IPSec

From ProgClub
Jump to: navigation, search

IPSec is a project to get IPSec working between hosts on the ProgClub network. For other projects see Projects.

Project status

Cancelled. Too hard. Didn't get IKE working with racoon, but that was no big deal, we only have three hosts so manual keying is no drama. Had SSH and HTTP connectivity after configuring MSS values of 200 in order to get IPSec packets through, prior to that they were being dropped; but couldn't get Kerberos connectivity. An MSS of 200 is really low, so there would have been perf issues. But, even an MSS of 100 wouldn't solve the Kerberos connectivity issue, so I give up.

Contributors

Members who have contributed to this project. Newest on top.

All contributors have agreed to the terms of the Contributor License Agreement. This excludes any upstream contributors who tend to have different administrative frameworks.

Collaborators

The following people have helped, but don't have any claim on the project's copyright.

  • The Slicehost support team
  • Zanchey

Copyright

Copyright 2011, Contributors. Licensed under the New BSD license.

Links

IPSec related information

IPTables related information

Racoon related information

TCP/IP related information

Google searches

Forums I've asked on

TODO

  • It'd be just dandy if we could get to the bottom of why it doesn't work

Done

IPSec was configured on charity, hope and honesty, and by setting the MSS to 200 for each IP we were able to get SSH and HTTP connectivity (before that only ICMP echo traffic was getting though), but even the MSS hack didn't solve the Kerberos connectivity problem, so IPSec was abandoned. We trialed racoon, but that only made things worse (no connectivity).

Offers of help!

Come ask me (Zanchey) on irc://irc.ucc.asn.au/ucc some time. I've just spent the last week fiddling with IPsec at the University Computer Club in WA.