<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="de">
	<id>https://wiki.ixheim.de/index.php?action=history&amp;feed=atom&amp;title=Ip_xfrm</id>
	<title>Ip xfrm - Versionsgeschichte</title>
	<link rel="self" type="application/atom+xml" href="https://wiki.ixheim.de/index.php?action=history&amp;feed=atom&amp;title=Ip_xfrm"/>
	<link rel="alternate" type="text/html" href="https://wiki.ixheim.de/index.php?title=Ip_xfrm&amp;action=history"/>
	<updated>2026-05-15T02:59:44Z</updated>
	<subtitle>Versionsgeschichte dieser Seite in Xinux Wiki</subtitle>
	<generator>MediaWiki 1.35.1</generator>
	<entry>
		<id>https://wiki.ixheim.de/index.php?title=Ip_xfrm&amp;diff=14790&amp;oldid=prev</id>
		<title>Thomas: Die Seite wurde neu angelegt: „=Prinzip= ==tic==  ip xfrm state flush    ip xfrm state add src 192.168.244.53 dst 192.168.244.52  proto esp spi 0x12345678 \  reqid 0x12345678 mode tunnel aut…“</title>
		<link rel="alternate" type="text/html" href="https://wiki.ixheim.de/index.php?title=Ip_xfrm&amp;diff=14790&amp;oldid=prev"/>
		<updated>2017-10-22T06:51:44Z</updated>

		<summary type="html">&lt;p&gt;Die Seite wurde neu angelegt: „=Prinzip= ==tic==  ip xfrm state flush    ip xfrm state add src 192.168.244.53 dst 192.168.244.52  proto esp spi 0x12345678 \  reqid 0x12345678 mode tunnel aut…“&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Neue Seite&lt;/b&gt;&lt;/p&gt;&lt;div&gt;=Prinzip=&lt;br /&gt;
==tic==&lt;br /&gt;
 ip xfrm state flush&lt;br /&gt;
 &lt;br /&gt;
 ip xfrm state add src 192.168.244.53 dst 192.168.244.52  proto esp spi 0x12345678 \&lt;br /&gt;
 reqid 0x12345678 mode tunnel auth sha256 0x1234567890123456789012345678901234567890123456789012345678901234 \&lt;br /&gt;
 enc aes 0x0000123456789012345678901234567890123456789012345678901234567890&lt;br /&gt;
 &lt;br /&gt;
 ip xfrm state add src 192.168.244.52 dst 192.168.244.53  proto esp spi 0x12345678 \&lt;br /&gt;
 reqid 0x12345678 mode tunnel auth sha256 0x1234567890123456789012345678901234567890123456789012345678901234 \&lt;br /&gt;
 enc aes 0x0000123456789012345678901234567890123456789012345678901234567890&lt;br /&gt;
 &lt;br /&gt;
 ip xfrm policy flush&lt;br /&gt;
 &lt;br /&gt;
 ip xfrm policy add src 10.10.53.0/24 dst 10.10.52.0/24 dir out tmpl src 192.168.244.53 dst 192.168.244.52 \&lt;br /&gt;
 proto esp reqid 0x12345678 mode tunnel&lt;br /&gt;
 &lt;br /&gt;
 ip xfrm policy add src 10.10.52.0/24 dst 10.10.53.0/24 dir in tmpl src 192.168.244.52 dst 192.168.244.53 \&lt;br /&gt;
 proto esp reqid 0x12345678 mode tunnel&lt;br /&gt;
&lt;br /&gt;
==nogger==&lt;br /&gt;
 ip xfrm state flush&lt;br /&gt;
 &lt;br /&gt;
 ip xfrm state add src 192.168.244.53 dst 192.168.244.52  proto esp spi 0x12345678 \&lt;br /&gt;
 reqid 0x12345678 mode tunnel auth sha256 0x1234567890123456789012345678901234567890123456789012345678901234 \&lt;br /&gt;
 enc aes 0x0000123456789012345678901234567890123456789012345678901234567890&lt;br /&gt;
 &lt;br /&gt;
 ip xfrm state add src 192.168.244.52 dst 192.168.244.53  proto esp spi 0x12345678 \&lt;br /&gt;
 reqid 0x12345678 mode tunnel auth sha256 0x1234567890123456789012345678901234567890123456789012345678901234 \&lt;br /&gt;
 enc aes 0x0000123456789012345678901234567890123456789012345678901234567890&lt;br /&gt;
 &lt;br /&gt;
 ip xfrm policy flush&lt;br /&gt;
 &lt;br /&gt;
 ip xfrm policy add src 10.10.52.0/24 dst 10.10.53.0/24 dir out tmpl src 192.168.244.52 dst 192.168.244.53 \&lt;br /&gt;
 proto esp reqid 0x12345678 mode tunnel&lt;br /&gt;
 &lt;br /&gt;
 ip xfrm policy add src 10.10.53.0/24 dst 10.10.52.0/24 dir in tmpl src 192.168.244.53 dst 192.168.244.52 \&lt;br /&gt;
 proto esp reqid 0x12345678 mode tunnel&lt;br /&gt;
&lt;br /&gt;
==Kontrolle==&lt;br /&gt;
*ip xfrm state&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
 src 192.168.244.52 dst 192.168.244.53&lt;br /&gt;
 	proto esp spi 0x12345678 reqid 305419896 mode tunnel&lt;br /&gt;
	replay-window 0 &lt;br /&gt;
	auth-trunc hmac(sha256) 0x1234567890123456789012345678901234567890123456789012345678901234 96&lt;br /&gt;
	enc cbc(aes) 0x0000123456789012345678901234567890123456789012345678901234567890&lt;br /&gt;
	anti-replay context: seq 0x0, oseq 0x0, bitmap 0x00000000&lt;br /&gt;
	sel src 0.0.0.0/0 dst 0.0.0.0/0 &lt;br /&gt;
 src 192.168.244.53 dst 192.168.244.52&lt;br /&gt;
	proto esp spi 0x12345678 reqid 305419896 mode tunnel&lt;br /&gt;
	replay-window 0 &lt;br /&gt;
	auth-trunc hmac(sha256) 0x1234567890123456789012345678901234567890123456789012345678901234 96&lt;br /&gt;
	enc cbc(aes) 0x0000123456789012345678901234567890123456789012345678901234567890&lt;br /&gt;
	anti-replay context: seq 0x0, oseq 0x196, bitmap 0x00000000&lt;br /&gt;
	sel src 0.0.0.0/0 dst 0.0.0.0/0 &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
*ip xfrm policy&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
 src 10.10.52.0/24 dst 10.10.53.0/24 &lt;br /&gt;
 	dir in priority 0 &lt;br /&gt;
 	tmpl src 192.168.244.52 dst 192.168.244.53&lt;br /&gt;
		proto esp reqid 305419896 mode tunnel&lt;br /&gt;
 src 10.10.53.0/24 dst 10.10.52.0/24 &lt;br /&gt;
	dir out priority 0 &lt;br /&gt;
	tmpl src 192.168.244.53 dst 192.168.244.52&lt;br /&gt;
		proto esp reqid 305419896 mode tunnel&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
*ip xfrm monitor &lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
Async event  (0x10)  replay update &lt;br /&gt;
	src 192.168.244.53 dst 192.168.244.52  reqid 0x12345678 protocol esp  SPI 0x12345678&lt;br /&gt;
Async event  (0x20)  timer expired &lt;br /&gt;
	src 192.168.244.53 dst 192.168.244.52  reqid 0x12345678 protocol esp  SPI 0x12345678&lt;br /&gt;
Async event  (0x20)  timer expired &lt;br /&gt;
	src 192.168.244.53 dst 192.168.244.52  reqid 0x12345678 protocol esp  SPI 0x12345678&lt;br /&gt;
Async event  (0x20)  timer expired &lt;br /&gt;
	src 192.168.244.53 dst 192.168.244.52  reqid 0x12345678 protocol esp  SPI 0x12345678&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=Skript=&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*/usr/local/sbin/tunnel.sh&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
#!/bin/bashWireshark VPN entschlüsseln&lt;br /&gt;
&lt;br /&gt;
if [ &amp;quot;$4&amp;quot; == &amp;quot;&amp;quot; ]; then&lt;br /&gt;
    echo &amp;quot;usage: $0 &amp;lt;local_ip&amp;gt; &amp;lt;remote_ip&amp;gt; &amp;lt;new_local_ip&amp;gt; &amp;lt;new_remote_ip&amp;gt;&amp;quot;&lt;br /&gt;
    echo &amp;quot;creates an ipsec tunnel between two machines&amp;quot;&lt;br /&gt;
    exit 1&lt;br /&gt;
fi&lt;br /&gt;
&lt;br /&gt;
SRC=&amp;quot;$1&amp;quot;; shift&lt;br /&gt;
DST=&amp;quot;$1&amp;quot;; shift&lt;br /&gt;
LOCAL=&amp;quot;$1&amp;quot;; shift&lt;br /&gt;
REMOTE=&amp;quot;$1&amp;quot;; shift&lt;br /&gt;
&lt;br /&gt;
KEY1=0x`dd if=/dev/urandom count=32 bs=1 2&amp;gt; /dev/null| xxd -p -c 64`&lt;br /&gt;
KEY2=0x`dd if=/dev/urandom count=32 bs=1 2&amp;gt; /dev/null| xxd -p -c 64`&lt;br /&gt;
echo KEY1 = $KEY1&lt;br /&gt;
echo KEY2 = $KEY2&lt;br /&gt;
ID=0x`dd if=/dev/urandom count=4 bs=1 2&amp;gt; /dev/null| xxd -p -c 8`&lt;br /&gt;
&lt;br /&gt;
echo &amp;quot;spdflush; flush;&amp;quot; | sudo setkey -c&lt;br /&gt;
echo ip xfrm state add src $SRC dst $DST proto esp spi $ID reqid $ID mode tunnel auth sha256 $KEY1 enc aes $KEY2&lt;br /&gt;
sudo ip xfrm state add src $SRC dst $DST proto esp spi $ID reqid $ID mode tunnel auth sha256 $KEY1 enc aes $KEY2&lt;br /&gt;
echo ip xfrm state add src $DST dst $SRC proto esp spi $ID reqid $ID mode tunnel auth sha256 $KEY1 enc aes $KEY2&lt;br /&gt;
sudo ip xfrm state add src $DST dst $SRC proto esp spi $ID reqid $ID mode tunnel auth sha256 $KEY1 enc aes $KEY2&lt;br /&gt;
echo ip xfrm policy add src $LOCAL dst $REMOTE dir out tmpl src $SRC dst $DST proto esp reqid $ID mode tunnel&lt;br /&gt;
sudo ip xfrm policy add src $LOCAL dst $REMOTE dir out tmpl src $SRC dst $DST proto esp reqid $ID mode tunnel&lt;br /&gt;
echo ip xfrm policy add src $REMOTE dst $LOCAL dir in tmpl src $DST dst $SRC proto esp reqid $ID mode tunnel&lt;br /&gt;
sudo ip xfrm policy add src $REMOTE dst $LOCAL dir in tmpl src $DST dst $SRC proto esp reqid $ID mode tunnel&lt;br /&gt;
#echo 5&lt;br /&gt;
#sudo ip addr add $LOCAL dev lo&lt;br /&gt;
#echo 6&lt;br /&gt;
#sudo ip route add $REMOTE dev eth0 src $LOCAL&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
ssh $DST /bin/bash &amp;lt;&amp;lt; EOF&lt;br /&gt;
    echo &amp;quot;spdflush; flush;&amp;quot; | sudo setkey -c&lt;br /&gt;
    sudo ip xfrm state add src $SRC dst $DST proto esp spi $ID reqid $ID mode tunnel auth sha256 $KEY1 enc aes $KEY2&lt;br /&gt;
    sudo ip xfrm state add src $DST dst $SRC proto esp spi $ID reqid $ID mode tunnel auth sha256 $KEY1 enc aes $KEY2&lt;br /&gt;
    sudo ip xfrm policy add src $REMOTE dst $LOCAL dir out tmpl src $DST dst $SRC proto esp reqid $ID mode tunnel&lt;br /&gt;
    sudo ip xfrm policy add src $LOCAL dst $REMOTE dir in tmpl src $SRC dst $DST proto esp reqid $ID mode tunnel&lt;br /&gt;
#    sudo ip addr add $REMOTE dev lo&lt;br /&gt;
#    sudo ip route add $LOCAL dev eth0 src $REMOTE&lt;br /&gt;
EOF&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=Links=&lt;br /&gt;
*https://gist.github.com/vishvananda/7094676&lt;/div&gt;</summary>
		<author><name>Thomas</name></author>
	</entry>
</feed>