203 lines
5.7 KiB
ReStructuredText
203 lines
5.7 KiB
ReStructuredText
|
VPP as IKEv2 initiator and strongSwan as responder
|
|||
|
==================================================
|
|||
|
|
|||
|
Prerequisites
|
|||
|
-------------
|
|||
|
|
|||
|
To make the examples easier to configure ``docker`` it is required to
|
|||
|
pull strongSwan docker image. The networking is done using Linux’ veth
|
|||
|
interfaces and namespaces.
|
|||
|
|
|||
|
Setup
|
|||
|
-----
|
|||
|
|
|||
|
First a topology:
|
|||
|
|
|||
|
::
|
|||
|
|
|||
|
192.168.3.2 192.168.5.2
|
|||
|
+ loopback
|
|||
|
| +
|
|||
|
+----+----+ 192.168.10.2 +-----+----+
|
|||
|
| VPP | |strongSwan|
|
|||
|
|initiator+----------------------+responder |
|
|||
|
+---------+ +----------+
|
|||
|
192.168.10.1
|
|||
|
|
|||
|
Create veth interfaces and namespaces and configure them:
|
|||
|
|
|||
|
::
|
|||
|
|
|||
|
sudo ip link add gw type veth peer name swanif
|
|||
|
sudo ip link set dev gw up
|
|||
|
|
|||
|
sudo ip netns add ns
|
|||
|
sudo ip link add veth_priv type veth peer name priv
|
|||
|
sudo ip link set dev priv up
|
|||
|
sudo ip link set dev veth_priv up netns ns
|
|||
|
|
|||
|
sudo ip netns exec ns \
|
|||
|
bash -c "
|
|||
|
ip link set dev lo up
|
|||
|
ip addr add 192.168.3.2/24 dev veth_priv
|
|||
|
ip route add 192.168.5.0/24 via 192.168.3.1"
|
|||
|
|
|||
|
Create directory with strongswan configs that will be mounted to the
|
|||
|
docker container
|
|||
|
|
|||
|
::
|
|||
|
|
|||
|
mkdir /tmp/sswan
|
|||
|
|
|||
|
Create the ``ipsec.conf`` file in the ``/tmp/sswan`` directory with
|
|||
|
following content:
|
|||
|
|
|||
|
::
|
|||
|
|
|||
|
config setup
|
|||
|
strictcrlpolicy=no
|
|||
|
|
|||
|
conn initiator
|
|||
|
mobike=no
|
|||
|
auto=add
|
|||
|
type=tunnel
|
|||
|
keyexchange=ikev2
|
|||
|
ike=aes256gcm16-prfsha256-modp2048!
|
|||
|
esp=aes256gcm16-esn!
|
|||
|
|
|||
|
# local:
|
|||
|
leftauth=psk
|
|||
|
leftid=@sswan.vpn.example.com
|
|||
|
leftsubnet=192.168.5.0/24
|
|||
|
|
|||
|
# remote: (gateway)
|
|||
|
rightid=@roadwarrior.vpp
|
|||
|
right=192.168.10.2
|
|||
|
rightauth=psk
|
|||
|
rightsubnet=192.168.3.0/24
|
|||
|
|
|||
|
``/tmp/sswan/ipsec.secrets``
|
|||
|
|
|||
|
::
|
|||
|
|
|||
|
: PSK 'Vpp123'
|
|||
|
|
|||
|
``/tmp/sswan/strongswan.conf``
|
|||
|
|
|||
|
::
|
|||
|
|
|||
|
charon {
|
|||
|
load_modular = yes
|
|||
|
plugins {
|
|||
|
include strongswan.d/charon/*.conf
|
|||
|
}
|
|||
|
filelog {
|
|||
|
/tmp/charon.log {
|
|||
|
time_format = %b %e %T
|
|||
|
ike_name = yes
|
|||
|
append = no
|
|||
|
default = 2
|
|||
|
flush_line = yes
|
|||
|
}
|
|||
|
}
|
|||
|
}
|
|||
|
include strongswan.d/*.conf
|
|||
|
|
|||
|
Start docker container with strongSwan:
|
|||
|
|
|||
|
::
|
|||
|
|
|||
|
docker run --name sswan -d --privileged --rm --net=none \
|
|||
|
-v /tmp/sswan:/conf -v /tmp/sswan:/etc/ipsec.d philplckthun/strongswan
|
|||
|
|
|||
|
Finish configuration of initiator’s private network:
|
|||
|
|
|||
|
::
|
|||
|
|
|||
|
pid=$(docker inspect --format "{{.State.Pid}}" sswan)
|
|||
|
sudo ip link set netns $pid dev swanif
|
|||
|
|
|||
|
sudo nsenter -t $pid -n ip addr add 192.168.10.1/24 dev swanif
|
|||
|
sudo nsenter -t $pid -n ip link set dev swanif up
|
|||
|
|
|||
|
sudo nsenter -t $pid -n ip addr add 192.168.5.2/32 dev lo
|
|||
|
sudo nsenter -t $pid -n ip link set dev lo up
|
|||
|
|
|||
|
Start VPP …
|
|||
|
|
|||
|
::
|
|||
|
|
|||
|
sudo /usr/bin/vpp unix { \
|
|||
|
cli-listen /tmp/vpp.sock \
|
|||
|
gid $(id -g) } \
|
|||
|
api-segment { prefix vpp } \
|
|||
|
plugins { plugin dpdk_plugin.so { disable } }
|
|||
|
|
|||
|
… and configure it:
|
|||
|
|
|||
|
::
|
|||
|
|
|||
|
create host-interface name gw
|
|||
|
set interface ip addr host-gw 192.168.10.2/24
|
|||
|
set interface state host-gw up
|
|||
|
|
|||
|
create host-interface name priv
|
|||
|
set interface ip addr host-priv 192.168.3.1/24
|
|||
|
set interface state host-priv up
|
|||
|
|
|||
|
ikev2 profile add pr1
|
|||
|
ikev2 profile set pr1 auth shared-key-mic string Vpp123
|
|||
|
ikev2 profile set pr1 id local fqdn roadwarrior.vpp
|
|||
|
ikev2 profile set pr1 id remote fqdn sswan.vpn.example.com
|
|||
|
|
|||
|
ikev2 profile set pr1 traffic-selector local ip-range 192.168.3.0 - 192.168.3.255 port-range 0 - 65535 protocol 0
|
|||
|
ikev2 profile set pr1 traffic-selector remote ip-range 192.168.5.0 - 192.168.5.255 port-range 0 - 65535 protocol 0
|
|||
|
|
|||
|
ikev2 profile set pr1 responder host-gw 192.168.10.1
|
|||
|
ikev2 profile set pr1 ike-crypto-alg aes-gcm-16 256 ike-dh modp-2048
|
|||
|
ikev2 profile set pr1 esp-crypto-alg aes-gcm-16 256
|
|||
|
|
|||
|
create ipip tunnel src 192.168.10.2 dst 192.168.10.1
|
|||
|
ikev2 profile set pr1 tunnel ipip0
|
|||
|
ip route add 192.168.5.0/24 via 192.168.10.1 ipip0
|
|||
|
set interface unnumbered ipip0 use host-gw
|
|||
|
|
|||
|
Initiate the IKEv2 connection:
|
|||
|
|
|||
|
::
|
|||
|
|
|||
|
vpp# ikev2 initiate sa-init pr1
|
|||
|
|
|||
|
::
|
|||
|
|
|||
|
vpp# show ikev2 sa details
|
|||
|
iip 192.168.10.2 ispi f717b0cbd17e27c3 rip 192.168.10.1 rspi e9b7af7fc9b13361
|
|||
|
encr:aes-gcm-16 prf:hmac-sha2-256 dh-group:modp-2048
|
|||
|
nonce i:eb0354613b268c6372061bbdaab13deca37c8a625b1f65c073d25df2ecfe672e
|
|||
|
r:70e1248ac09943047064f6a2135fa2a424778ba03038ab9c4c2af8aba179ed84
|
|||
|
SK_d 96bd4feb59be2edf1930a12a3a5d22e30195ee9f56ea203c5fb6cba5dd2bb80f
|
|||
|
SK_e i:00000000: 5b75b9d808c8467fd00a0923c06efee2a4eb1d033c57532e05f9316ed9c56fe9
|
|||
|
00000020: c4db9114
|
|||
|
r:00000000: 95121b63372d20b83558dc3e209b9affef042816cf071c86a53543677b40c15b
|
|||
|
00000020: f169ab67
|
|||
|
SK_p i:fb40d1114c347ddc3228ba004d4759d58f9c1ae6f1746833f908d39444ef92b1
|
|||
|
r:aa049828240cb242e1d5aa625cd5914dc8f8e980a74de8e06883623d19384902
|
|||
|
identifier (i) id-type fqdn data roadwarrior.vpp
|
|||
|
identifier (r) id-type fqdn data sswan.vpn.example.com
|
|||
|
child sa 0:encr:aes-gcm-16 esn:yes
|
|||
|
spi(i) 9dffd57a spi(r) c4e0ef53
|
|||
|
SK_e i:290c681694f130b33d511335dd257e78721635b7e8aa87930dd77bb1d6dd3f42
|
|||
|
r:0a09fa18cf1cf65c6324df02b46dcc998b84e5397cf911b63e0c096053946c2e
|
|||
|
traffic selectors (i):0 type 7 protocol_id 0 addr 192.168.3.0 - 192.168.3.255 port 0 - 65535
|
|||
|
traffic selectors (r):0 type 7 protocol_id 0 addr 192.168.5.0 - 192.168.5.255 port 0 - 65535
|
|||
|
|
|||
|
Now we can generate some traffic between responder’s and initiator’s
|
|||
|
private networks and see it works.
|
|||
|
|
|||
|
::
|
|||
|
|
|||
|
$ sudo ip netns exec ns ping 192.168.5.2
|
|||
|
PING 192.168.5.2 (192.168.5.2) 56(84) bytes of data.
|
|||
|
64 bytes from 192.168.5.2: icmp_seq=1 ttl=63 time=0.450 ms
|
|||
|
64 bytes from 192.168.5.2: icmp_seq=2 ttl=63 time=0.630 ms
|