From 1f3b5c7778dcf4e1d14f0bb8777fb63a240bafa5 Mon Sep 17 00:00:00 2001 From: Andreas Steffen Date: Tue, 5 Jul 2011 22:07:42 +0200 Subject: [PATCH] corrected description of shunt-policies scenario --- .../ikev2/shunt-policies/description.txt | 4 +- .../pfkey/shunt-policies/description.txt | 11 +++ .../tests/pfkey/shunt-policies/evaltest.dat | 16 ++++ .../hosts/moon/etc/init.d/iptables | 84 +++++++++++++++++++ .../shunt-policies/hosts/moon/etc/ipsec.conf | 43 ++++++++++ .../hosts/moon/etc/strongswan.conf | 7 ++ .../shunt-policies/hosts/sun/etc/ipsec.conf | 25 ++++++ .../hosts/sun/etc/strongswan.conf | 6 ++ .../tests/pfkey/shunt-policies/posttest.dat | 5 ++ .../tests/pfkey/shunt-policies/pretest.dat | 6 ++ testing/tests/pfkey/shunt-policies/test.conf | 21 +++++ 11 files changed, 226 insertions(+), 2 deletions(-) create mode 100644 testing/tests/pfkey/shunt-policies/description.txt create mode 100644 testing/tests/pfkey/shunt-policies/evaltest.dat create mode 100755 testing/tests/pfkey/shunt-policies/hosts/moon/etc/init.d/iptables create mode 100755 testing/tests/pfkey/shunt-policies/hosts/moon/etc/ipsec.conf create mode 100644 testing/tests/pfkey/shunt-policies/hosts/moon/etc/strongswan.conf create mode 100755 testing/tests/pfkey/shunt-policies/hosts/sun/etc/ipsec.conf create mode 100644 testing/tests/pfkey/shunt-policies/hosts/sun/etc/strongswan.conf create mode 100644 testing/tests/pfkey/shunt-policies/posttest.dat create mode 100644 testing/tests/pfkey/shunt-policies/pretest.dat create mode 100644 testing/tests/pfkey/shunt-policies/test.conf diff --git a/testing/tests/ikev2/shunt-policies/description.txt b/testing/tests/ikev2/shunt-policies/description.txt index 269e7957c..dd78a5ef1 100644 --- a/testing/tests/ikev2/shunt-policies/description.txt +++ b/testing/tests/ikev2/shunt-policies/description.txt @@ -7,5 +7,5 @@ by adding install_routes = no to the charon section of strongswan.conf

In order to demonstrate the use of type=drop shunt policies, the venus-icmp connection prevents ICMP traffic to and from venus -to use the IPsec tunnel by dropping such packets. Thanks to the local-net -pass shunt, venus and moon can still ping each other, though. +to use the IPsec tunnel by dropping such packets. Since this policy does not +apply to the localnet, venus and moon can still ping each other. diff --git a/testing/tests/pfkey/shunt-policies/description.txt b/testing/tests/pfkey/shunt-policies/description.txt new file mode 100644 index 000000000..ad98eb8d5 --- /dev/null +++ b/testing/tests/pfkey/shunt-policies/description.txt @@ -0,0 +1,11 @@ +All traffic from the clients alice and venus is tunneled +by default gateway moon to VPN gateway sun. In order to +prevent local traffic within the 10.1.0.0/16 subnet to enter the +tunnel, a local-net shunt policy with type=pass is set up. +In order for the shunt to work, automatic route insertion must be disabled +by adding install_routes = no to the charon section of strongswan.conf. +

+In order to demonstrate the use of type=drop shunt policies, the +venus-icmp connection prevents ICMP traffic to and from venus +to use the IPsec tunnel by dropping such packets. Since this policy does not +apply to the local net, venus and moon can still ping each other. diff --git a/testing/tests/pfkey/shunt-policies/evaltest.dat b/testing/tests/pfkey/shunt-policies/evaltest.dat new file mode 100644 index 000000000..2f6e1a91f --- /dev/null +++ b/testing/tests/pfkey/shunt-policies/evaltest.dat @@ -0,0 +1,16 @@ +moon::ipsec statusall::net-net.*ESTABLISHED::YES +sun::ipsec statusall::net-net.*ESTABLISHED::YES +alice::ping -c 1 PH_IP_BOB::64 bytes from PH_IP_BOB: icmp_seq=1::YES +alice::ping -c 1 PH_IP_MOON1::64 bytes from PH_IP_MOON1: icmp_seq=1::YES +venus::ping -c 1 PH_IP_BOB::64 bytes from PH_IP_BOB: icmp_seq=1::NO +venus::ping -c 1 PH_IP_MOON1::64 bytes from PH_IP_MOON1: icmp_seq=1::YES +moon::ping -c 1 -I PH_IP_MOON1 PH_IP_BOB::64 bytes from PH_IP_BOB: icmp_seq=1::YES +moon::ping -c 1 PH_IP_ALICE::64 bytes from PH_IP_ALICE: icmp_seq=1::YES +moon::ping -c 1 PH_IP_VENUS::64 bytes from PH_IP_VENUS: icmp_seq=1::YES +bob::ping -c 1 PH_IP_ALICE::64 bytes from PH_IP_ALICE: icmp_seq=1::YES +bob::ping -c 1 PH_IP_MOON1::64 bytes from PH_IP_MOON1: icmp_seq=1::YES +bob::ping -c 1 PH_IP_VENUS::64 bytes from PH_IP_VENUS: icmp_seq=1::NO +sun::tcpdump::IP moon.strongswan.org > sun.strongswan.org: ESP::YES +sun::tcpdump::IP sun.strongswan.org > moon.strongswan.org: ESP::YES +venus::ssh PH_IP_BOB hostname::bob::YES +bob::ssh PH_IP_VENUS hostname::venus::YES diff --git a/testing/tests/pfkey/shunt-policies/hosts/moon/etc/init.d/iptables b/testing/tests/pfkey/shunt-policies/hosts/moon/etc/init.d/iptables new file mode 100755 index 000000000..2b90a14c7 --- /dev/null +++ b/testing/tests/pfkey/shunt-policies/hosts/moon/etc/init.d/iptables @@ -0,0 +1,84 @@ +#!/sbin/runscript +# Copyright 1999-2004 Gentoo Foundation +# Distributed under the terms of the GNU General Public License v2 + +opts="start stop reload" + +depend() { + before net + need logger +} + +start() { + ebegin "Starting firewall" + + # enable IP forwarding + echo 1 > /proc/sys/net/ipv4/ip_forward + + # default policy is DROP + /sbin/iptables -P INPUT DROP + /sbin/iptables -P OUTPUT DROP + /sbin/iptables -P FORWARD DROP + + # allow esp + iptables -A INPUT -i eth0 -p 50 -j ACCEPT + iptables -A OUTPUT -o eth0 -p 50 -j ACCEPT + + # allow IKE + iptables -A INPUT -i eth0 -p udp --sport 500 --dport 500 -j ACCEPT + iptables -A OUTPUT -o eth0 -p udp --dport 500 --sport 500 -j ACCEPT + + # allow MobIKE + iptables -A INPUT -i eth0 -p udp --sport 4500 --dport 4500 -j ACCEPT + iptables -A OUTPUT -o eth0 -p udp --dport 4500 --sport 4500 -j ACCEPT + + # allow crl fetch from winnetou + iptables -A INPUT -i eth0 -p tcp --sport 80 -s PH_IP_WINNETOU -j ACCEPT + iptables -A OUTPUT -o eth0 -p tcp --dport 80 -d PH_IP_WINNETOU -j ACCEPT + + # allow ssh + iptables -A INPUT -p tcp --dport 22 -j ACCEPT + iptables -A OUTPUT -p tcp --sport 22 -j ACCEPT + + # allow icmp in local net + iptables -A INPUT -i eth1 -p icmp -j ACCEPT + iptables -A OUTPUT -o eth1 -p icmp -j ACCEPT + + eend $? +} + +stop() { + ebegin "Stopping firewall" + for a in `cat /proc/net/ip_tables_names`; do + /sbin/iptables -F -t $a + /sbin/iptables -X -t $a + + if [ $a == nat ]; then + /sbin/iptables -t nat -P PREROUTING ACCEPT + /sbin/iptables -t nat -P POSTROUTING ACCEPT + /sbin/iptables -t nat -P OUTPUT ACCEPT + elif [ $a == mangle ]; then + /sbin/iptables -t mangle -P PREROUTING ACCEPT + /sbin/iptables -t mangle -P INPUT ACCEPT + /sbin/iptables -t mangle -P FORWARD ACCEPT + /sbin/iptables -t mangle -P OUTPUT ACCEPT + /sbin/iptables -t mangle -P POSTROUTING ACCEPT + elif [ $a == filter ]; then + /sbin/iptables -t filter -P INPUT ACCEPT + /sbin/iptables -t filter -P FORWARD ACCEPT + /sbin/iptables -t filter -P OUTPUT ACCEPT + fi + done + eend $? +} + +reload() { + ebegin "Flushing firewall" + for a in `cat /proc/net/ip_tables_names`; do + /sbin/iptables -F -t $a + /sbin/iptables -X -t $a + done; + eend $? + start +} + diff --git a/testing/tests/pfkey/shunt-policies/hosts/moon/etc/ipsec.conf b/testing/tests/pfkey/shunt-policies/hosts/moon/etc/ipsec.conf new file mode 100755 index 000000000..a4958f295 --- /dev/null +++ b/testing/tests/pfkey/shunt-policies/hosts/moon/etc/ipsec.conf @@ -0,0 +1,43 @@ +# /etc/ipsec.conf - strongSwan IPsec configuration file + +config setup + crlcheckinterval=180 + strictcrlpolicy=no + plutostart=no + +conn %default + ikelifetime=60m + keylife=20m + rekeymargin=3m + keyingtries=1 + keyexchange=ikev2 + mobike=no + +conn local-net + leftsubnet=10.1.0.0/16 + rightsubnet=10.1.0.0/16 + authby=never + type=pass + auto=route + +conn venus-icmp + leftsubnet=10.1.0.20/32 + rightsubnet=0.0.0.0/0 + leftprotoport=icmp + rightprotoport=icmp + leftauth=any + rightauth=any + type=drop + auto=route + +conn net-net + left=PH_IP_MOON + leftcert=moonCert.pem + leftid=@moon.strongswan.org + leftsubnet=10.1.0.0/16 + leftfirewall=yes + lefthostaccess=yes + right=PH_IP_SUN + rightid=@sun.strongswan.org + rightsubnet=0.0.0.0/0 + auto=add diff --git a/testing/tests/pfkey/shunt-policies/hosts/moon/etc/strongswan.conf b/testing/tests/pfkey/shunt-policies/hosts/moon/etc/strongswan.conf new file mode 100644 index 000000000..87b70994f --- /dev/null +++ b/testing/tests/pfkey/shunt-policies/hosts/moon/etc/strongswan.conf @@ -0,0 +1,7 @@ +# /etc/strongswan.conf - strongSwan configuration file + +charon { + load = curl aes des sha1 sha2 md5 pem pkcs1 gmp random x509 revocation hmac xcbc stroke kernel-pfkey kernel-netlink socket-default updown + multiple_authentication = no + install_routes = no +} diff --git a/testing/tests/pfkey/shunt-policies/hosts/sun/etc/ipsec.conf b/testing/tests/pfkey/shunt-policies/hosts/sun/etc/ipsec.conf new file mode 100755 index 000000000..c3b36fb7c --- /dev/null +++ b/testing/tests/pfkey/shunt-policies/hosts/sun/etc/ipsec.conf @@ -0,0 +1,25 @@ +# /etc/ipsec.conf - strongSwan IPsec configuration file + +config setup + crlcheckinterval=180 + strictcrlpolicy=no + plutostart=no + +conn %default + ikelifetime=60m + keylife=20m + rekeymargin=3m + keyingtries=1 + keyexchange=ikev2 + mobike=no + +conn net-net + left=PH_IP_SUN + leftcert=sunCert.pem + leftid=@sun.strongswan.org + leftsubnet=0.0.0.0/0 + leftfirewall=yes + right=PH_IP_MOON + rightid=@moon.strongswan.org + rightsubnet=10.1.0.0/16 + auto=add diff --git a/testing/tests/pfkey/shunt-policies/hosts/sun/etc/strongswan.conf b/testing/tests/pfkey/shunt-policies/hosts/sun/etc/strongswan.conf new file mode 100644 index 000000000..10efed787 --- /dev/null +++ b/testing/tests/pfkey/shunt-policies/hosts/sun/etc/strongswan.conf @@ -0,0 +1,6 @@ +# /etc/strongswan.conf - strongSwan configuration file + +charon { + load = curl aes des sha1 sha2 md5 pem pkcs1 gmp random x509 revocation hmac xcbc stroke kernel-pfkey kernel-netlink socket-default updown + multiple_authentication = no +} diff --git a/testing/tests/pfkey/shunt-policies/posttest.dat b/testing/tests/pfkey/shunt-policies/posttest.dat new file mode 100644 index 000000000..a4c96e10f --- /dev/null +++ b/testing/tests/pfkey/shunt-policies/posttest.dat @@ -0,0 +1,5 @@ +moon::ipsec stop +sun::ipsec stop +moon::/etc/init.d/iptables stop 2> /dev/null +sun::/etc/init.d/iptables stop 2> /dev/null + diff --git a/testing/tests/pfkey/shunt-policies/pretest.dat b/testing/tests/pfkey/shunt-policies/pretest.dat new file mode 100644 index 000000000..2d7a78acb --- /dev/null +++ b/testing/tests/pfkey/shunt-policies/pretest.dat @@ -0,0 +1,6 @@ +moon::/etc/init.d/iptables start 2> /dev/null +sun::/etc/init.d/iptables start 2> /dev/null +moon::ipsec start +sun::ipsec start +moon::sleep 1 +moon::ipsec up net-net diff --git a/testing/tests/pfkey/shunt-policies/test.conf b/testing/tests/pfkey/shunt-policies/test.conf new file mode 100644 index 000000000..d9a61590f --- /dev/null +++ b/testing/tests/pfkey/shunt-policies/test.conf @@ -0,0 +1,21 @@ +#!/bin/bash +# +# This configuration file provides information on the +# UML instances used for this test + +# All UML instances that are required for this test +# +UMLHOSTS="alice moon winnetou sun bob" + +# Corresponding block diagram +# +DIAGRAM="a-m-w-s-b.png" + +# UML instances on which tcpdump is to be started +# +TCPDUMPHOSTS="sun" + +# UML instances on which IPsec is started +# Used for IPsec logging purposes +# +IPSECHOSTS="moon sun"