Re: [Vyatta-users] IPSec Termination

2008-02-08 Thread Dunmoodie, Carlos
All,


Thanks for your input. I got the tunnel up and running. After taking
several suggestions I decided to switch to main mode and set the right
side to dynamic.  Also when using dynamic even as a termination point
auto is set to "add".



version 2.0

config setup
interfaces="ipsec0=eth0"
hidetos=yes

conn clear
auto=ignore

conn clear-or-private
auto=ignore

conn private-or-clear
auto=ignore

conn private
auto=ignore

conn block
auto=ignore

conn packetdefault
auto=ignore

conn peer-0.0.0.0-tunnel-1
left=1.1.1.1
right=%any
rekey=no
leftsubnet=192.168.12.0/24
rightsubnet=192.168.10.0/24
ike=3des-md5,3des-sha1
ikelifetime=28800s
aggrmode=no
esp=3des-md5,3des-sha1
keylife=1800s
rekeymargin=540s
type=tunnel
pfs=yes
compress=no
authby=secret
auto=add




Carlos Dunmoodie
Network Engineer
Engineering
Office: (301) 944-2896
Cell: (443) 864-9822
 

-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of ken Felix
Sent: Thursday, February 07, 2008 5:21 PM
To: vyatta-users@mailman.vyatta.com
Subject: [Vyatta-users] IPSec Termination

My take,  the remote peer is not recognized. Do you have an appropiate  
  PSK key in the  ipsec.secrets file ?

fwiw: I would create a default setting and apply all of your setting  
for things like  this in the default profile


conn %default
left=aaa.bbb.ccc.dd
leftnexthop=aaa.bbb.ccc.eee
dpddelay=5
dpdtimeout=5
dpdaction=hold
pfs=no
auth=esp
authby=secret
compress=yes
aggrmode=yes


etc.

___
Vyatta-users mailing list
Vyatta-users@mailman.vyatta.com
http://mailman.vyatta.com/mailman/listinfo/vyatta-users
___
Vyatta-users mailing list
Vyatta-users@mailman.vyatta.com
http://mailman.vyatta.com/mailman/listinfo/vyatta-users


Re: [Vyatta-users] IPSec Termination

2008-02-07 Thread Robyn Orosz
Hi Carlos,

I'm not sure I'm correctly understanding your reason for using 
aggressive mode but, are you sure that the other end of the connection 
is expecting an aggressive mode negotiation?  If your only special 
requirement is that the other end of the connection is being initiated 
from an unknown peer address, then simply setting the peer to 0.0.0.0, 
which it looks like you've done, should work for you.

Either way, I don't think your phase 1 negotiation will complete if only 
one end is set to aggressive mode.  This may be the reason for the 
INVALID_ID error.  Have you tried connecting with aggrmode=no? 
If none of the above apply to your situation, can you reply with the VPN 
configuration on the remote end?  Also, what type of device is it?

Thanks!

Robyn

Dunmoodie, Carlos wrote:
> Here's my config
>
>
>
>
> conn peer-0.0.0.0-tunnel-1
>  left=1.1.1.1
>  right=%any
>  leftsubnet=192.168.12.0/24
>  rightsubnet=192.168.10.0/24
>  rekey=no
>  ike=3des-sha1,3des-sha1
>  ike=3des-sha1,3des-sha1
>  ikelifetime=3600s
>  aggrmode=yes
>  esp=3des-md5,3des-sha1
>  keylife=1800s
>  rekeymargin=540s
>  type=tunnel
>  pfs=yes
>  compress=no
>  authby=secret
>  auto=add
>
>
>
>
> >From the initiator I get an error message "INVALID_ID INFORMATION"
>
> How do you configure  the user id to match the userid from the
> initiator, or does that matter?  
>
> Also does the above config look accurate for an aggressive mode.  When I
> configure "auto=ignore" I see no IPSEC information
>
> When I change auto=add, I see the IPSEC negotiations, and it doesn't
> initiate, which is good. But tunnel not established
>
>
> Carlos Dunmoodie
> Network Engineer
> Engineering
> Office: (301) 944-2896
> Cell: (443) 864-9822
>  
> -Original Message-
> From: [EMAIL PROTECTED]
> [mailto:[EMAIL PROTECTED] On Behalf Of ken Felix
> Sent: Monday, February 04, 2008 7:32 PM
> To: vyatta-users@mailman.vyatta.com
> Subject: [Vyatta-users] IPSec Termination
>
> Couldn't you get the same thing with the VPN dead peer-detect set to 
> HOLD?
>
> Under strongswan for example, their's a setting that would allow you to 
> auto=start  or auto=ignore, if you could add this, you should be okay.
> Here's how my  vyatta ipsec.conf looks;
>
>
>
>
> If the last line was set to auto=ignore, than I would think ipsec would 
> be   started and the  host would wait for the far-end ( right ) to  
> initiated the session.
>
> ___
> Vyatta-users mailing list
> Vyatta-users@mailman.vyatta.com
> http://mailman.vyatta.com/mailman/listinfo/vyatta-users
> ___
> Vyatta-users mailing list
> Vyatta-users@mailman.vyatta.com
> http://mailman.vyatta.com/mailman/listinfo/vyatta-users
>   
___
Vyatta-users mailing list
Vyatta-users@mailman.vyatta.com
http://mailman.vyatta.com/mailman/listinfo/vyatta-users


Re: [Vyatta-users] IPSec Termination

2008-02-07 Thread Dunmoodie, Carlos
Here's my config




conn peer-0.0.0.0-tunnel-1
 left=1.1.1.1
 right=%any
 leftsubnet=192.168.12.0/24
 rightsubnet=192.168.10.0/24
   rekey=no
 ike=3des-sha1,3des-sha1
   ike=3des-sha1,3des-sha1
 ikelifetime=3600s
 aggrmode=yes
 esp=3des-md5,3des-sha1
 keylife=1800s
 rekeymargin=540s
 type=tunnel
 pfs=yes
 compress=no
 authby=secret
 auto=add




>From the initiator I get an error message "INVALID_ID INFORMATION"

How do you configure  the user id to match the userid from the
initiator, or does that matter?  

Also does the above config look accurate for an aggressive mode.  When I
configure "auto=ignore" I see no IPSEC information

When I change auto=add, I see the IPSEC negotiations, and it doesn't
initiate, which is good. But tunnel not established


Carlos Dunmoodie
Network Engineer
Engineering
Office: (301) 944-2896
Cell: (443) 864-9822
 
-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of ken Felix
Sent: Monday, February 04, 2008 7:32 PM
To: vyatta-users@mailman.vyatta.com
Subject: [Vyatta-users] IPSec Termination

Couldn't you get the same thing with the VPN dead peer-detect set to 
HOLD?

Under strongswan for example, their's a setting that would allow you to 
auto=start  or auto=ignore, if you could add this, you should be okay.
Here's how my  vyatta ipsec.conf looks;




If the last line was set to auto=ignore, than I would think ipsec would 
be   started and the  host would wait for the far-end ( right ) to  
initiated the session.

___
Vyatta-users mailing list
Vyatta-users@mailman.vyatta.com
http://mailman.vyatta.com/mailman/listinfo/vyatta-users
___
Vyatta-users mailing list
Vyatta-users@mailman.vyatta.com
http://mailman.vyatta.com/mailman/listinfo/vyatta-users


Re: [Vyatta-users] IPSec Termination

2008-02-05 Thread Dunmoodie, Carlos
I agree, but with our solution, IP addressing is coming from WSP
dynamically. so the use of aggressive mode is needed.

-Carlos

-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of ken Felix
Sent: Tuesday, February 05, 2008 11:39 AM
To: vyatta-users@mailman.vyatta.com
Subject: [Vyatta-users] IPSec Termination

I have to check, but I think in my previous experience with strongswan 
and linux, the auto=ignore is what I've used in the past to make the 
ipsec  client sit as receiver.

  Aggressive mode iirc is not  what it seems like, but a way that the P1

is established and how many steps are taken in doing so. Main mode is 
ALWAYS better than Aggressive mode when it comes to ipsec setup.  I 
think it's like 6 steps vrs 4 with aggressive.

___
Vyatta-users mailing list
Vyatta-users@mailman.vyatta.com
http://mailman.vyatta.com/mailman/listinfo/vyatta-users
___
Vyatta-users mailing list
Vyatta-users@mailman.vyatta.com
http://mailman.vyatta.com/mailman/listinfo/vyatta-users


Re: [Vyatta-users] IPSec Termination

2008-02-05 Thread Dunmoodie, Carlos
Let me add in, that I'm using aggressive mode. The initiating stations
are dynamic. Will this change your answer?

-Carlos
-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of ken Felix
Sent: Monday, February 04, 2008 7:32 PM
To: vyatta-users@mailman.vyatta.com
Subject: [Vyatta-users] IPSec Termination

Couldn't you get the same thing with the VPN dead peer-detect set to 
HOLD?

Under strongswan for example, their's a setting that would allow you to 
auto=start  or auto=ignore, if you could add this, you should be okay.
Here's how my  vyatta ipsec.conf looks;

conn peer-1.1.1.1-tunnel-1
 left=1.1.1.1.
 right=2.2.2.2
 leftsubnet=192.168.254.0/24
 rightsubnet=192.168.255.0/24
 ike=3des-md5-modp1024
 ikelifetime=28800s
 aggrmode=no
 dpddelay=30s
 dpdtimeout=60s
 dpdaction=restart
 esp=3des-md5
 keylife=3000s
 rekeymargin=540s
 type=tunnel
 pfs=no
 compress=yes
 authby=secret
 auto=start

If the last line was set to auto=ignore, than I would think ipsec would 
be   started and the  host would wait for the far-end ( right ) to  
initiated the session.

___
Vyatta-users mailing list
Vyatta-users@mailman.vyatta.com
http://mailman.vyatta.com/mailman/listinfo/vyatta-users
___
Vyatta-users mailing list
Vyatta-users@mailman.vyatta.com
http://mailman.vyatta.com/mailman/listinfo/vyatta-users


Re: [Vyatta-users] IPSec Termination

2008-02-04 Thread Stig Thormodsrud
Ken,

You are right that changing the "auto=start" line will change this
behavior.  Initially our goal was to have a fairly simple configuration to
bring-up a tunnel, but over time we'll need to add more options to the vpn
cli.  The last time this came up I opened an enhancement request to make
this configurable (https://bugzilla.vyatta.com/show_bug.cgi?id=2506).
Maybe I should increase the priority of that bug?

Note: changes to /etc/ipsec.conf will be lost on a reboot.  If you want to
change the behavior such that it will survive a reboot you can edit
/opt/vyatta/libexec/xorp/vpn-config.pl (search for "auto=start").

stig

> Couldn't you get the same thing with the VPN dead peer-detect set to
> HOLD?
> 
> Under strongswan for example, their's a setting that would allow you to
> auto=start  or auto=ignore, if you could add this, you should be okay.
> Here's how my  vyatta ipsec.conf looks;
> 
> conn peer-1.1.1.1-tunnel-1
>  left=1.1.1.1.
>  right=2.2.2.2
>  leftsubnet=192.168.254.0/24
>  rightsubnet=192.168.255.0/24
>  ike=3des-md5-modp1024
>  ikelifetime=28800s
>  aggrmode=no
>  dpddelay=30s
>  dpdtimeout=60s
>  dpdaction=restart
>  esp=3des-md5
>  keylife=3000s
>  rekeymargin=540s
>  type=tunnel
>  pfs=no
>  compress=yes
>  authby=secret
>  auto=start
> 
> If the last line was set to auto=ignore, than I would think ipsec would
> be   started and the  host would wait for the far-end ( right ) to
> initiated the session.
> 
> ___
> Vyatta-users mailing list
> Vyatta-users@mailman.vyatta.com
> http://mailman.vyatta.com/mailman/listinfo/vyatta-users

___
Vyatta-users mailing list
Vyatta-users@mailman.vyatta.com
http://mailman.vyatta.com/mailman/listinfo/vyatta-users


Re: [Vyatta-users] IPSec Termination

2008-02-04 Thread Stig Thormodsrud
One workaround that may or may not work for you is a 0.0.0.0 peer.  When
the vyatta is configured with a 0.0.0.0 peer it can not initiate since it
doesn't know which address it's coming from.

 

stig

 

  _  

From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Dunmoodie,
Carlos
Sent: Monday, February 04, 2008 6:39 AM
To: [EMAIL PROTECTED]
Subject: Re: [Vyatta-users] IPSec Termination

 

 

 

I'm trying to establish an IPSec tunnel with a wireless modem on the right
and vyatta on the left.

 

Problem I'm running into is the Vyatta is suppose the terminate the tunnel
and the wireless modem is the initiator.

However, when you look at the logs and the ipsec.conf file, Vyatta is also
attempting to initiate the tunnel.

 

Is there a parameter in the config that will allow the Vyatta to be used
as a terminator.  Please assist 

 

___
Vyatta-users mailing list
Vyatta-users@mailman.vyatta.com
http://mailman.vyatta.com/mailman/listinfo/vyatta-users


Re: [Vyatta-users] IPSec Termination

2008-02-04 Thread Dunmoodie, Carlos
 

 

I'm trying to establish an IPSec tunnel with a wireless modem on the
right and vyatta on the left.

 

Problem I'm running into is the Vyatta is suppose the terminate the
tunnel and the wireless modem is the initiator.

However, when you look at the logs and the ipsec.conf file, Vyatta is
also attempting to initiate the tunnel.

 

Is there a parameter in the config that will allow the Vyatta to be used
as a terminator.  Please assist 

 

___
Vyatta-users mailing list
Vyatta-users@mailman.vyatta.com
http://mailman.vyatta.com/mailman/listinfo/vyatta-users