-
Notifications
You must be signed in to change notification settings - Fork 19
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add IPsec mechanism support #638
Comments
@edwarnicke
|
@edwarnicke
|
@edwarnicke The problem is that we can only create one tunnel between forwarders. Because the ipip-tunnel has only two main parameters - srcIP and dstIP. How do we deal with multiple clients? How to do cross-connect? |
There was an idea to check GRE tunnel. Unfortunately, it seems that VPP does not support full functionality - https://datatracker.ietf.org/doc/html/rfc2890. I think |
@edwarnicke
|
@edwarnicke But, I found a replacement for ipip tunnels - https://github.com/FDio/vpp/blob/master/src/vnet/ipsec/ipsec.api#L348 |
Hi! Sorry for asking, why would you like multiple ports for different tunnels? The tunnel are distinguished by the SA assigned. The only reason I see for a need to control the ports is for nat traversal or passing traffic on udp. In any case, by default ipsec is assumed to be set on 4500, 500. |
One more thing, if in the future we would like to allow connectivity from a “virtual NSC” - lets say something like a pre-configured IPsec capable device( sdwan devices, firewalls, etc) Strongswan’s IKE daemon is more generic, stable and has better support for other 3rd party devices than the one built in vpp - the vppswan plugin is good (in theory) as it keeps the esp datapath in vpp (for far better performance) while allowing to punt the ike to sswan. |
@gmslabs
It was just an idea how to distinguish tunnels. This was solved by using ipsec underlying tunnel instead of ipip (why vpp manuals only point to ipip?)
Yes, we thought about that too. And I tried to run it, but it did not work for me (I saw that additional fixes were made later). But the main problem in my opinion is that we need to configure both the host and the vpp part (if I understand the plugin correctly). |
Hi @glazychev-art , thanks for the quick response!
from my experience a good way to programmatically manage sswan’s ike daemon is by using the vici interface - |
Thanks @gmslabs , I started looking at strongswan vpp again, ran docker examples and now they are working. But there is another question. ... in other words, there are as many vxlan interfaces as there are clients. Is it possible to create several IPSec interfaces via |
Hi, not sure how that flow will be translated to the sswan+vpp datapath… |
Seems like done! @glazychev-art Thanks! |
Description
Depends on: networkservicemesh/api#149
Explore how to use VPP to integrate IPsec protocol
The text was updated successfully, but these errors were encountered: