Hi Paul, Do you have any idea how we can prevent this from happening in future?
Thanks, Xinwei On Sun, Jul 15, 2018 at 10:37 PM, Xinwei Hong <xh...@skytap.com> wrote: > Thank you Paul! > > I think the attached log file contains all info we got during the whole > period, from good state, then first network blip, (vpns continue to be > working), and finally dead after the second blip. Do you mean you want the > negotiation phase log for the initial good state? I can try to find it if > that's true. It could be months ago. > > Thanks, > Xinwei > > > On Sat, Jul 14, 2018 at 5:21 PM, Paul Wouters <p...@nohats.ca> wrote: > >> On Fri, 13 Jul 2018, Xinwei Hong wrote: >> >> I have attached the log we can collect. There were two network blip, both >>> time was detected by DPD. After the first blip at about Jul 11 22:03:21, >>> the renegotiation take >>> effect and every thing looks fine. During the second blip (Jul 12 >>> 06:16:54), things went into bad state. A main mode renegotiation was >>> started at Jul 12 05:47:48 before >>> the DPD error at (Jul 12 06:16:54) >>> >>> >> and also many >>> >>> Jul 12 06:21:56 vvr-10-9-255-36 pluto[31586]: vpn-711360: >>> initiate_ondemand_body() failed to install negotiation_shunt, >>> Jul 12 06:21:56 vvr-10-9-255-36 pluto[31586]: vpn-711360: initiate on >>> demand from 10.1.153.84:22 to 10.1.1.155:54187 proto=6 because: acquire >>> Jul 12 06:21:58 vvr-10-9-255-36 pluto[31586]: vpn-711360: >>> assign_holdpass() delete_bare_shunt() failed >>> >> >> This indicates a problem on a packet triggered tunnel policy. >> I guess there is confusion about an ongoing tunnel and a new >> packet triggering that tunnel. It seems to have caused you to >> be in a state where we partially think the tunnel should be up >> and partially think we should be done. >> >> after some time main mode passed. The VPN then tries to do quick mode >>> renegotiation every 50 minutes or so as normal. However the VPN was not >>> working during this time. >>> When we noticed the issue and check “ip xfrm policy”, we only see >>> >>> :/proc/net# ip xfrm policy >>> >>> src 0.0.0.0/0 dst 0.0.0.0/0 >>> dir out priority 3136 >>> mark 0x5/0xffffffff >>> tmpl src 199.204.218.76 dst 66.193.98.67 >>> proto esp reqid 16389 mode tunnel >>> the in and fwd policy is missing. >>> >> >> Hmm, clearly that should never happen. >> >> Can you help check what’s wrong here? What can we do to avoid this in >>> future? >>> >> >> It would be helpful to get all the logs of the events from good to bad >> state. >> >> Paul >> > >
_______________________________________________ Swan mailing list Swan@lists.libreswan.org https://lists.libreswan.org/mailman/listinfo/swan