Re: [pfSense] pfsense 2.2 Strongswan rekeying issues

2015-02-28 Thread Chris Buechler
On Sat, Feb 28, 2015 at 5:03 AM, Brian Candler  wrote:
> On 25/02/2015 09:07, Brian Candler wrote:
>>
>> How does one prevent the plugin being loaded? I found these:
>>
>> /etc/pfSense_md5.txt:MD5
>> (/usr/local/lib/ipsec/plugins/libstrongswan-unity.so) =
>> 66080ad3f0fd624958e8307492f6488b
>> /etc/installed_filesystem.mtree:libstrongswan-unity.so \
>>
>> but I can't see code which says which plugins to load. Should I just move
>> it out of the way and restart strongswan?
>>
> In the end I renamed libstrongswan-unity.so to libstrongswan-unity.so.orig
> and restarted. Confirmed that the module wasn't present using "ipsec
> statusall | grep unity"
>
> It's now just over 3 days later and the tunnel has remained up all that
> time, so I think it's solved the problem, or at least, is a usable
> workaround.

Thanks for the confirmation. We'll change that option so it fully
omits the loading of that plugin rather than just disabling it. That
will make 2.2.1. Your change won't survive the upgrade, but if you
leave the "Disable unity" checkbox checked, it'll be functionally
equivalent post-upgrade.
___
pfSense mailing list
https://lists.pfsense.org/mailman/listinfo/list
Support the project with Gold! https://pfsense.org/gold


Re: [pfSense] pfsense 2.2 Strongswan rekeying issues

2015-02-28 Thread Brian Candler

On 25/02/2015 09:07, Brian Candler wrote:

How does one prevent the plugin being loaded? I found these:

/etc/pfSense_md5.txt:MD5 
(/usr/local/lib/ipsec/plugins/libstrongswan-unity.so) = 
66080ad3f0fd624958e8307492f6488b

/etc/installed_filesystem.mtree:libstrongswan-unity.so \

but I can't see code which says which plugins to load. Should I just 
move it out of the way and restart strongswan?


In the end I renamed libstrongswan-unity.so to 
libstrongswan-unity.so.orig and restarted. Confirmed that the module 
wasn't present using "ipsec statusall | grep unity"


It's now just over 3 days later and the tunnel has remained up all that 
time, so I think it's solved the problem, or at least, is a usable 
workaround.


___
pfSense mailing list
https://lists.pfsense.org/mailman/listinfo/list
Support the project with Gold! https://pfsense.org/gold


Re: [pfSense] pfsense 2.2 Strongswan rekeying issues

2015-02-25 Thread Brian Candler

On 24/02/2015 21:44, Brian Candler wrote:
Many thanks. I've made that change now and I'll see over the next few 
days if it stays up. 

Unfortunately it didn't :-(

2015 Feb 25 06:07:30 Group = X.X.X.219, IP = X.X.X.219, Error: dynamic 
map SYSTEM_DEFAULT_CRYPTO_MAP: * to any not permitted.
2015 Feb 25 06:07:30 Group = X.X.X.219, IP = X.X.X.219, Rejecting IPSec 
tunnel: no matching crypto map entry for remote proxy 
0.0.0.0/0.0.0.0/0/0 local proxy 10.26.0.0/255.255.0.0/0/0 on interface 
outside
2015 Feb 25 06:07:30 Group = X.X.X.219, IP = X.X.X.219, QM FSM error (P2 
struct &0xcbf3d218, mess id 0xc9a0458c)!
2015 Feb 25 06:07:30 Group = X.X.X.219, IP = X.X.X.219, Removing peer 
from correlator table failed, no match!


What I had done is:

VPN > IPSec > Advanced settings
Check "Disable Unity Plugin"
Stop IPSEC service
Start IPSEC service

And I can see this has been applied (except I've not rebooted the firewall)

: grep unity /var/etc/ipsec/strongswan.conf
cisco_unity = no

> There was one person reporting that wasn't adequate, the plugin had 
to be not loaded at all, not just disabled like that.


How does one prevent the plugin being loaded? I found these:

/etc/pfSense_md5.txt:MD5 
(/usr/local/lib/ipsec/plugins/libstrongswan-unity.so) = 
66080ad3f0fd624958e8307492f6488b

/etc/installed_filesystem.mtree:libstrongswan-unity.so \

but I can't see code which says which plugins to load. Should I just 
move it out of the way and restart strongswan?


Regards,

Brian.

___
pfSense mailing list
https://lists.pfsense.org/mailman/listinfo/list
Support the project with Gold! https://pfsense.org/gold


Re: [pfSense] pfsense 2.2 Strongswan rekeying issues

2015-02-24 Thread Brian Candler

On 24/02/2015 20:33, Chris Buechler wrote:

That's this:
https://redmine.pfsense.org/issues/4178

disabling Unity on the Advanced tab, followed by a manual stop and 
start (not just restart) of strongswan may resolve that. There was one 
person reporting that wasn't adequate, the plugin had to be not loaded 
at all, not just disabled like that. I haven't yet had a chance to try 
to duplicate that circumstance.
Many thanks. I've made that change now and I'll see over the next few 
days if it stays up.


Regards,

Brian.

___
pfSense mailing list
https://lists.pfsense.org/mailman/listinfo/list
Support the project with Gold! https://pfsense.org/gold


Re: [pfSense] pfsense 2.2 Strongswan rekeying issues

2015-02-24 Thread Chris Buechler
On Tue, Feb 24, 2015 at 8:02 AM, Brian Candler  wrote:

> We appear to have the same problem here after upgrading a box from pfSense
> 2.1.5 to 2.2.  The other side is a Cisco ASA5505.
>
> X.X.X.219 = pfSense, internal subnet 10.19.0.0/16
> Y.Y.Y.155 = Cisco, internal subnet 10.26.0.0/16
>
> Here is the log we get from the Cisco:
>
> 2015 Feb 24 13:20:03 Group = X.X.X.219, IP = X.X.X.219, Error: dynamic map
> SYSTEM_DEFAULT_CRYPTO_MAP: * to any not permitted.
> 2015 Feb 24 13:20:03 Group = X.X.X.219, IP = X.X.X.219, Rejecting IPSec
> tunnel: no matching crypto map entry for remote proxy 0.0.0.0/0.0.0.0/0/0
> local proxy 10.26.0.0/255.255.0.0/0/0 on interface outside
> 2015 Feb 24 13:20:03 Group = X.X.X.219, IP = X.X.X.219, QM FSM error (P2
> struct &0xcc9648f8, mess id 0x4c6e71f9)!
> 2015 Feb 24 13:20:03 Group = X.X.X.219, IP = X.X.X.219, Removing peer from
> correlator table failed, no match!
>
> From this, it looks pretty clear that the phase 2 request from pfSense is
> wrong: it is requesting 0.0.0.0/0 <-> 10.26.0.0/16, instead of
> 10.19.0.0/16 <-> 10.26.0.0/16
>
> Here is the log from the pfSense side:
>
> Feb 24 13:20:03charon: 08[IKE] received INVALID_ID_INFORMATION error
> notify
> Feb 24 13:20:03charon: 08[IKE]  received
> INVALID_ID_INFORMATION error notify
> Feb 24 13:20:03charon: 08[ENC] parsed INFORMATIONAL_V1 request
> 3283507075 [ HASH N(INVAL_ID) ]
> Feb 24 13:20:03charon: 08[NET] received packet: from Y.Y.Y.155[500] to
> X.X.X.219[500] (260 bytes)
> Feb 24 13:20:03charon: 08[NET] sending packet: from X.X.X.219[500] to
> Y.Y.Y.155[500] (204 bytes)
> Feb 24 13:20:03charon: 08[ENC] generating QUICK_MODE request
> 1282306553 [ HASH SA No ID ID ]
> Feb 24 13:20:03charon: 14[KNL] creating acquire job for policy
> X.X.X.219/32|/0 === Y.Y.Y.155/32|/0 with reqid {1}
>

That's this:
https://redmine.pfsense.org/issues/4178

disabling Unity on the Advanced tab, followed by a manual stop and start
(not just restart) of strongswan may resolve that. There was one person
reporting that wasn't adequate, the plugin had to be not loaded at all, not
just disabled like that. I haven't yet had a chance to try to duplicate
that circumstance.
___
pfSense mailing list
https://lists.pfsense.org/mailman/listinfo/list
Support the project with Gold! https://pfsense.org/gold

Re: [pfSense] pfsense 2.2 Strongswan rekeying issues

2015-02-24 Thread Michael Schuh
if i had such rekeying issues one or more of the following was may be not
in the right shape:
Key times to live, different TTL on both sides for the resp. Component
(DH,AH ... )
Key lenghts/Algorithms (rare)
Timing issues due to Packet-Flow (very often, due to policy based routing
in the net)
Check with mtr for different routes for out and in packets, if they have
different routes, the tunnels will struggle.

= = =  http://michael-schuh.net/  = = =
Projektmanagement - IT-Consulting - Professional Services IT
Postfach 10 21 52
66021 Saarbrücken
phone: 0681/8319664
@: m i c h a e l . s c h u h @ g m a i l . c o m

= = =  Ust-ID:  DE251072318  = = =

2015-02-24 15:38 GMT+01:00 Bob Gustafson :

>  Excellent clue!
>
> On 02/24/2015 08:15 AM, Brian Candler wrote:
>
> However based on Nagios logs, after the tunnel has been up for pretty much
> exactly one hour, it drops out again. This would coincide with the P2 SA
> expiring and being re-negotiated.
>
> It would be **really** helpful if the debug message "generating
> QUICK_MODE request" included the P2 parameters being requested, in the same
> way the CHILD_SA message does ("TS 10.19.0.0/16|/0
>  === 10.26.0.0/16|/0 "),
> as according to the Cisco, it's asking for the wrong ones.
>
> Regards,
>
> Brian.
>
>
>
> ___
> pfSense mailing list
> https://lists.pfsense.org/mailman/listinfo/list
> Support the project with Gold! https://pfsense.org/gold
>
___
pfSense mailing list
https://lists.pfsense.org/mailman/listinfo/list
Support the project with Gold! https://pfsense.org/gold

Re: [pfSense] pfsense 2.2 Strongswan rekeying issues

2015-02-24 Thread Bob Gustafson

Excellent clue!

On 02/24/2015 08:15 AM, Brian Candler wrote:
However based on Nagios logs, after the tunnel has been up for pretty 
much exactly one hour, it drops out again. This would coincide with 
the P2 SA expiring and being re-negotiated.


It would be *really* helpful if the debug message "generating 
QUICK_MODE request" included the P2 parameters being requested, in the 
same way the CHILD_SA message does ("TS 10.19.0.0/16|/0 === 
10.26.0.0/16|/0"), as according to the Cisco, it's asking for the 
wrong ones.


Regards,

Brian. 


___
pfSense mailing list
https://lists.pfsense.org/mailman/listinfo/list
Support the project with Gold! https://pfsense.org/gold

Re: [pfSense] pfsense 2.2 Strongswan rekeying issues

2015-02-24 Thread Brian Candler
Interestingly, if we kick the tunnel from the pfSense GUI, it negotiates 
both P1 and P2 successfully.


pfSense log:

Feb 24 14:06:42charon: 07[ENC] generating QUICK_MODE request 
1807616002 [ HASH ]
Feb 24 14:06:42charon: 07[IKE] CHILD_SA con1000{1} established with 
SPIs _i _o and TS 10.19.0.0/16|/0 === 10.26.0.0/16|/0
Feb 24 14:06:42charon: 07[IKE]  CHILD_SA con1000{1} 
established with SPIs _i _o and TS 10.19.0.0/16|/0 === 
10.26.0.0/16|/0
Feb 24 14:06:42charon: 07[ENC] parsed QUICK_MODE response 1807616002 
[ HASH SA No ID ID ]
Feb 24 14:06:42charon: 07[NET] received packet: from Y.Y.Y.155[500] 
to X.X.X.219[500] (164 bytes)
Feb 24 14:06:42charon: 07[NET] sending packet: from X.X.X.219[500] 
to Y.Y.Y.155[500] (204 bytes)
Feb 24 14:06:42charon: 07[ENC] generating QUICK_MODE request 
1807616002 [ HASH SA No ID ID ]

<< snip all the P1 negotiation >>

However based on Nagios logs, after the tunnel has been up for pretty 
much exactly one hour, it drops out again. This would coincide with the 
P2 SA expiring and being re-negotiated.


It would be *really* helpful if the debug message "generating QUICK_MODE 
request" included the P2 parameters being requested, in the same way the 
CHILD_SA message does ("TS 10.19.0.0/16|/0 === 10.26.0.0/16|/0"), as 
according to the Cisco, it's asking for the wrong ones.


Regards,

Brian.
___
pfSense mailing list
https://lists.pfsense.org/mailman/listinfo/list
Support the project with Gold! https://pfsense.org/gold


Re: [pfSense] pfsense 2.2 Strongswan rekeying issues

2015-02-24 Thread Brian Candler
We appear to have the same problem here after upgrading a box from 
pfSense 2.1.5 to 2.2.  The other side is a Cisco ASA5505.


X.X.X.219 = pfSense, internal subnet 10.19.0.0/16
Y.Y.Y.155 = Cisco, internal subnet 10.26.0.0/16

Here is the log we get from the Cisco:

2015 Feb 24 13:20:03 Group = X.X.X.219, IP = X.X.X.219, Error: dynamic 
map SYSTEM_DEFAULT_CRYPTO_MAP: * to any not permitted.
2015 Feb 24 13:20:03 Group = X.X.X.219, IP = X.X.X.219, Rejecting IPSec 
tunnel: no matching crypto map entry for remote proxy 
0.0.0.0/0.0.0.0/0/0 local proxy 10.26.0.0/255.255.0.0/0/0 on interface 
outside
2015 Feb 24 13:20:03 Group = X.X.X.219, IP = X.X.X.219, QM FSM error (P2 
struct &0xcc9648f8, mess id 0x4c6e71f9)!
2015 Feb 24 13:20:03 Group = X.X.X.219, IP = X.X.X.219, Removing peer 
from correlator table failed, no match!


From this, it looks pretty clear that the phase 2 request from pfSense 
is wrong: it is requesting 0.0.0.0/0 <-> 10.26.0.0/16, instead of 
10.19.0.0/16 <-> 10.26.0.0/16


Here is the log from the pfSense side:

Feb 24 13:20:03charon: 08[IKE] received INVALID_ID_INFORMATION error 
notify
Feb 24 13:20:03charon: 08[IKE]  received 
INVALID_ID_INFORMATION error notify
Feb 24 13:20:03charon: 08[ENC] parsed INFORMATIONAL_V1 request 
3283507075 [ HASH N(INVAL_ID) ]
Feb 24 13:20:03charon: 08[NET] received packet: from Y.Y.Y.155[500] 
to X.X.X.219[500] (260 bytes)
Feb 24 13:20:03charon: 08[NET] sending packet: from X.X.X.219[500] 
to Y.Y.Y.155[500] (204 bytes)
Feb 24 13:20:03charon: 08[ENC] generating QUICK_MODE request 
1282306553 [ HASH SA No ID ID ]
Feb 24 13:20:03charon: 14[KNL] creating acquire job for policy 
X.X.X.219/32|/0 === Y.Y.Y.155/32|/0 with reqid {1}


which basically just says that pfSense tried to negotiate phase 2 and 
the Cisco rejected it.


The output of setkey -D -P on pfSense currently looks reasonable: we 
have a number of other tunnels but it includes


...
10.26.0.0/16[any] 10.19.0.0/16[any] any
in ipsec
esp/tunnel/Y.Y.Y.155-X.X.X.219/unique:1
created: Feb 24 13:26:35 2015  lastused: Feb 24 13:44:50 2015
lifetime: 9223372036854775807(s) validtime: 0(s)
spid=912 seq=4 pid=18754
refcnt=1
...
10.19.0.0/16[any] 10.26.0.0/16[any] any
out ipsec
esp/tunnel/X.X.X.219-Y.Y.Y.155/unique:1
created: Feb 24 13:26:35 2015  lastused: Feb 24 13:49:56 2015
lifetime: 9223372036854775807(s) validtime: 0(s)
spid=911 seq=0 pid=57004
refcnt=1

I don't see any policies with 0.0.0.0/0 in them.

When the tunnels had failed to negotiate the SA appeared to still be 
there, although the time between 'created' and 'lastused' was more than 
1 hour, so this may have been showing a stale SA.


This *is* reproducible, unfortunately reproducing several times per day 
:-( We need to manually kick the tunnel to get it to come up again.


When the tunnel is up, the Cisco shows:

asa1# sh crypto ipsec sa peer X.X.X.219
peer address: X.X.X.219
Crypto map tag: outside_map0, seq num: 4, local addr: Y.Y.Y.155

  access-list outside_cryptomap_3 extended permit ip 10.26.0.0 
255.255.0.0 10.19.0.0 255.255.0.0

  local ident (addr/mask/prot/port): (10.26.0.0/255.255.0.0/0/0)
  remote ident (addr/mask/prot/port): (10.19.0.0/255.255.0.0/0/0)
  current_peer: X.X.X.219
...

The configuration in the pfSense GUI shows the tunnel with a single 
phase 2 entry (mode tunnel; local subnet 10.19.0.0/16; remote subnet 
10.26.0.0/16; P2 Protocol ESP; P2 Transforms AES (128 bits), 3DES; P2 
Auth Methods SHA1)


Regards,

Brian.

___
pfSense mailing list
https://lists.pfsense.org/mailman/listinfo/list
Support the project with Gold! https://pfsense.org/gold


Re: [pfSense] pfsense 2.2 Strongswan rekeying issues

2015-02-15 Thread Chris Buechler
On Sun, Feb 15, 2015 at 12:37 PM, Mark Relf  wrote:

>   Hi all,
>
>  We are experiencing a number of issues with IPSEC tunnels rekeying.  We
> see the following in the IPSEC log :
>
>   Feb 15 17:30:45 4slgbmernfw01 charon: 13[IKE]  received
> INVALID_ID_INFORMATION error notify
>
> Feb 15 17:30:50 4slgbmernfw01 charon: 14[IKE]  received
> INVALID_ID_INFORMATION error notify
>
> Feb 15 17:30:54 4slgbmernfw01 charon: 09[IKE]  received
> INVALID_ID_INFORMATION error notify
>
> Feb 15 17:30:59 4slgbmernfw01 charon: 09[IKE]  received
> INVALID_ID_INFORMATION error notify
>
> Feb 15 17:31:04 4slgbmernfw01 charon: 15[IKE]  received
> INVALID_ID_INFORMATION error notify
>
>
>  This is not always for the same connection but does happen frequently
> and has made release 2.2 almost unusable for us.
>
>  We have to issue ipsec down con xxx and ipsec up con xxx to reset the
> tunnel.
>
>  I have had a brief look at the strongswan website and they seem to be
> indicating an issue and have a patch.
>
>  Has this/when will this patch be incorporated into pfsense (strongswan
> issue819 seems to be a close match)
>
>
One of our community members opened that strongswan 819 ticket when it's at
least a mix of two completely different problems, and not a good
description of what might be happening there. I can't seem to find a
replicable circumstance that produces that issue.

Do you have multiple phase 2 entries on a single phase 1? What is the
remote endpoint you're connecting to? The only confirmed issue where I'm
aware of a specific cause is a problem in the Cisco Unity plugin that can
be triggered when rekeying with certain configurations in place on the
Cisco end.
___
pfSense mailing list
https://lists.pfsense.org/mailman/listinfo/list
Support the project with Gold! https://pfsense.org/gold

[pfSense] pfsense 2.2 Strongswan rekeying issues

2015-02-15 Thread Mark Relf
Hi all,

We are experiencing a number of issues with IPSEC tunnels rekeying.  We see the 
following in the IPSEC log :


Feb 15 17:30:45 4slgbmernfw01 charon: 13[IKE]  received 
INVALID_ID_INFORMATION error notify

Feb 15 17:30:50 4slgbmernfw01 charon: 14[IKE]  received 
INVALID_ID_INFORMATION error notify

Feb 15 17:30:54 4slgbmernfw01 charon: 09[IKE]  received 
INVALID_ID_INFORMATION error notify

Feb 15 17:30:59 4slgbmernfw01 charon: 09[IKE]  received 
INVALID_ID_INFORMATION error notify

Feb 15 17:31:04 4slgbmernfw01 charon: 15[IKE]  received 
INVALID_ID_INFORMATION error notify


This is not always for the same connection but does happen frequently and has 
made release 2.2 almost unusable for us.

We have to issue ipsec down con xxx and ipsec up con xxx to reset the tunnel.

I have had a brief look at the strongswan website and they seem to be 
indicating an issue and have a patch.

Has this/when will this patch be incorporated into pfsense (strongswan issue819 
seems to be a close match)

We either need to get this fixed or revert back to using racoon ….




Mark Relf
Principal Consultant

[cv_certified_engineer.gif]

4sl Group, 4 Snow Hill, London EC1A 2DJ
t: +44 (0) 203 307 1053
m: +44 (0) 7868 842548
w: www.4sl.com
e: mark.r...@4sl.com

Planned away dates: None

[cid:B6E3BF5B-11F0-473A-897C-46E683E08B0B]  [2013 Tech Track 100 logo - smaller]
Legal Disclaimer: The information in this email and any attachment is 
confidential and may also be privileged. If you have received this message in 
error please notify the sender and delete the message and attachments from your 
system immediately. You are not entitled to retain, copy or use this email for 
any purpose, nor disclose all or any part of its content to any other person.
___
pfSense mailing list
https://lists.pfsense.org/mailman/listinfo/list
Support the project with Gold! https://pfsense.org/gold