Re: Source Interface for outgoing connections

2007-02-27 Thread Samuel Moñux

2007/2/26, Darren Spruell [EMAIL PROTECTED]:

On 2/26/07, Samuel Moqux [EMAIL PROTECTED] wrote:
 I'm having some issues with an ipsec connection with vpnc (isakmp is
 not an option, since does not support xauth, and I don't control the
 other end) from an OpenBSD firewall/router to a Cisco device.

 I think problems could be natt related so I would like to eliminate
 nat from the equation, but the problem is that the outside interface
 is a private address. This firewall routes between a DMZ (public /29),
 a LAN segment (private /24), and the outside (private /30).


 -- LAN --- OpenBSD -- 10.90.0.0/30 --- Outside Router --

INET

   |
   |
   DMZ (public /29)

 Right now, I need to NAT on the Outside Router, since internet routed
 packets from the OpenBSD box go out with a private address.

 What I would like to achieve is that packets destined to internet get
 sourced with DMZ's interface, which is internet routable, and without
 pf tricks(I don't want NAT, remember).

If you could get vpnc to bind to a specific interface it seems like
that would be possible. Can you see if that's an option?


No it isn't. Looking at the source does not seem hard to do, however.
Maybe I'll make an small patch to address this. It's not an uncommon
situation to sit a public addressable range in a DMZ, and use a
reserved one for routing I think.



The way I see it, NAT may not be an issue; any worthwhile modern IPsec
implementation supports NAT traversal, which vpnc appears to (I see a
reference to '--natt-mode' on their page.) If you can support NAT-T on
the client and server, it may be a non-issue for you.


Yes, I have tried with different natt modes. But connection dies
2h50min after. I'm not sure if the problem is natt related, it's just
to discard options and simplify the configuration.


Haven't used vpnc myself, but just looking at the package install
message there's a couple of considerations:



I had done that. Thanks for your comments, Darren



Source Interface for outgoing connections

2007-02-26 Thread Samuel Moñux

Hi everyone,

I'm having some issues with an ipsec connection with vpnc (isakmp is
not an option, since does not support xauth, and I don't control the
other end) from an OpenBSD firewall/router to a Cisco device.

I think problems could be natt related so I would like to eliminate
nat from the equation, but the problem is that the outside interface
is a private address. This firewall routes between a DMZ (public /29),
a LAN segment (private /24), and the outside (private /30).


-- LAN --- OpenBSD -- 10.90.0.0/30 --- Outside Router -- INET
 |
 |
 DMZ (public /29)

Right now, I need to NAT on the Outside Router, since internet routed
packets from the OpenBSD box go out with a private address.

What I would like to achieve is that packets destined to internet get
sourced with DMZ's interface, which is internet routable, and without
pf tricks(I don't want NAT, remember).

Bridging is not an option, since the Outside router needs its own IP
for its own purposes.

I don't know it its possible. If it's, please, let me know (pointing a
man page would be OK).

Thanks in advance



Re: Source Interface for outgoing connections

2007-02-26 Thread Darren Spruell

On 2/26/07, Samuel Moqux [EMAIL PROTECTED] wrote:

I'm having some issues with an ipsec connection with vpnc (isakmp is
not an option, since does not support xauth, and I don't control the
other end) from an OpenBSD firewall/router to a Cisco device.

I think problems could be natt related so I would like to eliminate
nat from the equation, but the problem is that the outside interface
is a private address. This firewall routes between a DMZ (public /29),
a LAN segment (private /24), and the outside (private /30).


-- LAN --- OpenBSD -- 10.90.0.0/30 --- Outside Router --

INET

  |
  |
  DMZ (public /29)

Right now, I need to NAT on the Outside Router, since internet routed
packets from the OpenBSD box go out with a private address.

What I would like to achieve is that packets destined to internet get
sourced with DMZ's interface, which is internet routable, and without
pf tricks(I don't want NAT, remember).


If you could get vpnc to bind to a specific interface it seems like
that would be possible. Can you see if that's an option?

The way I see it, NAT may not be an issue; any worthwhile modern IPsec
implementation supports NAT traversal, which vpnc appears to (I see a
reference to '--natt-mode' on their page.) If you can support NAT-T on
the client and server, it may be a non-issue for you.

Haven't used vpnc myself, but just looking at the package install
message there's a couple of considerations:

snip
--- vpnc-0.3.3p1 ---
In order for vpnc to actually get any received IPsec packet, you have
to disable ESP in your kernel like this:

   sysctl net.inet.esp.enable=0

If you are behind a NAT gateway, you have to disable UDP encapsulation
as well:

   sysctl net.inet.esp.udpencap=0
/snip

DS