Yes it is "lo" for loopback, a keyboard error.
I can't do any modification because i'm not any more at work.
I will do changes Monday (GMT+4). I keep you inform, and of course thank
you very much for your help.

On Fri, 12 Mar 2010 16:54:50 +0100, Mitja MuE>eniD
 / Kerberos.si /
<mi...@kerberos.si> wrote:
> Just a quick reply because I was just going out - try to remove enc0 from
> the "set skip on {loi enc0}" line. If you skip enc0 then the binat rule
on
> enc0 won't work. Also, what is "loi"? You probably mean "lo".
> 
> If this doesn't help I'll look at your config again later tonight.
> 
>> -----Original Message-----
>> From: owner-m...@openbsd.org [mailto:owner-m...@openbsd.org] On Behalf
Of
>> open...@e-solutions.re
>> Sent: Friday, March 12, 2010 4:34 PM
>> To: misc@openbsd.org
>> Subject: Ipsec VPN and NAT
>> 
>> I'm trying to do vpn ipsec with nat. (I can do fully some test @ work
>> with
>> have sdsl with 5 ip address)
>> 
>> To resume i want to do ipsec vpn between Site A (192.168.0.0/24) and
Site
>> B
>> (192.168.0.0/24). They have same network address.
>> So i ve done done with this good article :
>> http://undeadly.org/cgi?action=artic...20090127205841 (from Mitja)
>> Tunnel is monted but i can't connect to workstations. Can you help me ?
>> Here is what i ve done :
>> 
>> PC1----PF1----------------INTERNET---------------------PF2---PC2
>> 
>> PF1 : OpenBSD 4.6
>> rl0 : connected to sdsl, have an ip fixe (11.11.11.11), this interface
is
>> the egress.
>> rl1 : our network, his ip address : 192.168.0.11
>> DNS : ISP
>> There's only PF,isakmpd(-K), and ipsec services. No dhcp, no bind
>> 
>> PF2 : OpenBSD 4.6
>> rl0 : connected to sdsl, have an ip fixe (22.22.22.22), this interface
is
>> the egress.
>> rl1 : our network, his ip address : 192.168.0.12
>> There's only PF,isakmpd(-K), and ipsec services. No dhcp, no bind
>> 
>> PC1 : XP PRO (workgroup)
>> IP : 192.168.0.93/24 should be 192.168.1.93 using NAT
>> Gateway : 192.168.0.11
>> DNS : ISP
>> 
>> PC2 : XP PRO (workgroup)
>> IP : 192.168.0.92/24 should be 192.168.2.92 using NAT
>> Gateway : 192.168.0.12
>> DNS : ISP
>> 
>> When i type on a PF machine (PF1 or PF2) : ipsecctl -sa, there's flow
and
>> sa.
>> Tunnel is monted. I can verify it using tcpdump -i enc0 on PF1, type
>> tracert 192.168.1.93 (using PC2). There's traffic encrypted
>> 
>> ipsecctl -sa on PF2 :
>> FLOWS:
>> flow esp in from 192.168.1.0/24 to 192.168.0.0/24 peer 11.11.11.11 srcid
>> 22.22.22.22/32 dstid 11.11.11.11/32 type use
>> flow esp out from 192.168.0.0/24 to 192.168.1.0/24 peer 11.11.11.11
srcid
>> 22.22.22.22/32 dstid 11.11.11.11/32 type require
>> SAD:
>> esp tunnel from 11.11.11.11 to 22.22.22.22 spi 0x14f92c81 auth hmac-sha1
>> enc aes-256
>> esp tunnel from 22.22.22.22 to 11.11.11.11 spi 0xb1b3d4a6 auth hmac-sha1
>> enc aes-256
>> 
>> Test i ve done :
>> On machine PC1(192.168.0.93), i tryied ping PC2 using NAT 192.168.2.92
>> (doesn't work), i ve the following on the PF2 console using tcpdump -i
>> enc0
>> :
>> 
>> tcpdump: listening on enc0, link-type ENC
>> 18:31:36.608877 (authentic,confidential): SPI 0x14f92c81: 192.168.0.93 >
>> 192.168.2.92: icmp: echo request (encap)
>> 18:31:41.818990 (authentic,confidential): SPI 0x14f92c81: 192.168.0.93 >
>> 192.168.2.92: icmp: echo request (encap)
>> 18:31:47.329048 (authentic,confidential): SPI 0x14f92c81: 192.168.0.93 >
>> 192.168.2.92: icmp: echo request (encap)
>> 18:31:52.846117 (authentic,confidential): SPI 0x14f92c81: 192.168.0.93 >
>> 192.168.2.92: icmp: echo request (encap)
>> ^C
>> 4 packets received by filter
>> 0 packets dropped by kernel
>> 
>> Conclusion, something is missing, PF can't redirect packet to the
>> machine.
>> he doesnt know who is 192.168.1.93 (should be 192.168.0.93 in real)
>> Have you an idea? On the document :
>> http://undeadly.org/cgi?action=artic...20090127205841 He talks about
need
>> to use split dns to it works ? is it really necessary ? If yes how can i
>> do
>> that ?
>> Can you help me ? See pf.conf, ipsec.conf :
>> 
>> ipsec.conf (PF1):
>> ike esp from 192.168.1.0/24 (192.168.0.0/24) to 192.168.2.0/24 \
>> peer 22.22.22.22 \
>> main auth hmac-sha1 enc aes-256 group modp1024 \
>> quick auth hmac-sha1 enc aes-256 group modp1024 \
>> psk "thisisanexample"
>> 
>> ipsec.conf (PF2):
>> ike esp from 192.168.2.0/24 (192.168.0.0/24) to 192.168.1.0/24 \
>> peer 11.11.11.11 \
>> main auth hmac-sha1 enc aes-256 group modp1024 \
>> quick auth hmac-sha1 enc aes-256 group modp1024 \
>> psk "thisisanexample"
>> 
>> pf.conf (PF1) :
>> me="11.11.11.11"
>> distant="22.22.22.22"
>> set skip on {loi enc0}
>> set block-policy drop
>> nat on egress from rl1:network to any -> egress
>> binat on enc0 inet from 192.168.0.0/24 to 192.168.2.0/24 ->
>> 192.168.1.0/24
>> block in log on egress
>> pass in on egress inet proto udp from $distant to $me port 500
>> pass in on egress inet proto udp from $distant to $me port 4500
>> pass in on egress proto esp from $distant to $me
>> pass out keep state
>> 
>> pf.conf (PF2) :
>> me="22.22.22.22"
>> distant="11.11.11.11"
>> set skip on {loi enc0}
>> set block-policy drop
>> nat on egress from rl1:network to any -> egress
>> binat on enc0 inet from 192.168.0.0/24 to 192.168.1.0/24 ->
>> 192.168.2.0/24
>> block in log on egress
>> pass in on egress inet proto udp from $distant to $me port 500
>> pass in on egress inet proto udp from $distant to $me port 4500
>> pass in on egress proto esp from $distant to $me
>> pass out keep state

Reply via email to