Sponsored Content
Full Discussion: pptp / pf issue
Top Forums UNIX for Advanced & Expert Users pptp / pf issue Post 49549 by xyyz on Sunday 4th of April 2004 09:36:47 AM
Old 04-04-2004
pptp / pf issue

Long story short, I have an issue with getting my VPN to connect to my w2k3 server box when I include the block all rule in my pf.conf:

block log all

Here's the output:

Apr 04 06:04:09.291697 rule 1/0(match): block in on hme0: call 3033 seq 0 gre-ppp-payload (gre encap)
Apr 04 06:04:11.288849 rule 1/0(match): block in on hme0: call 3033 seq 1 gre-ppp-payload (gre encap)
Apr 04 06:04:14.291628 rule 1/0(match): block in on hme0: call 3033 seq 2 gre-ppp-payload (gre encap)
Apr 04 06:04:17.831228 rule 1/0(match): block in on hme0: call 3033 seq 3 gre-ppp-payload (gre encap)
Apr 04 06:04:21.299914 rule 1/0(match): block in on hme0: call 3033 seq 4 gre-ppp-payload (gre encap)

@1 block drop log all
[ Evaluations: 8 Packets: 5 Bytes: 275 States: 0 ]

When I remove this rule, things seem to work w/o issue. I'm kinda' new to pf, so I included this rule after following the SOHO example in the FAQ.

Instead of posting the entire pf.conf, let me instead post the sections I think are relevant to getting PPTP working (if I made an error in this, and you need the entire file, please let me know... I just thought it would be more helpful to streamline the post):

-------------------
rdr on hme4 inet proto { udp, tcp } from any to hme4 port 1723 -> 192.168.200.2
rdr on hme4 inet proto gre from any to hme4 -> 192.168.200.2
# VPN (tcp 1723 and gre 47)
pass in quick on hme4 inet proto { udp, tcp } from any to hme1 port pptp flags S/FSRA keep state
pass in quick on hme4 inet proto gre from any to hme1 keep state

my first question would be how important “block log all” is... can I make do w/o it? It seems pretty important to me because it looks like the default deny all rule.

next, if it is important, what additional rules can I enter into the pf.conf file that will allow PPTP to work?
 

9 More Discussions You Might Find Interesting

1. UNIX for Dummies Questions & Answers

FreeBSD 4.9 PPTP server

Hey guys, what's up? I'm new to UNIX and I really don't know much. Kinda learning as I go along. I have successfully installed FreeBSD 4.9 and enabled FTP and Telnet services. I'm looking to setup a VPN server on my BSD box but I'm lost. Can anyone guide me in the right way? Much thanks! -... (2 Replies)
Discussion started by: sirex
2 Replies

2. UNIX for Dummies Questions & Answers

SSH logs off and Client pptp goes off as well

Hi , I am a newbie to unix,linux i have a fedora core 4 linux. I had set it up as a pptp vpn client to a windows pptp server. Everything was working fine. Recently i saw that there were many attempts to hack into the root login using ssh. so i changed the ssh port,the ssh portocol to 2. And... (0 Replies)
Discussion started by: qais
0 Replies

3. Ubuntu

configure: vpn pptp

Hi all I'd like to connect over pptp vpn. I have my username, passwd and remote address. Then i start the connection and i see that over my ppp0 interface there's the same address in inet and P-t-P. I think they should be different right? Reading something i find out that i should change... (0 Replies)
Discussion started by: Dedalus
0 Replies

4. UNIX for Advanced & Expert Users

PPTP authentication via Debian user accounts

I've set up pptp vpn on Debian. Works fine. User authentication is made base on file /etc/ppp/chap-secrets. I'm looking for option that user authentication in pptp would be made base on debian system users accounts or samba accounts at last. Ther's no clue on google or forums so I decided to... (1 Reply)
Discussion started by: uselab
1 Replies

5. Emergency UNIX and Linux Support

L2TP over PPTP

Hi there. Here is a crazy question: can we connect to a L2TP vpn server Through a PPTP VPN server(I mean when connecting to a pptp server)? (1 Reply)
Discussion started by: majid.merkava
1 Replies

6. Emergency UNIX and Linux Support

pptp server - GUI

Hi guys. I am going to build a Linux VPN server(PPTP) for my friend but here is the problem: He don't know Linux and command line to manage users, monitor server, etc anyone knows a good GUI for this problem? I need some solution like nttacplus (2 Replies)
Discussion started by: majid.merkava
2 Replies

7. Debian

Debian with PPTP Server

Dear All My scenario is Debian with PPTP Server in which I am able to connect to through other machines. Ive enable echo 1 > /proc/sys/net/ipv4/ip_forward and through client machine i can browse internet as well I created another pptp client in debian server which connects to another... (0 Replies)
Discussion started by: kazimnaim
0 Replies

8. IP Networking

PPTP VPN with static external IP

I try to setup a VPN Server (pptpd on Debian 5) to route an IP to my home PC when i login to the VPN - this works so far, i get the IP but then it is dead. i cannot connect to anywhere, and only ping my IP - nothing else. Any info on that? I just want to have a static, external IP on the... (1 Reply)
Discussion started by: William_E
1 Replies

9. UNIX for Dummies Questions & Answers

No encryption using mpd5 PPTP VPN

Hello, So I was finally able to get mpd5 working as a vpn server, however I am not able to use encryption. I have a feeling it's this entry in the logs, can someone decipher what this means for me & tell me if it can be fixed? I know ng_mppc is related to mchap, but I'm not sure what I'm supposed... (0 Replies)
Discussion started by: dpreviti
0 Replies
GRE(4)							   BSD Kernel Interfaces Manual 						    GRE(4)

NAME
gre -- encapsulating network device SYNOPSIS
To compile the gre device into the kernel, place the following line in the kernel configuration file: device gre Alternatively, to load the gre device as a module at boot time, place the following line in loader.conf(5): if_gre_load="YES" DESCRIPTION
The gre network interface pseudo device encapsulates datagrams into IP. These encapsulated datagrams are routed to a destination host, where they are decapsulated and further routed to their final destination. The ``tunnel'' appears to the inner datagrams as one hop. gre interfaces are dynamically created and destroyed with the ifconfig(8) create and destroy subcommands. This driver currently supports the following modes of operation: GRE encapsulation (IP protocol number 47) Encapsulated datagrams are prepended an outer datagram and a GRE header. The GRE header specifies the type of the encapsulated data- gram and thus allows for tunneling other protocols than IP like e.g. AppleTalk. GRE mode is also the default tunnel mode on Cisco routers. This is also the default mode of operation of the gre interfaces. As part of the GRE mode, gre also supports Cisco WCCP protocol, both version 1 and version 2. Since there is no reliable way to distinguish between WCCP versions, it should be configured manually using the link2 flag. If the link2 flag is not set (default), then WCCP version 1 is selected. MOBILE encapsulation (IP protocol number 55) Datagrams are encapsulated into IP, but with a shorter encapsulation. The original IP header is modified and the modifications are inserted between the so modified header and the original payload. Like gif(4), only for IP-in-IP encapsulation. The gre interfaces support a number of ioctl(2)s, such as: GRESADDRS Set the IP address of the local tunnel end. This is the source address set by or displayed by ifconfig(8) for the gre interface. GRESADDRD Set the IP address of the remote tunnel end. This is the destination address set by or displayed by ifconfig(8) for the gre interface. GREGADDRS Query the IP address that is set for the local tunnel end. This is the address the encapsulation header carries as local address (i.e., the real address of the tunnel start point). GREGADDRD Query the IP address that is set for the remote tunnel end. This is the address the encapsulated packets are sent to (i.e., the real address of the remote tunnel endpoint). GRESPROTO Set the operation mode to the specified IP protocol value. The protocol is passed to the interface in (struct ifreq)->ifr_flags. The operation mode can also be given as link0 IPPROTO_GRE -link0 IPPROTO_MOBILE to ifconfig(8). The link1 flag is not used to choose encapsulation, but to modify the internal route search for the remote tunnel endpoint, see the BUGS section below. GREGPROTO Query operation mode. GRESKEY Set the GRE key used for outgoing packets. A value of 0 disables the key option. GREGKEY Get the GRE key currently used for outgoing packets. 0 means no outgoing key. Note that the IP addresses of the tunnel endpoints may be the same as the ones defined with ifconfig(8) for the interface (as if IP is encap- sulated), but need not be, as e.g. when encapsulating AppleTalk. EXAMPLES
Configuration example: Host X-- Host A ----------------tunnel---------- Cisco D------Host E | / +------Host B----------Host C----------+ On host A (FreeBSD): route add default B ifconfig greN create ifconfig greN A D netmask 0xffffffff linkX up ifconfig greN tunnel A D route add E D On Host D (Cisco): Interface TunnelX ip unnumbered D ! e.g. address from Ethernet interface tunnel source D ! e.g. address from Ethernet interface tunnel destination A ip route C <some interface and mask> ip route A mask C ip route X mask tunnelX OR On Host D (FreeBSD): route add default C ifconfig greN create ifconfig greN D A ifconfig greN tunnel D A If all goes well, you should see packets flowing ;-) If you want to reach Host A over the tunnel (from Host D (Cisco)), then you have to have an alias on Host A for e.g. the Ethernet interface like: ifconfig <etherif> alias Y and on the Cisco: ip route Y mask tunnelX A similar setup can be used to create a link between two private networks (for example in the 192.168 subnet) over the Internet: 192.168.1.* --- Router A -------tunnel-------- Router B --- 192.168.2.* / / +------ the Internet ------+ Assuming router A has the (external) IP address A and the internal address 192.168.1.1, while router B has external address B and internal address 192.168.2.1, the following commands will configure the tunnel: On router A: ifconfig greN create ifconfig greN 192.168.1.1 192.168.2.1 link1 ifconfig greN tunnel A B route add -net 192.168.2 -netmask 255.255.255.0 192.168.2.1 On router B: ifconfig greN create ifconfig greN 192.168.2.1 192.168.1.1 link1 ifconfig greN tunnel B A route add -net 192.168.1 -netmask 255.255.255.0 192.168.1.1 Note that this is a safe situation where the link1 flag (as discussed in the BUGS section below) may (and probably should) be set. NOTES
The MTU of gre interfaces is set to 1476 by default, to match the value used by Cisco routers. If grekey is set this is lowered to 1472. This may not be an optimal value, depending on the link between the two tunnel endpoints. It can be adjusted via ifconfig(8). For correct operation, the gre device needs a route to the destination that is less specific than the one over the tunnel. (Basically, there needs to be a route to the decapsulating host that does not run over the tunnel, as this would be a loop.) If the addresses are ambiguous, doing the ifconfig tunnel step before the ifconfig(8) call to set the gre IP addresses will help to find a route outside the tunnel. In order to tell ifconfig(8) to actually mark the interface as ``up'', the keyword up must be given last on its command line. The kernel must be set to forward datagrams by setting the net.inet.ip.forwarding sysctl(8) variable to non-zero. SEE ALSO
gif(4), inet(4), ip(4), netintro(4), protocols(5), ifconfig(8), sysctl(8) A description of GRE encapsulation can be found in RFC 1701 and RFC 1702. A description of MOBILE encapsulation can be found in RFC 2004. AUTHORS
Heiko W.Rupp <hwr@pilhuhn.de> BUGS
The compute_route() code in if_gre.c toggles the last bit of the IP-address to provoke the search for a less specific route than the one directly over the tunnel to prevent loops. This is possibly not the best solution. To avoid the address munging described above, turn on the link1 flag on the ifconfig(8) command line. This implies that the GRE packet des- tination and the ifconfig remote host are not the same IP addresses, and that the GRE destination does not route over the gre interface itself. The current implementation uses the key only for outgoing packets. Incomming packets with a different key or without a key will be treated as if they would belong to this interface. RFC1701 is not fully supported, however all unsupported features have been deprecated in RFC2784. BSD
June 20, 2008 BSD
All times are GMT -4. The time now is 05:56 PM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy