More IPSEC routes for OSPF
Iain Buchanan
iainbuc at gmail.com
Thu Nov 14 12:04:21 CET 2013
I've got my script going, but I can't get the resulting routes into Bird.
I add the routes to a new kernel table which I point a "protocol kernel"
block at (see below). The routes I'm adding don't go via a particular
interface as OpenSWAN doesn't create any interfaces - I'm just putting them
in as "target network" via "local ip address" (this might be one problem -
I've tried both the internal IP and the GRE tunnel endpoint).
When I start Bird up I receive warnings about my new route with a strange
next-hop address. It then seems to completely ignore the route as "birdc"
produces no output when I do a "show route".
Do I need to specify my local IPSEC policies in a different format, or am I
missing something in the configuration?
log syslog all;
debug protocols all;
protocol kernel {
learn;
persist;
scan time 10;
import all;
export none;
kernel table 1; # This is my new table populated with IPSEC
policies
}
protocol device {
scan time 10;
}
protocol ospf myOSPF {
import all;
export all;
area 0 {
interface "tunOtherRouter" { # This is the GRE tunnel
cost 5;
type ptp;
hello 5; retransmit 2; wait 10; dead 20;
};
};
}
On 12 November 2013 21:41, Iain Buchanan <iainbuc at gmail.com> wrote:
> Thanks Ruben, I'll give the script option a go.
>
> Iain
>
>
> On 11 November 2013 14:19, Ruben Laban <r.laban+lists at ism.nl> wrote:
>
>> Hi,
>>
>>
>> On 10-11-2013 16:35, Iain Buchanan wrote:
>>
>>> I’m in pretty much the same position. I’ve tried Ondrej Zajicek’s
>>> suggestion of using transport mode IPSEC links, but this doesn’t seem to
>>> create visible routes (I’m using the netkey stack, which may be the
>>> issue). At the moment I’ve got GRE tunnels working on top of the IPSEC
>>> links, and if I enable debugging mode I can see instances of Bird
>>> communicating with one another over them (but not sending any of the
>>> OpenSWAN link information).
>>>
>>
>> The idea here is to have IPsec protected GRE tunnels over which one can
>> talk OSPF. There wouldn't be any IPsec routes to (re)distribute in that
>> case (as there's only transport ones). If you have other IPsec "routes"
>> (policies in fact) that you want to insert into OSPF, then you'll need one
>> of two alternatives indeed:
>>
>> * Have a script parse the IPsec policies, or
>> * Use the KLIPS stack instead of NETKEY, which gives you routes you can
>> insert into OSPF nicely (this is what I do).
>>
>> Regards,
>> Ruben
>>
>>
>>
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://trubka.network.cz/pipermail/bird-users/attachments/20131114/d9e323c1/attachment-0001.html>
More information about the Bird-users
mailing list