/[smecontribs]/rpms/smeserver-libreswan/contribs10/smeserver-libreswan-add-certificates.patch
ViewVC logotype

Contents of /rpms/smeserver-libreswan/contribs10/smeserver-libreswan-add-certificates.patch

Parent Directory Parent Directory | Revision Log Revision Log | View Revision Graph Revision Graph


Revision 1.1 - (show annotations) (download)
Mon Feb 22 16:03:27 2021 UTC (3 years, 8 months ago) by brianr
Branch: MAIN
CVS Tags: smeserver-libreswan-0_5-36_el7_sme, smeserver-libreswan-0_5-35_el7_sme, HEAD
Initial import

1 diff -ruN smeserver-libreswan-0.5.old/root/etc/e-smith/templates/etc/ipsec.d/ipsec.conf/10Connection smeserver-libreswan-0.5/root/etc/e-smith/templates/etc/ipsec.d/ipsec.conf/10Connection
2 --- smeserver-libreswan-0.5.old/root/etc/e-smith/templates/etc/ipsec.d/ipsec.conf/10Connection 2017-01-25 16:19:45.651000000 +0100
3 +++ smeserver-libreswan-0.5/root/etc/e-smith/templates/etc/ipsec.d/ipsec.conf/10Connection 2017-01-25 16:20:03.868000104 +0100
4 @@ -1,4 +1,3 @@
5 -#!/usr/bin/perl -w
6
7 {
8 use strict;
9 @@ -26,212 +25,220 @@
10
11 my @connections = $ipsecDB->keys;
12
13 + $OUT .= "# ipsec.conf\n\n";
14 +
15 foreach my $ipsecprop (@connections) {
16 - if ( $ipsecDB->get_prop( $ipsecprop, 'type' ) eq 'ipsec' ) {
17
18 - # first we verify if IPSec is enabled for the connection
19 + # first we verify if IPSec is enabled for the connection
20
21 - my $ipsecstatus = $ipsecDB->get_prop( $ipsecprop, 'status' ) || 'disabled';
22 + my $ipsecstatus = $ipsecDB->get_prop( $ipsecprop, 'status' ) || 'disabled';
23
24 - if ( $ipsecstatus ne 'enabled' ) {
25 - $OUT .= "# $ipsecprop is disabled\n"
26 - unless $ipsecstatus eq "enabled";
27 - }
28 - else {
29 + if ( $ipsecstatus eq 'enabled' ) {
30
31 - $OUT .= "conn $ipsecprop\n";
32 + $OUT .= "conn $ipsecprop\n";
33 +
34 + # These should be from $configDB-> ipsec
35
36 - # These should be from $configDB-> ipsec
37 + # Not templated this - maybe later with L2TPD
38 + # We currently use a password file but this could be integrated with other authent later
39
40 - # Not templated this - maybe later with L2TPD
41 - # We currently use a password file but this could be integrated with other authent later
42 + # Lazy - assume that it is security (password by default) - options are rsasig|certs
43
44 - # Lazy - assume that it is security (password by default) - option is rsasig
45 + # Careful - property 'type' has a special meaning in configDB and returns 'service'
46
47 - # Careful - property 'type' has a special meaning in configDB and returns 'service'
48 -
49 - my $connectiontype = $configDB->get_prop( $dbKey, 'connectiontype' )
50 - || 'tunnel';
51 - $OUT .= " type=$connectiontype\n";
52 -
53 - my $security = $ipsecDB->get_prop( "$ipsecprop", 'security' )
54 - || 'secret';
55 - my $certname = $ipsecDB->get_prop( "$ipsecprop", 'certname' ) || '';
56 -
57 - if ( $security eq "rsasig" ) {
58 - $OUT .= " authby=rsasig\n";
59 -
60 - my $leftrsasig = $ipsecDB->get_prop( "$ipsecprop", 'leftrsasig' )
61 - || '';
62 - $OUT .= " leftrsasigkey=$leftrsasig\n";
63 -
64 - my $rightrsasig = $ipsecDB->get_prop( "$ipsecprop", 'rightrsasig' )
65 - || '';
66 - $OUT .= " rightrsasigkey=$rightrsasig\n";
67 -
68 - }
69 -
70 - # Prep for certs
71 - # Problem here is that certificate settings are basically the same as rsasig
72 - # I think we can use a key to identify the type of connection and adjust accordingly
73 - # elsif ( $security eq "certificate" ) {
74 - # $OUT .= " authby=rsasig\n";
75 - # leftcert=$keyname.$ServerName.$DomainName
76 - # leftrsasigkey=%cert
77 - # leftid=leftid
78 - # leftsendcert=always - maybe not needed
79 -
80 - # rightca=%same
81 - # rightrsasigkey=%cert
82 - # rightid=%fromcert ?
83 -
84 - # $OUT .= " leftid=\"CN=$certname\"\n";
85 - # $OUT .= " leftcert=$certname\n";
86 -
87 - # }
88 -
89 - else {
90 - $OUT .= " authby=$security\n";
91 - }
92 -
93 - # Use connection value if it exists, if not use generic db value
94 - my $auto =
95 - $ipsecDB->get_prop( $ipsecprop, 'auto' )
96 - || $configDB->get_prop( $dbKey, 'auto' )
97 - || 'start';
98 -
99 - # If we are a static host to a dynamic client we are always add
100 - my $iptype = $ipsecDB->get_prop( $ipsecprop, 'iptype' ) || '';
101 -
102 - if ( $iptype eq 'stattodyn' ) {
103 - $OUT .= " auto=add\n";
104 - }
105 - else {
106 - $OUT .= " auto=$auto\n";
107 - }
108 -
109 - # We should change ipsecversion to ikev2status
110 - my $ipsecversion =
111 - $ipsecDB->get_prop( $ipsecprop, 'ipsecversion' )
112 - || $configDB->get_prop( $dbKey, 'ipsecversion' )
113 - || 'permit';
114 -
115 - $OUT .= " ikev2=$ipsecversion\n";
116 -
117 - # Set the Phase one and Phase two default strengths - these are set to aes
118 - my $ike =
119 - $ipsecDB->get_prop( $ipsecprop, 'ike' )
120 - || $configDB->get_prop( $dbKey, 'ike' )
121 - || 'aes-sha1';
122 - $OUT .= " ike=$ike\n";
123 -
124 - my $phase2 =
125 - $ipsecDB->get_prop( $ipsecprop, 'phase2' )
126 - || $configDB->get_prop( $dbKey, 'phase2' )
127 - || 'aes-sha1';
128 - $OUT .= " phase2alg=$phase2\n";
129 + my $connectiontype = $configDB->get_prop( $dbKey, 'connectiontype' )
130 + || 'tunnel';
131 + $OUT .= " type=$connectiontype\n";
132
133 - # mtu can only be set per connection
134 - my $mtu = $ipsecDB->get_prop( $ipsecprop, 'mtu' )
135 - || '';
136 - unless ( $mtu eq '' ) {
137 - $OUT .= " mtu=$mtu\n";
138 - }
139 -
140 - # These should be from $configDB-> ipsec unless they exist in ipsec_connections
141 -
142 - my $keyingtries =
143 - $ipsecDB->get_prop( $ipsecprop, 'keyingtries' )
144 - || $configDB->get_prop( $dbKey, 'keyingtries' )
145 - || '0';
146 - $OUT .= " keyingtries=$keyingtries\n";
147 -
148 - # Following come from ipsecDB or configDB or hardcoded
149 - my $ikelifetime =
150 - $ipsecDB->get_prop( $ipsecprop, 'ikelifetime' )
151 - || $configDB->get_prop( $dbKey, 'ikelifetime' )
152 - || '3600s';
153 - $OUT .= " ikelifetime=$ikelifetime\n";
154 -
155 - my $salifetime =
156 - $ipsecDB->get_prop( $ipsecprop, 'salifetime' )
157 - || $configDB->get_prop( $dbKey, 'salifetime' )
158 - || '28800s';
159 - $OUT .= " salifetime=$salifetime\n";
160 -
161 - # Add is for incoming and is better that server dpd is ignored
162 - # Disabled for now
163 -
164 - # if ( $auto ne 'add' ) {
165 - my $dpdaction =
166 - $ipsecDB->get_prop( $ipsecprop, 'dpdaction' )
167 - || $configDB->get_prop( $dbKey, 'dpdaction' )
168 - || 'restart';
169 - $OUT .= " dpdaction=$dpdaction\n";
170 -
171 - my $dpddelay =
172 - $ipsecDB->get_prop( $ipsecprop, 'dpddelay' )
173 - || $configDB->get_prop( $dbKey, 'dpddelay' )
174 - || '30';
175 - $OUT .= " dpddelay=$dpddelay\n";
176 -
177 - my $dpdtimeout =
178 - $ipsecDB->get_prop( $ipsecprop, 'dpdtimeout' )
179 - || $configDB->get_prop( $dbKey, 'dpdtimeout' )
180 - || '10';
181 - $OUT .= " dpdtimeout=$dpdtimeout\n";
182 -
183 - # }
184 -
185 - # default to yes unless overridden in the connection db
186 - my $pfs = $ipsecDB->get_prop( $ipsecprop, 'pfs' ) || 'yes';
187 - $OUT .= " pfs=$pfs\n";
188 -
189 - # Following come from ipsecDB or configDB or hardcoded
190 - my $left =
191 - $ipsecDB->get_prop( $ipsecprop, 'left' )
192 - || $configDB->get_prop( $dbKey, 'left' )
193 - || '%defaultroute';
194 - $OUT .= " left=$left\n";
195 -
196 - # These ONLY come from the ipsec_configurations db
197 - if ( ( my $leftid = $ipsecDB->get_prop( "$ipsecprop", 'leftid' ) || '' ) ne '' ) {
198 - $OUT .= " leftid=\@$leftid\n";
199 - }
200 - my $leftsourceip = $ipsecDB->get_prop( $ipsecprop, 'leftsourceip' )
201 + my $security = $ipsecDB->get_prop( $ipsecprop, 'security' )
202 + || 'secret';
203 +
204 + # my $certname = $ipsecDB->get_prop( "$ipsecprop", 'certname' ) || ''; ???? Is this required ?
205 +
206 + if ( $security eq 'rsasig' ) {
207 + $OUT .= " authby=rsasig\n";
208 +
209 + my $leftrsasig = $ipsecDB->get_prop( $ipsecprop, 'leftrsasig' )
210 || '';
211 - $OUT .= " leftsourceip=$leftsourceip\n";
212 + $OUT .= " leftrsasigkey=$leftrsasig\n";
213
214 - my $leftsub = $ipsecDB->get_prop( $ipsecprop, 'leftsubnet' )
215 + my $rightrsasig = $ipsecDB->get_prop( $ipsecprop, 'rightrsasig' )
216 || '';
217 - $OUT .= " leftsubnet=$leftsub\n";
218 + $OUT .= " rightrsasigkey=$rightrsasig\n";
219 +
220 + }
221
222 - # If we are a static host to a dynamic client we HAVE to set right %any
223 + elsif ( $security eq 'certs' ) {
224
225 - my $right = $ipsecDB->get_prop( $ipsecprop, 'right' ) || '';
226 + $OUT .= " authby=rsasig\n";
227
228 - if ( $iptype eq 'stattodyn' ) {
229 - $OUT .= " right=%any\n";
230 - }
231 - else {
232 - $OUT .= " right=$right\n";
233 - }
234 + my $leftrsasig = $ipsecDB->get_prop( $ipsecprop, 'leftrsasig' )
235 + || '%cert';
236 + $OUT .= " leftrsasigkey=$leftrsasig\n";
237
238 - if ( ( my $rightid = $ipsecDB->get_prop( "$ipsecprop", 'rightid' ) || '' ) ne '' ) {
239 - $OUT .= " rightid=\@$rightid\n";
240 - }
241 + my $rightrsasig = $ipsecDB->get_prop( $ipsecprop, 'rightrsasig' )
242 + || '%cert';
243 + $OUT .= " rightrsasigkey=$rightrsasig\n";
244
245 - my $rightsubnet = $ipsecDB->get_prop( $ipsecprop, 'rightsubnet' ) || '';
246 - $OUT .= " rightsubnet=$rightsubnet\n";
247 + my $leftcert = $ipsecDB->get_prop( $ipsecprop, 'leftcert' )
248 + || '"LeftCertName"';
249 + $OUT .= " leftcert=\"$leftcert\"\n";
250 +
251 + my $rightcert = $ipsecDB->get_prop( $ipsecprop, 'rightcert' )
252 + || '"RightCertName"';
253 + $OUT .= " rightcert=\"$rightcert\"\n";
254
255 }
256 - }
257
258 - }
259 + else {
260 + $OUT .= " authby=$security\n";
261 + }
262
263 - # End For
264 - }
265 + # Use connection value if it exists, if not use generic db value
266 + my $auto =
267 + $ipsecDB->get_prop( $ipsecprop, 'auto' )
268 + || $configDB->get_prop( $dbKey, 'auto' )
269 + || 'start';
270 +
271 + # If we are a static host to a dynamic client we are always add
272 + my $iptype = $ipsecDB->get_prop( $ipsecprop, 'iptype' ) || '';
273 +
274 + if ( $iptype eq 'stattodyn' ) {
275 + $OUT .= " auto=add\n";
276 + }
277 + else {
278 + $OUT .= " auto=$auto\n";
279 + }
280
281 - # End Else
282 + # We should change ipsecversion to ikev2status
283 + my $ipsecversion =
284 + $ipsecDB->get_prop( $ipsecprop, 'ipsecversion' )
285 + || $configDB->get_prop( $dbKey, 'ipsecversion' )
286 + || 'permit';
287 +
288 + $OUT .= " ikev2=$ipsecversion\n";
289 +
290 + # Set the Phase one and Phase two default strengths - these are set to aes
291 + my $ike =
292 + $ipsecDB->get_prop( $ipsecprop, 'ike' )
293 + || $configDB->get_prop( $dbKey, 'ike' )
294 + || 'aes-sha1';
295 + $OUT .= " ike=$ike\n";
296 +
297 + my $phase2 =
298 + $ipsecDB->get_prop( $ipsecprop, 'phase2' )
299 + || $configDB->get_prop( $dbKey, 'phase2' )
300 + || 'aes-sha1';
301 + $OUT .= " phase2alg=$phase2\n";
302 +
303 + # mtu can only be set per connection
304 + my $mtu = $ipsecDB->get_prop( $ipsecprop, 'mtu' )
305 + || '';
306 +
307 + unless ( $mtu eq '' ) {
308 + $OUT .= " mtu=$mtu\n";
309 + }
310
311 + # These should be from $configDB-> ipsec unless they exist in ipsec_connections
312 +
313 + my $keyingtries =
314 + $ipsecDB->get_prop( $ipsecprop, 'keyingtries' )
315 + || $configDB->get_prop( $dbKey, 'keyingtries' )
316 + || '0';
317 + $OUT .= " keyingtries=$keyingtries\n";
318 +
319 + # Following come from ipsecDB or configDB or hardcoded
320 + my $ikelifetime =
321 + $ipsecDB->get_prop( $ipsecprop, 'ikelifetime' )
322 + || $configDB->get_prop( $dbKey, 'ikelifetime' )
323 + || '3600s';
324 + $OUT .= " ikelifetime=$ikelifetime\n";
325 +
326 + my $salifetime =
327 + $ipsecDB->get_prop( $ipsecprop, 'salifetime' )
328 + || $configDB->get_prop( $dbKey, 'salifetime' )
329 + || '28800s';
330 + $OUT .= " salifetime=$salifetime\n";
331 +
332 + # Add is for incoming and is better that server dpd is ignored
333 + # Disabled for now
334 +
335 + # if ( $auto ne 'add' ) {}
336 + my $dpdaction =
337 + $ipsecDB->get_prop( $ipsecprop, 'dpdaction' )
338 + || $configDB->get_prop( $dbKey, 'dpdaction' )
339 + || 'restart';
340 + $OUT .= " dpdaction=$dpdaction\n";
341 +
342 + my $dpddelay =
343 + $ipsecDB->get_prop( $ipsecprop, 'dpddelay' )
344 + || $configDB->get_prop( $dbKey, 'dpddelay' )
345 + || '30';
346 + $OUT .= " dpddelay=$dpddelay\n";
347 +
348 + my $dpdtimeout =
349 + $ipsecDB->get_prop( $ipsecprop, 'dpdtimeout' )
350 + || $configDB->get_prop( $dbKey, 'dpdtimeout' )
351 + || '10';
352 + $OUT .= " dpdtimeout=$dpdtimeout\n";
353 +
354 + # default to yes unless overridden in the connection db
355 + my $pfs = $ipsecDB->get_prop( $ipsecprop, 'pfs' ) || 'yes';
356 + $OUT .= " pfs=$pfs\n";
357 +
358 + # Following come from ipsecDB or configDB or hardcoded
359 + my $left =
360 + $ipsecDB->get_prop( $ipsecprop, 'left' )
361 + || $configDB->get_prop( $dbKey, 'left' )
362 + || '%defaultroute';
363 + $OUT .= " left=$left\n";
364 +
365 + if ( $security eq 'certs' ) {
366 + my $leftid = ( $ipsecDB->get_prop( $ipsecprop, 'leftid' ) || '%fromcert' );
367 + $OUT .= " leftid=$leftid\n";
368 + }
369 +
370 + # These ONLY come from the ipsec_configurations db
371 + elsif ( ( my $leftid = $ipsecDB->get_prop( $ipsecprop, 'leftid' ) || '' ) ne '' ) {
372 + $OUT .= " leftid=\@$leftid\n";
373 + }
374 +
375 + my $leftsourceip = $ipsecDB->get_prop( $ipsecprop, 'leftsourceip' )
376 + || '';
377 + $OUT .= " leftsourceip=$leftsourceip\n";
378 +
379 + my $leftsub = $ipsecDB->get_prop( $ipsecprop, 'leftsubnet' )
380 + || '';
381 + $OUT .= " leftsubnet=$leftsub\n";
382 +
383 + # If we are a static host to a dynamic client we HAVE to set right %any
384 +
385 + my $right = $ipsecDB->get_prop( $ipsecprop, 'right' ) || '';
386 +
387 + if ( $iptype eq 'stattodyn' ) {
388 + $OUT .= " right=%any\n";
389 + }
390 + else {
391 + $OUT .= " right=$right\n";
392 + }
393 +
394 + if ( $security eq 'certs' ) {
395 + my $rightid = ( $ipsecDB->get_prop( $ipsecprop, 'rightid' ) || '%fromcert' );
396 + $OUT .= " rightid=$rightid\n";
397 + }
398 +
399 + elsif ( ( my $rightid = $ipsecDB->get_prop( $ipsecprop, 'rightid' ) || '' ) ne '' ) {
400 + $OUT .= " rightid=\@$rightid\n";
401 + }
402 +
403 + my $rightsubnet = $ipsecDB->get_prop( $ipsecprop, 'rightsubnet' ) || '';
404 + $OUT .= " rightsubnet=$rightsubnet\n";
405 +
406 + } # End If
407 + else {
408 + $OUT .= "# conn $ipsecprop disabled\n";
409 + }
410 + } # End foreach
411 + } # End else
412 }
413 +
414 diff -ruN smeserver-libreswan-0.5.old/root/etc/e-smith/templates/etc/ipsec.d/ipsec.secrets/10Passwords smeserver-libreswan-0.5/root/etc/e-smith/templates/etc/ipsec.d/ipsec.secrets/10Passwords
415 --- smeserver-libreswan-0.5.old/root/etc/e-smith/templates/etc/ipsec.d/ipsec.secrets/10Passwords 2017-01-25 16:19:45.652000000 +0100
416 +++ smeserver-libreswan-0.5/root/etc/e-smith/templates/etc/ipsec.d/ipsec.secrets/10Passwords 2017-01-25 16:20:03.867000123 +0100
417 @@ -1,4 +1,3 @@
418 -#!/usr/bin/perl -w
419
420 {
421 use strict;
422 @@ -22,31 +21,32 @@
423 my $ipsecDB = esmith::ConfigDB->open_ro('ipsec_connections')
424 or die("cant connect to ipsec database");
425
426 - my $ExternalIP = $configDB->get_prop( "ExternalInterface", "IPAddress" );
427 -
428 # This should get all the connections in an array
429
430 my @connections = $ipsecDB->keys;
431
432 - $OUT .= "# ipsec.secrets\n";
433 -
434 + $OUT .= "# ipsec.secrets\n\n";
435 +
436 + my $ExternalIP = $configDB->get_prop( "ExternalInterface", "IPAddress" );
437 +
438 foreach my $ipsecprop (@connections) {
439
440 # first we verify if IPSec is enabled for the connection
441
442 - my $ipsecstatus = $ipsecDB->get_prop( "$ipsecprop", 'status' )
443 + my $ipsecstatus = $ipsecDB->get_prop( $ipsecprop, 'status' )
444 || "disabled";
445
446 if ( $ipsecstatus eq "enabled" ) {
447 - my $right = $ipsecDB->get_prop( "$ipsecprop", 'right' ) || '';
448 +
449 + my $right = $ipsecDB->get_prop( $ipsecprop, 'right' ) || '';
450
451 # Hmm..... if left is not set it defaults to %defaultroute which we don't want here
452
453 - my $left = $ipsecDB->get_prop( "$ipsecprop", 'left' ) || $ExternalIP;
454 - my $security = $ipsecDB->get_prop( "$ipsecprop", 'security' ) || 'secret';
455 - my $iptype = $ipsecDB->get_prop( "$ipsecprop", 'iptype' ) || '';
456 - my $certname = $ipsecDB->get_prop( "$ipsecprop", 'certname' ) || '';
457 - my $passwd = $ipsecDB->get_prop( "$ipsecprop", 'passwd' ) || '';
458 + my $left = $ipsecDB->get_prop( $ipsecprop, 'left' ) || $ExternalIP;
459 + my $security = $ipsecDB->get_prop( $ipsecprop, 'security' ) || 'secret';
460 + my $iptype = $ipsecDB->get_prop( $ipsecprop, 'iptype' ) || '';
461 + my $certname = $ipsecDB->get_prop( $ipsecprop, 'certname' ) || '';
462 + my $passwd = $ipsecDB->get_prop( $ipsecprop, 'passwd' ) || '';
463
464 # Double quote is not allowed in configuration
465 if ( $passwd =~ /"/ ) {
466 @@ -55,15 +55,19 @@
467
468 $OUT .= "# $ipsecprop is enabled\n";
469
470 - if ( $security eq "secret" ) {
471 + if ( $security eq 'certs' ) {
472 + $OUT .= "# Certificates enabled for $ipsecprop - no settings required\n";
473 + }
474 +
475 + elsif ( $security eq 'secret' ) {
476
477 # If dynamic it must be %any here
478 # If not it can be ExternalIP if left not set
479
480 # IF we have IDs then use them in preference to %any
481
482 - my $leftid = $ipsecDB->get_prop( "$ipsecprop", 'leftid' ) || '';
483 - my $rightid = $ipsecDB->get_prop( "$ipsecprop", 'rightid' ) || '';
484 + my $leftid = $ipsecDB->get_prop( $ipsecprop, 'leftid' ) || '';
485 + my $rightid = $ipsecDB->get_prop( $ipsecprop, 'rightid' ) || '';
486
487 if ( $iptype eq 'stattodyn' ) {
488 if ( ( $leftid eq '' ) && ( $rightid eq '' ) ) {
489 @@ -101,7 +105,7 @@
490 $OUT .= "# $ipsecprop is disabled\n";
491 $OUT .= "\n";
492 }
493 - $OUT .= "\n\n";
494 + $OUT .= "\n";
495 }
496 }
497 }

admin@koozali.org
ViewVC Help
Powered by ViewVC 1.2.1 RSS 2.0 feed