To jest stara wersja strony!
Zainstalować ipsec-tools oraz strongswan
Polecenia do instalacji ipsec:
wget http://launchpadlibrarian.net/234435245/ipsec-tools_0.8.2+20140711-5_amd64.deb sudo apt install ./ipsec-tools_0.8.2+20140711-5_amd64.deb
Polecenie do instalacji strongswan:
sudo apt install strongswan
#!/usr/sbin/setkey -f ## konfiguracja dla maszyny A ## flush SAD and SPD flush; spdflush; ## add SAs in SAD add 172.20.253.237 172.20.252.198 esp 0x1000 -E aes-cbc 0xaa223344556677889900aabbccddeeff; add 172.20.252.198 172.20.253.237 esp 0x2000 -E aes-cbc 0xbb223344556677889900aabbccddeeff; ## add SPs in SPD spdadd 172.20.253.237 172.20.252.198 any -P out ipsec esp/transport//require; spdadd 172.20.252.198 172.20.253.237 any -P in ipsec esp/transport//require;
#!/usr/sbin/setkey -f ## konfiguracja dla maszyny B ## flush SAD i SPD flush; spdflush; ## add SAs in SAD add 172.20.253.237 172.20.252.198 esp 0x1000 -E aes-cbc 0xaa223344556677889900aabbccddeeff; add 172.20.252.198 172.20.253.237 esp 0x2000 -E aes-cbc 0xbb223344556677889900aabbccddeeff; ## add SPs in SPD spdadd 172.20.253.237 172.20.252.198 any -P in ipsec esp/transport//require; spdadd 172.20.252.198 172.20.253.237 any -P out ipsec esp/transport//require;
Na maszynie a:
administrator@ipsec-A:~$ sudo setkey -f setkey.conf_a_ administrator@ipsec-A:~$ sudo setkey -D 172.20.252.198 172.20.253.237 esp mode=transport spi=8192(0x00002000) reqid=0(0x00000000) E: aes-cbc bb223344 55667788 9900aabb ccddeeff seq=0x00000000 replay=0 flags=0x00000000 state=mature created: Jun 14 19:29:57 2025 current: Jun 14 19:30:01 2025 diff: 4(s) hard: 0(s) soft: 0(s) last: hard: 0(s) soft: 0(s) current: 0(bytes) hard: 0(bytes) soft: 0(bytes) allocated: 0 hard: 0 soft: 0 sadb_seq=1 pid=13464 refcnt=0 172.20.253.237 172.20.252.198 esp mode=transport spi=4096(0x00001000) reqid=0(0x00000000) E: aes-cbc aa223344 55667788 9900aabb ccddeeff seq=0x00000000 replay=0 flags=0x00000000 state=mature created: Jun 14 19:29:57 2025 current: Jun 14 19:30:01 2025 diff: 4(s) hard: 0(s) soft: 0(s) last: hard: 0(s) soft: 0(s) current: 0(bytes) hard: 0(bytes) soft: 0(bytes) allocated: 0 hard: 0 soft: 0 sadb_seq=0 pid=13464 refcnt=0 administrator@ipsec-A:~$ sudo setkey -DP 172.20.252.198[any] 172.20.253.237[any] 255 fwd prio def ipsec esp/transport//require created: Jun 14 19:29:57 2025 lastused: lifetime: 0(s) validtime: 0(s) spid=82 seq=1 pid=13511 refcnt=1 172.20.252.198[any] 172.20.253.237[any] 255 in prio def ipsec esp/transport//require created: Jun 14 19:29:57 2025 lastused: lifetime: 0(s) validtime: 0(s) spid=72 seq=2 pid=13511 refcnt=1 172.20.253.237[any] 172.20.252.198[any] 255 out prio def ipsec esp/transport//require created: Jun 14 19:29:57 2025 lastused: lifetime: 0(s) validtime: 0(s) spid=65 seq=3 pid=13511 refcnt=1 (per-socket policy) in(socket) none created: Jun 14 19:18:30 2025 lastused: lifetime: 0(s) validtime: 0(s) spid=59 seq=4 pid=13511 refcnt=1 (per-socket policy) out(socket) none created: Jun 14 19:18:30 2025 lastused: lifetime: 0(s) validtime: 0(s) spid=52 seq=5 pid=13511 refcnt=1 (per-socket policy) in(socket) none created: Jun 14 19:18:30 2025 lastused: lifetime: 0(s) validtime: 0(s) spid=43 seq=6 pid=13511 refcnt=1 (per-socket policy) out(socket) none created: Jun 14 19:18:30 2025 lastused: lifetime: 0(s) validtime: 0(s) spid=36 seq=7 pid=13511 refcnt=1 (per-socket policy) in(socket) none created: Jun 14 19:18:30 2025 lastused: lifetime: 0(s) validtime: 0(s) spid=27 seq=8 pid=13511 refcnt=1 (per-socket policy) out(socket) none created: Jun 14 19:18:30 2025 lastused: lifetime: 0(s) validtime: 0(s) spid=20 seq=9 pid=13511 refcnt=1 (per-socket policy) in(socket) none created: Jun 14 19:18:30 2025 lastused: lifetime: 0(s) validtime: 0(s) spid=11 seq=10 pid=13511 refcnt=1 (per-socket policy) out(socket) none created: Jun 14 19:18:30 2025 lastused: lifetime: 0(s) validtime: 0(s) spid=4 seq=0 pid=13511 refcnt=1 administrator@ipsec-A:~$
Na maszynie b:
administrator@ipsec-B:~$ sudo setkey -f setkey.conf_b_ administrator@ipsec-B:~$ sudo setkey -D 172.20.252.198 172.20.253.237 esp mode=transport spi=8192(0x00002000) reqid=0(0x00000000) E: aes-cbc bb223344 55667788 9900aabb ccddeeff seq=0x00000000 replay=0 flags=0x00000000 state=mature created: Jun 14 19:31:00 2025 current: Jun 14 19:31:15 2025 diff: 15(s) hard: 0(s) soft: 0(s) last: hard: 0(s) soft: 0(s) current: 0(bytes) hard: 0(bytes) soft: 0(bytes) allocated: 0 hard: 0 soft: 0 sadb_seq=1 pid=32009 refcnt=0 172.20.253.237 172.20.252.198 esp mode=transport spi=4096(0x00001000) reqid=0(0x00000000) E: aes-cbc aa223344 55667788 9900aabb ccddeeff seq=0x00000000 replay=0 flags=0x00000000 state=mature created: Jun 14 19:31:00 2025 current: Jun 14 19:31:15 2025 diff: 15(s) hard: 0(s) soft: 0(s) last: hard: 0(s) soft: 0(s) current: 0(bytes) hard: 0(bytes) soft: 0(bytes) allocated: 0 hard: 0 soft: 0 sadb_seq=0 pid=32009 refcnt=0 administrator@ipsec-B:~$ sudo setkey -DP 172.20.252.198[any] 172.20.253.237[any] 255 out prio def ipsec esp/transport//require created: Jun 14 19:31:00 2025 lastused: lifetime: 0(s) validtime: 0(s) spid=17 seq=1 pid=32078 refcnt=1 172.20.253.237[any] 172.20.252.198[any] 255 fwd prio def ipsec esp/transport//require created: Jun 14 19:31:00 2025 lastused: lifetime: 0(s) validtime: 0(s) spid=10 seq=2 pid=32078 refcnt=1 172.20.253.237[any] 172.20.252.198[any] 255 in prio def ipsec esp/transport//require created: Jun 14 19:31:00 2025 lastused: lifetime: 0(s) validtime: 0(s) spid=8 seq=0 pid=32078 refcnt=1 administrator@ipsec-B:~$
Ruch IP pomiędzy maszynami A (172.20.253.237) i B (172.20.252.198) – każdy protokół (any) zdefiniowany w SPD.
spdadd … -P out
spdadd … -P in
SA są jednokierunkowe – jedna dla A → B, druga dla B → A, aby zabezpieczyć dwukierunkowy kanał.
-D
– pokazuje aktywne asocjacje bezpieczeństwa (SA)-DP
– pokazuje aktywne polityki bezpieczeństwa (SPD)SPI (Security Parameter Index) to unikalny identyfikator asocjacji bezpieczeństwa (SA), który pozwala odbiorcy zidentyfikować, jakich parametrów użyć do odszyfrowania i uwierzytelnienia pakietu.
Sequence Number służy do zapobiegania atakom typu replay. Numer rośnie monotonicznie dla każdego pakietu, co pozwala sprawdzić, czy pakiety nie zostały powtórzone.
#!/usr/sbin/setkey -f ## konfiguracja dla maszyny A ## flush SAD and SPD flush; spdflush; ## add SAs in SAD add 172.20.253.237 172.20.252.198 esp 0x1000 -E aes-cbc 0xaa223344556677889900aabbccddeeff -A hmac-sha1 0xaa223344556677889900aabbccddeeff; add 172.20.252.198 172.20.253.237 esp 0x2000 -E aes-cbc 0xbb223344556677889900aabbccddeeff -A hmac-sha1 0xbb223344556677889900aabbccddeeff; ## add SPs in SPD spdadd 172.20.253.237 172.20.252.198 any -P out ipsec esp/transport//require; spdadd 172.20.252.198 172.20.253.237 any -P in ipsec esp/transport//require;
#!/usr/sbin/setkey -f ## konfiguracja dla maszyny B ## flush SAD i SPD flush; spdflush; ## add SAs in SAD add 172.20.253.237 172.20.252.198 esp 0x1000 -E aes-cbc 0xaa223344556677889900aabbccddeeff -A hmac-sha1 0xaa223344556677889900aabbccddeeff; add 172.20.252.198 172.20.253.237 esp 0x2000 -E aes-cbc 0xbb223344556677889900aabbccddeeff -A hmac-sha1 0xbb223344556677889900aabbccddeeff; ## add SPs in SPD spdadd 172.20.253.237 172.20.252.198 any -P in ipsec esp/transport//require; spdadd 172.20.252.198 172.20.253.237 any -P out ipsec esp/transport//require;
#!/usr/sbin/setkey -f ## konfiguracja dla maszyny A ## flush SAD and SPD flush; spdflush; ## add SAs in SAD add 172.20.253.237 172.20.252.198 ah 0x1000 -E hmac-sha1 0xaa223344556677889900aabbccddeeff; add 172.20.252.198 172.20.253.237 ah 0x2000 -E hmac-sha1 0xbb223344556677889900aabbccddeeff; ## add SPs in SPD spdadd 172.20.253.237 172.20.252.198 any -P out ipsec esp/transport//require; spdadd 172.20.252.198 172.20.253.237 any -P in ipsec esp/transport//require;
#!/usr/sbin/setkey -f ## konfiguracja dla maszyny B ## flush SAD i SPD flush; spdflush; ## add SAs in SAD add 172.20.253.237 172.20.252.198 ah 0x1000 -E hmac-sha1 0xaa223344556677889900aabbccddeeff; add 172.20.252.198 172.20.253.237 ah 0x2000 -E hmac-sha1 0xbb223344556677889900aabbccddeeff; ## add SPs in SPD spdadd 172.20.253.237 172.20.252.198 any -P in ipsec esp/transport//require; spdadd 172.20.252.198 172.20.253.237 any -P out ipsec esp/transport//require;
#!/usr/sbin/setkey -f ## konfiguracja dla maszyny A ## flush SAD and SPD flush; spdflush; ## add SAs in SAD add 172.20.253.237 172.20.252.198 esp 0x1000 -E aes-cbc 0xaa223344556677889900aabbccddeeff; add 172.20.252.198 172.20.253.237 esp 0x2000 -E aes-cbc 0xbb223344556677889900aabbccddeeff; ## add SAs in SAD add 172.20.253.237 172.20.252.198 ah 0x1001 -E hmac-sha1 0xaa223344556677889900aabbccddeeff; add 172.20.252.198 172.20.253.237 ah 0x2001 -E hmac-sha1 0xbb223344556677889900aabbccddeeff; ## add SPs in SPD spdadd 172.20.253.237 172.20.252.198 any -P out ipsec esp/transport//require; spdadd 172.20.252.198 172.20.253.237 any -P in ipsec esp/transport//require;
#!/usr/sbin/setkey -f ## konfiguracja dla maszyny B ## flush SAD i SPD flush; spdflush; ## add SAs in SAD add 172.20.253.237 172.20.252.198 ah 0x1000 -E hmac-sha1 0xaa223344556677889900aabbccddeeff; add 172.20.252.198 172.20.253.237 ah 0x2000 -E hmac-sha1 0xbb223344556677889900aabbccddeeff; ## add SPs in SPD spdadd 172.20.253.237 172.20.252.198 any -P in ipsec esp/transport//require; spdadd 172.20.252.198 172.20.253.237 any -P out ipsec esp/transport//require;