On Tue, 9 Jun 2020, [email protected] wrote:

/etc/ipsec.d/policies/clear containing

/etc/ipsec.d/policies/private containing

Given this very short config (everything else being thus defaults), I
expected the built-in policy groups to apply, causing any connection
attempt to from 10.0.10.3 (which is the default interface's IP on that
host) towards 10.0.10.254 (ping, http, whatever) to trigger the usual
handshake/IKE activity. However, I do not see any of that and the outgoing
packets are happily transmitted in clear.

Any hints to what am I missing would be greatly appreciated.

You need to actually have a conn private and a conn clear. Those
group connections are then instantiated for each CIDR line in
the policy files clear and private.

Try adding those in a file, eg /etc/ipsec.d/mesh.conf

conn clear
        type=passthrough
        authby=never
        left=%defaultroute
        right=%group
        auto=ondemand

conn private
        left=%defaultroute
        leftid=%fromcert
        leftrsasigkey=%cert
        leftcert=clientcert
        # right
        rightrsasigkey=%cert
        rightid=%fromcert
        right=%opportunisticgroup
        failureshunt=drop
        negotiationshunt=drop
        auto=ondemand

I specified certificates here as authentication scheme, as you didn't
share what you were using to authenticate the nodes. You could need
to create PKCS#12 files for each node with a "friendly name" (export
name) of "clientcert" and use "ipsec import file.p12" once on each
node to import it.

Paul
_______________________________________________
Swan mailing list
[email protected]
https://lists.libreswan.org/mailman/listinfo/swan

Reply via email to