Projet

Général

Profil

Actions

Librehosting » Historique » Révision 31

« Précédent | Révision 31/44 (diff) | Suivant »
sacha, 02/08/2018 09:18


Configuration of a Libre Hosting aka Anouncing our public IPs to Internet from an indifferent place

technical resume: IPSec between OPNSense and OpenBSD to announce our ASN IP from an indifferent ISP place.

General presentation

Who we are

Aquilenet is a non profit organization since 2010 and a "do it yourself ISP", member of a Federation of similar ISP in France called FFDN. We are netneutrality builders, helping for more freedom and building networks using and participating Libre Software.
We provide xDSL, VPN and we hope soon Fiber accesses, and a lot of services for our members (mail, nextcloud, hosting, VPS...) and for others searx, Etherpad, Pastebin, Peertube, ...

The need: create a Libre format hosting in our cool local called "la mezzanine".

To allow our the members of our non-profit organization to connect the hardware they want (like Nuc, Raspberry pi, tower, etc...) in our Libre hosting space called "la mezzanine" with a Public IPv6 and IPv4 and from our ASN, we need to announce our IPs from another place than our Datacenter.

How we do

We have to tunnel all the network from the Libre Hosting to Internet and vice versa. We have tried first with OpenVPN but the userland application use to much resources for needed bandwidth (200Mbps).
This IP range will be routed by IPSec to our ASN point of BGP announce in our datacenter, then they will route them to the Libre Hosting.

From our Libre Hosting we have a OPNSense Firewall and in our Datacenter two clustered OpenBSD.

A diagram to explain this:

Diagram explanation:

With our ASN with can do BGP to announce our IP adresses in our Datacenter.

  • (2) Firewalls in the Datacenter

The job is done with a cluster of firewalls using the magic power of OpenBSD and OpenBGPD.
For firewall redundancy we use CARP and pfsync

  • (3) La Mezzanine

Is our cool place where we can meet our members and friends.
This place use green power with a supplier called Enercoop, it's a French electric utility cooperative company, which only uses renewable energy.
Here, the firewall is OPNSense doing the PPPOE connection on a general public fiber provider (Yes we had to hack a little to remove this ISP blackbox).

  • (4) Public IPv6 and v4 from the Mezzanine to Internet

This firewall is routing threw an IPSec tunnel (for each OpenBSD firewall) our public dedicated IP for this place. These IP allow our friend's to put there their servers / Arduino's & co to Internet with our network <3


Technical information, let's rock !

OpenBSD configuration

We configure the OpenBSD's IPSec configuration file for 2 Phase 2 tunnels one for IPv4 another on for IPv6

/etc/ipsec.conf

ike passive esp from any to $LIBRE_HOSTING_PUB_IP_V4/26 \
    peer $OPSense_Public_IP\
    main group modp2048\
    psk "My super secret shared key"

flow esp from any to $LIBRE_HOSTING_PUB_IP_V4/26 peer $OPSense_Public_IP
flow esp from any to $LIBRE_HOSTING_PUB_IP_V6/48 peer $OPSense_Public_IP
chmod 500 /etc/ipsec.conf

Launch the tunnel:

isakmpd -K  
ipsecctl -f /etc/ipsec.conf

To make it permanent add this to /etc/rc.conf.local:

isakmpd_flags="-K"
ipsec_rules=/etc/ipsec.conf
ipsec=YES

check the configuration:

ipsecctl -sa 

Enable some logs on Isakmpd:

sh -c "echo S \> /var/run/isakmpd.fifo"  
less /var/run/isakmpd.result

and:

isakmpd -d -DA=70 -K

Check IPSec Flows:

ipsecctl -F

OPNSense configuration

  • IPSec Phase 1

  • IPSec Phase 2 IPv4

  • IPSec Phase 2 IPv6

To have an IPv6 phase 2 with a IPv4 phase on Opnsense ensure you got this patch

  • IPSec Advanced Settings

Important exclude the routed network to allow it to talk to itself (exemple ARP/ICMP request to the gateway)

Hosted server settings

IP: The public IP/Mask
Gateway: OPNSense's IP
mtu 1378


Mis à jour par sacha il y a plus de 5 ans · 31 révisions