OPNsense
  • Home
  • Help
  • Search
  • Login
  • Register

  • OPNsense Forum »
  • Profile of Phomakesmehappy »
  • Show Posts »
  • Topics
  • Profile Info
    • Summary
    • Show Stats
    • Show Posts...
      • Messages
      • Topics
      • Attachments

Show Posts

This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.

  • Messages
  • Topics
  • Attachments

Topics - Phomakesmehappy

Pages: [1]
1
Virtual private networks / Raodwarrior IPSec legacy setup not fully working
« on: February 21, 2024, 09:29:53 am »
Hi,

follwing scenario: an IPSec roadwarrior setup in the legacy variant with card terminals who don't talk to me, so no logging accessible from the clientside.

The goal: you connect a card terminal to the internet at home, it connects via VPN to a so called connector and can be used as if it's connected locally.
There is a 3 step process involved from the connector point of view: knowing the card terminal , assigning the terminal to itself and pairing the terminal with itself.

The simple test setup with one device and a /32-net as virtual ip-pool was working as intended, hence I presume the firewall rules are also fine.

For "production" I need a bigger pool, so I defined a /24-net. Clients are getting a virtual IP as intended, I can ping them from the connector and the first 2 steps of the 3 step process are working fine - the third however isn't. It uses port 4742 tcp/udp.

Which begs the question : since the only difference in setup (iirc) is the size of the virtual ip net, is it at fault? If so, is there a way to assign static ips via the legacy interface?
In phase 2 configuration I declared the target net where the connector is located as the local subnet, did I accidentaly declare a split tunnel and that is causing problems?

Connector : 192.168.77.21
VPN net not fully working: 172.100.16.0/24
VPN net fully working: 172.100.16.101/32


I find it hard to troubleshoot, because I can only look at one side, and it's not throwing me any errors. Any help is greatly appreciated!
Do I need to switch to the new gui and assign static IPs ?

2
23.7 Legacy Series / Problems with the new IPsec Connection tab and assigning a pool adress
« on: February 01, 2024, 11:28:48 am »
Hi,

I have to get a roadwarrior EAP_MSCHAPV2 config to work with the additional obstacle of IoT clients, so I can't access any log on the client side.

I managed to get everything working under the legacy GUI, albeit not stable enough for my taste (no proposals found for renegotiating), and I would like to use the newer GUI.

I want to use static IPs for every client, but no IP from the pool gets assigned albeit phase 1 working.

024-02-01T11:08:10   Informational   charon   06[NET] <c8d2c7ac-39de-4b39-aec4-21378f35744e|3> sending packet: from 10.246.42.10[4500] to 10.246.42.51[4500] (500 bytes)   
2024-02-01T11:08:10   Informational   charon   06[NET] <c8d2c7ac-39de-4b39-aec4-21378f35744e|3> sending packet: from 10.246.42.10[4500] to 10.246.42.51[4500] (1236 bytes)   
2024-02-01T11:08:10   Informational   charon   06[IKE] <c8d2c7ac-39de-4b39-aec4-21378f35744e|3> received retransmit of request with ID 1, retransmitting response   
2024-02-01T11:08:10   Informational   charon   06[NET] <c8d2c7ac-39de-4b39-aec4-21378f35744e|3> received packet: from 10.246.42.51[4500] to 10.246.42.10[4500] (416 bytes)   
2024-02-01T11:08:06   Informational   charon   09[NET] <c8d2c7ac-39de-4b39-aec4-21378f35744e|3> sending packet: from 10.246.42.10[4500] to 10.246.42.51[4500] (500 bytes)   
2024-02-01T11:08:06   Informational   charon   09[NET] <c8d2c7ac-39de-4b39-aec4-21378f35744e|3> sending packet: from 10.246.42.10[4500] to 10.246.42.51[4500] (1236 bytes)   
2024-02-01T11:08:06   Informational   charon   09[ENC] <c8d2c7ac-39de-4b39-aec4-21378f35744e|3> generating IKE_AUTH response 1 [ EF(2/2) ]   
2024-02-01T11:08:06   Informational   charon   09[ENC] <c8d2c7ac-39de-4b39-aec4-21378f35744e|3> generating IKE_AUTH response 1 [ EF(1/2) ]   
2024-02-01T11:08:06   Informational   charon   09[ENC] <c8d2c7ac-39de-4b39-aec4-21378f35744e|3> splitting IKE message (1664 bytes) into 2 fragments   
2024-02-01T11:08:06   Informational   charon   09[ENC] <c8d2c7ac-39de-4b39-aec4-21378f35744e|3> generating IKE_AUTH response 1 [ IDr CERT AUTH EAP/REQ/MSCHAPV2 ]   
2024-02-01T11:08:06   Informational   charon   09[IKE] <c8d2c7ac-39de-4b39-aec4-21378f35744e|3> sending end entity cert "C=DE, ST=Hamburg, L=Hamburg, O=Compugroup, E=joern.bonte@cgm.com, CN=opnSense-IPSec"   
2024-02-01T11:08:06   Informational   charon   09[IKE] <c8d2c7ac-39de-4b39-aec4-21378f35744e|3> authentication of '10.246.42.10' (myself) with RSA_EMSA_PKCS1_SHA2_256 successful   
2024-02-01T11:08:06   Informational   charon   09[IKE] <c8d2c7ac-39de-4b39-aec4-21378f35744e|3> peer supports MOBIKE   
2024-02-01T11:08:06   Informational   charon   09[IKE] <c8d2c7ac-39de-4b39-aec4-21378f35744e|3> initiating EAP_MSCHAPV2 method (id 0x0A)   
2024-02-01T11:08:06   Informational   charon   09[IKE] <c8d2c7ac-39de-4b39-aec4-21378f35744e|3> using configured EAP-Identity kt1   
2024-02-01T11:08:06   Informational   charon   09[CFG] <c8d2c7ac-39de-4b39-aec4-21378f35744e|3> selected peer config 'c8d2c7ac-39de-4b39-aec4-21378f35744e'   
2024-02-01T11:08:06   Informational   charon   09[CFG] <3> looking for peer configs matching 10.246.42.10[%any]...10.246.42.51[10.246.42.51]   
2024-02-01T11:08:06   Informational   charon   09[IKE] <3> REDACTED"   
2024-02-01T11:08:06   Informational   charon   09[ENC] <3> parsed IKE_AUTH request 1 [ IDi CERTREQ CPRQ(ADDR DNS) SA TSi TSr N(MOBIKE_SUP) N(NO_ADD_ADDR) N(MULT_AUTH) N(EAP_ONLY) N(MSG_ID_SYN_SUP) ]   
2024-02-01T11:08:06   Informational   charon   09[NET] <3> received packet: from 10.246.42.51[4500] to 10.246.42.10[4500] (416 bytes)   
2024-02-01T11:08:05   Informational   charon   09[NET] <3> sending packet: from 10.246.42.10[500] to 10.246.42.51[500] (497 bytes)   
2024-02-01T11:08:05   Informational   charon   09[ENC] <3> generating IKE_SA_INIT response 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) CERTREQ N(FRAG_SUP) N(HASH_ALG) N(CHDLESS_SUP) N(MULT_AUTH) ]   
2024-02-01T11:08:05   Informational   charon   09[IKE] <3> sending cert request for "REDACTED"   
2024-02-01T11:08:05   Informational   charon   09[IKE] <3> faking NAT situation to enforce UDP encapsulation   
2024-02-01T11:08:05   Informational   charon   09[CFG] <3> selected proposal: IKE:AES_CBC_256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_2048   
2024-02-01T11:08:05   Informational   charon   09[IKE] <3> 10.246.42.51 is initiating an IKE_SA   
2024-02-01T11:08:05   Informational   charon   09[ENC] <3> parsed IKE_SA_INIT request 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) N(HASH_ALG) N(REDIR_SUP) ]   
2024-02-01T11:08:05   Informational   charon   09[NET] <3> received packet: from 10.246.42.51[500] to 10.246.42.10[500] (1156 bytes)

This is the log output. Any tips on how to troubleshoot this any further ? The connection tab shows an active connection, but the client in question still uses it's own static IP instead of the pool IP.

Thanks a lot in advance!

Pages: [1]
OPNsense is an OSS project © Deciso B.V. 2015 - 2024 All rights reserved
  • SMF 2.0.19 | SMF © 2021, Simple Machines
    Privacy Policy
    | XHTML | RSS | WAP2