Linux IPSec between Amazon EC2 instances on same subnet The 2019 Stack Overflow Developer Survey Results Are InHow to encrypt traffic between two Amazon EC2 instances?IPSec VPN between Amazon VPC and Linux ServerstrongSwan IPsec server with AWS EC2 VPC VPN clientIs it worth setting up a private subnet in Amazon EC2 (VPC)Windows 2008 R2 IPsec encryption in tunnel mode, hosts in same subnetCreating redundant IPSec connections using OpenSwanIPv6 IPsec between two native IPv6 networksRouting between EC2 instances not coming throughpfsense ipsec vpn to amazon aws not connectingRouting between OpenSWAN / IPSEC tunnels

What does ひと匙 mean in this manga and has it been used colloquially?

Why hard-Brexiteers don't insist on a hard border to prevent illegal immigration after Brexit?

Why is the Constellation's nose gear so long?

Why do we hear so much about the Trump administration deciding to impose and then remove tariffs?

Are there incongruent pythagorean triangles with the same perimeter and same area?

Deal with toxic manager when you can't quit

Which Sci-Fi work first showed weapon of galactic-scale mass destruction?

Apparent duplicates between Haynes service instructions and MOT

How to save as into a customized destination on macOS?

Is this app Icon Browser Safe/Legit?

Return to UK after having been refused entry years ago

Worn-tile Scrabble

Who coined the term "madman theory"?

When should I buy a clipper card after flying to OAK?

Is "plugging out" electronic devices an American expression?

The difference between dialogue marks

slides for 30min~1hr skype tenure track application interview

What is the meaning of the verb "bear" in this context?

What is the meaning of Triage in Cybersec world?

Landlord wants to switch my lease to a "Land contract" to "get back at the city"

Falsification in Math vs Science

For what reasons would an animal species NOT cross a *horizontal* land bridge?

What is the accessibility of a package's `Private` context variables?

Delete all lines which don't have n characters before delimiter



Linux IPSec between Amazon EC2 instances on same subnet



The 2019 Stack Overflow Developer Survey Results Are InHow to encrypt traffic between two Amazon EC2 instances?IPSec VPN between Amazon VPC and Linux ServerstrongSwan IPsec server with AWS EC2 VPC VPN clientIs it worth setting up a private subnet in Amazon EC2 (VPC)Windows 2008 R2 IPsec encryption in tunnel mode, hosts in same subnetCreating redundant IPSec connections using OpenSwanIPv6 IPsec between two native IPv6 networksRouting between EC2 instances not coming throughpfsense ipsec vpn to amazon aws not connectingRouting between OpenSWAN / IPSEC tunnels



.everyoneloves__top-leaderboard:empty,.everyoneloves__mid-leaderboard:empty,.everyoneloves__bot-mid-leaderboard:empty height:90px;width:728px;box-sizing:border-box;








0















I have a requirement to secure all communications between our Linux instances on Amazon EC2 - we need to treat the EC2 network as compromised and therefore want to protect the data that's being transferred within the EC2 subnet(s). The instances to secure will all be on the same subnet. I'm a Windows bod with limited Linux abilities, so am familiar with IPSec terminology and can find my way around Linux, but haven't got a clue when it comes to setting up Linux IPSec environments.



Can anyone throw me some information for setting up IPSec between all (Linux) hosts on a subnet please? I can only find information that pertains to site-to-site connections, or host-to-host connections and nothing that covers all Lan communication. We're currently using OpenSwan for site-to-site VPNs if that helps.



Updated with more information



This is an example config (very basic to connect between two hosts using a pre-shared key):



 conn test
type=tunnel
auto=start
authby=secret
left=10.0.2.4
right=10.0.2.5
pfs=yes


If I now want to secure all traffic between 4 hosts for instance (or 8,10,100 etc), is there a way to make the left and right parameters more generic, so they mean 'encrypt traffic between all hosts' rather than having to explicitly specify a left and right host.



My goal would be to achieve a generic configuration that has no hardcoded host IP's (subnets would be OK), so that we could include the configuration in our EC2 image.



Thanks Mick










share|improve this question



















  • 1





    You should not be on EC2 at all. If you can't trust Amazon's private network, you certainly can't trust their storage or servers either. Move in-house on a private cloud.

    – Michael Hampton
    Mar 13 '14 at 13:25











  • Yep, you're correct, which is why we are already using other third party solutions to mitigate those risks. Amazon's network is likely fairly secure, but as in any industry, a malicious person inside the company with access to the various networks may choose to capture data. We take many of the same steps for our internal services.

    – MJM
    Mar 16 '14 at 7:52

















0















I have a requirement to secure all communications between our Linux instances on Amazon EC2 - we need to treat the EC2 network as compromised and therefore want to protect the data that's being transferred within the EC2 subnet(s). The instances to secure will all be on the same subnet. I'm a Windows bod with limited Linux abilities, so am familiar with IPSec terminology and can find my way around Linux, but haven't got a clue when it comes to setting up Linux IPSec environments.



Can anyone throw me some information for setting up IPSec between all (Linux) hosts on a subnet please? I can only find information that pertains to site-to-site connections, or host-to-host connections and nothing that covers all Lan communication. We're currently using OpenSwan for site-to-site VPNs if that helps.



Updated with more information



This is an example config (very basic to connect between two hosts using a pre-shared key):



 conn test
type=tunnel
auto=start
authby=secret
left=10.0.2.4
right=10.0.2.5
pfs=yes


If I now want to secure all traffic between 4 hosts for instance (or 8,10,100 etc), is there a way to make the left and right parameters more generic, so they mean 'encrypt traffic between all hosts' rather than having to explicitly specify a left and right host.



My goal would be to achieve a generic configuration that has no hardcoded host IP's (subnets would be OK), so that we could include the configuration in our EC2 image.



Thanks Mick










share|improve this question



















  • 1





    You should not be on EC2 at all. If you can't trust Amazon's private network, you certainly can't trust their storage or servers either. Move in-house on a private cloud.

    – Michael Hampton
    Mar 13 '14 at 13:25











  • Yep, you're correct, which is why we are already using other third party solutions to mitigate those risks. Amazon's network is likely fairly secure, but as in any industry, a malicious person inside the company with access to the various networks may choose to capture data. We take many of the same steps for our internal services.

    – MJM
    Mar 16 '14 at 7:52













0












0








0








I have a requirement to secure all communications between our Linux instances on Amazon EC2 - we need to treat the EC2 network as compromised and therefore want to protect the data that's being transferred within the EC2 subnet(s). The instances to secure will all be on the same subnet. I'm a Windows bod with limited Linux abilities, so am familiar with IPSec terminology and can find my way around Linux, but haven't got a clue when it comes to setting up Linux IPSec environments.



Can anyone throw me some information for setting up IPSec between all (Linux) hosts on a subnet please? I can only find information that pertains to site-to-site connections, or host-to-host connections and nothing that covers all Lan communication. We're currently using OpenSwan for site-to-site VPNs if that helps.



Updated with more information



This is an example config (very basic to connect between two hosts using a pre-shared key):



 conn test
type=tunnel
auto=start
authby=secret
left=10.0.2.4
right=10.0.2.5
pfs=yes


If I now want to secure all traffic between 4 hosts for instance (or 8,10,100 etc), is there a way to make the left and right parameters more generic, so they mean 'encrypt traffic between all hosts' rather than having to explicitly specify a left and right host.



My goal would be to achieve a generic configuration that has no hardcoded host IP's (subnets would be OK), so that we could include the configuration in our EC2 image.



Thanks Mick










share|improve this question
















I have a requirement to secure all communications between our Linux instances on Amazon EC2 - we need to treat the EC2 network as compromised and therefore want to protect the data that's being transferred within the EC2 subnet(s). The instances to secure will all be on the same subnet. I'm a Windows bod with limited Linux abilities, so am familiar with IPSec terminology and can find my way around Linux, but haven't got a clue when it comes to setting up Linux IPSec environments.



Can anyone throw me some information for setting up IPSec between all (Linux) hosts on a subnet please? I can only find information that pertains to site-to-site connections, or host-to-host connections and nothing that covers all Lan communication. We're currently using OpenSwan for site-to-site VPNs if that helps.



Updated with more information



This is an example config (very basic to connect between two hosts using a pre-shared key):



 conn test
type=tunnel
auto=start
authby=secret
left=10.0.2.4
right=10.0.2.5
pfs=yes


If I now want to secure all traffic between 4 hosts for instance (or 8,10,100 etc), is there a way to make the left and right parameters more generic, so they mean 'encrypt traffic between all hosts' rather than having to explicitly specify a left and right host.



My goal would be to achieve a generic configuration that has no hardcoded host IP's (subnets would be OK), so that we could include the configuration in our EC2 image.



Thanks Mick







amazon-ec2 linux-networking ipsec






share|improve this question















share|improve this question













share|improve this question




share|improve this question








edited Mar 16 '14 at 7:54







MJM

















asked Mar 13 '14 at 8:30









MJMMJM

11




11







  • 1





    You should not be on EC2 at all. If you can't trust Amazon's private network, you certainly can't trust their storage or servers either. Move in-house on a private cloud.

    – Michael Hampton
    Mar 13 '14 at 13:25











  • Yep, you're correct, which is why we are already using other third party solutions to mitigate those risks. Amazon's network is likely fairly secure, but as in any industry, a malicious person inside the company with access to the various networks may choose to capture data. We take many of the same steps for our internal services.

    – MJM
    Mar 16 '14 at 7:52












  • 1





    You should not be on EC2 at all. If you can't trust Amazon's private network, you certainly can't trust their storage or servers either. Move in-house on a private cloud.

    – Michael Hampton
    Mar 13 '14 at 13:25











  • Yep, you're correct, which is why we are already using other third party solutions to mitigate those risks. Amazon's network is likely fairly secure, but as in any industry, a malicious person inside the company with access to the various networks may choose to capture data. We take many of the same steps for our internal services.

    – MJM
    Mar 16 '14 at 7:52







1




1





You should not be on EC2 at all. If you can't trust Amazon's private network, you certainly can't trust their storage or servers either. Move in-house on a private cloud.

– Michael Hampton
Mar 13 '14 at 13:25





You should not be on EC2 at all. If you can't trust Amazon's private network, you certainly can't trust their storage or servers either. Move in-house on a private cloud.

– Michael Hampton
Mar 13 '14 at 13:25













Yep, you're correct, which is why we are already using other third party solutions to mitigate those risks. Amazon's network is likely fairly secure, but as in any industry, a malicious person inside the company with access to the various networks may choose to capture data. We take many of the same steps for our internal services.

– MJM
Mar 16 '14 at 7:52





Yep, you're correct, which is why we are already using other third party solutions to mitigate those risks. Amazon's network is likely fairly secure, but as in any industry, a malicious person inside the company with access to the various networks may choose to capture data. We take many of the same steps for our internal services.

– MJM
Mar 16 '14 at 7:52










1 Answer
1






active

oldest

votes


















0














The short story, yes, there should not be any problem to run tunnels between hosts on a subnet and instead of adding routes to networks behind endpoints you would have to add host routes (/32) instead.



A generic guide on how to set up a site to site tunnel could be of use: Building a site-to-site VPN with Debian/Ubuntu and Openswan



I would personally use OpenVPN because of it's much simpler nature but if IPSec is required you will have to use OpenSwan.






share|improve this answer























  • Thanks. I've updated the question in response to your reply. Having to explicitly specify a host for the left and right parameters won't scale, and i'm asusming the host routes you mention need to go into the leftsubnet/rightsubnet parameters - what would need to go into the left/right parameters?

    – MJM
    Mar 16 '14 at 8:03











  • Host-To-Host VPN Using Openswan details how to accomplish host-to-host tunnels. You are referring to mesh-tunneling which I'm not sure of how to achieve.

    – mingalsuo
    Apr 9 '14 at 10:26












Your Answer








StackExchange.ready(function()
var channelOptions =
tags: "".split(" "),
id: "2"
;
initTagRenderer("".split(" "), "".split(" "), channelOptions);

StackExchange.using("externalEditor", function()
// Have to fire editor after snippets, if snippets enabled
if (StackExchange.settings.snippets.snippetsEnabled)
StackExchange.using("snippets", function()
createEditor();
);

else
createEditor();

);

function createEditor()
StackExchange.prepareEditor(
heartbeatType: 'answer',
autoActivateHeartbeat: false,
convertImagesToLinks: true,
noModals: true,
showLowRepImageUploadWarning: true,
reputationToPostImages: 10,
bindNavPrevention: true,
postfix: "",
imageUploader:
brandingHtml: "Powered by u003ca class="icon-imgur-white" href="https://imgur.com/"u003eu003c/au003e",
contentPolicyHtml: "User contributions licensed under u003ca href="https://creativecommons.org/licenses/by-sa/3.0/"u003ecc by-sa 3.0 with attribution requiredu003c/au003e u003ca href="https://stackoverflow.com/legal/content-policy"u003e(content policy)u003c/au003e",
allowUrls: true
,
onDemand: true,
discardSelector: ".discard-answer"
,immediatelyShowMarkdownHelp:true
);



);













draft saved

draft discarded


















StackExchange.ready(
function ()
StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fserverfault.com%2fquestions%2f581733%2flinux-ipsec-between-amazon-ec2-instances-on-same-subnet%23new-answer', 'question_page');

);

Post as a guest















Required, but never shown

























1 Answer
1






active

oldest

votes








1 Answer
1






active

oldest

votes









active

oldest

votes






active

oldest

votes









0














The short story, yes, there should not be any problem to run tunnels between hosts on a subnet and instead of adding routes to networks behind endpoints you would have to add host routes (/32) instead.



A generic guide on how to set up a site to site tunnel could be of use: Building a site-to-site VPN with Debian/Ubuntu and Openswan



I would personally use OpenVPN because of it's much simpler nature but if IPSec is required you will have to use OpenSwan.






share|improve this answer























  • Thanks. I've updated the question in response to your reply. Having to explicitly specify a host for the left and right parameters won't scale, and i'm asusming the host routes you mention need to go into the leftsubnet/rightsubnet parameters - what would need to go into the left/right parameters?

    – MJM
    Mar 16 '14 at 8:03











  • Host-To-Host VPN Using Openswan details how to accomplish host-to-host tunnels. You are referring to mesh-tunneling which I'm not sure of how to achieve.

    – mingalsuo
    Apr 9 '14 at 10:26
















0














The short story, yes, there should not be any problem to run tunnels between hosts on a subnet and instead of adding routes to networks behind endpoints you would have to add host routes (/32) instead.



A generic guide on how to set up a site to site tunnel could be of use: Building a site-to-site VPN with Debian/Ubuntu and Openswan



I would personally use OpenVPN because of it's much simpler nature but if IPSec is required you will have to use OpenSwan.






share|improve this answer























  • Thanks. I've updated the question in response to your reply. Having to explicitly specify a host for the left and right parameters won't scale, and i'm asusming the host routes you mention need to go into the leftsubnet/rightsubnet parameters - what would need to go into the left/right parameters?

    – MJM
    Mar 16 '14 at 8:03











  • Host-To-Host VPN Using Openswan details how to accomplish host-to-host tunnels. You are referring to mesh-tunneling which I'm not sure of how to achieve.

    – mingalsuo
    Apr 9 '14 at 10:26














0












0








0







The short story, yes, there should not be any problem to run tunnels between hosts on a subnet and instead of adding routes to networks behind endpoints you would have to add host routes (/32) instead.



A generic guide on how to set up a site to site tunnel could be of use: Building a site-to-site VPN with Debian/Ubuntu and Openswan



I would personally use OpenVPN because of it's much simpler nature but if IPSec is required you will have to use OpenSwan.






share|improve this answer













The short story, yes, there should not be any problem to run tunnels between hosts on a subnet and instead of adding routes to networks behind endpoints you would have to add host routes (/32) instead.



A generic guide on how to set up a site to site tunnel could be of use: Building a site-to-site VPN with Debian/Ubuntu and Openswan



I would personally use OpenVPN because of it's much simpler nature but if IPSec is required you will have to use OpenSwan.







share|improve this answer












share|improve this answer



share|improve this answer










answered Mar 13 '14 at 9:23









mingalsuomingalsuo

412




412












  • Thanks. I've updated the question in response to your reply. Having to explicitly specify a host for the left and right parameters won't scale, and i'm asusming the host routes you mention need to go into the leftsubnet/rightsubnet parameters - what would need to go into the left/right parameters?

    – MJM
    Mar 16 '14 at 8:03











  • Host-To-Host VPN Using Openswan details how to accomplish host-to-host tunnels. You are referring to mesh-tunneling which I'm not sure of how to achieve.

    – mingalsuo
    Apr 9 '14 at 10:26


















  • Thanks. I've updated the question in response to your reply. Having to explicitly specify a host for the left and right parameters won't scale, and i'm asusming the host routes you mention need to go into the leftsubnet/rightsubnet parameters - what would need to go into the left/right parameters?

    – MJM
    Mar 16 '14 at 8:03











  • Host-To-Host VPN Using Openswan details how to accomplish host-to-host tunnels. You are referring to mesh-tunneling which I'm not sure of how to achieve.

    – mingalsuo
    Apr 9 '14 at 10:26

















Thanks. I've updated the question in response to your reply. Having to explicitly specify a host for the left and right parameters won't scale, and i'm asusming the host routes you mention need to go into the leftsubnet/rightsubnet parameters - what would need to go into the left/right parameters?

– MJM
Mar 16 '14 at 8:03





Thanks. I've updated the question in response to your reply. Having to explicitly specify a host for the left and right parameters won't scale, and i'm asusming the host routes you mention need to go into the leftsubnet/rightsubnet parameters - what would need to go into the left/right parameters?

– MJM
Mar 16 '14 at 8:03













Host-To-Host VPN Using Openswan details how to accomplish host-to-host tunnels. You are referring to mesh-tunneling which I'm not sure of how to achieve.

– mingalsuo
Apr 9 '14 at 10:26






Host-To-Host VPN Using Openswan details how to accomplish host-to-host tunnels. You are referring to mesh-tunneling which I'm not sure of how to achieve.

– mingalsuo
Apr 9 '14 at 10:26


















draft saved

draft discarded
















































Thanks for contributing an answer to Server Fault!


  • Please be sure to answer the question. Provide details and share your research!

But avoid


  • Asking for help, clarification, or responding to other answers.

  • Making statements based on opinion; back them up with references or personal experience.

To learn more, see our tips on writing great answers.




draft saved


draft discarded














StackExchange.ready(
function ()
StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fserverfault.com%2fquestions%2f581733%2flinux-ipsec-between-amazon-ec2-instances-on-same-subnet%23new-answer', 'question_page');

);

Post as a guest















Required, but never shown





















































Required, but never shown














Required, but never shown












Required, but never shown







Required, but never shown

































Required, but never shown














Required, but never shown












Required, but never shown







Required, but never shown







Popular posts from this blog

Wikipedia:Vital articles Мазмуну Biography - Өмүр баян Philosophy and psychology - Философия жана психология Religion - Дин Social sciences - Коомдук илимдер Language and literature - Тил жана адабият Science - Илим Technology - Технология Arts and recreation - Искусство жана эс алуу History and geography - Тарых жана география Навигация менюсу

Bruxelas-Capital Índice Historia | Composición | Situación lingüística | Clima | Cidades irmandadas | Notas | Véxase tamén | Menú de navegacióneO uso das linguas en Bruxelas e a situación do neerlandés"Rexión de Bruxelas Capital"o orixinalSitio da rexiónPáxina de Bruselas no sitio da Oficina de Promoción Turística de Valonia e BruxelasMapa Interactivo da Rexión de Bruxelas-CapitaleeWorldCat332144929079854441105155190212ID28008674080552-90000 0001 0666 3698n94104302ID540940339365017018237

What should I write in an apology letter, since I have decided not to join a company after accepting an offer letterShould I keep looking after accepting a job offer?What should I do when I've been verbally told I would get an offer letter, but still haven't gotten one after 4 weeks?Do I accept an offer from a company that I am not likely to join?New job hasn't confirmed starting date and I want to give current employer as much notice as possibleHow should I address my manager in my resignation letter?HR delayed background verification, now jobless as resignedNo email communication after accepting a formal written offer. How should I phrase the call?What should I do if after receiving a verbal offer letter I am informed that my written job offer is put on hold due to some internal issues?Should I inform the current employer that I am about to resign within 1-2 weeks since I have signed the offer letter and waiting for visa?What company will do, if I send their offer letter to another company