Re: labeled network aware kernel

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Thu, Apr 30, 2009 at 8:39 PM, Mark Webb <elihusmails@xxxxxxxxx> wrote:
> racoon comes with ipsec-tools, and there is not much documentation to
> go on.  Still working through it though..
>
>
> On Thu, Apr 30, 2009 at 1:42 PM, Justin Mattock <justinmattock@xxxxxxxxx> wrote:
>> On Thu, Apr 30, 2009 at 5:01 AM, Stephen Smalley <sds@xxxxxxxxxxxxx> wrote:
>>> On Wed, 2009-04-29 at 23:05 -0400, Mark Webb wrote:
>>>> I am working to get the labelled IPSec working, following Josh
>>>> Brindle's blog post
>>>> (http://securityblog.org/brindle/2007/05/28/secure-networking-with-selinux).
>>>>  I just want to get the client and server running on loopback, using a
>>>> fully patched Fedora 10 machine.
>>>>
>>>> I have the following keyfile that I pass into setkey:
>>>> ----------
>>>> spdflush;
>>>>
>>>> flush;
>>>>
>>>> spdadd 127.0.0.1 127.0.0.1 any
>>>> -ctx 1 1 "system_u:object_r:default_t:s0"
>>>> -P in ipsec esp/transport//require;
>>>>
>>>> spdadd 127.0.0.1 127.0.0.1 any
>>>> -ctx 1 1 "system_u:object_r:default_t:s0"
>>>> -P out ipsec esp/transport//require;
>>>> ----------
>>>>
>>>> I enter the following commands:
>>>>
>>>> --- Terminal 1 ---
>>>> setenforce 0
>>>> setkey -f <keyfile>
>>>> ./server
>>>>
>>>> --- Terminal 2 ---
>>>> # ./client 127.0.0.1
>>>> getpeercon: Protocol not available
>>>> Received: Hello, (null) from (null)
>>>>
>>>> --- Terminal 1 ---
>>>> getsockopt: Protocol not available
>>>> server: got connection from 127.0.0.1, (null)
>>>>
>>>> Not sure what I am missing.  I have installed ipsec-tools and started
>>>> /etc/init.d/racoon.
>>>>
>>>> Any help would be appreciated.
>>>
>>> IPSEC and loopback don't generally get along very well.  Try:
>>> echo 0 > /proc/sys/net/ipv4/conf/lo/disable_policy
>>> echo 0 > /proc/sys/net/ipv4/conf/lo/disable_xfrm
>>>
>>> Might want to also read through an old bug report on this issue,
>>> https://bugzilla.redhat.com/show_bug.cgi?id=218386
>>>
>>> --
>>> Stephen Smalley
>>> National Security Agency
>>>
>>>
>>> --
>>> This message was distributed to subscribers of the selinux mailing list.
>>> If you no longer wish to subscribe, send mail to majordomo@xxxxxxxxxxxxx with
>>> the words "unsubscribe selinux" without quotes as the message.
>>>
>>
>> From what I remember, I just used(ipsec-tools)
>> /etc/ipsec.conf to deal with the
>> key exchange, and handling of
>> AH and ESP encapsulation(racoon is another approach)
>>
>> main area is setting up the keys so the two
>> machines can exchange.
>> google around to find an already configured
>> ipsec.conf(saves you the energy of going crazy with
>> a long line of numbers) this way you just need to set
>> the ip's.
>>
>> At the moment I've been trying to get ekiga to
>> work with ipsec(if I can get the dang thing to compiled
>> right).
>>
>>
>> --
>> Justin P. Mattock
>>
>

yep,
but I think it provides other
ways for key exchanges,
here is what I am using:
http://www.linuxfromscratch.org/hints/downloads/files/ipsec.txt
I used this configuration about a year ago,
worked like a charm!!

-- 
Justin P. Mattock


--
This message was distributed to subscribers of the selinux mailing list.
If you no longer wish to subscribe, send mail to majordomo@xxxxxxxxxxxxx with
the words "unsubscribe selinux" without quotes as the message.

[Index of Archives]     [Selinux Refpolicy]     [Linux SGX]     [Fedora Users]     [Fedora Desktop]     [Yosemite Photos]     [Yosemite Camping]     [Yosemite Campsites]     [KDE Users]     [Gnome Users]

  Powered by Linux