I think that the patch works but I can't ping from the 10.0.0.0/24
network to 10.0.1.0/24.

I can ping from ISA to 10.0.0.1 (another VM connected), to 10.0.0.50
(loopback1) and 10.0.0.254 (inside if).

>From OBSD, I can ping from 10.0.0.254 (ping -I 10.0.0.254) to
10.0.1.254 and (ping -I 10.0.0.50) 10.0.0.50 to 10.0.1.254.

I can't ping from 172.26.10.82 and from the 10.0.0.1 machine.

# ifconfig
lo0: flags=8049<UP,LOOPBACK,RUNNING,MULTICAST> mtu 33224
        groups: lo
        inet 127.0.0.1 netmask 0xff000000
        inet6 ::1 prefixlen 128
        inet6 fe80::1%lo0 prefixlen 64 scopeid 0x5
pcn0: flags=8a43<UP,BROADCAST,RUNNING,ALLMULTI,SIMPLEX,MULTICAST> mtu 1500
        lladdr 00:0c:29:f0:70:e0
        groups: egress
        media: Ethernet autoselect (autoselect)
        inet 172.26.10.82 netmask 0xffffff00 broadcast 172.26.10.255
        inet6 fe80::20c:29ff:fef0:70e0%pcn0 prefixlen 64 scopeid 0x1
pcn1: flags=8843<UP,BROADCAST,RUNNING,SIMPLEX,MULTICAST> mtu 1500
        lladdr 00:0c:29:f0:70:ea
        media: Ethernet autoselect (autoselect)
        inet 10.0.0.254 netmask 0xffffff00 broadcast 10.0.0.255
        inet6 fe80::20c:29ff:fef0:70ea%pcn1 prefixlen 64 scopeid 0x2
pflog0: flags=141<UP,RUNNING,PROMISC> mtu 33224
enc0: flags=141<UP,RUNNING,PROMISC> mtu 1536
lo1: flags=8049<UP,LOOPBACK,RUNNING,MULTICAST> mtu 33224
        groups: lo
        inet 10.0.0.50 netmask 0xff000000

------------------

# cat /etc/pf.conf
#       $OpenBSD: pf.conf,v 1.34 2007/02/24 19:30:59 millert Exp $
#
# See pf.conf(5) and /usr/share/pf for syntax and examples.
# Remember to set net.inet.ip.forwarding=1 and/or net.inet6.ip6.forwarding=1
# in /etc/sysctl.conf if packets are to be forwarded between interfaces.

ext_if="pcn0"
int_if="pcn1"

#table <spamd-white> persist

set skip on { lo $int_if enc0 }

#scrub in

#nat-anchor "ftp-proxy/*"
#rdr-anchor "ftp-proxy/*"
nat on $ext_if from ! ($ext_if) -> ($ext_if:0)
#rdr pass on $int_if proto tcp to port ftp -> 127.0.0.1 port 8021
#no rdr on $ext_if proto tcp from <spamd-white> to any port smtp
#rdr pass on $ext_if proto tcp from any to any port smtp \
#       -> 127.0.0.1 port spamd

#anchor "ftp-proxy/*"

# Default Deny Rule
block in
#pass out

#pass quick on $int_if no state
#antispoof quick for { lo $int_if }

# OpenSSH Access
pass in on $ext_if proto tcp to ($ext_if) port ssh

# SMTP Access
#pass in log on $ext_if proto tcp to ($ext_if) port smtp
#pass out log on $ext_if proto tcp from ($ext_if) to port smtp

# Lan Access
pass on $int_if all

# IPSec Tunnel to ISA Server
pass in quick on $ext_if proto icmp from 172.26.10.83 to ($ext_if)
pass in quick on $ext_if proto udp from 172.26.10.83 to ($ext_if) port 500
pass in quick on $ext_if proto esp from 172.26.10.83 to ($ext_if)
pass out quick on $ext_if proto esp from ($ext_if) to 172.26.10.83

# Outbound Access
pass out keep state

-----------------------------------

# cat /etc/ipsec.conf
#       $OpenBSD: ipsec.conf,v 1.5 2006/09/14 15:10:43 hshoexer Exp $
#
# See ipsec.conf(5) for syntax and examples.

# Set up two tunnels using automatic keying with isakmpd(8):
#
# First between the networks 10.1.1.0/24 and 10.1.2.0/24,
# second between the machines 192.168.3.1 and 192.168.3.2.
# Use FQDNs as IDs.

#ike esp from 10.1.1.0/24 to 10.1.2.0/24 peer 192.168.3.2 \
#       srcid me.mylan.net dstid the.others.net
#ike esp from 192.168.3.1 to 192.168.3.2 \
#       srcid me.mylan.net dstid the.others.net

# Set up a tunnel using static keying:
#
# The first rule sets up the flow; the second sets up the SA.  As default
# transforms, ipsecctl(8) will use hmac-sha2-256 for authentication
# and aes for encryption.  hmac-sha2-256 uses a 256-bit key; aes
# a 128-bit key.

#flow esp from 192.168.7.0/24 to 192.168.8.0/24 peer 192.168.3.2
#esp from 192.168.3.1 to 192.168.3.2 spi 0xabd9da39:0xc9dbb83d \
#       authkey
0x54f79f479a32814347bb768d3e01b2b58e49ce674ec6e2d327b63408c56ef4e8:0x7f48ee352c626cdc2a731b9d90bd63e29db2a9c683044b70b2f4441521b622d6
\
#       enckey 
0xb341aa065c3850edd6a61e150d6a5fd3:0xf7795f6bdd697a43a4d28dcf1b79062d

ike esp from 10.0.0.0/24 to 10.0.1.0/24 peer 172.26.10.83 \
        main auth hmac-sha1 enc 3des group modp1024 \
        quick auth hmac-sha1 enc 3des group modp1024 \
        psk teste tag teste


On 9/3/07, Hans-Joerg Hoexer <[EMAIL PROTECTED]> wrote:
> Hi,
>
> could you try the attached diff, please?
>
> Index: message.c
> ===================================================================
> RCS file: /cvs/src/sbin/isakmpd/message.c,v
> retrieving revision 1.126
> diff -u -p -r1.126 message.c
> --- message.c   2 Jun 2007 01:29:11 -0000       1.126
> +++ message.c   3 Sep 2007 22:30:46 -0000
> @@ -927,6 +927,7 @@ message_validate_notify(struct message *
>         if (type < ISAKMP_NOTIFY_INVALID_PAYLOAD_TYPE ||
>             (type >= ISAKMP_NOTIFY_RESERVED_MIN &&
>             type < ISAKMP_NOTIFY_PRIVATE_MIN) ||
> +           type == ISAKMP_NOTIFY_STATUS_CONNECTED ||
>             (type >= ISAKMP_NOTIFY_STATUS_RESERVED1_MIN &&
>             type <= ISAKMP_NOTIFY_STATUS_RESERVED1_MAX) ||
>             (type >= ISAKMP_NOTIFY_STATUS_DOI_MIN &&

  • Re: IPSec José Costa

Reply via email to