<feed xmlns='http://www.w3.org/2005/Atom'>
<title>fripost-ansible/roles/common/files/etc/network/if-up.d/ipsec, branch master</title>
<subtitle>Fripost ansible scripts</subtitle>
<link rel='alternate' type='text/html' href='http://git.fripost.org/fripost-ansible/'/>
<entry>
<title>Remove IPSec related files.</title>
<updated>2015-06-07T00:52:19+00:00</updated>
<author>
<name>Guilhem Moulin</name>
<email>guilhem@fripost.org</email>
</author>
<published>2014-07-02T18:52:27+00:00</published>
<link rel='alternate' type='text/html' href='http://git.fripost.org/fripost-ansible/commit/?id=e63b5f5e39e2012bbdf1ca8301c6eb2cd13716cb'/>
<id>e63b5f5e39e2012bbdf1ca8301c6eb2cd13716cb</id>
<content type='text'>
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
</pre>
</div>
</content>
</entry>
<entry>
<title>Reformulate the headers showing the license.</title>
<updated>2015-06-07T00:50:53+00:00</updated>
<author>
<name>Guilhem Moulin</name>
<email>guilhem@fripost.org</email>
</author>
<published>2013-11-26T03:09:46+00:00</published>
<link rel='alternate' type='text/html' href='http://git.fripost.org/fripost-ansible/commit/?id=fd7e94a34b7fa9151d689375d8687d3686786d9b'/>
<id>fd7e94a34b7fa9151d689375d8687d3686786d9b</id>
<content type='text'>
To be clearer, and to follow the recommendation of the FSF, we include
a full header rather than a single sentence.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
To be clearer, and to follow the recommendation of the FSF, we include
a full header rather than a single sentence.
</pre>
</div>
</content>
</entry>
<entry>
<title>wibble</title>
<updated>2015-06-07T00:50:44+00:00</updated>
<author>
<name>Guilhem Moulin</name>
<email>guilhem@fripost.org</email>
</author>
<published>2013-11-04T07:25:54+00:00</published>
<link rel='alternate' type='text/html' href='http://git.fripost.org/fripost-ansible/commit/?id=51ea7eca6ca198606a71c107bb67d64186761456'/>
<id>51ea7eca6ca198606a71c107bb67d64186761456</id>
<content type='text'>
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
</pre>
</div>
</content>
</entry>
<entry>
<title>Be more specific regarding the protocol in use for IPSec policies.</title>
<updated>2015-06-07T00:50:43+00:00</updated>
<author>
<name>Guilhem Moulin</name>
<email>guilhem@fripost.org</email>
</author>
<published>2013-11-04T06:27:10+00:00</published>
<link rel='alternate' type='text/html' href='http://git.fripost.org/fripost-ansible/commit/?id=0dd6a96ce1bf2cef9140d01a5c49eb92e2f8ec6f'/>
<id>0dd6a96ce1bf2cef9140d01a5c49eb92e2f8ec6f</id>
<content type='text'>
We use ESP only, so other protocols shouldn't be ACCEPTed.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
We use ESP only, so other protocols shouldn't be ACCEPTed.
</pre>
</div>
</content>
</entry>
<entry>
<title>Prohibit binding against the IP reserved for IPSec.</title>
<updated>2015-06-07T00:50:38+00:00</updated>
<author>
<name>Guilhem Moulin</name>
<email>guilhem@fripost.org</email>
</author>
<published>2013-11-03T23:31:43+00:00</published>
<link rel='alternate' type='text/html' href='http://git.fripost.org/fripost-ansible/commit/?id=67c5135625d3553dcb6f2bfc193df24c0e1ab826'/>
<id>67c5135625d3553dcb6f2bfc193df24c0e1ab826</id>
<content type='text'>
Packets originating from our (non-routable) $ipsec are marked; there is
no xfrm lookup (i.e., no matching IPSec association), the packet will
retain its mark and be null routed later on, thanks to

    ip rule  add fwmark "$secmark" table 666 priority 666
    ip route add blackhole default table 666
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Packets originating from our (non-routable) $ipsec are marked; there is
no xfrm lookup (i.e., no matching IPSec association), the packet will
retain its mark and be null routed later on, thanks to

    ip rule  add fwmark "$secmark" table 666 priority 666
    ip route add blackhole default table 666
</pre>
</div>
</content>
</entry>
<entry>
<title>Use a dedicated, non-routable, IPv4 for IPSec.</title>
<updated>2015-06-07T00:50:35+00:00</updated>
<author>
<name>Guilhem Moulin</name>
<email>guilhem@fripost.org</email>
</author>
<published>2013-11-03T04:54:11+00:00</published>
<link rel='alternate' type='text/html' href='http://git.fripost.org/fripost-ansible/commit/?id=2bcaaf01a5fcc2d2ce618da6af30a43a70d03d80'/>
<id>2bcaaf01a5fcc2d2ce618da6af30a43a70d03d80</id>
<content type='text'>
At the each IPSec end-point the traffic is DNAT'ed to / MASQUERADE'd
from our dedicated IP after ESP decapsulation. Also, some IP tables
ensure that alien (not coming from / going to the tunnel end-point) is
dropped.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
At the each IPSec end-point the traffic is DNAT'ed to / MASQUERADE'd
from our dedicated IP after ESP decapsulation. Also, some IP tables
ensure that alien (not coming from / going to the tunnel end-point) is
dropped.
</pre>
</div>
</content>
</entry>
</feed>
