ubuntu – 站点到站点IPsec vpn不通过隧道发送ping

前端之家收集整理的这篇文章主要介绍了ubuntu – 站点到站点IPsec vpn不通过隧道发送ping前端之家小编觉得挺不错的,现在分享给大家,也给大家做个参考。
这是我第一次尝试使用站点站点VPN.我选择使用IPec,因为它似乎是我需要完成的最佳解决方案.我在上周跟踪了几个不同的教程,但收效甚微.现在,当ping相反的子网时,我似乎无法获得成功.我知道我错过了什么,我只是不知道是什么.

我能说的最好,我应该在路线表中看到一些东西.现在,绑定到另一个子网的流量将在没有封装的情况下运行,并被第一个在不可路由的私有IP目标上获取的路由器丢弃.

我已经尝试过向MAStables添加MASQUERADE和RELATED,ESTABLISHED规则,思考可能有所帮助.我结束了这个想法.现在iptables的默认策略是在Ubuntu盒子上的所有链上接受.我会在IPsec工作时调整的东西.

“service ipsec status”的输出

  1. IPsec running - pluto pid: 1059
  2. pluto pid 1059
  3. 1 tunnels up
  4. some eroutes exist@H_404_8@
  5. /etc/ipsec.conf在两个站点

  6. version 2 
  7. config setup
  8.     dumpdir=/var/run/pluto/
  9.     nat_traversal=yes
  10.     virtual_private=%v4:10.0.0.0/8,%v4:192.168.0.0/16,%v4:172.16.0.0/12,%v6:fd00::/8,%v6:fe80::/10
  11.     protostack=netkey
  12.     force_keepalive=yes
  13.     keep_alive=60
  14. conn site1-site2
  15.     leftsubnets=10.248.248.64/16
  16.     rightsubnet=10.131.250.194/16
  17.     auto=start
  18.     left=162.243.XXX.XXX
  19.     right=178.62.YYY.YYY
  20.     leftid=@site1
  21.     rightid=@site2
  22.     authby=secret
  23.     ike=aes128-sha1;modp1024
  24.     phase2=esp
  25.     phase2alg=aes128-sha1;modp1024
  26.     aggrmode=no
  27.     ikelifetime=8h
  28.     salifetime=1h
  29.     dpddelay=10
  30.     dpdtimeout=40
  31.     dpdaction=restart
  32.     type=tunnel
  33.     forceencaps=yes@H_404_8@ 
  34.  

    两个站点的“ipsec verify输出(IP转发在/etc/sysctl.conf中打开)

  35.   
  36.  
    Checking your system to see if IPsec got installed and started correctly:
  37. Version check and ipsec on-path                 [OK]
  38. Linux Openswan U2.6.38/K3.13.0-24-generic (netkey)
  39. Checking for IPsec support in kernel                [OK]
  40.  SAref kernel support                       [N/A]
  41.  NETKEY:  Testing XFRM related proc values          [OK]
  42.                                 [OK]
  43.                                 [OK]
  44. Checking that pluto is running                                  [OK]
  45.  Pluto listening for IKE on udp 500                             [OK]
  46.  Pluto listening for NAT-T on udp 4500                          [OK]
  47. Two or more interfaces found,checking IP forwarding            [Failed]
  48. Checking NAT and MASQUERADEing                                  [OK]
  49. Checking for 'ip' command                                       [OK]
  50. Checking /bin/sh is not /bin/dash                               [OK]
  51. Checking for 'iptables' command                                 [OK]
  52. Opportunistic Encryption Support                                [DISABLED]@H_404_8@ 
  53.  

    站点1:/etc/ipsec.secrets

  54.   
  55.  
    # this file is managed with debconf and will contain the automatically created RSA keys
  56. include /var/lib/openswan/ipsec.secrets.inc
  57. 162.243.XXX.XXX 178.62.YYY.YYY : PSK sameRandomString@H_404_8@ 
  58.  

    Site1:“ip xfrm policy”的输出

  59.   
  60.  
    src 10.248.0.0/16 dst 10.131.0.0/16 
  61.     dir out priority 2608 
  62.     tmpl src 162.243.XXX.XXX dst 178.62.YYY.YYY
  63.         proto esp reqid 16385 mode tunnel
  64. src 10.131.0.0/16 dst 10.248.0.0/16 
  65.     dir fwd priority 2608 
  66.     tmpl src 178.62.YYY.YYY dst 162.243.XXX.XXX
  67.         proto esp reqid 16385 mode tunnel
  68. src 10.131.0.0/16 dst 10.248.0.0/16 
  69.     dir in priority 2608 
  70.     tmpl src 178.62.YYY.YYY dst 162.243.XXX.XXX
  71.         proto esp reqid 16385 mode tunnel
  72. src ::/0 dst ::/0 
  73.     socket out priority 0 
  74. src ::/0 dst ::/0 
  75.     socket in priority 0 
  76. src 0.0.0.0/0 dst 0.0.0.0/0 
  77.     socket out priority 0 
  78. src 0.0.0.0/0 dst 0.0.0.0/0 
  79.     socket in priority 0 
  80. src 0.0.0.0/0 dst 0.0.0.0/0 
  81.     socket out priority 0 
  82. src 0.0.0.0/0 dst 0.0.0.0/0 
  83.     socket in priority 0 
  84. src 0.0.0.0/0 dst 0.0.0.0/0 
  85.     socket out priority 0 
  86. src 0.0.0.0/0 dst 0.0.0.0/0 
  87.     socket in priority 0 
  88. src 0.0.0.0/0 dst 0.0.0.0/0 
  89.     socket out priority 0 
  90. src 0.0.0.0/0 dst 0.0.0.0/0 
  91.     socket in priority 0 
  92. src 0.0.0.0/0 dst 0.0.0.0/0 
  93.     socket out priority 0 
  94. src 0.0.0.0/0 dst 0.0.0.0/0 
  95.     socket in priority 0 
  96. src 0.0.0.0/0 dst 0.0.0.0/0 
  97.     socket out priority 0 
  98. src 0.0.0.0/0 dst 0.0.0.0/0 
  99.     socket in priority 0@H_404_8@ 
  100.  

    Site1:“ip route”的输出

  101.   
  102.  
    default via 162.243.XXX.1 dev eth0 
  103. 10.128.128.0/24 dev eth1  proto kernel  scope link  src 10.128.128.64 
  104. 162.243.XXX.0/24 dev eth0  proto kernel  scope link  src 162.243.XXX.XXX@H_404_8@ 
  105.  

    站点2:/etc/ipsec.secrets

  106.   
  107.  
    # this file is managed with debconf and will contain the automatically created RSA keys
  108. include /var/lib/openswan/ipsec.secrets.inc
  109. 178.62.YYY.YYY 162.243.XXX.XXX : PSK sameRandomString@H_404_8@ 
  110.  

    Site2:“ip xfrm policy”的输出

  111.   
  112.  
    src 10.131.0.0/16 dst 10.248.0.0/16 
  113.     dir out priority 2608 
  114.     tmpl src 178.62.YYY.YYY dst 162.243.XXX.XXX
  115.         proto esp reqid 16385 mode tunnel
  116. src 10.248.0.0/16 dst 10.131.0.0/16 
  117.     dir fwd priority 2608 
  118.     tmpl src 162.243.XXX.XXX dst 178.62.YYY.YYY
  119.         proto esp reqid 16385 mode tunnel
  120. src 10.248.0.0/16 dst 10.131.0.0/16 
  121.     dir in priority 2608 
  122.     tmpl src 162.243.XXX.XXX dst 178.62.YYY.YYY
  123.         proto esp reqid 16385 mode tunnel
  124. src ::/0 dst ::/0 
  125.     socket out priority 0 
  126. src ::/0 dst ::/0 
  127.     socket in priority 0 
  128. src ::/0 dst ::/0 
  129.     socket out priority 0 
  130. src ::/0 dst ::/0 
  131.     socket in priority 0 
  132. src 0.0.0.0/0 dst 0.0.0.0/0 
  133.     socket out priority 0 
  134. src 0.0.0.0/0 dst 0.0.0.0/0 
  135.     socket in priority 0 
  136. src 0.0.0.0/0 dst 0.0.0.0/0 
  137.     socket out priority 0 
  138. src 0.0.0.0/0 dst 0.0.0.0/0 
  139.     socket in priority 0 
  140. src 0.0.0.0/0 dst 0.0.0.0/0 
  141.     socket out priority 0 
  142. src 0.0.0.0/0 dst 0.0.0.0/0 
  143.     socket in priority 0 
  144. src 0.0.0.0/0 dst 0.0.0.0/0 
  145.     socket out priority 0 
  146. src 0.0.0.0/0 dst 0.0.0.0/0 
  147.     socket in priority 0 
  148. src 0.0.0.0/0 dst 0.0.0.0/0 
  149.     socket out priority 0 
  150. src 0.0.0.0/0 dst 0.0.0.0/0 
  151.     socket in priority 0 
  152. src 0.0.0.0/0 dst 0.0.0.0/0 
  153.     socket out priority 0 
  154. src 0.0.0.0/0 dst 0.0.0.0/0 
  155.     socket in priority 0@H_404_8@ 
  156.  

    Site2:“ip route”的输出

  157.   
  158.  
    default via 178.62.YYY.1 dev eth0 
  159. 10.131.0.0/16 dev eth1  proto kernel  scope link  src 10.131.250.194 
  160. 178.62.YYY.0/18 dev eth0  proto kernel  scope link  src 178.62.YYY.YYY@H_404_8@ 
  161.  

    site2上的/var/log/auth.log的一部分

  162.   
  163.  
    Jul 24 18:41:14 gb pluto[3365]: packet from 162.243.XXX.XXX:500: received Vendor ID payload [Openswan (this version) 2.6.38 ]
  164. Jul 24 18:41:14 gb pluto[3365]: packet from 162.243.XXX.XXX:500: received Vendor ID payload [Dead Peer Detection]
  165. Jul 24 18:41:14 gb pluto[3365]: packet from 162.243.XXX.XXX:500: received Vendor ID payload [RFC 3947] method set to=115 
  166. Jul 24 18:41:14 gb pluto[3365]: packet from 162.243.XXX.XXX:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03] meth=108,but already using method 115
  167. Jul 24 18:41:14 gb pluto[3365]: packet from 162.243.XXX.XXX:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n] meth=106,but already using method 115
  168. Jul 24 18:41:14 gb pluto[3365]: packet from 162.243.XXX.XXX:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02] meth=107,but already using method 115
  169. Jul 24 18:41:14 gb pluto[3365]: packet from 162.243.XXX.XXX:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-00]
  170. Jul 24 18:41:14 gb pluto[3365]: "site1-site2/1x0" #3: responding to Main Mode
  171. Jul 24 18:41:14 gb pluto[3365]: "site1-site2/1x0" #3: transition from state STATE_MAIN_R0 to state STATE_MAIN_R1
  172. Jul 24 18:41:14 gb pluto[3365]: "site1-site2/1x0" #3: STATE_MAIN_R1: sent MR1,expecting MI2
  173. Jul 24 18:41:14 gb pluto[3365]: "site1-site2/1x0" #3: NAT-Traversal: Result using draft-ietf-ipsec-nat-t-ike (MacOS X): both are NATed
  174. Jul 24 18:41:14 gb pluto[3365]: "site1-site2/1x0" #3: transition from state STATE_MAIN_R1 to state STATE_MAIN_R2
  175. Jul 24 18:41:14 gb pluto[3365]: "site1-site2/1x0" #3: STATE_MAIN_R2: sent MR2,expecting MI3
  176. Jul 24 18:41:14 gb pluto[3365]: "site1-site2/1x0" #3: Main mode peer ID is ID_IPV4_ADDR: '162.243.XXX.XXX'
  177. Jul 24 18:41:14 gb pluto[3365]: "site1-site2/1x0" #3: transition from state STATE_MAIN_R2 to state STATE_MAIN_R3
  178. Jul 24 18:41:14 gb pluto[3365]: "site1-site2/1x0" #3: new NAT mapping for #3,was 162.243.XXX.XXX:500,now 162.243.XXX.XXX:4500
  179. Jul 24 18:41:14 gb pluto[3365]: "site1-site2/1x0" #3: STATE_MAIN_R3: sent MR3,ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY cipher=aes_128 prf=oakley_sha group=modp1024}
  180. Jul 24 18:41:14 gb pluto[3365]: "site1-site2/1x0" #3: Dead Peer Detection (RFC 3706): enabled
  181. Jul 24 18:41:14 gb pluto[3365]: "site1-site2/1x0" #3: the peer proposed: 10.131.0.0/16:0/0 -> 10.248.0.0/16:0/0
  182. Jul 24 18:41:14 gb pluto[3365]: "site1-site2/1x0" #4: responding to Quick Mode proposal {msgid:9e504ac0}
  183. Jul 24 18:41:14 gb pluto[3365]: "site1-site2/1x0" #4:     us: 10.131.0.0/16===178.62.YYY.YYY<178.62.YYY.YYY>
  184. Jul 24 18:41:14 gb pluto[3365]: "site1-site2/1x0" #4:   them: 162.243.XXX.XXX<162.243.XXX.XXX>===10.248.0.0/16
  185. Jul 24 18:41:14 gb pluto[3365]: "site1-site2/1x0" #4: keeping refhim=4294901761 during rekey
  186. Jul 24 18:41:14 gb pluto[3365]: "site1-site2/1x0" #4: transition from state STATE_QUICK_R0 to state STATE_QUICK_R1
  187. Jul 24 18:41:14 gb pluto[3365]: "site1-site2/1x0" #4: STATE_QUICK_R1: sent QR1,inbound IPsec SA installed,expecting QI2
  188. Jul 24 18:41:14 gb pluto[3365]: "site1-site2/1x0" #4: Dead Peer Detection (RFC 3706): enabled
  189. Jul 24 18:41:14 gb pluto[3365]: "site1-site2/1x0" #4: transition from state STATE_QUICK_R1 to state STATE_QUICK_R2
  190. Jul 24 18:41:14 gb pluto[3365]: "site1-site2/1x0" #4: STATE_QUICK_R2: IPsec SA established tunnel mode {ESP/NAT=>0x5b14c281 <0xd731b1b1 xfrm=AES_128-HMAC_SHA1 NATOA=none NATD=162.243.XXX.XXX:4500 DPD=enabled@H_404_8@ 
  191.  

    任何帮助是极大的赞赏.

对我来说,听起来你正试图让站点站点的隧道网关通过它们的内部IP地址而不是它们的公共IP地址进行通信.要使用单个隧道执行此操作,您需要配置左侧和右侧内部源地址.见下文…
  1. leftsourceip=10.248.248.64
  2. rightsourceip=10.131.250.194@H_404_8@
  3. 添加这些行并重新启动ipsec,然后您可以使用内部网关ping.

猜你在找的Ubuntu相关文章