I wonder now if its something to do with the PSK / secret as it just said
it was ignoring the unsupported secret when I did the reload.
root@hub2-nhrp:/home/jon# cat /var/log/auth.log | grep charon
Jul 30 18:27:28 hub2-nhrp ipsec_starter[6263]: charon (6299) started after
20 ms
Jul 30 18:31:07 hub2-nhrp ipsec_starter[1450]: charon (1616) started after
1140 ms
Jul 30 18:33:04 hub2-nhrp ipsec_starter[1512]: charon (1675) started after
500 ms
Jul 30 18:38:12 hub2-nhrp ipsec_starter[1566]: charon (1753) started after
1340 ms
Jul 30 18:56:01 hub2-nhrp ipsec_starter[1722]: charon (1959) started after
600 ms
Jul 30 19:09:34 hub2-nhrp ipsec_starter[1685]: charon (1887) started after
420 ms
Jul 30 20:35:20 hub2-nhrp ipsec_starter[1720]: charon (1905) started after
1420 ms
Jul 31 11:05:10 hub2-nhrp ipsec_starter[1696]: charon (1876) started after
460 ms
root@hub2-nhrp:/home/jon# service strongswan status
● strongswan.service - strongSwan IPsec IKEv1/IKEv2 daemon using ipsec.conf
Loaded: loaded (/lib/systemd/system/strongswan.service; enabled; vendor
preset: enabled)
Active: active (running) since Mon 2017-07-31 11:05:08 BST; 2min 54s ago
Main PID: 1696 (starter)
Tasks: 18 (limit: 4915)
Memory: 7.4M
CPU: 28ms
CGroup: /system.slice/strongswan.service
├─1696 /usr/libexec/ipsec/starter --daemon charon --nofork
└─1876 /usr/libexec/ipsec/charon
Jul 31 11:05:10 hub2-nhrp charon[1876]: 00[CFG] loading ca certificates
from '/etc/ipsec.d/cacerts'
Jul 31 11:05:10 hub2-nhrp charon[1876]: 00[CFG] loading aa certificates
from '/etc/ipsec.d/aacerts'
Jul 31 11:05:10 hub2-nhrp charon[1876]: 00[CFG] loading ocsp signer
certificates from '/etc/ipsec.d/ocspcerts'
Jul 31 11:05:10 hub2-nhrp charon[1876]: 00[CFG] loading attribute
certificates from '/etc/ipsec.d/acerts'
Jul 31 11:05:10 hub2-nhrp charon[1876]: 00[CFG] loading crls from
'/etc/ipsec.d/crls'
Jul 31 11:05:10 hub2-nhrp charon[1876]: 00[CFG] loading secrets from
'/etc/ipsec.secrets'
Jul 31 11:05:10 hub2-nhrp charon[1876]: 00[LIB] loaded plugins: charon aes
des rc2 sha2 sha1 md5 random nonce x509 revocation constraints pubkey pkcs1
pkcs7 pkc
Jul 31 11:05:10 hub2-nhrp charon[1876]: 00[JOB] spawning 16 worker threads
Jul 31 11:05:10 hub2-nhrp ipsec[1696]: charon (1876) started after 460 ms
Jul 31 11:05:10 hub2-nhrp ipsec_starter[1696]: charon (1876) started after
460 ms
root@hub2-nhrp:/home/jon# ipsec status
Security Associations (0 up, 0 connecting):
none
root@hub2-nhrp:/home/jon# swanctl --list-conns
root@hub2-nhrp:/home/jon# swanctl --list-creds
swanctl: unrecognized option '--list-creds'
Error: invalid operation
strongSwan 5.5.3 swanctl
loaded plugins: aes des rc2 sha2 sha1 md5 random nonce x509 revocation
constraints pubkey pkcs1 pkcs7 pkcs8 pkcs12 pgp dnskey sshkey pem fips-prf
gmp curve25519 xcbc cmac hmac
usage:
swanctl --initiate (-i) initiate a connection
swanctl --terminate (-t) terminate a connection
swanctl --rekey (-R) rekey an SA
swanctl --redirect (-d) redirect an IKE_SA
swanctl --uninstall (-u) uninstall a trap or shunt policy
swanctl --install (-p) install a trap or shunt policy
swanctl --list-sas (-l) list currently active IKE_SAs
swanctl --monitor-sa (-m) monitor for IKE_SA and CHILD_SA changes
swanctl --list-pols (-P) list currently installed policies
swanctl --list-authorities (-B) list loaded authority configurations
swanctl --list-conns (-L) list loaded configurations
swanctl --list-certs (-x) list stored certificates
swanctl --list-pools (-A) list loaded pool configurations
swanctl --list-algs (-g) show loaded algorithms
swanctl --flush-certs (-f) flush cached certificates
swanctl --load-all (-q) load credentials, authorities, pools and
connections
swanctl --load-authorities (-b) (re-)load authority configuration
swanctl --load-conns (-c) (re-)load connection configuration
swanctl --load-creds (-s) (re-)load credentials
swanctl --load-pools (-a) (re-)load pool configuration
swanctl --log (-T) trace logging output
swanctl --version (-v) show version information
swanctl --stats (-S) show daemon stats information
swanctl --reload-settings (-r) reload daemon strongswan.conf
swanctl --help (-h) show usage information
root@hub2-nhrp:/home/jon# swanctl --reload-settings
*root@hub2-nhrp:/home/jon# swanctl --load-all*
*ignoring unsupported secret 'dmvpn-secret'*
*no authorities found, 0 unloaded*
*no pools found, 0 unloaded*
*loaded connection 'dmvpn'*
*successfully loaded 1 connections, 0 unloaded*
On Mon, 31 Jul 2017 at 11:03 M87tech [Jon] <m87t...@gmail.com> wrote:
> Hi
>
> Vici is enabled by default on the later versions.
>
> I don't think there is anything in the charon logs from memory but will
> check.
>
> Also will check the swanctl commands.
>
> Regards,
> Jon.
>
> On Mon, 31 Jul 2017 at 08:28 Timo Teras <timo.te...@iki.fi> wrote:
>
>> On Sun, 30 Jul 2017 17:26:33 +0000
>> "M87tech [Jon]" <m87t...@gmail.com> wrote:
>>
>> > It's your version compiled from source, I assume that is the correct
>> > patched one?
>> >
>> > git clone -b tteras-release
>> > git://git.alpinelinux.org/user/tteras/strongswan
>>
>> Ok.
>>
>> > ./configure --enable-systemd --enable-swanctl --with-systemd
>> > systemunitdir=/etc/systemd/system/multi-user.target.wants
>> > --prefix=/usr --sysconfdir=/etc
>>
>> I have also explicit --enable-vici seems it's nowadays enabled by
>> default.
>>
>> > Unsure why there are no TX counters on GRE1 which is a bad sign.
>>
>> This is by design. No traffic is routed to GRE interface until the IKE
>> layer and NHRP registration is complete.
>>
>> > And yeah can't se anything related to ipsec happening, nothing in
>> > "ipsec status" and no 500 or 4500 udp packets, just BGP tries to peer
>> > but sourcing from ETH0 and not GRE1 which is weird.
>>
>> Do you have any strongSwan logs?
>>
>> > Could it be anything to do with NFLOG and the iptables rules?
>>
>> No. NFLOG is needed only for sending NHRP Traffic Indication message
>> from a hub. If there's a problem with this the only result is that
>> spoke-spoke shortcuts will not establish.
>>
>> > Does this require any special kernel module that I may not have
>> > access to in LXD?
>>
>> No.
>>
>> > Jul 30 18:56:01 hub2-nhrp charon[1959]: 00[LIB] loaded plugins:
>> > charon aes des rc2 sha2 sha1 md5 random nonce x509 revocation
>> > constraints pubkey pkcs1 pkcs7 pkcs8 pkcs12 pgp dnskey sshkey pem
>> > fips-prf gmp curve25519 xcbc cmac hmac attr kernel-netlink resol
>> > Jul 30 18:56:01 hub2-nhrp charon[1959]: 00[JOB] spawning 16 worker
>> > threads Jul 30 18:56:01 hub2-nhrp ipsec[1722]: charon (1959) started
>> > after 600 ms Jul 30 18:56:01 hub2-nhrp ipsec_starter[1722]: charon
>> > (1959) started after 600 ms
>>
>> > root@hub2-nhrp:/home/jon# ipsec status
>> > Security Associations (0 up, 0 connecting):
>> > none
>>
>> Perhaps the swanctl configurations are not loaded? In Alpine this is
>> done automatically by the init.d script, but this might differ on
>> Ubuntu.
>>
>> What does the following say:
>> swanctl --list-conns
>> swanctl --list-creds
>>
>> You may need to do:
>> swanctl --reload-settings
>> swanctl --load-all
>>
>> if it those are not part of the systemd init scripts. There might be
>> also a permission issue that strongSwan is unable to read it's
>> configuration file.
>>
>> Timo
>>
>> --
> M87 TECH
> Jon Clayton
>
> --
M87 TECH
Jon Clayton
------------------------------------------------------------------------------
Check out the vibrant tech community on one of the world's most
engaging tech sites, Slashdot.org! http://sdm.link/slashdot
_______________________________________________
opennhrp-devel mailing list
opennhrp-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/opennhrp-devel