On Thu, 8 Feb 2024, Phil Nightowl wrote:

I would try 4.12.

Can you tell me that this is not strictly required to make it work? Of
course, I am going to upgrade at some point - but It will make my life much
easier if I don't have to do it on all hosts involved and right now.

No I can't without knowing a lot more and getting a lot more debug msgs,
and tracking down where we solved bugs in older versions :)

As a starting point,

If you do want to do opportunistic encryption, that really does assume
that there is no NAT to traverse and all nodes see each others real IP
address.

this is what I have missed in the docs so far. I have been using
opportunistic for 192.168.1.0/24 and it works (no NAT there). Primarily
not because I really need opportunistic encryption here (no unknown
hosts), but the way of configuring it (policies) seemed well arranged
and flexible to me.

We should make that more clear, sorry. Yes it is a nice way to do
"cloud encryption".

No problem switching away from opportunistic if that makes things work,
but out of curiosity: is it OK to mix regular and opportunistic
connections?

Yes. regular connections should always "win" from opportunistic ones.

I'm assuming you have roadwarriors (eg clients on dynamic IP that get an
internal IP assigned?)

Yes, I do - but they have been using a separate solution and I can keep it
that way for some time. They have the lowest priority right now.

So, here goes:

===================================
Config on server.privlan:

did not touch (yet). See below. I began with changing host1.privlan's
config to read

conn privlan-ssh
   type=passthrough
   left=%defaultroute
   right=%any
   auto=ondemand
   authby=never
   leftprotoport=tcp/%any
   rightprotoport=tcp/22

(flipped left/rightprotoport, since we're on the client here).

Unfortunately, after restarting I get:

host1 pluto[77105]: "privlan-ssh": added passthrough connection
...
host1 pluto[77105]: "privlan-ssh": cannot route template policy of 
AUTH_NEVER+PASS

Sorry, try this:

conn privlan-ssh
    type=passthrough
    left=%defaultroute
    right=%any
    auto=ondemand
    authby=never
    leftsubnet=0.0.0.0/0
    rightsubnet=0.0.0.0/0
    leftprotoport=tcp/%any
    rightprotoport=tcp/22

eg add the subnets.

Also, thanks for Cc:'ing me, please keep it that way. For some reason,
recently I get only a small fraction of the messages sent from the list.

Check your spam folder. Google enforced SPF/DKIM on all mail, as in they
started refusing large amounts of emails. We did fix the libreswan lists
to do this, so likely this is no longer happening to you.

Paul
_______________________________________________
Swan mailing list
[email protected]
https://lists.libreswan.org/mailman/listinfo/swan

Reply via email to