On Mon, 18 May 2020, Balaji Thoguluva wrote:

I have some general security-policies that just allow the traffic to pass 
through the system (i.e., no IPsec is applied to those traffic). Say for 
example, allow all traffic
of of certain source and destination IP and source and destination port as 5060 
(SIP traffic) not processed by IPsec. 

In that case, how do I convey this security-policy behavior to Libreswan via 
the script? What parameters need to be configured? Should I create a separate 
connection section?

I would still recommend you do not do this. Double encryption isn't the
worst these days. Excluding will allow people to see things even if not
encrypted. For example, TLS still leaks SNI in cleartext.

That said, you can simply create the exceptions by doing:

Individual conn solutions:

conn skip-tls-out
        left=%defaultroute
        right=0.0.0.0
        leftprotoport=tcp/0
        rightprotoport=tcp/443
        authby=never
        auto=route

You would do something similar but flipped for incoming TLS. If there is
a mismatch of these between hosts, all communication will fail because
whoever does not have the "cleartext hole" will drop the received clear
text traffic.

Mesh solution:

When using mesh encryption (Oportunistic IPsec), you can also specify
the nodes for specific "clear" using protocols and ports. In general,
longest prefix first wins with these type of rule matchines

# /etc/ipsec.d/policies/private
10.0.0.0/8

# /etc/ipsec.d/policies/clear
10.0.0.0/24  tcp  0  443
1.0.0.0/0    tcp  443  0


Paul
_______________________________________________
Swan-dev mailing list
[email protected]
https://lists.libreswan.org/mailman/listinfo/swan-dev

Reply via email to