Miroslav, thank you, you got me going w/ a handle on the logs and finding the uniqueness of the ids and that it was due to XAuthName.

Just hoping to connect w/ someone is is really familiar with virtual ip addressing and really get a handle on what the "id" is, docs indicate it can be an address, a FQDN, a cert subject, and evidently an XAuthName, etc. Why it changed between 5.0.2 and 5.3.0...

That is a really important thing to have positive control over for road warrior configs, so thought I might get educated, before figuring out what direction to take it.

thanks,
andrew

On 4/25/15 10:00 AM, Miroslav Svoboda wrote:
Andrew,

Sorry for misleading advice with "rightsubnet".
"rightsubnet" is a traffic selector and has no relation to virtual IP pool.
Your configuration with "rightsourceip" is correct.

Are you able to find same scenario as yours among testcases here <http://www.strongswan.org/testresults.html> and compare setup and logfiles? Without complete logfile, attached as a file, I am not able to help you further.

Miroslav

Miroslav Svoboda | +420 608 224 486 <tel:%2B420%20608%20224%20486>


On 25 April 2015 at 16:51, Andrew Foss <[email protected] <mailto:[email protected]>> wrote:

    Miroslav,

    sorry my last response to you got blocked, but when I use
    rightsubnet this is what occurs in the logs and vpn doesn't
    connect, am I missing something?

    Apr 25 14:30:52 accel charon: 15[IKE] peer requested virtual IP %any
    Apr 25 14:30:52 accel charon: 15[IKE] no virtual IP found for %any
    requested by 'IDE-B1DA-3355-4C89-BA98-A580BD513292'

    A little further further analysis and I have it working with
    uiqueids = yes, but raised more questions, that I was not readily
    able to answer by reviewing the code, but I am still coming up to
    speed on the structure of the code.

    We were using XAuthName "actmobile", I have changed it to the
    device id 'IDE-B1DA-3355-4C89-BA98-A580BD513292' and put a
    wildcard '*' into the ipsec.secrets file and it is working,
    thankfully we seem to allow a wildcard match with '*" for the
    secrets, though I suspect someone would file that as a bug.

    It appears the the ip address management may use the XAuthName as
    the id, not the Cert subject as the docs imply.

    Is that true? Is there any way to control that in the config and
    assure sessions, SAs, etc. are tracked by the cert subject name?

    Further, it appears that running version 5.0.2 it behaves better
    and in 5.3.0 the clients don't appear unique and all get the same
    ip address. I am not convinced it was quite right in 5.0.2, but
    does seem to behave differently.

    I am suspecting that to ensure positive control over this I should
    do a radius server and modify the dhcp plugin to really control
    the ip addresses, but I am hoping to procrastinate doing anything
    major.

    I think the question is;

    Am I doing something wrong or unusual in the config or can I
    control in the config to use the cert as the id for the clients?
    It feels like something that has the potential to bite back down
    the road, if I do something odd.

    Also, is there anywhere this part of the system is documented,
    that I coudl refer to as an assist while I review the code and
    understand what it is doing?

    thanks,
    andrew

    Here is the config I am using, with a

    * : XAUTH "actmobile" in /etc/ipsec.secrets

    conn ios
    keyexchange=ikev1
    #esp=null-sha1!
    authby=xauthrsasig
    xauth=server
    #left=%defaultroute
        leftsubnet=0.0.0.0/0 <http://0.0.0.0/0>
    leftupdown=/opt/actmobile/accelerator/actmobile_ipsec_updown
    leftcert=serverCert.pem
        rightsourceip=172.20.0.0/16 <http://172.20.0.0/16>
    auto=add
    rekey=yes
    fragmentation=yes
    lifetime=24h
    dpddelay=0
    dpdtimeout=24h
        compress=yes

    On 4/25/15 2:26 AM, Group Manager wrote:
    I replied on yours same question on users list.
    I believe that you need to use "rightsubnet" instead of
    "rightsourceip" in your conf.
    M.

    On Saturday, April 25, 2015 at 3:04:46 AM UTC+2, Andrew Foss wrote:

        It appears that our ip addresses are being assigned by the
        XAuthName
        'actmobile', unfortunately that is not unique?

        On 4/24/15 5:28 PM, Andrew Foss wrote:
        > Here's our situation;
        >
        > ios ipsec clients, they each have a certificate with a
        unique common
        > name.
        >
        > I want to configure strongswan to give them a different ip
        address for
        > each client/CN, regardless of what public ip address they
        may arrive
        > from at the moment, it is a road warrior config.
        >
        > I am thinking I can write a plugin like dhcp to do it for
        sure, but
        > seems like I may have something in the config that is
        wrong. I have to
        > set uniqueids=no to get two clients to connect, which makes
        me think I
        > am using something else for the id, other than the cert
        subject name.
        >
        > This error line seems to indicate the peer is referred to
        as 'actmobile'
        >
        > destroying duplicate IKE_SA for peer 'actmobile', received
        > INITIAL_CONTACT
        >
        > in the updown scripts the PLUTO_PEER_ID does show up
        properly as
        > [C=US, O=strongSwan, CN=IDE-4B53-E547-4C2A-A2B7-78D2BA436307]
        >
        > All my clients seem to get 172.20.0.1 as their ip address
        and ipsec
        > statusall shows just one SA even when I have 3 dvices
        connected.
        >
        > here's the config;
        >
        > conn ios
        > keyexchange=ikev1
        > #esp=null-sha1!
        > authby=xauthrsasig
        > xauth=server
        > #left=%defaultroute
        > leftsubnet=0.0.0.0/0 <http://0.0.0.0/0>
        > #leftsubnet=10.66.0.0/16 <http://10.66.0.0/16>
        > #leftfirewall=yes
        > #lefthostaccess=yes
        > leftupdown=/opt/actmobile/accelerator/actmobile_ipsec_updown
        > leftcert=serverCert.pem
        > #right=%any
        > rightsourceip=172.20.0.0/16 <http://172.20.0.0/16>
        > #rightsourceip=10.100.255.0/28 <http://10.100.255.0/28>
        > #rightcert=clientCert.pem
        > #pfs=no
        > auto=add
        > rekey=yes
        > fragmentation=yes
        > lifetime=24h
        > dpddelay=0
        > dpdtimeout=24h
        >     compress=yes
        >
        > here's the log output of clients connecting;
        >
        > IKE_SA ios[6] established between 10.199.65.236[C=US,
        ST=California,
        > L=New York, O=Internet Widgits Pty Ltd, OU=ActMobile,
        > CN=ipsec.corp.actmobile.com <http://ipsec.corp.actmobile.com>,
        > [email protected]
        <mailto:[email protected]>]...50.197.174.157[C=US,
        O=strongSwan,
        > CN=IDE-4B53-E547-4C2A-A2B7-78D2BA436307]
        > Apr 25 00:12:43 accel charon: 12[IKE] IKE_SA ios[6] state
        change:
        > CONNECTING => ESTABLISHED
        > Apr 25 00:12:43 accel charon: 12[IKE] scheduling
        reauthentication in
        > 10094s
        > Apr 25 00:12:43 accel charon: 12[IKE] maximum IKE_SA
        lifetime 10634s
        > Apr 25 00:12:43 accel charon: 12[IKE] activating new tasks
        > Apr 25 00:12:43 accel charon: 12[IKE] nothing to initiate
        > Apr 25 00:12:43 accel charon: 12[IKE] destroying duplicate
        IKE_SA for
        > peer 'actmobile', received INITIAL_CONTACT
        > Apr 25 00:12:43 accel charon: 12[IKE] IKE_SA ios[5] state
        change:
        > ESTABLISHED => DESTROYING
        > Apr 25 00:12:43 accel charon: 12[KNL] deleting SAD entry
        with SPI
        > c1648e6d  (mark 0/0x00000000)
        > Apr 25 00:12:43 accel charon: 12[KNL] deleted SAD entry
        with SPI
        > c1648e6d (mark 0/0x00000000)
        > Apr 25 00:12:43 accel charon: 12[KNL] deleting SAD entry
        with SPI
        > 0d133ab7  (mark 0/0x00000000)
        > Apr 25 00:12:43 accel charon: 12[KNL] deleted SAD entry
        with SPI
        > 0d133ab7 (mark 0/0x00000000)
        > Apr 25 00:12:43 accel charon: 12[KNL] deleting policy
        0.0.0.0/0 <http://0.0.0.0/0> ===
        > 172.20.0.1/32 <http://172.20.0.1/32> out  (mark 0/0x00000000)
        > Apr 25 00:12:43 accel charon: 12[KNL] policy still used by
        another
        > CHILD_SA, not removed
        > Apr 25 00:12:43 accel charon: 12[KNL] updating policy
        0.0.0.0/0 <http://0.0.0.0/0> ===
        > 172.20.0.1/32 <http://172.20.0.1/32> out  (mark 0/0x00000000)
        > Apr 25 00:12:43 accel charon: 12[KNL] deleting policy
        172.20.0.1/32 <http://172.20.0.1/32>
        > === 0.0.0.0/0 <http://0.0.0.0/0> in  (mark 0/0x00000000)
        > Apr 25 00:12:43 accel charon: 12[KNL] policy still used by
        another
        > CHILD_SA, not removed
        > Apr 25 00:12:43 accel charon: 12[KNL] updating policy
        172.20.0.1/32 <http://172.20.0.1/32>
        > === 0.0.0.0/0 <http://0.0.0.0/0> in  (mark 0/0x00000000)
        > Apr 25 00:12:43 accel charon: 12[KNL] deleting policy
        172.20.0.1/32 <http://172.20.0.1/32>
        > === 0.0.0.0/0 <http://0.0.0.0/0> fwd  (mark 0/0x00000000)
        > Apr 25 00:12:43 accel charon: 12[KNL] policy still used by
        another
        > CHILD_SA, not removed
        > Apr 25 00:12:43 accel charon: 12[KNL] updating policy
        172.20.0.1/32 <http://172.20.0.1/32>
        > === 0.0.0.0/0 <http://0.0.0.0/0> fwd  (mark 0/0x00000000)
        > Apr 25 00:12:43 accel charon: 12[KNL] getting a local
        address in
        > traffic selector 0.0.0.0/0 <http://0.0.0.0/0>
        > Apr 25 00:12:43 accel charon: 12[KNL] using host %any
        > Apr 25 00:12:43 accel charon: 12[KNL] using 10.199.65.193
        as nexthop
        > to reach 166.170.42.208
        > Apr 25 00:12:43 accel charon: 12[KNL] 10.199.65.236 is on
        interface eth0
        > Apr 25 00:12:43 accel charon: 12[KNL] deleting policy
        0.0.0.0/0 <http://0.0.0.0/0> ===
        > 172.20.0.1/32 <http://172.20.0.1/32> out  (mark 0/0x00000000)
        > Apr 25 00:12:43 accel charon: 12[KNL] deleting policy
        172.20.0.1/32 <http://172.20.0.1/32>
        > === 0.0.0.0/0 <http://0.0.0.0/0> in  (mark 0/0x00000000)
        > Apr 25 00:12:43 accel charon: 12[KNL] deleting policy
        172.20.0.1/32 <http://172.20.0.1/32>
        > === 0.0.0.0/0 <http://0.0.0.0/0> fwd  (mark 0/0x00000000)
        > Apr 25 00:12:43 accel charon: 12[KNL] getting iface index
        for eth0
        > Apr 25 00:12:43 accel charon: 12[CFG] lease 172.20.0.1 by
        'actmobile'
        > went offline
        > _______________________________________________
        > Dev mailing list
        > [email protected] <mailto:[email protected]>
        > https://lists.strongswan.org/mailman/listinfo/dev

        _______________________________________________
        Dev mailing list
        [email protected] <mailto:[email protected]>
        https://lists.strongswan.org/mailman/listinfo/dev




_______________________________________________
Dev mailing list
[email protected]
https://lists.strongswan.org/mailman/listinfo/dev

Reply via email to