Hi again,

I didn't receive any response to my last email and I've been looking again at this today, still with no luck...but I have more ideas:

On 13/06/2018 10:14 pm, Reuben Farrelly wrote:
On 13/06/2018 7:49 am, Paul Wouters wrote:
Is there any way to support both families concurrently (a type of autodetect)

Not yet. You will have to define a v4 and a v6 conn.

Ok - that's fine.  That works (but for anyone else who tries this as I did - just remember you need to have a different conn name for each one even if the policies are otherwise almost identical, otherwise Libreswan starts normally but only applies one of the two conns)

I have copied my original and appended it with -ipv4 and the new one with -ipv6.  The only difference aside from the conn name is the left= and right= parameters.

But back to this connection, it's now progressing a lot further - but not quite completing still and data is still not flowing:

The below only shows liveness. So that assumes the connection
established? So can you show "ip xfrm pol" and "ip xfrm state" and
"ipsec status |grep router-2.reub.net"

It looks more or less OK but there's still no data flow.  I still cannot ping IPv4 between the two devices over IPv6.

Just to recap - this is what I have on the Cisco side:

interface Tunnel1
<snip>
  tunnel mode ipsec ipv6 v4-overlay
  tunnel destination 2400:8901::F03C:91FF:FE6E:9DC
end

The router is an 819 with IOS 15.7(3)M2, which is the latest release for this platform.

Do the mark or any other values of the two separate conn's need to be different even if only one is used at a time?

Here are the outputs requested above:

lightning /etc/ipsec.d # ip xfrm pol
src 0.0.0.0/0 dst 0.0.0.0/0
         dir out priority 1048575
         mark 0xc/0xffffff
        tmpl src 2400:8901::f03c:91ff:fe6e:9dc dst 2001:8004:1400:20c9:1863:feff:fea4:d208
                 proto esp reqid 16397 mode tunnel
src 0.0.0.0/0 dst 0.0.0.0/0
         dir fwd priority 1048575
         mark 0xc/0xffffff
        tmpl src 2001:8004:1400:20c9:1863:feff:fea4:d208 dst 2400:8901::f03c:91ff:fe6e:9dc
                 proto esp reqid 16397 mode tunnel
src 0.0.0.0/0 dst 0.0.0.0/0
         dir in priority 1048575
         mark 0xc/0xffffff
        tmpl src 2001:8004:1400:20c9:1863:feff:fea4:d208 dst 2400:8901::f03c:91ff:fe6e:9dc
                 proto esp reqid 16397 mode tunnel
src ::/0 dst ::/0
         socket out priority 0
src ::/0 dst ::/0
         socket in priority 0
src ::/0 dst ::/0
         socket out priority 0
src ::/0 dst ::/0
         socket in priority 0
src ::/0 dst ::/0
         socket out priority 0
src ::/0 dst ::/0
         socket in priority 0
src ::/0 dst ::/0
         socket out priority 0
src ::/0 dst ::/0
         socket in priority 0
src ::/0 dst ::/0
         socket out priority 0
src ::/0 dst ::/0
         socket in priority 0
src ::/0 dst ::/0
         socket out priority 0
src ::/0 dst ::/0
         socket in priority 0
src 0.0.0.0/0 dst 0.0.0.0/0
         socket out priority 0
src 0.0.0.0/0 dst 0.0.0.0/0
         socket in priority 0
src 0.0.0.0/0 dst 0.0.0.0/0
         socket out priority 0
src 0.0.0.0/0 dst 0.0.0.0/0
         socket in priority 0
src 0.0.0.0/0 dst 0.0.0.0/0
         socket out priority 0
src 0.0.0.0/0 dst 0.0.0.0/0
         socket in priority 0
src 0.0.0.0/0 dst 0.0.0.0/0
         socket out priority 0
src 0.0.0.0/0 dst 0.0.0.0/0
         socket in priority 0
src 0.0.0.0/0 dst 0.0.0.0/0
         socket out priority 0
src 0.0.0.0/0 dst 0.0.0.0/0
         socket in priority 0
src 0.0.0.0/0 dst 0.0.0.0/0
         socket out priority 0
src 0.0.0.0/0 dst 0.0.0.0/0
         socket in priority 0
src ::/0 dst ::/0 proto ipv6-icmp type 135
         dir out priority 1
src ::/0 dst ::/0 proto ipv6-icmp type 135
         dir fwd priority 1
src ::/0 dst ::/0 proto ipv6-icmp type 135
         dir in priority 1
src ::/0 dst ::/0 proto ipv6-icmp type 136
         dir out priority 1
src ::/0 dst ::/0 proto ipv6-icmp type 136
         dir fwd priority 1
src ::/0 dst ::/0 proto ipv6-icmp type 136
         dir in priority 1
lightning /etc/ipsec.d #

lightning /etc/ipsec.d # ip xfrm state
src 2001:8004:1400:20c9:1863:feff:fea4:d208 dst 2400:8901::f03c:91ff:fe6e:9dc
         proto esp spi 0x1d6f43e9 reqid 16397 mode tunnel
         replay-window 32 flag af-unspec
        auth-trunc hmac(sha1) 0x56130393b7b349ff0c61ee45a0ed58dc1db52b3a 96
         enc cbc(aes) 0x909d165e146fcd52272a4946a3bea41d
         anti-replay context: seq 0x12, oseq 0x0, bitmap 0x0003ffff
src 2400:8901::f03c:91ff:fe6e:9dc dst 2001:8004:1400:20c9:1863:feff:fea4:d208
         proto esp spi 0x2867ffcc reqid 16397 mode tunnel
         replay-window 32 flag af-unspec
        auth-trunc hmac(sha1) 0xb8aba431f6d67229bca8fb3d66fca8edeb7f8f8f 96
         enc cbc(aes) 0xb406eb113427edb19abcc0c752dbc1d1
         anti-replay context: seq 0x0, oseq 0x0, bitmap 0x00000000
lightning /etc/ipsec.d #

The outputs as of today are still the same. I have moved to another VPS which changes the IPv6 addresses above but the configs otherwise remain almost the same. I had to enable narrowing, but the negotiation seems to be OK.

Question: I am not seeing a VTI come up at all when I use IPv6 transport. Has this sort of configuration been tested before with IPv6? Unlike the working IPv4 case, no vti is being created for IPv6 and there are no IPv4 (connected) routes in the routing table. _updown.netkey seems very IPv4 centric too.

The Cisco thinks everything is up and running just fine, and it transmits packets over the tunnel, but never receives a response.

I also don't know what the kernel requirements are in terms of IPv6 and kernel/interface modules either (perhaps these could be added to the documentation for those not using Fedora/RHEL/Centos?)

I'm obviously breaking new ground here, I can't find any reference to someone trying to do this before. However it doesn't seem to me to be a far fetched scenario....?

Thanks,
Reuben

_______________________________________________
Swan-dev mailing list
[email protected]
https://lists.libreswan.org/mailman/listinfo/swan-dev

Reply via email to