Re: [strongSwan] strongSwan, swanctl and systemd]

2014-07-15 Thread Martin Willi
Hi John,

  We have some definite plans to introduce native systemd support

 Any chance this can be a compile-time selection for those of us who don't
 use systemd?

Definitely; that systemd specific IKE daemon will be completely
optional, and not the default. ipsec.conf based configuration and the
traditional charon daemon won't go away in the foreseeable future.

Regards
Martin

___
Users mailing list
Users@lists.strongswan.org
https://lists.strongswan.org/mailman/listinfo/users


[strongSwan] StrongSwan and Android

2014-07-15 Thread Alex Gregory
Hello-

After much searching on the internet I am looking for a definitive answer from 
the source.

I have successfully configured iOS devices to VPN into my StrongSwan test 
environment in Amazon.  I have also gotten the StrongSwan client to work on 
Android 4.4.2 (which tells me my certificate creation is good for both sides).  
My question is if there is any way to have Android clients connect with the 
native IPSec client in Android?  When in the native IPsec client in Android it 
will not let me pick the installed certificate that the StrongSwan client can 
see just fine.

Thank you for your time.

Alex

___
Users mailing list
Users@lists.strongswan.org
https://lists.strongswan.org/mailman/listinfo/users


[strongSwan] IKE_SA reauth failed with dual link.

2014-07-15 Thread Alexis Salinas
Hello all, 

I have 2 gateways running Linux strongSwan U4.3.5/K2.6.32-526 configured for 
IKEv2, net-to-net with MOBIKE enabled.

Gateway-A, the initiator, has 2 links. Gateway-B the responder, has only one 
link. These are the IP addresses.
gateway-A_link1 = 172.19.78.72
gateway-A_link2 = 10.5.102.102
gateway-B_link1 = 192.168.10.10

Gateway-A uses both links, alternatively, as default link (depending of its 
location). MOBIKE works beautifully when switching links. Gateway-A can only 
reach gateway-B using the default route.

The problem I'm observing is that if IKE_SA is established on one of 
gateway-A's link and the link switches  before IKE_REAUTH starts, StrongSwan 
tries (and fails) to initiate the new IKE_SA using the IP address of the 
initial link. 

It doesn't matter which link starts, it happens regarding of the direction of 
the link switch. 

I also tested another machine in place of gateway-A, running Linux strongSwan 
U5.1.2/K3.4.11-527, with the same result.

Here is an example. The tunnel initially established while gateway-A_link2 was 
the default route. Default route changed at around 16:00, making 
gateway-A_link1 the default route.

Jul  7 16:22:34 gateway-A charon: 09[IKE] queueing IKE_REAUTH task
Jul  7 16:22:34 gateway-A charon: 09[IKE] activating new tasks
Jul  7 16:22:34 gateway-A charon: 09[IKE]   activating IKE_REAUTH task
Jul  7 16:22:34 gateway-A charon: 09[IKE] deleting IKE_SA Net-Net[1] between 
172.19.78.72[gateway-A]...192.168.10.10[gateway-B]
Jul  7 16:22:34 gateway-A charon: 09[IKE] IKE_SA Net-Net[1] state change: 
ESTABLISHED = DELETING
Jul  7 16:22:34 gateway-A charon: 09[IKE] sending DELETE for IKE_SA Net-Net[1]
Jul  7 16:22:34 gateway-A charon: 09[NET] sending packet: from 
172.19.78.72[4500] to 192.168.10.10[4500]
Jul  7 16:22:34 gateway-A charon: 05[NET] sending packet: from 
172.19.78.72[4500] to 192.168.10.10[4500]
Jul  7 16:22:34 gateway-A charon: 06[NET] received packet: from 
192.168.10.10[4500] to 172.19.78.72[4500]
Jul  7 16:22:34 gateway-A charon: 06[NET] waiting for data on raw sockets
Jul  7 16:22:34 gateway-A charon: 08[NET] received packet: from 
192.168.10.10[4500] to 172.19.78.72[4500]
Jul  7 16:22:34 gateway-A charon: 08[IKE] IKE_SA deleted
Jul  7 16:22:34 gateway-A charon: 08[IKE] queueing IKE_INIT task
Jul  7 16:22:34 gateway-A charon: 08[IKE] queueing IKE_NATD task
Jul  7 16:22:34 gateway-A charon: 08[IKE] queueing IKE_CERT_PRE task
Jul  7 16:22:34 gateway-A charon: 08[IKE] queueing IKE_AUTHENTICATE task
Jul  7 16:22:34 gateway-A charon: 08[IKE] queueing IKE_CERT_POST task
Jul  7 16:22:34 gateway-A charon: 08[IKE] queueing IKE_CONFIG task
Jul  7 16:22:34 gateway-A charon: 08[IKE] queueing IKE_AUTH_LIFETIME task
Jul  7 16:22:34 gateway-A charon: 08[IKE] queueing IKE_MOBIKE task
Jul  7 16:22:34 gateway-A charon: 08[IKE] queueing CHILD_CREATE task
Jul  7 16:22:34 gateway-A charon: 08[IKE] activating new tasks
Jul  7 16:22:34 gateway-A charon: 08[IKE]   activating IKE_INIT task
Jul  7 16:22:34 gateway-A charon: 08[IKE]   activating IKE_NATD task
Jul  7 16:22:34 gateway-A charon: 08[IKE]   activating IKE_CERT_PRE task
Jul  7 16:22:34 gateway-A charon: 08[IKE]   activating IKE_AUTHENTICATE task
Jul  7 16:22:35 gateway-A charon: 08[IKE]   activating IKE_CERT_POST task
Jul  7 16:22:35 gateway-A charon: 08[IKE]   activating IKE_CONFIG task
Jul  7 16:22:35 gateway-A charon: 08[IKE]   activating CHILD_CREATE task
Jul  7 16:22:35 gateway-A charon: 08[IKE]   activating IKE_AUTH_LIFETIME task
Jul  7 16:22:35 gateway-A charon: 08[IKE]   activating IKE_MOBIKE task
Jul  7 16:22:35 gateway-A charon: 08[IKE] initiating IKE_SA Net-Net[2] to 
192.168.10.10
Jul  7 16:22:35 gateway-A charon: 08[IKE] IKE_SA Net-Net[2] state change: 
CREATED = CONNECTING
Jul  7 16:22:35 gateway-A charon: 08[NET] sending packet: from 
10.5.102.102[500] to 192.168.10.10[500]
Jul  7 16:22:35 gateway-A charon: 05[NET] sending packet: from 
10.5.102.102[500] to 192.168.10.10[500]
Jul  7 16:22:35 gateway-A charon: 05[NET] error writing to socket: Operation 
not permitted
Jul  7 16:22:35 gateway-A charon: 08[IKE] queueing CHILD_CREATE task
Jul  7 16:22:35 gateway-A charon: 08[IKE] delaying task initiation, exchange in 
progress
Jul  7 16:22:35 gateway-A charon: 08[IKE] IKE_SA Net-Net[1] state change: 
DELETING = DESTROYING
Jul  7 16:22:39 gateway-A charon: 08[IKE] retransmit 1 of request with message 
ID 0
Jul  7 16:22:39 gateway-A charon: 08[NET] sending packet: from 
10.5.102.102[500] to 192.168.10.10[500]
Jul  7 16:22:39 gateway-A charon: 05[NET] sending packet: from 
10.5.102.102[500] to 192.168.10.10[500]
Jul  7 16:22:39 gateway-A charon: 05[NET] error writing to socket: Operation 
not permitted
Jul  7 16:22:46 gateway-A charon: 09[IKE] retransmit 2 of request with message 
ID 0
Jul  7 16:22:46 gateway-A charon: 09[NET] sending packet: from 
10.5.102.102[500] to 192.168.10.10[500]
Jul  7 16:22:46 gateway-A charon: 05[NET] sending packet: from 
10.5.102.102[500] to 192.168.10.10[500]
Jul 

Re: [strongSwan] Small Problems with 5.2

2014-07-15 Thread Dirk Hartmann

Hi Martin,

--On Friday, July 11, 2014 03:04:27 PM +0200 Martin Willi 
mar...@strongswan.org wrote:





ipsec_starter[3318]: notifying watcher failed: Broken pipe



I got: no trusted RSA public key found for NAME


Btw, I don't think these two issues are directly related. While
asynchronous IPC operation is affected, starter actually doesn't use
that.

Probably something else is wrong with that key: trust chain
validation, certificate exchange, or loading trusted certificates.
Your log might have more details.


was there a change in 5.2 about charon asking for the certificate of 
the peer?
I can establish a connection when I add leftsendcert=yes to the 
configuration of my roadwarrior.

If I don't add it I get a connection with 5.1.3 but on 5.2 I get:
[IKE] no trusted RSA public key found for 'C=DE, O='
in the log of the server.

Best Regards
Dirk


pgpKoigv8o7Ll.pgp
Description: PGP signature
___
Users mailing list
Users@lists.strongswan.org
https://lists.strongswan.org/mailman/listinfo/users

Re: [strongSwan] Small Problems with 5.2

2014-07-15 Thread Martin Willi
Dirk,

 was there a change in 5.2 about charon asking for the certificate of
 the peer? I can establish a connection when I add leftsendcert=yes to
 the configuration of my roadwarrior.

None that I'm aware of. leftsendcert=ifasked was the policy ever since.

 If I don't add it I get a connection with 5.1.3 but on 5.2 I get:
 [IKE] no trusted RSA public key found for 'C=DE, O='
 in the log of the server.

As the default policy is ifasked, this most likely implies that your
server does not send a certificate request. By default certificate
requests are sent; what is your rightsendcert setting on the server?

charon logs the certificates and certificate requests sent/received
during the exchange, that should help in analyzing what is missing.

Regards
Martin

___
Users mailing list
Users@lists.strongswan.org
https://lists.strongswan.org/mailman/listinfo/users


Re: [strongSwan] Small Problems with 5.2

2014-07-15 Thread Martin Willi

 With this connection active it doesn't matter if I set rightsendcert to 
 ifasked or yes in the default section or the specific connection 
 section of my linux roadwarrior. I can't connect because charon doesn't 
 send a certificate request.
 
 If I remove the conn section for win 7 eap, I can connect.

Certificate requests are sent very early in the IKE negotiation. As a
responder, it is sent in the first IKE_SA_INIT response. At this stage,
charon can not reliably select a configuration, as no peer identities or
authentication methods are known yet.

If no IP address selectors are in place (using left/right), usually just
the first matching configuration is used. This probably is the win7
connection in your configuration.

 I set rightsendcert = never as mentioned in the wiki page 

While this recommendation is fine if you handle Windows clients only,
for mixed setups it can result in these issues. I'll add a note to the
wiki.

If you can't apply IP based selectors to your configuration using
left/right, you should consider removing the rightsendcert option.

Not sure why the behavior changed between 5.1.3 and 5.2.0 in this
regard; likely that it is related to the replaced ipsec.conf parser.

Regards
Martin

___
Users mailing list
Users@lists.strongswan.org
https://lists.strongswan.org/mailman/listinfo/users


Re: [strongSwan] Small Problems with 5.2

2014-07-15 Thread Dirk Hartmann

Hi Martin,

--On Tuesday, July 15, 2014 01:52:45 PM +0200 Martin Willi 
mar...@strongswan.org wrote:





With this connection active it doesn't matter if I set rightsendcert
to  ifasked or yes in the default section or the specific connection
section of my linux roadwarrior. I can't connect because charon
doesn't  send a certificate request.

If I remove the conn section for win 7 eap, I can connect.


Certificate requests are sent very early in the IKE negotiation. As a
responder, it is sent in the first IKE_SA_INIT response. At this
stage, charon can not reliably select a configuration, as no peer
identities or authentication methods are known yet.

If no IP address selectors are in place (using left/right), usually
just the first matching configuration is used. This probably is the
win7 connection in your configuration.


ah ok I see


I set rightsendcert = never as mentioned in the wiki page


While this recommendation is fine if you handle Windows clients only,
for mixed setups it can result in these issues. I'll add a note to the
wiki.

If you can't apply IP based selectors to your configuration using
left/right, you should consider removing the rightsendcert option.

Not sure why the behavior changed between 5.1.3 and 5.2.0 in this
regard; likely that it is related to the replaced ipsec.conf parser.


It's probably the new parser.
Checking the logs on the gateway running 5.1.3 I discovered that the 
rightsendcert = never wasn't honoured for any connection. Windows 7 eap 
clients received a cert request too. So your suggestion to remove this 
option from our config should be no problem.


Thanks
Dirk


___
Users mailing list
Users@lists.strongswan.org
https://lists.strongswan.org/mailman/listinfo/users


[strongSwan] How to overcome the dpd re-transmission task for IKE_DELETE task?

2014-07-15 Thread Nanda Gopal
While testing ipsec ,it seems that with “ipsec stroke conn name”,
IKE_DELETE task is being queued on eNB but delayed by the ongoing dpd
re-transmission task. Is there any other way to administratively shutdown
the connection, overriding the dpd re-transmission task?

-- 
Regards

Nandagopal
___
Users mailing list
Users@lists.strongswan.org
https://lists.strongswan.org/mailman/listinfo/users