public inbox for development@lists.ipfire.org
 help / color / mirror / Atom feed
From: "Peter Müller" <peter.mueller@link38.eu>
To: development@lists.ipfire.org
Subject: Re: IPSec Roadwarrior Configuration
Date: Mon, 29 Jan 2018 15:58:50 +0100	[thread overview]
Message-ID: <20180129155850.6dbe2413.peter.mueller@link38.eu> (raw)
In-Reply-To: <b6b91c5f-705e-1721-e9db-d23706266bd1@rymes.com>

[-- Attachment #1: Type: text/plain, Size: 3832 bytes --]

Hello Tom,

I completely agree with you. Setting up IPsec connections between two
IPFire machines works well out of the box, but everything else is really
complicated.

> I suppose that this isn't particularly "Development" related, but I 
> think it does touch upon features and functionality that are important 
> to making the project attractive to new users and I also think that, 
> perhaps, some changes might be needed to the WUI to keep up with changes 
> to clients. I would think that a tried-and-true configuration that makes 
> it easy for any user to implement a VPN using built-in clients would be 
> a major benefit to the project.
> 
> IPFire supports two methods for roadwarrior VPN clients, OpenVPN and 
> IPSec. Of these, OpenVPN requires a client, while IPSec is supported 
> natively by most or all major operating systems. For various reasons, I 
> prefer IPSec.
Me to.
> 
> Perusing the internet, one can find many tutorials for how to configure 
> Strongswan to work with roadwarrior clients, and some of them might even 
> work. There seems to be a lot of confusion out there over which settings 
> are needed to support the various client OSs, too.
> 
> Most importantly, the WUI makes it look like this should just work out 
> of the box, but I have not been able to find a good tutorial for using 
> the WUI in IPFire to accomplish this task. There is one here:
> 
> https://wiki.ipfire.org/configuration/services/ipsec/example_configuration-_roadwarrior_with_windows
> 
> However, it is missing many details, and has not kept up with changes in 
> the WUI. Worse, still, it requires one to manually modify the 
> configuration files, which, ideally, should not be necessary.
+1
> 
> After messing about with that tutorial, I have succeeded in connecting a 
> Windows 10 computer, but I have not been able to succeed with a MacOS 
> device, and I haven't even dared to try with iOS.
I currently struggle setting up an IPsec connection to an OpenBSD machine.
IKE seems to work fine now, but IPFire seems to request a sort of "virtual
IP request". This is unwanted since the OpenBSD road warrior is supposed
to have a static IP.

Log snippet:

21:21:41 charon:  13[IKE] failed to establish CHILD_SA, keeping IKE_SA 
21:21:41 charon:  13[IKE] traffic selectors 10.XXX.XXX.0/24 10.YYY.YYY.0/24 === 10.ZZZ.ZZZ.0/24 10.ZZZ.ZZZ.0/24 inacceptable 
21:21:41 charon:  13[IKE] expected a virtual IP request, sending FAILED_CP_REQUIRED 

Has anybody managed to set up an road warrior connection with a static
IP on the remote end with Linux or OpenBSD?

@Michael: Any hints? :-)

Generally, it seems that quite some bugs are related to IPsec: For example,
even though a N2N connection is using /24 remote networks, it says it uses
a /3 (virtually _everything_) at the main WebUI page...

Best regards,
Peter Müller
> 
> As it stands, it is unclear what one should enter for the fields Remote 
> host/IP, Remote Subnet, Local ID, and Remote ID, and I am still unclear 
> on what the proper settings for IKE/ESP settings, DPD, and the other 
> options at the bottom of the page are.
> 
> I will continue to experiment and do my best to update the docs, but I'm 
> flying pretty blind here. This leads me to a few questions (the forum 
> has not been of much help in this area):
> 
> 1.) Does anyone have a good tutorial that they can provide to help me in 
> making this work and in improving the documentation?
> 2.) What changes to the WUI, if any, are needed to avoid the need to 
> manually edit text files and properly support RoadWarrior connections to 
> Windows 7/8/10, MacOS, Android, and iOS?
> 3.) What changes need to be made to the certs, configs, etc to support 
> MacOS, iOS, and Android?
> 
> Many thanks,
> 
> Tom



  reply	other threads:[~2018-01-29 14:58 UTC|newest]

Thread overview: 4+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2018-01-24 20:33 Tom Rymes
2018-01-29 14:58 ` Peter Müller [this message]
2018-01-29 17:26   ` Tom Rymes
2018-01-29 17:50     ` Tom Rymes

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=20180129155850.6dbe2413.peter.mueller@link38.eu \
    --to=peter.mueller@link38.eu \
    --cc=development@lists.ipfire.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox