Oops, here is the missing net-net-scenario.txt file.
Andreas Steffen wrote:
> Hello Mugur,
>
> the idea is not to establish multiple IKE_SA, but multiple CHILD_SAs
> with identical traffic selectors. Take the ikev2/net2net-cert UML
> scenario as an example:
>
> sun ~ # ipsec start
> moon ~ # ipsec start
> moon ~ # ipsec up net-net
> moon ~ # ping -c 2 -I 10.1.0.1 10.2.0.1
> moon ~ # ipsec up net-net
> moon ~ # ipsec up net-net
> moon ~ # ping -c 2 -I 10.1.0.1 10.2.0.1
>
> results in 1 IKE_SA to be established plus 3 CHILD_SAs as can be seen
> in the attached file net-net-scenario.txt. Assigning different QoS
> classes to generated multiple IPsec SAs, actually to their SPIs, is out
> of the scope of the IKEv2 protocol.
>
> Multiple IKE_SAs can only occur if both peers start an IKE negotiation
> simultaneously.
>
> Best regards
>
> Andreas
>
> ABULIUS, MUGUR (MUGUR) wrote:
>> Hello Andreas,
>> Do you have any plan to allow for more than one IKE_SA between two peers?
>> This may help for enhanced QoS class management.
>> Best Regards
>> Mugur
>>
>> -----Original Message-----
>> From: Andreas Steffen [mailto:[email protected]]
>> Sent: samedi 26 décembre 2009 18:59
>> To: ABULIUS, MUGUR (MUGUR)
>> Cc: [email protected]; Pisano, Stephen G (Stephen); ROSSI, MICHEL
>> MR (MICHEL); SCARAZZINI, FABRICE (FABRICE)
>> Subject: Re: [strongSwan] Several TS on a same connection
>>
>> Hello Mugur,
>>
>> currently the Linux kernel copies the TOS field from the encapsulated IP
>> packets into the IP header of the ESP packet.
>> Thus routers can treat the QoS classes differently. Problems may arise in
>> the presence of large congestion where ESP packets with low QoS priority are
>> delayed more than the default IPsec replay window size of 32 packets and
>> thus will be dropped upon late arrival.
>>
>> The IKEv2 standard explicitly does *not* support the negotiation of QoS
>> classes but allows the setup of parallel IPsec SAs for this purpose:
>>
>> Note that IKEv2 deliberately allows parallel SAs with the same
>> traffic selectors between common endpoints. One of the purposes of
>> this is to support traffic quality of service (QoS) differences among
>> the SAs (see [RFC2474], [RFC2475], and section 4.1 of [RFC2983]).
>> Hence unlike IKEv1, the combination of the endpoints and the traffic
>> selectors may not uniquely identify an SA between those endpoints, so
>> the IKEv1 rekeying heuristic of deleting SAs on the basis of
>> duplicate traffic selectors SHOULD NOT be used.
>>
>> RFC 4306, page 22
>>
>> Regards
>>
>> Andreas
>>
>> BULIUS, MUGUR (MUGUR) wrote:
>>> Andreas,
>>>
>>> I have a concern regarding QoS and your statement:
>>>
>>> "---One of our pending projects intends to create multiple tunnels for
>>> different QoS classes but this would require some fundamental changes
>>> in the Linux kernel." (Do you have a roadmap for this?). ---"
>>>
>>>
>>> This suggests that using different QoS classes today for different
>>> IPsec-ed data flows between the same peers should be discouraged (as
>>> QoS can be used for routing decisions and all data flows are on the
>>> same IPsec tunnel) and that there is no way today, via strongSwan
>>> configuration, to safely affect different QoS values for different
>>> IPsec-ed flows between two peers?
>>>
>>> Best Regards Mugur
======================================================================
Andreas Steffen [email protected]
strongSwan - the Linux VPN Solution! www.strongswan.org
Institute for Internet Technologies and Applications
University of Applied Sciences Rapperswil
CH-8640 Rapperswil (Switzerland)
===========================================================[ITA-HSR]==
moon ~ # ipsec statusall
Status of IKEv2 charon daemon (strongSwan 4.3.6dr6):
uptime: 4 minutes, since Dec 27 14:55:40 2009
worker threads: 9 idle of 16, job queue load: 0, scheduled events: 3
loaded plugins: curl aes des sha1 sha2 md5 pem pkcs1 gmp random x509 hmac
xcbc stroke kernel-netlink updown
Listening IP addresses:
192.168.0.1
fec0::1
10.1.0.1
fec1::1
Connections:
net-net: 192.168.0.1...192.168.0.2
net-net: local: [moon.strongswan.org] uses public key authentication
net-net: cert: "C=CH, O=Linux strongSwan, CN=moon.strongswan.org"
net-net: remote: [sun.strongswan.org] uses any authentication
net-net: child: 10.1.0.0/16 === 10.2.0.0/16
Security Associations:
net-net[1]: ESTABLISHED 4 minutes ago,
192.168.0.1[moon.strongswan.org]...192.168.0.2[sun.strongswan.org]
net-net[1]: IKE SPIs: b5ad30487ae0a7b3_i* 23b481325f57efd2_r, public key
reauthentication in 48 minutes
net-net[1]: IKE proposal: AES_CBC_128/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_2048
net-net{1}: INSTALLED, TUNNEL, ESP SPIs: c6138f22_i c70a3446_o
net-net{1}: AES_CBC_128/HMAC_SHA1_96, 168 bytes_i (40s ago), 168 bytes_o
(40s ago), rekeying in 11 minutes
net-net{1}: 10.1.0.0/16 === 10.2.0.0/16
net-net{2}: INSTALLED, TUNNEL, ESP SPIs: c7e72752_i c142ca2e_o
net-net{2}: AES_CBC_128/HMAC_SHA1_96, 0 bytes_i, 0 bytes_o, rekeying in
13 minutes
net-net{2}: 10.1.0.0/16 === 10.2.0.0/16
net-net{3}: INSTALLED, TUNNEL, ESP SPIs: cd285f04_i c8192965_o
net-net{3}: AES_CBC_128/HMAC_SHA1_96, 168 bytes_i (2s ago), 168 bytes_o
(2s ago), rekeying in 16 minutes
net-net{3}: 10.1.0.0/16 === 10.2.0.0/16
_______________________________________________
Users mailing list
[email protected]
https://lists.strongswan.org/mailman/listinfo/users