1 |
diff -ruN smeserver-openswan-0.6.old/createlinks smeserver-openswan-0.6/createlinks |
2 |
--- smeserver-openswan-0.6.old/createlinks 2015-12-05 13:03:18.000000000 +0100 |
3 |
+++ smeserver-openswan-0.6/createlinks 2016-03-22 18:24:42.670000613 +0100 |
4 |
@@ -12,6 +12,7 @@ |
5 |
/etc/ipsec.secrets |
6 |
/etc/ipsec.d/ipsec.conf |
7 |
/etc/ipsec.d/ipsec.secrets |
8 |
+ /etc/rc.d/init.d/masq |
9 |
)) |
10 |
{ |
11 |
templates2events("$_", qw( |
12 |
diff -ruN smeserver-openswan-0.6.old/root/etc/e-smith/events/actions/ipsec-update smeserver-openswan-0.6/root/etc/e-smith/events/actions/ipsec-update |
13 |
--- smeserver-openswan-0.6.old/root/etc/e-smith/events/actions/ipsec-update 2015-12-05 13:03:18.000000000 +0100 |
14 |
+++ smeserver-openswan-0.6/root/etc/e-smith/events/actions/ipsec-update 2016-03-22 18:24:42.669000612 +0100 |
15 |
@@ -43,8 +43,8 @@ |
16 |
if ( $configDB->get_prop( $dbKey, 'status' ) eq 'disabled' ) { |
17 |
|
18 |
# Do we check if it is already stopped ? |
19 |
- # For now we stop it regradless |
20 |
- |
21 |
+ # For now we stop it regardless |
22 |
+ |
23 |
print "Ipsec Information - ipsec disabled - Stopping ipsec \n"; |
24 |
|
25 |
# First set ipsec access to private which disables firewall rule |
26 |
@@ -264,16 +264,11 @@ |
27 |
or die("Ipsec Error - A problem occurred with sysctl: $?"); |
28 |
system("/sbin/sysctl -w net.ipv4.conf.default.send_redirects=0") == 0 |
29 |
or die("Ipsec Error - A problem occurred with sysctl: $?"); |
30 |
- |
31 |
- # I don't believe these are required |
32 |
- # system("/sbin/sysctl -w net.ipv4.conf.default.accept_redirects=0") == 0 |
33 |
- # or die("Ipsec Error - A problem occurred with sysctl: $?"); |
34 |
- # system("/sbin/sysctl -w net.ipv4.conf.all.accept_redirects=0") == 0 |
35 |
- # or die("Ipsec Error - A problem occurred with sysctl: $?"); |
36 |
- # system("/sbin/sysctl -w net.ipv4.conf.eth0.accept_redirects=0") == 0 |
37 |
- # or die("Ipsec Error - A problem occurred with sysctl: $?"); |
38 |
- # system("/sbin/sysctl -w net.ipv4.conf.eth1.accept_redirects=0") == 0 |
39 |
- # or die("Ipsec Error - A problem occurred with sysctl: $?"); |
40 |
+ |
41 |
+ system("/sbin/sysctl -w net.ipv4.conf.all.accept_redirects=0") == 0 |
42 |
+ or die("Ipsec Error - A problem occurred with sysctl: $?"); |
43 |
+ system("/sbin/sysctl -w net.ipv4.conf.default.accept_redirects=0") == 0 |
44 |
+ or die("Ipsec Error - A problem occurred with sysctl: $?"); |
45 |
|
46 |
system("/sbin/sysctl -w net.ipv4.conf.default.rp_filter=0") == 0 |
47 |
or die("Ipsec Error - A problem occurred with sysctl: $?"); |
48 |
@@ -291,7 +286,9 @@ |
49 |
|
50 |
sub resetRedirects { |
51 |
|
52 |
-# system ("expand-template /etc/sysctl.conf") == 0 or die ("A problem occurred with sysctl.conf: $?"); |
53 |
-# This should reset back to defaults |
54 |
- system("/sbin/sysctl -p") == 0 or die("A problem occurred with sysctl: $?"); |
55 |
+ # system ("expand-template /etc/sysctl.conf") == 0 or die ("A problem occurred with sysctl.conf: $?"); |
56 |
+ # This should reset back to defaults |
57 |
+ system("/sbin/sysctl -p") == 0 |
58 |
+ or die("Ipsec Error - A problem occurred with sysctl: $?"); |
59 |
} |
60 |
+ |
61 |
diff -ruN smeserver-openswan-0.6.old/root/etc/e-smith/templates/etc/ipsec.conf/10Setup smeserver-openswan-0.6/root/etc/e-smith/templates/etc/ipsec.conf/10Setup |
62 |
--- smeserver-openswan-0.6.old/root/etc/e-smith/templates/etc/ipsec.conf/10Setup 2015-12-05 13:03:18.000000000 +0100 |
63 |
+++ smeserver-openswan-0.6/root/etc/e-smith/templates/etc/ipsec.conf/10Setup 2016-03-22 18:24:42.670000613 +0100 |
64 |
@@ -30,7 +30,7 @@ |
65 |
$OUT .= " protostack=netkey\n"; |
66 |
$OUT .= " #plutodebug=none\n"; |
67 |
$OUT .= " #klipsdebug=none\n"; |
68 |
- $OUT .= " plutostderrlog=/var/log/pluto.log\n"; |
69 |
+ $OUT .= " plutostderrlog=/var/log/pluto/pluto.log\n"; |
70 |
$OUT .= " dumpdir=/var/run/pluto/\n"; |
71 |
$OUT .= " nat_traversal=yes\n"; |
72 |
|
73 |
@@ -66,7 +66,7 @@ |
74 |
chop($virtual_private); |
75 |
$OUT .= "$virtual_private\n"; |
76 |
$OUT .= "\n"; |
77 |
- $OUT .= "include /etc/ipsec.d/*.conf\n"; |
78 |
+ $OUT .= "include /etc/ipsec.d/ipsec.conf\n"; |
79 |
|
80 |
# End else |
81 |
} |
82 |
diff -ruN smeserver-openswan-0.6.old/root/etc/e-smith/templates/etc/logrotate.d/pluto/00pluto smeserver-openswan-0.6/root/etc/e-smith/templates/etc/logrotate.d/pluto/00pluto |
83 |
--- smeserver-openswan-0.6.old/root/etc/e-smith/templates/etc/logrotate.d/pluto/00pluto 2015-12-05 13:03:18.000000000 +0100 |
84 |
+++ smeserver-openswan-0.6/root/etc/e-smith/templates/etc/logrotate.d/pluto/00pluto 2016-03-22 18:24:42.670000613 +0100 |
85 |
@@ -1,4 +1,4 @@ |
86 |
-/var/log/pluto.log \{ |
87 |
+/var/log/pluto/pluto.log \{ |
88 |
missingok |
89 |
notifempty |
90 |
compress |
91 |
diff -ruN smeserver-openswan-0.6.old/root/etc/e-smith/templates/etc/rc.d/init.d/masq/40AllowIPsec smeserver-openswan-0.6/root/etc/e-smith/templates/etc/rc.d/init.d/masq/40AllowIPsec |
92 |
--- smeserver-openswan-0.6.old/root/etc/e-smith/templates/etc/rc.d/init.d/masq/40AllowIPsec 2015-12-05 13:03:18.000000000 +0100 |
93 |
+++ smeserver-openswan-0.6/root/etc/e-smith/templates/etc/rc.d/init.d/masq/40AllowIPsec 2016-03-22 18:24:42.670000613 +0100 |
94 |
@@ -1,9 +1,16 @@ |
95 |
+# Required PostRouting for VPN |
96 |
+ |
97 |
{ |
98 |
- my $ipsec_access = $ipsec{access}; |
99 |
+ my $ipsec_status = $ipsec{status} || ''; |
100 |
+ |
101 |
+# print "Ipsec Information - 40AllowIpsec - $ipsec_status\n"; |
102 |
|
103 |
- if ( $ipsec_access eq 'public' ) { |
104 |
+ if ( $ipsec_status eq 'enabled' ) { |
105 |
$OUT .= " # Do not NAT VPN traffic\n"; |
106 |
- $OUT .= |
107 |
-" /sbin/iptables -t nat -I POSTROUTING -m policy --dir out --pol ipsec -j ACCEPT\n"; |
108 |
+ $OUT .= " /sbin/iptables -t nat -I POSTROUTING -m policy --dir out --pol ipsec -j ACCEPT\n"; |
109 |
+ } |
110 |
+ |
111 |
+ else { |
112 |
+ $OUT .= " # 40AllowIPsec VPN POSTROUTING disabled\n"; |
113 |
} |
114 |
} |
115 |
diff -ruN smeserver-openswan-0.6.old/root/etc/e-smith/templates/etc/rc.d/init.d/masq/56AllowESP smeserver-openswan-0.6/root/etc/e-smith/templates/etc/rc.d/init.d/masq/56AllowESP |
116 |
--- smeserver-openswan-0.6.old/root/etc/e-smith/templates/etc/rc.d/init.d/masq/56AllowESP 2015-12-05 13:03:18.000000000 +0100 |
117 |
+++ smeserver-openswan-0.6/root/etc/e-smith/templates/etc/rc.d/init.d/masq/56AllowESP 2016-03-22 18:24:42.670000613 +0100 |
118 |
@@ -1,14 +1,18 @@ |
119 |
# based on /etc/e-smith/templates/etc/rc.d/init.d/masq/55AllowGRE |
120 |
|
121 |
{ |
122 |
-my $ipsec_access = $ipsec{access}; |
123 |
+ my $ipsec_status = $ipsec{status} || ''; |
124 |
|
125 |
-if ($ipsec_access eq 'public') { |
126 |
+# print "Ipsec Information - 56AllowESP - $ipsec_status\n"; |
127 |
|
128 |
- $OUT .= " /sbin/iptables --new-chain esp-in\n"; |
129 |
- $OUT .= " /sbin/iptables --append INPUT -p ESP -j esp-in\n"; |
130 |
- $OUT .= " /sbin/iptables --append INPUT -p ESP -j denylog\n"; |
131 |
- $OUT .= " /sbin/iptables --append esp-in \! -d \$OUTERNET -j denylog\n"; |
132 |
- $OUT .= " /sbin/iptables --append esp-in -j denylog\n"; |
133 |
- } |
134 |
+ if ( $ipsec_status eq 'enabled' ) { |
135 |
+ $OUT .= " /sbin/iptables --new-chain esp-in\n"; |
136 |
+ $OUT .= " /sbin/iptables --append INPUT -p ESP -j esp-in\n"; |
137 |
+ $OUT .= " /sbin/iptables --append INPUT -p ESP -j denylog\n"; |
138 |
+ $OUT .= " /sbin/iptables --append esp-in \! -d \$OUTERNET -j denylog\n"; |
139 |
+ $OUT .= " /sbin/iptables --append esp-in -j denylog\n"; |
140 |
+ } |
141 |
+ else { |
142 |
+ $OUT .= " # 56AllowESP disabled\n"; |
143 |
+ } |
144 |
} |
145 |
diff -ruN smeserver-openswan-0.6.old/root/etc/e-smith/templates/etc/rc.d/init.d/masq/90adjustESP smeserver-openswan-0.6/root/etc/e-smith/templates/etc/rc.d/init.d/masq/90adjustESP |
146 |
--- smeserver-openswan-0.6.old/root/etc/e-smith/templates/etc/rc.d/init.d/masq/90adjustESP 2015-12-05 13:03:18.000000000 +0100 |
147 |
+++ smeserver-openswan-0.6/root/etc/e-smith/templates/etc/rc.d/init.d/masq/90adjustESP 2016-03-22 18:24:42.670000613 +0100 |
148 |
@@ -1,12 +1,16 @@ |
149 |
# based on /etc/e-smith/templates/etc/rc.d/init.d/masq/90adjustGRE |
150 |
+ |
151 |
{ |
152 |
- my $ipsec_access = $ipsec{access}; |
153 |
- my $ipsec_status = $ipsec{status}; |
154 |
- if ( $ipsec_access eq 'public' ) { |
155 |
- |
156 |
- my $target = ( $ipsec_status eq 'enabled' ) ? "ACCEPT" : "denylog"; |
157 |
+ my $ipsec_status = $ipsec{status} || ''; |
158 |
+ |
159 |
+# print "Ipsec Information - 90AdjustESP - $ipsec_status\n"; |
160 |
|
161 |
+ if ( $ipsec_status eq 'enabled' ) { |
162 |
+ my $target = ( $ipsec_status eq 'enabled' ) ? "ACCEPT" : "denylog"; |
163 |
$OUT .= " /sbin/iptables --replace esp-in 1 ! -d \$OUTERNET -j denylog\n"; |
164 |
$OUT .= " /sbin/iptables --replace esp-in 2 -j $target\n"; |
165 |
} |
166 |
+ else { |
167 |
+ $OUT .= " # 90adjustESP disabled\n"; |
168 |
+ } |
169 |
} |