Hi Noel, So you're running openwrt on an Arch Linux kernel? No, I am running a pure Arch Linux virtual machine. Although, I have another VM with OpenWRT in my lab. Originally OpenWRT was being used but because NFLOG was not working and I needed packets flowing through the iptables captured to further troubleshoot an Arch box was spun up.
Please pastebin the output of `sysctl net | grep disable`. [root@arch-linux ~]# ./07.ipsec-check-int-sysctl.sh ip_vti1 net.ipv4.conf.ip_vti1.disable_policy = 1 net.ipv4.conf.ip_vti1.rp_filter = 0 net.ipv4.ip_forward = 1 and as you requested 👇 [root@arch-linux ~]# sysctl net | grep disable net.core.high_order_alloc_disable = 0 net.ipv4.conf.all.disable_policy = 0 net.ipv4.conf.all.disable_xfrm = 0 net.ipv4.conf.default.disable_policy = 0 net.ipv4.conf.default.disable_xfrm = 0 net.ipv4.conf.ens18.disable_policy = 1 net.ipv4.conf.ens18.disable_xfrm = 1 net.ipv4.conf.ip_vti0.disable_policy = 0 net.ipv4.conf.ip_vti0.disable_xfrm = 0 net.ipv4.conf.ip_vti1.disable_policy = 1 net.ipv4.conf.ip_vti1.disable_xfrm = 0 net.ipv4.conf.lo.disable_policy = 1 net.ipv4.conf.lo.disable_xfrm = 1 net.ipv6.conf.all.disable_ipv6 = 0 net.ipv6.conf.all.disable_policy = 0 net.ipv6.conf.default.disable_ipv6 = 0 net.ipv6.conf.default.disable_policy = 0 net.ipv6.conf.ens18.disable_ipv6 = 0 net.ipv6.conf.ens18.disable_policy = 0 net.ipv6.conf.ip_vti1.disable_ipv6 = 0 net.ipv6.conf.ip_vti1.disable_policy = 0 net.ipv6.conf.lo.disable_ipv6 = 0 net.ipv6.conf.lo.disable_policy = 0 Many Thanks. Tiago Stoco. ________________________________ From: Noel Kuntze Sent: Thursday, September 2, 2021 3:28 AM To: Tiago Stoco; Noel Kuntze; Tobias Brunner; users@lists.strongswan.org Subject: Re: [strongSwan] IPSec route based VPN - VTI interface TX Errors NoRoute Hello Tiago, > Linux 5.13.12-arch1-1 H > According to my understanding, the reply should be marked, dealt with the > IPSec stack, and tunneled to the peer since it is on the VTI interface. > Please correct me if I am wrong. Please pastebin the output of `sysctl net | grep disable`. Kind regards Noel Am 02.09.21 um 08:18 schrieb Tiago Stoco: > Hi Noel, > > I have disabled the forecast plugin and MARK rules aren't being added to > iptables anymore. > > The following plugins are disabled at the moment : > > [root@arch-linux ~]# cat /etc/strongswan.conf > ... > bypass-lan { > load = no > } > connmark { > load = no > } > forecast { > load = no > } > ... > > When a capture is run on the VTI device I can see the pings from the pfSense > arriving and the reply 👇 > > No. Time Source Destination > 5 2.050455 10.10.10.1 > 10.10.10.2 ICMP 84 Echo (ping) request id=0xc4f5, > seq=2/512, ttl=64 (reply in 6) > 6 2.050467 10.10.10.2 > 10.10.10.1 ICMP 84 Echo (ping) reply id=0xc4f5, > seq=2/512, ttl=64 (request in 5) > > Strange is the fact that I see the replies in the filter OUTPUT chain not > encapsulated nor encrypted 👇 > > No. Time Source Destination > 11 9.653361 10.10.10.2 > 10.10.10.1 ICMP 116 Echo (ping) reply id=0x80f2, > seq=2/512, ttl=64 > > According to my understanding, the reply should be marked, dealt with the > IPSec stack, and tunneled to the peer since it is on the VTI interface. > Please correct me if I am wrong. > > In regards to using an XFRM, the problem is that OpenWRT does not support > XFRM devices. A newer release will support but the current is not available > yet. > > [root@arch-linux ~]# ipsec statusall > Status of IKE charon daemon (strongSwan 5.9.3, Linux 5.13.12-arch1-1, x86_64): > uptime: 9 hours, since Sep 01 21:37:46 2021 > malloc: sbrk 3137536, mmap 0, used 1156720, free 1980816 > worker threads: 11 of 16 idle, 5/0/0/0 working, job queue: 0/0/0/0, > scheduled: 4 > loaded plugins: charon ldap pkcs11 aes des rc2 sha2 sha3 sha1 md5 mgf1 > random nonce x509 revocation constraints pubkey p > kcs1 pkcs7 pkcs8 pkcs12 pgp dnskey sshkey pem openssl fips-prf gmp curve25519 > agent chapoly xcbc cmac hmac ntru drbg newho > pe bliss curl sqlite attr kernel-netlink resolve socket-default farp stroke > vici updown eap-identity eap-sim eap-aka eap-a > ka-3gpp2 eap-simaka-pseudonym eap-simaka-reauth eap-md5 eap-gtc eap-mschapv2 > eap-dynamic eap-radius eap-tls eap-ttls eap-p > eap xauth-generic xauth-eap xauth-pam xauth-noauth dhcp radattr unity counters > Listening IP addresses: > 192.168.45.30 > 10.10.10.2 > Connections: > ipseclab: 192.168.45.30...192.168.45.10 IKEv2, dpddelay=10s > ipseclab: local: [ipsec-lab-openwrt] uses pre-shared key authentication > ipseclab: remote: [ipsec-lab-pfsense] uses pre-shared key authentication > con1: child: 10.10.10.0/30 === 10.10.10.0/30 TUNNEL, > dpdaction=restart > Security Associations (1 up, 0 connecting): > ipseclab[4]: ESTABLISHED 2 hours ago, > 192.168.45.30[ipsec-lab-openwrt]...192.168.45.10[ipsec-lab-pfsense] > ipseclab[4]: IKEv2 SPIs: bbbb8b7b5c0ccf5b_i 9673036f29862401_r*, rekeying > in 4 hours > ipseclab[4]: IKE proposal: > AES_CBC_256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_2048 > con1{12}: INSTALLED, TUNNEL, reqid 1, ESP SPIs: cef2dc29_i ccb51306_o > con1{12}: AES_GCM_16_256/MODP_2048, 0 bytes_i, 0 bytes_o, rekeying in > 14 minutes > con1{12}: 10.10.10.0/30 === 10.10.10.0/30 > > Many Thanks !! > > ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------ > *From:* Noel Kuntze > *Sent:* Wednesday, September 1, 2021 1:23 AM > *To:* Tiago Stoco; Noel Kuntze; Tobias Brunner; users@lists.strongswan.org > *Subject:* Re: [strongSwan] IPSec route based VPN - VTI interface TX Errors > NoRoute > > Hi Tiago, > > Try disabling the forecast plugin too, please. > > With VTIs, you shouldn't need to manually mark the packets. > > Btw, if you use an XFRM interface instead, you won't have as many problems > because the field used for > typing the interface and the policies together isn't used for anything else > (In comparison to the fwmark field, > which as you can see can be used for all sorts of things). > > > > > I will add to the thread later but NFLOG is able to capture MARKS in the > > packets. The packets captured by NFLOG has a special section with quite > > useful information. > > ... > > Linux Netfilter NFLOG > > Family: IPv4 (2) > > Version: 0 > > Resource id: 7 > > TLV Type: NFULA_PACKET_HDR (1), Length: 8 > > ... > > That doesn't look like a mark field to me. It'd need to be 32 bit in length > and have the same value as the (fw)mark field in iptables. > > Kind regards > Noel > > > Am 01.09.21 um 01:46 schrieb Tiago Stoco: > > Hi Noel, > > > > Thanks for the help. > > > > I have moved the route for IPSec back into the main routing table. > > > > [root@arch-linux ~]# ip route > > default via 192.168.45.1 dev ens18 > > 10.10.10.0/30 dev ip_vti1 scope link src 10.10.10.2 > > 192.168.45.0/24 dev ens18 proto kernel scope link src 192.168.45.30 > > > > [root@arch-linux ~]# ip route show table 220 > > [root@arch-linux ~]# > > > > And the connmark plugin has been disabled. > > > > [root@arch-linux ~]# ipsec statusall | grep -i connmark > > [root@arch-linux ~]# > > > > Also, I have noticed that even after the connmark plugin is disabled some > > mark rules are added to iptables. > > > > [root@arch-linux ~]# ipsec stop > > Stopping strongSwan IPsec... > > [root@arch-linux ~]# iptables-save | grep -i mark > > [root@arch-linux ~]# > > > > [root@arch-linux ~]# ipsec start > > Starting strongSwan 5.9.3 IPsec [starter]... > > [root@arch-linux ~]# swanctl --load-all > > plugin 'mysql' failed to load: libmariadb.so.3: cannot open shared object > > file: No such file or directory > > loaded ike secret 'ike-0' > > no authorities found, 0 unloaded > > no pools found, 0 unloaded > > loaded connection 'ipseclab' > > successfully loaded 1 connections, 0 unloaded > > [root@arch-linux ~]# iptables-save | grep -i mark > > -A PREROUTING -d 10.10.10.0/30 -j MARK --set-xmark 0x2a/0xffffffff > > -A PREROUTING -s 192.168.45.10/32 -d 192.168.45.30/32 -p esp -m esp > > --espspi 3419086685 -j MARK --set-xmark 0x2a/0xfffffff > > f > > -A OUTPUT -d 10.10.10.0/30 -j MARK --set-xmark 0x2a/0xffffffff > > > > > > The scenario is the same at the moment : > > > > pings from 10.10.10.1 ( pfSense ) to 10.10.10.2 ( Linux ) ✅ seem as > > received by Linux > > pings from 10.10.10.2 ( Linux ) to 10.10.10.1 ( pfSense ) ❌ seem as Errors > > NoRoute > > ip_vti1: ip/ip remote 192.168.45.10 local 192.168.45.30 ttl inherit > > nopmtudisc key 42 > > RX: Packets Bytes Errors CsumErrs OutOfSeq Mcasts > > 66095 5551980 0 0 0 0 > > TX: Packets Bytes Errors DeadLoop NoRoute NoBufs > > 0 0 133788 0 133788 0 > > > > I am at work and not able to capture packets to further investigate but > > will do as soon possible. > > > > [root@arch-linux ~]# ipsec statusall > > Status of IKE charon daemon (strongSwan 5.9.3, Linux 5.13.12-arch1-1, > > x86_64): > > uptime: 9 minutes, since Sep 01 00:24:27 2021 > > malloc: sbrk 2936832, mmap 0, used 1328288, free 1608544 > > worker threads: 11 of 16 idle, 5/0/0/0 working, job queue: 0/0/0/0, > > scheduled: 115 > > loaded plugins: charon ldap pkcs11 aes des rc2 sha2 sha3 sha1 md5 mgf1 > > random nonce x509 revocation constraints pubkey p > > kcs1 pkcs7 pkcs8 pkcs12 pgp dnskey sshkey pem openssl fips-prf gmp > > curve25519 agent chapoly xcbc cmac hmac ntru drbg newho > > pe bliss curl sqlite attr kernel-netlink resolve socket-default forecast > > farp stroke vici updown eap-identity eap-sim eap- > > aka eap-aka-3gpp2 eap-simaka-pseudonym eap-simaka-reauth eap-md5 eap-gtc > > eap-mschapv2 eap-dynamic eap-radius eap-tls eap-t > > tls eap-peap xauth-generic xauth-eap xauth-pam xauth-noauth dhcp radattr > > unity counters > > Listening IP addresses: > > 192.168.45.30 > > 10.10.10.2 > > Connections: > > ipseclab: 192.168.45.30...192.168.45.10 IKEv2, dpddelay=10s > > ipseclab: local: [ipsec-lab-openwrt] uses pre-shared key > > authentication > > ipseclab: remote: [ipsec-lab-pfsense] uses pre-shared key > > authentication > > con1: child: 10.10.10.0/30 === 10.10.10.0/30 TUNNEL, > > dpdaction=restart > > Security Associations (2 up, 0 connecting): > > ipseclab[54]: ESTABLISHED 9 seconds ago, > > 192.168.45.30[ipsec-lab-openwrt]...192.168.45.10[ipsec-lab-pfsense] > > ipseclab[54]: IKEv2 SPIs: 840c3fd77eb0efee_i b3f6cec233130e6a_r*, > > rekeying in 6 hours > > ipseclab[54]: IKE proposal: > > AES_CBC_256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_2048 > > con1{54}: INSTALLED, TUNNEL, reqid 1, ESP SPIs: c206ad8c_i > > c631ebba_o > > con1{54}: AES_GCM_16_256, 0 bytes_i, 0 bytes_o, rekeying in 48 > > minutes > > con1{54}: 10.10.10.0/30 === 10.10.10.0/30 > > ipseclab[53]: ESTABLISHED 19 seconds ago, > > 192.168.45.30[ipsec-lab-openwrt]...192.168.45.10[ipsec-lab-pfsense] > > ipseclab[53]: IKEv2 SPIs: 133d2066ebf6a358_i d8da41bca97601ca_r*, > > rekeying in 6 hours > > ipseclab[53]: IKE proposal: > > AES_CBC_256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_2048 > > con1{53}: INSTALLED, TUNNEL, reqid 1, ESP SPIs: cb169570_i > > c35823e7_o > > con1{53}: AES_GCM_16_256, 0 bytes_i, 0 bytes_o, rekeying in 51 > > minutes > > con1{53}: 10.10.10.0/30 === 10.10.10.0/30 > > > > I will add to the thread later but NFLOG is able to capture MARKS in the > > packets. The packets captured by NFLOG has a special section with quite > > useful information. > > ... > > Linux Netfilter NFLOG > > Family: IPv4 (2) > > Version: 0 > > Resource id: 7 > > TLV Type: NFULA_PACKET_HDR (1), Length: 8 > > ... > > > > Once again, thanks for the help. > > > > Tiago Stoco. > > > > ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------ > > *From:* Noel Kuntze > > *Sent:* Tuesday, August 31, 2021 2:20 PM > > *To:* Tiago Stoco; Tobias Brunner; users@lists.strongswan.org > > *Subject:* Re: [strongSwan] IPSec route based VPN - VTI interface TX Errors > > NoRoute > > > > Hello Tiago, > > > > > And, I have moved the route for the VTI to table 220 because it seems to > > > be the right way to config routed based IPSec VPN. > > > > > > [root@arch-linux ~]# ip rule > > > 0: from all lookup local > > > 220: from all lookup 220 > > > 32766: from all lookup main > > > 32767: from all lookup default > > > > Don't do that. > > 220 is managed by strongSwan. Keep them in the main table. > > > > > -A PREROUTING -d 10.10.10.0/30 -c 2352 230776 -j MARK --set-xmark > > > 0x2a/0xffffffff > > > -A OUTPUT -d 10.10.10.0/30 -c 3605 336028 -j MARK --set-xmark > > > 0x2a/0xffffffff > > > > Disable the connmark plugin. > > > > > > > I have added a few more NFLOG captures into my iptables and I am a bit > > > confused with the results. > > > > > > A tcpdump capture in the VTI interface with a ping from the remote ( > > > pfSense - 10.10.10.1 ) shows : > > > > > > No Time Source Destination > > > > > > 1 0.000000 10.10.10.1 10.10.10.2 ICMP 84 Echo (ping) request id=0x9877, > > > seq=471/55041, ttl=64 (reply in 2) > > > 2 0.000038 10.10.10.2 > 10.10.10.1 ICMP 84 Echo (ping) reply > > > id=0x9877, seq=471/55041, ttl=64 (request in 1) > > > > > > I do not see the IPSec MARK in these packets. > > > > They are only visible in the output of the TRACE target. I suspect they are > > note copied into the buffer passed to the applications. > > > > > > > > Also, the NAT chain is not having packets passing through it. > > > > > > [root@arch-linux ~]# snat > > > -P PREROUTING ACCEPT -c 0 0 > > > -P INPUT ACCEPT -c 0 0 > > > -P OUTPUT ACCEPT -c 0 0 > > > -P POSTROUTING ACCEPT -c 0 0 > > > -A PREROUTING -c 0 0 -j NFLOG --nflog-group 9 > > > > > > That is odd cause I am not able to manipulate the packets. > > > > > > I will run a ping from the local Linux (10.10.10.2) and see how the > > > packets are flowing through the iptables chains and will update in > > > another email. > > > > > > > The *nat table is only consulted for the first packet of a connection. > > > > Kind regards > > Noel > > > > > > Am 31.08.21 um 17:22 schrieb Tiago Stoco: > > > Hi Tobias, > > > > > > First of all, THANKS for replying and clarifying some settings. > > > > > > I have completely disabled the bypass-lan plugin since I do not have a > > > use for it right now. > > > > > > [root@arch-linux ~]# cat /etc/strongswan.conf > > > ... > > > plugins { > > > include strongswan.d/charon/*.conf > > > bypass-lan { > > > load = no > > > } > > > ... > > > > > > And, I have moved the route for the VTI to table 220 because it seems to > > > be the right way to config routed based IPSec VPN. > > > > > > [root@arch-linux ~]# ip rule > > > 0: from all lookup local > > > 220: from all lookup 220 > > > 32766: from all lookup main > > > 32767: from all lookup default > > > > > > [root@arch-linux ~]# ip r s t 220 > > > 10.10.10.0/30 via 10.10.10.2 dev ip_vti1 src 10.10.10.2 > > > > > > [root@arch-linux ~]# ip route > > > default via 192.168.45.1 dev ens18 > > > 192.168.45.0/24 dev ens18 proto kernel scope link src 192.168.45.30 > > > > > > I am going to add some more details of my configs because the TX Errors > > > NoRoute are still present. > > > > > > 7: ip_vti1@NONE: <POINTOPOINT,NOARP,UP,LOWER_UP> mtu 1436 qdisc noqueue > > > state UNKNOWN group default qlen 1000 > > > link/ipip 192.168.45.30peer 192.168.45.10promiscuity 0 minmtu 0 > > > maxmtu 0 > > > vti remote 192.168.45.10 local 192.168.45.30 ikey 0.0.0.42 okey > > > 0.0.0.42 numtxqueues 1 numrxqueues 1 gso_max_size 65536 gso_max_segs 65535 > > > inet 10.10.10.2peer 10.10.10.1/32 scope global ip_vti1 > > > valid_lft forever preferred_lft forever > > > inet6 fe80::5efe:c0a8:2d1e/64 scope link > > > valid_lft forever preferred_lft forever > > > > > > I can also see that the IPSec added some rules to MARK packets in my > > > iptables. > > > > > > -A PREROUTING -d 10.10.10.0/30 -c 2352 230776 -j MARK --set-xmark > > > 0x2a/0xffffffff > > > -A OUTPUT -d 10.10.10.0/30 -c 3605 336028 -j MARK --set-xmark > > > 0x2a/0xffffffff > > > > > > The counters confirms that the packets are being marked. I am not sure if > > > I should keep the MARK in iptables or remove it allowing routing > > > decisions to send the packets to the VTI device that will MARK the > > > packets but according to my understanding it should not matter. > > > > > > [root@arch-linux ~]# ip xfrm policy > > > src 0.0.0.0/0 dst 0.0.0.0/0 > > > socket in priority 0 ptype main > > > src 0.0.0.0/0 dst 0.0.0.0/0 > > > socket out priority 0 ptype main > > > src 0.0.0.0/0 dst 0.0.0.0/0 > > > socket in priority 0 ptype main > > > src 0.0.0.0/0 dst 0.0.0.0/0 > > > socket out priority 0 ptype main > > > src ::/0 dst ::/0 > > > socket in priority 0 ptype main > > > src ::/0 dst ::/0 > > > socket out priority 0 ptype main > > > src ::/0 dst ::/0 > > > socket in priority 0 ptype main > > > src ::/0 dst ::/0 > > > socket out priority 0 ptype main > > > > > > Above are the policies installed. Again, because it is a routed base VPN > > > seems correct. > > > > > > [root@arch-linux ~]# ip xfrm state > > > src 192.168.45.30 dst 192.168.45.10 > > > proto esp spi 0xc2239b57 reqid 1 mode tunnel > > > replay-window 0 flag af-unspec > > > mark 0x2a/0xffffffff > > > aead rfc4106(gcm(aes)) > > > 0x264acee3119a4e523af2fbf5905b50c5acc1f7be9079ff23ffa2c6473a9c507fe1ae936b > > > 128 > > > anti-replay context: seq 0x0, oseq 0x0, bitmap 0x00000000 > > > src 192.168.45.10 dst 192.168.45.30 > > > proto esp spi 0xc661b9e5 reqid 1 mode tunnel > > > replay-window 32 flag af-unspec > > > aead rfc4106(gcm(aes)) > > > 0x69a86fa6ca9448bece6ffdff77893f0e9ce5ebef604040f681b5cdd2d5976438ed005df1 > > > 128 > > > anti-replay context: seq 0x656, oseq 0x0, bitmap 0xffffffff > > > > > > I have added a few more NFLOG captures into my iptables and I am a bit > > > confused with the results. > > > > > > A tcpdump capture in the VTI interface with a ping from the remote ( > > > pfSense - 10.10.10.1 ) shows : > > > > > > No Time Source Destination > > > > > > 1 0.000000 10.10.10.1 10.10.10.2 ICMP 84 Echo (ping) request id=0x9877, > > > seq=471/55041, ttl=64 (reply in 2) > > > 2 0.000038 10.10.10.2 > 10.10.10.1 ICMP 84 Echo (ping) reply > > > id=0x9877, seq=471/55041, ttl=64 (request in 1) > > > > > > I do not see the IPSec MARK in these packets. > > > The reply packets end up in the OUTPUT chain marked but not encrypted as > > > an ESP packet. By the way I do not see the replies even being > > > encapsulated at all by IPSec. > > > > > > Also, the NAT chain is not having packets passing through it. > > > > > > [root@arch-linux ~]# snat > > > -P PREROUTING ACCEPT -c 0 0 > > > -P INPUT ACCEPT -c 0 0 > > > -P OUTPUT ACCEPT -c 0 0 > > > -P POSTROUTING ACCEPT -c 0 0 > > > -A PREROUTING -c 0 0 -j NFLOG --nflog-group 9 > > > > > > That is odd cause I am not able to manipulate the packets. > > > > > > I will run a ping from the local Linux (10.10.10.2) and see how the > > > packets are flowing through the iptables chains and will update in > > > another email. > > > > > > In the meantime, if someone sees something that I am missing. Please let > > > me know. > > > > > > Many Thanks. > > > > ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------ > > > *From:* Tobias Brunner <tob...@strongswan.org> > > > *Sent:* Tuesday, August 31, 2021 5:51 AM > > > *To:* Tiago Stoco <tmsbl...@msn.com>; users@lists.strongswan.org > > > <users@lists.strongswan.org> > > > *Subject:* Re: [strongSwan] IPSec route based VPN - VTI interface TX > > > Errors NoRoute > > > Hi Tiago, > > > > > >> Pings from the Linux system are being seem as errors NoRoute by the > > >> tunnel. > ... > > >> Shunted Connections: > > >> Bypass LAN 10.10.10.0/30: 10.10.10.0/30 === 10.10.10.0/30 PASS > > > > > > The reason is most likely this passthrough IPsec policy installed by the > > > bypass-lan plugin for the subnet that is reachable (according to the > > > main routing table) via ip_vti1. For a ping from 10.10.10.2 to > > > 10.10.10.1, the VTI interface won't find an IPsec policy to protect the > > > packet (the passthrough policy has a higher priority), so it gets dropped. > > > > > > To avoid that, either install the routes via VTI in table 220 (which is > > > ignored by the bypass-lan plugin automatically), exclude the VTI > > > interface explicitly via charon.plugins.bypass-lan.interfaces_ignore, or > > > just disable the bypass-lan plugin completely if you don't need it. > > > > > > Regards, > > > Tobias > > > >