OK, we've had our test DCD-DCD, gw-gw vpn up continuously for several
weeks.  In fact, I used it earlier this evening to transfer files.

Of a sudden, the tunnel no longer functioned!

This is what we saw:

root@bluetrout:/var/log
# ipsec eroute
192.168.1.0/24     -> 192.168.123.0/24   => %hold (21)

root@trout:/var/log
# ipsec eroute
192.168.123.0/24   -> 192.168.1.0/24     => %hold (34)

Where are these documented?

And, this in /var/log/auth.log:

Feb  2 20:24:15 bluetrout Pluto[25694]: packet from 12.248.253.86:500:
Main Mode message is part of an unknown exchange
Feb  2 20:24:15 bluetrout Pluto[25694]: packet from 12.248.253.86:500:
Quick Mode message is for a non-existent (expired?) ISAKMP SA
Feb  2 20:24:16 bluetrout Pluto[25694]: packet from 12.248.253.86:500:
Main Mode message is part of an unknown exchange
Feb  2 20:24:16 bluetrout Pluto[25694]: packet from 12.248.253.86:500:
Main Mode message is part of an unknown exchange
Feb  2 20:24:17 bluetrout Pluto[25694]: packet from 12.248.253.86:500:
Quick Mode message is for a non-existent (expired?) ISAKMP SA
Feb  2 20:24:17 bluetrout Pluto[25694]: packet from 12.248.253.86:500:
Main Mode message is part of an unknown exchange
Feb  2 20:24:17 bluetrout Pluto[25694]: packet from 12.248.253.86:500:
Main Mode message is part of an unknown exchange
Feb  2 20:24:17 bluetrout Pluto[25694]: "trout" #756: discarding
duplicate packet; already STATE_MAIN_I2


Feb  2 20:24:15 trout Pluto[8589]: "bluetrout" #1444: STATE_MAIN_R3:
sent MR3, ISAKMP SA established
Feb  2 20:24:15 trout Pluto[8589]: "bluetrout" #1438: max number of
retransmissions (2) reached STATE_MAIN_R1
Feb  2 20:24:15 trout Pluto[8589]: "bluetrout" #1437: max number of
retransmissions (2) reached STATE_QUICK_I1
Feb  2 20:24:15 trout Pluto[8589]: "bluetrout" #1437: starting keying
attempt 25 of an unlimited number
Feb  2 20:24:15 trout Pluto[8589]: "bluetrout" #1445: initiating Quick
Mode RSASIG+ENCRYPT+TUNNEL+PFS
Feb  2 20:24:16 trout Pluto[8589]: "bluetrout" #1339: ISAKMP SA expired
(superseded by #1444)
Feb  2 20:24:16 trout Pluto[8589]: "bluetrout" #1347: not replacing
stale ISAKMP SA: #1444 will do
Feb  2 20:24:16 trout Pluto[8589]: "bluetrout" #1444: retransmitting in
response to duplicate packet; already STATE_MAIN_R3
Feb  2 20:24:16 trout Pluto[8589]: "bluetrout" #1444: retransmitting in
response to duplicate packet; already STATE_MAIN_R3
Feb  2 20:24:16 trout Pluto[8589]: "bluetrout" #1446: responding to Main
Mode
Feb  2 20:24:17 trout Pluto[8589]: "bluetrout" #1447: responding to Main
Mode


We tried cycling both sides, without successful reconnection:

root@bluetrout:/var/log
# ipsec auto --down trout
# ipsec auto --up trout

root@trout:/var/log
# ipsec auto --down trout
# ipsec auto --up trout


We tried completely cycling ipsec:

root@bluetrout:/var/log
# ipsec auto --down trout
# svi ipsec --stop
# svi ipsec --start
# ipsec auto --up trout

root@trout:/var/log
# ipsec auto --down trout
# svi ipsec --stop
# svi ipsec --start
# ipsec auto --up trout

Then, we got this:

root@bluetrout:/var/log
# ipsec eroute
192.168.1.0/24     -> 192.168.123.0/24   => %trap (0)

root@trout:/var/log
# ipsec eroute
192.168.123.0/24   -> 192.168.1.0/24     => %trap (0)

Where are these documented?


Finally, we stopped ipsec, reloaded the entire network, then restarted
ipsec:

root@bluetrout:/var/log
# ipsec auto --down trout
# svi ipsec --stop
# svi network reload
# svi ipsec --start
# ipsec auto --up trout

root@trout:/var/log
# ipsec auto --down trout
# svi ipsec --stop
# svi network reload
# svi ipsec --start
# ipsec auto --up trout

Now, we see this, as expected:

root@bluetrout:/root
# ipsec eroute
8          192.168.1.0/24     -> 192.168.123.0/24   =>
[EMAIL PROTECTED]

root@trout:/var/log
# ipsec eroute
8          192.168.123.0/24   -> 192.168.1.0/24     =>
[EMAIL PROTECTED]


What have we done that could have precipitated this?

[1] Weird messages began appearing in /etc/auth.log here:

Jan 30 18:39:39 bluetrout Pluto[25694]: "trout" #201: max number of
retransmissions (2) reached STATE_MAIN_I3.  Possible authentication
failure: no acceptable response to our first encrypted message

    Began seeing consecutive instances, like this, here:
Jan 30 18:40:29 trout Pluto[8589]: "bluetrout" #202: responding to Main
Mode
Jan 30 18:40:29 trout Pluto[8589]: "bluetrout" #203: responding to Main
Mode
Jan 30 18:40:29 trout Pluto[8589]: "bluetrout" #204: responding to Main
Mode

    And, began seeing this here:
Jan 30 18:46:59 trout Pluto[8589]: "bluetrout" #203: max number of
retransmissions (2) reached STATE_MAIN_R1
Jan 30 18:46:59 trout Pluto[8589]: "bluetrout" #202: max number of
retransmissions (2) reached STATE_MAIN_R1


[2] root@bluetrout:/var/log
    # ipchains -nvL | grep 5[01]

    root@trout:/var/log
    # ipchains -nvL | grep 5[01]

    Each system had four (4) pairs of ACCEPT's for each of protocol 50 &
51 at the top, as well as another further down, from /etc/network.conf.

[3] Yesterday afternoon, we began using this to allow each gateway to
communicate with the other via the tunnel:

# bluetrout
ip route change 192.168.123.0/24 via 64.4.x.z src 192.168.1.254 dev
ipsec0

# trout
ip route change 192.168.1.0/24 via 12.248.c.d src 192.168.123.254 dev
ipsec0


What is going on here?

-- 

Best Regards,

mds
mds resource
888.250.3987

Dare to fix things before they break . . .

Our capacity for understanding is inversely proportional to how much we
think we know.  The more I know, the more I know I don't know . . .

_______________________________________________
Leaf-user mailing list
[EMAIL PROTECTED]
https://lists.sourceforge.net/lists/listinfo/leaf-user

Reply via email to