Hi,
I am running the automated tests. The scenario ha/both-active fails. I
downloaded linux-3.3.2.tar.bz2, config-3.3, gentoo-fs-20111212.tar.bz2 and
strongswan-4.6.4.tar.bz2. The generated console.log is attached.
I am confused with the patches mentionned here :
http://wiki.strongswan.org/projects/strongswan/wiki/HighAvailability#KernelIPtables-patches.
Must I apply a patch to make the test pass ?
Regards,
Stéphanie
TCPDUMP
venus# tcpdump -i eth0 not port ssh and not port domain > /tmp/tcpdump.log 2>&1
&
carol# tcpdump -i eth0 not port ssh and not port domain > /tmp/tcpdump.log 2>&1
&
dave# tcpdump -i eth0 not port ssh and not port domain > /tmp/tcpdump.log 2>&1 &
PRE-TEST
moon# ip addr add 192.168.0.5/24 dev eth0
moon# ip addr add 10.1.0.5/16 dev eth1
alice# /etc/init.d/net.eth1 start
* Caching service dependencies ... [ ok ]
* Starting eth1
* Bringing up eth1
* 192.168.0.50
[ ok ]
* fec0::5/16
[ ok ]
alice# ip addr add 192.168.0.5/24 dev eth1
alice# ip addr add 10.1.0.5/16 dev eth0
venus# ip route del default via 10.1.0.1 dev eth0
venus# ip route add default via 10.1.0.5 dev eth0
moon# /etc/init.d/iptables start 2> /dev/null
* Caching service dependencies ... [ ok ]
* Starting firewall ... [ ok ]
alice# /etc/init.d/iptables start 2> /dev/null
* Starting firewall ... [ ok ]
carol# /etc/init.d/iptables start 2> /dev/null
* Caching service dependencies ... [ ok ]
* Starting firewall ... [ ok ]
dave# /etc/init.d/iptables start 2> /dev/null
* Caching service dependencies ... [ ok ]
* Starting firewall ... [ ok ]
moon# ipsec start
Starting strongSwan 4.6.4 IPsec [starter]...
alice# ipsec start
Starting strongSwan 4.6.4 IPsec [starter]...
carol# ipsec start
Starting strongSwan 4.6.4 IPsec [starter]...
dave# ipsec start
Starting strongSwan 4.6.4 IPsec [starter]...
carol# sleep 1
carol# ipsec up home
initiating IKE_SA home[1] to 192.168.0.5
generating IKE_SA_INIT request 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) ]
sending packet: from 192.168.0.100[500] to 192.168.0.5[500]
received packet: from 192.168.0.5[500] to 192.168.0.100[500]
parsed IKE_SA_INIT response 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) CERTREQ
N(MULT_AUTH) ]
received cert request for "C=CH, O=Linux strongSwan, CN=strongSwan Root CA"
sending cert request for "C=CH, O=Linux strongSwan, CN=strongSwan Root CA"
authentication of '[email protected]' (myself) with RSA signature successful
sending end entity cert "C=CH, O=Linux strongSwan, OU=Research,
[email protected]"
establishing CHILD_SA home
generating IKE_AUTH request 1 [ IDi CERT N(INIT_CONTACT) CERTREQ IDr AUTH SA
TSi TSr N(MOBIKE_SUP) N(ADD_6_ADDR) N(MULT_AUTH) N(EAP_ONLY) ]
sending packet: from 192.168.0.100[4500] to 192.168.0.5[4500]
received packet: from 192.168.0.5[4500] to 192.168.0.100[4500]
parsed IKE_AUTH response 1 [ IDr CERT AUTH SA TSi TSr N(AUTH_LFT) N(MOBIKE_SUP)
N(ADD_4_ADDR) N(ADD_4_ADDR) N(ADD_4_ADDR) N(ADD_6_ADDR) N(ADD_6_ADDR) ]
received end entity cert "C=CH, O=Linux strongSwan, OU=Virtual VPN Gateway,
CN=mars.strongswan.org"
using certificate "C=CH, O=Linux strongSwan, OU=Virtual VPN Gateway,
CN=mars.strongswan.org"
using trusted ca certificate "C=CH, O=Linux strongSwan, CN=strongSwan Root CA"
checking certificate status of "C=CH, O=Linux strongSwan, OU=Virtual VPN
Gateway, CN=mars.strongswan.org"
fetching crl from 'http://crl.strongswan.org/strongswan.crl' ...
using trusted certificate "C=CH, O=Linux strongSwan, CN=strongSwan Root CA"
crl correctly signed by "C=CH, O=Linux strongSwan, CN=strongSwan Root CA"
crl is valid: until Jul 22 19:08:04 2012
certificate status is good
reached self-signed root ca with a path length of 0
authentication of 'mars.strongswan.org' with RSA signature successful
IKE_SA home[1] established between
192.168.0.100[[email protected]]...192.168.0.5[mars.strongswan.org]
scheduling reauthentication in 3363s
maximum IKE_SA lifetime 3543s
dave# ipsec up home
initiating IKE_SA home[1] to 192.168.0.5
generating IKE_SA_INIT request 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) ]
sending packet: from 192.168.0.200[500] to 192.168.0.5[500]
received packet: from 192.168.0.5[500] to 192.168.0.200[500]
parsed IKE_SA_INIT response 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) CERTREQ
N(MULT_AUTH) ]
received cert request for "C=CH, O=Linux strongSwan, CN=strongSwan Root CA"
sending cert request for "C=CH, O=Linux strongSwan, CN=strongSwan Root CA"
authentication of '[email protected]' (myself) with RSA signature successful
sending end entity cert "C=CH, O=Linux strongSwan, OU=Accounting,
[email protected]"
establishing CHILD_SA home
generating IKE_AUTH request 1 [ IDi CERT N(INIT_CONTACT) CERTREQ IDr AUTH SA
TSi TSr N(MOBIKE_SUP) N(ADD_6_ADDR) N(MULT_AUTH) N(EAP_ONLY) ]
sending packet: from 192.168.0.200[4500] to 192.168.0.5[4500]
received packet: from 192.168.0.5[4500] to 192.168.0.200[4500]
parsed IKE_AUTH response 1 [ IDr CERT AUTH SA TSi TSr N(AUTH_LFT) N(MOBIKE_SUP)
N(ADD_4_ADDR) N(ADD_4_ADDR) N(ADD_4_ADDR) N(ADD_6_ADDR) N(ADD_6_ADDR) ]
received end entity cert "C=CH, O=Linux strongSwan, OU=Virtual VPN Gateway,
CN=mars.strongswan.org"
using certificate "C=CH, O=Linux strongSwan, OU=Virtual VPN Gateway,
CN=mars.strongswan.org"
using trusted ca certificate "C=CH, O=Linux strongSwan, CN=strongSwan Root CA"
checking certificate status of "C=CH, O=Linux strongSwan, OU=Virtual VPN
Gateway, CN=mars.strongswan.org"
fetching crl from 'http://crl.strongswan.org/strongswan.crl' ...
using trusted certificate "C=CH, O=Linux strongSwan, CN=strongSwan Root CA"
crl correctly signed by "C=CH, O=Linux strongSwan, CN=strongSwan Root CA"
crl is valid: until Jul 22 19:08:04 2012
certificate status is good
reached self-signed root ca with a path length of 0
authentication of 'mars.strongswan.org' with RSA signature successful
IKE_SA home[1] established between
192.168.0.200[[email protected]]...192.168.0.5[mars.strongswan.org]
scheduling reauthentication in 3271s
maximum IKE_SA lifetime 3451s
TEST
alice# ipsec statusall | grep 'rw.*ESTABLISHED.*[email protected]' [YES]
rw[1]: ESTABLISHED 1 second ago,
192.168.0.5[mars.strongswan.org]...192.168.0.100[[email protected]]
alice# ipsec statusall | grep 'rw.*ESTABLISHED.*[email protected]' [YES]
rw[2]: ESTABLISHED 0 seconds ago,
192.168.0.5[mars.strongswan.org]...192.168.0.200[[email protected]]
moon# ipsec statusall | grep 'rw.*PASSIVE.*[email protected]' [YES]
rw[1]: PASSIVE,
192.168.0.5[mars.strongswan.org]...192.168.0.100[[email protected]]
moon# ipsec statusall | grep 'rw.*PASSIVE.*[email protected]' [YES]
rw[2]: PASSIVE,
192.168.0.5[mars.strongswan.org]...192.168.0.200[[email protected]]
carol# ipsec statusall | grep 'home.*ESTABLISHED' [YES]
home[1]: ESTABLISHED 2 seconds ago,
192.168.0.100[[email protected]]...192.168.0.5[mars.strongswan.org]
dave# ipsec statusall | grep 'home.*ESTABLISHED' [YES]
home[1]: ESTABLISHED 2 seconds ago,
192.168.0.200[[email protected]]...192.168.0.5[mars.strongswan.org]
alice# cat /var/log/daemon.log | grep 'HA segment 1 activated' [YES]
Jun 22 19:22:00 alice charon: 08[CFG] HA segment 1 activated, now active: 1
moon# cat /var/log/daemon.log | grep 'HA segment 2 activated' [YES]
Jun 22 19:22:01 moon charon: 14[CFG] HA segment 2 activated, now active: 2
alice# cat /var/log/daemon.log | grep 'handling HA CHILD_SA' [YES]
Jun 22 19:22:02 alice charon: 02[CFG] handling HA CHILD_SA rw{1} 10.1.0.0/16
=== 192.168.0.100/32 (segment in: 1*, out: 1*)
Jun 22 19:22:03 alice charon: 05[CFG] handling HA CHILD_SA rw{2} 10.1.0.0/16
=== 192.168.0.200/32 (segment in: 2, out: 2)
moon# cat /var/log/daemon.log | grep 'installed HA CHILD_SA' [YES]
Jun 22 19:22:02 moon charon: 14[CFG] installed HA CHILD_SA rw{1} 10.1.0.0/16
=== 192.168.0.100/32 (segment in: 1, out: 1)
Jun 22 19:22:03 moon charon: 14[CFG] installed HA CHILD_SA rw{2} 10.1.0.0/16
=== 192.168.0.200/32 (segment in: 2*, out: 2*)
carol# ping -c 1 10.1.0.20 | grep '64 bytes from 10.1.0.20: icmp_seq=1' [YES]
dave# ping -c 1 10.1.0.20 | grep '64 bytes from 10.1.0.20: icmp_seq=1' [YES]
carol# killall tcpdump
carol# cat /tmp/tcpdump.log | grep 'IP carol.strongswan.org >
mars.strongswan.org: ESP' [YES]
19:22:05.545210 IP carol.strongswan.org > mars.strongswan.org:
ESP(spi=0xca1671f2,seq=0x1), length 132
carol# cat /tmp/tcpdump.log | grep 'IP mars.strongswan.org >
carol.strongswan.org: ESP' [YES]
dave# killall tcpdump
dave# cat /tmp/tcpdump.log | grep 'IP dave.strongswan.org >
mars.strongswan.org: ESP' [YES]
19:22:15.628109 IP dave.strongswan.org > mars.strongswan.org:
ESP(spi=0xc3bb9362,seq=0x1), length 132
dave# cat /tmp/tcpdump.log | grep 'IP mars.strongswan.org >
dave.strongswan.org: ESP' [YES]
venus# killall tcpdump
venus# cat /tmp/tcpdump.log | grep 'IP carol.strongswan.org >
venus.strongswan.org: ICMP echo request' [YES]
19:22:05.503259 IP carol.strongswan.org > venus.strongswan.org: ICMP echo
request, id 48151, seq 1, length 64
venus# cat /tmp/tcpdump.log | grep 'IP venus.strongswan.org >
carol.strongswan.org: ICMP echo reply' [YES]
19:22:05.503501 IP venus.strongswan.org > carol.strongswan.org: ICMP echo
reply, id 48151, seq 1, length 64
venus# cat /tmp/tcpdump.log | grep 'IP dave.strongswan.org >
venus.strongswan.org: ICMP echo request' [YES]
19:22:15.589040 IP dave.strongswan.org > venus.strongswan.org: ICMP echo
request, id 17683, seq 1, length 64
venus# cat /tmp/tcpdump.log | grep 'IP venus.strongswan.org >
dave.strongswan.org: ICMP echo reply' [YES]
19:22:15.589090 IP venus.strongswan.org > dave.strongswan.org: ICMP echo reply,
id 17683, seq 1, length 64
POST-TEST
carol# ipsec stop
Stopping strongSwan IPsec...
dave# ipsec stop
Stopping strongSwan IPsec...
moon# ipsec stop
Stopping strongSwan IPsec...
alice# ipsec stop
Stopping strongSwan IPsec...
moon# /etc/init.d/iptables stop 2> /dev/null
* Stopping firewall ... [ ok ]
alice# /etc/init.d/iptables stop 2> /dev/null
* Stopping firewall ... [ ok ]
carol# /etc/init.d/iptables stop 2> /dev/null
* Stopping firewall ... [ ok ]
dave# /etc/init.d/iptables stop 2> /dev/null
* Stopping firewall ... [ ok ]
moon# ip addr del 192.168.0.5/24 dev eth0
moon# ip addr del 10.1.0.5/16 dev eth1
alice# ip addr del 192.168.0.5/24 dev eth1
alice# ip addr del 10.1.0.5/16 dev eth0
alice# /etc/init.d/net.eth1 stop
* Stopping eth1
* Bringing down eth1
* Shutting down eth1 ... [ ok ]
venus# ip route del default via 10.1.0.5 dev eth0
venus# ip route add default via 10.1.0.1 dev eth0
moon# conntrack -F
alice# conntrack -F
_______________________________________________
Users mailing list
[email protected]
https://lists.strongswan.org/mailman/listinfo/users