On 08/12/2014 11:58 AM, Reyk Floeter wrote:

> Operation not supported is from the kernel returning "EOPNOTSUPP".
> 
> If any of the following sysctls are turned off and it is requested via
> the PFKEYv2 socket, the kernel will return EOPNOTSUPP:
> 
> net.inet.esp.enable=1
> net.inet.ah.enable=1
> net.inet.ipcomp.enable=0
> 
All three are set to 1.
But strangely, now the "Operation not supported" message does not occur
anymore.

> You can also monitor the pfkey messages with "ipsectl -m" [add one or
> more -v for packet dumps] to see what message returns EOPNOTSUPP.

Here's the output - I don't see any obvious errors ...

sadb_getspi: satype esp vers 2 len 10 seq 19 pid 25389
        address_src: A.B.C.D
        address_dst: 10.x.y.z
        spirange: min 0x00000100 max 0xffffffff
sadb_getspi: satype esp vers 2 len 10 seq 19 pid 25389
        sa: spi 0xfe52d794 auth none enc none
                state mature replay 0 flags 0<>
        address_src: A.B.C.D
        address_dst: 10.x.y.z
sadb_update: satype esp vers 2 len 41 seq 20 pid 25389
        sa: spi 0xfe52d794 auth hmac-sha1 enc aes
                state mature replay 64 flags 0x204<tunnel,udpencap>
        lifetime_hard: alloc 0 bytes 536870912 add 10800 first 0
        lifetime_soft: alloc 0 bytes 493384368 add 9925 first 0
        address_src: A.B.C.D
        address_dst: 10.x.y.z
        key_auth: bits 160: ...
        key_encrypt: bits 128: ...
        identity_src: type ufqdn id 0: UFQDN/[email protected]
        identity_dst: type fqdn id 0: FQDN/vpn.doe.com
        udpencap: udpencap port 4500
        tag: ipsec-UFQDN/[email protected]
sadb_update: satype esp vers 2 len 34 seq 20 pid 25389
        sa: spi 0xfe52d794 auth hmac-sha1 enc aes
                state mature replay 64 flags 0x204<tunnel,udpencap>
        lifetime_hard: alloc 0 bytes 536870912 add 10800 first 0
        lifetime_soft: alloc 0 bytes 493384368 add 9925 first 0
        address_src: A.B.C.D
        address_dst: 10.x.y.z
        identity_src: type ufqdn id 0: UFQDN/[email protected]
        identity_dst: type fqdn id 0: FQDN/vpn.doe.com
        udpencap: udpencap port 4500
        tag: ipsec-UFQDN/[email protected]
sadb_add: satype esp vers 2 len 41 seq 21 pid 25389
        sa: spi 0xc06ab6b8 auth hmac-sha1 enc aes
                state mature replay 64 flags 0x204<tunnel,udpencap>
        lifetime_hard: alloc 0 bytes 536870912 add 10800 first 0
        lifetime_soft: alloc 0 bytes 497679335 add 10011 first 0
        address_src: 10.x.y.z
        address_dst: A.B.C.D
        key_auth: bits 160: ...
        key_encrypt: bits 128: ...
        identity_src: type fqdn id 0: FQDN/vpn.doe.com
        identity_dst: type ufqdn id 0: UFQDN/[email protected]
        udpencap: udpencap port 4500
        tag: ipsec-UFQDN/[email protected]
sadb_add: satype esp vers 2 len 34 seq 21 pid 25389
        sa: spi 0xc06ab6b8 auth hmac-sha1 enc aes
                state mature replay 64 flags 0x204<tunnel,udpencap>
        lifetime_hard: alloc 0 bytes 536870912 add 10800 first 0
        lifetime_soft: alloc 0 bytes 497679335 add 10011 first 0
        address_src: 10.x.y.z
        address_dst: A.B.C.D
        identity_src: type fqdn id 0: FQDN/vpn.doe.com
        identity_dst: type ufqdn id 0: UFQDN/[email protected]
        udpencap: udpencap port 4500
        tag: ipsec-UFQDN/[email protected]


I was wondering wether client sending EAP options would have anything to
do with it:

>> sending end entity cert <johndoe DN>
>> establishing CHILD_SA xfertunnel
>> generating IKE_AUTH request 1 [ IDi CERT N(INIT_CONTACT) CERTREQ IDr
>> AUTH CPRQ(ADDR DNS DNS) N(USE_TRANSP) SA TSi TSr N(MOBIKE_SUP)
>> N(NO_ADD_ADDR) N(EAP_ONLY) ]

Aug 12 12:23:20 tunnel iked[25389]: ikev2_pld_payloads: decrypted
payload NOTIFY nextpayload NOTIFY critical 0x00 length 8
Aug 12 12:23:20 tunnel iked[25389]: ikev2_pld_notify: protoid NONE
spisize 0 type MOBIKE_SUPPORTED
Aug 12 12:23:20 tunnel iked[25389]: ikev2_pld_payloads: decrypted
payload NOTIFY nextpayload NOTIFY critical 0x00 length 8
Aug 12 12:23:20 tunnel iked[25389]: ikev2_pld_notify: protoid NONE
spisize 0 type NO_ADDITIONAL_ADDRESSES
Aug 12 12:23:20 tunnel iked[25389]: ikev2_pld_payloads: decrypted
payload NOTIFY nextpayload NONE critical 0x00 length 8
Aug 12 12:23:20 tunnel iked[25389]: ikev2_pld_notify: protoid NONE
spisize 0 type EAP_ONLY_AUTHENTICATION

thx /markus

Reply via email to