blob: e45b6486ae9a19a98a4498a81b249ced92a23de4 [file] [log] [blame]
#!/bin/sh
#
# sa-up.sh local configuration for a new SA
#
PATH=/bin:/sbin:/usr/bin:/usr/sbin:/usr/local/bin:/usr/local/sbin
case `uname -s` in
NetBSD)
DEFAULT_GW=`netstat -rn | awk '($1 == "default"){print $2}'`
;;
Linux)
DEFAULT_GW=`netstat -rn | awk '($1 == "0.0.0.0"){print $2}'`
;;
esac
echo $@
echo "LOCAL_ADDR = ${LOCAL_ADDR}"
echo "LOCAL_PORT = ${LOCAL_PORT}"
echo "REMOTE_ADDR = ${REMOTE_ADDR}"
echo "REMOTE_PORT = ${REMOTE_PORT}"
echo "DEFAULT_GW = ${DEFAULT_GW}"
echo "INTERNAL_ADDR4 = ${INTERNAL_ADDR4}"
echo "INTERNAL_DNS4 = ${INTERNAL_DNS4}"
echo ${INTERNAL_ADDR4} | grep '[0-9]' > /dev/null || exit 0
echo ${DEFAULT_GW} | grep '[0-9]' > /dev/null || exit 0
test -f /etc/resolv.conf.bak || cp /etc/resolv.conf /etc/resolv.conf.bak
echo "# Generated by racoon on `date`" > /etc/resolv.conf
echo "nameserver ${INTERNAL_DNS4}" >> /etc/resolv.conf
case `uname -s` in
NetBSD)
if=`netstat -rn|awk '($1 == "default"){print $7}'`
ifconfig ${if} alias ${INTERNAL_ADDR4} netmask ${INTERNAL_NETMASK4}
route delete default
route add default ${DEFAULT_GW} -ifa ${INTERNAL_ADDR4}
route add ${REMOTE_ADDR} ${DEFAULT_GW}
;;
Linux)
if=`netstat -rn|awk '($1 == "0.0.0.0"){print $8}'`
ifconfig ${if}:1 ${INTERNAL_ADDR4}
route delete default
route add ${REMOTE_ADDR} gw ${DEFAULT_GW} dev ${if}
route add default gw ${DEFAULT_GW} dev ${if}:1
;;
esac
# Use this for a NAT-T setup
LOCAL="${LOCAL_ADDR}[${LOCAL_PORT}]"
REMOTE="${REMOTE_ADDR}[${REMOTE_PORT}]"
# Use this for a non NAT-T setup
#LOCAL="${LOCAL_ADDR}"
#REMOTE="${REMOTE_ADDR}"
echo "
spdadd ${INTERNAL_ADDR4}/32[any] 0.0.0.0/0[any] any
-P out ipsec esp/tunnel/${LOCAL}-${REMOTE}/require;
spdadd 0.0.0.0/0[any] ${INTERNAL_ADDR4}[any] any
-P in ipsec esp/tunnel/${REMOTE}-${LOCAL}/require;
" | setkey -c
#
# XXX This is a workaround for Linux forward policies problem.
# Someone familiar with forward policies please fix this properly.
#
case `uname -s` in
Linux)
echo "
spddelete 0.0.0.0/0[any] ${INTERNAL_ADDR4}[any] any
-P fwd ipsec esp/tunnel/${REMOTE}-${LOCAL}/require;
" | setkey -c
;;
esac