Tuomo,
I apologize for disagreeing, but Libreswan not only does not support
Link-Local addresses, but it actively declares that they are not usable.
I agree that making Libreswan process Link-Local addresses properly
will not be possible until XFRM is fixed, but in the case outlined
below, it appears that XFRM is not even invoked.
I have two hosts, with a shared LAN, called Gingko and Ritchie, both
running Libreswan 5.0rc1.
File GIRI6CL.conf on Gingko:
conn GIRI6cl
left=fe80::20e:cff:fe9c:d92d%ens7
leftid="CN=Gingko Certificate"
leftrsasigkey=%cert
leftcert=GIcert
right=fe80::20e:cff:fea9:b90f%ens7
rightid="CN=Ritchie Certificate"
rightrsasigkey=%cert
auto=add
File RIGI6CL.conf on Ritchie:
conn RIGI6cl
left=fe80::20e:cff:fea9:b90f%enp5s4
leftid="CN=Ritchie Certificate"
leftrsasigkey=%cert
leftcert=RIcert
right=fe80::20e:cff:fe9c:d92d%enp5s4
rightid="CN=Gingko Certificate"
rightrsasigkey=%cert
auto=add
On Ritchie:
dev@Ritchie:~$ sudo ipsec add RIGI6cl
"RIGI6cl": added IKEv2 connection
dev@Ritchie:~$
On Gingko:
dev@Gingko:~$ sudo ipsec add GIRI6cl
"GIRI6cl": added IKEv2 connection
dev@Gingko:~$ sudo ipsec up GIRI6cl
"GIRI6cl": we cannot identify ourselves with either end of this
connection. fe80::20e:cff:fe9c:d92d or fe80::20e:cff:fea9:b90f are not
usable
dev@Gingko:~$
The listed Link-Local addresses are correct; I can " ping -6
fe80::20e:cff:fea9:b90f%ens7" on Gingko, and get the appropriate
response from Ritchie, and I can " ping -6
fe80::20e:cff:fe9c:d92d%enp5s4" from Ritchie, and get the appropriate
response from Gingko.
Finally, if I assign Unique Local Addresses to the same two interfaces,
and use these addresses in the above .conf files, the Security
Association establishes perfectly.
Therefore, I believe that your statement that "Global is only used when
adding IP for XFRM interface for route-based IPsec vpn." is incorrect.
Clearly, Libreswan has code somewhere that is rejecting non-global
addresses for simple, tunnel-mode Security Associations between two
adjacent hosts.
Andrew has put a milestone of Release 5.1 on my issue #1498, which
provides justification for the use of Link-Local addresses as valid
endpoints. I hope that XFRM has been fixed by the time 5.1 is released.
Bill
On 1/17/2024 1:24 AM, Tuomo Soini wrote:
Attention This email originates from outside the concordia.ca domain. // Ce
courriel provient de l'extC)rieur du domaine de concordia.ca
On Tue, 16 Jan 2024 21:17:41 -0500
William Atwood <[email protected]> wrote:
1) I know that Libreswan does not support %zone identifiers
associated with Link-Local (LL) addresses, and it appears from your
experience that Strongswan does not either. I also know that
Libreswan insists that an endpoint address must be "Global".
Global is only used when adding IP for XFRM interface for route-based
IPsec vpn. And because this is route-based, this can't be LL-address.
We told you multiple times that this doesn't affect LL address
handling. And we can't really implement support for LL addresses on
linux before XFRM/IPsec stack supports it.
--
Dr. J.W. Atwood, Eng. tel: +1 (514) 848-2424 x3046
Distinguished Professor Emeritus fax: +1 (514) 848-2830
Department of Computer Science
and Software Engineering
Concordia University ER 1234 email:[email protected]
1455 de Maisonneuve Blvd. West http://users.encs.concordia.ca/~bill
Montreal, Quebec Canada H3G 1M8
_______________________________________________
Swan mailing list
[email protected]
https://lists.libreswan.org/mailman/listinfo/swan