Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Docs: Why priviledged #35

Open
iBobik opened this issue Apr 15, 2017 · 4 comments
Open

Docs: Why priviledged #35

iBobik opened this issue Apr 15, 2017 · 4 comments

Comments

@iBobik
Copy link

iBobik commented Apr 15, 2017

Just a question (maybe to answer by README): Why it needs --priviledge option? Any way how to give necessary permissions but not everything?

@Nebukad93
Copy link

Probably due to the need to use port 500 for IKEv2

@iBobik
Copy link
Author

iBobik commented Apr 18, 2017 via email

@techotaku
Copy link

Below commands (in bin/start-vpn) need privileged, but you can do these on host.

sysctl net.ipv4.ip_forward=1
sysctl net.ipv6.conf.all.forwarding=1
sysctl net.ipv6.conf.eth0.proxy_ndp=1

Below commands (also in bin/start-vpn) need NET_ADMIN, --cap-add=NET_ADMIN should be enough.

iptables -t nat -A POSTROUTING -s 10.8.0.0/16 -o eth0 -m policy --dir out --pol ipsec -j ACCEPT
iptables -t nat -A POSTROUTING -s 10.8.0.0/16 -o eth0 -j MASQUERADE
ip6tables -t nat -A POSTROUTING -s fd6a:6ce3:c8d8:7caa::/64 -o eth0 -m policy --dir out --pol ipsec -j ACCEPT
ip6tables -t nat -A POSTROUTING -s fd6a:6ce3:c8d8:7caa::/64 -o eth0 -j MASQUERADE

@Nebukad93
Copy link

Yes, the --cap-add=NET_ADMIN is enough

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

3 participants