Difference between revisions of "Libreswan-xl2tpd"
(→Issues) |
|||
Line 161: | Line 161: | ||
Ipsec - check here first: | Ipsec - check here first: | ||
− | /var/log/pluto/pluto. | + | /var/log/pluto/pluto.log |
Look for L2TPD-PSK entries and in particular this "STATE_QUICK_R2: IPsec SA established transport mode" | Look for L2TPD-PSK entries and in particular this "STATE_QUICK_R2: IPsec SA established transport mode" | ||
Line 169: | Line 169: | ||
L2tpd - check here: | L2tpd - check here: | ||
− | /var/log/messages | + | /var/log/messages |
Look for xl2tpd and pppd entries | Look for xl2tpd and pppd entries | ||
Line 179: | Line 179: | ||
To debug have a look at the following: | To debug have a look at the following: | ||
− | db ipsec_connections show L2TPD-PSK | + | db ipsec_connections show L2TPD-PSK |
− | config show ipsec | + | config show ipsec |
− | config show xl2tpd | + | config show xl2tpd |
− | cat /etc/ipsec.d/ipsec.conf | + | cat /etc/ipsec.d/ipsec.conf |
− | cat /etc/ipsec.d/ipsec.secrets | + | cat /etc/ipsec.d/ipsec.secrets |
Try restarting both ipsec and xl2tpd and watch your logs for errors: | Try restarting both ipsec and xl2tpd and watch your logs for errors: | ||
− | service xl2tpd restart | + | service xl2tpd restart |
− | service ipsec restart | + | service ipsec restart |
If you are still stuck then ask on the forums, or if you have some template errors or other issues please raise a bug. | If you are still stuck then ask on the forums, or if you have some template errors or other issues please raise a bug. |
Revision as of 02:42, 30 November 2017
Version
About
L2TPD/IPSEC is secure method of connecting to your Koozali SME server. It is a suitable replacement for the existing PPTP VPN system on Koozali SME Server.
L2TPD/IPSEC does not need any special software configuration on your clients. It is supported on a very large number of modern mobile phones and laptops. Please note that not every phone or device will support L2TPD/IPSEC out of the box.
The device first calls the server via ipsec and makes and encrypted connection. But it has no networking information. xl2tpd then makes a ppp connection through that encrypted ipsec connection.and get its network information at this point.
Once implemented you can disable PPTP, which will be good for you and your users.
Notes
The contrib basically works but there, can be complications when you want to combine it with standard host-host ipsec connections. The issue that 'may' arise is if an IPSEC connection is matched prior to the L2TPD one. I do have both types running on my test box but need more feedback on this.
This is because pure ipsec usually relies on having connections from specific IP address / and or IDs / Certificates. To accept mobile clients, which could come from pretty well any IP address, we need to tell out L2TPD Ipsec configuration to accept connections from anywhere.
The potential issue is if you try a pure Ipsec connection that does not have a correct configuration in the database/configuration, it may try to connect via the L2TPD connection. That will not break anything, but you may experience odd results from the client
Please note that you can enable or disable L2TPD VPN access for users via the Server Manager.
These links discuss the implementation and the creation of this page. https://forums.contribs.org/index.php/topic,53021.0/all.html
Some further reading can be found on this page:
https://github.com/reetp/smeserver-libreswan-xl2tpd/blob/master/ipsecXl2tpd.Notes
Please report any problems by adding a bug to Bugzilla. See Bugs below.
Installation
The smeserver-libreswan-xl2tpd contrib is currently in the development repo at Contribs
You will need the EPEL repo as well:
https://wiki.contribs.org/Epel
With the yum repo database updated, you can then run the installation of the package.
yum --enablerepo=smedev,epel install smeserver-libreswan-xl2tpd
That should bring everything in, including ipsec which is required
signal-event post-upgrade;signal-event reboot
Configuration settings
You need at least one user on the system - for testing it can be admin. The user account needs VPN Client Access enabled in the Server Manager
Keys
- IPRange Start/Finish
An IP range from your server. Note it MUST NOT conflict with IPs issued by your DHCP server
- rightsubnet
The subnet of the remote / dialin network
- passwd
IPsec pre shared key as per ipsec db connection below. Every user will need this common password.
Make it long and complicated !
db ipsec_connections setprop L2TPD-PSK password SomeLongComplicatedSecret
- DNS
Defaults to the SME server. Can add extra servers if required
config setprop xl2tpd DNS 8.8.8.8,8.8.4.4
- access
Defaults to private
- debug
Defaults to disabled
Create Server Connection
Note that some settings are preconfigured in the ipsec_connections database.
db ipsec_connections show L2TPD-PSK
We need to add some basic settings to the connection. Here we assume your local network is 192.168.101.x
db ipsec_connections setprop L2TPD-PSK \ status enabled \ IPRangeStart 192.168.101.180 \ IPRangeFinish 192.168.101.200 \ rightsubnet 192.168.101.0/24 \ passwd somesecret
Make sure the Start and Finish addresses do NOT conflict with your server dhcp range. You can see your server dhcpd range with:
config show dhcpd
config setprop ipsec access public
xl2tpd does not have to be set public as the xl2tpd connection is made inside the ipsec tunnel.
Now we can enable the required services which will automatically add the correct firewall ports.
config setprop xl2tpd status enabled config setprop ipsec status enabled signal-event ipsec-update
You can regenerate the server templates with:
signal-event remoteaccess-update
Note that this this will not stop or restart ipsec. Use ipsec-update to do this:
signal-event ipsec-update
Create a connection from a device
This is the basic setup for your remote device, e.g. laptop or tablet.
Connection type: L2TP/IPSec PSK Server IP : Your server IP address IPsec preshared key : as per passwd set above Username : Any user on your server with VPN Access set to Enabled Password : adminpassword (the password for the above user)
Stop the service
config setprop xl2tpd status disabled config setprop ipsec status disabled signal-event ipsec-update
Disable PPTP
Once the implementation is complete and functional, you will not need PPTP enabled. If your L2TPD setup is working then make sure that this is disabled or you may still leave ordinary pptp connections open.
You can go to your server manager and disable it forever and sing a thousand hallelujahs for secure communications ;-)
config setprop pptpd status disabled sessions 0
Take this action only *after* you have confirmed proper L2TP connection is working.
Issues
Ipsec and l2tpd is a vast and complicated subject. I have tried to simplify it to the best of my abilities. Mainly because I can't do complicated.
Please go and have a good read of the online documentation for Libreswan
I basically used an example like this Ipsec/L2tpd although this never page existed when I first started building this contrib.
The first thing to do if you get stuck is check all your settings and your logs.
Go back and check your network settings. Check you passwords. Get someone else to make sure they are OK.
Is the ipsec secret correct?
Have you enabled remote VPN access for a user and checked the password?
Ipsec - check here first:
/var/log/pluto/pluto.log
Look for L2TPD-PSK entries and in particular this "STATE_QUICK_R2: IPsec SA established transport mode"
That means that you have a basic ipsec connection
L2tpd - check here:
/var/log/messages
Look for xl2tpd and pppd entries
Do you get as far as this "ip-up: xl2tpd ppp0 /dev/pts/2 150 192.168.97.1 192.168.97.180 xl2tpd"
If so you have a basic l2tpd connection
To debug have a look at the following:
db ipsec_connections show L2TPD-PSK
config show ipsec
config show xl2tpd
cat /etc/ipsec.d/ipsec.conf
cat /etc/ipsec.d/ipsec.secrets
Try restarting both ipsec and xl2tpd and watch your logs for errors:
service xl2tpd restart
service ipsec restart
If you are still stuck then ask on the forums, or if you have some template errors or other issues please raise a bug.
To Do List
A VPN Access Group may be worth looking at in the future
Add server manager panel (with an IPsec panel too)
Commit the code to the CVS.
The code probably needs reviewing and cleaning up by a greater mind than mine :-)
Bugs
Please raise bugs under the SME-Contribs section in bugzilla and select the libreswan-xl2tpd component or use this link
Below is an overview of the current issues for this contrib:
Changelog
Only released version in smecontrib are listed here.