On Thu, 31 Dec 2020, Blue Aquan wrote:

With a slight modification of IP and authentication method(Pre-Shared key) , I 
tried adapting it to the Fortigate firewall.
The tunnel gets established perfectly fine, I am able to reach machines behind 
the Fortigate as well, but since these are
testbed machine there's no traffic flowing between them continuously and the 
tunnel gets disconnected sometime during long
hours of inactivity. Every morning, I find the tunnel down, but it's restored with a 
simple restart of "systemctl restart
ipsec". This stays on a the entire day mostly and the next day it's down 
again... I am attaching the config on the Linux
machine; if you need the configuration on the Fortigate, I can post it here, 
but it's running just the same things I've
configured on CentOS.

conn SUBNETS

auto=start

With auto=start and libreswan 4.1, that should keep the tunnel up. I
would be interested in seeing the logs to understand what is happening.

Dec 31 14:25:20.576958: "SUBNETS" #1: Received unauthenticated 
INVALID_KE_PAYLOAD response to DH DH19; resending with
suggested DH DH21

Maybe this is affecting rekey on the fortigate? Can you try setting an
IKE line that only contains dh21 ? eg

        ike=aes256-sha2_512+sha2_256-dh21

Dec 31 06:19:31.846499: "SUBNETS" #10641: sent CREATE_CHILD_SA request to rekey 
IPsec SA
Dec 31 06:19:31.891736: "SUBNETS" #10641: dropping unexpected CREATE_CHILD_SA 
message containing NO_PROPOSAL_CHOSEN
notification; message payloads: SK; encrypted payloads: N; missing payloads: 
SA,Ni,TSi,TSr

So this is strange. We are rekeying the same proposal, so it should
never refuse the proposal we agreed on the first go. This looks like
a fortigate bug.

Dec 31 06:36:49.918252: "SUBNETS" #10643: no local proposal matches remote 
proposals
1:ESP:ENCR=AES_CBC_256;INTEG=HMAC_SHA2_512_256;ESN=DISABLED

this is what you negotiated on the initial exchanges. So why refuse now?

Perhaps it is an issue of pfs? Try adding pfs=no ?

You can trigger a rekey without waiting an hour by:

        ipsec whack --rekey-ipsec --name SUBNETS

you can also try adding the DH group to esp for PFS, eg:

        esp=aes256-sha2_512+sha1+sha2_256;dh21

Paul
_______________________________________________
Swan mailing list
[email protected]
https://lists.libreswan.org/mailman/listinfo/swan

Reply via email to