On Mon, 1 Feb 2021, Bo Osmann Erichsen wrote:

I have an issue with Linux Libreswan 4.1-1 (netkey) on 5.8.0-38-generic (ubuntu 
20.04) with a tunnel
with remote end Fortigate 1500:

The tunnel (certificate based Ikev2 with xfrm/ipsec interface)  is established 
fine and traffic flows
as expected.

After salifetime is reached – the connection goes down and will not get 
reestablished (no ipsec sa
renegotiation or ike sa renegotiation). I suspect this state might give som 
input on the problem: 

"fgcon1" #5: encountered fatal error in state STATE_V2_REKEY_CHILD_I1

I’ve tried setting ikelifetime and salifetime to be the same on the peer – but 
with no success.

Try setting it longer than the peer, so that the peer remains the
initiator. Eg try lifetime and ikelifetime of 24h

Feb  1 10:00:08 ubuntu2004 pluto[43388]: |    Notify Message Type: 
v2N_NO_PROPOSAL_CHOSEN (0xe)

They do not like your proposal. This is weird because rekey does not
allow you to change the proposal anywway. So it should be the same
as the one you responded to originally? You can verify in the logs you
got the same Traffic Selectors and the same crypto parameters?

Perhaps there is a pfs mismatch, and the peer wants pfs=no ?

     pfs=no

I would really try pfs=yes

     aggressive=yes
     ikev2=yes

Note ikev2 does not have aggressive mode, so the line aggressive= is
ignored.

     salifetime = 30
     ikelifetime = 30

Doesn't this mean 30 seconds ? At the very least do 8h

     encapsulation=yes

You should really let the automatic encap detection do its work.

     dpddelay=3
     dpdtimeout=3
     dpdaction=restart

You should not use restart, but hold. Also 3s is really short. It is
more reasonable to use 30s or 1m.

Paul
_______________________________________________
Swan mailing list
[email protected]
https://lists.libreswan.org/mailman/listinfo/swan

Reply via email to