[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[no subject]



But if it works I want to try it.  Is there a *good* book dedicated on
implementation of IPSec in Linux?  'd also like to find a *good* book on
implementation of QoS in Linux.  And when I mean good I don't mean on
measly chapter simply going over what is in the man pages.  You know
what I mean.


On Fri, 2005-02-25 at 09:08, Michael H. Warfield wrote:
> On Fri, 2005-02-25 at 08:11 -0500, Christopher Fowler wrote:
> > Sure.  We have a FC2 server at our home office running our demo
> > software.  It is at  IP Address 192.168.3.1 and runs Vtun
&gt; &gt; (<a  rel="nofollow" href="http://vtun.sourceforge.net/";>http://vtun.sourceforge.net/</a>).  It listens on port 5001.  Our firewal
&gt; &gt; will send any traffic from the Internet on 5001 to 192.168.3.1:5001.  
&gt; 
&gt; 	Ah!  The missing detail!  You have a DNAT on one side.  That's
&gt; sufficient.
&gt; 
&gt; 	IPSec can do that as well.  Just forward 500/udp and 4500/udp and NAT-T
&gt; across the other NAT will work just fine.
&gt; 
&gt; &gt; At the customers site we ship a device that has vtun on it.  99.9% of
&gt; &gt; the time it too is behind a nat firewall and has a private IP.  The
&gt; &gt; device runs in client mode oand our server in server mode.  So the 
&gt; &gt; device tries to connect to 66.23.198.138:5001 and then our firewall
&gt; &gt; sends that to 192.168.3.1:5001.  It is authenticated and then pppd is
&gt; &gt; ran on each device.  PPP is used between the two.  The tunnel is
&gt; &gt; encrypted and compressed.  
&gt; 
&gt; &gt; In this model they don't meet in the middle.  One has to contact the
&gt; &gt; other.  This is why having them both behind NAT firewalls work.  So we
&gt; &gt; only have 1 server but we have 20 devices out there with a P-T-P tunnel
&gt; &gt; into that server.  Everyone of those devices are behind firewalls with
&gt; &gt; private IPs.
&gt; 
&gt; 	But, the question was, what configuration do you have where IPSec will
&gt; not work.  IPSec will work in this configuration.  Once side has a DNAT.
&gt; That's fine.  That' works equally well.
&gt; 
&gt; &gt; Why?  Our customer install devices in networks they do not control.  Our
&gt; &gt; software communicates on many ports.  It was a PITA to have our
&gt; &gt; customers instruct the network guys at the remote site what ports needed
&gt; &gt; to be open a nat'ed.  So it was just easier to have the device create a
&gt; 
&gt; 	But you just said one side had this.  That's all you need for any of
&gt; these to work.  The other side works through the NAT with NAT-T.
&gt; 
&gt; &gt; tunnel from inside the remote network and all our traffic could flow in
&gt; &gt; that tunnel.  The only issues we ever face is the fact that on the
&gt; &gt; remote network 5001 could be blocked for outgoing traffic.  That can
&gt; &gt; easily be fixed.
&gt; 
&gt; &gt; I'm not using OpenVPN.  I'm using Vtun.  Maybe that is why you're
&gt; &gt; confused as to how I've got it to work. 
&gt; 
&gt; 	Actually, no I'm not.  I understand, now, how you've got it to work,
&gt; but that's not how I was confused.  I was confused why you believed the
&gt; others wouldn't work.  Both OpenVPN and IPSec will work equally well in
&gt; the environment you described.  The statement was that this is why you
&gt; had to use an SSL based VPN.  But that's why I said &quot;Apples &lt;=&gt; Oranges&quot;
&gt; because SSL gives you no advantage there.  IPSec NAT-T even encorporates
&gt; &quot;keep alives&quot; to keep the NAT sessions &quot;warm&quot; and open for the UDP
&gt; activity.
&gt; 
&gt; 	So my statement was that I just don't see any advantage of an SSL based
&gt; VPN (vtun or stunnel or OpenVPN) over IPSec vis-a-vis NAT.  And I still
&gt; don't.
&gt; 
&gt; 
&gt; &gt; On Thu, 2005-02-24 at 23:59, Michael H. Warfield wrote:
&gt; &gt; &gt; On Thu, 2005-02-24 at 22:42 -0500, Christopher Fowler wrote:
&gt; &gt; &gt; &gt; Meet in the middle type negotiated is a problem.  Same reason I can't
&gt; &gt; &gt; &gt; simply use a tun device either.  For double NAT you need a client and
&gt; &gt; &gt; &gt; server model.  That is why I have to use SSL based Vtun
&gt; &gt; &gt; 
&gt; &gt; &gt; 	Apples &lt;=&gt; Oranges...
&gt; &gt; &gt; 
&gt; &gt; &gt; 	You need something on a public IP address.  That's why a Teredo server
&gt; &gt; &gt; must be on a public address.  But, once the negotiation is done, two
&gt; &gt; &gt; clients can communicate with each other behind NATs without involving
&gt; &gt; &gt; the server.
&gt; &gt; &gt; 
&gt; &gt; &gt; 	What you haven't shown me is how you get around not having a server on
&gt; &gt; &gt; a public IP.  If you have a server on a public IP, then IPSec over NAT
&gt; &gt; &gt; (using NAT-T) should work just fine (I do it all the time), even with
&gt; &gt; &gt; two clients behind NATs, but it routes through the server, as would
&gt; &gt; &gt; OpenVPN.  Outside of some of the weird magic Teredo pulls (you really
&gt; &gt; &gt; don't want to go there), almost all the VPNs require a server in the
&gt; &gt; &gt; middle or a static NAT translation in the traffic path.
&gt; &gt; &gt; 
&gt; &gt; &gt; 	I just don't see any advantage to an SSL based VPN over an IPSec VPN
&gt; &gt; &gt; for this purpose.  Can you give me an example (with configs) where you
&gt; &gt; &gt; have an SSL based VPN that works where an IPSec VPN would not?
&gt; &gt; &gt; 
&gt; &gt; &gt; 
&gt; &gt; &gt; &gt; On Thu, 2005-02-24 at 21:31, Michael H. Warfield wrote:
&gt; &gt; &gt; &gt; &gt; On Thu, 2005-02-24 at 20:48 -0500, Christopher Fowler wrote:
&gt; &gt; &gt; &gt; &gt; &gt; My #1 problem with IPSec is how it has to be used.  I have two devices
&gt; &gt; &gt; &gt; &gt; &gt; that needs a tunnel between them.  Both devices are behind a NAT
&gt; &gt; &gt; &gt; &gt; &gt; Firewall.  They do not have a public interface.  This is where IPSec is
&gt; &gt; &gt; &gt; &gt; &gt; useless.  IPSec requires that these devices have public interfaces.  In
&gt; &gt; &gt; &gt; &gt; &gt; my case I can only use a SSL based VPN like Vtun.  There are not any
&gt; &gt; &gt; &gt; &gt; &gt; other options.
&gt; &gt; &gt; &gt; &gt; 
&gt; &gt; &gt; &gt; &gt; &gt; Maybe I'm wrong about IPSec but based on what I've read it can't be
&gt; &gt; &gt; &gt; &gt; &gt; natted.  It has to be on a public interface.
&gt; &gt; &gt; &gt; &gt; 
&gt; &gt; &gt; &gt; &gt; 	IPSec can be NAT'ed under a variety of circumstances.  Some devices
&gt; &gt; &gt; &gt; &gt; actually attempt to NAT protocols 50 and 51 but this is highly
&gt; &gt; &gt; &gt; &gt; unreliable.  A better option is IPSec NAT-T, which is IPSec over UDP,
&gt; &gt; &gt; &gt; &gt; which is now supported by a released RFC.  What happens there is that
&gt; &gt; &gt; &gt; &gt; BOTH IKE and IPSec AH/ESP get encapsulated in UDP on port 4500.  That
&gt; &gt; &gt; &gt; &gt; fixes the single NAT case.  FreeSwan / Openswan / Stronswan all support
&gt; &gt; &gt; &gt; &gt; IPSec NAT-T, as does L2TP on Windows XP.  If you have a double NAT case,
&gt; &gt; &gt; &gt; &gt; I'm not sure how you would manage the &quot;meet in the middle&quot; negotiation
&gt; &gt; &gt; &gt; &gt; issue.  How does OpenVPN handle it?  In the IPv6 world, we have critters
&gt; &gt; &gt; &gt; &gt; such as Teredo which operate between two NAT'ed clients but it requires
&gt; &gt; &gt; &gt; &gt; the mediation of a Teredo server on a public address.  I can see
&gt; &gt; &gt; &gt; &gt; establishing a VPN tunnel (IPSec or SSL or IPv6) across clients that are
&gt; &gt; &gt; &gt; &gt; each NAT'ed as long as you have a public &quot;touch stone&quot; where they can
&gt; &gt; &gt; &gt; &gt; negotiate across a server.  But, one way or the other, the two NAT'ed
&gt; &gt; &gt; &gt; &gt; clients have to establish their endpoints from behind those NAT devices.
&gt; &gt; &gt; &gt; &gt; 
&gt; &gt; &gt; &gt; &gt; &gt; On Thu, 2005-02-24 at 18:54, Michael H. Warfield wrote:
&gt; &gt; &gt; &gt; &gt; &gt; &gt; On Tue, 2005-02-22 at 15:06 -0500, M Raju wrote:
&gt; &gt; &gt; &gt; &gt; &gt; &gt; &gt; I have been thinking of playing with OpenVPN and convert my existing
&gt; &gt; &gt; &gt; &gt; &gt; &gt; &gt; setup at home which comprises of mainly an IPSec VPN for WiFi/External
&gt; &gt; &gt; &gt; &gt; &gt; &gt; &gt; access - OpenBSD Firewall/Access Point running (ISAkmpd), Racoon on OS
&gt; &gt; &gt; &gt; &gt; &gt; &gt; &gt; X and OpenSWAN for Linux.
&gt; &gt; &gt; &gt; &gt; &gt; &gt; 
&gt; &gt; &gt; &gt; &gt; &gt; &gt; &gt; Anyone prefer SSL over IPSec? Found an interesting paper on OpenVPN Security -&gt; 
&gt; &gt; &gt; &gt; &gt; &gt; &gt; 
&gt; &gt; &gt; &gt; &gt; &gt; &gt; &gt; <a  rel="nofollow" href="http://www.sans.org/rr/papers/20/1459.pdf";>http://www.sans.org/rr/papers/20/1459.pdf</a>
&gt; &gt; &gt; &gt; &gt; &gt; &gt; 
&gt; &gt; &gt; &gt; &gt; &gt; &gt; 	Personally, I would avoid an ssl based VPN like the plague.  There is
&gt; &gt; &gt; &gt; &gt; &gt; &gt; no &quot;perfect forward secrecy&quot; or rekeying and the session keys can be
&gt; &gt; &gt; &gt; &gt; &gt; &gt; determined from the PKI authentication keys (in other words, if you
&gt; &gt; &gt; &gt; &gt; &gt; &gt; compromise the key from either end, you can decrypt the traffic, which
&gt; &gt; &gt; &gt; &gt; &gt; &gt; is not the case with IPSec w/ PFS and Diffie-Hellman).
&gt; &gt; &gt; &gt; &gt; 
&gt; &gt; &gt; &gt; &gt; 
&gt; &gt; &gt; &gt; &gt; &gt; &gt; &gt; _Raju
&gt; &gt; &gt; &gt; &gt; 
&gt; &gt; &gt; &gt; &gt; 	Mike


</pre>
<!--X-Body-of-Message-End-->
<!--X-MsgBody-End-->
<!--X-Follow-Ups-->
<hr>
<ul><li><strong>Follow-Ups</strong>:
<ul>
<li><strong><a name="00941" href="msg00941.html">[ale] SSL-based VPNs (OpenVPN) vs IPSec</a></strong>
<ul><li><em>From:</em> mhw at wittsend.com (Michael H. Warfield)</li></ul></li>
</ul></li></ul>
<!--X-Follow-Ups-End-->
<!--X-References-->
<ul><li><strong>References</strong>:
<ul>
<li><strong><a name="00859" href="msg00859.html">[ale] SSL-based VPNs (OpenVPN) vs IPSec</a></strong>
<ul><li><em>From:</em> protocoljunkie at gmail.com (M Raju)</li></ul></li>
<li><strong><a name="00927" href="msg00927.html">[ale] SSL-based VPNs (OpenVPN) vs IPSec</a></strong>
<ul><li><em>From:</em> mhw at wittsend.com (Michael H. Warfield)</li></ul></li>
<li><strong><a name="00928" href="msg00928.html">[ale] SSL-based VPNs (OpenVPN) vs IPSec</a></strong>
<ul><li><em>From:</em> cfowler at outpostsentinel.com (Christopher Fowler)</li></ul></li>
<li><strong><a name="00930" href="msg00930.html">[ale] SSL-based VPNs (OpenVPN) vs IPSec</a></strong>
<ul><li><em>From:</em> mhw at wittsend.com (Michael H. Warfield)</li></ul></li>
<li><strong><a name="00932" href="msg00932.html">[ale] SSL-based VPNs (OpenVPN) vs IPSec</a></strong>
<ul><li><em>From:</em> cfowler at outpostsentinel.com (Christopher Fowler)</li></ul></li>
<li><strong><a name="00935" href="msg00935.html">[ale] SSL-based VPNs (OpenVPN) vs IPSec</a></strong>
<ul><li><em>From:</em> mhw at wittsend.com (Michael H. Warfield)</li></ul></li>
<li><strong><a name="00936" href="msg00936.html">[ale] SSL-based VPNs (OpenVPN) vs IPSec</a></strong>
<ul><li><em>From:</em> cfowler at outpostsentinel.com (Christopher Fowler)</li></ul></li>
<li><strong><a name="00937" href="msg00937.html">[ale] SSL-based VPNs (OpenVPN) vs IPSec</a></strong>
<ul><li><em>From:</em> mhw at wittsend.com (Michael H. Warfield)</li></ul></li>
</ul></li></ul>
<!--X-References-End-->
<!--X-BotPNI-->
<ul>
<li>Prev by Date:
<strong><a href="msg00937.html">[ale] SSL-based VPNs (OpenVPN) vs IPSec</a></strong>
</li>
<li>Next by Date:
<strong><a href="msg00939.html">[ale] SSL-based VPNs (OpenVPN) vs IPSec</a></strong>
</li>
<li>Previous by thread:
<strong><a href="msg00937.html">[ale] SSL-based VPNs (OpenVPN) vs IPSec</a></strong>
</li>
<li>Next by thread:
<strong><a href="msg00941.html">[ale] SSL-based VPNs (OpenVPN) vs IPSec</a></strong>
</li>
<li>Index(es):
<ul>
<li><a href="maillist.html#00938"><strong>Date</strong></a></li>
<li><a href="threads.html#00938"><strong>Thread</strong></a></li>
</ul>
</li>
</ul>

<!--X-BotPNI-End-->
<!--X-User-Footer-->
<!--X-User-Footer-End-->
</body>
</html>