Re: help configuring an ipv6 wg vpn

2025-07-28 Thread Stuart Henderson
On 2025-07-27, Omar Polo wrote: > Florian Obser wrote: >> RFC 4291 2.1: >>All interfaces are required to have at least one Link-Local unicast >>address > > thanks for the pointer! Now my question becomes how to add such address > to a wg(4) device however. there's no need for this to ge

Re: help configuring an ipv6 wg vpn

2025-07-28 Thread Stuart Henderson
On 2025-07-27, Omar Polo wrote: > Hello, > > I'm moving my first baby steps in ipv6 land and I'm a bit confused about > routing. I'm trying to build a vpn on wireguard, but only the ipv4 part > of it it's working. I suspect there's an issue in how I'

Re: help configuring an ipv6 wg vpn

2025-07-28 Thread B. Atticus Grobe
On Mon, Jul 28, 2025, 02:38 Claudio Jeker wrote: > On Sun, Jul 27, 2025 at 11:51:25PM +0200, Omar Polo wrote: > > Florian Obser wrote: > > > RFC 4291 2.1: > > >All interfaces are required to have at least one Link-Local unicast > > >address > > > > thanks for the pointer! Now my questio

Re: help configuring an ipv6 wg vpn

2025-07-28 Thread Claudio Jeker
On Mon, Jul 28, 2025 at 08:41:40AM +0200, Florian Obser wrote: > On 2025-07-28 07:25 +02, Claudio Jeker wrote: > > On Sun, Jul 27, 2025 at 11:51:25PM +0200, Omar Polo wrote: > >> Florian Obser wrote: > >> > RFC 4291 2.1: > >> >All interfaces are required to have at least one Link-Local unicas

Re: help configuring an ipv6 wg vpn

2025-07-27 Thread Florian Obser
On 2025-07-28 07:25 +02, Claudio Jeker wrote: > On Sun, Jul 27, 2025 at 11:51:25PM +0200, Omar Polo wrote: >> Florian Obser wrote: >> > RFC 4291 2.1: >> >All interfaces are required to have at least one Link-Local unicast >> >address >> >> thanks for the pointer! Now my question becomes

Re: help configuring an ipv6 wg vpn

2025-07-27 Thread Claudio Jeker
On Sun, Jul 27, 2025 at 11:51:25PM +0200, Omar Polo wrote: > Florian Obser wrote: > > RFC 4291 2.1: > >All interfaces are required to have at least one Link-Local unicast > >address > > thanks for the pointer! Now my question becomes how to add such address > to a wg(4) device however. >

Re: help configuring an ipv6 wg vpn

2025-07-27 Thread Omar Polo
Florian Obser wrote: > RFC 4291 2.1: >All interfaces are required to have at least one Link-Local unicast >address thanks for the pointer! Now my question becomes how to add such address to a wg(4) device however. I've tried with a (dumb, but here's all i know) `inet6 autoconf' on the w

Re: help configuring an ipv6 wg vpn

2025-07-27 Thread Florian Obser
onfused about > routing. I'm trying to build a vpn on wireguard, but only the ipv4 part > of it it's working. I suspect there's an issue in how I'm configuring > the client, but I'm not sure how to debug. > > My setup is as follows. On the vps i have a /48: >

help configuring an ipv6 wg vpn

2025-07-27 Thread Omar Polo
Hello, I'm moving my first baby steps in ipv6 land and I'm a bit confused about routing. I'm trying to build a vpn on wireguard, but only the ipv4 part of it it's working. I suspect there's an issue in how I'm configuring the client, but I'm not sure how to

Re: Strongswan VPN successfull, but cannot ping anything

2025-04-27 Thread 나홍연
Yes. I followed all the steps in pkg-readmes. The following is the ipsec.conf I set. === $ cat /etc/strongswan/ipsec.conf # ipsec.conf - strongSwan IPsec configuration file # basic configuration config setup     # strictcrlpolicy=yes     # uniqueids = no # Add conn

Re: Strongswan VPN successfull, but cannot ping anything

2025-04-27 Thread Stuart Henderson
On 2025-04-20, 나홍연 wrote: > Hello, my name is Na Hongyeon and I live in Korea. > When I connect using MSCHAP-V2 for EAP authentication with StrongSwan, > it says that it was successful, but when I ping test it, there is no > actual connection. StrongSwan isn't really well tested on OpenBSD (and

Strongswan VPN successfull, but cannot ping anything

2025-04-20 Thread 나홍연
Hello, my name is Na Hongyeon and I live in Korea. When I connect using MSCHAP-V2 for EAP authentication with StrongSwan, it says that it was successful, but when I ping test it, there is no actual connection. Below is the output from the command "ipsec up Leo-CoreaVPN-C". I was wondering if th

pf.conf OpenBSD 7.5 Server VPN.

2025-04-04 Thread latinfo
Hello misc I have a problem with ikev2 pf rules, could someone help please?: Server pf recommend at openbsd web: pass in log on $ext_if proto udp from 198.51.100.1 to 192.0.2.1 port {isakmp, ipsec-nat-t} tag IKED pass in log on $ext_if proto esp from 198.51.100.1 to 192.0.2.1 tag IKED Clients: pa

Re: isolate a wireguard vpn in rdomain

2025-02-28 Thread B. Atticus Grobe
My understanding is that the host doesn't have an routable connection from rdomain 0 to rdomain 1. wg1 and lo1 are specific to that rdomain, and sshd is 'attached' to rdomain 0. For the VM to interact directly with the host, you would have to add pair interfaces (see ifconfig man page) to route tr

Re: isolate a wireguard vpn in rdomain

2025-02-28 Thread alpha beta
> > add 'wgrtable 0' to hostname.wg1, and search for wgrtable in `man > > ifconfig'. it > > sets which rdomain the actual wireguard packets transit. the wireguard > > network and interface will be isolated to rdomain 1 while the wireguard > > packets > > will traverse through rdomain 0. > > > > t

Re: isolate a wireguard vpn in rdomain

2025-02-28 Thread Stuart Henderson
On 2025-02-28, B. Atticus Grobe wrote: > On Thu Feb 27, 2025 at 4:35 PM CST, alpha beta wrote: > > add 'wgrtable 0' to hostname.wg1, and search for wgrtable in `man ifconfig'. > it > sets which rdomain the actual wireguard packets transit. the wireguard > network and interface will be isolated to

Re: isolate a wireguard vpn in rdomain

2025-02-27 Thread B. Atticus Grobe
the several LANs behind the peers. I don't necessarily > trust all the peers, thus I would like to isolate the VPN inside an > rdomain (say 1). The egress however, should stay on a different > rdomain (say 0), where other services are running. > > From what I understand, pf ca

isolate a wireguard vpn in rdomain

2025-02-27 Thread alpha beta
eers, thus I would like to isolate the VPN inside an rdomain (say 1). The egress however, should stay on a different rdomain (say 0), where other services are running. >From what I understand, pf can connect the different rdomains, and the way I find more intuitive is to declare my wg1 in rdo

Re: Connecting to a WireGuard VPN using hostname.if(5)

2025-02-08 Thread Rob Schmersel
On Fri, 7 Feb 2025 01:09:09 +0100 Odd Martin Baanrud wrote: > Hello, > > I have got access to some static IP’s via VPN using WireGuard. > The provider gave me config files for use with wg-quick(8) from the > WireGuard-tools package. It works in linux. > However, I want to tes

Re: Connecting to a WireGuard VPN using hostname.if(5)

2025-02-07 Thread Lloyd
Odd Martin Baanrud wrote: > I can of corse use wg-quick, but I don’t see how to run it via rc(8). > > Regards, Martin. You can install wireguard-tools from ports as you mentioned. Then use !command syntax in your hostname.if to shell out to wg-quick. E.g. your /etc/hostname.wg0 contents could be

Re: Connecting to a WireGuard VPN using hostname.if(5)

2025-02-06 Thread Kapetanakis Giannis
Check ifconfig(8) man page, there is section about wireguard and the available options. ifconfig.if does not list them side note, they have to be in one line in hostname file. G On 07/02/2025 02:09, Odd Martin Baanrud wrote: > Hello, > > I have got access to some static IP’s via

Re: Connecting to a WireGuard VPN using hostname.if(5)

2025-02-06 Thread Andre Smagin
On Fri, 7 Feb 2025 01:09:09 +0100 Odd Martin Baanrud wrote: > Hello, > > I have got access to some static IP*s via VPN using WireGuard. > The provider gave me config files for use with wg-quick(8) from the > WireGuard-tools package. > It works in linux. > However, I want t

Re: Connecting to a WireGuard VPN using hostname.if(5)

2025-02-06 Thread Chris Narkiewicz
On Fri, Feb 07, 2025 at 01:09:09AM +0100, Odd Martin Baanrud wrote: > However, I want to test it wit OpenBSD’s integrated wg(4) driver. Here is a jinja template from Ansible role that creates hostname.wg0 on some machine somewhere in my network: inet {{ client_ipv4 }} {{ client_ipv4_netmask }} i

Connecting to a WireGuard VPN using hostname.if(5)

2025-02-06 Thread Odd Martin Baanrud
Hello, I have got access to some static IP’s via VPN using WireGuard. The provider gave me config files for use with wg-quick(8) from the WireGuard-tools package. It works in linux. However, I want to test it wit OpenBSD’s integrated wg(4) driver. I’ve read the manual, but I can’t see which

Re: OpenBSD IKEv2 VPN -- default split tunnel / some hosts full tunnel

2024-12-15 Thread Christopher Sean Hilton
On Sat, Dec 14, 2024 at 02:07:13PM +1000, David Gwynne wrote: > On Thu, Dec 12, 2024 at 06:01:37PM -0400, Christopher Sean Hilton wrote: > > Hi, > > > > I'm trying to setup a pair of OpenBSD machines to handle their respective > > home networks and > > crea

Re: OpenBSD IKEv2 VPN -- default split tunnel / some hosts full tunnel

2024-12-13 Thread Joe Cook
Hi Christopher I have something similar working with a route based VPN. A little bit of PF magic seems necessary also. Route based VPN uses sec interfaces as VPN endpoints. The endpoints are part of a /30 subnet. Once the VPN tunnel between the sec endpoints is established, sending traffic

Re: OpenBSD IKEv2 VPN -- default split tunnel / some hosts full tunnel

2024-12-13 Thread David Gwynne
On Thu, Dec 12, 2024 at 06:01:37PM -0400, Christopher Sean Hilton wrote: > Hi, > > I'm trying to setup a pair of OpenBSD machines to handle their respective > home networks and > create a IKEv2 VPN tunnel between them. If I call one side _home_ and one > side _remote_

OpenBSD IKEv2 VPN -- default split tunnel / some hosts full tunnel

2024-12-12 Thread Christopher Sean Hilton
Hi, I'm trying to setup a pair of OpenBSD machines to handle their respective home networks and create a IKEv2 VPN tunnel between them. If I call one side _home_ and one side _remote_ I think that defines things. The main function of the tunnel is to allow stuff on the _remote_ netwo

Fw: Re: VPN killswitch

2024-11-25 Thread bsdbsdbsd1
Best regards John Scofield Sent with [Proton Mail](https://proton.me/mail/home) secure email. --- Forwarded Message --- From: hahahahacker2009 Date: On Monday, November 25th, 2024 at 1:32 PM Subject: Re: VPN killswitch To: bsdbsdbsd1 > Vào 1:10, Th 2, 25 thg 11, 2024 bsdbsdbsd1

Re: VPN killswitch

2024-11-25 Thread Stefan Sperling
On Mon, Nov 25, 2024 at 07:59:09PM +1000, David Gwynne wrote: > On Sun, Nov 24, 2024 at 05:55:12PM +, bsdbsdbsd1 wrote: > > OpenBSD needs an easily implementable killswitch for VPNs. > > i'd argue it has one. or two. maybe more. > > my preferred solution is to put

Re: VPN killswitch

2024-11-25 Thread David Gwynne
On Sun, Nov 24, 2024 at 05:55:12PM +, bsdbsdbsd1 wrote: > OpenBSD needs an easily implementable killswitch for VPNs. i'd argue it has one. or two. maybe more. my preferred solution is to put the vpn protected traffic in a separate rdomain to the vpn transport. for example, l

Re: VPN killswitch

2024-11-24 Thread Polarian
Hello, You could do this via PF, block all traffic (in and out) on any other traffic than the vpn interface. Then allow traffic out on the physical interface ONLY to the IP(s)/port(s) of the VPN. This is what I do currently for always on VPN, I am sure there is a better way, but it works. Take

Re: VPN killswitch

2024-11-24 Thread Kirill A . Korinsky
On Sun, 24 Nov 2024 18:55:12 +0100, bsdbsdbsd1 wrote: > > OpenBSD needs an easily implementable killswitch for VPNs. > Do you mean something like that Solène did here? https://dataswamp.org/~solene/2021-10-09-openbsd-wireguard-exit.html -- wbr, Kirill

VPN killswitch

2024-11-24 Thread bsdbsdbsd1
OpenBSD needs an easily implementable killswitch for VPNs. Best regards John Scofield

Still dreadful VPN performance with 7.6

2024-10-22 Thread shadowbladeee
Hello List, First of all I would like to say a big FU for the nazi reddit moderators who delete posts from the /r/OpenBSD in 5 minutes tops get a f life or get fkd. I tried to make some new use case for OpenBSD 7.6 like replacing some of my old Debian OpenVPN servers with it. The results were

Still dreadful VPN performance with 7.6

2024-10-22 Thread shadowbladeee
Hello List, First of all I would like to say a big FU for the nazi reddit moderators who delete posts from the /r/OpenBSD in 5 minutes tops get a f life or get fkd. I tried to make some new use case for OpenBSD 7.6 like replacing some of my old Debian OpenVPN servers with it. The results were

Re: VPN iked keys in 7.5 don't work with older systems

2024-08-13 Thread Crystal Kolipe
On Tue, Aug 13, 2024 at 10:42:51PM -0400, Daniel Ouellet wrote: > Hi, > > I just tried to setup iked vpn as I did many times before by coping keys > from > > /etc/iked/local.pub > > between systems and it doesn't work anymore. > > Looking at the keys, they ar

VPN iked keys in 7.5 don't work with older systems

2024-08-13 Thread Daniel Ouellet
Hi, I just tried to setup iked vpn as I did many times before by coping keys from /etc/iked/local.pub between systems and it doesn't work anymore. Looking at the keys, they are now a different type. On all system before 7.5, the keys in /etc/isakmpd/local.pub and /etc/iked/loca

Re: folks is there any VPN pseudo device that allows for spliting a fullsized frame or packet across 2x VPN encapsulated packets

2024-07-23 Thread Claudio Jeker
gt; > have access to customers firewalls, and the customers expect full > > > sized frames / packets across the wan, > > > the issue is when we used 3rd party networks with constrained MTUs, > > > while we can adjust TCP MSS if we control the network devices putting >

Re: folks is there any VPN pseudo device that allows for spliting a fullsized frame or packet across 2x VPN encapsulated packets

2024-07-23 Thread Tom Smyth
across the wan, > > the issue is when we used 3rd party networks with constrained MTUs, > > while we can adjust TCP MSS if we control the network devices putting > > packets across the VPN, this is not always possible, > > > > IP fragmentation (sometimes) works bu

Re: folks is there any VPN pseudo device that allows for spliting a fullsized frame or packet across 2x VPN encapsulated packets

2024-07-23 Thread Claudio Jeker
used 3rd party networks with constrained MTUs, > while we can adjust TCP MSS if we control the network devices putting > packets across the VPN, this is not always possible, > > IP fragmentation (sometimes) works but it breaks load balancing > (hashes of IP fragments do not match

folks is there any VPN pseudo device that allows for spliting a fullsized frame or packet across 2x VPN encapsulated packets

2024-07-23 Thread Tom Smyth
l the network devices putting packets across the VPN, this is not always possible, IP fragmentation (sometimes) works but it breaks load balancing (hashes of IP fragments do not match the hashes for original packet being sent. but sometimes is not good enough. Possible solutions which we have seen

Re: [7.5/amd64] ipsec + npppd + sasyncd + carp - doesn't pick up the VPN session at switchover

2024-05-31 Thread Stuart Henderson
On 2024-05-30, Radek wrote: > Thank you all for your replies. > > Actually, I did not know that providing seamless switching VPN solutions is > so problematic. If it can't be done in a simple way, then it doesn't have to > be seamless at any cost. Users will manually r

Re: [7.5/amd64] ipsec + npppd + sasyncd + carp - doesn't pick up the VPN session at switchover

2024-05-30 Thread Radek
Thank you all for your replies. Actually, I did not know that providing seamless switching VPN solutions is so problematic. If it can't be done in a simple way, then it doesn't have to be seamless at any cost. Users will manually reconnect to this VPN when CARP does switchover and

Re: [7.5/amd64] ipsec + npppd + sasyncd + carp - doesn't pick up the VPN session at switchover

2024-05-30 Thread Stuart Henderson
On 2024-05-29, Vitaliy Makkoveev wrote: > He wants replication. This means both wireguard "servers" know the client > state. No client reconnection at failure, no delay, seamless migration > from failed node to the backup. Something like sasyncd(8), but for > npppd(8) or wg(4). wireguard doesn't

Re: [7.5/amd64] ipsec + npppd + sasyncd + carp - doesn't pick up the VPN session at switchover

2024-05-29 Thread Vitaliy Makkoveev
> On 29 May 2024, at 18:50, Hrvoje Popovski wrote: > > On 29.5.2024. 12:48, Radek wrote: >> Thank you, that explains everything. >> Does wireguard support replication? Will it work properly in my CARP setup? >> > > > why not use iked as vpn solution ? i

Re: [7.5/amd64] ipsec + npppd + sasyncd + carp - doesn't pick up the VPN session at switchover

2024-05-29 Thread Vitaliy Makkoveev
terface for redundancy and it's working > without admins or clients needs to do anything when primary carp > firewall shuts down or even reboot. People will notice something > happened but wg vpn would start to work after cca 20 seconds. > He wants replication. This means b

Re: [7.5/amd64] ipsec + npppd + sasyncd + carp - doesn't pick up the VPN session at switchover

2024-05-29 Thread obsdml
> On May 29, 2024, at 3:48 AM, Radek wrote: > > Thank you, that explains everything. > Does wireguard support replication? Will it work properly in my CARP setup? wireguard doesn’t have “state” per se. it remembers the last address a key was associated with. In the event of a failover, if

Re: [7.5/amd64] ipsec + npppd + sasyncd + carp - doesn't pick up the VPN session at switchover

2024-05-29 Thread Hrvoje Popovski
n primary carp firewall shuts down or even reboot. People will notice something happened but wg vpn would start to work after cca 20 seconds. root@pc-hrvoje:~# ping 10.2.0.1 PING 10.2.0.1 (10.2.0.1) 56(84) bytes of data. 64 bytes from 10.2.0.1: icmp_seq=1 ttl=254 time=1.46 ms 64 bytes from 10.2.0.1: icmp

Re: [7.5/amd64] ipsec + npppd + sasyncd + carp - doesn't pick up the VPN session at switchover

2024-05-29 Thread Stuart Henderson
On 2024/05/29 18:08, Vitaliy Makkoveev wrote: > On Wed, May 29, 2024 at 01:23:47PM -, Stuart Henderson wrote: > > On 2024-05-29, Vitaliy Makkoveev wrote: > > > On Wed, May 29, 2024 at 12:48:41PM +0200, Radek wrote: > > >> Thank you, that explains everything. > > >> Does wireguard support repl

Re: [7.5/amd64] ipsec + npppd + sasyncd + carp - doesn't pick up the VPN session at switchover

2024-05-29 Thread Vitaliy Makkoveev
On Wed, May 29, 2024 at 01:23:47PM -, Stuart Henderson wrote: > On 2024-05-29, Vitaliy Makkoveev wrote: > > On Wed, May 29, 2024 at 12:48:41PM +0200, Radek wrote: > >> Thank you, that explains everything. > >> Does wireguard support replication? Will it work properly in my CARP setup? > >> >

Re: [7.5/amd64] ipsec + npppd + sasyncd + carp - doesn't pick up the VPN session at switchover

2024-05-29 Thread Stuart Henderson
On 2024-05-29, Vitaliy Makkoveev wrote: > On Wed, May 29, 2024 at 12:48:41PM +0200, Radek wrote: >> Thank you, that explains everything. >> Does wireguard support replication? Will it work properly in my CARP setup? >> > > No for both questions. However, wireguard allows to create complicated >

Re: [7.5/amd64] ipsec + npppd + sasyncd + carp - doesn't pick up the VPN session at switchover

2024-05-29 Thread Vitaliy Makkoveev
t; > Hello, > > > I have two redundant firewalls with CARP: [krz75-MAS]<->[krz75-SLA]. I'm > > > trying to set up redundant IPSEC VPN on it. > > > > > > - CARP + pfsync is working as expected - ca 1-2 pings lost at switchover. > > > - sasync

Re: [7.5/amd64] ipsec + npppd + sasyncd + carp - doesn't pick up the VPN session at switchover

2024-05-29 Thread Radek
t; Hello, > > I have two redundant firewalls with CARP: [krz75-MAS]<->[krz75-SLA]. I'm > > trying to set up redundant IPSEC VPN on it. > > > > - CARP + pfsync is working as expected - ca 1-2 pings lost at switchover. > > - sasyncd seems to work as expected

Re: [7.5/amd64] ipsec + npppd + sasyncd + carp - doesn't pick up the VPN session at switchover

2024-05-27 Thread Vitaliy Makkoveev
npppd does not support replication > On 27 May 2024, at 19:58, Radek wrote: > > Hello, > I have two redundant firewalls with CARP: [krz75-MAS]<->[krz75-SLA]. I'm > trying to set up redundant IPSEC VPN on it. > > - CARP + pfsync is working as expected -

[7.5/amd64] ipsec + npppd + sasyncd + carp - doesn't pick up the VPN session at switchover

2024-05-27 Thread Radek
Hello, I have two redundant firewalls with CARP: [krz75-MAS]<->[krz75-SLA]. I'm trying to set up redundant IPSEC VPN on it. - CARP + pfsync is working as expected - ca 1-2 pings lost at switchover. - sasyncd seems to work as expected - flows and SADs are replicated between nodes -

Re: How to use the tun0 interface (VPN)?

2024-05-09 Thread W.D.T Chathurange
Hi, I think this is because all your traffic is just routing through your current default gateway which is your router. Try adding a route to the vpn server to route through your physical router. Then change your default gateway to the vpn interface. doas route add (doas route add xx.xx.xx.xx

Re: How to use the tun0 interface (VPN)?

2024-05-09 Thread James Colderwood
If you want to route all traffic over the VPN. You need to configure your default gateway to correctly. On 2024-05-09 14:16, Sadeep Madurange wrote: Hello, I am trying to use the openvpn client. I have a .ovpn file I got from my vpn provider. I installed the openvpn package and ran the

Re: How to use the tun0 interface (VPN)?

2024-05-09 Thread deich...@placebonol.com
Can you explain what you are trying to accomplish with a VPN? On May 9, 2024 7:16:38 AM MDT, Sadeep Madurange wrote: >Hello, > >I am trying to use the openvpn client. I have a .ovpn file I got from my >vpn provider. I installed the openvpn package and ran the openvpn client >usin

How to use the tun0 interface (VPN)?

2024-05-09 Thread Sadeep Madurange
Hello, I am trying to use the openvpn client. I have a .ovpn file I got from my vpn provider. I installed the openvpn package and ran the openvpn client using the following command: $ doas openvpn --config client.ovpn --auth-user-pass auth.txt Above command appears to succeed. ifconfig shows

How to use the tun0 interface (VPN)?

2024-05-09 Thread Sadeep Madurange
Hello, I am trying to use the openvpn client. I have a .ovpn file I got from my vpn provider. I installed the openvpn package and ran the openvpn client using the following command: $ doas openvpn --config client.ovpn --auth-user-pass auth.txt Above command appears to succeed. ifconfig shows

Re: VPN with iked(8)

2024-04-29 Thread Matthew Ernisse
On Mon, Apr 29, 2024 at 01:47:45AM +0200, Odd Martin Baanrud said: I’m planning to set up a VPN on my router with iked(8). The first goal is to have my Macbook and iPhone connected, both to route the traffic thrugh my router at home, and to get access to the services running on a machine

VPN with iked(8)

2024-04-28 Thread Odd Martin Baanrud
Hello, I’m planning to set up a VPN on my router with iked(8). The first goal is to have my Macbook and iPhone connected, both to route the traffic thrugh my router at home, and to get access to the services running on a machine behind the router. I’ve read the VPN section in the FAQ, and I

Re: Assistance Needed with Wireguard VPN Configuration and pf Rules on OpenBSD 7.3

2023-08-16 Thread lain.
(Sorry, I just realized I replied to just your email address, replying again to the mailing list this time.) On 2023年08月16日 10:05, Stuart Henderson wrote: > wireguard-tools is not required, everything you need for wg(4) is in > the base OS. Oh, I didn't know that. In that case, valid point. > Af

Re: Assistance Needed with Wireguard VPN Configuration and pf Rules on OpenBSD 7.3

2023-08-16 Thread SOUBHEEK NATH
gt; 10.0.8.3) to port 22/80 on the internet, not just to the machine running > PF. If this is what you want, that's ok, if not then you.may want "self" > instead of "any". > > > On Mon, Aug 14, 2023 at 7:35 AM lain. wrote: > >> > >> On 2023年08

Re: Assistance Needed with Wireguard VPN Configuration and pf Rules on OpenBSD 7.3

2023-08-16 Thread Stuart Henderson
ou want, that's ok, if not then you.may want "self" instead of "any". > On Mon, Aug 14, 2023 at 7:35 AM lain. wrote: >> >> On 2023年08月13日 12:17, Stuart Henderson wrote: >> > > >> > > https://www.vultr.com/docs/install-wireguard-vpn

Re: Assistance Needed with Wireguard VPN Configuration and pf Rules on OpenBSD 7.3

2023-08-14 Thread Matthew Ernisse
On Mon, Aug 14, 2023 at 05:54:55PM +0530, SOUBHEEK NATH said: 2. Please have a look at the configuration I have implemented. pass in quick on wg0 proto tcp from 10.0.8.3/32 to any port {22 80} block in on wg0 proto tcp from any to any port {22 80} block in quick on bwfm0 proto tcp f

Re: Assistance Needed with Wireguard VPN Configuration and pf Rules on OpenBSD 7.3

2023-08-14 Thread SOUBHEEK NATH
eciate the time and effort you dedicated to this. Thank you so much. -- Soubheek Nath Fifth Estate Kolkata, India soubheekn...@gmail.com On Mon, Aug 14, 2023 at 7:35 AM lain. wrote: > > On 2023年08月13日 12:17, Stuart Henderson wrote: > > >https://www.vultr.com/docs/install-wireguard-v

Re: Assistance Needed with Wireguard VPN Configuration and pf Rules on OpenBSD 7.3

2023-08-13 Thread lain.
On 2023年08月13日 12:17, Stuart Henderson wrote: > >https://www.vultr.com/docs/install-wireguard-vpn-server-on-openbsd-7-0/ > > what a mess of things from the base OS and unneeded third-party tools. > List of tools: wireguard-tools (required), nano (vim would have been enough),

Re: Assistance Needed with Wireguard VPN Configuration and pf Rules on OpenBSD 7.3

2023-08-13 Thread lain.
>devices are connected to it. > 4. The wireless router is currently using its default settings to >assign IP addresses to three other devices that are connected to it. >You are correct, with this setup and pf rule, the wireguard VPN >server is accessible from within

Re: Assistance Needed with Wireguard VPN Configuration and pf Rules on OpenBSD 7.3

2023-08-13 Thread Stuart Henderson
q and use https://man.openbsd.org/pf.conf instead. >https://www.vultr.com/docs/install-wireguard-vpn-server-on-openbsd-7-0/ what a mess of things from the base OS and unneeded third-party tools. > On Sun, Aug 13, 2023 at 7:04 AM lain. wrote: >> >> I failed to come up with reas

Re: Assistance Needed with Wireguard VPN Configuration and pf Rules on OpenBSD 7.3

2023-08-13 Thread SOUBHEEK NATH
default settings and three other devices are connected to it. 4. The wireless router is currently using its default settings to assign IP addresses to three other devices that are connected to it. You are correct, with this setup and pf rule, the wireguard VPN server is accessible from

Re: Assistance Needed with Wireguard VPN Configuration and pf Rules on OpenBSD 7.3

2023-08-12 Thread lain.
ause > requirements change depending on these details. > If you're using a dynamic IP, and both your server and clienbts are > within the same network, there's a good chance that this setup is > unnecessary, given that using a WireGuard VPN makes sense if the server > is

Re: Assistance Needed with Wireguard VPN Configuration and pf Rules on OpenBSD 7.3

2023-08-12 Thread lain.
od chance that this setup is unnecessary, given that using a WireGuard VPN makes sense if the server is remote and normally accessible from the outside, and you want to make it only accessible from the inside. As for your WireGuard config, you might want to add the Address to your "[Interf

Assistance Needed with Wireguard VPN Configuration and pf Rules on OpenBSD 7.3

2023-08-12 Thread SOUBHEEK NATH
Dear OpenBSD Mailing List Community, I hope this email finds you well. I am writing to seek your expertise and guidance regarding a Wireguard VPN configuration and pf rules on my OpenBSD 7.3 system. I have successfully set up a Wireguard VPN using the provided interface configuration, and the VPN

Re: IPsec "road warrior" VPN not getting set up properly.

2023-07-11 Thread Tobias Heider
o update their routing tables to do exactly > what you want them to do. NAT, on the other hand, rewrites addresses > and ports so the packet you send out isn't the packet the other end > receives. And I'm not saying that people shouldn't use NAT for IPv4. > I just think th

Re: IPsec "road warrior" VPN not getting set up properly.

2023-07-10 Thread Anthony Coulter
e a huge number of addresses in a /64, but really a /64 > is what providers are expected to assign where they would assign an > individual address for IPv4. > > For a situation where you'd have a couple of addresses with v4, > with v6 it's really normal to have a /56 or /48

Re: IPsec "road warrior" VPN not getting set up properly.

2023-07-10 Thread Zack Newman
I'm sure this is obvious to people, but just in case it is not: I pay $25/month for my VPS, and I think I could bring that down to $10 or $15 if I wanted. My VPS routes me a /48 IPv6 network... I clearly meant "My VPS _provider_ routes me...".

Re: IPsec "road warrior" VPN not getting set up properly.

2023-07-10 Thread Zack Newman
: one for "normal" peers where they connect to this VPN server via WireGuard software (e.g., the Android app) and another for my server/router at home which subsequently gets routed a /56 IPv6 block and the whole /29 IPv4 block. Bam. Finito. No BGP, no problem. I get to stay within the cozy co

Re: IPsec "road warrior" VPN not getting set up properly.

2023-07-10 Thread Stuart Henderson
On 2023-07-10, Anthony Coulter wrote: > 2. I abandon my quest to get NDP proxying added to iked and instead ask >if we can add a "rtlabel" keyword to iked.conf to make it easier for >me to write a separate process that monitors the routing table to >detect when the tunnel gets set up.

Re: IPsec "road warrior" VPN not getting set up properly.

2023-07-09 Thread Anthony Coulter
et you send out isn't the packet the other end receives. And I'm not saying that people shouldn't use NAT for IPv4. I just think that in the IPv6 case, if getting more subnets isn't an easy affair, NDP proxying is a less-intrusive hack to get your VPN client's traffic routed p

Re: IPsec "road warrior" VPN not getting set up properly.

2023-07-08 Thread Andy Bradford
Thus said Anthony Coulter on Thu, 06 Jul 2023 21:52:54 -0400: > I would also suggest comparing the "hackiness" of NDP proxying to the > hackiness of NAT, which is how we solve this same problem in IPv4. I realize I'm coming in late to this discussion, and may not actually have anything of val

Re: IPsec "road warrior" VPN not getting set up properly.

2023-07-06 Thread Anthony Coulter
when I typed it. The point is that configuring all those subnets and static routes is an awful lot of extra work when all I want to do is set up a VPN proxy. > why when people are looking for dhcpv6 software do they always find that > unmaintained-for-years run-the-whole-lot-as-root wide-dhc

Re: IPsec "road warrior" VPN not getting set up properly.

2023-07-06 Thread Zack Newman
Yeah, I don't have the interest to get into it about this; but I find it (informally) inconsistent to take an ideological stance against NAT and not have a similar stance against NDP proxying. Networking is a lot cleaner when it can be reasoned about with a rudimentary grasp of graph theory where

Re: IPsec "road warrior" VPN not getting set up properly.

2023-07-06 Thread Stuart Henderson
ing one other bit.. > I would also suggest comparing the "hackiness" of NDP proxying to the > hackiness of NAT, which is how we solve this same problem in IPv4. it might be how some people solve it for v4. others solve it in a non-hacky way which is exactly the same as the non-ha

Re: IPsec "road warrior" VPN not getting set up properly.

2023-07-06 Thread Anthony Coulter
rite that tries to monitor routing state changes, and (2) both of the responses to my routing question claim that the correct way to connect a laptop to my VPN is to negotiate with my ISP to get a larger subnet which just sounds bonkers when "ndp -s" solves the technical problem so perfectl

Re: IPsec "road warrior" VPN not getting set up properly.

2023-07-06 Thread Anthony Coulter
s which happen to be on the Ethernet link, then this is logically a layer 2 tunnel ("show me all the Ethernet traffic") and not a layer 3 tunnel ("show me everything with this IP address"), so it doesn't make sense to bundle that with IP-level routing rules. So never mind

Re: IPsec "road warrior" VPN not getting set up properly.

2023-07-06 Thread Zack Newman
correctly think such allocations are "wasteful" or what. IPv6 not only restores end-to-end communication the way IPv4 initially started, but it is designed so that sites have many _subnets_. This brings me to the next point. You would like to rely on SLAAC for your VPN peers, but SLAA

Re: IPsec "road warrior" VPN not getting set up properly.

2023-07-06 Thread Stuart Henderson
On 2023-07-05, Anthony Coulter wrote: > OK, I've sorted out my network issues server but it turns out that I > was misinterpreting the tcpdump output on my VPS. When an external > computer tries to ping my client's virtual IP address, the VPS's > gateway router is *not* forwarding the pings to my

Re: IPsec "road warrior" VPN not getting set up properly.

2023-07-05 Thread Anthony Coulter
OK, I've sorted out my network issues server but it turns out that I was misinterpreting the tcpdump output on my VPS. When an external computer tries to ping my client's virtual IP address, the VPS's gateway router is *not* forwarding the pings to my server where they can be shoved into the IPsec

Re: IPsec "road warrior" VPN not getting set up properly.

2023-07-05 Thread Tobias Heider
On July 5, 2023 4:35:30 AM GMT+03:00, Anthony Coulter wrote: >Short version: > >I'm trying to set up a "road warrior"-style VPN like the one described >at https://www.openbsd.org/faq/faq17.html but I'm trying to use IPv6 so >I can have globally-routable a

IPsec "road warrior" VPN not getting set up properly.

2023-07-04 Thread Anthony Coulter
Short version: I'm trying to set up a "road warrior"-style VPN like the one described at https://www.openbsd.org/faq/faq17.html but I'm trying to use IPv6 so I can have globally-routable addresses (so I'm not using NAT). So far I've gotten the initiator and the

VPN and Forwarding Performance (was Selecting a 10G NIC)

2023-02-20 Thread Daniel Melameth
On Fri, Feb 17, 2023 at 11:28 AM Hrvoje Popovski wrote: > On 17.2.2023. 18:29, Nicolas Goy wrote: > > I know this question has been answered multiple times, but I wonder if > > things changed with 7.2. > > > > Which NIC would provide the best performance with 10G physical layer > > with open bsd?

Re: VPN for a newbie

2022-11-03 Thread Stuart Henderson
On 2022-11-03, Odd Martin Baanrud wrote: > Hello, > > I’m planning to set up a VPN. > The problem is, I get confused about all the features and possibilities, so I > really don’t know where to start. > > I’m running OpenBSD on my router, and a Debian-server behind it, provid

Re: VPN for a newbie

2022-11-02 Thread T K
Probably the easiest way to accomplish your task to run wireguard on your OpenBSD machine. It has pretty well client software for windows, android, and so on... Take a look at this tutorial (there are lots of different resources to be googled) https://www.vultr.com/docs/install-wireguard-vpn

Re: VPN for a newbie

2022-11-02 Thread A Tammy
On 11/2/22 21:02, Odd Martin Baanrud wrote: > Hello, > > I’m planning to set up a VPN. > The problem is, I get confused about all the features and possibilities, so I > really don’t know where to start. > > I’m running OpenBSD on my router, and a Debian-server behind it,

VPN for a newbie

2022-11-02 Thread Odd Martin Baanrud
Hello, I’m planning to set up a VPN. The problem is, I get confused about all the features and possibilities, so I really don’t know where to start. I’m running OpenBSD on my router, and a Debian-server behind it, providing several public services, off course using nat/rdr with PF. My first

Re: assistance request for IKEv2 VPN setup with iked

2021-10-21 Thread Crystal Kolipe
On Thu, Oct 21, 2021 at 10:23:51AM +0200, Johann Belau wrote: > Dear all, > > I am in desperate need of assistance for setting up an IKEv2 VPN tunnel to a > remote LAN with OpenBSD as my VPN gateway. > > A short outline of what I'm trying to achieve: > > 1. I h

assistance request for IKEv2 VPN setup with iked

2021-10-21 Thread Johann Belau
Dear all, I am in desperate need of assistance for setting up an IKEv2 VPN tunnel to a remote LAN with OpenBSD as my VPN gateway. A short outline of what I'm trying to achieve: 1. I have a remote private LAN with Windows Servers and one OpenBSD gateway (gateway has a public IP, the re

Re: DNS resolution after VPN?

2021-07-20 Thread Tom Smyth
and make sure there is a route to Route to your Internal DNS servers over the VPNs Or a policy that covers the DNS servers ip range if it is an Ipsec policy based vpn Hope this helps On Tue, 20 Jul 2021 at 13:15, Timo Myyrä wrote: > > Stuart Henderson [2021-07-20, 11:24 +]: > &g

  1   2   3   4   5   6   7   8   9   10   >