Below is the strongSwan config which I have complete control over:
conn school-tunnel02
    type=tunnel
    auto=start
    keyexchange=ikev1
    ikelifetime=25h
    #keylife=480m
    # 28800s = 8h
    #lifetime=28800s
    lifetime=86400s
    #margintime=19m
    ## commented above line and added below line - 20130909 - Izz
    rekey=no
    # above line setting rekey=no had no affect on 6 hour timeout of tunnel
    #dpdaction=restart
    #dpddelay=30s
    authby=secret
    auth=esp
    ike=3des-sha1-modp1024!
    esp=3des-sha1!
    left=10.10.100.221
    leftid=wepa
    leftsubnet=10.10.100.0/24
    leftfirewall=yes
    right=XXX.YYY.2.20
    rightid=XXX.YYY.2.20
    rightsubnet=XXX.YYY.43.0/24

I have requested the admin on the other end of the tunnel to change the 
lifetime to 24h which they have done, and it made no difference.  The tunnel is 
dropping at exactly every 6 hours.  Here are the logs from the drop time:

Sep 15 16:34:02 bhm-ipsec-221 charon: 16[ENC] parsed ID_PROT request 0 [ SA V V 
V V ]
Sep 15 16:34:02 bhm-ipsec-221 charon: 16[IKE] received 
draft-ietf-ipsec-nat-t-ike-02\n vendor ID
Sep 15 16:34:02 bhm-ipsec-221 charon: 16[IKE] received 
draft-ietf-ipsec-nat-t-ike-03 vendor ID
Sep 15 16:34:02 bhm-ipsec-221 charon: 16[IKE] received NAT-T (RFC 3947) vendor 
ID
Sep 15 16:34:02 bhm-ipsec-221 charon: 16[IKE] received FRAGMENTATION vendor ID
Sep 15 16:34:02 bhm-ipsec-221 charon: 16[IKE] XXX.YYY.2.20 is initiating a Main 
Mode IKE_SA
Sep 15 16:34:02 bhm-ipsec-221 charon: 16[ENC] generating ID_PROT response 0 [ 
SA V V V ]
Sep 15 16:34:02 bhm-ipsec-221 charon: 16[NET] sending packet: from 
10.10.100.221[4500] to XXX.YYY.2.20[4500] (132 bytes)
Sep 15 16:34:02 bhm-ipsec-221 charon: 13[NET] received packet: from 
XXX.YYY.2.20[4500] to 10.10.100.221[4500] (304 bytes)
Sep 15 16:34:02 bhm-ipsec-221 charon: 13[ENC] parsed ID_PROT request 0 [ KE No 
V V V V NAT-D NAT-D ]
Sep 15 16:34:02 bhm-ipsec-221 charon: 13[IKE] local host is behind NAT, sending 
keep alives
Sep 15 16:34:02 bhm-ipsec-221 charon: 13[ENC] generating ID_PROT response 0 [ 
KE No NAT-D NAT-D ]
Sep 15 16:34:02 bhm-ipsec-221 charon: 13[NET] sending packet: from 
10.10.100.221[4500] to XXX.YYY.2.20[4500] (244 bytes)
Sep 15 16:34:02 bhm-ipsec-221 charon: 15[NET] received packet: from 
XXX.YYY.2.20[4500] to 10.10.100.221[4500] (84 bytes)
Sep 15 16:34:02 bhm-ipsec-221 charon: 15[ENC] parsed ID_PROT request 0 [ ID 
HASH V ]
Sep 15 16:34:02 bhm-ipsec-221 charon: 15[CFG] looking for pre-shared key peer 
configs matching 10.10.100.221...XXX.YYY.2.20[XXX.YYY.2.20]
Sep 15 16:34:02 bhm-ipsec-221 charon: 15[CFG] selected peer config 
"school-tunnel02"
Sep 15 16:34:02 bhm-ipsec-221 charon: 15[IKE] deleting duplicate IKE_SA for 
peer 'XXX.YYY.2.20' due to uniqueness policy
Sep 15 16:34:02 bhm-ipsec-221 charon: 15[IKE] deleting IKE_SA 
school-tunnel02[144] between 10.10.100.221[wepa]...XXX.YYY.2.20[XXX.YYY.2.20]
Sep 15 16:34:02 bhm-ipsec-221 charon: 15[IKE] sending DELETE for IKE_SA 
school-tunnel02[144]
Sep 15 16:34:02 bhm-ipsec-221 charon: 15[ENC] generating INFORMATIONAL_V1 
request 3554893475 [ HASH D ]
Sep 15 16:34:02 bhm-ipsec-221 charon: 15[NET] sending packet: from 
10.10.100.221[4500] to XXX.YYY.2.20[4500] (84 bytes)
Sep 15 16:34:02 bhm-ipsec-221 charon: 15[IKE] IKE_SA school-tunnel02[152] 
established between 10.10.100.221[wepa]...XXX.YYY.2.20[XXX.YYY.2.20]
Sep 15 16:34:02 bhm-ipsec-221 charon: 15[ENC] generating ID_PROT response 0 [ 
ID HASH ]
Sep 15 16:34:02 bhm-ipsec-221 charon: 15[NET] sending packet: from 
10.10.100.221[4500] to XXX.YYY.2.20[4500] (68 bytes)
Sep 15 16:34:02 bhm-ipsec-221 charon: 14[NET] received packet: from 
XXX.YYY.2.20[4500] to 10.10.100.221[4500] (68 bytes)
Sep 15 16:34:02 bhm-ipsec-221 charon: 14[ENC] parsed INFORMATIONAL_V1 request 
3654723502 [ HASH D ]
Sep 15 16:34:02 bhm-ipsec-221 charon: 14[IKE] received DELETE for ESP CHILD_SA 
with SPI aadc2798
Sep 15 16:34:02 bhm-ipsec-221 charon: 14[IKE] closing CHILD_SA 
school-tunnel02{22} with SPIs c1777483_i (12096 bytes) aadc2798_o (15552 bytes) 
and TS 10.10.100.0/24 === XXX.YYY.43.0/24
Sep 15 16:34:02 bhm-ipsec-221 vpn: - XXX.YYY.2.20 XXX.YYY.43.0/24 == 
XXX.YYY.2.20 -- 10.10.100.221 == 10.10.100.0/24
Sep 15 16:34:02 bhm-ipsec-221 charon: 10[NET] received packet: from 
XXX.YYY.2.20[4500] to 10.10.100.221[4500] (84 bytes)
Sep 15 16:34:02 bhm-ipsec-221 charon: 10[ENC] parsed INFORMATIONAL_V1 request 
2406045800 [ HASH D ]
Sep 15 16:34:02 bhm-ipsec-221 charon: 10[IKE] received DELETE for IKE_SA 
school-tunnel02[152]
Sep 15 16:34:02 bhm-ipsec-221 charon: 10[IKE] deleting IKE_SA 
school-tunnel02[152] between 10.10.100.221[wepa]...XXX.YYY.2.20[XXX.YYY.2.20]



I am running CentOS 6.4 x86_64 with kernel 2.6.32 and strongSwan 5.0.4 from the 
EPEL repo from CentOS.  (this is not a compile from source)
Here is the output of 'strongswan version':
Linux strongSwan U5.0.4/K2.6.32-358.14.1.el6.x86_64

I have two strongSwan instances setup between the same box and another in 
Amazon AWS Cloud for site-to-site to our DR, and the tunnel never goes down.  
Traffic passes through this problematic tunnel as it should and everything is 
great until 6 hours passes.  I have configured a bash script that runs on a */1 
minute cron to check the tunnel and if it is down it brings the tunnel back up 
and emails me.  This is how I have been able to keep timestamps.  As you can 
see in the logs, it appears to be a renego that goes wrong, but all within the 
same 1 second.  My cronjob picks it up at 16:35 in the above case, sees the 
tunnel down, runs a strongswan up school-tunnel02 and mails me the output of 
the command, showing success.  This continues each and every 6 hours like 
clockwork.

I appreciate any input.  I can probably find the configs sent to me by the 
admin on the other end with the Cisco ASA, but I can assure you the initial 
tunnel lifetime was set to 8 hours (28,800s), so I am having problem believing 
the ASA is doing this, even after a change to 86,400s.

Ideas please?

Thanks,
Izz


Izz Abdullah
Senior Systems Engineer
[email protected]<mailto:[email protected]>
www.wepanow.com<http://www.wepanow.com>

_______________________________________________
Users mailing list
[email protected]
https://lists.strongswan.org/mailman/listinfo/users

Reply via email to