Hi Martin,
thanks for the fast response. We have tested the patch and it brings us one
step further. The IKE Rekeying succeeds, but afterwards it gets stuck within a
mode_config request. I don't think there should be a mode_config request during
rekeying or I am wrong? After this first rekeying no further traffic is going
thru the tunnel.
Here is the log of the first IKE rekeying:
Mar 11 15:50:48 ThinClient charon: 14[IKE] XAuth authentication of 'ecos'
(myself) successful
Mar 11 15:50:48 ThinClient charon: 14[IKE] deleting duplicate IKE_SA for peer
'1.2.3.4' due to uniqueness policy
Mar 11 15:50:48 ThinClient charon: 14[IKE] queueing ISAKMP_DELETE task
Mar 11 15:50:48 ThinClient charon: 14[IKE] activating new tasks
Mar 11 15:50:48 ThinClient charon: 14[IKE] activating ISAKMP_DELETE task
Mar 11 15:50:48 ThinClient charon: 14[IKE] deleting IKE_SA vvph_aggr_mode[1]
between 192.168.192.117[admin]...1.2.3.4[1.2.3.4]
Mar 11 15:50:48 ThinClient charon: 14[IKE] sending DELETE for IKE_SA
vvph_aggr_mode[1]
Mar 11 15:50:48 ThinClient charon: 14[IKE] IKE_SA vvph_aggr_mode[1] state
change: ESTABLISHED => DELETING
Mar 11 15:50:48 ThinClient charon: 14[CFG] nm ike_state_change, ike_sa =
vvph_aggr_mode[1] my sa = yes, state = DELETING
Mar 11 15:50:48 ThinClient charon: 14[CFG] nm ike_updown, ike_sa =
vvph_aggr_mode[1] my sa = yes, down
Mar 11 15:50:48 ThinClient charon: 14[IKE] Hash => 20 bytes @ 0x4081f300
Mar 11 15:50:48 ThinClient charon: 14[IKE] 0: 55 1C BF E6 6C A8 4E DD 26 CD
D8 5C F7 56 5E 11 U...l.N.&..\.V^.
Mar 11 15:50:48 ThinClient charon: 14[IKE] 16: 70 62 B5 62
pb.b
Mar 11 15:50:48 ThinClient charon: 14[ENC] generating INFORMATIONAL_V1 request
2158569415 [ HASH D ]
Mar 11 15:50:48 ThinClient charon: 14[IKE] next IV for MID 2158569415 => 8
bytes @ 0x408196d8
Mar 11 15:50:48 ThinClient charon: 14[IKE] 0: F9 DD 5D F7 26 45 CE 66
..].&E.f
Mar 11 15:50:48 ThinClient charon: 14[IKE] next IV for MID 2158569415 => 8
bytes @ 0x4080c000
Mar 11 15:50:48 ThinClient charon: 14[IKE] 0: 25 41 1B D8 B2 10 F7 2E
%A......
Mar 11 15:50:48 ThinClient charon: 14[NET] sending packet: from
192.168.192.117[4500] to 1.2.3.4[4500] (84 bytes)
Mar 11 15:50:48 ThinClient charon: 14[IKE] IKE_SA vvph_aggr_mode[1] state
change: DELETING => DESTROYING
Mar 11 15:50:48 ThinClient charon: 14[CFG] nm ike_state_change, ike_sa =
vvph_aggr_mode[1] my sa = yes, state = DESTROYING
Mar 11 15:50:48 ThinClient charon: 14[IKE] IKE_SA vvph_aggr_mode[2] established
between 192.168.192.117[admin]...1.2.3.4[1.2.3.4]
Mar 11 15:50:48 ThinClient charon: 14[IKE] IKE_SA vvph_aggr_mode[2] state
change: CONNECTING => ESTABLISHED
Mar 11 15:50:48 ThinClient charon: 14[IKE] scheduling reauthentication in 3558s
Mar 11 15:50:48 ThinClient charon: 14[IKE] maximum IKE_SA lifetime 3588s
Mar 11 15:50:48 ThinClient charon: 14[IKE] Hash => 20 bytes @ 0x4080fe10
Mar 11 15:50:48 ThinClient charon: 14[IKE] 0: 6E 21 CA AC DD 1F 65 18 9D 5D
43 18 67 07 FD 29 n!....e..]C.g..)
Mar 11 15:50:48 ThinClient charon: 14[IKE] 16: 8A 41 11 4F
.A.O
Mar 11 15:50:48 ThinClient charon: 14[ENC] generating TRANSACTION response
1481556635 [ HASH CP ]
Mar 11 15:50:48 ThinClient charon: 14[IKE] next IV for MID 1481556635 => 8
bytes @ 0x4080fed8
Mar 11 15:50:48 ThinClient charon: 14[IKE] 0: 82 63 04 AD A3 89 D0 66
.c.....f
Mar 11 15:50:48 ThinClient charon: 14[NET] sending packet: from
192.168.192.117[4500] to 1.2.3.4[4500] (68 bytes)
Mar 11 15:50:48 ThinClient charon: 14[IKE] activating new tasks
Mar 11 15:50:48 ThinClient charon: 14[IKE] activating MODE_CONFIG task
Mar 11 15:50:48 ThinClient charon: 14[IKE] building INTERNAL_IP4_DNS attribute
Mar 11 15:50:48 ThinClient charon: 14[IKE] building INTERNAL_IP4_DNS attribute
Mar 11 15:50:48 ThinClient charon: 14[IKE] building INTERNAL_IP4_NBNS attribute
Mar 11 15:50:48 ThinClient charon: 14[IKE] building UNITY_SPLIT_INCLUDE
attribute
Mar 11 15:50:48 ThinClient charon: 14[IKE] building UNITY_LOCAL_LAN attribute
Mar 11 15:50:48 ThinClient charon: 14[IKE] Hash => 20 bytes @ 0x4081e018
Mar 11 15:50:48 ThinClient charon: 14[IKE] 0: 11 8D EA D6 ED AC F9 52 E3 47
F6 5C 0A E5 6D 73 .......R.G.\..ms
Mar 11 15:50:48 ThinClient charon: 14[IKE] 16: 25 B3 1F DC
%...
Mar 11 15:50:48 ThinClient charon: 14[ENC] generating TRANSACTION request
3572047518 [ HASH CP ]
Mar 11 15:50:48 ThinClient charon: 14[IKE] next IV for MID 3572047518 => 8
bytes @ 0x4081e018
Mar 11 15:50:48 ThinClient charon: 14[IKE] 0: 28 80 A3 40 EE 83 9B BF
(..@....
Mar 11 15:50:48 ThinClient charon: 14[IKE] next IV for MID 3572047518 => 8
bytes @ 0x4081d908
Mar 11 15:50:48 ThinClient charon: 14[IKE] 0: BC 37 61 74 C4 DD BF E3
.7at....
Mar 11 15:50:48 ThinClient charon: 14[NET] sending packet: from
192.168.192.117[4500] to 1.2.3.4[4500] (92 bytes)
Mar 11 15:50:52 ThinClient charon: 01[IKE] sending retransmit 1 of request
message ID 3572047518, seq 1
Mar 11 15:50:52 ThinClient charon: 01[NET] sending packet: from
192.168.192.117[4500] to 1.2.3.4[4500] (92 bytes)
Mar 11 15:50:59 ThinClient charon: 12[IKE] sending retransmit 2 of request
message ID 3572047518, seq 1
Mar 11 15:50:59 ThinClient charon: 12[NET] sending packet: from
192.168.192.117[4500] to 1.2.3.4[4500] (92 bytes)
Mar 11 15:51:12 ThinClient charon: 13[IKE] sending retransmit 3 of request
message ID 3572047518, seq 1
Mar 11 15:51:12 ThinClient charon: 13[NET] sending packet: from
192.168.192.117[4500] to 1.2.3.4[4500] (92 bytes)
Mar 11 15:51:35 ThinClient charon: 14[IKE] sending retransmit 4 of request
message ID 3572047518, seq 1
Mar 11 15:51:35 ThinClient charon: 14[NET] sending packet: from
192.168.192.117[4500] to 1.2.3.4[4500] (92 bytes)
Mar 11 15:52:17 ThinClient charon: 02[IKE] sending retransmit 5 of request
message ID 3572047518, seq 1
Mar 11 15:52:17 ThinClient charon: 02[NET] sending packet: from
192.168.192.117[4500] to 1.2.3.4[4500] (92 bytes)
Mar 11 15:53:33 ThinClient charon: 12[IKE] giving up after 5 retransmits
Regards
Gerald
> -----Ursprüngliche Nachricht-----
> Von: Martin Willi [mailto:[email protected]]
> Gesendet: Freitag, 8. März 2013 15:25
> An: Gerald Richter - ECOS
> Cc: [email protected]
> Betreff: Re: [strongSwan] Aggressive Mode. Rekeying fails
>
> Hi Gerald,
>
> > 14[IKE] key derivation for XAuthRespPSK failed
>
> While we have some basic support to authenticate the responder with
> XAuth, it seems that the XAuthRespPSK case got lost somehow in key
> derivation.
>
> I haven't tried it at all, but the attached patch might fix the issue.
>
> Regards
> Martin
_______________________________________________
Users mailing list
[email protected]
https://lists.strongswan.org/mailman/listinfo/users