1. what is the (0.0.0.0/0) good for?2. how are you inspecting traffic in the
tunnel?3. is nat allowed in the tunnel? 4. you may have let in more networks
than you realize
-damon

--- On Thu, 11/25/10, Andrea Parazzini <a.parazz...@sirtisistemi.net> wrote:

From: Andrea Parazzini <a.parazz...@sirtisistemi.net>
Subject: ipsec vpn unexpected flow
To: misc@openbsd.org
Date: Thursday, November 25, 2010, 2:40 PM

Hi,
we have a vpn connection with a customer.
The remote peer is not under our management.
Our box is an OpenBSD 4.7 i386.
We have configured the vpn as follows:

/etc/rc.conf.local
ipsec=YES
isakmpd_flags="-K -v"

/etc/ipsec.conf
ike active esp tunnel \
  from 10.1.0.0/16 (0.0.0.0/0) to 192.168.90.0/24 \
  local A.B.C.D peer W.X.Y.Z \
  main auth hmac-sha1 enc 3des group modp1024 \
  quick auth hmac-sha1 enc 3des group modp1024 \
  psk "PRESHAREDKEY"


The vpn works fine, but there is a strange thing.
Whith "netstat -nrf encap" I see something like:

Source         Port  Destination    Port  Proto  SA
192.168.71/24  0     10.1/16        0     0      W.X.Y.Z/esp/use/in
10.1/16        0     192.168.71/24  0     0      W.X.Y.Z/esp/require/out
192.168.90/24  0     default        0     0      W.X.Y.Z/esp/use/in
default        0     192.168.90/24  0     0      W.X.Y.Z/esp/require/out

As you can see there is a flow that is not configured on our box.
It is probably configured on the remote peer.
Is a normal behavior?
How can I protect myself from an incorrect configuration on the remote
peer?

Thanks.

Regards,
Andrea

Reply via email to