ovs-monitor-ipsec: Add ability to traverse NATs
authorJustin Pettit <jpettit@nicira.com>
Mon, 18 Oct 2010 05:43:14 +0000 (22:43 -0700)
committerJustin Pettit <jpettit@nicira.com>
Mon, 18 Oct 2010 05:43:14 +0000 (22:43 -0700)
Stable versions of ipsec-tools have a bug that prevents our using
transport mode through a NAT box.  Even though the bug has been fixed
for years, it is only available in the 0.8 alpha release of ipsec-tools.
This commit modifies our configuration to allow NAT traversal with that
version of ipsec-tools.

NB: An official package for this version of ipsec-tools is not yet
available on Debian, so we're requiring a custom version number.

debian/control
debian/ovs-monitor-ipsec

index 0efcf925bb9c54d9475e4f79cda63a95cc048b70..5f50cc8c19263f03951ed043c5293f4535daae6e 100644 (file)
@@ -45,7 +45,9 @@ Description: Open vSwitch switch implementations
 Package: openvswitch-ipsec
 Architecture: any
 Depends:
- ${shlibs:Depends}, ${misc:Depends}, ${python:Depends}, ipsec-tools, racoon,
+ ${shlibs:Depends}, ${misc:Depends}, ${python:Depends}, 
+ ipsec-tools (>=0.8~alpha20090903), 
+ racoon (>=0.8~alpha20090903),
  openvswitch-common (= ${binary:Version}),
  openvswitch-switch (= ${binary:Version}),
  python-openvswitch (= ${binary:Version})
index 184b00469a1d1df9eda1c8ee07385258666b9463..1cea8009b2ec45cde2a4ad96c4dc03c116b570c3 100755 (executable)
@@ -66,6 +66,7 @@ path certificate "/etc/racoon/certs";
 
 remote anonymous {
         exchange_mode main;
+        nat_traversal on;
         proposal {
                 encryption_algorithm aes;
                 hash_algorithm sha1;
@@ -307,13 +308,16 @@ def main(argv):
         new_interfaces = {}
         for rec in idl.data["Interface"].itervalues():
             name = rec.name.as_scalar()
-            local_ip = rec.other_config.get("ipsec_local_ip")
-            if rec.type.as_scalar() == "gre" and local_ip:
+            ipsec_cert = rec.other_config.get("ipsec_cert")
+            ipsec_psk = rec.other_config.get("ipsec_psk")
+            is_ipsec = ipsec_cert or ipsec_psk
+
+            if rec.type.as_scalar() == "gre" and is_ipsec:
                 new_interfaces[name] = {
                         "remote_ip": rec.options.get("remote_ip"),
-                        "local_ip": local_ip,
-                        "ipsec_cert": rec.other_config.get("ipsec_cert"),
-                        "ipsec_psk": rec.other_config.get("ipsec_psk") }
+                        "local_ip": rec.options.get("local_ip", "0.0.0.0/0"),
+                        "ipsec_cert": ipsec_cert,
+                        "ipsec_psk": ipsec_psk }
  
         if interfaces != new_interfaces:
             for name, vals in interfaces.items():