Hello Volker,
Thanks again for sharing your experience and ideas.
>Did you try to disable IPComp? That's compress=no in ipsec.conf. And
>just to be sure disable IPComp for every connection. You can still
>re-enable it if everything works.
You guess was right to the point!
I replaced in all the instances
#compress=yes
compress=no
[root@wave ~]# strongswan up spb-hmnet
initiating IKE_SA spb-hmnet[2] to xx.xx.221.28
generating IKE_SA_INIT request 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) ]
sending packet: from xx.xx.122.170[500] to xx.xx.221.28[500] (708 bytes)
received packet: from xx.xx.221.28[500] to xx.xx.122.170[500] (465 bytes)
parsed IKE_SA_INIT response 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) CERTREQ
N(MULT_AUTH) ]
received cert request for "OU=CA, CN=certauth"
sending cert request for "OU=CA, CN=certauth"
authentication of 'hq.spb@ucp' (myself) with RSA signature successful
establishing CHILD_SA spb-hmnet
generating IKE_AUTH request 1 [ IDi N(INIT_CONTACT) CERTREQ IDr AUTH SA TSi TSr
N(MOBIKE_SUP) N(ADD_4_ADDR) N(MULT_AUTH) N(EAP_ONLY) ]
sending packet: from xx.xx.122.170[4500] to xx.xx.221.28[4500] (556 bytes)
received packet: from xx.xx.221.28[4500] to xx.xx.122.170[4500] (524 bytes)
parsed IKE_AUTH response 1 [ IDr AUTH SA TSi TSr N(AUTH_LFT) N(MOBIKE_SUP)
N(ADD_4_ADDR) N(ADD_4_ADDR) N(ADD_6_ADDR) ]
using trusted ca certificate "OU=CA, CN=certauth"
checking certificate status of "OU=hmnet, CN=karma.ucp"
certificate status is not available
reached self-signed root ca with a path length of 0
using trusted certificate "OU=hmnet, CN=karma.ucp"
authentication of 'karma.ucp' with RSA signature successful
IKE_SA spb-hmnet[2] established between
xx.xx.122.170[hq.spb@ucp]...xx.xx.221.28[karma.ucp]
scheduling reauthentication in 10145s
maximum IKE_SA lifetime 10685s
connection 'spb-hmnet' established successfully
Now we have 2 tunnels up and running:
Security Associations (2 up, 0 connecting):
spb-hmnet[2]: ESTABLISHED 8 minutes ago,
xx.xx.122.170[hq.spb@ucp]...xx.xx.221.28[karma.ucp]
spb-hmnet[2]: IKEv2 SPIs: 986512b316f3f146_i* ce50d928ca13b439_r, public key
reauthentication in 2 hours
spb-hmnet{2}: 192.168.0.0/24 === 192.168.4.0/24
spb-frqx[1]: ESTABLISHED 8 minutes ago, xx.xx.122.170[OU=spb,
CN=wave.spb]...xx.xx..230.112[OU=frqx, CN=vpn.ucp]
spb-frqx[1]: IKEv2 SPIs: 39d18a0f01e844a7_i* 64798b5e2576b99b_r, public key
reauthentication in 2 hours
spb-frqx{1}: 192.168.0.0/24 === 192.168.169.0/24
[root@wave ~]# ping karma.hmnet
PING karma.hmnet (192.168.4.10) 56(84) bytes of data.
64 bytes from karma.hmnet (192.168.4.10): icmp_seq=1 ttl=64 time=110 ms
64 bytes from karma.hmnet (192.168.4.10): icmp_seq=2 ttl=64 time=110 ms
64 bytes from karma.hmnet (192.168.4.10): icmp_seq=3 ttl=64 time=112 ms
The second tinnel:
[root@wave ~]# ping aah.prs
PING aah.prs.ucp (192.168.169.60) 56(84) bytes of data.
64 bytes from ns.prs (192.168.169.60): icmp_seq=1 ttl=63 time=105 ms
64 bytes from ns.prs (192.168.169.60): icmp_seq=2 ttl=63 time=105 ms
From the other side:
[root@karma ~]# ping wave.spb
ping: unknown host wave.spb
[root@karma ~]# ping 192.168.0.100
PING 192.168.0.100 (192.168.0.100) 56(84) bytes of data.
64 bytes from 192.168.0.100: icmp_seq=1 ttl=64 time=109 ms
64 bytes from 192.168.0.100: icmp_seq=2 ttl=64 time=110 ms
64 bytes from 192.168.0.100: icmp_seq=3 ttl=64 time=113 ms
As you have noticed, there is net segment "spb" name resolution problem.
How could the wave.spb domain name resolution be enabled?
The necessary setting has been added here:
[root@wave ~]# cat /etc/strongswan/strongswan.conf
charon {
# ...
dns1 = 192.168.0.100
nbns1 = 192.168.0.100
}
Is anything else necessary to be checked or enabled?
Thanks again,
Serge
> ----- Original Message -----
> From: Volker Rümelin
> Sent: 01/19/14 06:20 PM
> To: s s
> Subject: Re: [strongSwan] strongswan-5.1.x, tunnel and routing pb
>
> Hello Serge,
>
> > Hello Volker,
> >
> > We have an ongoing routing problem since the attempt to migrate from
> > strongswan-4.x.x to strongswan-5.1.x
> >
> > Are there any ideas of what is going wrong ?
> >
>
> sorry, no. I looked at your logs but couldn't find anything obvious.
>
> Did you try to disable IPComp? That's compress=no in ipsec.conf. And
> just to be sure disable IPComp for every connection. You can still
> re-enable it if everything works.
>
> Regards,
> Volker
_______________________________________________
Users mailing list
[email protected]
https://lists.strongswan.org/mailman/listinfo/users