Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

T6617: T6618: vpn ipsec remote-access: fix profile generators (backport #3903) #3921

Merged
merged 1 commit into from
Aug 2, 2024

Conversation

mergify[bot]
Copy link

@mergify mergify bot commented Aug 1, 2024

Change Summary

This fixes several issues with the iOS and Windows remote access VPN profile generators (generate ipsec profile) not working correctly in certain scenarios.

Types of changes

  • Bug fix (non-breaking change which fixes an issue)
  • New feature (non-breaking change which adds functionality)
  • Code style update (formatting, renaming)
  • Refactoring (no functional changes)
  • Migration from an old Vyatta component to vyos-1x, please link to related PR inside obsoleted component
  • Other (please describe):

Related Task(s)

https://vyos.dev/T6617
https://vyos.dev/T6618

Related PR(s)

Component(s) name

vpn ipsec remote-access

Proposed changes

This updates both the iOS and Windows profile generators.

How to test

within edit vpn ipsec:

set ike-group ClientVPN-Client key-exchange 'ikev2'
set ike-group ClientVPN-Client lifetime '0'
set ike-group ClientVPN-Client proposal 1 dh-group '19'
set ike-group ClientVPN-Client proposal 1 encryption 'aes256gcm128'
set ike-group ClientVPN-Client proposal 1 hash 'sha256'
set esp-group ClientVPN-Client lifetime '3600'
set esp-group ClientVPN-Client pfs 'enable'
set esp-group ClientVPN-Client proposal 1 encryption 'aes256gcm128'
set esp-group ClientVPN-Client proposal 1 hash 'sha256'
set remote-access connection ClientVPN authentication client-mode 'x509'
set remote-access connection ClientVPN authentication local-id 'router.test.com'
set remote-access connection ClientVPN authentication server-mode 'x509'
set remote-access connection ClientVPN authentication x509 ca-certificate <CA CERT ID>
set remote-access connection ClientVPN authentication x509 certificate <SERVER CERT ID>
set remote-access connection ClientVPN dhcp-interface 'eth0'
set remote-access connection ClientVPN esp-group 'ClientVPN-Client'
set remote-access connection ClientVPN ike-group 'ClientVPN-Client'
set remote-access connection ClientVPN pool 'Client-Pool-v4'
set remote-access pool Client-Pool-v4 prefix 10.10.10.0/24

commit and then try:
generate ipsec profile ios-remote-access ClientVPN remote router.test.com
generate ipsec profile windows-remote-access ClientVPN remote router.test.com

Smoketest result

N/A

Checklist:

  • I have read the CONTRIBUTING document
  • I have linked this PR to one or more Phabricator Task(s)
  • I have run the components SMOKETESTS if applicable
  • My commit headlines contain a valid Task id
  • My change requires a change to the documentation
  • I have updated the documentation accordingly

This is an automatic backport of pull request #3903 done by [Mergify](https://mergify.com).

@mergify mergify bot requested a review from a team as a code owner August 1, 2024 05:52
@github-actions github-actions bot added the sagitta VyOS 1.4 LTS label Aug 1, 2024
Copy link

github-actions bot commented Aug 1, 2024

👍
No issues in PR Title / Commit Title

Copy link

github-actions bot commented Aug 1, 2024


warning: Unused directories imported from vyos.defaults in src/conf_mode/system_console.py:25.

@c-po c-po enabled auto-merge August 1, 2024 05:54
@c-po c-po merged commit ede841f into sagitta Aug 2, 2024
7 of 8 checks passed
@mergify mergify bot deleted the mergify/bp/sagitta/pr-3903 branch August 2, 2024 12:43
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
sagitta VyOS 1.4 LTS
Development

Successfully merging this pull request may close these issues.

4 participants