Hi,


I am trying to implement a Route-based VPN with Strongswan and XFRM Interfaces. 
My problem is that the traffic coming / going to that XFRM Interface will be 
blocked with "FORWARD REJECT".



Environment:

Debian 10 Buster (4.19.0-12)

Shorewall 5.2.3.2 (Debian Buster Repository)

iproute2 5.8.0-1 (Debian Buster backports, at least 5.1.0 is required for XFRM, 
default repo contains 4.20.0)



This is how the interface will be added:

ip link add ipsec30 type xfrm if_id 30 dev eth2
sysctl -w net.ipv4.conf.ipsec30.disable_policy=1
ip link set ipsec30 up



And set the required route(s):

ip route add 10.17.0.0/16 dev ens30



Shorewall config (only related to this VPN, other interfaces are directly 
connected to the firewall and ipv4):



zones

vpn30    ipv4



interfaces:

vpn30    ipsec30



I see two different behaviors based on the zone type.



In this example I try to connect to a host with SSH.



Client: 10.17.214.6

Server: 10.0.5.8



If the type is "ipv4" I see the reject on the incoming connection:

Oct 28 17:46:31 hostname kernel: [57864.415557] FORWARD REJECT IN=ipsec30 
OUT=eth3 MAC= SRC=10.17.14.6 DST=10.0.5.8 LEN=60 TOS=0x00 PREC=0x00 TTL=62 
ID=52462 DF PROTO=TCP SPT=39218 DPT=22 WINDOW=64240 RES=0x00
SYN URGP=0



If the type is "ipsec" I see the reject on the answer of the server I try to 
connect to:

Oct 28 17:46:50 hostname kernel: [57884.255061] FORWARD REJECT IN=eth3 
OUT=ipsec30 MAC=6e:04:7e:ca:5f:5e:3e:2b:36:91:b4:f6:08:00 SRC=10.0.5.8 
DST=10.17.14.6 LEN=60 TOS=0x00 PREC=0x00 TTL=63 ID=0 DF PROTO=TCP SPT=22 
DPT=39234 WINDOW=65160 RES=0x00 ACK SYN URGP=0



I also have tried the option routeback on the interface.



Can anyone help me with this behavior?



Thanks in advance.



Regards,

Peter
_______________________________________________
Shorewall-users mailing list
Shorewall-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/shorewall-users

Reply via email to