Openswan on FC4/5

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Hi,

We are using Openswan to connect two of our sites together via an IPSEC
tunnel. Recently we upgraded from FC3 to FC5 on our frontend firewalls,
including the version of openswan , selinux policy, kernel ,ect. We used
to run in enforcing mode without any difficulties, it now seems that
with Enforcing mode on Openswan does not seem to be able to add the
route.

Using setenforce 0 , the tunnel becomes active. As far as i can
tell Openswan has difficulty adding the route to the Right/Left nexthop,
although the status of the tunnel appears to be up, the routing does not
appear to take place.

#audit2allow -a -t /var/log/audit/audit.log
allow ifconfig_t self:netlink_xfrm_socket create;
allow ifconfig_t initrc_t:unix_stream_socket { read write };

Versions we are using are.
selinux-policy-targeted-2.2.43-4.fc5
kernel-2.6.16-1.2122_FC5
openswan-2.4.4-1.1.2.1

As i have not seen any other mention of this being an issue, I was
wondering if anyone else has encountered this. I have also tested this
on FC4 with the same result.

Am i right in assuming that openswan is using ifconfig to add the
route, i have looked into the source policy that define ipsec which has
no reference to ifconfig, but rather to ipsec eroute.

I am not sure if this just defined in the wrong place, or if it needs
ifconfig to be added into the policy.


Regards,


Stuart James


-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2.2 (GNU/Linux)

iD8DBQFEn5lKr8LwOCpshrYRAr+gAJ9y7uL7WOco3Pxj4gg0gWlrqhGRIQCeLIFu
Cfnub95XnvCsMRwxI9ojSek=
=dXrv
-----END PGP SIGNATURE-----

--
fedora-selinux-list mailing list
fedora-selinux-list@xxxxxxxxxx
https://www.redhat.com/mailman/listinfo/fedora-selinux-list

[Index of Archives]     [Fedora Users]     [Fedora Desktop]     [Big List of Linux Books]     [Yosemite News]     [Yosemite Campsites]     [KDE Users]     [Gnome Users]

  Powered by Linux