- Overview
- This is a SIMP module
- Module Description
- Beginning with ipsec
- Setup
- > delete it from the directory automatically.
- Reference
- Development
This module installs and configures Libreswan, an implementation of the VPN protocol, which supports IPSEC and IKE.
This module is a component of the System Integrity Management Platform, a compliance-management framework built on Puppet.
If you find any issues, they can be submitted to our JIRA.
Please read our Contribution Guide.
This module is optimally designed for use within a larger SIMP ecosystem, but it can be used independently:
- When included within the SIMP ecosystem, security compliance settings will be managed from the Puppet server.
- If used independently, all SIMP-managed security subsystems are disabled by
default and must be explicitly opted into by administrators. Please see
parameters mapped to
simp_options::*
items ininit.pp
for details.
This module installs the libreswan IPSEC service. IPSEC is Internet Protocol SECurity. It uses strong cryptography to provide both authentication and encryption services.
This module installs the most recently RedHat approved version of libreswan, currently 3.15. It will configure the IPSEC daemon using the most up to date defaults and, if you are using SIMP, manage your certificates. Connections can be managed through the puppet modules or by hand.
Before installing pupmod-simp-libreswan
, make sure you read the libreswan documentation thoroughly.
After reading the introduction, select the Main Wiki Page link to get to the user documentation.
- All
ipsec.conf
options can be found inipsec.conf(5)
.
- Ensure the libreswan and NSS packages are available.
Before installing pupmod-simp-libreswan
, make sure you read the libreswan documentation thoroughly.
After reading the introduction, select the Main Wiki Page link to get to the user documentation.
- IPSEC configuration file:
/etc/ipsec.conf
- Configuration directory:
/etc/ipsec.d/
- NSS database (containing peer certs and the CA):
/etc/ipsec.d/[key4.db,cert9.db,pkcs11.txt]
- Policy files (clear, private):
/etc/ipsec.d/policies/
- Secrets files (secret or key used by ipsec):
/etc/ipsec.d/*.secrets
- Connection files (tunnel configurations):
/etc/ipsec.d/*.conf
- Log file:
/var/log/secure
- Libreswan starts an "ipsec" service, but it is listed as "pluto" in the process list.
Add the following to hiera:
---
simp_options::pki: true
simp_options::trusted_nets : <desired client nets>
classes:
- 'libreswan'
Make sure that you have all Certificate Authorities needed loaded into SIMP. If the side you are connecting to
uses a different CA from yours, make sure you load their CA into your CA listing in PKI.
(See the SIMP documentation to see how to do this.)
You can verify the contents of the NSS database with:
certutil -L -d sql:/etc/ipsec.d/
To add a connection via puppet, create a definition file under the site manifest. A simple VPN tunnel host to host example is given here, named ipsec_tunne1.pp
:
class site::ipsec_tunne1 {
include 'libreswan'
libreswan::connection{ 'default':
leftcert => $facts['fqdn'],
left => $facts['ipaddress'],
leftrsasigkey => '%cert',
leftsendcert => 'always',
authby => 'rsasig'
}
libreswan::connection{ 'outgoing' :
right => '<the IP Address of the client you are connecting to.>'
rightrsasigkey => '%cert',
notify => Service['ipsec'],
auto => 'start'
}
}
This will add two files to the ipsec
directory, default.conf
and outgoing.conf
. These are the connection files that will be used by the libreswan daemon.
NOTE: If you delete a connection from the site manifest, it will not delete it from the directory automatically.
See REFERENCE.md
Please read our Contribution Guide.
Unit tests, written in rspec-puppet
can be run by calling:
bundle exec rake spec
To run the system tests, you need Vagrant installed. Then, run:
bundle exec rake beaker:suites
Some environment variables may be useful:
BEAKER_debug=true
BEAKER_provision=no
BEAKER_destroy=no
BEAKER_use_fixtures_dir_for_modules=yes
BEAKER_debug
: show the commands being run on the STU and their output.BEAKER_destroy=no
: prevent the machine destruction after the tests finish so you can inspect the state.BEAKER_provision=no
: prevent the machine from being recreated. This can save a lot of time while you're writing the tests.BEAKER_use_fixtures_dir_for_modules=yes
: cause all module dependencies to be loaded from thespec/fixtures/modules
directory, based on the contents of.fixtures.yml
. The contents of this directory are usually populated bybundle exec rake spec_prep
. This can be used to run acceptance tests to run on isolated networks.