Closed aaahrens closed 4 years ago
running on macOS, latest version of mojave with the latest ami, with the following terraform security group
resource "aws_security_group" "vpn" {
name = "${var.cluster-name}-vpn"
description = "Security group for vpn of the cluster"
vpc_id = aws_vpc.vpc.id
egress {
from_port = 0
to_port = 0
protocol = "-1"
cidr_blocks = [
"0.0.0.0/0"]
}
ingress {
from_port = 500
protocol = "udp"
to_port = 500
cidr_blocks = [
"0.0.0.0/0"]
}
ingress {
from_port = 22
protocol = "tcp"
to_port = 22
cidr_blocks = [
"0.0.0.0/0"]
}
ingress {
from_port = 4500
protocol = "udp"
to_port = 4500
cidr_blocks = [
"0.0.0.0/0"]
}
ingress {
from_port = 1701
protocol = "udp"
to_port = 1701
cidr_blocks = [
"0.0.0.0/0"]
}
}
will always fail authentication, adding:
ingress {
from_port = 0
protocol = "50"
to_port = 0
cidr_blocks = [
"0.0.0.0/0"]
}
using the exact same credentials, will succeed in authentication
Was never able to reproduce.
The vpn doesn't work unless you have esp enabled on all ports.