Author Topic: Freeswan ipsec.o OZ 3.5.1  (Read 3089 times)

alanone

  • Newbie
  • *
  • Posts: 2
    • View Profile
Freeswan ipsec.o OZ 3.5.1
« on: October 22, 2004, 06:38:07 pm »
I have looked at:
http://teletubbie.hentges.net/vpn/
http://www.freeswan.ca/code/zeeswan/OpenZaurus/
http://www.liebchen-online.de/vpn-zaurus-ipsec_en.html
http://cmisip.home.insightbb.com/zaurus.htm
 
None will work with the OZ 3.5.1.
I can't seem to get it to work with this kernel.
Do I need to perl?
How will I recompile the kernel to get a good ipsec.o?
Would anyone share their success stories or guides?
I installed by: ipkg -d sd install <package>
Verified by: /etc/init.d/ipsec start
And I get a whole bunch of errors.
I'd also tried pptp but no success..

Thanks for everyone's time
 
« Last Edit: October 22, 2004, 06:39:54 pm by alanone »

oxstone

  • Newbie
  • *
  • Posts: 26
    • View Profile
Freeswan ipsec.o OZ 3.5.1
« Reply #1 on: October 22, 2004, 07:42:40 pm »
That's very interesting! I'll have a look at that in some weeks...

kcurrie

  • Newbie
  • *
  • Posts: 14
    • View Profile
Freeswan ipsec.o OZ 3.5.1
« Reply #2 on: October 23, 2004, 03:52:14 pm »
You can use the OpenVPN binaries I put up on my website here:
http://undertow.2y.net/zaurus/

I use it great success on my laptop and Zaurus to a central linux box to secure my wireless.

I put both a statically compiled binary as well as a much smaller dynamically linked binary online.
Both are compressed with upx, so you need to decompress it before you can check the libs so
I've done that here:

OZ #ldd /tmp/openvpn
        libssl.so.0.9.7 => /DEBIAN/usr/lib/libssl.so.0.9.7 (0x40023000)
        libcrypto.so.0.9.7 => /DEBIAN/usr/lib/libcrypto.so.0.9.7 (0x40057000)
        libc.so.6 => /lib/libc.so.6 (0x40149000)
        libdl.so.2 => /lib/libdl.so.2 (0x40250000)
        libgcc_s.so.1 => /DEBIAN/lib/libgcc_s.so.1 (0x4025a000)
        /lib/ld-linux.so.2 => /lib/ld-linux.so.2 (0x40000000)

Ignore the /DEBIAN paths-- I have Debian running on my Z as well so I often just sym/hardlink apps from Debian to OZ to share the same binaries and config files.

alanone

  • Newbie
  • *
  • Posts: 2
    • View Profile
Freeswan ipsec.o OZ 3.5.1
« Reply #3 on: October 23, 2004, 04:21:37 pm »
Thanks, I'll try that out.
I really need either pptp or ipsec working because the univerisity requires it on any wireless device to be on the netowrk.  I tried freeswan and pptp but both has to do with either perl, kernel, compilation of something, and missing libs. I've tried days and days to get it to work but was unsuccessful. VPNC will work, but it is only off campus.

oxstone

  • Newbie
  • *
  • Posts: 26
    • View Profile
Freeswan ipsec.o OZ 3.5.1
« Reply #4 on: October 23, 2004, 06:15:24 pm »
Quote
You can use the OpenVPN binaries I put up on my website here:
http://undertow.2y.net/zaurus/

I use it great success on my laptop and Zaurus to a central linux box to secure my wireless.

I put both a statically compiled binary as well as a much smaller dynamically linked binary online.
Both are compressed with upx, so you need to decompress it before you can check the libs so
I've done that here:

OZ #ldd /tmp/openvpn
        libssl.so.0.9.7 => /DEBIAN/usr/lib/libssl.so.0.9.7 (0x40023000)
        libcrypto.so.0.9.7 => /DEBIAN/usr/lib/libcrypto.so.0.9.7 (0x40057000)
        libc.so.6 => /lib/libc.so.6 (0x40149000)
        libdl.so.2 => /lib/libdl.so.2 (0x40250000)
        libgcc_s.so.1 => /DEBIAN/lib/libgcc_s.so.1 (0x4025a000)
        /lib/ld-linux.so.2 => /lib/ld-linux.so.2 (0x40000000)

Ignore the /DEBIAN paths-- I have Debian running on my Z as well so I often just sym/hardlink apps from Debian to OZ to share the same binaries and config files.
FreeSwan/IPSec is the way to go. It's used in a lot of professional environnements.

Teletubbie

  • Sr. Member
  • ****
  • Posts: 252
    • View Profile
    • http://
Freeswan ipsec.o OZ 3.5.1
« Reply #5 on: October 23, 2004, 07:43:15 pm »
Hi,
my packages are compiled with the (old) OZ 3.3.6-pre1 toolchain. I dont use 3.5.1 since I got everything I needed running on 3.3.6-pre1. So I cant tell you how to get running on that rom. But for the tun module you need to set the permissions to root. For the 3.3.6-pre1 rom the vpn stuff works. There is also a howto for vpn on the web for my packages, but I think it is written in german.
Cheers,
Sam
SL-5500G
OZ 3.3.6-pre1
Opie 1.1.4

kcurrie

  • Newbie
  • *
  • Posts: 14
    • View Profile
Freeswan ipsec.o OZ 3.5.1
« Reply #6 on: October 23, 2004, 10:00:12 pm »
Quote
FreeSwan/IPSec is the way to go. It's used in a lot of professional environments.
Sure is-- I work at one of the largest makers of VPNS (among other gear), and I've even taken courses on configuring VPN concentrators and clients.   I use a hardware VPN for my IP phone and it works great, but setting something like that up is much more complex then a simple OpenVPN setup, which can be little more than a tun module (usually included with any kernel), a user space daemon, and a few lines of shell script.

I slimmed down what I have a bit, but basically throw a script in /etc/inittab on the Z with something as simple as this in it:

$REMOTEIP=192.168.0.11
iwconfig wlan0 essid SOMESSID channel 1 rate auto mode managed
ifconfig wlan0 192.168.0.8  netmask 255.255.255.255  up
route add -host  $REMOTEIP  dev wlan0
/etc/openvpn/openvpn  --verb 0 --remote  $REMOTEIP --dev tun0 --ifconfig  10.0.9.8  10.0.9.6  --secret z.key  --port 5001 --float --up "route add default gw 10.0.9.6 dev tun0; route delete default gw 192.168.0.1; #"


..and on the server put something like:
openvpn  --verb 0 --dev tun0  --ifconfig 10.0.9.6 10.0.9.8 --secret z.key  --port 5001 --float

..depending on how else your system is setup, after generating the key (and ensuring your server is doing ipforward/masq), really all you may need are the single lines on client and server that call OpenVPN.  Very simple really!    The first chunk of code will ensure my Z is on the net, has the right IP address (it's 182.168.0.8), and then once it's on the VPN it's 10.0.0.9.8.  The server is really 192.168.0.6 and it's VPN address to the Z is 10.0.9.6.  

It's pretty lightweight too-- the OpenVPN daemon is currently using ~1200k,  even the tun module is only ~4k once loaded.   That's actually a little LESS memory then would be taken up by just doing a simple ssh portforward like "ssh -L 143:localhost:143 imapserver -N".   Not bad for a complete tunnel!  

..that reminds me, for another very simple, *nearly* complete VPN solution, you can use ssh with it's SOCKS proxy abilities.  "ssh -D 1080 myserver -N" would bring up a SOCKS5 proxy,  and if you had socks capable clients, *OR* used something like tsocks or proxychains (for which you can find a z binary on my web site) you can capture all TCP or UDP (with tsocks) traffic and pipe it all through the ssh tunnel.    Doing something like starting Opie like "proxychains /etc/init.d/opie start" or "tsocks /etc/init.d/opie start" *should* put your whole Opie session under the SOCKS/SSH proxy.  I haven't done it specifically with Opie, but have for shell based things like ipkg installs.
Just now (in a Debian chrooted environment on my Z under OZ 3.5.1)  I went "apt-get install -y tsocks ; alien -t /var/cache/apt/archives/tsocks_1.8beta5-2_arm.deb" and put the converted .tgz file which should run fine on OZ with the appropriate libaries (included already? maybe).  The results .tgz file in in the bin directory of my website.

..anyway, lots of ways to do lots of things with unix :-)

Anyway, My web page is here:   Zaurus in the Undertow