… | |
… | |
43 | =back |
43 | =back |
44 | |
44 | |
45 | =head1 PROGRAMS |
45 | =head1 PROGRAMS |
46 | |
46 | |
47 | Vpe comes with two programs: one daemon (C<vped>) and one control program |
47 | Vpe comes with two programs: one daemon (C<vped>) and one control program |
48 | C<vpectrl>). |
48 | (C<vpectrl>). |
49 | |
49 | |
50 | =over 4 |
50 | =over 4 |
51 | |
51 | |
52 | =item vpectrl |
52 | =item vpectrl |
53 | |
53 | |
54 | Is used to generate the keys and give an overview of the configuration. |
54 | Is used to generate the keys, check and give an overview of of the |
|
|
55 | configuration and contorl the daemon (restarting etc.). |
55 | |
56 | |
56 | =item vped |
57 | =item vped |
57 | |
58 | |
58 | Is the daemon used to establish and maintain conenctions to the other |
59 | Is the daemon used to establish and maintain conenctions to the other |
59 | network members. It should be run on the gateway machine. |
60 | network members. It should be run on the gateway machine. |
60 | |
61 | |
61 | =back |
62 | =back |
62 | |
63 | |
63 | =head1 CONFIGURING VPE |
64 | =head1 COMPILETIME CONFIGURATION |
64 | |
65 | |
65 | Here are a few recipes for configuring your vpe: |
66 | Here are a few recipes for compiling your vpe: |
66 | |
67 | |
67 | =head2 AS LOW PACKET OVERHEAD AS POSSIBLE |
68 | =head2 AS LOW PACKET OVERHEAD AS POSSIBLE |
68 | |
69 | |
69 | ./configure --enable-hmac-length=4 --enable-rand-length=0 |
70 | ./configure --enable-hmac-length=4 --enable-rand-length=0 |
70 | |
71 | |
71 | Minimize the header overhead of VPN packets. |
72 | Minimize the header overhead of VPN packets (the above will result in only |
|
|
73 | 4 bytes of overhead over the raw ethernet frame). |
72 | |
74 | |
73 | =head2 MINIMIZE CPU TIME REQUIRED |
75 | =head2 MINIMIZE CPU TIME REQUIRED |
74 | |
76 | |
75 | ./configure --enable-cipher=bf --enable-digest=md4 |
77 | ./configure --enable-cipher=bf --enable-digest=md4 |
76 | |
78 | |
77 | Use the fastest cipher and digest algorithms. |
79 | Use the fastest cipher and digest algorithms currently available in vpe. |
78 | |
80 | |
79 | =head2 MAXIMIZE SECURITY |
81 | =head2 MAXIMIZE SECURITY |
80 | |
82 | |
81 | ./configure --enable-hmac-length=16 --enable-rand-length=8 --enable-digest=sha1 |
83 | ./configure --enable-hmac-length=16 --enable-rand-length=8 --enable-digest=sha1 |
|
|
84 | |
|
|
85 | This uses a 16 byte HMAC checksum to authenticate packets (I guess 8-12 |
|
|
86 | would also be pretty secure ;) and will additionally prefix each packet |
|
|
87 | with 8 bytes of random data. |
82 | |
88 | |
83 | In general, remember that AES-128 seems to be more secure and faster than |
89 | In general, remember that AES-128 seems to be more secure and faster than |
84 | AES-192 or AES-256, more randomness and longer hmac is more secure, MD4 is |
90 | AES-192 or AES-256, more randomness helps against sniffing and a longer |
85 | a fast digest, SHA1 or RIPEMD160 are better, and Blowfish is a fast and |
91 | HMAC helps against spoofing. MD4 is a fast digest, SHA1 or RIPEMD160 are |
86 | so-far quite secure cipher. |
92 | better, and Blowfish is a fast cipher (and also quite secure). |
87 | |
93 | |
88 | =head1 HOW TO SET UP A SIMPLE VPN |
94 | =head1 HOW TO SET UP A SIMPLE VPN |
89 | |
95 | |
90 | In this section I will describe how to get a simple VPN consisting of |
96 | In this section I will describe how to get a simple VPN consisting of |
91 | three hosts up and running. |
97 | three hosts up and running. |
… | |
… | |
96 | configuration directory. This is usually C</etc/vpe>, depending on how you |
102 | configuration directory. This is usually C</etc/vpe>, depending on how you |
97 | configured vpe, and can be overwritten using the C<-c> commandline switch. |
103 | configured vpe, and can be overwritten using the C<-c> commandline switch. |
98 | |
104 | |
99 | Put the following lines into C</etc/vpe/vped.conf>: |
105 | Put the following lines into C</etc/vpe/vped.conf>: |
100 | |
106 | |
101 | udp-port = 50000 # the external port to listen on (configure your firewall) |
107 | udp-port = 50000 # the external port to listen on (configure your firewall) |
102 | mtu = 1400 # minimum MTU of all outgoing interfaces on all hosts |
108 | mtu = 1400 # minimum MTU of all outgoing interfaces on all hosts |
103 | ifname = vpn0 # the local network device name |
109 | ifname = vpn0 # the local network device name |
104 | |
110 | |
105 | node = first # just a nickname |
111 | node = first # just a nickname |
106 | hostname = first.example.net # the DNS name or IP address of the host |
112 | hostname = first.example.net # the DNS name or IP address of the host |
107 | |
113 | |
108 | node = second |
114 | node = second |
109 | hostname = 133.55.82.9 |
115 | hostname = 133.55.82.9 |
110 | |
116 | |
111 | node = third |
117 | node = third |
112 | hostname = third.example.net |
118 | hostname = third.example.net |
113 | |
119 | |
114 | The only other file neccessary if the C<if-up> script that initializes the |
120 | The only other file neccessary if the C<if-up> script that initializes the |
115 | local ethernet interface. Put the following lines into C</etc/vpe/if-up> |
121 | local ethernet interface. Put the following lines into C</etc/vpe/if-up> |
116 | and make it execute (C<chmod 755 /etc/vpe/if-up>): |
122 | and make it execute (C<chmod 755 /etc/vpe/if-up>): |
117 | |
123 | |
118 | #!/bin/sh |
124 | #!/bin/sh |
119 | ip link set $IFNAME address $MAC mtu $MTU up |
125 | ip link set $IFNAME address $MAC mtu $MTU up |
120 | [ $NODENAME = first ] && ip addr add 10.0.1.1 dev $IFNAME |
126 | [ $NODENAME = first ] && ip addr add 10.0.1.1 dev $IFNAME |
121 | [ $NODENAME = second ] && ip addr add 10.0.2.1 dev $IFNAME |
127 | [ $NODENAME = second ] && ip addr add 10.0.2.1 dev $IFNAME |
122 | [ $NODENAME = third ] && ip addr add 10.0.3.1 dev $IFNAME |
128 | [ $NODENAME = third ] && ip addr add 10.0.3.1 dev $IFNAME |
123 | ip route add 10.0.0.0/16 dev $IFNAME |
129 | ip route add 10.0.0.0/16 dev $IFNAME |
124 | |
130 | |
125 | This script will give each node a different IP address in the C<10.0/16> |
131 | This script will give each node a different IP address in the C<10.0/16> |
126 | network. The internal network (e.g. the C<eth0> interface) should then be |
132 | network. The internal network (e.g. the C<eth0> interface) should then be |
127 | set to a subset of that network, e.g. C<10.0.1.0/24> on node C<first>, |
133 | set to a subset of that network, e.g. C<10.0.1.0/24> on node C<first>, |
128 | C<10.0.2.0/24> on node C<second>, and so on. |
134 | C<10.0.2.0/24> on node C<second>, and so on. |
… | |
… | |
135 | =head2 STEP 2: create the RSA key pairs for all hosts |
141 | =head2 STEP 2: create the RSA key pairs for all hosts |
136 | |
142 | |
137 | Run the following command to generate all key pairs (that might take a |
143 | Run the following command to generate all key pairs (that might take a |
138 | while): |
144 | while): |
139 | |
145 | |
140 | vpectrl -c /etc/vpe -g |
146 | vpectrl -c /etc/vpe -g |
141 | |
147 | |
142 | This command will put the public keys into C<< |
148 | This command will put the public keys into C<< |
143 | /etc/vpe/pubkeys/I<nodename> >> and the private keys into C<< |
149 | /etc/vpe/pubkeys/I<nodename> >> and the private keys into C<< |
144 | /etc/vpe/hostkeys/I<nodename> >>. |
150 | /etc/vpe/hostkeys/I<nodename> >>. |
145 | |
151 | |
… | |
… | |
148 | Now distribute the config files to the other nodes. This should be done in two steps, since the |
154 | Now distribute the config files to the other nodes. This should be done in two steps, since the |
149 | private keys should not be distributed. The example uses rsync-over-ssh |
155 | private keys should not be distributed. The example uses rsync-over-ssh |
150 | |
156 | |
151 | First all the config files without the hostkeys should be distributed: |
157 | First all the config files without the hostkeys should be distributed: |
152 | |
158 | |
153 | rsync -avzessh /etc/vpe first.example.net:/etc/. --exclude hostkeys |
159 | rsync -avzessh /etc/vpe first.example.net:/etc/. --exclude hostkeys |
154 | rsync -avzessh /etc/vpe 133.55.82.9:/etc/. --exclude hostkeys |
160 | rsync -avzessh /etc/vpe 133.55.82.9:/etc/. --exclude hostkeys |
155 | rsync -avzessh /etc/vpe third.example.net:/etc/. --exclude hostkeys |
161 | rsync -avzessh /etc/vpe third.example.net:/etc/. --exclude hostkeys |
156 | |
162 | |
157 | Then the hostkeys should be copied: |
163 | Then the hostkeys should be copied: |
158 | |
164 | |
159 | rsync -avzessh /etc/vpe/hostkeys/first first.example.net:/etc/hostkey |
165 | rsync -avzessh /etc/vpe/hostkeys/first first.example.net:/etc/hostkey |
160 | rsync -avzessh /etc/vpe/hostkeys/second 133.55.82.9:/etc/hostkey |
166 | rsync -avzessh /etc/vpe/hostkeys/second 133.55.82.9:/etc/hostkey |
161 | rsync -avzessh /etc/vpe/hostkeys/third third.example.net:/etc/hostkey |
167 | rsync -avzessh /etc/vpe/hostkeys/third third.example.net:/etc/hostkey |
162 | |
168 | |
163 | You should now check the configration by issuing the command C<vpectrl -c |
169 | You should now check the configration by issuing the command C<vpectrl -c |
164 | /etc/vpe -s> on each node and verify it's output. |
170 | /etc/vpe -s> on each node and verify it's output. |
165 | |
171 | |
166 | =head2 STEP 4: starting vped |
172 | =head2 STEP 4: starting vped |
167 | |
173 | |
168 | You should then start vped on each node by issuing a command like: |
174 | You should then start vped on each node by issuing a command like: |
169 | |
175 | |
170 | vped -D -linfo first # first is the nodename |
176 | vped -D -linfo first # first is the nodename |
171 | |
177 | |
172 | This will make the vped stay in foreground. You should then see |
178 | This will make the vped stay in foreground. You should then see |
173 | "connection established" messages. If you don't see them check your |
179 | "connection established" messages. If you don't see them check your |
174 | firewall and routing (use tcpdump ;). |
180 | firewall and routing (use tcpdump ;). |
175 | |
181 | |
… | |
… | |
178 | |
184 | |
179 | To make vped run more permanently you can either run it as a daemon |
185 | To make vped run more permanently you can either run it as a daemon |
180 | (by starting it without the C<-D> switch), or, much better, from your |
186 | (by starting it without the C<-D> switch), or, much better, from your |
181 | inittab. I use a line like this on my systems: |
187 | inittab. I use a line like this on my systems: |
182 | |
188 | |
183 | t1:2345:respawn:/opt/vpe/sbin/vped -D -L first >/dev/null 2>&1 |
189 | t1:2345:respawn:/opt/vpe/sbin/vped -D -L first >/dev/null 2>&1 |
184 | |
190 | |
185 | =head2 STEP 5: enjoy |
191 | =head2 STEP 5: enjoy |
186 | |
192 | |
187 | ... and play around. Sending a -HUP (C<vpectrl -kHUP>) to the daemon |
193 | ... and play around. Sending a -HUP (C<vpectrl -kHUP>) to the daemon |
188 | will make it try to connect to all other nodes again. If you run it from |
194 | will make it try to connect to all other nodes again. If you run it from |