On 01/05/2018 02:46 PM, Colony.three via Shorewall-users wrote:
> On 12/14/2017 02:55 PM, cac...@quantum-sci.com
> <mailto:cac...@quantum-sci.com> wrote:
>>
>>     On 12/14/2017 02:50 PM, Tom Eastep wrote:
>>
>>         On 12/14/2017 02:28 PM, Colony.three via Shorewall-users wrote:
>>
>>             I have a VM which is the LAN router, and another VM in the
>>             LAN which
>>             is the ipsec gateway. (strongswan)
>>             I'm not fully understanding the guide here; 
>>             http://www.shorewall.net/IPSEC-2.6.html
>>
>>              *
>>                 Does this still apply to kernel 4.*?  There isn't a
>>                 http://www.shorewall.net/IPSEC.html
>>                 http://www.shorewall.net/IPSEC-2.6.html
>>              *
>>                 It doesn't say to set up DNAT on the router.  How does
>>                 the router
>>                 know where the ipsec gateway is?
>>              *
>>                 On the laptop, tunnels should be set as:  ipsec net
>>                 206.162.148.9
>>                 vpn.  But what is that IP?  The dynamic IP of the
>>                 laptop, or the
>>                 outside interface of the remote router?
>>              *
>>                 If the latter, is there a way in the laptop's tunnels
>>                 to, instead of
>>                 an explicit IP, do a DNS request, to get that remote IP?
>>              *
>>                 Wouldn't I need to set up DNAT in and SNAT out for
>>                 ports 500 and 4500?
>>              *
>>                 How do I enable protocols 50 & 51?  Would that be on
>>                 one or both ports?
>>
>>         There is no Shorewall document that describes configuring the
>>         local
>>         responding endpoint on a system behind the Shorewall hosts. Such a
>>         configuration is of very limited utility, since it only allows
>>         remote
>>         access to the local endpoint host, and not to any other local host
>>         (including the Shorewall host). So the IPSEC-2.6 document only
>>         covers
>>         the case where the Shorewall host is the local responding
>>         endpoint.
>>         If you really want to configure a host behind the firewall as your
>>         local responding endpoint, then you must:
>>         a) Configure IPSEC to use Nat Traversal.
>>         b) DNAT UDP 500 and 4500 to the local endpoint host.
>>         You don't need to worry about the other protocols, as they will
>>         be encapsulated within UDP port 4500 packets.
>>         -Tom
>>
>>     Thanks.  The reason I have this structure in mind is, if ipsec is
>>     compromised, I want the ne'er-do-well to end up in a benign VM, -not-
>>     the router.
>>     You're saying though if I do it this way, then the remote laptop
>>     can not
>>     access machines on the LAN other than the gateway?  Surely there's an
>>     ipsec setting.
>>
>>  
>> No. You might be able to work around this by using SNAT on the endpoint
>> system, such that all traffic from the remote laptop through the local
>> endpoint is made to look like it came from the local endpoint host
>> itself. Like all NAT, that's a bit of a hack. You wouldn't need
>> Shorewall on the local endpoint for that; you could simply execute:
>>  
>> iptables -t nat -A POSTROUTING -j MASQUERADE
>>
>>
>>      
>>     during boot.
>>      
>>     -Tom
>>
> 
> I have Shorewall running on all machines.  :j
> 
> Is there a way to do this in Shorewall?  The masq file?
> 
> I have  net.ipv4.ip_forward = 1 set in /etc/syscfg.conf.
> 
> I guess this would allow packets to be masqueraded through the Libreswan
> gateway to the rest of the LAN -- but out the same interface? (There is
> only one in this VM)
> 
> If masquerading can happen out the same interface, does this mean
> packets can also go out the LAN router to The The Internets? (Which is
> the goal)

Yes.

-Tom
-- 
Tom Eastep        \   Q: What do you get when you cross a mobster with
Shoreline,         \     an international standard?
Washington, USA     \ A: Someone who makes you an offer you can't
http://shorewall.org \   understand
                      \_______________________________________________

Attachment: signature.asc
Description: OpenPGP digital signature

------------------------------------------------------------------------------
Check out the vibrant tech community on one of the world's most
engaging tech sites, Slashdot.org! http://sdm.link/slashdot
_______________________________________________
Shorewall-users mailing list
Shorewall-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/shorewall-users

Reply via email to