Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    IPSec tunnel and dinamic IP

    IPsec
    8
    31
    17.1k
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • S
      ssbaksa
      last edited by

      @ullbergm:

      The problem is that IPSEC does not support dns names when you set up tunnels. All my script does is to do a DNS lookup and update the remote host in the tunnel with ID=0 with the current ip of the remote host. So if the script worked you won't see the dns name in the pfsense web interface anymore, you will see the ip of the remote host.

      Verify what your tunnel ID is and make sure that it matches what is in the script, also replace "my-dynamic-dns-host-name" with "viola.dyndns.org" (assuming that it is the correct dns name).
      When you run php -q updateIPSEC.php (or whatever you saved the script as) it should update your tunnel with the current ip off the remote host.

      Ok! I will try it tomorow morning.

      1 Reply Last reply Reply Quote 0
      • F
        fastcon68
        last edited by

        I would love to know the status of this request?  If this works I would love to implement it.  I have serveral customers that have dynamic dns and would love to be able to setup up the this for them.
        rc

        1 Reply Last reply Reply Quote 0
        • S
          ssbaksa
          last edited by

          @fastcon68:

          I would love to know the status of this request?  If this works I would love to implement it.  I have serveral customers that have dynamic dns and would love to be able to setup up the this for them.
          rc

          Script is working good. Now whole idea nead some reworking. How to implement this for more than one tunnel, maybe some changes to IPSec seting page (check box for dynamic tunnel or different dynamic gateway input field) and some other question. Ideas?

          Sasa

          1 Reply Last reply Reply Quote 0
          • U
            ullbergm
            last edited by

            @ssbaksa:

            Script is working good. Now whole idea nead some reworking. How to implement this for more than one tunnel, maybe some changes to IPSec seting page (check box for dynamic tunnel or different dynamic gateway input field) and some other question. Ideas?

            How about something like this:
            /root/ipsecUpdate.php

            
            require_once("config.inc");
            require_once("functions.inc");
            
            $conf = &$config['ipsec']['tunnel'];
            
            $reload = 0;
            
            for ($i = 0; $i < count($conf); $i++) {
                    if( $conf[$i]['remote-gateway-hostname'] <> "" ) {
                            $newip = gethostbyname($conf[$i]['remote-gateway-hostname']);
            
                            if( $conf[$i]['remote-gateway'] != $newip ) {
                                    $conf[$i]['remote-gateway'] = $newip;
                                    $reload = 1;
                            }
                    }
            }
            
            if( $reload == 1 ) {
                    write_config();
                    vpn_ipsec_configure();
            }
            ?>
            
            

            Edit /usr/local/www/vpn_ipsec_edit.php

            After this line:

            $pconfig['remotegw'] = $a_ipsec[$id]['remote-gateway'];
            

            add

            $pconfig['remotegwhost'] = $a_ipsec[$id]['remote-gateway-hostname'];
            

            Not 100% sure about this one, i'm making it up as i go :)
            After this:

                    if (($_POST['remotegw'] && !is_ipaddr($_POST['remotegw']))) {
                            if(is_domain($_POST['remotegw']) == false)
                                    $input_errors[] = "A valid remote gateway address must be specified.";
                    }
            
            

            add

                    if (($_POST['remotegwhost'] && is_domain($_POST['remotegwhost']) == false)) {
                                    $input_errors[] = "A valid remote gateway hostname must be specified.";
                    }
            
            

            Another one:

            $ipsecent['remote-gateway'] = $_POST['remotegw'];
            

            Add

            $ipsecent['remote-gateway-hostname'] = $_POST['remotegwhost'];
            

            This one needs more work but this will at least add a box to enter the information.
            Change

            
                                Enter the public IP address of the remote gateway
            
            

            to

            
                                IP: 
            
                                And/or Hostname: 
            
            
            1 Reply Last reply Reply Quote 0
            • U
              ullbergm
              last edited by

              I'm sure that there are several good reasons that IPSEC doesn't do this already so by doing something like this we are probably bypassing the security that the developers built in, but if you trust the DNS servers this should work for you.

              Btw, the code came from pfSense-1.2-RC3 and it is untested so you may have to tweak it a little bit to get it to work. I'm still running my old code (see earlier in the thread), it works, no reason for me to change yet… :)

              Also, dont forget to add this:

              run "crontab -e" and add:

              * * * * * /usr/local/bin/php -q /root/ipsecUpdate.php >> /dev/null
              
              1 Reply Last reply Reply Quote 0
              • S
                sullrich
                last edited by

                If you can turn this into GUI code with a checkbox to enable dynamic ipsec, I will commit.

                Send diff's to coreteam@pfsense.com

                Thanks for your work so far!

                1 Reply Last reply Reply Quote 0
                • U
                  ullbergm
                  last edited by

                  @sullrich:

                  If you can turn this into GUI code with a checkbox to enable dynamic ipsec, I will commit.

                  Send diff's to coreteam@pfsense.com

                  Thanks for your work so far!

                  I can do that, a couple of questions for you.

                  So from a pfsense project perspective the preferred look would be to add a checkbox next to the remote host textbox and when that is checked the input should be a hostname instead of a ip address.

                  Is a diff against 1.2-RC2 ok?

                  Any preference on where the cron job script should be stored and how to specify how i want it to run (say every 15 minutes)?

                  1 Reply Last reply Reply Quote 0
                  • S
                    sullrich
                    last edited by

                    @ullbergm:

                    I can do that, a couple of questions for you.

                    So from a pfsense project perspective the preferred look would be to add a checkbox next to the remote host textbox and when that is checked the input should be a hostname instead of a ip address.

                    Is a diff against 1.2-RC2 ok?

                    Any preference on where the cron job script should be stored and how to specify how i want it to run (say every 15 minutes)?

                    #1 Yeah, a checkbox would be fine.
                    #2 I would prefer a diff against HEAD and RELENG1.  This will not make it into 1.2 as we are frozen.
                    #3 Use minicron which is included.  You can tell minicron to launch a script every X minutes.  However, we should only launch this minicron process when we detect someone is using a dynamic hostname to avoid unnecessary process startups every 15 minutes when we do not need to.  Also, a shell script to deterimine changes in the hostname would be ideal and only invoke php when absolutely needed but I would settle for either.

                    Thanks for your help on this!  This should be a great addition for folks.

                    1 Reply Last reply Reply Quote 0
                    • S
                      ssbaksa
                      last edited by

                      @sullrich:

                      #1 Yeah, a checkbox would be fine.
                      #2 I would prefer a diff against HEAD and RELENG1.  This will not make it into 1.2 as we are frozen.
                      #3 Use minicron which is included.  You can tell minicron to launch a script every X minutes.  However, we should only launch this minicron process when we detect someone is using a dynamic hostname to avoid unnecessary process startups every 15 minutes when we do not need to.  Also, a shell script to deterimine changes in the hostname would be ideal and only invoke php when absolutely needed but I would settle for either.

                      Thanks for your help on this!  This should be a great addition for folks.

                      Ah! I see movement. I am using script (simple one) for some time now and it is working OK.
                      This addition with web front end will be much better.

                      Any new development?

                      Sasa

                      1 Reply Last reply Reply Quote 0
                      • S
                        sullrich
                        last edited by

                        Dyanmic IPSEC support is already in -HEAD and RELENG_1_3; imported from m0n0wall recently.

                        1 Reply Last reply Reply Quote 0
                        • U
                          ullbergm
                          last edited by

                          @sullrich:

                          Dyanmic IPSEC support is already in -HEAD and RELENG_1_3; imported from m0n0wall recently.

                          Cool, no need for the workaround then.

                          1 Reply Last reply Reply Quote 0
                          • S
                            ssbaksa
                            last edited by

                            @sullrich:

                            Dyanmic IPSEC support is already in -HEAD and RELENG_1_3; imported from m0n0wall recently.

                            Yupiiiii!!!
                            This is great news. No nead to write scripts for that any more then.

                            TNX!

                            1 Reply Last reply Reply Quote 0
                            • S
                              ssbaksa
                              last edited by

                              @sullrich:

                              Dyanmic IPSEC support is already in -HEAD and RELENG_1_3; imported from m0n0wall recently.

                              And how can I download image with that modifications? I isn't at location usualy allowed to us mortals.
                              I know that it is in alpha stage (or near that) but I will like to play with.

                              1 Reply Last reply Reply Quote 0
                              • S
                                sullrich
                                last edited by

                                We currently do not have images for this.  Expect to see some betas/alphas right after 1.2 is released.

                                1 Reply Last reply Reply Quote 0
                                • S
                                  ssbaksa
                                  last edited by

                                  @sullrich:

                                  We currently do not have images for this.  Expect to see some betas/alphas right after 1.2 is released.

                                  OK!
                                  TNX for info.

                                  1 Reply Last reply Reply Quote 0
                                  • valnarV
                                    valnar
                                    last edited by

                                    If a script, or better yet, an update to the web interface would allow this hack to get two dynamic DNS Pfsense boxes to build a IPSEC tunnel, I would be happy to pay a bounty for that.

                                    Robert

                                    1 Reply Last reply Reply Quote 0
                                    • S
                                      sullrich
                                      last edited by

                                      @valnar:

                                      If a script, or better yet, an update to the web interface would allow this hack to get two dynamic DNS Pfsense boxes to build a IPSEC tunnel, I would be happy to pay a bounty for that.

                                      I don't see any reason why these changes would not work in this case.  It might take a minute or two for the other end to come back up, but in theory it should work.

                                      1 Reply Last reply Reply Quote 0
                                      • W
                                        wallacebw
                                        last edited by

                                        I guess there is no plan to backport the m0n0wall update into the 1.2 branch is there?

                                        1 Reply Last reply Reply Quote 0
                                        • S
                                          sullrich
                                          last edited by

                                          1.2 is frozen.

                                          1 Reply Last reply Reply Quote 0
                                          • First post
                                            Last post
                                          Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.