On Mon, 8 Oct 2018, Daniel Kahn Gillmor wrote:

I agree with the goals of this thread.  I've been nudging Paul for over
a year now with the hopes of getting something running that "just works"
with something as close to an "{apt|dnf} install libreswan" as possible.

Thanks for doing that. We are still working on making OE easier to use.

I agree with Kim that a web interface is *not* the way to go.  wireguard
configuration files are pretty simple, dumb .ini-file style configs that
identify peers by public key.

Note that it is not a fair comparison, as wireguard does a lot of
configuration out of band, such as DNS servers. It also hardcodes ports
and keys.

Below is the most complex example from wg(8):

          [Interface]
          PrivateKey = yAnz5TF+lXXJte14tji3zlMNq+hd2rYUIgJBgB3fBmk=
          ListenPort = 51820

          [Peer]
          PublicKey = xTIBA5rboUvnH4htodjb6e697QjLERt1NAB4mZqp8Dg=
          Endpoint = 192.95.5.67:1234
          AllowedIPs = 10.192.122.3/32, 10.192.124.1/24

So this translates to:

conn peer-to-peer
        left=%defaultroute
        leftrsasigkey=0xXXXXXXXXXXX
        leftsubnets=10.192.122.3/32,10.192.124.1/24
        right=192.95.5.67
        rightrsasigkey=0YYYYYYYY
        auto=start

(assuming I'm reading the meaning of AllowedIPs right)

That 7 lines versus 7 lines. It's really not that more complicated. It
is a myth. In fact, the whole demultiplexing / port usage of WG is more
complexity :P

The one thing I do dislike is our %defaultroute and %any values. It
would be nice if we could orient based on the private/public key and
pickup the IPs automatically. Still, that only saves you 1 line.

Can libreswan offer something comparably simple for users whose goal is
a "VPN"?  Or, if libreswan sees that targeted use case as not-in-scope,
is there some other use case that libreswan can offer a comparably
compelling minimalist configuration?

I'm not sure how we can be more minimum then this, it is the same as
wireguard.

Clearly we need a better marketing strategy and fancy website so people
will understand it better. But again, IKE/IPsec is not harder then
wireguard. We just have many more different kinds of deployments and
additional optional features.

Now, when you are talking about a real remote access VPN, I do agree
it is a little more complicated then desired:

conn vpn.nohats.ca
        left=%defaultroute
        leftcert=letoams.nohats.ca
        leftsubnet=0.0.0.0/0
        [email protected]
        right=vpn.nohats.ca
        rightsubnet=0.0.0.0/0
        narrowing=yes
        ikev2=insist
        leftmodecfgclient=yes

It would be nice if this could become:

conn vpn.nohats.ca
        type=remote-access-vpn
        leftcert=letoams.nohats.ca
        right=vpn.nohats.ca

Paul
_______________________________________________
Swan-dev mailing list
[email protected]
https://lists.libreswan.org/mailman/listinfo/swan-dev

Reply via email to