[strongSwan] Tunnels with dynamic IP and another route issue
Dusan Ilic
dusan at comhem.se
Thu Apr 27 22:38:22 CEST 2017
I would really appreciate some help with below also, Im having a Hard
time understanding how Strongswan chooses connection definitions and
ipsec secrets.
For example, how can I setup an ikev2 psk tunnel between two hosts with
dynamic dns?
Can I have several ip secrets or connections with %any?
Ive tried with %dyndns but seem to get some errors about constraints and
such. If someone would give me an explanation that would be great!
Den 2017-04-24 kl. 18:48, skrev Dusan Ilic:
> No one?
>
>
> Den 2017-04-21 kl. 10:16, skrev Dusan Ilic:
>> Hi!
>>
>> I have some issues, please read on.
>>
>> 1. I have one side of the IP-sec tunnel with dynamic IP (associated
>> with a dynamic hostname), I would like not need to change the
>> "left"-parameter in both ipsec.conf and ipsec.secrets whenever the
>> local WAN IP changes, so I have tried putting "left = %any" or "left
>> = %hostname". Now, with %hostname (preferable) it wont connect, but
>> with %any it does connect, sometimes. I can see in the documentation
>> that %any does a local root lookup if the local host is initiating
>> the connection, but only accepting all local IP-adresses if it
>> responds to the remote peer initiation. In my case ths always work
>> when the remote peer is initiating the connection, but if my local
>> end initiates it (ie start=route) it seem to choose the wrong public
>> source IP to connect from.
>> In my case, my local gateway running Strongswan have multiple public
>> interfaces (but only one should be used for IP-sec tunnels), se below
>> route information:
>>
>> default
>> nexthop via 90.225.x.x dev vlan845 weight 1
>> nexthop via 10.248.x.x dev ppp0 weight 256
>> nexthop via 85.24.x.x dev vlan847 weight 1
>> nexthop via 46.195.x.x dev ppp1 weight 1
>>
>> My gateway is configured to use 10.248.0.x as "default route"
>> (highest weight/priority), but when Strongswan tried to initiate the
>> tunnel it seems to always default too the last route, 46.195.x.x, and
>> this wont work as the remote peer is expecting 85.24.x.x. Now, is
>> there a way to tell Strongswan to use this IP/interface? I hope
>> "left=%hostname" would work, because the hostname is dynamically
>> ponting to the IP at interface vlan847, but as already stated this
>> isn't working either.
>>
>> Any suggestions?
>>
>> 2. Probably also cause by the above routing setup (wild guess), I
>> also have IKEv2 EAP roadwarrior connectin in Strongswan on the same
>> interface. The Strongswan client on Android connects to my public
>> hostname, and everything works (and in this setup I can have
>> left=%hostname on the server), it's a full tunnel with
>> leftsubnet=0.0.0.0/0. However, all VPN-clients are beeing routed out
>> on this same interface the connect to, so the third route above is
>> being automatically used (vlan847) instead of the second route on
>> ppp0 (with higher weight/priority). Locally connected clients to the
>> gateway all gets routed out on ppp0, but not VPN-clients. Why is
>> this, and what can be done to correct this? The reason for me wanting
>> the VPN clients connecting on vlan847 also routed on the the Internet
>> on ppp0 is simple, ppp0 is a VPN connection from the gateway out to
>> the Internet.
>>
>> I can add that in strongswan.conf I have changed so that all
>> VPN-routes added by Strongswan is done in the standard, main routing
>> table (instead of 220), so technically the VPN-clients should be
>> routed the same as the local clients by the gateway.
>
More information about the Users
mailing list