linux-admin.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
* freeswan: client ip addresses
@ 2002-04-30  7:27 urgrue
  0 siblings, 0 replies; 4+ messages in thread
From: urgrue @ 2002-04-30  7:27 UTC (permalink / raw)
  To: admin

how on earth can i configure what IP address is assigned to the 
client's end of the VPN tunnel when he logs into freeswan?
i can't find a single word talking about this in the freeswan docs and 
nobody on their mailing list even bothered to reply to my question! im 
hoping people here will be nicer to me ;)
it makes freeswan pretty useless for me if i cant firewall the various 
vpn connections appropriately.

^ permalink raw reply	[flat|nested] 4+ messages in thread

* Re: freeswan: client ip addresses
       [not found] <D143FBF049570C4BB99D962DC25FC2D2159B57@freedom.icomedias.com>
@ 2002-04-30  8:12 ` urgrue
  2002-04-30  8:35   ` John Hallam
  0 siblings, 1 reply; 4+ messages in thread
From: urgrue @ 2002-04-30  8:12 UTC (permalink / raw)
  To: Martin Bene; +Cc: admin

EEEK! Really? isn't this a bit ridiculous?
how is one supposed to, for example, allow less-privileged employees 
access to the mail server only, and the better-privileged access also 
to the top-secret database?
there must be some way, if not i just cant understand what the IPSEC 
people are thinking. so much for being the fancy next-generation vpn 
solution!
i wish there was a vtun for windows, that would be really nice.


> You don't. with an IPSEC VPN there are no aditional IP addresses, so
> you can't easily distinguish between different VPN clients.
> 
> BYe, Martin
> 

^ permalink raw reply	[flat|nested] 4+ messages in thread

* Re: freeswan: client ip addresses
  2002-04-30  8:12 ` urgrue
@ 2002-04-30  8:35   ` John Hallam
  2002-04-30  9:14     ` urgrue
  0 siblings, 1 reply; 4+ messages in thread
From: John Hallam @ 2002-04-30  8:35 UTC (permalink / raw)
  To: urgrue; +Cc: Martin Bene, admin

	I may be completely -- or only partly -- confused here, but isn't
the idea of an IPSEC tunnel that the packets travel encapsulated from the
remote machine to the IPSEC gateway, and are then decapsulated and appear
on the local gateway IPSEC interface looking as if they came from the
machine at the other end of the tunnel?

	So you firewall based on the IP details of the remote client (even
though the local IPSEC interface that spits out the decapsulated packets
shares the IP address of the physical interface through which the
encapsulated packets arrive).

	John.

On Tue, 30 Apr 2002, urgrue wrote:

> EEEK! Really? isn't this a bit ridiculous?
> how is one supposed to, for example, allow less-privileged employees
> access to the mail server only, and the better-privileged access also
> to the top-secret database?
> there must be some way, if not i just cant understand what the IPSEC
> people are thinking. so much for being the fancy next-generation vpn
> solution!


^ permalink raw reply	[flat|nested] 4+ messages in thread

* Re: freeswan: client ip addresses
  2002-04-30  8:35   ` John Hallam
@ 2002-04-30  9:14     ` urgrue
  0 siblings, 0 replies; 4+ messages in thread
From: urgrue @ 2002-04-30  9:14 UTC (permalink / raw)
  To: John Hallam; +Cc: urgrue, Martin Bene, admin

if thats, so, i dont like it. first, it assumes your vpn server is the 
default gw (or along the default route) of the LAN, otherwise if the 
source IP of the packet is indeed the actual original IP of the client, 
replies will never make it back to the tunnel.
second, this means that the only way you can differentiate between 
users or groups of users is to have many vpn servers and each must 
masquerade the originating IP. this is just ridiculous.

but thanks to everyone for helping out. now that i know there is a CIPE 
for windows i'm definitely trying that!



> 	I may be completely -- or only partly -- confused here, but
> isn't
> the idea of an IPSEC tunnel that the packets travel encapsulated from
> the
> remote machine to the IPSEC gateway, and are then decapsulated and
> appear
> on the local gateway IPSEC interface looking as if they came from the
> machine at the other end of the tunnel?
> 
> 	So you firewall based on the IP details of the remote client
> (even
> though the local IPSEC interface that spits out the decapsulated
> packets
> shares the IP address of the physical interface through which the
> encapsulated packets arrive).
> 
> 	John.
> 
> On Tue, 30 Apr 2002, urgrue wrote:
> 
> > EEEK! Really? isn't this a bit ridiculous?
> > how is one supposed to, for example, allow less-privileged employees
> > access to the mail server only, and the better-privileged access
> also
> > to the top-secret database?
> > there must be some way, if not i just cant understand what the IPSEC
> > people are thinking. so much for being the fancy next-generation vpn
> > solution!
> 

^ permalink raw reply	[flat|nested] 4+ messages in thread

end of thread, other threads:[~2002-04-30  9:14 UTC | newest]

Thread overview: 4+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2002-04-30  7:27 freeswan: client ip addresses urgrue
     [not found] <D143FBF049570C4BB99D962DC25FC2D2159B57@freedom.icomedias.com>
2002-04-30  8:12 ` urgrue
2002-04-30  8:35   ` John Hallam
2002-04-30  9:14     ` urgrue

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).