FW: [sclug] Firewalls

Tom Dawes-Gamble tmdg at hp.com
Sat Oct 25 09:05:31 UTC 2003


lug at assursys.co.uk wrote:
> On Wed, 15 Jan 2003, Tom Dawes-Gamble wrote:
> 
> 
>>lug at assursys.co.uk wrote:
>>
>>>On Wed, 15 Jan 2003, Tom Dawes-Gamble wrote:
>>>
>>>
>>>>tim wrote:
>>>>
>>>>
>>>>>2. Could not seem to get the NAT working on ipcop. My local addresses
>>>>>192nnnnnn seemed to leak out into the net, which seemed good in some ways
>>>>>in that sites thought my ip address was 192 etc, but bad in the fact that
>>>>>I was not doing it deliberately and I am sure its not good generally.
>>>>>
>>>>
>>>>Strange.  I would have thought that if your 192. adddress leaked
>>>>out then the connection would fail since the remote end would not have a
>>>>route to your 192.
>>>
>>>
>>>I agree entirely. Of course, it's entirely possible that the Tim was
>>>referring to, say, a website that uses a bit of Java(Script) to determine
>>>the end-client's IP address. That won't be detected or NATted by any of the
>>>NAT solutions I've come across...
>>
>>Yes,  but NAT sould only change the envelope part of the packet and not the
>>contents.
> 
> 
> That depends. It's impossible to get some protocols (non-PASV FTP being the
> most notable) working without modifying the payload. Yes, this is prone to
> error - consider what happens to the size of the packet if the client
> address is 1.2.3.4 and the NATted address is 111.122.133.144. Now consider
> what happens if the payload was already of size (MTU-40)...
> 

That's not a nice exercise to leave to the reader.  :-)
Though my guess is

MTU - 40 = MTU - Envelope

then in the envelope 1.2.3.4 would be 00000001 00000010 00000011 00000100
          and 111.122.133.144 would be 01101111 01111010 10000101 10010000

in that case the envelope does not change size.

I have never looked at things at that level so I could be talking from
the wrong orifice.

> 
>>Last night I managed to get VPN working from my behind my ipcop firewall
>>to our company intranet.  How ip_masq_ipsec.o enables that is PFM to me.
> 
> 
> Presumably you're using the Encapsulation Security Payload (ESP) protocol in
> transport mode to implement your VPN.
> 

How should I know?

I just followed the ipcop FAQ:-

  How do I connect a IPsec client behind IPCop to a remote IPSec Server?

It worked first time. :-)  Since I connect my laptop to my private intranet
using wireless network I can now sit in the garden and work without trailing 
wire all over the place.

Tom.





-- 
There are 10 sorts of people.
Those that understand Binary and those that don't.




More information about the Sclug mailing list