Re: labeled network aware kernel

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



racoon comes with ipsec-tools, and there is not much documentation to
go on.  Still working through it though..


On Thu, Apr 30, 2009 at 1:42 PM, Justin Mattock <justinmattock@xxxxxxxxx> wrote:
> On Thu, Apr 30, 2009 at 5:01 AM, Stephen Smalley <sds@xxxxxxxxxxxxx> wrote:
>> On Wed, 2009-04-29 at 23:05 -0400, Mark Webb wrote:
>>> I am working to get the labelled IPSec working, following Josh
>>> Brindle's blog post
>>> (http://securityblog.org/brindle/2007/05/28/secure-networking-with-selinux).
>>>  I just want to get the client and server running on loopback, using a
>>> fully patched Fedora 10 machine.
>>>
>>> I have the following keyfile that I pass into setkey:
>>> ----------
>>> spdflush;
>>>
>>> flush;
>>>
>>> spdadd 127.0.0.1 127.0.0.1 any
>>> -ctx 1 1 "system_u:object_r:default_t:s0"
>>> -P in ipsec esp/transport//require;
>>>
>>> spdadd 127.0.0.1 127.0.0.1 any
>>> -ctx 1 1 "system_u:object_r:default_t:s0"
>>> -P out ipsec esp/transport//require;
>>> ----------
>>>
>>> I enter the following commands:
>>>
>>> --- Terminal 1 ---
>>> setenforce 0
>>> setkey -f <keyfile>
>>> ./server
>>>
>>> --- Terminal 2 ---
>>> # ./client 127.0.0.1
>>> getpeercon: Protocol not available
>>> Received: Hello, (null) from (null)
>>>
>>> --- Terminal 1 ---
>>> getsockopt: Protocol not available
>>> server: got connection from 127.0.0.1, (null)
>>>
>>> Not sure what I am missing.  I have installed ipsec-tools and started
>>> /etc/init.d/racoon.
>>>
>>> Any help would be appreciated.
>>
>> IPSEC and loopback don't generally get along very well.  Try:
>> echo 0 > /proc/sys/net/ipv4/conf/lo/disable_policy
>> echo 0 > /proc/sys/net/ipv4/conf/lo/disable_xfrm
>>
>> Might want to also read through an old bug report on this issue,
>> https://bugzilla.redhat.com/show_bug.cgi?id=218386
>>
>> --
>> Stephen Smalley
>> National Security Agency
>>
>>
>> --
>> This message was distributed to subscribers of the selinux mailing list.
>> If you no longer wish to subscribe, send mail to majordomo@xxxxxxxxxxxxx with
>> the words "unsubscribe selinux" without quotes as the message.
>>
>
> From what I remember, I just used(ipsec-tools)
> /etc/ipsec.conf to deal with the
> key exchange, and handling of
> AH and ESP encapsulation(racoon is another approach)
>
> main area is setting up the keys so the two
> machines can exchange.
> google around to find an already configured
> ipsec.conf(saves you the energy of going crazy with
> a long line of numbers) this way you just need to set
> the ip's.
>
> At the moment I've been trying to get ekiga to
> work with ipsec(if I can get the dang thing to compiled
> right).
>
>
> --
> Justin P. Mattock
>


--
This message was distributed to subscribers of the selinux mailing list.
If you no longer wish to subscribe, send mail to majordomo@xxxxxxxxxxxxx with
the words "unsubscribe selinux" without quotes as the message.

[Index of Archives]     [Selinux Refpolicy]     [Linux SGX]     [Fedora Users]     [Fedora Desktop]     [Yosemite Photos]     [Yosemite Camping]     [Yosemite Campsites]     [KDE Users]     [Gnome Users]

  Powered by Linux