On Fri, May 07, 2021 at 12:17:35PM +0300, Денис Давыдов wrote:
> Hello all,
> 
> I can't understand why I got SA_INIT timeout:
> May  5 13:18:54 crypto-gw2 iked[65530]: spi=0x73bcd531eb2e8899: sa_free:
> SA_INIT timeout
> 
> 1.1.1.1 (crypto-gw2) - my host
> 7.7.7.7 - our isp provider (some of cisco devices)
> 
> /etc/iked.conf (on 1.1.1.1):
> 
> ikev2 crypto-primary active esp \
>       from 10.21.139.8/30 to 2.2.2.2 \
>       from 10.21.139.8/30 to 3.3.3.3 \
>       peer 7.7.7.7 \
>       ikesa auth hmac-sha2-256 enc aes-256 prf hmac-sha2-256 group modp2048
> \
>       childsa auth hmac-sha2-256 enc aes-256 group modp2048 \
>       ikelifetime 86400 lifetime 28800 \
>       psk "secret"
> 
> The remote side claims to have the same settings.
> 
> crypto-gw2# ikectl sh sa | grep 7.7.7.7
> iked_sas: 0xb0e1878b7d0 rspi 0x2d606f017d098928 ispi 0xd0497626849535cd
> 1.1.1.1:500->7.7.7.7:500<IPV4/217.118.86.15>[] AUTH_SUCCESS i nexti 0x0 pol
> 0xb0e9b38d000
> 
> Why CHILD_SA is not being created? I tried to figure it out from the logs
> but couldn't.


It looks like the peer sends its IKE_AUTH reply without SA payload but
with a TS_UNACCEPTABLE notification.
The most likely cause is that your "from ... to ..." configuration is
incompatible with the configuration of your peer.

Thanks for the report, I will see how I can make this error more obvious
in the logs.

Reply via email to