Hi Noel,

Thank you for your reply.

I have compiled with the option you specified and now I don't see the '/etc/updown: no such file or directory' in the log But still the behaviour is same i,e iptables rules are not populated. Rather flow in opposite direction is quite odd.

To make sure my setup's routing is correct I have tested a scenario with traditional way of non TUN based setup with pre-shared key and AES cryptography and I can pass bidirectional traffic.

What is happening now is that, for the below mentioned setup:


Host 1<-------------------> GW sun <----------------------------> GW moon<---------------------->Host 2
                        eth1          eth0            eth0           eth2
10.0.0.103 10.0.0.101 12.0.0.167 12.0.0.189 11.0.0.189 11.0.0.101


1) If I send traffic (UDP) from Host 2, traffic is seen in eth2 of moon GW but nothing is gone to eth0 of the same GW, let alone encryption/decryption.

2) If I send traffic from Host 1, traffic is encrypted an decrypted in eth0 or sun GW and moon GW respectively, but that traffic is not seen in eth2 of moon GW.

The configuration looks like:

moon:

#cat ipsec.conf
config setup

conn %default
        ikelifetime=60m
        keylife=20m
        rekeymargin=3m
        keyingtries=1
        keyexchange=ikev2
        mobike=no

conn test
        left=12.0.0.189
        leftcert=moonCert.pem
        leftsubnet=11.0.0.0/24
        [email protected]
        leftupdown=/var/lib/strongswan/_updown
        right=12.0.0.167
        rightcert=sunCert.pem
        rightsubnet=10.0.0.0/24
        [email protected]
        auto=add

#ip route list table 220
10.0.0.0/24 dev ipsec0  proto static  src 11.0.0.189


#cat strongswan.conf
charon {
load = aes des rc2 sha1 sha2 md5 random nonce x509 revocation constraints pubkey pkcs1 pkcs7 pkcs8 pkcs12 pgp dnskey sshkey pem fips-prf gmp xcbc cmac hmac attr kernel-libipsec kernel-netlink resolve socket-default stroke updown xauth-generic
  multiple_authentication = no
  debug = 4
}

sun:

cat ipsec.conf
config setup

conn %default
        ikelifetime=60m
        keylife=20m
        rekeymargin=3m
        keyingtries=1
        keyexchange=ikev2
        mobike=no

conn test
        left=12.0.0.167
        leftcert=sunCert.pem
        leftsubnet=10.0.0.0/24
        [email protected]
        leftupdown=/var/lib/strongswan/_updown
        right=12.0.0.189
        rightcert=moonCert.pem
        rightsubnet=11.0.0.0/24
        [email protected]
        auto=add

ip route list table 220
11.0.0.0/24 via 12.0.0.189 dev eth0  proto static  src 10.0.0.101

same strongswan.conf.

How should we populate the Iptable rules?

Thanks,
Shahreen

Shahreen Noor Ahmed
Network Support Department
Adax Europe Ltd
url: www.adax.com
e-mail: [email protected]
Direct line: +44(0)118 952 2804

On 09/07/2014 12:33, Noel Kuntze wrote:
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Hello,

You probably didn't run ./configure with the correct parameters and set 
"--with-ipsecdir=/usr/lib/strongswan".

Regards,
Noel Kuntze

GPG Key id: 0x63EC6658
Fingerprint: 23CA BB60 2146 05E7 7278 6592 3839 298F 63EC 6658
Am 09.07.2014 13:29, schrieb Shahreen Ahmed:
Hi,

Can you please help in this regard?

I want to test max throughput based on Ipsec ESP userland encryption with 
libipsec.

I configured Strongswan 5.1.3 with following option:
--enable-kernel-libipsec

While trying to make a setup following below link:

http://www.strongswan.org/uml/testresults/libipsec/net2net-cert/

It seems that even though a Tunnel is UP based on X.509 authentication and a 
TUN interface 'ipsec0' is injected, NO firewall rules are present for routing 
through 'ipsec0' and encrypted traffic that is decrypted by the peer
IPsec GW never reaches the site beyond that GW.

Following log is visible in one of the GW's:

Jul  9 11:46:25 ZNYX9210 charon: 08[IKE] restarting CHILD_SA test
Jul  9 11:46:25 ZNYX9210 charon: 08[IKE] initiating IKE_SA test[2] to 12.0.0.167
Jul  9 11:46:25 ZNYX9210 charon: 08[ENC] generating IKE_SA_INIT request 0 [ SA 
KE No N(NATD_S_IP) N(NATD_D_IP) ]
Jul  9 11:46:25 ZNYX9210 charon: 08[NET] sending packet: from 12.0.0.189[500] 
to 12.0.0.167[500] (708 bytes)
Jul  9 11:46:25 ZNYX9210 charon: 14[NET] received packet: from 12.0.0.167[500] 
to 12.0.0.189[500] (457 bytes)
Jul  9 11:46:25 ZNYX9210 charon: 14[ENC] parsed IKE_SA_INIT response 0 [ SA KE 
No N(NATD_S_IP) N(NATD_D_IP) CERTREQ ]
Jul  9 11:46:25 ZNYX9210 charon: 14[IKE] remote host is behind NAT
Jul  9 11:46:25 ZNYX9210 charon: 14[IKE] received cert request for "C=CA, ST=PB, 
O=strongswan org, OU=strongswan root, [email protected]"
Jul  9 11:46:25 ZNYX9210 charon: 14[IKE] sending cert request for "C=CA, ST=PB, 
O=strongswan org, OU=strongswan root, [email protected]"
Jul  9 11:46:25 ZNYX9210 charon: 14[IKE] authentication of 'C=CA, ST=PB, 
O=strongswan org, OU=strongswan peer2, [email protected]' (myself) with RSA 
signature successful
Jul  9 11:46:25 ZNYX9210 charon: 14[IKE] sending end entity cert "C=CA, ST=PB, 
O=strongswan org, OU=strongswan peer2, [email protected]"
Jul  9 11:46:25 ZNYX9210 charon: 14[IKE] establishing CHILD_SA test{1}
Jul  9 11:46:25 ZNYX9210 charon: 14[ENC] generating IKE_AUTH request 1 [ IDi 
CERT N(INIT_CONTACT) CERTREQ IDr AUTH SA TSi TSr N(EAP_ONLY) ]
Jul  9 11:46:25 ZNYX9210 charon: 14[NET] sending packet: from 12.0.0.189[4500] 
to 12.0.0.167[4500] (1564 bytes)
Jul  9 11:46:25 ZNYX9210 charon: 09[NET] received packet: from 12.0.0.167[4500] 
to 12.0.0.189[4500] (1276 bytes)
Jul  9 11:46:25 ZNYX9210 charon: 09[ENC] parsed IKE_AUTH response 1 [ IDr CERT 
AUTH SA TSi TSr N(AUTH_LFT) ]
Jul  9 11:46:25 ZNYX9210 charon: 09[IKE] received end entity cert "C=CA, ST=PB, 
O=strongswan org, OU=strongswan peer1, [email protected]"
Jul  9 11:46:25 ZNYX9210 charon: 09[CFG]   using trusted ca certificate "C=CA, 
ST=PB, O=strongswan org, OU=strongswan root, [email protected]"
Jul  9 11:46:25 ZNYX9210 charon: 09[CFG] checking certificate status of "C=CA, 
ST=PB, O=strongswan org, OU=strongswan peer1, [email protected]"
Jul  9 11:46:25 ZNYX9210 charon: 09[CFG] certificate status is not available
Jul  9 11:46:25 ZNYX9210 charon: 09[CFG]   reached self-signed root ca with a 
path length of 0
Jul  9 11:46:25 ZNYX9210 charon: 09[CFG]   using trusted certificate "C=CA, ST=PB, 
O=strongswan org, OU=strongswan peer1, [email protected]"
Jul  9 11:46:25 ZNYX9210 charon: 09[IKE] authentication of 'C=CA, ST=PB, 
O=strongswan org, OU=strongswan peer1, [email protected]' with RSA signature 
successful
Jul  9 11:46:25 ZNYX9210 charon: 09[IKE] IKE_SA test[2] established between 
12.0.0.189[C=CA, ST=PB, O=strongswan org, OU=strongswan peer2, 
[email protected]]...12.0.0.167[C=CA, ST=PB, O=strongswan org, OU=strongswan 
peer1, [email protected]]
Jul  9 11:46:25 ZNYX9210 charon: 09[IKE] scheduling reauthentication in 3420s
Jul  9 11:46:25 ZNYX9210 charon: 09[IKE] maximum IKE_SA lifetime 3600s
Jul  9 11:46:25 ZNYX9210 charon: 09[IKE] CHILD_SA test{1} established with SPIs 
213dcf52_i c9b38fce_o and TS 11.0.0.0/24 === 10.0.0.0/24
*Jul  9 11:46:25 ZNYX9210 charon: 09[CHD] updown: sh: /etc/updown: No such file 
or directory*
Jul  9 11:46:25 ZNYX9210 charon: 09[IKE] received AUTH_LIFETIME of 3311s, 
scheduling reauthentication in 3131s


Can you please let us know why this /etc/updown file is missing and where 
should we get it from?

Thanks,
Shahreen
--

Shahreen Noor Ahmed
Network Support Department
Adax Europe Ltd
url: www.adax.com
e-mail: [email protected]
Direct line: +44(0)118 952 2804


_______________________________________________
Users mailing list
[email protected]
https://lists.strongswan.org/mailman/listinfo/users
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2
Comment: Using GnuPG with Thunderbird - http://www.enigmail.net/
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=vZUM
-----END PGP SIGNATURE-----

_______________________________________________
Users mailing list
[email protected]
https://lists.strongswan.org/mailman/listinfo/users

_______________________________________________
Users mailing list
[email protected]
https://lists.strongswan.org/mailman/listinfo/users

Reply via email to