Re: [7.5/amd64] ipsec + npppd + sasyncd + carp - doesn't pick up the VPN session at switchover

2024-05-31 Thread Stuart Henderson
On 2024-05-30, Radek wrote: > Thank you all for your replies. > > Actually, I did not know that providing seamless switching VPN solutions is > so problematic. If it can't be done in a simple way, then it doesn't have to > be seamless at any cost. Users will manually reconnect to this VPN when

Re: [7.5/amd64] ipsec + npppd + sasyncd + carp - doesn't pick up the VPN session at switchover

2024-05-30 Thread Radek
4-05-29, Vitaliy Makkoveev wrote: > > He wants replication. This means both wireguard "servers" know the client > > state. No client reconnection at failure, no delay, seamless migration > > from failed node to the backup. Something like sasyncd(8), but for > > npp

Re: [7.5/amd64] ipsec + npppd + sasyncd + carp - doesn't pick up the VPN session at switchover

2024-05-30 Thread Stuart Henderson
On 2024-05-29, Vitaliy Makkoveev wrote: > He wants replication. This means both wireguard "servers" know the client > state. No client reconnection at failure, no delay, seamless migration > from failed node to the backup. Something like sasyncd(8), but for > npppd(8) or wg(

Re: [7.5/amd64] ipsec + npppd + sasyncd + carp - doesn't pick up the VPN session at switchover

2024-05-29 Thread Vitaliy Makkoveev
> On 29 May 2024, at 18:50, Hrvoje Popovski wrote: > > On 29.5.2024. 12:48, Radek wrote: >> Thank you, that explains everything. >> Does wireguard support replication? Will it work properly in my CARP setup? >> > > > why not use iked as vpn solution ? i'm not sure but i think that iked is

Re: [7.5/amd64] ipsec + npppd + sasyncd + carp - doesn't pick up the VPN session at switchover

2024-05-29 Thread Vitaliy Makkoveev
oth wireguard "servers" know the client state. No client reconnection at failure, no delay, seamless migration from failed node to the backup. Something like sasyncd(8), but for npppd(8) or wg(4). > root@pc-hrvoje:~# ping 10.2.0.1 > PING 10.2.0.1 (10.2.0.1) 56(84) bytes of data. > 64 by

Re: [7.5/amd64] ipsec + npppd + sasyncd + carp - doesn't pick up the VPN session at switchover

2024-05-29 Thread obsdml
> On May 29, 2024, at 3:48 AM, Radek wrote: > > Thank you, that explains everything. > Does wireguard support replication? Will it work properly in my CARP setup? wireguard doesn’t have “state” per se. it remembers the last address a key was associated with. In the event of a failover, if

Re: [7.5/amd64] ipsec + npppd + sasyncd + carp - doesn't pick up the VPN session at switchover

2024-05-29 Thread Hrvoje Popovski
On 29.5.2024. 12:48, Radek wrote: > Thank you, that explains everything. > Does wireguard support replication? Will it work properly in my CARP setup? > Hi, I have wg listen on carp interface for redundancy and it's working without admins or clients needs to do anything when primary carp firewa

Re: [7.5/amd64] ipsec + npppd + sasyncd + carp - doesn't pick up the VPN session at switchover

2024-05-29 Thread Stuart Henderson
On 2024/05/29 18:08, Vitaliy Makkoveev wrote: > On Wed, May 29, 2024 at 01:23:47PM -, Stuart Henderson wrote: > > On 2024-05-29, Vitaliy Makkoveev wrote: > > > On Wed, May 29, 2024 at 12:48:41PM +0200, Radek wrote: > > >> Thank you, that explains everything. > > >> Does wireguard support repl

Re: [7.5/amd64] ipsec + npppd + sasyncd + carp - doesn't pick up the VPN session at switchover

2024-05-29 Thread Vitaliy Makkoveev
On Wed, May 29, 2024 at 01:23:47PM -, Stuart Henderson wrote: > On 2024-05-29, Vitaliy Makkoveev wrote: > > On Wed, May 29, 2024 at 12:48:41PM +0200, Radek wrote: > >> Thank you, that explains everything. > >> Does wireguard support replication? Will it work properly in my CARP setup? > >> >

Re: [7.5/amd64] ipsec + npppd + sasyncd + carp - doesn't pick up the VPN session at switchover

2024-05-29 Thread Stuart Henderson
On 2024-05-29, Vitaliy Makkoveev wrote: > On Wed, May 29, 2024 at 12:48:41PM +0200, Radek wrote: >> Thank you, that explains everything. >> Does wireguard support replication? Will it work properly in my CARP setup? >> > > No for both questions. However, wireguard allows to create complicated >

Re: [7.5/amd64] ipsec + npppd + sasyncd + carp - doesn't pick up the VPN session at switchover

2024-05-29 Thread Vitaliy Makkoveev
ould have multiple associated peers on "client" side too. > Radek > > On Mon, 27 May 2024 21:00:40 +0300 > Vitaliy Makkoveev wrote: > > > npppd does not support replication > > > > > On 27 May 2024, at 19:58, Radek wrote: > > > > &g

Re: [7.5/amd64] ipsec + npppd + sasyncd + carp - doesn't pick up the VPN session at switchover

2024-05-29 Thread Radek
Thank you, that explains everything. Does wireguard support replication? Will it work properly in my CARP setup? Radek On Mon, 27 May 2024 21:00:40 +0300 Vitaliy Makkoveev wrote: > npppd does not support replication > > > On 27 May 2024, at 19:58, Radek wrote: > > > &g

Re: [7.5/amd64] ipsec + npppd + sasyncd + carp - doesn't pick up the VPN session at switchover

2024-05-27 Thread Vitaliy Makkoveev
npppd does not support replication > On 27 May 2024, at 19:58, Radek wrote: > > Hello, > I have two redundant firewalls with CARP: [krz75-MAS]<->[krz75-SLA]. I'm > trying to set up redundant IPSEC VPN on it. > > - CARP + pfsync is working as expected -

[7.5/amd64] ipsec + npppd + sasyncd + carp - doesn't pick up the VPN session at switchover

2024-05-27 Thread Radek
isakmpd is running with "-S -K" on both nodes - IPSEC/npppd is working as expected on [krz75-MAS] - client can connect to VPN node - IPSEC/npppd is working as expected on [krz75-SLA] (when running as master) - client can connect to VPN node Problem to solve: When I perform the switcho

Re: npppd - changing clients' route table

2021-09-13 Thread Stuart Henderson
On 2021-09-12, Radek wrote: > Sorry for the late reply, adding ":framed-ip-netmask=255.255.255.0:" doesn't > solve the problem. Tested on Win10. framed-ip-netmask controls addition of the route on the npppd machine, not the client. You only use it if you have multiple add

Re: npppd - changing clients' route table

2021-09-12 Thread Radek
rface which terminate the tunnel has "192.168.4.254". > >> Right? > > Do you mean the other end of the tunnel? It is 10.109.4.254 > > interface pppx0 address 10.109.4.254 ipcp IPCP > > Sorry, "192.168.4.244" should have been "10.109.4.254". &g

Re: npppd(8) and PROXY_AUTHEN_CHALLENGE bad length with Juniper

2021-03-09 Thread Ryan Freeman
> > Also what I said > >> It's for CHAP or MSCHAPv1. If MD5 is selected for PPP CHAP, the > >> challenge length for CHAP is 16 octet. The challenge for MSCHAPv1 is > >> also 8 octet, but npppd doesn't support MSCHAv1 anyway. So 24 must be > >&

Re: npppd(8) and PROXY_AUTHEN_CHALLENGE bad length with Juniper

2021-03-08 Thread YASUOKA Masahiko
>> challenge length for CHAP is 16 octet. The challenge for MSCHAPv1 is >> also 8 octet, but npppd doesn't support MSCHAv1 anyway. So 24 must be >> enough for RFC 2661. is false. Length of callenge is "independent of the hash algorithm". In RFC 1994 (PPP CHAP):

Re: npppd(8) and PROXY_AUTHEN_CHALLENGE bad length with Juniper

2021-03-08 Thread Ryan Freeman
gt; > work-around, so misc it is. > > > > This is done with OpenBSD 6.8-stable, syspatch 001 through 012 installed. > > We considered trying -current, but noticed no activity in the npppd tree > > that might make a difference. > > > > 'old' and 'n

Re: npppd(8) and PROXY_AUTHEN_CHALLENGE bad length with Juniper

2021-03-06 Thread YASUOKA Masahiko
ork-around, so misc it is. > > This is done with OpenBSD 6.8-stable, syspatch 001 through 012 installed. > We considered trying -current, but noticed no activity in the npppd tree > that might make a difference. > > 'old' and 'new' equipment types from upstream

npppd(8) and PROXY_AUTHEN_CHALLENGE bad length with Juniper

2021-03-05 Thread Ryan Freeman
01 through 012 installed. We considered trying -current, but noticed no activity in the npppd tree that might make a difference. 'old' and 'new' equipment types from upstream are both Juniper, though unsure of exact models. Old should be Juniper ERX of some type, new I only

Re: npppd - changing clients' route table

2021-02-21 Thread YASUOKA Masahiko
4" should have been "10.109.4.254". >> How about if you configure the npppd-users >> >> rdk: >> :password=pasword:\ >> :framed-ip-address=10.109.4.254:\ >> :framed-ip-netmask=255.255.255.0: >> >> The server (npppd) will conf

Fw: Re: npppd - changing clients' route table

2021-02-21 Thread Radek
Hello, > The interface which terminate the tunnel has "192.168.4.254". > Right? Do you mean the other end of the tunnel? It is 10.109.4.254 interface pppx0 address 10.109.4.254 ipcp IPCP > How about if you configure the npppd-users > > rdk: > :password=pasw

Re: npppd - changing clients' route table

2021-02-21 Thread YASUOKA Masahiko
Hello, On Sat, 20 Feb 2021 21:14:24 +0100 Radek wrote: > I have a router with VPN server (npppd). LAN net is 10.109.3.0/24, gw > 10.109.3.254, the VPN net is 10.109.4.0/24, gw 10.109.4.254. > If the client is conencted to VPN all client's traffic to 10.0.0.0/8 goes via

npppd - changing clients' route table

2021-02-20 Thread Radek
Hi, I have a router with VPN server (npppd). LAN net is 10.109.3.0/24, gw 10.109.3.254, the VPN net is 10.109.4.0/24, gw 10.109.4.254. If the client is conencted to VPN all client's traffic to 10.0.0.0/8 goes via 10.109.4.254 client> route print Network Destination Netmask

Re: npppd - problem with simultaneous sessions

2021-01-08 Thread Radek
; Hi, > > > >> It seems that only last person can use the tunnel. This reminds me > >> problems through NAT. > > True. Can it be caused by wrong PF rules? > > > >> Both sessions seem to be connected from A.B.C.D. Are the clients > >> behind a NA

Re: npppd - problem with simultaneous sessions

2021-01-08 Thread YASUOKA Masahiko
lients behind a NAT? Yes, both client are behind the same router/NAT. I have a 66/i386 box running npppd on producion and my two clients can be connected the same time flawlessly. How about the npppd side? Does the client directly connect to > tunnel L2TP protocol l2tp { > listen o

Re: npppd - problem with simultaneous sessions

2021-01-07 Thread radek
66/i386 box running npppd on producion and my two clients can be connected the same time flawlessly. > How about the npppd side? Does the client directly connect to > > > tunnel L2TP protocol l2tp { > > listen on X.Y.Z.13 > > } > > X.Y.Z.13 ? Or a NAT i

Re: npppd - problem with simultaneous sessions

2021-01-06 Thread YASUOKA Masahiko
Hi, On Wed, 6 Jan 2021 21:33:49 +0100 Radek wrote: I have a box with relatively fresh install of 68/amd64, fully syspatched. There is a npppd server running on it. The problem is that I can have only one nppp session at one time. If the second vpn user connects the box, the first nppp

npppd - problem with simultaneous sessions

2021-01-06 Thread Radek
Hi @misc, I have a box with relatively fresh install of 68/amd64, fully syspatched. There is a npppd server running on it. The problem is that I can have only one nppp session at one time. If the second vpn user connects the box, the first nppp session hangs/drops. I probably have missed

Re: npppd failed enable pipex: Invalid argument

2020-08-17 Thread Marko Cupać
On Mon, 17 Aug 2020 00:36:35 +0300 Vitaliy Makkoveev wrote: > Hello Marko. > > Can I propose you to try upcoming 6.8? We moved pppac(4) and pppx(4) > output processing out of kernel lock. pppx(4) output is still > serialised by netlock, but I hope we'll made it per-cpu before 6.8 > release. > >

Re: npppd failed enable pipex: Invalid argument

2020-08-16 Thread Vitaliy Makkoveev
m 6.6 to 6.7, and (sys)patched >>> it to 017_dix. Everything works great except my npppd setup. It >>> starts fine, but upon connecting over pptp I get the following >>> records in log: >>> (...) >>> Aug 4 15:48:48 nat2 npppd[66557]: ppp id=0 layer=bas

Re: npppd failed enable pipex: Invalid argument

2020-08-10 Thread Marko Cupać
> > On 4 Aug 2020, at 17:04, Marko Cupać wrote: > > > > Hi, > > > > I have recently upgraded (actually installed from scratch and copied > > config files) one of my firewalls from 6.6 to 6.7, and (sys)patched > > it to 017_dix. Everything works great

npppd failed enable pipex: Invalid argument

2020-08-04 Thread Marko Cupać
Hi, I have recently upgraded (actually installed from scratch and copied config files) one of my firewalls from 6.6 to 6.7, and (sys)patched it to 017_dix. Everything works great except my npppd setup. It starts fine, but upon connecting over pptp I get the following records in log: Aug 4 15:48

Re: npppd failed enable pipex: Invalid argument

2020-08-04 Thread Vitaliy Makkoveev
> On 4 Aug 2020, at 17:04, Marko Cupać wrote: > > Hi, > > I have recently upgraded (actually installed from scratch and copied > config files) one of my firewalls from 6.6 to 6.7, and (sys)patched it > to 017_dix. Everything works great except my npppd setup. It st

npppd docs for tun change to pppac

2020-06-12 Thread Kaya Saman
Hi, I just updated my system from 6.6 (old current) to 6.7 (current) which went through fine. I realized that the npppd setup I had stopped working. Something that threw me off in the man pages was the lingering reference to the old tun interface which has since been reworked to pppac

Re: npppd pptp hangs

2020-04-06 Thread Vitaliy Makkoveev
t; You have pipex(4) disabled. Is it still hangs with disabled > > > > pipex(4)? As I discovered > > > > (https://marc.info/?t=15852997681&r=1&w=2), npppd with pipex(4) > > > > enabled and non-NULL "idle-timeout" option will crash kernel.

Re: npppd pptp hangs

2020-04-04 Thread Marko Cupać
c.info/?t=15852997681&r=1&w=2), npppd with pipex(4) > enabled and non-NULL "idle-timeout" option will crash kernel. You > can disable this option in yout npppd.conf an reenable pipex(4). > Looks like crashes should gone. And don't use pppac(4) with pipex enabled, use pppx(4)

Re: npppd pptp hangs

2020-03-31 Thread Marko Cupać
On Mon, 30 Mar 2020 14:33:46 +0300 Vitaliy Makkoveev wrote: > On Mon, Mar 30, 2020 at 02:28:08PM +0300, Vitaliy Makkoveev wrote: > > You have pipex(4) disabled. Is it still hangs with disabled > > pipex(4)? As I discovered > > (https://marc.info/?t=15852997681&r=1

Re: npppd pptp hangs

2020-03-30 Thread Vitaliy Makkoveev
On Mon, Mar 30, 2020 at 02:28:08PM +0300, Vitaliy Makkoveev wrote: > You have pipex(4) disabled. Is it still hangs with disabled pipex(4)? > As I discovered (https://marc.info/?t=15852997681&r=1&w=2), npppd > with pipex(4) enabled and non-NULL "idle-timeout" option w

Re: npppd pptp hangs

2020-03-30 Thread Vitaliy Makkoveev
On Mon, Mar 30, 2020 at 12:47:13PM +0200, Marko Cupać wrote: > On Sat, 28 Mar 2020 01:46:41 +0300 > Vitaliy Makkoveev wrote: > > > Can you try latest snapshot? > > Unfortunately, the box that runs npppd is the most important machine on > my network (GRE/IPsec hub for mul

Re: npppd pptp hangs

2020-03-30 Thread Marko Cupać
On Sat, 28 Mar 2020 01:46:41 +0300 Vitaliy Makkoveev wrote: > Can you try latest snapshot? Unfortunately, the box that runs npppd is the most important machine on my network (GRE/IPsec hub for multiple branch offices), I can't take the risk. > Can you share your npppd.conf? Be

Re: npppd pptp hangs

2020-03-27 Thread Vitaliy Makkoveev
can do to avoid future hangs? > > I got another hang, this time killing npppd process crashed complete OS > (sorry for photo, I don't have serial console set up): > > https://oblak.mimar.rs/index.php/s/Cc9J745jH93RK6j > > At the time when npppd wouldn't accept

Re: npppd pptp hangs

2020-03-24 Thread Marko Cupać
On Tue, 24 Mar 2020 09:34:09 +0100 Marko Cupać wrote: > On Tue, 24 Mar 2020 07:13:27 +1000 > Stuart Longland wrote: > > > On 23/3/20 10:26 pm, Marko Cupać wrote: > > > Anything I can do to avoid future hangs? I got another hang, this time killing npppd process crashe

Re: npppd pptp hangs

2020-03-24 Thread Marko Cupać
-promotion on link below, but I think it's a win-win situation - I get eternal fame and glory on the Internet, and list readers get copy/paste howto set up npppd pptp server with RADIUS authentication. Could come handy in this "end of days" situation where everyone works rem

Re: npppd pptp hangs

2020-03-23 Thread Stuart Longland
On 23/3/20 10:26 pm, Marko Cupać wrote: > Anything I can do to avoid future hangs? Whilst probably not the answer you're looking for: moving away from PPTP would be a good start. The MSCHAPv2 authentication used in PPTP is vulnerable to dictionary attacks and the RC4 cipher used in MPPE (the secu

npppd pptp hangs

2020-03-23 Thread Marko Cupać
Hi, my npppd pptp server has recently got increase from ~20 to >200 concurrent users. So far it worked flawlessly for years, but before few minutes it become unresponsive. It stopped logging at one point (I have log redirected to its own file, /var/log/npppd). npppctl also hanged, return

Re: NPPPD Server behind a firewall

2019-10-18 Thread Damian McGuckin
do not disagree. I just need to move an existing NPPPD to behind a firewall in the short term that serves several iPads and Windows PCs. Once I have the move done, I want to move expand to IKEv2. I was also under the impression that IKEv2 was faster. The IPsec side should be ok as long as

Re: NPPPD Server behind a firewall

2019-10-16 Thread Stuart Henderson
>> There are ways to make even Windows clients use actual crypto with IPsec if >> needed, though last I checked it could not be done from the GUI but required >> powershell commands. (I don't have a URL handy, sorry, but this information >> wasn't very hard to find when I needed it.) > > Thanks. I

Re: NPPPD Server behind a firewall

2019-10-14 Thread Damian McGuckin
he IPsec layer. Check debug logs from isakmpd, check ipsectl -sa, etc. OK. I suspect getting IPsec SAs going with both peers behind NAT is tricky. I agree. See my subsequent post where I replaced 'egress' above with the external IP (of the subsequently NAT'd npppd server). Closer. But not quite there. Thanks - Damian

Re: NPPPD Server behind a firewall

2019-10-14 Thread Damian McGuckin
p modp2048 \ psk "MYSECRET" and restarted isakmpd and reloaded ipsec.conf. On the inside of the NPPPD server, the only errors I get are isakmpd[46608]: attribute_unacceptable: GROUP_DESCRIPTION: got ECP_384, expected MODP_2048 isakmpd[46608]: attribute_unacceptable: GROUP_DES

Re: NPPPD Server behind a firewall

2019-10-14 Thread Stefan Sperling
ck ipsectl -sa, etc. I suspect getting IPsec SAs going with both peers behind NAT is tricky. I believe it should be possile in theory but I cannot confirm whether our implementation can do this easily. It will certainly involve UDP traffic since AH/ESP cannot pass through NAT. If your IPsec SAs already

NPPPD Server behind a firewall

2019-10-13 Thread Damian McGuckin
I have a L2TP NPPPD server machine with IP $L2TP sitting behind an OpenBSD firewall, say FIRET. 'T' for temporary because it will move. $L2TP is an externally routable IP. $Ext, the external interface of FIRET, allows traffic into $L2TP. A snippet of pf.conf is begin snippet

Re: npppd and vpn connections on the same network

2017-06-21 Thread Biggins18
h them soon. -- View this message in context: http://openbsd-archive.7691.n7.nabble.com/npppd-and-vpn-connections-on-the-same-network-tp260921p321119.html Sent from the openbsd user - misc mailing list archive at Nabble.com.

Re: npppd troubles

2016-11-04 Thread Stefan Sperling
slate from internal to External NET > >> pass out on em0 inet from em1:network to any nat-to (em0) > > > > You're using NAT when passing out on em0 here, and... > > > >> external = em0 > > > >> pass out quick on $external from 10.0.0.103/32

Re: npppd troubles

2016-11-03 Thread Marina Brown
gt; > You're using NAT when passing out on em0 here, and... > >> external = em0 > >> pass out quick on $external from 10.0.0.103/32 to any > > ... my guess is that you're missing 'nat-to ($external)' here ^ > Thanks - is there a way to exclude the np

Re: npppd troubles

2016-11-03 Thread Stefan Sperling
On Thu, Nov 03, 2016 at 03:17:40PM -0400, Marina Brown wrote: > Hi All: > > I have been trying to create an nppp connection across my property - > about 100M for one of my friends who lives here. He wants less security > than i like behind my firewall. I have not been able to get OpenBSD to > rout

npppd troubles

2016-11-03 Thread Marina Brown
-a OpenBSD bernie.mesh.local 6.0 GENERIC.MP#2319 amd64 - # $OpenBSD: npppd.conf,v 1.2 2014/03/22 04:32:39 yasuoka Exp $ # sample npppd configuration file. see npppd.conf(5) tunnel L2TP protocol l2tp tunnel PPTP protocol pptp tunnel PPPOE protocol pppoe { listen on interface

npppd dies, posiibly due to lost route to radius server

2016-09-14 Thread Marko Cupać
Hi, I have two active/passive CARPed boxes of 5.9 with latest errata patches which serve as NAT firewalls, but also as pptp servers, which authenticate users from Microsoft's implementation of radius server (NPS). In last two weeks, I had three occurrences of npppd going down. Last

Re: L2TP/IPSec via npppd won't work with Android 5.x

2016-04-14 Thread johnw
Hi Renaud and the lists, Did you tried to use iked/ikev2 for android (+5.x) client? I checked my note3 is support ikev2 psk/rsa, I want to setup my home OpenBSD router act as vpn/nat router for my note3, Thanks. Renaud Allard allard.it> writes: > > > I can't get android to connect with modp >

Re: L2TP/IPSec via npppd won't work with Android 5.x

2016-04-14 Thread Renaud Allard
th "hmac-sha2-256" enc "aes-256" group "modp1024" \ >> quick auth "hmac-sha2-s256" enc "aes-256" group "modp1024" \ >> psk "redacted" > It creates an IPSEC SA and flow as shown by ipsecctl -s all, but

Re: L2TP/IPSec via npppd won't work with Android 6.0.1

2016-03-30 Thread Sly Midnight
Thank you! I will try this. I have confirmed it wasn't due to last year's OpenBSD 5.7 to 5.8 upgrade as I built a VM with 5.7 using same settings and get exactly the same behavior. This was triple confirmed by being able to connect with iOS on an iPhone, Windows 10, Chromebook (with md5 hmacs on

Re: L2TP/IPSec via npppd won't work with Android 6.0.1

2016-03-30 Thread Mattieu Baptiste
On Wed, Mar 30, 2016 at 8:18 AM, YASUOKA Masahiko wrote: > On Tue, 29 Mar 2016 11:37:14 +0200 > Mattieu Baptiste wrote: >> On Tue, Mar 29, 2016 at 5:43 AM, Sly Midnight wrote: >>> I don't mean to bring up an old thread, but I was wondering if anyone >>> else was experiencing issues with OpenBSD

Re: L2TP/IPSec via npppd won't work with Android 6.0.1

2016-03-29 Thread YASUOKA Masahiko
On Tue, 29 Mar 2016 11:37:14 +0200 Mattieu Baptiste wrote: > On Tue, Mar 29, 2016 at 5:43 AM, Sly Midnight wrote: >> I don't mean to bring up an old thread, but I was wondering if anyone >> else was experiencing issues with OpenBSD 5.8 and Android 6.0.1 >> (preferably the version on the Nexus lin

Re: L2TP/IPSec via npppd won't work with Android 6.0.1

2016-03-29 Thread Mattieu Baptiste
On Tue, Mar 29, 2016 at 5:43 AM, Sly Midnight wrote: > Hello, > > I don't mean to bring up an old thread, but I was wondering if anyone > else was experiencing issues with OpenBSD 5.8 and Android 6.0.1 > (preferably the version on the Nexus line of devices) connecting to > ipsec/l2tp. > > I had th

L2TP/IPSec via npppd won't work with Android 6.0.1

2016-03-28 Thread Sly Midnight
uot;aes-256" group "modp1024" \ > psk "redacted" It creates an IPSEC SA and flow as shown by ipsecctl -s all, but npppd never sees a connection attempt and tcpdumping enc0 shows no traffic and ultimately the connection fails. If I modify it to hmac-md5, aes,

Re: L2TP/IPSec via npppd won't work with Android 5.x

2016-03-25 Thread Sly Midnight
quot;aes-256" group "modp1024" \ > psk "redacted" It creates an IPSEC SA and flow as shown by ipsecctl -s all, but npppd never sees a connection attempt and tcpdumping enc0 shows no traffic and ultimately the connection fails. If I modify it to hmac-md5, aes, modp

Re: L2TP/IPSec via npppd won't work with Android 5.x

2016-02-22 Thread Stefan Krueger
;' didn't make a chage.(after `ipsecctl -f /etc/ipsec.conf`) Hi, the following config worked for me when I was using it (with npppd) last year (dumped it since I couldn't find a way to use it with iOS and Android at the same time): /etc/ipsec.conf public_ip = "x.y.z.a&quo

Re: L2TP/IPSec via npppd won't work with Android 5.x

2016-02-21 Thread YASUOKA Masahiko
Hi, On Mon, 22 Feb 2016 00:26:11 +0800 Jiahao Dai wrote: > I am a new openBSD user and I found it's extramly difficult to setup a > L2TP/IPSec(IKEv1) Road Warrior server to getting work with Android devices. > > I followed the tutorial here Configuring L2TP Over IPSec on OpenBSD for Mac > OS X >

L2TP/IPSec via npppd won't work with Android 5.x

2016-02-21 Thread Jiahao Dai
Hi, everyone: I am a new openBSD user and I found it's extramly difficult to setup a L2TP/IPSec(IKEv1) Road Warrior server to getting work with Android devices. I followed the tutorial here Configuring L2TP Over IPSec on OpenBSD for Mac OS X Clients [1], deployed on fresh openBSD 5.8 and found ou

Re: npppd pppx0 VPN Client can access wan but cannot access lan

2015-12-19 Thread torsten
> I'm, running OpenBSD 5.8, npppd, mpath and have tried the same on 5.7 and 5.3. > npppd is works fine and clients can connect using windows pptp client. > The Client has the pptp connection set as default gateway and can > access the internet through the vpn gateway but cann

Re: npppd pppx0 VPN Client can access wan but cannot access lan

2015-12-18 Thread torsten
On Sat, 19 Dec 2015 01:11:40 - "torsten" wrote: > I'm, running OpenBSD 5.8, npppd, mpath and have tried the same on 5.7 and 5.3. > npppd is works fine and clients can connect using windows pptp client. > The Client has the pptp connection set as default gateway and ca

Re: npppd pppx0 VPN Client can access wan but cannot access lan

2015-12-18 Thread YASUOKA Masahiko
Hi, On Sat, 19 Dec 2015 01:11:40 - "torsten" wrote: > I'm, running OpenBSD 5.8, npppd, mpath and have tried the same on 5.7 and 5.3. > npppd is works fine and clients can connect using windows pptp client. > The Client has the pptp connection set as default ga

Re: npppd pppx0 VPN Client can access wan but cannot access lan

2015-12-18 Thread torsten
Hi Is there anyone who can help to resolve the problem i have with pppx, tun and tap using npppd and openVPN not forwarding traffic to ingress but egress works fine. It was my first post to the list and if there is any info or further details required just ask, I would appreciate any help or hints

npppd pppx0 VPN Client can access wan but cannot access lan

2015-12-16 Thread torsten
Hi I'm, running OpenBSD 5.8, npppd, mpath and have tried the same on 5.7 and 5.3. npppd is works fine and clients can connect using windows pptp client. The Client has the pptp connection set as default gateway and can access the internet through the vpn gateway but cannot access the LAN ne

Re: npppd and pf

2015-11-13 Thread Jeremy
Hi Imre Thanks for your reply. I successfully translated your wiki. Your notes were very helpful. Manually adding an entry for proxy arp does seem to make the VPN work. Is this really the best solution for this issue though ? I would have to add an arp entry for every IP assigned by npppd

Re: npppd and pf

2015-11-12 Thread Imre Oolberg
Hi! I must apologize i didt read thru your text attentiatively but i believe it is because of arp. Although i am just an user of npppd i run it already for some time and i think it works very well. Here are my notes, see if there are some use for them, hope Google translates it, http

npppd and pf

2015-11-12 Thread Jeremy
I'm adding more functionality to my firewall (OpenBSD 5.7) and have been trying to configure PPTP VPN access for my Windows users. I have got npppd running using the config below and can successfully authenticate and establish a connection. I am able to connect to the VPN from a windows P

Questions about l2tp/IPsec with npppd on OpenBSD

2015-07-10 Thread Sevan / Venture37
Hi, I have a l2tp/IPsec VPN working on OpenBSD 5.6 with npppd. I have a couple of questions about npppd 1) How come it's not possible to the address assigned to a CARP interface on the OpenBSD host Here's what's logged when I try to connect using the IP address assigned to the CAR

Re: L2TP using Npppd and IPsec

2015-03-29 Thread Marko Cupać
d customer service requests, on another hand I am reading man > pages for npppd and ipsec on 5.7 and Giovanni's slides from two years > ago > > http://www.slideshare.net/GiovanniBechis/npppd-easy-vpn-with-openbsd > > for the talk he gave at BSDCan IIRC. I don't need to u

Re: L2TP using Npppd and IPsec

2015-03-27 Thread Predrag Punosevac
ith Windows, Mac, Linux and OpenBSD clients connecting. > > > > Very easy to configure (linux being the exception :p). > > > > You only need to change npppd.conf, npppd-users and ipsec.conf and you > are > > in business. > > > > I wrote an up-to-da

Re: L2TP using Npppd and IPsec

2015-03-27 Thread Dain Bentley
t; > > It is. > > Is anybody running similar setup in production? Any caveats? Any other >> advises before I take a plunge. >> > > Yes I am, with Windows, Mac, Linux and OpenBSD clients connecting. > > Very easy to configure (linux being the exception :p). > >

Re: L2TP using Npppd and IPsec

2015-03-27 Thread Brian S. Vangsgaard
with Windows, Mac, Linux and OpenBSD clients connecting. Very easy to configure (linux being the exception :p). You only need to change npppd.conf, npppd-users and ipsec.conf and you are in business. I wrote an up-to-date guide on how to do it, let me know if you want a copy. Caveats... yes

L2TP using Npppd and IPsec

2015-03-26 Thread Predrag Punosevac
am not a Windows uses but it seems that it should be trivial to setup client side https://www.hideipvpn.com/2010/03/howto-windows-7-ipsecl2tp-vpn-setup-tutorial/ and avoid customer service requests, on another hand I am reading man pages for npppd and ipsec on 5.7 and Giovanni's slides fro

problem with configuration npppd/ipsec for road warrior

2015-03-16 Thread Mika
Hi, i looking for a simple setup for npppd/ipsec for road warriors. We have some clients (road warriors) with dynamic ip-adresses connecting to a gateway by L2TP (macosx/ios/windows). Client (road warriors) --> GATEWAY --> Internet I just looking for a simple configuration for our open

two npppd users access different subnets behind openbsd firewall from their win7 workstations

2014-12-06 Thread Imre Oolberg
Hi! I have used very basic npppd setup for some years and it works for me alright, thanks! (From Windows 7 workstations.) It seems now i need to set up more complicated configuration. Say that firewall has three network interfaces re0 - public internet re1 - internal network one

Re: npppd and vpn connections on the same network

2014-12-01 Thread YASUOKA Masahiko
On Mon, 1 Dec 2014 11:38:31 -0500 trondd wrote: > I had this set up for an Android and an OSX client. Ignore the networks > part and configure the connections for the end points. I took the npppd > assigned IPs out of my DHCP range. I think I misunderstood your question. You want to

Re: npppd and vpn connections on the same network

2014-12-01 Thread trondd
I had this set up for an Android and an OSX client. Ignore the networks part and configure the connections for the end points. I took the npppd assigned IPs out of my DHCP range. My problems, though: Needed a specific npppd config for each client. Username, assigned IP, whatever else goes

Re: npppd and vpn connections on the same network

2014-12-01 Thread YASUOKA Masahiko
Yes. But there is a bug with Windows clients. See http://marc.info/?l=openbsd-misc&m=141627574522930&w=2 On Mon, 1 Dec 2014 12:42:41 +0100 Christer Solskogen wrote: > Hi! > > Is it possible to setup npppd so that the clients are on the same > network as the local netwo

npppd and vpn connections on the same network

2014-12-01 Thread Christer Solskogen
Hi! Is it possible to setup npppd so that the clients are on the same network as the local network behind the router/firewall? The only setups I've seen have the clients on a seperate network. -- chs

Re: npppd ipsec port 500 INVALID_MESSAGE_ID

2014-10-05 Thread Швецов Михаил
, 2014, at 5:51 PM, mishve...@rambler.ru wrote: I have OpenBSD 5.4 amd64. I install npppd and configure IPSec(l2tp + password). LAN 192.168.1.1/255.255.255.0 WAN(ISP NET; Connect by MAC ddress) 10.0.0.1/255.0.0.0 ISP GET ME GLOBAL IP SERVER1-Openbsd - 1.2.3.4 WIN 2003 SERVER2 IP - 9.8.7.6 WIN

Re: npppd ipsec port 500 INVALID_MESSAGE_ID

2014-10-04 Thread Zhi-Qiang Lei
On Oct 4, 2014, at 5:51 PM, mishve...@rambler.ru wrote: > I have OpenBSD 5.4 amd64. I install npppd and configure IPSec(l2tp + > password). > > LAN 192.168.1.1/255.255.255.0 > > WAN(ISP NET; Connect by MAC ddress) 10.0.0.1/255.0.0.0 > > ISP GET ME GLOBAL IP SERVER1-Op

Both PPTP and L2TP on npppd?

2014-10-01 Thread Zhi-Qiang Lei
I’m running a L2TP server using npppd on OpenBSD 5.5. Is it possible to run both PPTP and L2TP using npppd? I tried to append a tunnel for pptp in default configuration then my L2TP could not work. Best regards

Re: npppd Ipsec L2TP mtu issues.

2014-09-16 Thread YASUOKA Masahiko
On Mon, 15 Sep 2014 20:22:25 +0200 Jens Hansen wrote: > Thank you for your response. I've investegated a little further, I see the > following in /var/log/messages on the l2tp npppd server: > l2tpd ctrl=1 timeout waiting ack for hello packets. > l2tpd ctrl=1 call=28732 logtype=P

Re: npppd Ipsec L2TP mtu issues.

2014-09-15 Thread Jens Hansen
Thank you for your response. I've investegated a little further, I see the following in /var/log/messages on the l2tp npppd server: l2tpd ctrl=1 timeout waiting ack for hello packets. l2tpd ctrl=1 call=28732 logtype=PPPUnbind The client reports that the tunnel went down.. does this indidac

Re: npppd Ipsec L2TP mtu issues.

2014-09-13 Thread YASUOKA Masahiko
Hi, On Sun, 7 Sep 2014 21:00:31 +0200 Jens Hansen wrote: > I can successfully connect to my opensbsd 5.5. isakmpd / npppd IPSEC L2TP > vpn setup. > But (not knowing too much about netwoking) i think i'm having a mtu > problem. I can do low volume traffic fine, but transmit

npppd Ipsec L2TP mtu issues.

2014-09-07 Thread Jens Hansen
Hello list. I can successfully connect to my opensbsd 5.5. isakmpd / npppd IPSEC L2TP vpn setup. But (not knowing too much about netwoking) i think i'm having a mtu problem. I can do low volume traffic fine, but transmitting larger files stalls. I've tried as per suggested by others

Re: npppd advice

2014-08-03 Thread Theo de Raadt
> On 08/03/14 14:42, Stuart Henderson wrote: > > On 2014-08-03, Scott McEachern wrote: > >> I'd really like to upgrade to 5.6/-current, but for my connection to > >> work, I either have to abandon some features (MLPPP) with kernel-mode > >> pppoe, or go

Re: npppd advice

2014-08-03 Thread Scott McEachern
On 08/03/14 14:42, Stuart Henderson wrote: On 2014-08-03, Scott McEachern wrote: I'd really like to upgrade to 5.6/-current, but for my connection to work, I either have to abandon some features (MLPPP) with kernel-mode pppoe, or go with something completely new, like npppd. Not curr

Re: npppd advice

2014-08-03 Thread Stuart Henderson
On 2014-08-03, Scott McEachern wrote: > I'd really like to upgrade to 5.6/-current, but for my connection to > work, I either have to abandon some features (MLPPP) with kernel-mode > pppoe, or go with something completely new, like npppd. Not currently possible, npppd is server

  1   2   3   >