[GUIDA] strongSwan per IPsec su OpenWrt e Homeware

  • 246 Risposte
  • 24831 Visite

0 Utenti e 1 Visitatore stanno visualizzando questo topic.

Offline LuKePicci

  • Global Moderator
  • VIP
  • *****
  • 2781
Re:[GUIDA] strongSwan per IPsec su OpenWrt e Homeware
« Risposta #210 il: 29 Novembre 2021, 22:24 »
Eheh, sono andato per logica, se quella regola faceva funzionare le cose allora il primo indiziato era proprio farp. Rpfilter rompe le scatole sui Device col WiFi quantenna come il 4130/2

@lucash78 anche il tuo problema era sicuramente il medesimo

@FrancYescO appena hai un minuto c'è da fixare lo scriptino

Offline FrancYescO

  • VIP
  • *****
  • 3330
Re:[GUIDA] strongSwan per IPsec su OpenWrt e Homeware
« Risposta #211 il: 30 Novembre 2021, 13:11 »
fatto ;)

Offline lucash78

  • Nuovo Iscritto
  • *
  • 49
Re:[GUIDA] strongSwan per IPsec su OpenWrt e Homeware
« Risposta #212 il: 15 Dicembre 2021, 14:45 »
@LuKePicci mi ero perso la tua citazione!!
Buono a sapersi, anzi ottimo,  ma ora ho problemi di riavvio con il DGA4132 ahimè (e non riesco a risolverli...)

Offline satigno

  • Membro Giovane
  • **
  • 96
Re:[GUIDA] strongSwan per IPsec su OpenWrt e Homeware
« Risposta #213 il: 29 Gennaio 2022, 10:47 »
Ciao a tutti, sto provando a installare la VPN su un DGA 4132 con GUI Ansuel.
Riassumo che cosa ho fatto.

1) Ho dato un opkg update e questo è l'output:

Codice: [Seleziona]
[email protected]:~# opkg update
Downloading https://raw.githubusercontent.com/Ansuel/GUI_ipk/kernel-4.1/base/Packages.gz
Updated list of available packages in /var/opkg-lists/chaos_calmer_base
Downloading https://raw.githubusercontent.com/Ansuel/GUI_ipk/kernel-4.1/packages/Packages.gz
Updated list of available packages in /var/opkg-lists/chaos_calmer_packages
Downloading https://raw.githubusercontent.com/Ansuel/GUI_ipk/kernel-4.1/luci/Packages.gz
Updated list of available packages in /var/opkg-lists/chaos_calmer_luci
Downloading https://raw.githubusercontent.com/Ansuel/GUI_ipk/kernel-4.1/routing/Packages.gz
Updated list of available packages in /var/opkg-lists/chaos_calmer_routing
Downloading https://raw.githubusercontent.com/Ansuel/GUI_ipk/kernel-4.1/telephony/Packages.gz
Updated list of available packages in /var/opkg-lists/chaos_calmer_telephony
Downloading https://raw.githubusercontent.com/Ansuel/GUI_ipk/kernel-4.1/target/packages/Packages.gz
Updated list of available packages in /var/opkg-lists/chaos_calmer_core
Downloading https://repository.macoers.com/homeware/18/brcm63xx-tch/VANTW/base/Packages.gz
Updated list of available packages in /var/opkg-lists/chaos_calmer_base_macoers
Downloading https://repository.macoers.com/homeware/18/brcm63xx-tch/VANTW/packages/Packages.gz
Updated list of available packages in /var/opkg-lists/chaos_calmer_packages_macoers
Downloading https://repository.macoers.com/homeware/18/brcm63xx-tch/VANTW/luci/Packages.gz
Updated list of available packages in /var/opkg-lists/chaos_calmer_luci_macoers
Downloading https://repository.macoers.com/homeware/18/brcm63xx-tch/VANTW/routing/Packages.gz
Updated list of available packages in /var/opkg-lists/chaos_calmer_routing_macoers
Downloading https://repository.macoers.com/homeware/18/brcm63xx-tch/VANTW/telephony/Packages.gz
Updated list of available packages in /var/opkg-lists/chaos_calmer_telephony_macoers
[email protected]:~#

2) Ho eseguito il comando
Codice: [Seleziona]
/etc/init.d/ipsec status e ho ottenuto
Codice: [Seleziona]
active with no instances
3) Ho fatto partire lo script
Codice: [Seleziona]
curl https://raw.githubusercontent.com/FrancYescO/sharing_tg789/strongswan/setup.sh | sh e ho ottenuto il seguente output:

Codice: [Seleziona]
  % Total    % Received % Xferd  Average Speed   Time    Time     Time  Current
                                 Dload  Upload   Total   Spent    Left  Speed
  0     0    0     0    0     0      0      0 --:--:-- --:--:-- --:--:--     0In                        stalling strongswan...
100  6909  100  6909    0     0  25588      0 --:--:-- --:--:-- --:--:-- 25588
Package strongswan-default (5.6.3-3) installed in root is up to date.
Package strongswan-pki (5.6.3-3) installed in root is up to date.
Package strongswan-mod-dhcp (5.6.3-3) installed in root is up to date.
Package strongswan-mod-farp (5.6.3-3) installed in root is up to date.
Package strongswan-mod-eap-identity (5.6.3-3) installed in root is up to date.
Package strongswan-mod-eap-md5 (5.6.3-3) installed in root is up to date.
Package strongswan-mod-eap-mschapv2 (5.6.3-3) installed in root is up to date.
Package strongswan-mod-eap-radius (5.6.3-3) installed in root is up to date.
Package strongswan-mod-eap-tls (5.6.3-3) installed in root is up to date.
Generating/Placing conf files...
Building certificates for [ yourhost.example.com ] and client [  (aka myVpnClien                        ts) ]
caKey exists, using existing caKey for signing serverCert and clientCert....
generating caCert for [ CATechnicolor ]...
openssl: symbol lookup error: openssl: undefined symbol: BIO_f_zlib
Now building CA keys bundle
openssl: symbol lookup error: openssl: undefined symbol: BIO_f_zlib
generating server certificates for [ yourhost.example.com ]...
generating clientCert for [ myvpnclient1 (aka myVpnClients) ]...
openssl: symbol lookup error: openssl: undefined symbol: BIO_f_zlib
Now building Client keys bundle for [ myvpnclient1 ]
openssl: symbol lookup error: openssl: undefined symbol: BIO_f_zlib
openssl: symbol lookup error: openssl: undefined symbol: BIO_f_zlib
ln: /etc/ipsec.d/certs/caCert.pem: File exists
mv: can't rename 'ca.p12': No such file or directory
mv: can't rename 'client_*.p12': No such file or directory
mv: can't rename 'clientCert_*.crt': No such file or directory
Warning: Option 'lan'.wan is unknown
Warning: Option 'wan'.conntrack is unknown
Warning: Option 'wan'.wan is unknown
Warning: Section 'wan' cannot resolve device of network 'wwan'
Warning: Option 'public_lan'.wan is unknown
Warning: Option 'z_wlnetb24'.wan is unknown
Warning: Option 'iptv'.wan is unknown
Warning: Option 'z_wlnetb5'.wan is unknown
Warning: Option 'z_if1'.wan is unknown
Warning: Option 'vpn'.wan is unknown
Warning: Option 'defaultipv6incoming'._key is unknown
Warning: Option 'defaultipv6outgoing'._key is unknown
Warning: Option 'defaultoutgoing'._key is unknown
Warning: Option 'defaultoutgoing_guest24'._key is unknown
Warning: Option 'defaultoutgoing_guest5'._key is unknown
 * Flushing IPv4 filter table
 * Flushing IPv4 nat table
 * Flushing IPv4 mangle table
 * Flushing IPv4 raw table
 * Flushing IPv6 filter table
 * Flushing IPv6 mangle table
 * Flushing IPv6 raw table
 * Flushing conntrack table ...
 * Populating IPv4 filter table
   * Rule 'ubus:cwmpd[cwmpd] rule 1'
     ! Skipping due to different family of ip address
   * Rule 'ubus:cwmpd[cwmpd] rule 2'
   * Rule 'ubus:cwmpd[cwmpd] rule 3'
   * Rule 'ubus:igmpproxy[instance1] rule 0'
   * Rule 'ubus:igmpproxy[instance1] rule 1'
   * Rule 'ubus:nqe[instance1] rule 0'
   * Rule 'Drop_non_TCP_SYN'
   * Rule 'drop_lan_2_z_wlnetb24'
   * Rule 'Deny_CWMP_Conn_Reqs_from_LAN'
   * Rule 'drop_z_wlnetb24_2_lan'
   * Rule 'drop-lan_2_z_wlnetb24_GW'
   * Rule 'Allow_z_wlnetb24_ICMP'
   * Rule 'Allow_z_wlnetb24_DHCP'
   * Rule 'Allow_z_wlnetb24_DNS'
   * Rule 'drop_lan_2_z_wlnetb5'
   * Rule 'drop_z_wlnetb5_2_lan'
   * Rule 'drop-lan_2_z_wlnetb5_GW'
   * Rule 'Allow_z_wlnetb5_ICMP'
   * Rule 'Allow_z_wlnetb5_DHCP'
   * Rule 'Allow_z_wlnetb5_DNS'
   * Rule 'Allow-DHCP-Renew'
   * Rule 'Allow-Ping'
   * Rule 'access_2_LAN_IP'
   * Rule 'close_port_139'
   * Rule 'close_port_445'
   * Rule 'Deny-CUPS-wan'
   * Rule 'SSH-wan'
   * Rule 'Restrict-TCP-LAN-Input'
   * Rule 'IPSec ESP'
   * Rule 'IPSec IKE'
   * Rule 'IPSec NAT-T'
   * Rule 'Auth Header'
   * Rule 'Default action for outgoing NAT'
   * Rule 'Default action for outgoing NAT'
   * Rule 'Default action for outgoing NAT'
   * Redirect 'ubus:cwmpd[cwmpd] redirect 0'
   * Forward 'lan' -> 'wan'
   * Forward 'z_wlnetb24' -> 'wan'
   * Forward 'lan' -> 'iptv'
   * Forward 'z_wlnetb5' -> 'wan'
   * Forward 'lan' -> 'zoneif1'
   * Forward 'lan' -> 'vpn'
   * Forward 'vpn' -> 'lan'
   * Forward 'vpn' -> 'wan'
   * Zone 'loopback'
   * Zone 'lan'
   * Zone 'wan'
   * Zone 'public_lan'
   * Zone 'z_wlnetb24'
   * Zone 'iptv'
   * Zone 'z_wlnetb5'
   * Zone 'zoneif1'
Warning: weird character in interface `<set by script>' ('/' and ' ' are not allowed by the kernel).
Warning: weird character in interface `<set by script>' ('/' and ' ' are not allowed by the kernel).
Warning: weird character in interface `<set by script>' ('/' and ' ' are not allowed by the kernel).
Warning: weird character in interface `<set by script>' ('/' and ' ' are not allowed by the kernel).
Warning: weird character in interface `<set by script>' ('/' and ' ' are not allowed by the kernel).
Warning: weird character in interface `<set by script>' ('/' and ' ' are not allowed by the kernel).
Warning: weird character in interface `<set by script>' ('/' and ' ' are not allowed by the kernel).
   * Zone 'vpn'
 * Populating IPv4 nat table
   * Redirect 'ubus:cwmpd[cwmpd] redirect 0'
   * Zone 'loopback'
   * Zone 'lan'
   * Zone 'wan'
   * Zone 'public_lan'
   * Zone 'z_wlnetb24'
   * Zone 'iptv'
   * Zone 'z_wlnetb5'
   * Zone 'zoneif1'
Warning: weird character in interface `<set by script>' ('/' and ' ' are not allowed by the kernel).
   * Zone 'vpn'
 * Populating IPv4 mangle table
   * Zone 'loopback'
   * Zone 'lan'
   * Zone 'wan'
   * Zone 'public_lan'
   * Zone 'z_wlnetb24'
   * Zone 'iptv'
   * Zone 'z_wlnetb5'
   * Zone 'zoneif1'
Warning: weird character in interface `<set by script>' ('/' and ' ' are not allowed by the kernel).
   * Zone 'vpn'
 * Populating IPv4 raw table
   * Zone 'loopback'
   * Zone 'lan'
   * Zone 'wan'
   * Zone 'public_lan'
   * Zone 'z_wlnetb24'
   * Zone 'iptv'
   * Zone 'z_wlnetb5'
   * Zone 'zoneif1'
   * Zone 'vpn'
 * Populating IPv6 filter table
   * Rule 'ubus:cwmpd[cwmpd] rule 1'
     ! Skipping due to different family of ip address
   * Rule 'ubus:cwmpd[cwmpd] rule 2'
   * Rule 'ubus:cwmpd[cwmpd] rule 3'
   * Rule 'ubus:igmpproxy[instance1] rule 0'
   * Rule 'ubus:nqe[instance1] rule 0'
   * Rule 'Drop_non_TCP_SYN'
   * Rule 'drop_lan_2_z_wlnetb24'
   * Rule 'Deny_CWMP_Conn_Reqs_from_LAN'
   * Rule 'drop_z_wlnetb24_2_lan'
   * Rule 'Allow-z_wlnetb24_ICMPv6'
   * Rule 'drop_lan_2_z_wlnetb5'
   * Rule 'drop_z_wlnetb5_2_lan'
   * Rule 'Allow-z_wlnetb5_ICMPv6'
   * Rule 'Allow-Ping6'
   * Rule 'Allow-DHCPv6'
   * Rule 'Allow-ICMPv6-Input'
   * Rule 'Allow-ICMPv6-Forward'
   * Rule 'Deny-CUPS-wan-v6'
   * Rule 'IPSec ESP'
   * Rule 'IPSec IKE'
   * Rule 'IPSec NAT-T'
   * Rule 'Auth Header'
   * Rule 'Default action for outgoing NAT'
   * Rule 'Default action for outgoing NAT'
   * Rule 'Default action for outgoing NAT'
   * Forward 'lan' -> 'wan'
   * Forward 'z_wlnetb24' -> 'wan'
   * Forward 'lan' -> 'iptv'
   * Forward 'z_wlnetb5' -> 'wan'
   * Forward 'lan' -> 'zoneif1'
   * Forward 'lan' -> 'vpn'
   * Forward 'vpn' -> 'lan'
   * Forward 'vpn' -> 'wan'
   * Zone 'loopback'
   * Zone 'lan'
   * Zone 'wan'
   * Zone 'public_lan'
   * Zone 'z_wlnetb24'
   * Zone 'iptv'
   * Zone 'z_wlnetb5'
   * Zone 'zoneif1'
Warning: weird character in interface `<set by script>' ('/' and ' ' are not allowed by the kernel).
Warning: weird character in interface `<set by script>' ('/' and ' ' are not allowed by the kernel).
Warning: weird character in interface `<set by script>' ('/' and ' ' are not allowed by the kernel).
Warning: weird character in interface `<set by script>' ('/' and ' ' are not allowed by the kernel).
Warning: weird character in interface `<set by script>' ('/' and ' ' are not allowed by the kernel).
Warning: weird character in interface `<set by script>' ('/' and ' ' are not allowed by the kernel).
   * Zone 'vpn'
 * Populating IPv6 mangle table
   * Zone 'loopback'
   * Zone 'lan'
   * Zone 'wan'
   * Zone 'public_lan'
   * Zone 'z_wlnetb24'
   * Zone 'iptv'
   * Zone 'z_wlnetb5'
   * Zone 'zoneif1'
Warning: weird character in interface `<set by script>' ('/' and ' ' are not allowed by the kernel).
   * Zone 'vpn'
 * Populating IPv6 raw table
   * Zone 'loopback'
   * Zone 'lan'
   * Zone 'wan'
   * Zone 'public_lan'
   * Zone 'z_wlnetb24'
   * Zone 'iptv'
   * Zone 'z_wlnetb5'
   * Zone 'zoneif1'
   * Zone 'vpn'
 * Set tcp_ecn to off
 * Set tcp_syncookies to on
   ! Unable to write value: No such file or directory
 * Set tcp_window_scaling to on
 * Running script '/etc/firewall.user'
 * Running script '/lib/functions/firewall-restart-ext-tch.sh'
 * Running script '/lib/functions/firewall-ext-tch.sh'
 * Running script '/lib/functions/tod.sh'
 * Running script '/usr/lib/intercept/firewall.sh'
 * Running script '/lib/functions/firewall-dhcpsnooper.sh'
 * Running script '/usr/share/miniupnpd-tch/firewall.include'
 * Running script '/lib/functions/firewall-mmpbx.sh'
 * Running script '/lib/functions/firewall-dropbear.sh'
 * Running script '/lib/functions/firewall-l2tp-ipsec-server.sh'
sh: local: line 6: not in a function
   ! Failed with exit code 2

Ora non so come muovermi sinceramente. Qualcuno potrebbe darmi una mano e dirmi dove sbaglio?
Altre domanda: nel caso volessi disattivare/disinstallare la VPN in futuro, che comando dovrei dare?

Grazie!
« Ultima modifica: 29 Gennaio 2022, 13:21 da satigno »

Offline lorenzocanalelc

  • Esperto
  • ****
  • 656
  • Sesso: Maschio
Re:[GUIDA] strongSwan per IPsec su OpenWrt e Homeware
« Risposta #214 il: 30 Gennaio 2022, 10:46 »
Ciao Satigno, prima cosa lo script andrebbe modificato prima di essere runnato, devi configurare il tuo DDNS, i nomi dei tuoi client ecc, ti consiglierei di installare la TAB VPN se vuoi qualcosa di più configurabile da GUI facilmente (https://www.ilpuntotecnico.com/forum/index.php/topic,81299.0.html).
Secondo dall'errore
Codice: [Seleziona]
* Running script '/lib/functions/firewall-l2tp-ipsec-server.sh'
sh: local: line 6: not in a function
   ! Failed with exit code 2
Immagino che tu sia in un firmware 2.3.X, in questo caso devi modificare manualmente il file /lib/functions/firewall-l2tp-ipsec-server.sh togliendo le stringe local nelle prima righe da così
Codice: [Seleziona]
. $IPKG_INSTROOT/lib/functions.sh

local chain="l2tp_ipsec"
local targetchain="zone_wan_input"

# Helper function which deletes and flushes all of our chains
a così:

Codice: [Seleziona]
. $IPKG_INSTROOT/lib/functions.sh

chain="l2tp_ipsec"
targetchain="zone_wan_input"

# Helper function which deletes and flushes all of our chains

Se decidi di installare la CARD VPN passiamo nell'altro Thread, ciao

Offline satigno

  • Membro Giovane
  • **
  • 96
Re:[GUIDA] strongSwan per IPsec su OpenWrt e Homeware
« Risposta #215 il: 30 Gennaio 2022, 17:38 »
Grazie della risposta!
Si fino a poco fa utilizzavo l'altro metodo con GUI, ma ormai non riesco più a connettermici ne da pc con hotspot ne da telefono Android, in quanto IKEV1 non è più supportato se non ho capito male.
Si sono su FW 2.3.3 se non sbaglio.
Ho già un DDNS configurato sul modem.
Precisamente quindi dovrei fare la modifica del "local", prendere lo script, salvarlo come file sh, modificarlo e runnarlo? Fatto ciò dovrei ottenere il file .p12 da importare sul telefono Android ad esempio.

Codice: [Seleziona]
#!/bin/sh

echo "Installing strongswan..."

opkg install strongswan-default strongswan-pki strongswan-mod-dhcp strongswan-mod-farp
opkg list | grep strongswan-mod-eap-  | awk '{print $1}' | xargs opkg install

COUNTRYNAME="US"
CANAME="CATechnicolor"
ORGNAME="Technicolor"
CACERTPASSWORD="" #if set will be asked when installing cert on clients or generating new clientCert
SERVERDOMAINNAME=$(uci get ddns.myddns_ipv4.domain) #"myvpnserver.dyndns.org"
CLIENTNAMES="myvpnclient1" # or more " … myvpnclient2 muvpnclient3"
SHAREDSAN="myVpnClients" # iOS clients need to match a common SAN

dhcp_broadcast=$(ifconfig br-lan | awk '/inet / {print $3}' | cut -d: -f2)

echo "Generating/Placing conf files..."

echo "config setup

conn %default
        keyexchange=ikev2
        ike=aes256-aes128-sha256-sha1-modp3072-modp2048-modp1024
        left=%any
        leftauth=pubkey
        leftcert=serverCert_$SERVERDOMAINNAME.pem
        leftid=$SERVERDOMAINNAME
        leftsubnet=0.0.0.0/0;::/0
        right=%any
        rightsourceip=%dhcp
        eap_identity=%identity
        auto=add

conn rwEAPMSCHAPV2
        leftsendcert=always
        rightauth=eap-mschapv2
        rightsendcert=never

conn rwPUBKEYIOS
        leftsendcert=always
        rightid=$SHAREDSAN
        rightauth=pubkey
        rightca=caCert.pem
        #rightauth2=eap-mschapv2

conn rwEAPTLSIOS
        leftsendcert=always
        rightid=$SHAREDSAN
        rightauth=eap-tls
        rightcert=caCert.pem
        #rightauth2=eap-mschapv2

conn rwPUBKEY
        rightauth=pubkey
        rightcert=caCert.pem
        #rightauth2=eap-mschapv2

conn rwEAPTLS
        rightauth=eap-tls
        rightcert=caCert.pem" > /etc/ipsec.conf

echo "dhcp {
  identity_lease = yes
  force_server_address = yes
  load = yes
  server = $dhcp_broadcast
}" > /etc/strongswan.d/charon/dhcp.conf

echo ": RSA serverKey_$SERVERDOMAINNAME.pem
remoteusername : EAP \"secretpassword\"" > /etc/ipsec.secrets

if [ ! "$(uci get -q firewall.ipsec_esp)" ]; then
  uci set firewall.ipsec_esp=rule
  uci set firewall.ipsec_esp.src='wan'
  uci set firewall.ipsec_esp.name='IPSec ESP'
  uci set firewall.ipsec_esp.proto='esp'
  uci set firewall.ipsec_esp.target='ACCEPT'
fi

if [ ! "$(uci get -q firewall.ipsec_ike)" ]; then
  uci set firewall.ipsec_ike=rule
  uci set firewall.ipsec_ike.src='wan'
  uci set firewall.ipsec_ike.name='IPSec IKE'
  uci set firewall.ipsec_ike.proto='udp'
  uci set firewall.ipsec_ike.dest_port='500'
  uci set firewall.ipsec_ike.target='ACCEPT'
fi

if [ ! "$(uci get -q firewall.ipsec_nat_traversal)" ]; then
  uci set firewall.ipsec_nat_traversal=rule
  uci set firewall.ipsec_nat_traversal.src='wan'
  uci set firewall.ipsec_nat_traversal.name='IPSec NAT-T'
  uci set firewall.ipsec_nat_traversal.proto='udp'
  uci set firewall.ipsec_nat_traversal.dest_port='4500'
  uci set firewall.ipsec_nat_traversal.target='ACCEPT'
fi

if [ ! "$(uci get -q firewall.ipsec_auth_header)" ]; then
  uci set firewall.ipsec_auth_header=rule
  uci set firewall.ipsec_auth_header.src='wan'
  uci set firewall.ipsec_auth_header.name='Auth Header'
  uci set firewall.ipsec_auth_header.proto='ah'
  uci set firewall.ipsec_auth_header.target='ACCEPT'
fi
uci commit firewall

if ! < /etc/firewall.user grep -q 'strongswan ipsec' ; then

cat << EOF >> /etc/firewall.user

#strongswan ipsec
iptables -I INPUT  -m policy --dir in --pol ipsec --proto esp -j ACCEPT
iptables -I FORWARD  -m policy --dir in --pol ipsec --proto esp -j ACCEPT
iptables -I FORWARD  -m policy --dir out --pol ipsec --proto esp -j ACCEPT
iptables -I OUTPUT   -m policy --dir out --pol ipsec --proto esp -j ACCEPT
iptables -t nat -I POSTROUTING -m policy --pol ipsec --dir out -j ACCEPT

EOF

fi
cd /tmp

echo "Building certificates for [ $SERVERDOMAINNAME ] and client [ $CLIENTNAME (aka $SHAREDSAN) ] "

[ -f "/etc/ipsec.d/private/ca.p12" ] && ln -s /etc/ipsec.d/private/ca.p12 ca.p12

if [ -f "caKey.pem" ] ; then
  echo "caKey exists, using existing caKey for signing serverCert and clientCert...."
elif [ -f "ca.p12" ] ; then
  echo "CA keys bundle exists, accessing existing protected caKey for signing serverCert and clientCert...."
  openssl pkcs12 -in ca.p12 -nocerts -out caKey.pem
else
  echo "generating a new cakey for [ $CANAME ]"
  ipsec pki --gen --outform pem > caKey.pem
fi
echo "generating caCert for [ $CANAME ]..."
ipsec pki --self --lifetime 3652 --in caKey.pem --dn "C=$COUNTRYNAME, O=$ORGNAME, CN=$CANAME" --ca --outform pem > caCert.pem
openssl x509 -inform PEM -outform DER -in caCert.pem -out caCert.crt
echo "Now building CA keys bundle"
openssl pkcs12 -export -inkey caKey.pem -in caCert.pem -name "$CANAME" -certfile caCert.pem -caname "$CANAME" -out ca.p12 -password "pass:$CACERTPASSWORD"

echo "generating server certificates for [ $SERVERDOMAINNAME ]... "
ipsec pki --gen --outform pem > serverKey_$SERVERDOMAINNAME.pem
ipsec pki --pub --in serverKey_$SERVERDOMAINNAME.pem | ipsec pki --issue --lifetime 3652 --cacert caCert.pem --cakey caKey.pem --dn "C=$COUNTRYNAME, O=$ORGNAME, CN=$SERVERDOMAINNAME" --san="$SERVERDOMAINNAME" --flag serverAuth --flag ikeIntermediate --outform pem > serverCert_$SERVERDOMAINNAME.pem
#openssl x509 -inform PEM -outform DER -in serverCert_$SERVERDOMAINNAME.pem -out serverCert_$SERVERDOMAINNAME.crt

for CLIENTNAME in $CLIENTNAMES; do
  if [ -f "clientCert_$CLIENTNAME.pem" ] ; then
    echo "clientCert for [ $CLIENTNAME ] exists, not generating new clientCert."
    continue
  fi
  echo "generating clientCert for [ $CLIENTNAME (aka $SHAREDSAN) ]..."
  ipsec pki --gen --outform pem > clientKey_$CLIENTNAME.pem
  ipsec pki --pub --in clientKey_$CLIENTNAME.pem | ipsec pki --issue --lifetime 3652 --cacert caCert.pem --cakey caKey.pem --dn "C=$COUNTRYNAME, O=$ORGNAME, CN=$CLIENTNAME" --san="$CLIENTNAME" --san="$SHAREDSAN" --outform pem > clientCert_$CLIENTNAME.pem
  openssl x509 -inform PEM -outform DER -in clientCert_$CLIENTNAME.pem -out clientCert_$CLIENTNAME.crt
  echo "Now building Client keys bundle for [ $CLIENTNAME ]"
  openssl pkcs12 -export -inkey clientKey_$CLIENTNAME.pem -in clientCert_$CLIENTNAME.pem -name "$CLIENTNAME" -certfile caCert.pem -caname "$CANAME" -out client_$CLIENTNAME.p12 -password "pass:$CACERTPASSWORD"
  rm clientKey_$CLIENTNAME.pem
  openssl x509 -inform PEM -outform DER -in clientCert_$CLIENTNAME.pem -out clientCert_$CLIENTNAME.crt
done

# where to put them...
mv caCert.pem /etc/ipsec.d/cacerts/
ln -s ../cacerts/caCert.pem /etc/ipsec.d/certs/caCert.pem
mv serverCert*.pem /etc/ipsec.d/certs/
mv serverKey*.pem /etc/ipsec.d/private/
mv clientCert*.pem /etc/ipsec.d/certs/

#These file are not needed on the server
[ ! -f "/etc/ipsec.d/private/ca.p12" ] && mv ca.p12 /etc/ipsec.d/private/ #needed to generate new clients
mv client_*.p12 /etc/ipsec.d/private/
mv clientCert_*.crt /etc/ipsec.d/private/

/etc/init.d/firewall restart
/etc/init.d/ipsec enable
/etc/init.d/ipsec start

Dovrei modificare solo "CLIENTNAMES"? Grazie mille!

Offline lorenzocanalelc

  • Esperto
  • ****
  • 656
  • Sesso: Maschio
Re:[GUIDA] strongSwan per IPsec su OpenWrt e Homeware
« Risposta #216 il: 30 Gennaio 2022, 21:35 »
Si, esatto, se non ricordo mai poi io ho sempre avuto problemi lasciando la CACERTPASSWORD vuota però magari non è più necessario

Offline satigno

  • Membro Giovane
  • **
  • 96
Re:[GUIDA] strongSwan per IPsec su OpenWrt e Homeware
« Risposta #217 il: 05 Febbraio 2022, 12:04 »
@lorenzocanalelc

Grazie dell'aiuto. Purtroppo ho fatto tutto quello che ho scritto sopra e comunque non trovo il file .p12 e comprare qualche errore durante l'esecuzione dello script.
Ho modificato il file rimuovendo le stringhe "local" e, prima di far partire lo script, ho modificato la stringa:

 
Codice: [Seleziona]
CLIENTNAMES="ANDREAVPN" #or more " … myvpnclient2 muvpnclient3"
Quello che ottengo è:

Codice: [Seleziona]
[email protected]:~# /etc/setup.sh
Installing strongswan...
Package strongswan-default (5.6.3-3) installed in root is up to date.
Package strongswan-pki (5.6.3-3) installed in root is up to date.
Package strongswan-mod-dhcp (5.6.3-3) installed in root is up to date.
Package strongswan-mod-farp (5.6.3-3) installed in root is up to date.
Package strongswan-mod-eap-identity (5.6.3-3) installed in root is up to date.
Package strongswan-mod-eap-md5 (5.6.3-3) installed in root is up to date.
Package strongswan-mod-eap-mschapv2 (5.6.3-3) installed in root is up to date.
Package strongswan-mod-eap-radius (5.6.3-3) installed in root is up to date.
Package strongswan-mod-eap-tls (5.6.3-3) installed in root is up to date.
Generating/Placing conf files...
Building certificates for [ yourhost.example.com ] and client [  (aka myVpnClients) ]
caKey exists, using existing caKey for signing serverCert and clientCert....
generating caCert for [ CATechnicolor ]...
openssl: symbol lookup error: openssl: undefined symbol: BIO_f_zlib
Now building CA keys bundle
openssl: symbol lookup error: openssl: undefined symbol: BIO_f_zlib
generating server certificates for [ yourhost.example.com ]...
generating clientCert for [ ANDREAVPN (aka myVpnClients) ]...
openssl: symbol lookup error: openssl: undefined symbol: BIO_f_zlib
Now building Client keys bundle for [ ANDREAVPN ]
openssl: symbol lookup error: openssl: undefined symbol: BIO_f_zlib
openssl: symbol lookup error: openssl: undefined symbol: BIO_f_zlib
ln: /etc/ipsec.d/certs/caCert.pem: File exists
mv: can't rename 'ca.p12': No such file or directory
mv: can't rename 'client_*.p12': No such file or directory
mv: can't rename 'clientCert_*.crt': No such file or directory
Warning: Option 'lan'.wan is unknown
Warning: Option 'wan'.conntrack is unknown
Warning: Option 'wan'.wan is unknown
Warning: Section 'wan' cannot resolve device of network 'wwan'
Warning: Option 'public_lan'.wan is unknown
Warning: Option 'z_wlnetb24'.wan is unknown
Warning: Option 'iptv'.wan is unknown
Warning: Option 'z_wlnetb5'.wan is unknown
Warning: Option 'z_if1'.wan is unknown
Warning: Option 'vpn'.wan is unknown
Warning: Option 'defaultipv6incoming'._key is unknown
Warning: Option 'defaultipv6outgoing'._key is unknown
Warning: Option 'defaultoutgoing'._key is unknown
Warning: Option 'defaultoutgoing_guest24'._key is unknown
Warning: Option 'defaultoutgoing_guest5'._key is unknown
 * Flushing IPv4 filter table
 * Flushing IPv4 nat table
 * Flushing IPv4 mangle table
 * Flushing IPv4 raw table
 * Flushing IPv6 filter table
 * Flushing IPv6 mangle table
 * Flushing IPv6 raw table
 * Flushing conntrack table ...
 * Populating IPv4 filter table
   * Rule 'ubus:cwmpd[cwmpd] rule 1'
     ! Skipping due to different family of ip address
   * Rule 'ubus:cwmpd[cwmpd] rule 2'
   * Rule 'ubus:cwmpd[cwmpd] rule 3'
   * Rule 'ubus:igmpproxy[instance1] rule 0'
   * Rule 'ubus:igmpproxy[instance1] rule 1'
   * Rule 'ubus:nqe[instance1] rule 0'
   * Rule 'Drop_non_TCP_SYN'
   * Rule 'drop_lan_2_z_wlnetb24'
   * Rule 'Deny_CWMP_Conn_Reqs_from_LAN'
   * Rule 'drop_z_wlnetb24_2_lan'
   * Rule 'drop-lan_2_z_wlnetb24_GW'
   * Rule 'Allow_z_wlnetb24_ICMP'
   * Rule 'Allow_z_wlnetb24_DHCP'
   * Rule 'Allow_z_wlnetb24_DNS'
   * Rule 'drop_lan_2_z_wlnetb5'
   * Rule 'drop_z_wlnetb5_2_lan'
   * Rule 'drop-lan_2_z_wlnetb5_GW'
   * Rule 'Allow_z_wlnetb5_ICMP'
   * Rule 'Allow_z_wlnetb5_DHCP'
   * Rule 'Allow_z_wlnetb5_DNS'
   * Rule 'Allow-DHCP-Renew'
   * Rule 'Allow-Ping'
   * Rule 'access_2_LAN_IP'
   * Rule 'close_port_139'
   * Rule 'close_port_445'
   * Rule 'Deny-CUPS-wan'
   * Rule 'SSH-wan'
   * Rule 'Restrict-TCP-LAN-Input'
   * Rule 'IPSec ESP'
   * Rule 'IPSec IKE'
   * Rule 'IPSec NAT-T'
   * Rule 'Auth Header'
   * Rule 'Default action for outgoing NAT'
   * Rule 'Default action for outgoing NAT'
   * Rule 'Default action for outgoing NAT'
   * Redirect 'ubus:cwmpd[cwmpd] redirect 0'
   * Forward 'lan' -> 'wan'
   * Forward 'z_wlnetb24' -> 'wan'
   * Forward 'lan' -> 'iptv'
   * Forward 'z_wlnetb5' -> 'wan'
   * Forward 'lan' -> 'zoneif1'
   * Forward 'lan' -> 'vpn'
   * Forward 'vpn' -> 'lan'
   * Forward 'vpn' -> 'wan'
   * Zone 'loopback'
   * Zone 'lan'
   * Zone 'wan'
   * Zone 'public_lan'
   * Zone 'z_wlnetb24'
   * Zone 'iptv'
   * Zone 'z_wlnetb5'
   * Zone 'zoneif1'
Warning: weird character in interface `<set by script>' ('/' and ' ' are not allowed by the kernel).
Warning: weird character in interface `<set by script>' ('/' and ' ' are not allowed by the kernel).
Warning: weird character in interface `<set by script>' ('/' and ' ' are not allowed by the kernel).
Warning: weird character in interface `<set by script>' ('/' and ' ' are not allowed by the kernel).
Warning: weird character in interface `<set by script>' ('/' and ' ' are not allowed by the kernel).
Warning: weird character in interface `<set by script>' ('/' and ' ' are not allowed by the kernel).
Warning: weird character in interface `<set by script>' ('/' and ' ' are not allowed by the kernel).
   * Zone 'vpn'
 * Populating IPv4 nat table
   * Redirect 'ubus:cwmpd[cwmpd] redirect 0'
   * Zone 'loopback'
   * Zone 'lan'
   * Zone 'wan'
   * Zone 'public_lan'
   * Zone 'z_wlnetb24'
   * Zone 'iptv'
   * Zone 'z_wlnetb5'
   * Zone 'zoneif1'
Warning: weird character in interface `<set by script>' ('/' and ' ' are not allowed by the kernel).
   * Zone 'vpn'
 * Populating IPv4 mangle table
   * Zone 'loopback'
   * Zone 'lan'
   * Zone 'wan'
   * Zone 'public_lan'
   * Zone 'z_wlnetb24'
   * Zone 'iptv'
   * Zone 'z_wlnetb5'
   * Zone 'zoneif1'
Warning: weird character in interface `<set by script>' ('/' and ' ' are not allowed by the kernel).
   * Zone 'vpn'
 * Populating IPv4 raw table
   * Zone 'loopback'
   * Zone 'lan'
   * Zone 'wan'
   * Zone 'public_lan'
   * Zone 'z_wlnetb24'
   * Zone 'iptv'
   * Zone 'z_wlnetb5'
   * Zone 'zoneif1'
   * Zone 'vpn'
 * Populating IPv6 filter table
   * Rule 'ubus:cwmpd[cwmpd] rule 1'
     ! Skipping due to different family of ip address
   * Rule 'ubus:cwmpd[cwmpd] rule 2'
   * Rule 'ubus:cwmpd[cwmpd] rule 3'
   * Rule 'ubus:igmpproxy[instance1] rule 0'
   * Rule 'ubus:nqe[instance1] rule 0'
   * Rule 'Drop_non_TCP_SYN'
   * Rule 'drop_lan_2_z_wlnetb24'
   * Rule 'Deny_CWMP_Conn_Reqs_from_LAN'
   * Rule 'drop_z_wlnetb24_2_lan'
   * Rule 'Allow-z_wlnetb24_ICMPv6'
   * Rule 'drop_lan_2_z_wlnetb5'
   * Rule 'drop_z_wlnetb5_2_lan'
   * Rule 'Allow-z_wlnetb5_ICMPv6'
   * Rule 'Allow-Ping6'
   * Rule 'Allow-DHCPv6'
   * Rule 'Allow-ICMPv6-Input'
   * Rule 'Allow-ICMPv6-Forward'
   * Rule 'Deny-CUPS-wan-v6'
   * Rule 'IPSec ESP'
   * Rule 'IPSec IKE'
   * Rule 'IPSec NAT-T'
   * Rule 'Auth Header'
   * Rule 'Default action for outgoing NAT'
   * Rule 'Default action for outgoing NAT'
   * Rule 'Default action for outgoing NAT'
   * Forward 'lan' -> 'wan'
   * Forward 'z_wlnetb24' -> 'wan'
   * Forward 'lan' -> 'iptv'
   * Forward 'z_wlnetb5' -> 'wan'
   * Forward 'lan' -> 'zoneif1'
   * Forward 'lan' -> 'vpn'
   * Forward 'vpn' -> 'lan'
   * Forward 'vpn' -> 'wan'
   * Zone 'loopback'
   * Zone 'lan'
   * Zone 'wan'
   * Zone 'public_lan'
   * Zone 'z_wlnetb24'
   * Zone 'iptv'
   * Zone 'z_wlnetb5'
   * Zone 'zoneif1'
Warning: weird character in interface `<set by script>' ('/' and ' ' are not allowed by the kernel).
Warning: weird character in interface `<set by script>' ('/' and ' ' are not allowed by the kernel).
Warning: weird character in interface `<set by script>' ('/' and ' ' are not allowed by the kernel).
Warning: weird character in interface `<set by script>' ('/' and ' ' are not allowed by the kernel).
Warning: weird character in interface `<set by script>' ('/' and ' ' are not allowed by the kernel).
Warning: weird character in interface `<set by script>' ('/' and ' ' are not allowed by the kernel).
   * Zone 'vpn'
 * Populating IPv6 mangle table
   * Zone 'loopback'
   * Zone 'lan'
   * Zone 'wan'
   * Zone 'public_lan'
   * Zone 'z_wlnetb24'
   * Zone 'iptv'
   * Zone 'z_wlnetb5'
   * Zone 'zoneif1'
Warning: weird character in interface `<set by script>' ('/' and ' ' are not allowed by the kernel).
   * Zone 'vpn'
 * Populating IPv6 raw table
   * Zone 'loopback'
   * Zone 'lan'
   * Zone 'wan'
   * Zone 'public_lan'
   * Zone 'z_wlnetb24'
   * Zone 'iptv'
   * Zone 'z_wlnetb5'
   * Zone 'zoneif1'
   * Zone 'vpn'
 * Set tcp_ecn to off
 * Set tcp_syncookies to on
   ! Unable to write value: No such file or directory
 * Set tcp_window_scaling to on
 * Running script '/etc/firewall.user'
 * Running script '/lib/functions/firewall-restart-ext-tch.sh'
 * Running script '/lib/functions/firewall-ext-tch.sh'
 * Running script '/lib/functions/tod.sh'
 * Running script '/usr/lib/intercept/firewall.sh'
 * Running script '/lib/functions/firewall-dhcpsnooper.sh'
 * Running script '/usr/share/miniupnpd-tch/firewall.include'
 * Running script '/lib/functions/firewall-mmpbx.sh'
 * Running script '/lib/functions/firewall-dropbear.sh'
 * Running script '/lib/functions/firewall-l2tp-ipsec-server.sh'

Grazie ancora!
« Ultima modifica: 05 Febbraio 2022, 12:08 da satigno »

Offline lorenzocanalelc

  • Esperto
  • ****
  • 656
  • Sesso: Maschio
Re:[GUIDA] strongSwan per IPsec su OpenWrt e Homeware
« Risposta #218 il: 05 Febbraio 2022, 13:26 »
Dagli errori sembra che non funzioni questa versione di OpenSSL, purtroppo sugli ultimi firmware non ho provato. Una cosa che potresti provare è il comando “opkg update && opkg install openssl” per aggiornare la versione di openssl ma questo potrebbe incasinare altro, se vuoi prova, ma a tuo rischio e pericolo

Offline satigno

  • Membro Giovane
  • **
  • 96
Re:[GUIDA] strongSwan per IPsec su OpenWrt e Homeware
« Risposta #219 il: 05 Febbraio 2022, 15:43 »
Fatto e ottengo

Codice: [Seleziona]
Unknown package 'openssl'.
Collected errors:
 * opkg_install_cmd: Cannot install package openssl.

 :(

Offline a1pollo

  • Membro Anziano
  • ***
  • 172
Re:[GUIDA] strongSwan per IPsec su OpenWrt e Homeware
« Risposta #220 il: 05 Febbraio 2022, 21:44 »
Esistono dei feed parziali per la versione homeware 19 tra cui le librerie libopenssl 1.1.1k .
Io le ho installate e ho provato ora la generazione dei certificati e funziona.
Ti metto direttamente il link che spiega tutto
Codice: [Seleziona]
https://www.macoers.com/blog/antonio-macolino/feeds_openwrt_homeware_19_brcm6xxx_tch

Offline satigno

  • Membro Giovane
  • **
  • 96
Re:[GUIDA] strongSwan per IPsec su OpenWrt e Homeware
« Risposta #221 il: 06 Febbraio 2022, 12:12 »
Con quei feed mi compaiono finalmente i file p12!
Grazie mille!
Ho provato a installare il file "client_ANDREAVPN.p12" sul telefono ma non si connette alla VPN. Ho un dubbio: nella cartella /etc/ipsec.d/private mi compare un file che si chiama "serverKey_yourhost.example.com.pem". Possibile che il file si chiama con "yourhost.example.com" piuttosto che con il mio DDNS? Grazie tante ancora, prima o poi riuscirò a farla funzionare la benedetta VPN :D

EDIT

Anche modificando l'indirizzo (quindi ottenendo nel nome del file .pem il mio DDNS) e facendo ripartire il setup, non riesco a connettermi in alcun modo.
Dando un logread -f in fase di connessione non mi sembra di trovare alcun errore inerente alla connessione quindi ho l'impressione che non sia proprio partita la VPN o stia sbagliando qualcosa di grosso.

Codice: [Seleziona]
[email protected]:~# logread -f
Sun Feb  6 12:42:06 2022 daemon.info nanocdn-rr[9558]: INFO   9652 mdnsP label:_companion-link._tcp.local type:12 class:1 response waited in multicast
Sun Feb  6 12:42:06 2022 daemon.info nanocdn-rr[9558]: INFO   9652 mdnsP label:_homekit._tcp.local type:12 class:1 response waited in multicast
Sun Feb  6 12:42:06 2022 daemon.err nanocdn-rr[9558]: INFO   9652 548.633 mdnsP: label:_companion-link._tcp.local type:12 class:1 response waited in multicast
Sun Feb  6 12:42:06 2022 daemon.info nanocdn-rr[9558]: INFO   9652 mdnsP label:_raop._tcp.local type:12 class:1 response waited in multicast
Sun Feb  6 12:42:06 2022 daemon.err nanocdn-rr[9558]: INFO   9652 548.634 mdnsP: label:_homekit._tcp.local type:12 class:1 response waited in multicast
Sun Feb  6 12:42:06 2022 daemon.info nanocdn-rr[9558]: INFO   9652 mdnsP label:_airplay._tcp.local type:12 class:1 response waited in multicast
Sun Feb  6 12:42:06 2022 daemon.err nanocdn-rr[9558]: INFO   9652 548.634 mdnsP: label:_raop._tcp.local type:12 class:1 response waited in multicast
Sun Feb  6 12:42:06 2022 daemon.err nanocdn-rr[9558]: INFO   9652 548.634 mdnsP: label:_airplay._tcp.local type:12 class:1 response waited in multicast
Sun Feb  6 12:42:13 2022 daemon.info nanocdn-rr[9558]: INFO   9652 mdnsP label:BRW8CC84B9961E7.local type:1 class:1 response waited in multicast
Sun Feb  6 12:42:13 2022 daemon.err nanocdn-rr[9558]: INFO   9652 555.888 mdnsP: label:BRW8CC84B9961E7.local type:1 class:1 response waited in multicast
Sun Feb  6 12:42:14 2022 daemon.info nanocdn-rr[9558]: INFO   9652 mdnsP label:BRW8CC84B9961E7.local type:1 class:1 response waited in multicast
Sun Feb  6 12:42:14 2022 daemon.err nanocdn-rr[9558]: INFO   9652 556.143 mdnsP: label:BRW8CC84B9961E7.local type:1 class:1 response waited in multicast
Sun Feb  6 12:42:14 2022 daemon.info nanocdn-rr[9558]: INFO   9652 mdnsP label:BRW8CC84B9961E7.local type:1 class:1 response waited in multicast
Sun Feb  6 12:42:14 2022 daemon.err nanocdn-rr[9558]: INFO   9652 556.307 mdnsP: label:BRW8CC84B9961E7.local type:1 class:1 response waited in multicast

EDIT 2

Ho dovuto avviare ipsec che non era attivo. Come posso impostare l'autorun al riavvio del modem?
Ora ottengo:

Codice: [Seleziona]
[email protected]:~# logread -f
Sun Feb  6 13:08:35 2022 authpriv.info ipsec: 12[NET] received packet: from IPTELEFONO[33278] to IPMODEM[500] (660 bytes)
Sun Feb  6 13:08:35 2022 daemon.info ipsec: 12[NET] received packet: from IPTELEFONO[33278] to IPMODEM[500] (660 bytes)
Sun Feb  6 13:08:35 2022 authpriv.info ipsec: 12[ENC] parsed IKE_SA_INIT request 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) N(HASH_ALG) N(REDIR_SUP) ]
Sun Feb  6 13:08:35 2022 daemon.info ipsec: 12[ENC] parsed IKE_SA_INIT request 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) N(HASH_ALG) N(REDIR_SUP) ]
Sun Feb  6 13:08:35 2022 authpriv.info ipsec: 12[IKE] IPTELEFONO is initiating an IKE_SA
Sun Feb  6 13:08:35 2022 daemon.info ipsec: 12[IKE] IPTELEFONO is initiating an IKE_SA
Sun Feb  6 13:08:35 2022 authpriv.info ipsec: 12[IKE] remote host is behind NAT
Sun Feb  6 13:08:35 2022 daemon.info ipsec: 12[IKE] remote host is behind NAT
Sun Feb  6 13:08:35 2022 authpriv.info ipsec: 12[IKE] DH group MODP_2048_256 inacceptable, requesting MODP_2048
Sun Feb  6 13:08:35 2022 daemon.info ipsec: 12[IKE] DH group MODP_2048_256 inacceptable, requesting MODP_2048
Sun Feb  6 13:08:35 2022 authpriv.info ipsec: 12[ENC] generating IKE_SA_INIT response 0 [ N(INVAL_KE) ]
Sun Feb  6 13:08:35 2022 daemon.info ipsec: 12[ENC] generating IKE_SA_INIT response 0 [ N(INVAL_KE) ]
Sun Feb  6 13:08:35 2022 authpriv.info ipsec: 12[NET] sending packet: from IPMODEM[500] to IPTELEFONO[33278] (38 bytes)
Sun Feb  6 13:08:35 2022 daemon.info ipsec: 12[NET] sending packet: from IPMODEM[500] to IPTELEFONO[33278] (38 bytes)
Sun Feb  6 13:08:35 2022 authpriv.info ipsec: 02[NET] received packet: from IPTELEFONO[33278] to IPMODEM[500] (660 bytes)
Sun Feb  6 13:08:35 2022 daemon.info ipsec: 02[NET] received packet: from IPTELEFONO[33278] to IPMODEM[500] (660 bytes)
Sun Feb  6 13:08:35 2022 authpriv.info ipsec: 02[ENC] parsed IKE_SA_INIT request 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) N(HASH_ALG) N(REDIR_SUP) ]
Sun Feb  6 13:08:35 2022 daemon.info ipsec: 02[ENC] parsed IKE_SA_INIT request 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) N(HASH_ALG) N(REDIR_SUP) ]
Sun Feb  6 13:08:35 2022 authpriv.info ipsec: 02[IKE] IPTELEFONO is initiating an IKE_SA
Sun Feb  6 13:08:35 2022 daemon.info ipsec: 02[IKE] IPTELEFONO is initiating an IKE_SA
Sun Feb  6 13:08:36 2022 authpriv.info ipsec: 02[IKE] remote host is behind NAT
Sun Feb  6 13:08:36 2022 daemon.info ipsec: 02[IKE] remote host is behind NAT
Sun Feb  6 13:08:36 2022 authpriv.info ipsec: 02[ENC] generating IKE_SA_INIT response 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) N(HASH_ALG) N(MULT_AUTH) ]
Sun Feb  6 13:08:36 2022 daemon.info ipsec: 02[ENC] generating IKE_SA_INIT response 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) N(HASH_ALG) N(MULT_AUTH) ]
Sun Feb  6 13:08:36 2022 authpriv.info ipsec: 02[NET] sending packet: from IPMODEM[500] to IPTELEFONO[33278] (462 bytes)
Sun Feb  6 13:08:36 2022 daemon.info ipsec: 02[NET] sending packet: from IPMODEM[500] to IPTELEFONO[33278] (462 bytes)
Sun Feb  6 13:08:36 2022 authpriv.info ipsec: 03[NET] received packet: from IPTELEFONO[32454] to IPMODEM[4500] (624 bytes)
Sun Feb  6 13:08:36 2022 daemon.info ipsec: 03[NET] received packet: from IPTELEFONO[32454] to IPMODEM[4500] (624 bytes)
Sun Feb  6 13:08:36 2022 authpriv.info ipsec: 03[ENC] parsed IKE_AUTH request 1 [ IDi CERTREQ AUTH CPRQ(ADDR DNS) SA TSi TSr N(MOBIKE_SUP) N(ADD_4_ADDR) N(MULT_AUTH) N(EAP_ONLY) N(MSG_ID_SYN_SUP) ]
Sun Feb  6 13:08:36 2022 daemon.info ipsec: 03[ENC] parsed IKE_AUTH request 1 [ IDi CERTREQ AUTH CPRQ(ADDR DNS) SA TSi TSr N(MOBIKE_SUP) N(ADD_4_ADDR) N(MULT_AUTH) N(EAP_ONLY) N(MSG_ID_SYN_SUP) ]
Sun Feb  6 13:08:36 2022 authpriv.info ipsec: 03[IKE] received 1 cert requests for an unknown ca
Sun Feb  6 13:08:36 2022 daemon.info ipsec: 03[IKE] received 1 cert requests for an unknown ca
Sun Feb  6 13:08:36 2022 authpriv.info ipsec: 03[CFG] looking for peer configs matching IPMODEM[%any]...IPTELEFONO[ANDREAVPN]
Sun Feb  6 13:08:36 2022 daemon.info ipsec: 03[CFG] looking for peer configs matching IPMODEM[%any]...IPTELEFONO[ANDREAVPN]
Sun Feb  6 13:08:36 2022 authpriv.info ipsec: 03[CFG] selected peer config 'rwEAPMSCHAPV2'
Sun Feb  6 13:08:36 2022 daemon.info ipsec: 03[CFG] selected peer config 'rwEAPMSCHAPV2'
Sun Feb  6 13:08:36 2022 authpriv.info ipsec: 03[IKE] no trusted RSA public key found for 'ANDREAVPN'
Sun Feb  6 13:08:36 2022 daemon.info ipsec: 03[IKE] no trusted RSA public key found for 'ANDREAVPN'
Sun Feb  6 13:08:36 2022 authpriv.info ipsec: 03[IKE] peer supports MOBIKE
Sun Feb  6 13:08:36 2022 daemon.info ipsec: 03[IKE] peer supports MOBIKE
Sun Feb  6 13:08:36 2022 authpriv.info ipsec: 03[ENC] generating IKE_AUTH response 1 [ N(AUTH_FAILED) ]
Sun Feb  6 13:08:36 2022 daemon.info ipsec: 03[ENC] generating IKE_AUTH response 1 [ N(AUTH_FAILED) ]
Sun Feb  6 13:08:36 2022 authpriv.info ipsec: 03[NET] sending packet: from IPMODEM[4500] to IPTELEFONO[32454] (80 bytes)
Sun Feb  6 13:08:36 2022 daemon.info ipsec: 03[NET] sending packet: from IPMODEM[4500] to IPTELEFONO[32454] (80 bytes)
Sun Feb  6 13:08:45 2022 daemon.info nanocdn-rr[9558]: INFO   9652 mdnsP label:BRW8CC84B9961E7.local type:1 class:1 response waited in multicast
Sun Feb  6 13:08:45 2022 daemon.err nanocdn-rr[9558]: INFO   9652 2147.682 mdnsP: label:BRW8CC84B9961E7.local type:1 class:1 response waited in multicast
Sun Feb  6 13:08:45 2022 daemon.info nanocdn-rr[9558]: INFO   9652 mdnsP label:BRW8CC84B9961E7.local type:1 class:1 response waited in multicast
Sun Feb  6 13:08:45 2022 daemon.err nanocdn-rr[9558]: INFO   9652 2147.690 mdnsP: label:BRW8CC84B9961E7.local type:1 class:1 response waited in multicast
Sun Feb  6 13:08:48 2022 daemon.info nanocdn-rr[9558]: INFO   9652 mdnsP label:BRW8CC84B9961E7.local type:1 class:1 response waited in multicast
Sun Feb  6 13:08:48 2022 daemon.err nanocdn-rr[9558]: INFO   9652 2150.150 mdnsP: label:BRW8CC84B9961E7.local type:1 class:1 response waited in multicast
« Ultima modifica: 06 Febbraio 2022, 13:13 da satigno »

Offline larsen64it

  • VIP
  • *****
  • 2668
Re:[GUIDA] strongSwan per IPsec su OpenWrt e Homeware
« Risposta #222 il: 06 Febbraio 2022, 13:20 »
I comandi sono in fondo a setup.sh
Codice: [Seleziona]
/etc/init.d/ipsec enable
/etc/init.d/ipsec start

Offline satigno

  • Membro Giovane
  • **
  • 96
Re:[GUIDA] strongSwan per IPsec su OpenWrt e Homeware
« Risposta #223 il: 06 Febbraio 2022, 13:40 »
@larsen64it

Grazia ma purtroppo non funzionano quei comandi in quanto non ho in /etc/init.d un file chiamato ipsec. C'è modo per risolvere?

Comunque continuo a ottenere questo log...

Codice: [Seleziona]
[email protected]:~# logread -f
Sun Feb  6 13:38:12 2022 daemon.notice pppd[1447]: Connection state changed to disconnecting (phase 10)
Sun Feb  6 13:38:12 2022 daemon.notice pppd[1447]: Connection terminated.
Sun Feb  6 13:38:12 2022 daemon.info charon: 05[KNL] interface pppoe-wan_voip deleted
Sun Feb  6 13:38:12 2022 daemon.info pppd[1447]: Sent PADT
Sun Feb  6 13:38:12 2022 daemon.notice pppd[1447]: Connection state changed to disconnected (phase 0)
Sun Feb  6 13:38:12 2022 daemon.notice pppd[1447]: Modem hangup
Sun Feb  6 13:38:12 2022 daemon.info pppd[1447]: Exit.
Sun Feb  6 13:38:12 2022 daemon.notice netifd: Interface 'wan_voip' is now down
Sun Feb  6 13:38:12 2022 daemon.notice netifd: Interface 'wan_voip' is setting up now
Sun Feb  6 13:38:12 2022 daemon.info charon: 03[NET] received packet: from IPTELEFONO[33098] to IPMODEM[500] (660 bytes)
Sun Feb  6 13:38:12 2022 daemon.info charon: 03[ENC] parsed IKE_SA_INIT request 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) N(HASH_ALG) N(REDIR_SUP) ]
Sun Feb  6 13:38:12 2022 daemon.info charon: 03[IKE] IPTELEFONO is initiating an IKE_SA
Sun Feb  6 13:38:12 2022 authpriv.info charon: 03[IKE] IPTELEFONO is initiating an IKE_SA
Sun Feb  6 13:38:12 2022 daemon.info charon: 03[IKE] remote host is behind NAT
Sun Feb  6 13:38:12 2022 daemon.info charon: 03[IKE] DH group MODP_2048_256 inacceptable, requesting MODP_2048
Sun Feb  6 13:38:12 2022 daemon.info charon: 03[ENC] generating IKE_SA_INIT response 0 [ N(INVAL_KE) ]
Sun Feb  6 13:38:12 2022 daemon.info charon: 03[NET] sending packet: from IPMODEM[500] to IPTELEFONO[33098] (38 bytes)
Sun Feb  6 13:38:12 2022 daemon.info charon: 04[NET] received packet: from IPTELEFONO[33098] to IPMODEM[500] (660 bytes)
Sun Feb  6 13:38:12 2022 daemon.info charon: 04[ENC] parsed IKE_SA_INIT request 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) N(HASH_ALG) N(REDIR_SUP) ]
Sun Feb  6 13:38:12 2022 daemon.info charon: 04[IKE] IPTELEFONO is initiating an IKE_SA
Sun Feb  6 13:38:12 2022 authpriv.info charon: 04[IKE] IPTELEFONO is initiating an IKE_SA
Sun Feb  6 13:38:12 2022 daemon.info pppd[1695]: Plugin connstate.so loaded.
Sun Feb  6 13:38:12 2022 daemon.info pppd[1695]: Plugin rp-pppoe.so loaded.
Sun Feb  6 13:38:12 2022 daemon.info pppd[1695]: RP-PPPoE plugin version 3.8p compiled against pppd 2.4.7
Sun Feb  6 13:38:12 2022 daemon.notice pppd[1695]: pppd 2.4.7 started by root, uid 0
Sun Feb  6 13:38:12 2022 daemon.notice pppd[1695]: Connection state changed to connecting (phase 2)
Sun Feb  6 13:38:12 2022 daemon.info pppd[1695]: PPP session is 15467
Sun Feb  6 13:38:12 2022 daemon.warn pppd[1695]: Connected to 84:c1:c1:1e:36:48 via interface wanptm0
Sun Feb  6 13:38:12 2022 kern.warn kernel: [  422.971661] netdev path : ppp1 -> wanptm0 -> ptm0
Sun Feb  6 13:38:12 2022 kern.info kernel: [  422.971723] pppoe-wan_voip: renamed from ppp1
Sun Feb  6 13:38:12 2022 daemon.info pppd[1695]: Renamed interface ppp1 to pppoe-wan_voip
Sun Feb  6 13:38:12 2022 daemon.info pppd[1695]: Using interface pppoe-wan_voip
Sun Feb  6 13:38:12 2022 daemon.notice pppd[1695]: Connect: pppoe-wan_voip <--> wanptm0
Sun Feb  6 13:38:12 2022 daemon.notice pppd[1695]: Connection state changed to authenticating (phase 5)
Sun Feb  6 13:38:12 2022 daemon.notice pppd[1695]: peer from calling number 84:C1:C1:1E:36:48 authorized
Sun Feb  6 13:38:12 2022 daemon.notice pppd[1695]: Connection state changed to networking (phase 7)
Sun Feb  6 13:38:12 2022 daemon.info charon: 04[IKE] remote host is behind NAT
Sun Feb  6 13:38:12 2022 daemon.info charon: 04[ENC] generating IKE_SA_INIT response 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) N(HASH_ALG) N(MULT_AUTH) ]
Sun Feb  6 13:38:12 2022 daemon.info charon: 04[NET] sending packet: from IPMODEM[500] to IPTELEFONO[33098] (462 bytes)
Sun Feb  6 13:38:12 2022 daemon.info pppd[1695]: LCP terminated by peer
Sun Feb  6 13:38:12 2022 daemon.notice pppd[1695]: Connection state changed to connecting (phase 4)
Sun Feb  6 13:38:13 2022 daemon.info charon: 07[NET] received packet: from IPTELEFONO[32696] to IPMODEM[4500] (624 bytes)
Sun Feb  6 13:38:13 2022 daemon.info charon: 07[ENC] parsed IKE_AUTH request 1 [ IDi CERTREQ AUTH CPRQ(ADDR DNS) SA TSi TSr N(MOBIKE_SUP) N(ADD_4_ADDR) N(MULT_AUTH) N(EAP_ONLY) N(MSG_ID_SYN_SUP) ]
Sun Feb  6 13:38:13 2022 daemon.info charon: 07[IKE] received 1 cert requests for an unknown ca
Sun Feb  6 13:38:13 2022 daemon.info charon: 07[CFG] looking for peer configs matching IPMODEM[%any]...IPTELEFONO[ANDREAVPN]
Sun Feb  6 13:38:13 2022 daemon.info charon: 07[CFG] selected peer config 'rwEAPMSCHAPV2'
Sun Feb  6 13:38:13 2022 daemon.info charon: 07[IKE] no trusted RSA public key found for 'ANDREAVPN'
Sun Feb  6 13:38:13 2022 daemon.info charon: 07[IKE] peer supports MOBIKE
Sun Feb  6 13:38:13 2022 daemon.info charon: 07[ENC] generating IKE_AUTH response 1 [ N(AUTH_FAILED) ]
Sun Feb  6 13:38:13 2022 daemon.info charon: 07[NET] sending packet: from IPMODEM[4500] to IPTELEFONO[32696] (80 bytes)
Sun Feb  6 13:38:15 2022 daemon.notice pppd[1695]: Connection state changed to disconnecting (phase 10)
Sun Feb  6 13:38:15 2022 daemon.notice pppd[1695]: Connection terminated.
Sun Feb  6 13:38:16 2022 daemon.info charon: 05[KNL] interface pppoe-wan_voip deleted
Sun Feb  6 13:38:16 2022 daemon.info pppd[1695]: Sent PADT
Sun Feb  6 13:38:16 2022 daemon.notice pppd[1695]: Connection state changed to disconnected (phase 0)
Sun Feb  6 13:38:16 2022 daemon.notice pppd[1695]: Modem hangup
Sun Feb  6 13:38:16 2022 daemon.info pppd[1695]: Exit.
Sun Feb  6 13:38:16 2022 daemon.notice netifd: Interface 'wan_voip' is now down
Sun Feb  6 13:38:16 2022 daemon.notice netifd: Interface 'wan_voip' is setting up now
Sun Feb  6 13:38:16 2022 daemon.info pppd[1947]: Plugin connstate.so loaded.
Sun Feb  6 13:38:16 2022 daemon.info pppd[1947]: Plugin rp-pppoe.so loaded.
Sun Feb  6 13:38:16 2022 daemon.info pppd[1947]: RP-PPPoE plugin version 3.8p compiled against pppd 2.4.7
Sun Feb  6 13:38:16 2022 daemon.notice pppd[1947]: pppd 2.4.7 started by root, uid 0
Sun Feb  6 13:38:16 2022 daemon.notice pppd[1947]: Connection state changed to connecting (phase 2)
Sun Feb  6 13:38:16 2022 daemon.info pppd[1947]: PPP session is 5160
Sun Feb  6 13:38:16 2022 daemon.warn pppd[1947]: Connected to 84:c1:c1:1e:36:48 via interface wanptm0
Sun Feb  6 13:38:16 2022 kern.warn kernel: [  426.678582] netdev path : ppp1 -> wanptm0 -> ptm0
Sun Feb  6 13:38:16 2022 kern.info kernel: [  426.678636] pppoe-wan_voip: renamed from ppp1
Sun Feb  6 13:38:16 2022 daemon.info pppd[1947]: Renamed interface ppp1 to pppoe-wan_voip
Sun Feb  6 13:38:16 2022 daemon.info pppd[1947]: Using interface pppoe-wan_voip
Sun Feb  6 13:38:16 2022 daemon.notice pppd[1947]: Connect: pppoe-wan_voip <--> wanptm0
Sun Feb  6 13:38:16 2022 daemon.notice pppd[1947]: Connection state changed to authenticating (phase 5)
Sun Feb  6 13:38:16 2022 daemon.notice pppd[1947]: peer from calling number 84:C1:C1:1E:36:48 authorized
Sun Feb  6 13:38:16 2022 daemon.notice pppd[1947]: Connection state changed to networking (phase 7)
Sun Feb  6 13:38:16 2022 daemon.info pppd[1947]: LCP terminated by peer
Sun Feb  6 13:38:16 2022 daemon.notice pppd[1947]: Connection state changed to connecting (phase 4)
Sun Feb  6 13:38:17 2022 daemon.info nanocdn-rr[10357]: INFO  10487 mdnsP label:wpad.local type:1 class:1 response waited in multicast
Sun Feb  6 13:38:17 2022 daemon.err nanocdn-rr[10357]: INFO  10487 327.305 mdnsP: label:wpad.local type:1 class:1 response waited in multicast
Sun Feb  6 13:38:18 2022 daemon.info nanocdn-rr[10357]: INFO  10487 mdnsP label:wpad.local type:1 class:1 response waited in multicast
Sun Feb  6 13:38:18 2022 daemon.err nanocdn-rr[10357]: INFO  10487 328.310 mdnsP: label:wpad.local type:1 class:1 response waited in multicast
Sun Feb  6 13:38:19 2022 daemon.info nanocdn-rr[10357]: INFO  10487 mdnsP label:wpad.local type:1 class:1 response waited in multicast
Sun Feb  6 13:38:19 2022 daemon.err nanocdn-rr[10357]: INFO  10487 329.589 mdnsP: label:wpad.local type:1 class:1 response waited in multicast
Sun Feb  6 13:38:19 2022 daemon.info nanocdn-rr[10357]: INFO  10487 mdnsP label:wpad.local type:28 class:1 response waited in multicast
Sun Feb  6 13:38:19 2022 daemon.err nanocdn-rr[10357]: INFO  10487 329.590 mdnsP: label:wpad.local type:28 class:1 response waited in multicast
Sun Feb  6 13:38:19 2022 daemon.notice pppd[1947]: Connection state changed to disconnecting (phase 10)
Sun Feb  6 13:38:19 2022 daemon.notice pppd[1947]: Connection terminated.
Sun Feb  6 13:38:19 2022 daemon.info charon: 11[KNL] interface pppoe-wan_voip deleted
Sun Feb  6 13:38:19 2022 daemon.info pppd[1947]: Sent PADT
Sun Feb  6 13:38:19 2022 daemon.notice pppd[1947]: Connection state changed to disconnected (phase 0)
Sun Feb  6 13:38:19 2022 daemon.notice pppd[1947]: Modem hangup
Sun Feb  6 13:38:19 2022 daemon.info pppd[1947]: Exit.
Sun Feb  6 13:38:19 2022 daemon.notice netifd: Interface 'wan_voip' is now down
Sun Feb  6 13:38:19 2022 daemon.notice netifd: Interface 'wan_voip' is setting up now
Sun Feb  6 13:38:19 2022 kern.warn kernel: [  430.013139] dosprotect rpfilter drop IN=br-lan OUT= MAC= SRC=fe80:0000:0000:0000:a691:b1ff:fec2:f2c8 DST=ff02:0000:0000:0000:0000:0000:0000:0016 LEN=96 TC=0 HOPLIMIT=1 FLOWLBL=0 PROTO=ICMPv6 TYPE=143 CODE=0
Sun Feb  6 13:38:20 2022 kern.warn kernel: [  430.246001] dosprotect rpfilter drop IN=iptvptm0 OUT= MAC=01:00:5e:48:00:00:08:96:ad:29:65:0b:08:00:45:60:01:6c SRC=81.74.224.78 DST=239.200.0.0 LEN=364 TOS=0x00 PREC=0x60 TTL=121 ID=36180 DF PROTO=UDP SPT=59486 DPT=5004 LEN=344 MARK=0x8000000
Sun Feb  6 13:38:20 2022 daemon.info pppd[2202]: Plugin connstate.so loaded.
Sun Feb  6 13:38:20 2022 daemon.info pppd[2202]: Plugin rp-pppoe.so loaded.
Sun Feb  6 13:38:20 2022 daemon.info pppd[2202]: RP-PPPoE plugin version 3.8p compiled against pppd 2.4.7
Sun Feb  6 13:38:20 2022 daemon.notice pppd[2202]: pppd 2.4.7 started by root, uid 0
Sun Feb  6 13:38:20 2022 daemon.notice pppd[2202]: Connection state changed to connecting (phase 2)
Sun Feb  6 13:38:20 2022 daemon.info pppd[2202]: PPP session is 15467
Sun Feb  6 13:38:20 2022 daemon.warn pppd[2202]: Connected to 84:c1:c1:1e:36:48 via interface wanptm0
Sun Feb  6 13:38:20 2022 kern.warn kernel: [  430.345762] netdev path : ppp1 -> wanptm0 -> ptm0
Sun Feb  6 13:38:20 2022 kern.info kernel: [  430.345813] pppoe-wan_voip: renamed from ppp1
Sun Feb  6 13:38:20 2022 daemon.info pppd[2202]: Renamed interface ppp1 to pppoe-wan_voip
Sun Feb  6 13:38:20 2022 daemon.info pppd[2202]: Using interface pppoe-wan_voip
Sun Feb  6 13:38:20 2022 daemon.notice pppd[2202]: Connect: pppoe-wan_voip <--> wanptm0
Sun Feb  6 13:38:20 2022 daemon.notice pppd[2202]: Connection state changed to authenticating (phase 5)
Sun Feb  6 13:38:20 2022 daemon.notice pppd[2202]: peer from calling number 84:C1:C1:1E:36:48 authorized
Sun Feb  6 13:38:20 2022 daemon.notice pppd[2202]: Connection state changed to networking (phase 7)
Sun Feb  6 13:38:20 2022 daemon.info pppd[2202]: LCP terminated by peer
Sun Feb  6 13:38:20 2022 daemon.notice pppd[2202]: Connection state changed to connecting (phase 4)
Sun Feb  6 13:38:20 2022 daemon.info nanocdn-rr[10357]: INFO  10487 mdnsP label:wpad.local type:1 class:1 response waited in multicast
Sun Feb  6 13:38:20 2022 daemon.info nanocdn-rr[10357]: INFO  10487 mdnsP label:wpad.local type:28 class:1 response waited in multicast
Sun Feb  6 13:38:20 2022 daemon.err nanocdn-rr[10357]: INFO  10487 330.600 mdnsP: label:wpad.local type:1 class:1 response waited in multicast
Sun Feb  6 13:38:20 2022 daemon.err nanocdn-rr[10357]: INFO  10487 330.600 mdnsP: label:wpad.local type:28 class:1 response waited in multicast
Sun Feb  6 13:38:22 2022 daemon.info nanocdn-rr[10357]: INFO  10487 mdnsP label:BRW8CC84B9961E7.local type:1 class:1 response waited in multicast
Sun Feb  6 13:38:22 2022 daemon.err nanocdn-rr[10357]: INFO  10487 332.646 mdnsP: label:BRW8CC84B9961E7.local type:1 class:1 response waited in multicast
Sun Feb  6 13:38:23 2022 daemon.notice pppd[2202]: Connection state changed to disconnecting (phase 10)
Sun Feb  6 13:38:23 2022 daemon.notice pppd[2202]: Connection terminated.
Sun Feb  6 13:38:23 2022 daemon.info charon: 15[KNL] interface pppoe-wan_voip deleted
Sun Feb  6 13:38:23 2022 daemon.info pppd[2202]: Sent PADT
Sun Feb  6 13:38:23 2022 daemon.notice pppd[2202]: Connection state changed to disconnected (phase 0)
Sun Feb  6 13:38:23 2022 daemon.notice pppd[2202]: Modem hangup
Sun Feb  6 13:38:23 2022 daemon.info pppd[2202]: Exit.
Sun Feb  6 13:38:23 2022 daemon.notice netifd: Interface 'wan_voip' is now down
Sun Feb  6 13:38:23 2022 daemon.notice netifd: Interface 'wan_voip' is setting up now
Sun Feb  6 13:38:23 2022 daemon.info pppd[2444]: Plugin connstate.so loaded.
Sun Feb  6 13:38:23 2022 daemon.info pppd[2444]: Plugin rp-pppoe.so loaded.
Sun Feb  6 13:38:23 2022 daemon.info pppd[2444]: RP-PPPoE plugin version 3.8p compiled against pppd 2.4.7
Sun Feb  6 13:38:23 2022 daemon.notice pppd[2444]: pppd 2.4.7 started by root, uid 0
Sun Feb  6 13:38:23 2022 daemon.notice pppd[2444]: Connection state changed to connecting (phase 2)
Sun Feb  6 13:38:23 2022 daemon.info pppd[2444]: PPP session is 21882
Sun Feb  6 13:38:23 2022 daemon.warn pppd[2444]: Connected to 84:c1:c1:1e:36:48 via interface wanptm0
Sun Feb  6 13:38:23 2022 kern.warn kernel: [  434.009423] netdev path : ppp1 -> wanptm0 -> ptm0
Sun Feb  6 13:38:23 2022 kern.info kernel: [  434.009475] pppoe-wan_voip: renamed from ppp1
Sun Feb  6 13:38:23 2022 daemon.info pppd[2444]: Renamed interface ppp1 to pppoe-wan_voip
Sun Feb  6 13:38:23 2022 daemon.info pppd[2444]: Using interface pppoe-wan_voip
Sun Feb  6 13:38:23 2022 daemon.notice pppd[2444]: Connect: pppoe-wan_voip <--> wanptm0
Sun Feb  6 13:38:23 2022 daemon.notice pppd[2444]: Connection state changed to authenticating (phase 5)
Sun Feb  6 13:38:23 2022 daemon.notice pppd[2444]: peer from calling number 84:C1:C1:1E:36:48 authorized
Sun Feb  6 13:38:23 2022 daemon.notice pppd[2444]: Connection state changed to networking (phase 7)
Sun Feb  6 13:38:23 2022 daemon.info pppd[2444]: LCP terminated by peer
Sun Feb  6 13:38:23 2022 daemon.notice pppd[2444]: Connection state changed to connecting (phase 4)

Offline a1pollo

  • Membro Anziano
  • ***
  • 172
Re:[GUIDA] strongSwan per IPsec su OpenWrt e Homeware
« Risposta #224 il: 06 Febbraio 2022, 16:15 »
Diciamo che ci sei quasi vicino.

In /etc/init.d/ il file ipsec deve esserci per forza altrimenti il servizio non si sarebbe attivato.
Codice: [Seleziona]
daemon.info charon: 03[IKE] DH group MODP_2048_256 inacceptable, requesting MODP_2048
il server ti sta dicendo che MODP_2048_256 non e' la sintassi giusta per questa cifratura ma bensi' MODP_2048 quindi dovresti controllare in /etc/ipsec.conf  e correggerlo. ogni volta che modifichi qualcosa dovrai ridare il comando /etc/init.d/ipsec restart
Codice: [Seleziona]
daemon.info charon: 07[IKE] no trusted RSA public key found for 'ANDREAVPN'
Non riesce a trovare la chiave rsa , qui dovresti controllare il file /etc/ipsec.secret il nome del certificato dopo i due punti e la dicitura RSA , lo stesso nome deve essere quello della chiave del certificato del server, che si trova nella cartella /etc/ipsec.d/private

Edit

mi era sfuggito
Codice: [Seleziona]
Ho provato a installare il file "client_ANDREAVPN.p12" sul telefono ma non si connette alla VPN. Ho un dubbio: nella cartella /etc/ipsec.d/private mi compare un file che si chiama "serverKey_yourhost.example.com.pem"
Sicuramente e' sbagliato! prova a rivedere la sintassi del setup.
« Ultima modifica: 06 Febbraio 2022, 17:03 da a1pollo »