Hi,

On Mon, Jan 21, 2019 at 12:02 PM Tom Eastep <teas...@shorewall.net> wrote:
>
> On 1/21/19 6:36 AM, Alex wrote:
> > Hi,
> >
> > I have a fedora29 system with shorewall-5.2.0.4 and trying to add road
> > warriors through the VPN from a similar system with fedora29 and
> > shorewall-5.2.0.4 with a dynamic IP.
> >
> > [159401.601943] IPv4: martian source 192.168.1.2 from 192.168.6.1, on dev 
> > br0
> > [159401.601959] ll header: 00000000: 0c c4 7a a9 18 de a4 15 88 a9 30
> > b7 08 00        ..z.......0...
> >
> > I've set up 192.168.1.0/24 and 192.168.6.0/24 in the vpn zone in hosts.
> >
> > I'm not sure which config settings to include here in the message
> > body, so thought I would include "shorewall dump" for both systems.
> > I'm hoping someone can help me identify the issue.
>
> The problem is that eth1 is associated with 192.168.6.0/24, but a packet
> with source IP 192.168.6.1 is being received through br0. On the VPN
> client, the loopback interface has been assigned that IP address with is
> a duplicate of the IP address of eth1 on the server.

I think I've fixed the martian problem, but I still can't reach one
side of the VPN from the other and vice-versa.

Just to summarize from a few days ago:

192.168.11.0/24 -- <VPN1> -- <VPN2> -- 192.168.1.0/24

VPN1 is a dynamic IP (currently 68.192.251.223) with a freedns
hostname. VPN2 has a static IP (68.199.193.42). I'd like to be able to
reach hosts on either side, as well as the VPN hosts themselves.

Currently it doesn't appear that I can reach any host from any other
host at all.

# ip xfrm state
src 68.192.251.223 dst 68.199.193.42
        proto esp spi 0x48acc1b4 reqid 16389 mode tunnel
        replay-window 32 flag af-unspec
        aead rfc4106(gcm(aes))
0xeac1161d7b63ede8196f2b9dc0ea1e92651bc96327510ac639304518de77c9cad19d1f5e
128
        anti-replay context: seq 0x0, oseq 0x0, bitmap 0x00000000
src 68.199.193.42 dst 68.192.251.223
        proto esp spi 0x3c181644 reqid 16389 mode tunnel
        replay-window 32 flag af-unspec
        aead rfc4106(gcm(aes))
0x782c8e171067c513c946db43552088b1ecdd2c3220d87caa44148921cbfa489b2ab901f7
128
        anti-replay context: seq 0x0, oseq 0x0, bitmap 0x00000000
src 68.192.251.223 dst 68.199.193.42
        proto esp spi 0xe3b59a4d reqid 16397 mode tunnel
        replay-window 32 flag af-unspec
        aead rfc4106(gcm(aes))
0xf0f2997d920d647ebdd1b87c1fccd67ef61085e42239ccf8a353d36bbcdf6ac5b0ef7fc3
128
        anti-replay context: seq 0x0, oseq 0x0, bitmap 0x00000000
src 68.199.193.42 dst 68.192.251.223
        proto esp spi 0x8b393d98 reqid 16397 mode tunnel
        replay-window 32 flag af-unspec
        aead rfc4106(gcm(aes))
0xbf6e5c7c8d1800356ee74136db9541520a284c0d0ea05f4163425c14c7cbf14045b369ff
128
        anti-replay context: seq 0x0, oseq 0x0, bitmap 0x00000000

# ip xfrm policy
src 192.168.1.0/24 dst 192.168.11.0/24
        dir out priority 1042407 ptype main
        tmpl src 68.199.193.42 dst 68.192.251.223
                proto esp reqid 16389 mode tunnel
src 192.168.11.0/24 dst 192.168.1.0/24
        dir fwd priority 1042407 ptype main
        tmpl src 68.192.251.223 dst 68.199.193.42
                proto esp reqid 16389 mode tunnel
src 192.168.11.0/24 dst 192.168.1.0/24
        dir in priority 1042407 ptype main
        tmpl src 68.192.251.223 dst 68.199.193.42
                proto esp reqid 16389 mode tunnel
src 68.199.193.40/29 dst 192.168.11.0/24
        dir out priority 1041127 ptype main
        tmpl src 68.199.193.42 dst 68.192.251.223
                proto esp reqid 16397 mode tunnel
src 192.168.11.0/24 dst 68.199.193.40/29
        dir fwd priority 1041127 ptype main
        tmpl src 68.192.251.223 dst 68.199.193.42
                proto esp reqid 16397 mode tunnel
src 192.168.11.0/24 dst 68.199.193.40/29
        dir in priority 1041127 ptype main
        tmpl src 68.192.251.223 dst 68.199.193.42
                proto esp reqid 16397 mode tunnel
src 68.199.193.40/29 dst 192.168.10.0/24
        dir out priority 1041127 ptype main
        tmpl src 0.0.0.0 dst 0.0.0.0
                proto esp reqid 0 mode transport
src 192.168.1.0/24 dst 192.168.10.0/24
        dir out priority 1042407 ptype main
        tmpl src 0.0.0.0 dst 0.0.0.0
                proto esp reqid 0 mode transport

It looks like the VPNs are all built correctly. Should the shorewall
hosts contain all the networks involved with the VPN on the vpn zone
line? I'm also unsure how to configure hosts on the side with the
dynamic IP:

vpn             enp4s0: ipsec
vpn             enp2s0:192.168.11.0/24 ipsec

I hoped you could review my "shorewall dump" output and help me figure
out why it's not working.
https://pastebin.com/K39DNDEj


_______________________________________________
Shorewall-users mailing list
Shorewall-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/shorewall-users

Reply via email to