testing: added tnc/tnccs-20-mutual scenario

This commit is contained in:
Andreas Steffen 2015-03-23 23:01:13 +01:00
parent 7b4a96b2f7
commit be04f90815
11 changed files with 151 additions and 0 deletions

View File

@ -0,0 +1,3 @@
The hosts <b>moon</b> and <b>sun</b> do mutual TNC measurements using the
PA-TNC, PB-TNC and PT-EAP protocols. The authentication is based on X.509
certificates.

View File

@ -0,0 +1,9 @@
moon::cat /var/log/daemon.log::PB-TNC access recommendation is.*Access Allowed::YES
sun:: cat /var/log/daemon.log::PB-TNC access recommendation is.*Access Allowed::YES
moon::ipsec status 2> /dev/null::host-host.*ESTABLISHED.*moon.strongswan.org.*sun.strongswan.org::YES
sun:: ipsec status 2> /dev/null::host-host.*ESTABLISHED.*sun.strongswan.org.*moon.strongswan.org::YES
moon::ipsec status 2> /dev/null::host-host.*INSTALLED, TUNNEL::YES
sun:: ipsec status 2> /dev/null::host-host.*INSTALLED, TUNNEL::YES
moon::ping -c 1 PH_IP_SUN::64 bytes from PH_IP_SUN: icmp_req=1::YES
sun::tcpdump::IP moon.strongswan.org > sun.strongswan.org: ESP::YES
sun::tcpdump::IP sun.strongswan.org > moon.strongswan.org: ESP::YES

View File

@ -0,0 +1,23 @@
# /etc/ipsec.conf - strongSwan IPsec configuration file
config setup
charondebug="tnc 2, imc 2, imv 2"
conn %default
ikelifetime=60m
keylife=20m
rekeymargin=3m
keyingtries=1
keyexchange=ikev2
conn host-host
left=PH_IP_MOON
leftcert=moonCert.pem
leftid=moon.strongswan.org
leftauth=eap
leftfirewall=yes
right=PH_IP_SUN
rightid=sun.strongswan.org
rightsendcert=never
rightauth=any
auto=add

View File

@ -0,0 +1,26 @@
# /etc/strongswan.conf - strongSwan configuration file
charon {
load = openssl pem pkcs1 random nonce x509 curl revocation stroke kernel-netlink socket-default eap-identity eap-ttls eap-tnc tnc-tnccs tnc-imc tnc-imv tnccs-20 updown
multiple_authentication = no
plugins {
eap-ttls {
phase2_tnc =yes
}
tnccs-20 {
mutual = yes
}
}
}
libimcv {
plugins {
imc-test {
command = allow
}
imv-test {
rounds = 1
}
}
}

View File

@ -0,0 +1,4 @@
#IMC/IMV configuration file for strongSwan endpoint
IMC "Test" /usr/local/lib/ipsec/imcvs/imc-test.so
IMV "Test" /usr/local/lib/ipsec/imcvs/imv-test.so

View File

@ -0,0 +1,23 @@
# /etc/ipsec.conf - strongSwan IPsec configuration file
config setup
charondebug="tnc 2, imc 2, imv 2"
conn %default
ikelifetime=60m
keylife=20m
rekeymargin=3m
keyingtries=1
keyexchange=ikev2
conn host-host
left=PH_IP_SUN
leftcert=sunCert.pem
leftid=sun.strongswan.org
leftauth=eap-ttls
leftfirewall=yes
right=PH_IP_MOON
rightid=moon.strongswan.org
rightauth=eap-ttls
rightsendcert=never
auto=add

View File

@ -0,0 +1,28 @@
# /etc/strongswan.conf - strongSwan configuration file
charon {
load = openssl pem pkcs1 random nonce x509 curl revocation stroke kernel-netlink socket-default eap-identity eap-ttls eap-tnc tnc-tnccs tnc-imc tnc-imv tnccs-20 updown
multiple_authentication = no
plugins {
eap-ttls {
request_peer_auth = yes
phase2_piggyback = yes
phase2_tnc =yes
}
tnccs-20 {
mutual = yes
}
}
}
libimcv {
plugins {
imc-test {
command = allow
}
imv-test {
rounds = 1
}
}
}

View File

@ -0,0 +1,4 @@
#IMC/IMV configuration file for strongSwan endpoint
IMC "Test" /usr/local/lib/ipsec/imcvs/imc-test.so
IMV "Test" /usr/local/lib/ipsec/imcvs/imv-test.so

View File

@ -0,0 +1,4 @@
moon::ipsec stop
sun::ipsec stop
moon::iptables-restore < /etc/iptables.flush
sun::iptables-restore < /etc/iptables.flush

View File

@ -0,0 +1,6 @@
moon::iptables-restore < /etc/iptables.rules
sun::iptables-restore < /etc/iptables.rules
moon::ipsec start
sun::ipsec start
moon::sleep 1
moon::ipsec up host-host

View File

@ -0,0 +1,21 @@
#!/bin/bash
#
# This configuration file provides information on the
# guest instances used for this test
# All guest instances that are required for this test
#
VIRTHOSTS="moon winnetou sun"
# Corresponding block diagram
#
DIAGRAM="m-w-s.png"
# Guest instances on which tcpdump is to be started
#
TCPDUMPHOSTS="sun"
# Guest instances on which IPsec is started
# Used for IPsec logging purposes
#
IPSECHOSTS="moon sun"