On 7/28/2010 8:46 PM, Matthew Grooms wrote:
On 7/28/2010 9:29 AM, Ian Fraser wrote:
Hi, I have a problem with the Shrew Soft Windows VPN client and would
like to submit the following bug report:

Problem: Recently changed from Junipers VPN client to Shrew Soft's
VPN client for windows. I happily completed all testing without a
problem. After the users switched some of them complained of various
behaviour such as: Connects RDP client for a short while(10-20 mins)
then disconnects and refuses to reconnect. Tunnel comes up, until try
they to connect the RDP client, then the tunnel drops. Tunnel comes
up, but RDP client fails to connect.

After some time, it emerged that the users experiencing these
problems were using home connections that used the same subnet range
as our internal network (192.168.1.0/24 for example). I am hoping
that because other VPN client software can cope with this situation,
this is not an insurmountable problem.

VPN Client Version : 2.1.5-release (have also tried 2.1.6-rc-1)
Windows OS : Windows Vista and XP Gateway Make/Model: Juniper SSG-140
Gateway OS version: 5.4


Hi Ian,

I can only think of one way to cope with this situation and that's to
cut off access to the local network by promoting the identical route
that points the distant network. The Shrew Soft client is designed to
increment the route metric on existing routes and use the lowest route
metric possible to reach distant networks. I'll try to re-create the
scenario you describe and see if I can re-produce, and with any luck,
correct the issue.


Hi Ian,

I did some investigation and this is what I found. The client does do a pretty good job of demoting existing routes and promoting the routes it adds for tunneling. But since the client responds to ARP requests based on the IPsec policies ( and there was an IPsec policy for the local network because it exists remotely as well ), the host would get really confused because it was receiving ARP responses on the real adapter as well as the virtual adapter. In fact, you could see it bouncing between the two interfaces using arp -a at the command line.

In any case, the client now does a lookup to see if a gateway is used to reach the VPN gateway. If so, we install a NONE policy to ensure that packets destined to the gateway won't match an IPsec policy. The ARP code was also modified to ensure that we won't respond to a request coming from our virtual adapter to resolve the gateway MAC. This should get you closer to what you want. Please let me know how it goes ...

http://www.shrew.net/download/vpn/vpn-client-2.1.6-arpfix-1.exe

But I will say this, having networks overlap is a good way to get into trouble fast. For example, lets say your user is trying to remotely RDP into a Windows server at 192.168.1.10. His home network is configured for DHCP and he gets handed the address 192.168.1.9. Things work great. But later, he is woken in the middle of the night because there is an emergency. He fires his computer back up and gets handed out ( yup, you guessed it ) 192.168.1.10. No amount of route manipulation or trickery will allow a host to RDP to 192.168.1.10 when he has the same address assigned to a local interface. It just isn't going to happen. Your best option is to renumber your work network to something that every Tom, Dick and Harry wont have setup by default in the SOHO router. Believe me, you will sleep better at night.

-Matthew
_______________________________________________
vpn-help mailing list
[email protected]
http://lists.shrew.net/mailman/listinfo/vpn-help

Reply via email to