That was it! Disabling the kernel-pfkey plugin solved the issue.
Thanks for your help.
Cheers,
Benoit.
On Dec 3, 2010, at 11:44 AM, Andreas Steffen wrote:
> Hmmm,
>
> I see that pluto loads the kernel-pfkey plugin which is totally untested with
> IKEv1
>
> Dec 3 09:16:43 gw pluto[16007]: loaded plugins:
> curl aes des blowfish sha1 sha2 md5 random x509 pkcs1 pgp dnskey pem
> gmp hmac xauth attr kernel-pfkey kernel-netlink resolve
>
> Could you please remove the kernel-pfkey plugin and check whether the
> problem disappears? And do the same on charon
>
> Dec 3 09:16:43 gw charon: 00[DMN] loaded plugins:
> curl aes des blowfish sha1 sha2 md4 md5 random x509 revocation pubkey
> pkcs1 pgp pem fips-prf gmp xcbc hmac attr kernel-pfkey kernel-netlink
> resolve socket-raw stroke smp updown eap-identity eap-sim
> eap-sim-file eap-aka eap-md5 eap-gtc eap-mschapv2
>
> since the PFKEYv2 kernel interface does not give you any advantage
> over the default XFRM interface on a Linux box.
>
> Regards
>
> Andreas
>
> On 12/03/2010 10:28 AM, Benoit Foucher wrote:
>> I've attached pluto and charon logs. One additional information: the acquire
>> event traces only show up when I try to ping a machine on the remote network
>> from the strongSwan gateway (the ping doesn't succeed). The remote network
>> is behind a Zywall USG 100 which only supports IKEv1. Thanks again for your
>> help.
>>
>> Cheers,
>> Benoit.
>>
>>
>>
>>
>>
>>
>> On Dec 3, 2010, at 9:50 AM, Andreas Steffen wrote:
>>
>>> It is getting stranger all the time. Could you send me the complete
>>> ipsec.conf and complete pluto log (with plutodebug=control) and charon
>>> log where these acquire events happen? Are you initiation both IKEv1 and
>>> IKEv2 connections? Just start the minimum number of connections for
>>> this strange phenomenon to occur.
>>>
>>> Regards
>>>
>>> Andreas
>>>
>>> On 12/03/2010 09:38 AM, Benoit Foucher wrote:
>>>> No other IKE daemons are running, ip xfrm policy does indeed come back
>>>> empty:
>>>>
>>>> [r...@gw ~]# /etc/init.d/ipsec stop
>>>> Stopping strongSwan IPsec...
>>>> [r...@gw ~]# ip xfrm policy
>>>> [r...@gw ~]#
>>>>
>>>> Cheers,
>>>> Benoit.
>>>>
>>>> On Dec 3, 2010, at 9:25 AM, Andreas Steffen wrote:
>>>>
>>>>> Hi Benoit,
>>>>>
>>>>> is there some other IKE daemon running (e.g. racoon) which is inserting
>>>>> IPsec policies into the kernel? Does the command
>>>>>
>>>>> ip xfrm policy
>>>>>
>>>>> come back empty before you start strongSwan?
>>>>>
>>>>> Andreas
>>>>>
>>>>> On 12/03/2010 09:21 AM, Benoit Foucher wrote:
>>>>>> Hi Andreas,
>>>>>>
>>>>>> Thanks for your prompt reply. All my connections are defined with
>>>>>> auto=add (a mix of IKEv1 and IKEv2 connections).
>>>>>>
>>>>>> Benoit.
>>>>>>
>>>>>> On Dec 3, 2010, at 9:18 AM, Andreas Steffen wrote:
>>>>>>
>>>>>>> Hi Benoit,
>>>>>>>
>>>>>>> it is strange that you get acquire events. Do you define any connections
>>>>>>> in ipsec.conf with the setting auto=route? If yes, are these IKEv1
>>>>>>> or IKEv2 connections?
>>>>>>>
>>>>>>> Regards
>>>>>>>
>>>>>>> Andreas
>>>>>>>
>>>>>>> On 12/03/2010 09:11 AM, Benoit Foucher wrote:
>>>>>>>> Hi,
>>>>>>>>
>>>>>>>> After looking more carefully at the logs, there are also some
>>>>>>>> suspicious traces for pluto:
>>>>>>>>
>>>>>>>> pluto[11637]: | creating acquire event for policy 10.12.15.22/32 ===
>>>>>>>> 27.21.27.40/32 with reqid {16420}
>>>>>>>> pluto[11637]: |
>>>>>>>> pluto[11637]: | *handling asynchronous events
>>>>>>>> pluto[11637]: | initiate on demand from 10.12.15.22:0 to 27.21.27.40:0
>>>>>>>> proto=0 state: fos_start because: whack
>>>>>>>> pluto[11637]: | find_connection: looking for policy for connection:
>>>>>>>> 10.12.15.22:0/0 -> 27.21.27.40:0/0
>>>>>>>> pluto[11637]: | find_connection: concluding with empty
>>>>>>>>
>>>>>>>> ip xfrm state gives me the following:
>>>>>>>>
>>>>>>>> src 10.12.15.22 dst 27.21.27.40
>>>>>>>> proto esp spi 0xc7c5af3a reqid 16420 mode tunnel
>>>>>>>> replay-window 32
>>>>>>>> auth hmac(sha1) 0x47ff9f0112dac804a37a7f47f4371ac8b69219a8
>>>>>>>> enc cbc(aes) 0xf1bedbfe7aabc07cda4a40b8fb934484
>>>>>>>> sel src 0.0.0.0/0 dst 0.0.0.0/0
>>>>>>>> src 27.21.27.40 dst 10.12.15.22
>>>>>>>> proto esp spi 0xc500ee4a reqid 16420 mode tunnel
>>>>>>>> replay-window 32
>>>>>>>> auth hmac(sha1) 0x413ed35699112a5a00599ee721ce72017f400bbb
>>>>>>>> enc cbc(aes) 0x0b289980e478348eb8950bd4da54b8d3
>>>>>>>> sel src 0.0.0.0/0 dst 0.0.0.0/0
>>>>>>>>
>>>>>>>> It sounds like charon fails to retrieve the policy or are those traces
>>>>>>>> expected?
>>>>>>>>
>>>>>>>> Thanks
>>>>>>>>
>>>>>>>> Cheers,
>>>>>>>> Benoit.
>>>>>>>>
>>>>>>>> On Dec 2, 2010, at 8:53 PM, Benoit Foucher wrote:
>>>>>>>>
>>>>>>>>> Hi,
>>>>>>>>>
>>>>>>>>> I've upgraded from 4.4.1 to 4.5.0 today to workaround the issue where
>>>>>>>>> a given peer ID can't acquire multiple virtual IP addresses. However,
>>>>>>>>> my IKEv1 connections don't work anymore now. I did add
>>>>>>>>> keyexchange=ikev1 to make sure to use pluto. I've attached my config
>>>>>>>>> below.
>>>>>>>>>
>>>>>>>>> The tunnel is established but it seems there are some problems with
>>>>>>>>> routing. If I ping my strongSwan gateway from the peer network, the
>>>>>>>>> gateway correctly receives the ICMP packets (according to tcpdump on
>>>>>>>>> the gateway). However, the replies don't seem to be sent back over
>>>>>>>>> the tunnel (I don't see any ICMP reply with tcpdump on the gateway
>>>>>>>>> and the ping from the peer doesn't get any reply either).
>>>>>>>>>
>>>>>>>>> The only suspicious thing are the errors below which come from charon
>>>>>>>>> despite the fact that the tunnel is established with pluto. Could
>>>>>>>>> this be related to the change where pluto is now using netlink for
>>>>>>>>> setting up policies? Here are the messages:
>>>>>>>>>
>>>>>>>>> charon: 05[KNL] received an SADB_ACQUIRE with policy id 140489 but no
>>>>>>>>> matching policy found
>>>>>>>>> charon: 05[KNL] creating acquire job for policy 10.12.15.22/32 ===
>>>>>>>>> 27.21.27.40/32 with reqid {0}
>>>>>>>>> charon: 03[CFG] trap not found, unable to acquire reqid 0
>>>>>>>>>
>>>>>>>>> My ipsec.conf for that connection:
>>>>>>>>> ---
>>>>>>>>> config setup
>>>>>>>>> plutodebug=control
>>>>>>>>> crlcheckinterval=180
>>>>>>>>> strictcrlpolicy=no
>>>>>>>>> charonstart=yes
>>>>>>>>> plutostart=yes
>>>>>>>>> nat_traversal=yes
>>>>>>>>>
>>>>>>>>> conn %default
>>>>>>>>> ikelifetime=3h
>>>>>>>>> lifetime=3h
>>>>>>>>> rekeymargin=3m
>>>>>>>>> keyingtries=1
>>>>>>>>> left=%defaultroute
>>>>>>>>> [email protected]
>>>>>>>>> leftsourceip=192.168.128.1
>>>>>>>>> leftsubnet=192.168.128.0/17
>>>>>>>>> leftcert=gw_cert.pem
>>>>>>>>> leftfirewall=yes
>>>>>>>>> rightfirewall=yes
>>>>>>>>>
>>>>>>>>> conn sj-gw
>>>>>>>>> keyexchange=ikev1
>>>>>>>>> right=%any
>>>>>>>>> leftsubnet=192.168.0.0/16
>>>>>>>>> rightsubnet=192.168.0.0/16
>>>>>>>>> [email protected]
>>>>>>>>> auto=add
>>>>>>>>> ----
>>>>>>>>>
>>>>>>>>> Any ideas what could be wrong? Is there some additional settings
>>>>>>>>> require for 4.5.0 now?
>>>>>>>>>
>>>>>>>>> Thanks for the help!
>>>>>>>>>
>>>>>>>>> Cheers,
>>>>>>>>> Benoit.
>>>>>
>>>
>>> ======================================================================
>>> Andreas Steffen [email protected]
>>> strongSwan - the Linux VPN Solution! www.strongswan.org
>>> Institute for Internet Technologies and Applications
>>> University of Applied Sciences Rapperswil
>>> CH-8640 Rapperswil (Switzerland)
>>> ===========================================================[ITA-HSR]==
>>
>
>
> --
> ======================================================================
> Andreas Steffen [email protected]
> strongSwan - the Linux VPN Solution! www.strongswan.org
> Institute for Internet Technologies and Applications
> University of Applied Sciences Rapperswil
> CH-8640 Rapperswil (Switzerland)
> ===========================================================[ITA-HSR]==
_______________________________________________
Users mailing list
[email protected]
https://lists.strongswan.org/mailman/listinfo/users