again my 2 cent(o)s:
- strongswan to stay for S-2-S (supporting IKE2 explicitly now etc) - as it
has been working great (with some recent, multiple-remote subnet issues
resolved, with human-layer-8 problems will continue to exist - i.e.
misconfiguration)
- strongswan (L2TP/IpSec) remote VPN is pain and while universally
supported natively in all OS-es today-  it supports only 1 client behind a
single public IP (a common issue when multiple users/humans sitting in the
same office want to connect to the same VPC via Remote VPC) - no way to
seed routes, either route everything through the tunnel (and have you
internet dropped) or add routes manually (pain)

For remote VPN - I prefer to use what is a:
- de-facto industry standard (whatever that is)
- has great/long-term support on all client devices (desktops and mobiles)

Take a look at all major firewall/VPN concentrator devices, and you will
see what they offer (OpenVPN most of the time)

I understand some might like fancy and brand-new-nothing-simpler--than this
VPN solutions - but we should tryi to keep things within industry standards
IMO and leave fancy and not-yet-long-term-tested solutions out of the
consideration.

OpenVPN, as Rohit explained, has support for exporting you with the
configuration file, which you import and use your username/password - and
this works on all mobile devices and up (desktop OS-es) - and from what I
can see (because have multiple VPNs using myself for various different
customers) - it's 99,99% OpenVPN which is used <---- this kind information
should bring some "help" while deciding what to use

(btw, I'm not selling OpenVPN, nor preaching for it, nor have I ever "liked
it" for that matter, but it seems to be among the best-supported solutions
in every sense)

Cheers,

On Fri, 11 Jun 2021 at 17:04, Pierre-Luc Dion <pdion...@apache.org> wrote:

> btw, I like the idea of CloudStack offering OpenVPN as a solution !
>
> On Fri, Jun 11, 2021 at 10:40 AM Pierre-Luc Dion <pdion...@apache.org>
> wrote:
>
> > Just to be sure, what CloudStack > v4.15 uses Strongswan/l2tp or
> > strongswan/ikev2 ?
> >
> > Because l2tp became complicated to configure on native vpn clients on
> some
> > OSes, kind of deprecated remote management VPN, compared to IKEv2.
> > I'm a bit concerned about OpenVPN for the clients, what if binaries
> become
> > subscription based availability or become proprietary ?
> >
> > For sure we need the option to select what type of VPN solution to offer
> > when deploying a cloud.
> >
> > From my perspective I cannot use/offer OpenVPN as a solution to my
> > customers because it involves forcing them to download third party
> software
> > on their workstations and I don't want to be responsible for
> > a security breach on their workstation because of a requirement for 3rd
> > party software that we don't control.
> >
> >
> >
> > On Fri, Jun 11, 2021 at 10:14 AM Rohit Yadav <rohit.ya...@shapeblue.com>
> > wrote:
> >
> >> Thanks all for the feedback so far, looks like the majority of people on
> >> the thread would prefer OpenVPN but for s2s they may continue to prefer
> >> strongswan/ipsec for site-to-site VPC feature. If we're unable to reach
> >> consensus then a general-purpose provider-framework may be more
> flexible to
> >> the end-user or admin (to select which VPN provider they want for their
> >> network, we heard in this thread - openvpn, strongswan/l2tp, wireguard,
> and
> >> maybe other providers in future).
> >>
> >> Btw, ikev2 is supported now with strongswan with this -
> >> https://github.com/apache/cloudstack/pull/4953
> >>
> >> My personal opinion: As user of most of these VPN providers, I
> personally
> >> like OpenVPN which I found to be easier to use both on desktop/laptop
> and
> >> on phone. With openvpn as the default I imagine in CloudStack I could
> >> enable VPN for a network and CloudStack gives me an option to download a
> >> .ovpn file which I can import in my openvpn client (desktop, phone,
> cli...)
> >> click connect to connect to the VPN. For certificate generation/storage,
> >> the CA framework could be used so the openvpn server certs are the same
> >> across network restarts (with cleanup). I think a process like this
> could
> >> be simpler than what we've right now, and the ovpn download+import
> workflow
> >> would be easier than what we'll get from either strongswan/current or
> >> wireguard. While I like the simplicity of wireguard, which is more like
> SSH
> >> setup I wouldn't mind doing setup on individual VMs (much like setting
> up
> >> ssh key) or use something like TailScale.
> >>
> >>
> >> Regards.
> >>
> >> ________________________________
> >> From: Gabriel Bräscher <gabrasc...@gmail.com>
> >> Sent: Friday, June 11, 2021 19:28
> >> To: dev <dev@cloudstack.apache.org>
> >> Cc: users <us...@cloudstack.apache.org>
> >> Subject: Re: [DISCUSS] Moving to OpenVPN as the remote access VPN
> provider
> >>
> >> I understand that OpenVPN is a great option and far adopted.
> >> I am  ++1 in allowing Users/Admins to choose which VPN provider suits
> them
> >> best; creating an offering (or global settings) that would allow setting
> >> which VPN provider will be used would be awesome.
> >>
> >> I understand that OpenVPN is a great option and far adopted; however, I
> >> would be -1 if this would impact on removing support for Strongswan --
> >> which from what I understood is not the proposal, but saying anyway to
> be
> >> sure.
> >>
> >> Thanks for raising this proposal/discussion, Rohit.
> >>
> >> Cheers,
> >> Gabriel.
> >>
> >>
> >> Em sex., 11 de jun. de 2021 às 08:46, Pierre-Luc Dion <
> >> pdion...@apache.org>
> >> escreveu:
> >>
> >> > Hello,
> >> >
> >> > Daan, I agree we should provide capability to select the vpn solution
> to
> >> > use, the question would be,  should it be a global setting generic for
> >> the
> >> > whole region or per VPC?
> >> > I think it should be a global setting to reduce the requirement
> >> complexity
> >> > of a region, but per VPC or customer(account or domain) would be
> ideal.
> >> >
> >> > Hean, the current implementation from PR:2850
> >> > <https://github.com/apache/cloudstack/pull/2850> that use strongswan
> >> does
> >> > support multiple users behind the same public IPs, but I don't recall
> >> for
> >> > Windows generic clients.
> >> > With OpenVPN, can you be connected to multiple VPN tunnels at the same
> >> time
> >> > ? We had the challenge a few times where we needed to be connected to
> 2
> >> > VPCs at the same time.
> >> >
> >> > I think adding support to OpenVPN is a good idea, the more options
> >> > available the better Cloudstack will be.
> >> >
> >> > I don't know if 4.15 still uses L2TP from strongswan but we've moved
> >> away
> >> > from it a while ago because it was not reliable, connection kept
> >> > dropping, support only one windows client at a time, issue configuring
> >> > clients, no helpful connection logs..
> >> >
> >> > An interesting improvement is made to remote access VPN, would be to
> >> > optionally use dns resolution of the VR from VPN clients so a user
> >> > connected to the VPN could use hostname to access VMs. I think iptable
> >> > currently blocks dns query from the vpn.
> >> >
> >> > Cheers,
> >> >
> >>
> >>
> >>
> >> > On Fri, Jun 11, 2021 at 5:58 AM Hean Seng <heans...@gmail.com> wrote:
> >> >
> >> > > If thinking of only Site-to-Site VPN , then OpenVPN and WireGuard is
> >> no
> >> > > much different , or even current one is gpod.  Only only time setup
> at
> >> > > router.  However if considering of Mobile Client, OpenVPN is more
> >> > > complicated.
> >> > >
> >> > > The only concern now is multiple people in the same public IP need
> to
> >> > > access the VPN.  And this consideration will be OpenVPN or Wireguard
> >> to
> >> > > handle this requirement.   And for this purpose of multiple people
> in
> >> > same
> >> > > public ip need to access to VPN, then  we will have  think of
> >> usability
> >> > and
> >> > > easy installation of VPN client.
> >> > >
> >> > > We are using OpenVPN for more then 5 years, but always  there is new
> >> PC
> >> > > need to configure VPN Client, windows , android, ios, it is painful
> (
> >> we
> >> > > are not using access server) .
> >> > >
> >> > > Currently we test on WireGuard, just forgot about performance or
> >> > > whatsoever, just the conveniences of implementation,  that is very
> >> great
> >> > > and easy for client installation ,  even mobile client on phone or
> >> > tablet.
> >> > >
> >> > >
> >> > >
> >> > >
> >> > > On Fri, Jun 11, 2021 at 5:04 PM Daan Hoogland <
> >> daan.hoogl...@gmail.com>
> >> > > wrote:
> >> > >
> >> > > > This is a potential religious debate, I think it makes the most
> >> sense
> >> > to
> >> > > > try and make the provider optional and let the operator or even
> the
> >> > > > end-user decide. I see how this is an extra challenge, but does it
> >> make
> >> > > > sense?
> >> > > >
> >> > > > On Thu, Jun 10, 2021 at 10:24 AM Rohit Yadav <
> >> > rohit.ya...@shapeblue.com>
> >> > > > wrote:
> >> > > >
> >> > > > > All,
> >> > > > >
> >> > > > > We've historically supported openswan and nowadays strongswan as
> >> the
> >> > > VPN
> >> > > > > provider in VR for both site-to-site and remote access modes.
> >> After
> >> > > > > discussing the situation with a few users and colleagues I
> learnt
> >> > that
> >> > > > > OpenVPN is generally far easier to use, have clients for most OS
> >> and
> >> > > > > platforms (desktop, laptop, tablet, phones...)  and allows
> >> multiple
> >> > > > clients
> >> > > > > in the same public IP (for example, multiple people in the
> office
> >> > > > sharing a
> >> > > > > client-side public IP/nat while trying to connect to a VPC or an
> >> > > isolated
> >> > > > > network) and for these reasons many users actually deploy
> pfSense
> >> or
> >> > > > setup
> >> > > > > a OpenVPN server in their isolated network or VPC and use that
> >> > instead.
> >> > > > >
> >> > > > > Therefore for the point-to-point VPN use-case of remote access
> [1]
> >> > does
> >> > > > it
> >> > > > > make sense to switch to OpenVPN? Or, are there users using
> >> > > > > strongswan/ipsec/l2tpd for remote access VPN?
> >> > > > >
> >> > > > > A general-purpose VPN-framework/provider where an account or
> admin
> >> > (via
> >> > > > > offering) can specify which VPN provider they want in the
> network
> >> > > > > (strongswan/ipsec, OpenVPN, Wireguard...). However, it may be
> more
> >> > > > complex
> >> > > > > to implement and maintain. Any other thoughts in general about
> VPN
> >> > > > > implementation and support in CloudStack? Thanks.
> >> > > > >
> >> > > > > [1]
> >> > > > >
> >> > > >
> >> > >
> >> >
> >>
> http://docs.cloudstack.apache.org/en/latest/adminguide/networking_and_traffic.html#remote-access-vpn
> >> > > > >
> >> > > > >
> >> > > > >
> >> > > > > Regards.
> >> > > > >
> >> > > > >
> >> > > > >
> >> > > > >
> >> > > >
> >> > > > --
> >> > > > Daan
> >> > > >
> >> > >
> >> > >
> >> > > --
> >> > > Regards,
> >> > > Hean Seng
> >> > >
> >> >
> >>
> >
>


-- 

Andrija Panić

Reply via email to