Re: IPsec peers allowed to inject any network to existing tunnels

2019-03-13 Thread Stuart Henderson
On 2019-03-13, Fedor Piecka wrote: > I understood that ipsecctl and ipsec.conf are supposed to free the user > from configuring keynotes manually. That's not correct. ipsec.conf can take the place of isakmpd.conf in some limited cases. It doesn't replace keynote in any way. > Doesn't the

Re: IPsec peers allowed to inject any network to existing tunnels

2019-03-13 Thread Fedor Piecka
I understood that ipsecctl and ipsec.conf are supposed to free the user from configuring keynotes manually. Doesn't the parameter "-K" of isakmpd mean it won't read keynote policy at all? man ipsec.conf: The keying daemon, isakmpd(8), can be enabled to run at boot time via the

Re: IPsec peers allowed to inject any network to existing tunnels

2019-03-13 Thread Stuart Henderson
On 2019-03-13, Fedor Piecka wrote: > Does anybody see any misconfiguration or misunderstanding on our side? Or > is this a bug (IMHO a security bug) in OpenBSD IPsec implementation? isakmpd: it is a misconfiguration (but an incredibly common one), you should use a keynote policy to prevent this.

IPsec peers allowed to inject any network to existing tunnels

2019-03-13 Thread Fedor Piecka
Hello We've discovered a very weird behavior in OpenBSD IPsec. We run isakmpd -K and use ipsecctl with ipsec.conf to set up our IPsec tunnels. When our peer adds a new network to an existing configuration on his router, our OpenBSD box accepts the network without our intervention, SAs and flows