[BitVisor-devel-en:123] Re: Bitvisor Wireguard problems?

Lonnie Cumberland lonnie at outstep.com
Tue Jun 18 19:28:21 JST 2024


Hello Hideki,

Thanks so very much for getting back to me and for your response about 
IPsec.  Given the age of it that you mention, it may not be a fruitful 
endeavor to go that route, but I think that digging into the syslogs 
more will be helpful and will work on getting them set up properly to 
yield information about what may be happening here.

Maybe if the IPsec is so very old then perhaps removing it completely 
from Bitvisor would be  an option to consider and just rely on Wireguard 
since it is a more modern solution although, I would have to see how 
many dependencies it would affect in the code base as well.

Of course, I will be happy to report any findings and possible 
resolutions  that I come up with in this area.

My hope is that maybe we can continue to discuss Bitvisor as it really 
is more of a research project for me at the moment while in the learning 
stage and while hoping to get it to a viable state with Wireguard but 
ultimately the goal is to rework that area to make it a P2P solution 
with Wireguard as the base.

Best Regards and have a great day,
Lonnie


On 6/18/2024 6:06 AM, Hideki EIRAKU wrote:
> Hello,
>
> If BitVisor looks crashed, enabling syslog makes debugging easier.
> docs/getting_started.md describes about the syslog feature.
>
>> Now I need your help as in looking over the default ".vpn" settings it
>> seems as though someone was able to connect with a SoftEther server
>> perhaps on VPN-Gate and I also have a SoftEther server set up and
>> would like to do a test to see if that works since if it does then
>> that effectively confirms that there is a bug in the Wireguard code
>> that is causing the crash and hope fully the person that developed it
>> can help locate that bug to get it fixed, if at all possible.
> The IPsec VPN feature in BitVisor was introduced before the open
> sourced SoftEther VPN was released.  About 15 years ago, I tested it
> with Linux IPsec and racoon daemon.  I could not find what I did at
> that time.  In addition, it probably has security issues because of
> the too old version of OpenSSL and poor random number generation in
> crypto/chelp/chelp.c.
>
> The racoon.conf file that I probably used in 2009 has the following
> lines, just for your information:
>
> ------------------------------------------------------------
> path pre_shared_key "/etc/racoon/psk.txt";
> path certificate "/etc/racoon/certs";
> remote anonymous {
>          exchange_mode aggressive,main;
>          my_identifier user_fqdn"user1 at tsukuba.ac.jp";
>          proposal {
>                  encryption_algorithm 3des;
>                  hash_algorithm sha1;
>                  authentication_method pre_shared_key;
>                  dh_group 2;
>          }
> }
> sainfo anonymous {
>          lifetime time 12 hours;
>          encryption_algorithm 3des;
>          authentication_algorithm hmac_sha1;
>          compression_algorithm deflate;
> }
> ------------------------------------------------------------
>
> WireGuard implementaion comes from
> https://github.com/smartalock/wireguard-lwip.  It does not use OpenSSL
> code and looks much simpler than IPsec VPN.  Hardware random number
> generator (RDRAND instruction) is used if available.
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://www.bitvisor.org/archives/bitvisor-devel-en/attachments/20240618/fa3c5c66/attachment.htm>


More information about the BitVisor-devel-en mailing list