability problems when establishing
tunnels with peers that run other implementations (cisco, checkpoint,
etc)? And if so, how do you work around those?

On the outside, it seems to me that the vpn implementation in openbsd
is good and stable, which could also stem from the corporate funding
it received. And the relevant files in cvs seem to be changed rather
infrequently.. also a good sign. But I'm not familiar with the inside,
which is what i was hoping you could help out with.

regards,
Sven U

We have been running vpn's here for over a year using isakmpd on OBSD 
beginning with 3.7.  We have currently a mix of 3.7 3.8 and 3.9, on 
SPARC and AMD, all on SUN hardware.


We use it to connect medical system at two county jails to our hospital 
data center.  We also use it to connect pharmacists and radiologists to 
our systems for after hours service.  So an entire county medical 
infrastructure would be unable to issue meds or read x-rays after hours 
if our vpn tunnels were down.


We have found OBSD to be very reliable. We have a single 'hang' that 
could not be resolved by HUP-ing isakmpd,  so we simply failed over to 
the sasync secondary system.  Otherwise once these puppies go up ... 
they pretty much just work and work and work.


Interop with Checkpoint has been dead simple, with Cisco less so.
I have found that when tunneling to something the other side has called 
Cisco VPN concentrators, things go more smoothly if you use 3DES and 
MD5.  Seems that if you try to use SHA that we never seem to get past a 
phase one state.


One thing about OBSD you will find to be truly bizarre is that things 
work as documented AND the man pages are concise and useful AND all 
features and config files are documented.


I used to manage a small herd of Checkpoints and Netscreens, I have 
never looked back.




Re: Experience with isakmpd/ipsec in production?

2006-08-21 Thread James Mackinnon
We have been using OBSD VPN tunnels for a while now, since 3.5

We still have a handful of 3.5 systems running and have no issues.

We have approx 35 locations running all the time and the tunnels just
work.

We also have them connecting to our datacenter which, unfortunally we
have not had time yet to get of checkpoint NG. 

They connect and have zero issues, unless we apply an update to
checkpoint and then we have to re-hup isakmpd or wait until the tunnels
neg themselves. Usually, we just run a script remotely to do the re-hup
for us from a trusted environment and it saves us a lot of time. We only
update checkpoint after hours, but doing anything on OBSD is 100%
perfect.

We are replacing Checkpoint to 3.9 using 2 redundant systems this
month.. the back side of our network (datacenter) is gigabit and OBSD is
working great for us.

Let me say, checkpoint is toast for us, we are huge fans of OBSD
isakmpd. Just hoping that SASYNC re-neg on failback works better in the
next release of OBSD, but let me say, that is zero impact on our go
forward, I love what the OBSD community has put together.  Great OS


James

-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf
Of Sven Ingebrigt Ulland
Sent: Monday, August 21, 2006 10:43 AM
To: misc@openbsd.org
Subject: Experience with isakmpd/ipsec in production?

We are about to deploy some fairly critical VPN functionality in our
network, and for that purpose we're considering using OpenBSD with
isakmp/ipsec. We've had a test setup running for some time now with
no problems, but I'm interested in hearing about your long-term
experiences with running openbsd ipsec/isakmpd in critical production
environments. My excuses for the survey-ish feeling of this post.

How long have you been running openbsd isakmpd/ipsec (in production)?

What problems, if any, have you had with the openbsd vpn
implementations? Which of them are the most recurring? How do you
usually fix them?

Have you experienced any interoperability problems when establishing
tunnels with peers that run other implementations (cisco, checkpoint,
etc)? And if so, how do you work around those?

On the outside, it seems to me that the vpn implementation in openbsd
is good and stable, which could also stem from the corporate funding
it received. And the relevant files in cvs seem to be changed rather
infrequently.. also a good sign. But I'm not familiar with the inside,
which is what i was hoping you could help out with.

regards,
Sven U