Dear all, Recently I am doing some tests about ikelifetime and keylife
settings in ipsec.conf.I am using version strongswan-4.3.2. client uses EAP
authentication and security gateway uses public key authentication.In security
gateway, ikelifetime and keylife are not set.In the following cases, the
console logs and "ipsec statusall" log are from client.
(1)In client, I set ikelifetime=36000 (10 hours) and set no keylife and then
initiates the connection to security gateway.
I found that in the tunnel setup process, the log will show the following two
lines
scheduling reauthentication in 35355s maximum IKE_SA lifetime
35895s
and ipsec statusall will show......................................, EAP
reauthentication in 2 hours................................, rekeying in 41
minutes, ...............................
(2)And in the next test, I remove ikelifetime=36000 (10 hours) in ipsec.conf in
client andremain other settings in client and security gateway. So there is not
ikelifetime and keylife settings in both client and gateway right now.
The log shows
scheduling reauthentication in 10203s maximum IKE_SA lifetime
10743s
and ipsec statusall will show......................................, EAP
reauthentication in 2 hours................................, rekeying in 50
minutes, ...............................
What is the relatio between ikelifetime setting and EAP reauthentication?It
seems EAP authentication will occur at least every 2 hours (if rekey enbaled)
even if ikelifetime is greater 2 hours? This is the upper bound of strongswan
setting?Will the transmitted data packets be lost when IKE_SA rekeying or
Child_SA rekeying happened?
(3)Following (2) setting (no ikelifetime and keylife in both client and gw), if
I add reauth=no and rekey=no in both client and security gateway,the log
"scheduling reauthentication" and "maximum IKE_SA lifetime" will NOT shown on
the consoleand ipsec statusall will show
......................................, rekeying
disabled................................, rekeying disabled,
...............................
In this case, IKE_SA and Child_SA will not rekey forever? So this reduces the
security level due to the lack of rekeying?
Thank you all. ^______^
_______________________________________________
Users mailing list
[email protected]
https://lists.strongswan.org/mailman/listinfo/users