Public bug reported:

I have a Strongswan (Linux strongSwan U5.8.2/K5.4.0-54-generic) IPSec setup and 
whenever I connect to it the connection is estabilished succesfully, but when I 
try to reach anything on the network the server freezes with kernel panic. The 
problem appeared when I upgraded from 18.04 to 20.04
After reboot I can't find anything in the log, so it's a bit hard to gather the 
kernel message, the only thing I have saved is this line:

general protection fault: 0000 [#1] SMP PTI


End of the strongswan log:

Nov 30 10:04:53 Wanda ipsec[2038]: 12[IKE] peer requested virtual IP %any
Nov 30 10:04:53 Wanda ipsec[2038]: 12[CFG] sending DHCP DISCOVER to 
192.168.2.255
Nov 30 10:04:53 Wanda ipsec[2038]: 12[CFG] sending DHCP DISCOVER to 
192.168.2.255
Nov 30 10:04:53 Wanda ipsec[2038]: 01[MGR] ignoring request with ID 5, already 
processing
Nov 30 10:04:53 Wanda ipsec[2038]: 12[CFG] sending DHCP DISCOVER to 
192.168.2.255
Nov 30 10:04:53 Wanda ipsec[2038]: 05[CFG] received DHCP OFFER 192.168.2.186 
from 192.168.2.2
Nov 30 10:04:53 Wanda ipsec[2038]: 12[CFG] sending DHCP REQUEST for 
192.168.2.186 to 192.168.2.2
Nov 30 10:04:53 Wanda ipsec[2038]: message repeated 2 times: [ 12[CFG] sending 
DHCP REQUEST for 192.168.2.186 to 192.168.2.2]
Nov 30 10:04:53 Wanda ipsec[2038]: 10[CFG] received DHCP ACK for 192.168.2.186
Nov 30 10:04:53 Wanda charon: 12[IKE] no virtual IP found for %any6 requested 
by 'ekemate'
Nov 30 10:04:53 Wanda ipsec[2038]: 12[IKE] assigning virtual IP 192.168.2.186 
to peer 'ekemate'
Nov 30 10:04:53 Wanda ipsec[2038]: 12[IKE] peer requested virtual IP %any6
Nov 30 10:04:53 Wanda charon: 12[CFG] selected proposal: 
ESP:CHACHA20_POLY1305/NO_EXT_SEQ
Nov 30 10:04:53 Wanda charon: 12[IKE] CHILD_SA wandavpn{1} established with 
SPIs c52f49dd_i 885fb77c_o and TS 0.0.0.0/0 === 192.168.2.186/32
Nov 30 10:04:53 Wanda charon: 12[ENC] generating IKE_AUTH response 5 [ AUTH 
CPRP(ADDR DNS) SA TSi TSr N(MOBIKE_SUP) N(ADD_4_ADDR) N(ADD_4_ADDR) 
N(ADD_4_ADDR) N(ADD_4_ADDR) N(ADD_4_ADDR) N(ADD_4_ADDR) N(ADD_6_ADDR) 
N(ADD_6_ADDR) ]
Nov 30 10:04:53 Wanda charon: 12[NET] sending packet: from 192.168.2.200[4500] 
to xx.xx.xx.xx[49758] (361 bytes)


And after that the server hangs.


ipsec.conf:

config setup
    uniqueids=never

conn %default
    keyexchange=ikev2
    auto=add

conn wandavpn
    compress=no
    type=tunnel
    keyexchange=ikev2
    fragmentation=yes
    forceencaps=yes
    dpdaction=clear
    dpddelay=300s
    rekey=no
    left=%any
    [email protected]
    leftcert=fullchain.pem
    leftsendcert=always
    leftsubnet=0.0.0.0/0
    right=%any
    rightid=%any
    rightauth=eap-mschapv2
    rightsourceip=%dhcp
    rightsendcert=never
    eap_identity=%identity
    
ike=chacha20poly1305-sha512-curve25519-prfsha512,aes256gcm16-sha384-prfsha384-ecp384,aes256-sha1-modp1024,aes128-sha1-modp1024,3des-sha1-modp1024!
    
esp=chacha20poly1305-sha512,aes256gcm16-ecp384,aes256-sha256,aes256-sha1,3des-sha1!


Outgoing strongswan vpn connections from the server are OK.

ProblemType: Bug
DistroRelease: Ubuntu 20.04
Package: linux-image-5.4.0-54-generic 5.4.0-54.60
ProcVersionSignature: Ubuntu 5.4.0-54.60-generic 5.4.65
Uname: Linux 5.4.0-54-generic x86_64
NonfreeKernelModules: zfs zunicode zavl icp zcommon znvpair
AlsaVersion: Advanced Linux Sound Architecture Driver Version k5.4.0-54-generic.
ApportVersion: 2.20.11-0ubuntu27.13
Architecture: amd64
ArecordDevices:
 **** List of CAPTURE Hardware Devices ****
 card 1: PCH [HDA Intel PCH], device 0: VT1708S Analog [VT1708S Analog]
   Subdevices: 1/1
   Subdevice #0: subdevice #0
Card0.Amixer.info:
 Card hw:0 'HDMI'/'HDA Intel HDMI at 0xf0530000 irq 39'
   Mixer name   : 'Intel Haswell HDMI'
   Components   : 'HDA:80862807,80860101,00100000'
   Controls      : 35
   Simple ctrls  : 5
Card1.Amixer.info:
 Card hw:1 'PCH'/'HDA Intel PCH at 0xf0534000 irq 38'
   Mixer name   : 'VIA VT1708S'
   Components   : 'HDA:11060397,11060397,00100000'
   Controls      : 44
   Simple ctrls  : 19
CasperMD5CheckResult: skip
CurrentDmesg: Error: command ['dmesg'] failed with exit code 1: dmesg: read 
kernel buffer failed: Operation not permitted
Date: Mon Nov 30 09:52:14 2020
HibernationDevice: RESUME=UUID=092254a8-e041-4d98-a9a4-f3d14a43b1b2
InstallationDate: Installed on 2016-09-09 (1542 days ago)
InstallationMedia: Ubuntu-Server 16.04.1 LTS "Xenial Xerus" - Release amd64 
(20160719)
MachineType: Intel Corporation Shark Bay Platform
ProcFB: 0 i915drmfb
ProcKernelCmdLine: BOOT_IMAGE=/@/boot/vmlinuz-5.4.0-54-generic 
root=UUID=87b5701c-2653-40a2-b67d-c82ac43618ec ro rootflags=subvol=@ 
intel_iommu=on,igfx_off
RelatedPackageVersions:
 linux-restricted-modules-5.4.0-54-generic N/A
 linux-backports-modules-5.4.0-54-generic  N/A
 linux-firmware                            1.187.4
RfKill: Error: [Errno 2] No such file or directory: 'rfkill'
SourcePackage: linux
UpgradeStatus: Upgraded to focal on 2020-09-30 (60 days ago)
acpidump:
 Error: command ['pkexec', '/usr/share/apport/dump_acpi_tables.py'] failed with 
exit code 127: polkit-agent-helper-1: error response to PolicyKit daemon: 
GDBus.Error:org.freedesktop.PolicyKit1.Error.Failed: No session for cookie
 Error executing command as another user: Not authorized
 
 This incident has been reported.
dmi.bios.date: 01/05/2015
dmi.bios.vendor: Phoenix Technologies Ltd.
dmi.bios.version: KTQM04
dmi.board.asset.tag: Base Board Asset Tag
dmi.board.name: KTQM87/mITX
dmi.board.vendor: Kontron Technology
dmi.board.version: 13010000
dmi.chassis.asset.tag: Asset Tag
dmi.chassis.type: 9
dmi.chassis.vendor: Intel Corporation
dmi.chassis.version: 0.1
dmi.modalias: 
dmi:bvnPhoenixTechnologiesLtd.:bvrKTQM04:bd01/05/2015:svnIntelCorporation:pnSharkBayPlatform:pvr0.1:rvnKontronTechnology:rnKTQM87/mITX:rvr13010000:cvnIntelCorporation:ct9:cvr0.1:
dmi.product.family: Shark Bay System
dmi.product.name: Shark Bay Platform
dmi.product.sku: System SKUNumber
dmi.product.version: 0.1
dmi.sys.vendor: Intel Corporation

** Affects: linux (Ubuntu)
     Importance: Undecided
         Status: New


** Tags: amd64 apport-bug focal

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1906239

Title:
  Kernel panic with Strongswan IPSec vpn after 20.4 update

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1906239/+subscriptions

-- 
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to