Hello Alexis,
ipsec statusall does not show the configuration of PFS. But with
charondebug="cfg 2"
you can verify the PFS negotiation in the charon log.
Best regards
Andreas
On 03/18/2011 12:45 AM, Alexis Salinas wrote:
Hi All,
I'm wondering if someone knows how to check if PFS is enabled, and the DH group
being used by a given CHILD_SA.
From an older post (https://lists.strongswan.org/pipermail/users/2008-October/002822.html) I got
this "The modp option in the esp definition is ignored when setting up the first CHILD_SA as
part of the IKE_AUTH exchange. Separate DH factors are is used by CREATE_CHILD_SA exchanges
establishing additional CHILD_SAs or during IPSec SA rekeying. With this behaviour "Perfect
Forward Secrecy is achieved"."
So I configured a couple of gateways like shown below, but when I check 'ipsec
statusall' I don't see any reference to PFS on the second CHILD_SA.
I'm I doing something wrong?
Thanks in advance.
config setup
cachecrls=no
charonstart=yes
crlcheckinterval=0
plutostart=yes
strictcrlpolicy=no
nat_traversal=yes
plutodebug=none
charondebug="dmn 0, mgr 0, ike 0, chd 0, job 0, cfg 0, knl 0, net 0, enc 0,
lib 0"
#gw1-to-gw2
conn gw1-to-gw2
left=192.168.3.31
leftid=@H020109D0001
leftsubnet=172.22.0.0/24
leftnexthop=192.168.2.128
leftfirewall=yes
right=192.168.3.110
rightsubnet=10.0.0.0/24
ike=aes128-md5-modp1536!
esp=aes128-md5-modp1024!
keyexchange=ikev2
mobike=yes
ikelifetime=60m
keylife=20m
compress=no
authby=secret
dpdaction=restart
dpddelay=10
dpdtimeout=30
auto=add
keyingtries=1
rekeymargin=3m
forceencaps=yes
reauth=yes
#gw1-to-gw2-child2
conn gw1-to-gw2-child2
left=192.168.3.31
leftid=@H020109D0001
leftsubnet=172.22.1.0/24
leftnexthop=192.168.2.128
leftfirewall=yes
right=192.168.3.110
rightsubnet=10.1.0.0/24
ike=aes128-md5-modp1536!
esp=aes128-md5-modp1024!
keyexchange=ikev2
mobike=yes
ikelifetime=60m
keylife=20m
compress=no
authby=secret
dpdaction=restart
dpddelay=10
dpdtimeout=30
auto=add
keyingtries=1
rekeymargin=3m
forceencaps=yes
reauth=yes
Security Associations:
gw1-to-gw2[1]: ESTABLISHED 50 seconds ago,
192.168.3.31[H020109D0001]...192.168.3.110[192.168.3.110]
gw1-to-gw2[1]: IKE SPIs: e60a4f49fa294bcd_i* f6d5a905dfa97711_r, pre-shared key
reauthentication in 55 minutes
gw1-to-gw2[1]: IKE proposal: AES_CBC_128/HMAC_MD5_96/PRF_HMAC_MD5/MODP_1536
gw1-to-gw2{1}: INSTALLED, TUNNEL, ESP in UDP SPIs: c911f5f8_i cf631c91_o
gw1-to-gw2{1}: AES_CBC_128/HMAC_MD5_96, 0 bytes_i, 0 bytes_o, rekeying in 16
minutes
gw1-to-gw2{1}: 172.22.0.0/24 === 10.0.0.0/24
gw1-to-gw2-child2{2}: INSTALLED, TUNNEL, ESP in UDP SPIs: c3013ecc_i c2eb28c9_o
gw1-to-gw2-child2{2}: AES_CBC_128/HMAC_MD5_96, 0 bytes_i, 0 bytes_o, rekeying
in 15 minutes
gw1-to-gw2-child2{2}: 172.22.1.0/24 === 10.1.0.0/24
_______________________________________________
Users mailing list
[email protected]
https://lists.strongswan.org/mailman/listinfo/users
-------------------------------------------------------------------------------
# /etc/ipsec.conf - strongSwan IPsec configuration file
config setup
crlcheckinterval=180
strictcrlpolicy=no
plutostart=no
charondebug="cfg 2"
conn %default
ikelifetime=60m
keylife=2m
rekeymargin=10s
keyingtries=1
keyexchange=ikev2
ike=aes128-sha256-modp2048!
esp=aes128-sha256-modp1536!
mobike=no
conn net-net
left=192.168.0.1
leftcert=moonCert.pem
[email protected]
leftsubnet=10.1.0.0/16
leftfirewall=yes
right=192.168.0.2
[email protected]
rightsubnet=10.2.0.0/16
auto=add
-------------------------------------------------------------------------------
# Start charon daemon
Mar 18 10:17:09 moon charon: 00[DMN] Starting IKEv2 charon daemon (strongSwan
4.5.2dr3)
Mar 18 10:17:09 moon charon: 00[CFG] loading ca certificates from
'/etc/ipsec.d/cacerts'
Mar 18 10:17:09 moon charon: 00[CFG] loaded ca certificate "C=CH, O=Linux
strongSwan, CN=strongSwan Root CA" from
'/etc/ipsec.d/cacerts/strongswanCert.pem'
Mar 18 10:17:09 moon charon: 00[CFG] loading aa certificates from
'/etc/ipsec.d/aacerts'
Mar 18 10:17:09 moon charon: 00[CFG] loading ocsp signer certificates from
'/etc/ipsec.d/ocspcerts'
Mar 18 10:17:09 moon charon: 00[CFG] loading attribute certificates from
'/etc/ipsec.d/acerts'
Mar 18 10:17:09 moon charon: 00[CFG] loading crls from '/etc/ipsec.d/crls'
Mar 18 10:17:09 moon charon: 00[CFG] loading secrets from '/etc/ipsec.secrets'
Mar 18 10:17:09 moon charon: 00[CFG] loaded RSA private key from
'/etc/ipsec.d/private/moonKey.pem'
Mar 18 10:17:09 moon charon: 00[KNL] listening on interfaces:
Mar 18 10:17:09 moon charon: 00[KNL] eth0
Mar 18 10:17:09 moon charon: 00[KNL] 192.168.0.1
Mar 18 10:17:09 moon charon: 00[KNL] fec0::1
Mar 18 10:17:09 moon charon: 00[KNL] fe80::fcfd:c0ff:fea8:1
Mar 18 10:17:09 moon charon: 00[KNL] eth1
Mar 18 10:17:09 moon charon: 00[KNL] 10.1.0.1
Mar 18 10:17:09 moon charon: 00[KNL] fec1::1
Mar 18 10:17:09 moon charon: 00[KNL] fe80::fcfd:aff:fe01:1
Mar 18 10:17:09 moon charon: 00[DMN] loaded plugins: curl aes des sha1 sha2 md5
pem pkcs1 gmp random x509 revocation hmac xcbc stroke kernel-netlink
socket-default updown
Mar 18 10:17:09 moon charon: 00[JOB] spawning 16 worker threads
Mar 18 10:17:09 moon charon: 08[CFG] received stroke: add connection 'net-net'
Mar 18 10:17:09 moon charon: 08[CFG] conn net-net
Mar 18 10:17:09 moon charon: 08[CFG] left=192.168.0.1
Mar 18 10:17:09 moon charon: 08[CFG] leftsubnet=10.1.0.0/16
Mar 18 10:17:09 moon charon: 08[CFG] leftsourceip=(null)
Mar 18 10:17:09 moon charon: 08[CFG] leftauth=(null)
Mar 18 10:17:09 moon charon: 08[CFG] leftauth2=(null)
Mar 18 10:17:09 moon charon: 08[CFG] [email protected]
Mar 18 10:17:09 moon charon: 08[CFG] leftid2=(null)
Mar 18 10:17:09 moon charon: 08[CFG] leftcert=moonCert.pem
Mar 18 10:17:09 moon charon: 08[CFG] leftcert2=(null)
Mar 18 10:17:09 moon charon: 08[CFG] leftca=(null)
Mar 18 10:17:09 moon charon: 08[CFG] leftca2=(null)
Mar 18 10:17:09 moon charon: 08[CFG] leftgroups=(null)
Mar 18 10:17:09 moon charon: 08[CFG] leftupdown=ipsec _updown iptables
Mar 18 10:17:09 moon charon: 08[CFG] right=192.168.0.2
Mar 18 10:17:09 moon charon: 08[CFG] rightsubnet=10.2.0.0/16
Mar 18 10:17:09 moon charon: 08[CFG] rightsourceip=(null)
Mar 18 10:17:09 moon charon: 08[CFG] rightauth=(null)
Mar 18 10:17:09 moon charon: 08[CFG] rightauth2=(null)
Mar 18 10:17:09 moon charon: 08[CFG] [email protected]
Mar 18 10:17:09 moon charon: 08[CFG] rightid2=(null)
Mar 18 10:17:09 moon charon: 08[CFG] rightcert=(null)
Mar 18 10:17:09 moon charon: 08[CFG] rightcert2=(null)
Mar 18 10:17:09 moon charon: 08[CFG] rightca=(null)
Mar 18 10:17:09 moon charon: 08[CFG] rightca2=(null)
Mar 18 10:17:09 moon charon: 08[CFG] rightgroups=(null)
Mar 18 10:17:09 moon charon: 08[CFG] rightupdown=(null)
Mar 18 10:17:09 moon charon: 08[CFG] eap_identity=(null)
Mar 18 10:17:09 moon charon: 08[CFG] aaa_identity=(null)
Mar 18 10:17:09 moon charon: 08[CFG] ike=aes128-sha256-modp2048!
Mar 18 10:17:09 moon charon: 08[CFG] esp=aes128-sha256-modp1536!
Mar 18 10:17:09 moon charon: 08[CFG] mediation=no
Mar 18 10:17:09 moon charon: 08[CFG] mediated_by=(null)
Mar 18 10:17:09 moon charon: 08[CFG] me_peerid=(null)
Mar 18 10:17:09 moon charon: 08[CFG] loaded certificate "C=CH, O=Linux
strongSwan, CN=moon.strongswan.org" from 'moonCert.pem'
Mar 18 10:17:09 moon charon: 08[CFG] added configuration 'net-net'
-------------------------------------------------------------------------------
# Start up net-net connection: establish IKE_SA and CHILD_SA
Mar 18 10:17:16 moon charon: 13[CFG] received stroke: initiate 'net-net'
Mar 18 10:17:16 moon charon: 06[IKE] initiating IKE_SA net-net[1] to
192.168.0.2
Mar 18 10:17:16 moon charon: 06[ENC] generating IKE_SA_INIT request 0 [ SA KE
No N(NATD_S_IP) N(NATD_D_IP) ]
Mar 18 10:17:16 moon charon: 06[NET] sending packet: from 192.168.0.1[500] to
192.168.0.2[500]
Mar 18 10:17:16 moon charon: 05[NET] received packet: from 192.168.0.2[500] to
192.168.0.1[500]
Mar 18 10:17:16 moon charon: 05[ENC] parsed IKE_SA_INIT response 0 [ SA KE No
N(NATD_S_IP) N(NATD_D_IP) CERTREQ ]
Mar 18 10:17:16 moon charon: 05[CFG] selecting proposal:
Mar 18 10:17:16 moon charon: 05[CFG] proposal matches
Mar 18 10:17:16 moon charon: 05[CFG] received proposals:
IKE:AES_CBC_128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_2048
Mar 18 10:17:16 moon charon: 05[CFG] configured proposals:
IKE:AES_CBC_128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_2048
Mar 18 10:17:16 moon charon: 05[CFG] selected proposal:
IKE:AES_CBC_128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_2048
Mar 18 10:17:16 moon charon: 05[IKE] received cert request for "C=CH, O=Linux
strongSwan, CN=strongSwan Root CA"
Mar 18 10:17:16 moon charon: 05[IKE] sending cert request for "C=CH, O=Linux
strongSwan, CN=strongSwan Root CA"
Mar 18 10:17:16 moon charon: 05[IKE] authentication of 'moon.strongswan.org'
(myself) with RSA signature successful
Mar 18 10:17:16 moon charon: 05[IKE] sending end entity cert "C=CH, O=Linux
strongSwan, CN=moon.strongswan.org"
Mar 18 10:17:16 moon charon: 05[IKE] establishing CHILD_SA net-net
Mar 18 10:17:16 moon charon: 05[CFG] proposing traffic selectors for us:
Mar 18 10:17:16 moon charon: 05[CFG] 10.1.0.0/16 (derived from 10.1.0.0/16)
Mar 18 10:17:16 moon charon: 05[CFG] proposing traffic selectors for other:
Mar 18 10:17:16 moon charon: 05[CFG] 10.2.0.0/16 (derived from 10.2.0.0/16)
Mar 18 10:17:16 moon charon: 05[ENC] generating IKE_AUTH request 1 [ IDi CERT
N(INIT_CONTACT) CERTREQ IDr AUTH SA TSi TSr N(EAP_ONLY) ]
Mar 18 10:17:16 moon charon: 05[NET] sending packet: from 192.168.0.1[500] to
192.168.0.2[500]
Mar 18 10:17:17 moon charon: 04[NET] received packet: from 192.168.0.2[500] to
192.168.0.1[500]
Mar 18 10:17:17 moon charon: 04[ENC] parsed IKE_AUTH response 1 [ IDr CERT AUTH
SA TSi TSr N(AUTH_LFT) ]
Mar 18 10:17:17 moon charon: 04[IKE] received end entity cert "C=CH, O=Linux
strongSwan, CN=sun.strongswan.org"
Mar 18 10:17:17 moon charon: 04[CFG] using certificate "C=CH, O=Linux
strongSwan, CN=sun.strongswan.org"
Mar 18 10:17:17 moon charon: 04[CFG] certificate "C=CH, O=Linux strongSwan,
CN=sun.strongswan.org" key: 2048 bit RSA
Mar 18 10:17:17 moon charon: 04[CFG] using trusted ca certificate "C=CH,
O=Linux strongSwan, CN=strongSwan Root CA"
Mar 18 10:17:17 moon charon: 04[CFG] checking certificate status of "C=CH,
O=Linux strongSwan, CN=sun.strongswan.org"
Mar 18 10:17:17 moon charon: 04[CFG] ocsp check skipped, no ocsp found
Mar 18 10:17:17 moon charon: 04[CFG] fetching crl from
'http://crl.strongswan.org/strongswan.crl' ...
Mar 18 10:17:17 moon charon: 04[CFG] using trusted certificate "C=CH, O=Linux
strongSwan, CN=strongSwan Root CA"
Mar 18 10:17:17 moon charon: 04[CFG] crl correctly signed by "C=CH, O=Linux
strongSwan, CN=strongSwan Root CA"
Mar 18 10:17:17 moon charon: 04[CFG] crl is valid: until Apr 16 23:30:03 2011
Mar 18 10:17:17 moon charon: 04[CFG] certificate status is good
Mar 18 10:17:17 moon charon: 04[CFG] certificate "C=CH, O=Linux strongSwan,
CN=strongSwan Root CA" key: 2048 bit RSA
Mar 18 10:17:17 moon charon: 04[CFG] reached self-signed root ca with a path
length of 0
Mar 18 10:17:17 moon charon: 04[IKE] authentication of 'sun.strongswan.org'
with RSA signature successful
Mar 18 10:17:17 moon charon: 04[IKE] IKE_SA net-net[1] established between
192.168.0.1[moon.strongswan.org]...192.168.0.2[sun.strongswan.org]
Mar 18 10:17:17 moon charon: 04[IKE] scheduling reauthentication in 3588s
Mar 18 10:17:17 moon charon: 04[IKE] maximum IKE_SA lifetime 3598s
Mar 18 10:17:17 moon charon: 04[CFG] selecting proposal:
Mar 18 10:17:17 moon charon: 04[CFG] proposal matches
Mar 18 10:17:17 moon charon: 04[CFG] received proposals:
ESP:AES_CBC_128/HMAC_SHA2_256_128/NO_EXT_SEQ
Mar 18 10:17:17 moon charon: 04[CFG] configured proposals:
ESP:AES_CBC_128/HMAC_SHA2_256_128/MODP_1536/NO_EXT_SEQ
Mar 18 10:17:17 moon charon: 04[CFG] selected proposal:
ESP:AES_CBC_128/HMAC_SHA2_256_128/NO_EXT_SEQ
Mar 18 10:17:17 moon charon: 04[CFG] selecting traffic selectors for us:
Mar 18 10:17:17 moon charon: 04[CFG] config: 10.1.0.0/16, received:
10.1.0.0/16 => match: 10.1.0.0/16
Mar 18 10:17:17 moon charon: 04[CFG] selecting traffic selectors for other:
Mar 18 10:17:17 moon charon: 04[CFG] config: 10.2.0.0/16, received:
10.2.0.0/16 => match: 10.2.0.0/16
Mar 18 10:17:17 moon charon: 04[IKE] CHILD_SA net-net{1} established with SPIs
c65a8cd9_i cecef2ef_o and TS 10.1.0.0/16 === 10.2.0.0/16
Mar 18 10:17:17 moon charon: 04[IKE] received AUTH_LIFETIME of 3366s,
scheduling reauthentication in 3356s
Mar 18 10:18:30 moon charon: 15[CFG] proposing traffic selectors for us:
Mar 18 10:18:30 moon charon: 15[CFG] 10.1.0.0/16 (derived from 10.1.0.0/16)
Mar 18 10:18:30 moon charon: 15[CFG] proposing traffic selectors for other:
Mar 18 10:18:30 moon charon: 15[CFG] 10.2.0.0/16 (derived from 10.2.0.0/16)
Mar 18 10:18:43 moon charon: 01[CFG] proposing traffic selectors for us:
Mar 18 10:18:43 moon charon: 01[CFG] 10.1.0.0/16 (derived from 10.1.0.0/16)
Mar 18 10:18:43 moon charon: 01[CFG] proposing traffic selectors for other:
Mar 18 10:18:43 moon charon: 01[CFG] 10.2.0.0/16 (derived from 10.2.0.0/16)
Mar 18 10:18:58 moon charon: 09[KNL] creating rekey job for ESP CHILD_SA with
SPI cecef2ef and reqid {1}
Mar 18 10:18:58 moon charon: 06[IKE] establishing CHILD_SA net-net{1}
Mar 18 10:18:58 moon charon: 06[CFG] proposing traffic selectors for us:
Mar 18 10:18:58 moon charon: 06[CFG] 10.1.0.0/16 (derived from 10.1.0.0/16)
Mar 18 10:18:58 moon charon: 06[CFG] proposing traffic selectors for other:
Mar 18 10:18:58 moon charon: 06[CFG] 10.2.0.0/16 (derived from 10.2.0.0/16)
Mar 18 10:18:58 moon charon: 06[ENC] generating CREATE_CHILD_SA request 2 [
N(REKEY_SA) SA No KE TSi TSr ]
Mar 18 10:18:58 moon charon: 06[NET] sending packet: from 192.168.0.1[500] to
192.168.0.2[500]
Mar 18 10:18:58 moon charon: 05[NET] received packet: from 192.168.0.2[500] to
192.168.0.1[500]
Mar 18 10:18:58 moon charon: 05[ENC] parsed CREATE_CHILD_SA response 2 [ SA No
KE TSi TSr ]
Mar 18 10:18:58 moon charon: 05[CFG] selecting proposal:
Mar 18 10:18:58 moon charon: 05[CFG] proposal matches
Mar 18 10:18:58 moon charon: 05[CFG] received proposals:
ESP:AES_CBC_128/HMAC_SHA2_256_128/MODP_1536/NO_EXT_SEQ
Mar 18 10:18:58 moon charon: 05[CFG] configured proposals:
ESP:AES_CBC_128/HMAC_SHA2_256_128/MODP_1536/NO_EXT_SEQ
Mar 18 10:18:58 moon charon: 05[CFG] selected proposal:
ESP:AES_CBC_128/HMAC_SHA2_256_128/MODP_1536/NO_EXT_SEQ
Mar 18 10:18:58 moon charon: 05[CFG] selecting traffic selectors for us:
Mar 18 10:18:58 moon charon: 05[CFG] config: 10.1.0.0/16, received:
10.1.0.0/16 => match: 10.1.0.0/16
Mar 18 10:18:58 moon charon: 05[CFG] selecting traffic selectors for other:
Mar 18 10:18:58 moon charon: 05[CFG] config: 10.2.0.0/16, received:
10.2.0.0/16 => match: 10.2.0.0/16
Mar 18 10:18:58 moon charon: 05[IKE] CHILD_SA net-net{1} established with SPIs
c65719c1_i c5b686e4_o and TS 10.1.0.0/16 === 10.2.0.0/16
-------------------------------------------------------------------------------
moon ~ # ipsec statusall
Status of IKEv2 charon daemon (strongSwan 4.5.2dr3):
uptime: 94 seconds, since Mar 18 10:17:09 2011
malloc: sbrk 135168, mmap 0, used 87464, free 47704
worker threads: 9 idle of 16, job queue load: 0, scheduled events: 3
loaded plugins: curl aes des sha1 sha2 md5 pem pkcs1 gmp random x509
revocation hmac xcbc stroke kernel-netlink socket-default updown
Listening IP addresses:
192.168.0.1
fec0::1
10.1.0.1
fec1::1
Connections:
net-net: 192.168.0.1...192.168.0.2
net-net: local: [moon.strongswan.org] uses public key authentication
net-net: cert: "C=CH, O=Linux strongSwan, CN=moon.strongswan.org"
net-net: remote: [sun.strongswan.org] uses any authentication
net-net: child: 10.1.0.0/16 === 10.2.0.0/16
Security Associations:
net-net[1]: ESTABLISHED 86 seconds ago,
192.168.0.1[moon.strongswan.org]...192.168.0.2[sun.strongswan.org]
net-net[1]: IKE SPIs: 0c01492ce46c4f98_i* b5ad160a0c77e9b5_r, public key
reauthentication in 54 minutes
net-net[1]: IKE proposal:
AES_CBC_128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_2048
net-net{1}: INSTALLED, TUNNEL, ESP SPIs: c65a8cd9_i cecef2ef_o
net-net{1}: AES_CBC_128/HMAC_SHA2_256_128, 168 bytes_i (3s ago), 168
bytes_o (3s ago), rekeying in 15 seconds
net-net{1}: 10.1.0.0/16 === 10.2.0.0/16
-------------------------------------------------------------------------------
# CHILD_SA rekeying
Mar 18 10:18:30 moon charon: 15[CFG] proposing traffic selectors for us:
Mar 18 10:18:30 moon charon: 15[CFG] 10.1.0.0/16 (derived from 10.1.0.0/16)
Mar 18 10:18:30 moon charon: 15[CFG] proposing traffic selectors for other:
Mar 18 10:18:30 moon charon: 15[CFG] 10.2.0.0/16 (derived from 10.2.0.0/16)
Mar 18 10:18:43 moon charon: 01[CFG] proposing traffic selectors for us:
Mar 18 10:18:43 moon charon: 01[CFG] 10.1.0.0/16 (derived from 10.1.0.0/16)
Mar 18 10:18:43 moon charon: 01[CFG] proposing traffic selectors for other:
Mar 18 10:18:43 moon charon: 01[CFG] 10.2.0.0/16 (derived from 10.2.0.0/16)
Mar 18 10:18:58 moon charon: 09[KNL] creating rekey job for ESP CHILD_SA with
SPI cecef2ef and reqid {1}
Mar 18 10:18:58 moon charon: 06[IKE] establishing CHILD_SA net-net{1}
Mar 18 10:18:58 moon charon: 06[CFG] proposing traffic selectors for us:
Mar 18 10:18:58 moon charon: 06[CFG] 10.1.0.0/16 (derived from 10.1.0.0/16)
Mar 18 10:18:58 moon charon: 06[CFG] proposing traffic selectors for other:
Mar 18 10:18:58 moon charon: 06[CFG] 10.2.0.0/16 (derived from 10.2.0.0/16)
Mar 18 10:18:58 moon charon: 06[ENC] generating CREATE_CHILD_SA request 2 [
N(REKEY_SA) SA No KE TSi TSr ]
Mar 18 10:18:58 moon charon: 06[NET] sending packet: from 192.168.0.1[500] to
192.168.0.2[500]
Mar 18 10:18:58 moon charon: 05[NET] received packet: from 192.168.0.2[500] to
192.168.0.1[500]
Mar 18 10:18:58 moon charon: 05[ENC] parsed CREATE_CHILD_SA response 2 [ SA No
KE TSi TSr ]
Mar 18 10:18:58 moon charon: 05[CFG] selecting proposal:
Mar 18 10:18:58 moon charon: 05[CFG] proposal matches
Mar 18 10:18:58 moon charon: 05[CFG] received proposals:
ESP:AES_CBC_128/HMAC_SHA2_256_128/MODP_1536/NO_EXT_SEQ
Mar 18 10:18:58 moon charon: 05[CFG] configured proposals:
ESP:AES_CBC_128/HMAC_SHA2_256_128/MODP_1536/NO_EXT_SEQ
Mar 18 10:18:58 moon charon: 05[CFG] selected proposal:
ESP:AES_CBC_128/HMAC_SHA2_256_128/MODP_1536/NO_EXT_SEQ
Mar 18 10:18:58 moon charon: 05[CFG] selecting traffic selectors for us:
Mar 18 10:18:58 moon charon: 05[CFG] config: 10.1.0.0/16, received:
10.1.0.0/16 => match: 10.1.0.0/16
Mar 18 10:18:58 moon charon: 05[CFG] selecting traffic selectors for other:
Mar 18 10:18:58 moon charon: 05[CFG] config: 10.2.0.0/16, received:
10.2.0.0/16 => match: 10.2.0.0/16
Mar 18 10:18:58 moon charon: 05[IKE] CHILD_SA net-net{1} established with SPIs
c65719c1_i c5b686e4_o and TS 10.1.0.0/16 === 10.2.0.0/16
-------------------------------------------------------------------------------
moon ~ # ipsec statusall
Status of IKEv2 charon daemon (strongSwan 4.5.2dr3):
uptime: 117 seconds, since Mar 18 10:17:10 2011
malloc: sbrk 135168, mmap 0, used 87504, free 47664
worker threads: 9 idle of 16, job queue load: 0, scheduled events: 3
loaded plugins: curl aes des sha1 sha2 md5 pem pkcs1 gmp random x509
revocation hmac xcbc stroke kernel-netlink socket-default updown
Listening IP addresses:
192.168.0.1
fec0::1
10.1.0.1
fec1::1
Connections:
net-net: 192.168.0.1...192.168.0.2
net-net: local: [moon.strongswan.org] uses public key authentication
net-net: cert: "C=CH, O=Linux strongSwan, CN=moon.strongswan.org"
net-net: remote: [sun.strongswan.org] uses any authentication
net-net: child: 10.1.0.0/16 === 10.2.0.0/16
Security Associations:
net-net[1]: ESTABLISHED 109 seconds ago,
192.168.0.1[moon.strongswan.org]...192.168.0.2[sun.strongswan.org]
net-net[1]: IKE SPIs: 0c01492ce46c4f98_i* b5ad160a0c77e9b5_r, public key
reauthentication in 54 minutes
net-net[1]: IKE proposal:
AES_CBC_128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_2048
net-net{1}: INSTALLED, TUNNEL, ESP SPIs: c65719c1_i c5b686e4_o
net-net{1}: AES_CBC_128/HMAC_SHA2_256_128, 0 bytes_i, 0 bytes_o, rekeying
in 93 seconds
net-net{1}: 10.1.0.0/16 === 10.2.0.0/16
_______________________________________________
Users mailing list
[email protected]
https://lists.strongswan.org/mailman/listinfo/users