I run a number of linux boxes on various VPS providers that use IPsec
to connect tunnelled ip interfaces which then run OSPF.
This setup has work fine for a number of years.
Recently my systems seem to have upgraded from 5.0.4 to 5.1.1 and
everything has stopped working, a few connection will come up but most
won't.
All configs are under puppet management and therefore I am sure they
have not changed.
For example between hosts corgi and prom
[root@corgi:~] # cat /etc/strongswan/ipsec.conf
# /etc/ipsec.conf - strongSwan IPsec configuration file
# Following need to go in setup part
# plutodebug="ike 2,knl 2,net 2"
# charondebug="ike 2,knl 2,net 2"
config setup
charonstart=yes
plutostart=yes
plutodebug="ike 0,knl 0,net 0"
charondebug="ike 0,knl 0,net 0"
conn %default
ikelifetime=60m
keylife=20m
rekeymargin=3m
keyingtries=1
keyexchange=ikev2
mobike=no
authby=psk
dpdaction=restart
closeaction=restart
dpddelay=30s
dpdtimeout=150s
include /etc/strongswan/*.conn.conf
[root@corgi:~] # cat /etc/strongswan/corgi-prom.conn.conf
conn corgi-prom
auto=route
left=%defaultroute
[email protected]
leftsourceip=10.7.1.11
leftsubnet=10.7.1.11/32
leftprotoport=gre
lefthostaccess=yes
right=37.247.54.124
[email protected]
rightsourceip=10.7.1.10
rightsubnet=10.7.1.10/32
righthostaccess=yes
type=tunnel
rightprotoport=gre
keyexchange=ikev2
[root@corgi:~] #
[root@prom:~] # cat /etc/strongswan/ipsec.conf
# /etc/ipsec.conf - strongSwan IPsec configuration file
# Following need to go in setup part
# plutodebug="ike 2,knl 2,net 2"
# charondebug="ike 2,knl 2,net 2"
config setup
charonstart=yes
plutostart=yes
plutodebug="all"
charondebug="all"
conn %default
ikelifetime=60m
keylife=20m
rekeymargin=3m
keyingtries=1
keyexchange=ikev2
mobike=no
authby=secret
dpdaction=restart
closeaction=restart
dpddelay=30s
dpdtimeout=150s
include /etc/strongswan/*.conn.conf
[root@prom:~] # cat /etc/strongswan/prom-corgi.conn.conf
conn prom-corgi
auto=route
left=%defaultroute
[email protected]
leftsourceip=10.7.1.10
leftsubnet=10.7.1.10/32
leftprotoport=gre
lefthostaccess=yes
right=185.35.77.128
[email protected]
rightsourceip=10.7.1.11
rightsubnet=10.7.1.11/32
righthostaccess=yes
type=tunnel
rightprotoport=gre
keyexchange=ikev2
[root@prom:~] #
[root@prom:~] # strongswan up prom-corgi
[root@prom:~] # tail -100 /var/log/messages
.
.
.
Feb 9 20:41:36 prom.zelotus.com charon: 07[IKE] giving up after 5 retransmits
Feb 9 20:41:36 prom.zelotus.com charon: 07[IKE] establishing IKE_SA
failed, peer not responding
Feb 9 20:41:41 prom.zelotus.com charon: 12[KNL] creating acquire job
for policy 10.7.1.10/32[gre] === 10.7.1.9/32[gre] with reqid {2}
Feb 9 20:41:41 prom.zelotus.com charon: 12[IKE] initiating Main Mode
IKE_SA prom-lfc[21] to 38.109.218.26
Feb 9 20:41:41 prom.zelotus.com charon: 12[ENC] generating ID_PROT
request 0 [ SA V V V V ]
Feb 9 20:41:41 prom.zelotus.com charon: 12[NET] sending packet: from
37.247.54.124[500] to 38.109.218.26[500] (220 bytes)
Feb 9 20:41:41 prom.zelotus.com charon: 07[KNL] creating acquire job
for policy 10.7.1.10/32[gre] === 10.7.1.11/32[gre] with reqid {3}
Feb 9 20:41:41 prom.zelotus.com charon: 07[IKE] initiating IKE_SA
prom-corgi[22] to 185.35.77.128
Feb 9 20:41:41 prom.zelotus.com charon: 08[KNL] creating acquire job
for policy 10.7.1.10/32[gre] === 10.7.1.4/32[gre] with reqid {1}
Feb 9 20:41:41 prom.zelotus.com charon: 16[IKE] initiating Main Mode
IKE_SA prom-vm-gateway[23] to 87.117.195.92
Feb 9 20:41:41 prom.zelotus.com charon: 16[ENC] generating ID_PROT
request 0 [ SA V V V V ]
Feb 9 20:41:41 prom.zelotus.com charon: 16[NET] sending packet: from
37.247.54.124[500] to 87.117.195.92[500] (220 bytes)
Feb 9 20:41:41 prom.zelotus.com charon: 07[ENC] generating
IKE_SA_INIT request 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) ]
Feb 9 20:41:41 prom.zelotus.com charon: 07[NET] sending packet: from
37.247.54.124[500] to 185.35.77.128[500] (708 bytes)
Feb 9 20:41:41 prom.zelotus.com charon: 03[NET] received packet: from
185.35.77.128[500] to 37.247.54.124[500] (440 bytes)
Feb 9 20:41:41 prom.zelotus.com charon: 03[ENC] parsed IKE_SA_INIT
response 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) N(MULT_AUTH) ]
Feb 9 20:41:41 prom.zelotus.com charon: 03[IKE] authentication of
'prom.zelotus.com' (myself) with pre-shared key
Feb 9 20:41:41 prom.zelotus.com charon: 03[IKE] establishing CHILD_SA
prom-corgi{3}
Feb 9 20:41:41 prom.zelotus.com charon: 03[ENC] generating IKE_AUTH
request 1 [ IDi N(INIT_CONTACT) IDr AUTH SA TSi TSr N(MULT_AUTH)
N(EAP_ONLY) ]
Feb 9 20:41:41 prom.zelotus.com charon: 03[NET] sending packet: from
37.247.54.124[500] to 185.35.77.128[500] (428 bytes)
Feb 9 20:41:41 prom.zelotus.com charon: 05[NET] received packet: from
38.109.218.26[500] to 37.247.54.124[500] (40 bytes)
Feb 9 20:41:41 prom.zelotus.com charon: 05[ENC] parsed
INFORMATIONAL_V1 request 2915632631 [ N(NO_PROP) ]
Feb 9 20:41:41 prom.zelotus.com charon: 05[IKE] received
NO_PROPOSAL_CHOSEN error notify
Feb 9 20:41:41 prom.zelotus.com charon: 12[NET] received packet: from
185.35.77.128[500] to 37.247.54.124[500] (76 bytes)
Feb 9 20:41:41 prom.zelotus.com charon: 12[ENC] parsed IKE_AUTH
response 1 [ N(AUTH_FAILED) ]
Feb 9 20:41:41 prom.zelotus.com charon: 12[IKE] received
AUTHENTICATION_FAILED notify error
Feb 9 20:41:45 prom.zelotus.com charon: 06[IKE] sending retransmit 1
of request message ID 0, seq 1
Feb 9 20:41:45 prom.zelotus.com charon: 06[NET] sending packet: from
37.247.54.124[500] to 87.117.195.92[500] (220 bytes)
Feb 9 20:41:52 prom.zelotus.com charon: 13[IKE] sending retransmit 2
of request message ID 0, seq 1
Feb 9 20:41:52 prom.zelotus.com charon: 13[NET] sending packet: from
37.247.54.124[500] to 87.117.195.92[500] (220 bytes)
Feb 9 20:42:05 prom.zelotus.com charon: 07[IKE] sending retransmit 3
of request message ID 0, seq 1
Feb 9 20:42:05 prom.zelotus.com charon: 07[NET] sending packet: from
37.247.54.124[500] to 87.117.195.92[500] (220 bytes)
Feb 9 20:42:07 prom.zelotus.com charon: 10[NET] received packet: from
38.109.218.26[500] to 37.247.54.124[500] (924 bytes)
Feb 9 20:42:07 prom.zelotus.com charon: 10[ENC] parsed IKE_SA_INIT
request 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) ]
Feb 9 20:42:07 prom.zelotus.com charon: 10[IKE] no IKE config found
for 37.247.54.124...38.109.218.26, sending NO_PROPOSAL_CHOSEN
Feb 9 20:42:07 prom.zelotus.com charon: 10[ENC] generating
IKE_SA_INIT response 0 [ N(NO_PROP) ]
Feb 9 20:42:07 prom.zelotus.com charon: 10[NET] sending packet: from
37.247.54.124[500] to 38.109.218.26[500] (36 bytes)
Feb 9 20:42:19 prom.zelotus.com kernel: GL LAST IN=eth0 OUT=
MAC=00:16:3c:a3:7c:a3:00:04:96:51:7b:d8:08:00 SRC=180.153.113.141
DST=37.247.54.124 LEN=40 TOS=0x00 PREC=0x00 TTL=41 ID=0 DF PROTO=TCP
SPT=22200 DPT=1723 WINDOW=8192 RES=0x00 SYN URGP=0
Feb 9 20:42:28 prom.zelotus.com charon: 06[IKE] sending retransmit 4
of request message ID 0, seq 1
Feb 9 20:42:28 prom.zelotus.com charon: 06[NET] sending packet: from
37.247.54.124[500] to 87.117.195.92[500] (220 bytes)
Feb 9 20:42:42 prom.zelotus.com kernel: GL LAST IN=eth0 OUT=
MAC=01:00:5e:00:00:01:00:04:96:51:7b:d8:08:00 SRC=37.247.54.1
DST=224.0.0.1 LEN=32 TOS=0x00 PREC=0xC0 TTL=1 ID=20287 PROTO=2
Feb 9 20:43:10 prom.zelotus.com charon: 03[IKE] sending retransmit 5
of request message ID 0, seq 1
Feb 9 20:43:10 prom.zelotus.com charon: 03[NET] sending packet: from
37.247.54.124[500] to 87.117.195.92[500] (220 bytes)
Feb 9 20:43:38 prom.zelotus.com charon: 00[DMN] signal of type SIGINT
received. Shutting down
Feb 9 20:43:38 prom.zelotus.com charon: 00[IKE] destroying IKE_SA in
state CONNECTING without notification
Is this is related to the NO_PROPOSAL_CHOSEN line ?
Also does Feb 9 20:41:41 prom.zelotus.com charon: 03[ENC] parsed
IKE_SA_INIT response 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP)
N(MULT_AUTH) ] indicate charon thinks NAT is in play, as it isn't at
either end
ipsec.secrets contains
@corgi.zelotus.com @prom.zelotus.com : PSK THE KEY
Any help would be gratefully received as I can't find the old version
of 5.0.4 in the centos repos.
Thanks
Dean
--
Dean Smith
_______________________________________________
Users mailing list
[email protected]
https://lists.strongswan.org/mailman/listinfo/users