Added swanctl/ip-pool-db scenario

This commit is contained in:
Andreas Steffen 2014-06-11 18:11:11 +02:00
parent cda2a1e4dc
commit 12d618e280
11 changed files with 246 additions and 0 deletions

View File

@ -0,0 +1,10 @@
The roadwarriors <b>carol</b> and <b>dave</b> set up a connection each to gateway <b>moon</b>.
Both <b>carol</b> and <b>dave</b> request a <b>virtual IP</b> via the IKEv2 configuration payload
by using the <b>leftsourceip=%config</b> parameter. The gateway <b>moon</b> assigns virtual IP
addresses from a pool named <b>bigpool</b> that was created in an SQL database by the command
<b>ipsec pool --name bigpool --start 10.3.0.1 --end 10.3.3.232 --timeout 0</b>.
<p>
<b>leftfirewall=yes</b> automatically inserts iptables-based firewall rules that let pass the
tunneled traffic. In order to test the tunnels, <b>carol</b> and <b>dave</b> then ping the client
<b>alice</b> behind the gateway <b>moon</b>. The source IP addresses of the two pings will be the
virtual IPs <b>carol1</b> and <b>dave1</b>, respectively.

View File

@ -0,0 +1,43 @@
carol::swanctl --list-sas 2> /dev/null::home: #1, ESTABLISHED, IKEv2::YES
dave:: swanctl --list-sas 2> /dev/null::home: #1, ESTABLISHED, IKEv2::YES
moon:: swanctl --list-sas --ike-id 1 2> /dev/null::rw: #1, ESTABLISHED, IKEv2::YES
moon:: swanctl --list-sas --ike-id 2 2> /dev/null::rw: #2, ESTABLISHED, IKEv2::YES
carol::swanctl --list-sas 2> /dev/null::local.*carol@strongswan.org.*192.168.0.100::YES
carol::swanctl --list-sas 2> /dev/null::remote.*moon.strongswan.org.*192.168.0.1::YES
dave:: swanctl --list-sas 2> /dev/null::local.*dave@strongswan.org.*192.168.0.200::YES
dave:: swanctl --list-sas 2> /dev/null::remote.*moon.strongswan.org.*192.168.0.1::YES
moon:: swanctl --list-sas --ike-id 1 2> /dev/null::local.*moon.strongswan.org.*192.168.0.1::YES
moon:: swanctl --list-sas --ike-id 1 2> /dev/null::remote.*carol@strongswan.org.*192.168.0.100::YES
moon:: swanctl --list-sas --ike-id 2 2> /dev/null::local.*moon.strongswan.org.*192.168.0.1::YES
moon:: swanctl --list-sas --ike-id 2 2> /dev/null::remote.*dave@strongswan.org.*192.168.0.200::YES
moon:: cat /var/log/daemon.log::assigning virtual IP 10.3.0.1 to peer.*carol@strongswan.org::YES
moon:: cat /var/log/daemon.log::assigning virtual IP 10.3.0.2 to peer.*dave@strongswan.org::YES
moon:: ipsec pool --status 2> /dev/null::big_pool.*10.3.0.1.*10.3.3.232.*static.*2::YES
moon:: ipsec pool --leases --filter pool=big_pool,addr=10.3.0.1,id=carol@strongswan.org 2> /dev/null::online::YES
moon:: ipsec pool --leases --filter pool=big_pool,addr=10.3.0.2,id=dave@strongswan.org 2> /dev/null::online::YES
carol::cat /var/log/daemon.log::installing new virtual IP 10.3.0.1::YES
carol::cat /var/log/daemon.log::installing DNS server PH_IP_WINNETOU::YES
carol::cat /var/log/daemon.log::installing DNS server PH_IP_VENUS::YES
carol::cat /var/log/daemon.log::handling INTERNAL_IP4_NBNS attribute failed::YES
dave:: cat /var/log/daemon.log::installing new virtual IP 10.3.0.2::YES
dave:: cat /var/log/daemon.log::installing DNS server PH_IP_WINNETOU::YES
dave:: cat /var/log/daemon.log::installing DNS server PH_IP_VENUS::YES
dave:: cat /var/log/daemon.log::handling INTERNAL_IP4_NBNS attribute failed::YES
carol::swanctl --list-sas 2> /dev/null::home: #1, INSTALLED, TUNNEL, ESP:AES_GCM_16-128::YES
dave:: swanctl --list-sas 2> /dev/null::home: #1, INSTALLED, TUNNEL, ESP:AES_GCM_16-128::YES
moon:: swanctl --list-sas --ike-id 1 2> /dev/null::net: #1, INSTALLED, TUNNEL, ESP:AES_GCM_16-128::YES
moon:: swanctl --list-sas --ike-id 2 2> /dev/null::net: #2, INSTALLED, TUNNEL, ESP:AES_GCM_16-128::YES
carol::swanctl --list-sas 2> /dev/null::local.*10.3.0.1/32::YES
carol::swanctl --list-sas 2> /dev/null::remote 10.1.0.0/16::YES
dave:: swanctl --list-sas 2> /dev/null::local.*10.3.0.2/32::YES
dave:: swanctl --list-sas 2> /dev/null::remote 10.1.0.0/16::YES
moon:: swanctl --list-sas --ike-id 1 2> /dev/null::local.*10.1.0.0/16::YES
moon:: swanctl --list-sas --ike-id 1 2> /dev/null::remote 10.3.0.1/32::YES
moon:: swanctl --list-sas --ike-id 2 2> /dev/null::local.*10.1.0.0/16::YES
moon:: swanctl --list-sas --ike-id 2 2> /dev/null::remote 10.3.0.2/32::YES
alice::ping -c 1 10.3.0.1::64 bytes from 10.3.0.1: icmp_req=1::YES
alice::ping -c 1 10.3.0.2::64 bytes from 10.3.0.2: icmp_req=1::YES
moon::tcpdump::IP moon.strongswan.org > carol.strongswan.org: ESP::YES
moon::tcpdump::IP carol.strongswan.org > moon.strongswan.org: ESP::YES
moon::tcpdump::IP moon.strongswan.org > dave.strongswan.org: ESP::YES
moon::tcpdump::IP dave.strongswan.org > moon.strongswan.org: ESP::YES

View File

@ -0,0 +1,11 @@
# /etc/strongswan.conf - strongSwan configuration file
swanctl {
load = pem pkcs1 x509 revocation constraints pubkey openssl random
}
charon {
dh_exponent_ansi_x9_42 = no
load = sha1 sha2 md5 aes des hmac pem pkcs1 x509 revocation constraints pubkey gmp random nonce curl kernel-netlink socket-default resolve updown vici
}

View File

@ -0,0 +1,33 @@
connections {
home {
local_addrs = 192.168.0.100
remote_addrs = 192.168.0.1
vips = 0.0.0.0
local {
auth = pubkey
certs = carolCert.pem
id = carol@strongswan.org
}
remote {
auth = pubkey
id = moon.strongswan.org
}
children {
home {
remote_ts = 10.1.0.0/16
start_action = none
updown = /usr/local/libexec/ipsec/_updown iptables
rekey_time = 10m
esp_proposals = aes128gcm128-modp2048
}
}
version = 2
reauth_time = 60m
rekey_time = 20m
proposals = aes128-sha256-modp2048
}
}

View File

@ -0,0 +1,11 @@
# /etc/strongswan.conf - strongSwan configuration file
swanctl {
load = pem pkcs1 x509 revocation constraints pubkey openssl random
}
charon {
dh_exponent_ansi_x9_42 = no
load = sha1 sha2 md5 aes des hmac pem pkcs1 x509 revocation constraints pubkey gmp random nonce curl kernel-netlink socket-default resolve updown vici
}

View File

@ -0,0 +1,33 @@
connections {
home {
local_addrs = 192.168.0.200
remote_addrs = 192.168.0.1
vips = 0.0.0.0
local {
auth = pubkey
certs = daveCert.pem
id = dave@strongswan.org
}
remote {
auth = pubkey
id = moon.strongswan.org
}
children {
home {
remote_ts = 10.1.0.0/16
start_action = none
updown = /usr/local/libexec/ipsec/_updown iptables
rekey_time = 10m
esp_proposals = aes128gcm128-modp2048
}
}
version = 2
reauth_time = 60m
rekey_time = 20m
proposals = aes128-sha256-modp2048
}
}

View File

@ -0,0 +1,21 @@
# /etc/strongswan.conf - strongSwan configuration file
swanctl {
load = pem pkcs1 x509 revocation constraints pubkey openssl random
}
charon {
dh_exponent_ansi_x9_42 = no
load = sha1 sha2 md5 aes des hmac pem pkcs1 x509 revocation constraints pubkey gmp random nonce curl kernel-netlink socket-default updown sqlite attr-sql vici
plugins {
attr-sql {
database = sqlite:///etc/ipsec.d/ipsec.db
}
}
}
pool {
load = sqlite
}

View File

@ -0,0 +1,31 @@
connections {
rw {
local_addrs = 192.168.0.1
pools = big_pool
local {
auth = pubkey
certs = moonCert.pem
id = moon.strongswan.org
}
remote {
auth = pubkey
}
children {
net {
local_ts = 10.1.0.0/16
start_action = none
updown = /usr/local/libexec/ipsec/_updown iptables
rekey_time = 10m
esp_proposals = aes128gcm128-modp2048
}
}
version = 2
reauth_time = 60m
rekey_time = 20m
proposals = aes128-sha256-modp2048
}
}

View File

@ -0,0 +1,11 @@
carol::swanctl --terminate --ike home
dave::swanctl --terminate --ike home
carol::service charon stop 2> /dev/null
dave::service charon stop 2> /dev/null
moon::service charon stop 2> /dev/null
moon::iptables-restore < /etc/iptables.flush
carol::iptables-restore < /etc/iptables.flush
dave::iptables-restore < /etc/iptables.flush
moon::ipsec pool --del big_pool 2> /dev/null
moon::ipsec pool --del dns 2> /dev/null
moon::ipsec pool --del nbns 2> /dev/null

View File

@ -0,0 +1,21 @@
moon::cat /usr/local/share/strongswan/templates/database/sql/sqlite.sql > /etc/ipsec.d/ipsec.sql
moon::cat /etc/ipsec.d/ipsec.sql | sqlite3 /etc/ipsec.d/ipsec.db
moon::ipsec pool --add big_pool --start 10.3.0.1 --end 10.3.3.232 --timeout 0 2> /dev/null
moon::ipsec pool --addattr dns --server PH_IP_WINNETOU 2> /dev/null
moon::ipsec pool --addattr dns --server PH_IP_VENUS 2> /dev/null
moon::ipsec pool --addattr nbns --server PH_IP_VENUS 2> /dev/null
moon::iptables-restore < /etc/iptables.rules
carol::iptables-restore < /etc/iptables.rules
dave::iptables-restore < /etc/iptables.rules
moon::service charon start 2> /dev/null
carol::service charon start 2> /dev/null
dave::service charon start 2> /dev/null
moon::sleep 1
moon::swanctl --load-conns 2> /dev/null
carol::swanctl --load-conns 2> /dev/null
dave::swanctl --load-conns 2> /dev/null
moon::swanctl --load-creds 2> /dev/null
carol::swanctl --load-creds 2> /dev/null
dave::swanctl --load-creds 2> /dev/null
carol::swanctl --initiate --child home 2> /dev/null
dave::swanctl --initiate --child home 2> /dev/null

View File

@ -0,0 +1,21 @@
#!/bin/bash
#
# This configuration file provides information on the
# guest instances used for this test
# All guest instances that are required for this test
#
VIRTHOSTS="alice moon carol winnetou dave"
# Corresponding block diagram
#
DIAGRAM="a-m-c-w-d.png"
# Guest instances on which tcpdump is to be started
#
TCPDUMPHOSTS="moon"
# Guest instances on which IPsec is started
# Used for IPsec logging purposes
#
IPSECHOSTS="moon carol dave"