You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
@@ -231,14 +231,14 @@ OVS is used to facilitate the transfer of plaintext messages between the host an
231
231
232
232
## Setup East-West Overlay Encryption
233
233
234
-
Setting up east-west overlay encryption can be done in two steps:
234
+
To set up east-west overlay encryption, first ensure that the strongSwan is built on the target machine. Next, complete the following two steps:
235
235
236
236
1.**Configure the OVS (Open vSwitch):**
237
237
- Setup the OVS bridge
238
238
- Configure the authentication method
239
239
2.**Run the script:** Execute the following command, which runs the *ovs-monitor-ipsec* script and automates the configuration process:
240
240
241
-
```c
241
+
```bash
242
242
systemctl start openvswitch-ipsec.service
243
243
```
244
244
@@ -248,30 +248,40 @@ Setting up east-west overlay encryption can be done in two steps:
248
248
249
249
- Start Open vSwitch. If your operating system is Ubuntu, run the following on both *Arm_1* and *Arm_2*:
250
250
251
-
```c
251
+
```bash
252
252
service openvswitch-switch start
253
253
```
254
-
255
-
If your operating system is CentOS, run the following on both *Arm_1* and *Arm_2*:
256
-
257
-
```c
258
-
service openvswitch restart
259
-
```
260
-
254
+
261
255
- Start OVS IPsec service. Run the following on both *Arm_1* and *Arm_2*:
262
256
263
-
```c
257
+
```bash
264
258
systemctl start openvswitch-ipsec.service
265
259
```
266
260
267
-
- Set up OVS bridges in both DPUs. Run the following on both *Arm_1* and *Arm_2*:
268
-
269
-
```c
270
-
ovs-vsctl add-br vxlan-br
271
-
ovs-vsctl add-port ovs-br $PF_REP
272
-
ovs-vsctl set Open_vSwitch . other_config:hw-offload=true
261
+
- Before you can set up OVS bridges in both DPUs, and add the physical function(PF) or its associated representor (PF_REP) to a new bridge, they must be detached from any existing OVS bridge they are associated with.
262
+
263
+
Detach PF_REP and PF from their current bridge:
264
+
```bash
265
+
sudo ovs-vsctl del-port ovsbr1 $PF_REP
266
+
sudo ovs-vsctl del-port ovsbr1 $PF
267
+
273
268
```
274
-
269
+
Note that “ovsbr1” is a sample name given in these instructions; the name on your system could be different.
270
+
271
+
Next, run the following on both Arm_1 and Arm_2:
272
+
```bash
273
+
sudo ovs-vsctl add-br my-ovs-br
274
+
sudo ovs-vsctl add-port my-ovs-br $PF_REP
275
+
sudo ovs-vsctl add-port my-ovs-br $PF
276
+
sudo ovs-vsctl set Open_vSwitch . other_config:hw-offload=true
277
+
```
278
+
279
+
If your operating system is CentOS, run the following on both *Arm_1* and *Arm_2*:
280
+
281
+
```bash
282
+
service openvswitch restart
283
+
```
284
+
275
285
- Set up IPsec tunnel on the OVS bridge. Three authentication methods are possible. Select your preferred method and follow the steps relevant to it. Note that some authentication methods require you to create certificates (self-signed or certificate authority certificates).
276
286
277
287
### Authentication Methods
@@ -282,7 +292,7 @@ There are three authentication methods:
282
292
283
293
On *Arm_1*, run:
284
294
285
-
```c
295
+
```bash
286
296
ovs-vsctl add-port vxlan-br tun -- \
287
297
set interface tun type=vxlan \
288
298
options:local_ip=$ip1 \
@@ -294,8 +304,8 @@ ovs-vsctl add-port vxlan-br tun -- \
294
304
295
305
On *Arm_2*, run:
296
306
297
-
```c
298
-
ovs-vsctl add-port vxlan-br tun -- \
307
+
```bash
308
+
sudo ovs-vsctl add-port vxlan-br tun -- \
299
309
set interface tun type=vxlan \
300
310
options:local_ip=$ip2 \
301
311
options:remote_ip=$ip1 \
@@ -314,21 +324,20 @@ Generate self-signed certificate in both *Arm_1*and *Arm_2*. Then copy the cer
314
324
On *Arm_1*, run:
315
325
316
326
Generate self-signed certificates
317
-
```c
318
-
319
-
ovs-pki req -u host_1.
320
-
ovs-pki self-sign host_1
321
-
ovs-vsctl set Open_vSwitch . other_config:certificate=/etc/swanctl/x509/host_1-cert.pem \
327
+
```bash
328
+
sudo ovs-pki req -u host_1.
329
+
sudo ovs-pki self-sign host_1
330
+
sudo ovs-vsctl set Open_vSwitch . other_config:certificate=/etc/swanctl/x509/host_1-cert.pem \
Ensure that the strongSwan has already been built on your system.
402
+
392
403
After OVS is configured, run the following command:
393
404
394
-
```c
405
+
```bash
395
406
systemctl start openvswitch-ipsec.service
396
407
```
397
408
@@ -401,7 +412,7 @@ This command automatically runs the *ovs-monitor-ipsec* script and generates the
401
412
402
413
Note that critical information such as key exchange and authentication algorithms to be used forIKE SA and ESP SA are passedin the *ovs-monitor-ipsec* script to later generate a *swanctl.conf* file. Ensure that the script contains all the key exchange algorithms to be used forIKE SA establishment. For instance, parameters *ke1_kyber3-ke2_blast* passedin the *ovs-monitor-ipsec* script
403
414
404
-
```
415
+
```bash
405
416
sudo sed -i 's/aes256gcm16-modp2048-esn/aes256gcm16-modp2048-ke1_kyber3-ke2_blast-esn/g' /usr/share/openvswitch/scripts/ovs-monitor-ipsec
Here’s a basic structure for the *swanctl.conf* file that includes necessary parameters for both ends of the connection (referred to as Left (BFL) and Right (BFR)):
417
428
418
429
```
419
-
connections {
420
-
BFL-BFR {
421
-
local_addrs = 192.168.50.1 // Replace with your local IP
422
-
remote_addrs = 192.168.50.2 // Replace with your remote IP
423
-
local {
424
-
auth = psk // Use pre-shared key authentication
425
-
id = host1 // Identifier for local machine
426
-
}
427
-
remote {
428
-
auth = psk // Use pre-shared key authentication
429
-
id = host2 // Identifier for remote machine
430
+
conn-defaults {
431
+
unique = replace
432
+
reauth_time = 0
433
+
version = 2
434
+
mobike = no
435
+
proposals = aes128-sha256-x25519
430
436
}
431
-
children {
432
-
bf {
433
-
local_ts = 192.168.50.1/24 [udp/4789] // Local traffic selectors
Retrieve Qrypt's SDK library from the Qrypt Portal from "Products->Qrypt SDK". Copy the libQryptSecurity.so and
564
-
libQryptSecurityC.so libraries to *src/libstrongswan/plugins/blast/*. Then, proceed with the following instructions.
565
-
566
-
```
567
-
cd src/libstrongswan/plugins/blast/
568
-
sudo make install-deps
569
-
sudo ldconfig
570
-
make SWANDIR=../../../..
571
-
sudo make install PLUGINCONF=/etc/strongswan.d/charon/
572
-
cd ../../../..
573
-
574
-
```
592
+
You should have Qrypt Security libraries, provided directly by Qrypt, along with instructions to build the BLAST IPsec plugin. Please follow the steps outlined in that document to build the plugin.
0 commit comments