mirror of
https://github.com/strongswan/strongswan.git
synced 2025-10-08 00:02:03 -04:00
created ikev1/xauth-id-rsa scenario using XAUTH identities
This commit is contained in:
parent
0a6085b13e
commit
2549ff7849
10
testing/tests/ikev1/xauth-id-rsa/description.txt
Normal file
10
testing/tests/ikev1/xauth-id-rsa/description.txt
Normal file
@ -0,0 +1,10 @@
|
|||||||
|
The roadwarriors <b>carol</b> and <b>dave</b> set up a connection to gateway <b>moon</b>.
|
||||||
|
The authentication is based on RSA signatures (<b>RSASIG</b>) using X.509 certificates
|
||||||
|
followed by extended authentication (<b>XAUTH</b>) of <b>carol</b> and <b>dave</b>
|
||||||
|
based on user names defined by the <b>xauth_identity</b> parameter (<b>carol</b> and <b>dave</b>,
|
||||||
|
respectively) and corresponding user passwords defined and stored in ipsec.secrets.
|
||||||
|
<p>
|
||||||
|
Upon the successful establishment of the IPsec tunnel, leftfirewall=yes automatically
|
||||||
|
inserts iptables-based firewall rules that let pass the tunneled traffic.
|
||||||
|
In order to test both tunnel and firewall, <b>carol</b> and <b>dave</b> ping the client
|
||||||
|
<b>alice</b> behind the gateway <b>moon</b>.
|
14
testing/tests/ikev1/xauth-id-rsa/evaltest.dat
Normal file
14
testing/tests/ikev1/xauth-id-rsa/evaltest.dat
Normal file
@ -0,0 +1,14 @@
|
|||||||
|
carol::cat /var/log/auth.log::extended authentication was successful::YES
|
||||||
|
dave::cat /var/log/auth.log::extended authentication was successful::YES
|
||||||
|
moon::cat /var/log/auth.log::xauth user name is .*carol::YES
|
||||||
|
moon::cat /var/log/auth.log::xauth user name is .*dave::YES
|
||||||
|
moon::cat /var/log/auth.log::extended authentication was successful::YES
|
||||||
|
carol::ipsec status::home.*STATE_QUICK_I2.*IPsec SA established::YES
|
||||||
|
dave::ipsec status::home.*STATE_QUICK_I2.*IPsec SA established::YES
|
||||||
|
moon::ipsec status::rw.*STATE_QUICK_R2.*IPsec SA established::YES
|
||||||
|
carol::ping -c 1 PH_IP_ALICE::64 bytes from PH_IP_ALICE: icmp_seq=1::YES
|
||||||
|
dave::ping -c 1 PH_IP_ALICE::64 bytes from PH_IP_ALICE: icmp_seq=1::YES
|
||||||
|
moon::tcpdump::IP carol.strongswan.org > moon.strongswan.org: ESP::YES
|
||||||
|
moon::tcpdump::IP moon.strongswan.org > carol.strongswan.org: ESP::YES
|
||||||
|
moon::tcpdump::IP dave.strongswan.org > moon.strongswan.org: ESP::YES
|
||||||
|
moon::tcpdump::IP moon.strongswan.org > dave.strongswan.org: ESP::YES
|
25
testing/tests/ikev1/xauth-id-rsa/hosts/carol/etc/ipsec.conf
Normal file
25
testing/tests/ikev1/xauth-id-rsa/hosts/carol/etc/ipsec.conf
Normal file
@ -0,0 +1,25 @@
|
|||||||
|
# /etc/ipsec.conf - strongSwan IPsec configuration file
|
||||||
|
|
||||||
|
config setup
|
||||||
|
plutodebug=control
|
||||||
|
crlcheckinterval=180
|
||||||
|
strictcrlpolicy=no
|
||||||
|
charonstart=no
|
||||||
|
|
||||||
|
conn %default
|
||||||
|
ikelifetime=60m
|
||||||
|
keylife=20m
|
||||||
|
rekeymargin=3m
|
||||||
|
keyingtries=1
|
||||||
|
authby=xauthrsasig
|
||||||
|
|
||||||
|
conn home
|
||||||
|
left=PH_IP_CAROL
|
||||||
|
leftcert=carolCert.pem
|
||||||
|
leftid=carol@strongswan.org
|
||||||
|
leftfirewall=yes
|
||||||
|
right=PH_IP_MOON
|
||||||
|
rightsubnet=10.1.0.0/16
|
||||||
|
rightid=@moon.strongswan.org
|
||||||
|
xauth_identity=carol
|
||||||
|
auto=add
|
@ -0,0 +1,5 @@
|
|||||||
|
# /etc/ipsec.secrets - strongSwan IPsec secrets file
|
||||||
|
|
||||||
|
: RSA carolKey.pem "nH5ZQEWtku0RJEZ6"
|
||||||
|
|
||||||
|
carol : XAUTH "4iChxLT3"
|
@ -0,0 +1,11 @@
|
|||||||
|
# /etc/strongswan.conf - strongSwan configuration file
|
||||||
|
|
||||||
|
pluto {
|
||||||
|
load = sha1 sha2 md5 aes des hmac pem pkcs1 x509 gmp random curl xauth
|
||||||
|
}
|
||||||
|
|
||||||
|
# pluto uses optimized DH exponent sizes (RFC 3526)
|
||||||
|
|
||||||
|
libstrongswan {
|
||||||
|
dh_exponent_ansi_x9_42 = no
|
||||||
|
}
|
25
testing/tests/ikev1/xauth-id-rsa/hosts/dave/etc/ipsec.conf
Normal file
25
testing/tests/ikev1/xauth-id-rsa/hosts/dave/etc/ipsec.conf
Normal file
@ -0,0 +1,25 @@
|
|||||||
|
# /etc/ipsec.conf - strongSwan IPsec configuration file
|
||||||
|
|
||||||
|
config setup
|
||||||
|
plutodebug=control
|
||||||
|
crlcheckinterval=180
|
||||||
|
strictcrlpolicy=no
|
||||||
|
charonstart=no
|
||||||
|
|
||||||
|
conn %default
|
||||||
|
ikelifetime=60m
|
||||||
|
keylife=20m
|
||||||
|
rekeymargin=3m
|
||||||
|
keyingtries=1
|
||||||
|
authby=xauthrsasig
|
||||||
|
|
||||||
|
conn home
|
||||||
|
left=PH_IP_DAVE
|
||||||
|
leftcert=daveCert.pem
|
||||||
|
leftid=dave@strongswan.org
|
||||||
|
leftfirewall=yes
|
||||||
|
right=PH_IP_MOON
|
||||||
|
rightsubnet=10.1.0.0/16
|
||||||
|
rightid=@moon.strongswan.org
|
||||||
|
xauth_identity=dave
|
||||||
|
auto=add
|
@ -0,0 +1,5 @@
|
|||||||
|
# /etc/ipsec.secrets - strongSwan IPsec secrets file
|
||||||
|
|
||||||
|
: RSA daveKey.pem
|
||||||
|
|
||||||
|
dave : XAUTH "ryftzG4A"
|
@ -0,0 +1,11 @@
|
|||||||
|
# /etc/strongswan.conf - strongSwan configuration file
|
||||||
|
|
||||||
|
pluto {
|
||||||
|
load = sha1 sha2 md5 aes des hmac pem pkcs1 x509 gmp random curl xauth
|
||||||
|
}
|
||||||
|
|
||||||
|
# pluto uses optimized DH exponent sizes (RFC 3526)
|
||||||
|
|
||||||
|
libstrongswan {
|
||||||
|
dh_exponent_ansi_x9_42 = no
|
||||||
|
}
|
24
testing/tests/ikev1/xauth-id-rsa/hosts/moon/etc/ipsec.conf
Normal file
24
testing/tests/ikev1/xauth-id-rsa/hosts/moon/etc/ipsec.conf
Normal file
@ -0,0 +1,24 @@
|
|||||||
|
# /etc/ipsec.conf - strongSwan IPsec configuration file
|
||||||
|
|
||||||
|
config setup
|
||||||
|
plutodebug=control
|
||||||
|
crlcheckinterval=180
|
||||||
|
strictcrlpolicy=no
|
||||||
|
charonstart=no
|
||||||
|
|
||||||
|
conn %default
|
||||||
|
ikelifetime=60m
|
||||||
|
keylife=20m
|
||||||
|
rekeymargin=3m
|
||||||
|
keyingtries=1
|
||||||
|
authby=xauthrsasig
|
||||||
|
xauth=server
|
||||||
|
|
||||||
|
conn rw
|
||||||
|
left=PH_IP_MOON
|
||||||
|
leftcert=moonCert.pem
|
||||||
|
leftid=@moon.strongswan.org
|
||||||
|
leftsubnet=10.1.0.0/16
|
||||||
|
leftfirewall=yes
|
||||||
|
right=%any
|
||||||
|
auto=add
|
@ -0,0 +1,7 @@
|
|||||||
|
# /etc/ipsec.secrets - strongSwan IPsec secrets file
|
||||||
|
|
||||||
|
: RSA moonKey.pem
|
||||||
|
|
||||||
|
carol : XAUTH "4iChxLT3"
|
||||||
|
|
||||||
|
dave : XAUTH "ryftzG4A"
|
@ -0,0 +1,11 @@
|
|||||||
|
# /etc/strongswan.conf - strongSwan configuration file
|
||||||
|
|
||||||
|
pluto {
|
||||||
|
load = sha1 sha2 md5 aes des hmac pem pkcs1 x509 gmp random curl xauth
|
||||||
|
}
|
||||||
|
|
||||||
|
# pluto uses optimized DH exponent sizes (RFC 3526)
|
||||||
|
|
||||||
|
libstrongswan {
|
||||||
|
dh_exponent_ansi_x9_42 = no
|
||||||
|
}
|
6
testing/tests/ikev1/xauth-id-rsa/posttest.dat
Normal file
6
testing/tests/ikev1/xauth-id-rsa/posttest.dat
Normal file
@ -0,0 +1,6 @@
|
|||||||
|
moon::ipsec stop
|
||||||
|
carol::ipsec stop
|
||||||
|
dave::ipsec stop
|
||||||
|
moon::/etc/init.d/iptables stop 2> /dev/null
|
||||||
|
carol::/etc/init.d/iptables stop 2> /dev/null
|
||||||
|
dave::/etc/init.d/iptables stop 2> /dev/null
|
9
testing/tests/ikev1/xauth-id-rsa/pretest.dat
Normal file
9
testing/tests/ikev1/xauth-id-rsa/pretest.dat
Normal file
@ -0,0 +1,9 @@
|
|||||||
|
moon::/etc/init.d/iptables start 2> /dev/null
|
||||||
|
carol::/etc/init.d/iptables start 2> /dev/null
|
||||||
|
dave::/etc/init.d/iptables start 2> /dev/null
|
||||||
|
moon::ipsec start
|
||||||
|
carol::ipsec start
|
||||||
|
dave::ipsec start
|
||||||
|
carol::sleep 2
|
||||||
|
carol::ipsec up home
|
||||||
|
dave::ipsec up home
|
21
testing/tests/ikev1/xauth-id-rsa/test.conf
Normal file
21
testing/tests/ikev1/xauth-id-rsa/test.conf
Normal file
@ -0,0 +1,21 @@
|
|||||||
|
#!/bin/bash
|
||||||
|
#
|
||||||
|
# This configuration file provides information on the
|
||||||
|
# UML instances used for this test
|
||||||
|
|
||||||
|
# All UML instances that are required for this test
|
||||||
|
#
|
||||||
|
UMLHOSTS="alice moon carol winnetou dave"
|
||||||
|
|
||||||
|
# Corresponding block diagram
|
||||||
|
#
|
||||||
|
DIAGRAM="a-m-c-w-d.png"
|
||||||
|
|
||||||
|
# UML instances on which tcpdump is to be started
|
||||||
|
#
|
||||||
|
TCPDUMPHOSTS="moon"
|
||||||
|
|
||||||
|
# UML instances on which IPsec is started
|
||||||
|
# Used for IPsec logging purposes
|
||||||
|
#
|
||||||
|
IPSECHOSTS="moon carol dave"
|
Loading…
x
Reference in New Issue
Block a user