Re: [strongSwan] Route based VPN in Linux

2018-04-16 Thread Andrii Petrenko
https://wiki.strongswan.org/projects/strongswan/wiki/RouteBasedVPN 


---
Andrii Petrenko
apl...@gmail.com

> On Apr 16, 2018, at 11:26, Kaushal Shriyan  wrote:
> 
> Hi,
> 
> I will appreciate if anyone can point me to a doc to setup Route based VPN in 
> Linux using VTI
> Thanks in Advance. 
> 
> I look forward to hearing from you.
> 
> Best Regards,
> 
> Kaushal



[strongSwan] Route based VPN in Linux

2018-04-16 Thread Kaushal Shriyan
Hi,

I will appreciate if anyone can point me to a doc to setup Route based VPN
in Linux using VTI
Thanks in Advance.

I look forward to hearing from you.

Best Regards,

Kaushal


Re: [strongSwan] IKE_SA_INIT response with notification data missing

2018-04-16 Thread Tobias Brunner
> Is there any reason why UDP checksum in the packet shows as wrong in the 
> wireshark?

Possibly hardware checksum offloading [1].

Regards,
Tobias

[1] https://wiki.wireshark.org/CaptureSetup/Offloading


Re: [strongSwan] IKE_SA_INIT response with notification data missing

2018-04-16 Thread Balaji Thoguluva Bapulal
Thanks Andreas, will take a look at it. Is there any reason why UDP checksum in 
the packet shows as wrong in the wireshark?

-Original Message-
From: Andreas Steffen [mailto:andreas.stef...@strongswan.org] 
Sent: Monday, April 16, 2018 5:04 AM
To: Balaji Thoguluva Bapulal ; 
users@lists.strongswan.org
Subject: Re: [strongSwan] IKE_SA_INIT response with notification data missing

Hi Balaji,

RFC 4739 "Multiple Authenticaton Exchanges in IKEv2"

   https://tools.ietf.org/html/rfc4739#section-3.1

defines the format of the MULTIPLE_AUTH_SUPPORT Notify Payload as

3.1.  MULTIPLE_AUTH_SUPPORTED Notify Payload

The MULTIPLE_AUTH_SUPPORTED notification is included in the
IKE_SA_INIT response or the first IKE_AUTH request to indicate that
the peer supports this specification.  The Notify Message Type is
MULTIPLE_AUTH_SUPPORTED (16404).  The Protocol ID and SPI Size fields
MUST be set to zero, and there is no data associated with this Notify
type.

So I don't understand why you expect notification data?

Regards

Andreas

On 15.04.2018 04:42, Balaji Thoguluva Bapulal wrote:
> Dear users,
>
> I am trying to establish a IKEv2/IPsec tunnel from a security gateway 
> towards strongswan with strongswan acting as a responder. In response 
> to IKE_SA_INIT request packet, strongswan sends back IKE_SA_INIT 
> response with a Notify payload of MULTIPLE_AUTH_SUPPORTED with 
> notification data missing. I have attached the wireshark. It would be 
> great if someone can explain why this behavior.
>
> [IKEv2]$ ipsec --version
>
> Linux strongSwan U5.3.0/K3.8.13-16.2.1.el6uek.x86_64
>
> Institute for Internet Technologies and Applications
>
> University of Applied Sciences Rapperswil, Switzerland
>
> See 'ipsec --copyright' for copyright information.
>
> The following is the configuration.
>
> config setup
>
>  charondebug=all
>
> conn %default
>
>  keyingtries=1
>
>  keyexchange=ikev2
>
>  reauth=no
>
> conn psk
>
>  left=172.16.55.62
>
>  leftsourceip=%config%
>
>  leftfirewall=no
>
>  leftauth=psk
>
>  leftsubnet=172.16.0.0/16
>
>  right=172.16.135.192
>
>  rightid=172.16.135.192
>
>  rightsubnet=172.16.0.0/16
>
>  rightauth=psk
>
>  esp=3des-aes-sha1-md5-modp1024
>
>  ike=3des-sha1-md5-modp1024
>
>  auto=add
>
>  type=tunnel
>
> Thanks,
>
> Balaji
>

--
==
Andreas Steffen andreas.stef...@strongswan.org
strongSwan - the Open Source VPN Solution!  www.strongswan.org
Institute for Networked Solutions
University of Applied Sciences Rapperswil
CH-8640 Rapperswil (Switzerland)
===[INS-HSR]==



Re: [strongSwan] IKE_SA_INIT response with notification data missing

2018-04-16 Thread Andreas Steffen

Hi Balaji,

RFC 4739 "Multiple Authenticaton Exchanges in IKEv2"

  https://tools.ietf.org/html/rfc4739#section-3.1

defines the format of the MULTIPLE_AUTH_SUPPORT Notify Payload as

3.1.  MULTIPLE_AUTH_SUPPORTED Notify Payload

   The MULTIPLE_AUTH_SUPPORTED notification is included in the
   IKE_SA_INIT response or the first IKE_AUTH request to indicate that
   the peer supports this specification.  The Notify Message Type is
   MULTIPLE_AUTH_SUPPORTED (16404).  The Protocol ID and SPI Size fields
   MUST be set to zero, and there is no data associated with this Notify
   type.

So I don't understand why you expect notification data?

Regards

Andreas

On 15.04.2018 04:42, Balaji Thoguluva Bapulal wrote:

Dear users,

I am trying to establish a IKEv2/IPsec tunnel from a security gateway
towards strongswan with strongswan acting as a responder. In response to
IKE_SA_INIT request packet, strongswan sends back IKE_SA_INIT response
with a Notify payload of MULTIPLE_AUTH_SUPPORTED with notification data
missing. I have attached the wireshark. It would be great if someone can
explain why this behavior.

[IKEv2]$ ipsec --version

Linux strongSwan U5.3.0/K3.8.13-16.2.1.el6uek.x86_64

Institute for Internet Technologies and Applications

University of Applied Sciences Rapperswil, Switzerland

See 'ipsec --copyright' for copyright information.

The following is the configuration.

config setup

 charondebug=all

conn %default

 keyingtries=1

 keyexchange=ikev2

 reauth=no

conn psk

 left=172.16.55.62

 leftsourceip=%config%

 leftfirewall=no

 leftauth=psk

 leftsubnet=172.16.0.0/16

 right=172.16.135.192

 rightid=172.16.135.192

 rightsubnet=172.16.0.0/16

 rightauth=psk

 esp=3des-aes-sha1-md5-modp1024

 ike=3des-sha1-md5-modp1024

 auto=add

 type=tunnel

Thanks,

Balaji



--
==
Andreas Steffen andreas.stef...@strongswan.org
strongSwan - the Open Source VPN Solution!  www.strongswan.org
Institute for Networked Solutions
University of Applied Sciences Rapperswil
CH-8640 Rapperswil (Switzerland)
===[INS-HSR]==



smime.p7s
Description: S/MIME Cryptographic Signature