Tom Eastep wrote:
> Lukasz Spaleniak wrote:
> 
> The relevant policies are these:
> 
>> fw-wro:~# setkey -DP
>> 192.168.6.0/24[any] 10.1.0.0/24[any] any
>>         in ipsec
>>         esp/tunnel/195.205.11.34-195.205.101.2/unique#16453
>>         created: Jan 13 14:10:16 2008  lastused:
>>         lifetime: 0(s) validtime: 0(s)
>>         spid=2552 seq=1 pid=24325
>>         refcnt=1
> 
> ...
> 
>> 192.168.6.0/24[any] 10.1.0.0/24[any] any
>>         out ipsec
>>         esp/tunnel/195.205.101.2-195.205.142.34/unique#16458
>>         created: Jan 13 14:10:16 2008  lastused: Jan 22 21:37:06 2008
>>         lifetime: 0(s) validtime: 0(s)
>>         spid=2617 seq=9 pid=24325
>>         refcnt=1
> 
> Given that the netfilter policy match is not recognizing vpn->vpn traffic as
> matching the first policy, I guess you will need to augment the definition of
> the vpn zone as follows:
> 
> 
> hosts:
> #ZONE   HOST(S)                                 OPTIONS
> vpn     eth0:192.168.6.0/24,195.205.11.34       ipsec
> vpn     eth0:10.1.0.0/24,195.205.142.34         ipsec
> vpn     eth0:192.168.10.0/24,84.40.238.125      ipsec
> vpn     eth0:192.168.6.0/24,
> vpn     eth0:10.1.0.0/24
> vpn     eth0:192.168.10.0/24
> 
> I notice that you don't have any SPs for the gateways themselves. So you 
> should
> probably leave them out of the vpn zone definition altogether (although I 
> left them
> in above).
> 

Given this limitation of the policy match, it would actually be more secure
to define the net<->net SPs directly between the endpoints and not involve
the "central HUB" (define tunnels from 195.205.11.34 and 192.205.142.34,
between 195.205.142.34 and 84.40.238.125, ...). And fw-wro wouldn't have
to handle all of the VPN traffic between the other endpoints (including
decrypting and encrypting every routed packet).

-Tom
-- 
Tom Eastep    \ Nothing is foolproof to a sufficiently talented fool
Shoreline,     \ http://shorewall.net
Washington USA  \ [EMAIL PROTECTED]
PGP Public Key   \ https://lists.shorewall.net/teastep.pgp.key

Attachment: signature.asc
Description: OpenPGP digital signature

-------------------------------------------------------------------------
This SF.net email is sponsored by: Microsoft
Defy all challenges. Microsoft(R) Visual Studio 2008.
http://clk.atdmt.com/MRT/go/vse0120000070mrt/direct/01/
_______________________________________________
Shorewall-users mailing list
Shorewall-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/shorewall-users

Reply via email to