Hello Noel,

I do not know what you exactly mean, but the source IP send over VTI interface is the same as configured on VTI interface (95.115.254.161 in this case). As I wrote, I can see that ICMP echo request & reply are delivered to this IPSEC endpoint machine (but I only suppose, because packets are encrypted when sniffing using tcpdump, but there is no other ICMP traffic). It seems that encrypted echo-reply is delivered to the machine, but "kernel/ipsec stack" is not able to properly "route" to the VTI device.

Actually my IPSEC/*swan knowledge is not very good so sorry if my answer are dumb.

I am attaching logs/configs as you requested.

Thank you,

BR,
Miroslav

On 2017-11-22 17:41, Noel Kuntze wrote:
Hello Miroslav,

I suspect that the policy lookup for the received packets fail. Check
what the source of the packets is that you send over the vti device.
Anyway, please provide the full list of information from the
HelpRequests[1] page.

[1] https://wiki.strongswan.org/projects/strongswan/wiki/HelpRequests

Kind regards

Noel

On 22.11.2017 16:47, Miroslav Hostinsky wrote:
Hello,

I have an issue configuring StrongSwan with VTI interface as roadwarrior. This is my configuration:

ipsec.conf:

config setup

conn %default
  keyexchange=ikev2
  ikelifetime=60m
  keylife=20m
  rekeymargin=3m
  rekey=no
  dpdaction=restart
  dpddelay=30s
  compress=yes
  auto=start

conn acnnet
  leftupdown=/usr/local/sbin/ipsec-notify.sh
  left=%defaultroute
  leftauth=eap
  leftsourceip=%config4,%config6
  rightauth=pubkey
  rightsubnet=0.0.0.0/0,::/0
  eap_identity=%identity
  leftid=bman
  right=mailer.domena.sk
  [email protected]
  mark=28

VTI interface is configured using lefupdown script (real commands executed):

ip tunnel add vti1 local 85.105.254.225 remote 185.210.28.63 mode vti key 28 ikey 28
ip link set vti1 up
ip addr add 192.168.228.10 dev vti1
ip route add 74.99.179.0/24 dev vti1
sysctl -w net.ipv4.conf.vti1.disable_policy=1

It seems that outgoing connection via vti1 interface is working (outgoing ICMP echo request to subnet 74.99.179.0/24 ). But I am unable to receive ICMP echo reply. Using tcpdump I can clearly see, that IPSEC encrypted ICMP echo reply is returning via physical interface, but not via vti1.


I found, that, TX bytes is correctly counted via vti1, but RX shows errors (it seems that each ICMP echo reply packet is counted as +1 error):

# ip -s tunnel show
vti1: ip/ip  remote 185.210.28.63  local 85.105.254.225 ttl inherit  key 28
RX: Packets    Bytes        Errors CsumErrs OutOfSeq Mcasts
    0          0            805    0        0 0
TX: Packets    Bytes        Errors DeadLoop NoRoute NoBufs
    401        68170        0      0        0 0
ip_vti0: ip/ip  remote any  local any  ttl inherit nopmtudisc key 0
RX: Packets    Bytes        Errors CsumErrs OutOfSeq Mcasts
    0          0            0      0        0 0
TX: Packets    Bytes        Errors DeadLoop NoRoute NoBufs
    0          0            0      0        0 0

It seems that, RX Errors on vti1 are currently missing ICMP echo reply packets. But is counted as RX errors, not RX received packets.

Do you have any idea what's wrong?

I am using Centos 7.4 with strongswan-5.5.3-1.el7.x86_64 from EPEL. A tried with same result on Archlinux (kernel 4.9 and strongswan 5.6.0).

Route installation is disabled in charon.conf.

Normal connection using Virtual IP is working great.


Thank you very much for any help.


BR,

Miroslav

--
Miroslav Hostinsky
Wed, 2017-11-22 18:24 00[DMN] Starting IKE charon daemon (strongSwan 5.5.3, 
Linux 3.10.0-693.5.2.el7.x86_64, x86_64)
Wed, 2017-11-22 18:24 00[LIB] plugin 'aes': loaded successfully
Wed, 2017-11-22 18:24 00[LIB] plugin 'des': loaded successfully
Wed, 2017-11-22 18:24 00[LIB] plugin 'rc2': loaded successfully
Wed, 2017-11-22 18:24 00[LIB] plugin 'sha2': loaded successfully
Wed, 2017-11-22 18:24 00[LIB] plugin 'sha1': loaded successfully
Wed, 2017-11-22 18:24 00[LIB] plugin 'md4': loaded successfully
Wed, 2017-11-22 18:24 00[LIB] plugin 'md5': loaded successfully
Wed, 2017-11-22 18:24 00[LIB] plugin 'random': loaded successfully
Wed, 2017-11-22 18:24 00[LIB] plugin 'nonce': loaded successfully
Wed, 2017-11-22 18:24 00[LIB] plugin 'x509': loaded successfully
Wed, 2017-11-22 18:24 00[LIB] plugin 'revocation': loaded successfully
Wed, 2017-11-22 18:24 00[LIB] plugin 'constraints': loaded successfully
Wed, 2017-11-22 18:24 00[LIB] plugin 'acert': loaded successfully
Wed, 2017-11-22 18:24 00[LIB] plugin 'pubkey': loaded successfully
Wed, 2017-11-22 18:24 00[LIB] plugin 'pkcs1': loaded successfully
Wed, 2017-11-22 18:24 00[LIB] plugin 'pkcs8': loaded successfully
Wed, 2017-11-22 18:24 00[LIB] plugin 'pkcs12': loaded successfully
Wed, 2017-11-22 18:24 00[LIB] plugin 'pgp': loaded successfully
Wed, 2017-11-22 18:24 00[LIB] plugin 'dnskey': loaded successfully
Wed, 2017-11-22 18:24 00[LIB] plugin 'sshkey': loaded successfully
Wed, 2017-11-22 18:24 00[LIB] plugin 'pem': loaded successfully
Wed, 2017-11-22 18:24 00[LIB] openssl FIPS mode(2) - enabled 
Wed, 2017-11-22 18:24 00[LIB] plugin 'openssl': loaded successfully
Wed, 2017-11-22 18:24 00[LIB] plugin 'gcrypt': loaded successfully
Wed, 2017-11-22 18:24 00[LIB] plugin 'fips-prf': loaded successfully
Wed, 2017-11-22 18:24 00[LIB] plugin 'gmp': loaded successfully
Wed, 2017-11-22 18:24 00[LIB] plugin 'curve25519': loaded successfully
Wed, 2017-11-22 18:24 00[LIB] plugin 'xcbc': loaded successfully
Wed, 2017-11-22 18:24 00[LIB] plugin 'cmac': loaded successfully
Wed, 2017-11-22 18:24 00[LIB] plugin 'hmac': loaded successfully
Wed, 2017-11-22 18:24 00[LIB] plugin 'ctr': loaded successfully
Wed, 2017-11-22 18:24 00[LIB] plugin 'ccm': loaded successfully
Wed, 2017-11-22 18:24 00[LIB] plugin 'gcm': loaded successfully
Wed, 2017-11-22 18:24 00[LIB] plugin 'curl': loaded successfully
Wed, 2017-11-22 18:24 00[LIB] plugin 'attr': loaded successfully
Wed, 2017-11-22 18:24 00[LIB] plugin 'kernel-netlink': loaded successfully
Wed, 2017-11-22 18:24 00[LIB] plugin 'resolve': loaded successfully
Wed, 2017-11-22 18:24 00[LIB] plugin 'socket-default': loaded successfully
Wed, 2017-11-22 18:24 00[LIB] plugin 'farp': loaded successfully
Wed, 2017-11-22 18:24 00[LIB] plugin 'stroke': loaded successfully
Wed, 2017-11-22 18:24 00[LIB] plugin 'vici': loaded successfully
Wed, 2017-11-22 18:24 00[LIB] plugin 'updown': loaded successfully
Wed, 2017-11-22 18:24 00[LIB] plugin 'eap-identity': loaded successfully
Wed, 2017-11-22 18:24 00[LIB] plugin 'eap-md5': loaded successfully
Wed, 2017-11-22 18:24 00[LIB] plugin 'eap-gtc': loaded successfully
Wed, 2017-11-22 18:24 00[LIB] plugin 'eap-mschapv2': loaded successfully
Wed, 2017-11-22 18:24 00[LIB] plugin 'eap-tls': loaded successfully
Wed, 2017-11-22 18:24 00[LIB] plugin 'eap-ttls': loaded successfully
Wed, 2017-11-22 18:24 00[LIB] plugin 'eap-peap': loaded successfully
Wed, 2017-11-22 18:24 00[LIB] plugin 'xauth-generic': loaded successfully
Wed, 2017-11-22 18:24 00[LIB] plugin 'xauth-eap': loaded successfully
Wed, 2017-11-22 18:24 00[LIB] plugin 'xauth-pam': loaded successfully
Wed, 2017-11-22 18:24 00[LIB] plugin 'xauth-noauth': loaded successfully
Wed, 2017-11-22 18:24 00[LIB] plugin 'dhcp': loaded successfully
Wed, 2017-11-22 18:24 00[LIB] plugin 'unity': loaded successfully
Wed, 2017-11-22 18:24 00[LIB] feature PUBKEY:BLISS in plugin 'pem' has unmet 
dependency: PUBKEY:BLISS
Wed, 2017-11-22 18:24 00[LIB] feature PUBKEY:DSA in plugin 'pem' has unmet 
dependency: PUBKEY:DSA
Wed, 2017-11-22 18:24 00[LIB] feature PRIVKEY:DSA in plugin 'pem' has unmet 
dependency: PRIVKEY:DSA
Wed, 2017-11-22 18:24 00[LIB] feature PRIVKEY:BLISS in plugin 'pem' has unmet 
dependency: PRIVKEY:BLISS
Wed, 2017-11-22 18:24 00[LIB] feature CERT_DECODE:OCSP_REQUEST in plugin 'pem' 
has unmet dependency: CERT_DECODE:OCSP_REQUEST
Wed, 2017-11-22 18:24 00[LIB] feature PRIVKEY_SIGN:RSA_EMSA_PKCS1_SHA3_224 in 
plugin 'gmp' has unmet dependency: HASHER:HASH_SHA3_224
Wed, 2017-11-22 18:24 00[LIB] feature PRIVKEY_SIGN:RSA_EMSA_PKCS1_SHA3_256 in 
plugin 'gmp' has unmet dependency: HASHER:HASH_SHA3_256
Wed, 2017-11-22 18:24 00[LIB] feature PRIVKEY_SIGN:RSA_EMSA_PKCS1_SHA3_384 in 
plugin 'gmp' has unmet dependency: HASHER:HASH_SHA3_384
Wed, 2017-11-22 18:24 00[LIB] feature PRIVKEY_SIGN:RSA_EMSA_PKCS1_SHA3_512 in 
plugin 'gmp' has unmet dependency: HASHER:HASH_SHA3_512
Wed, 2017-11-22 18:24 00[LIB] feature PUBKEY_VERIFY:RSA_EMSA_PKCS1_SHA3_224 in 
plugin 'gmp' has unmet dependency: HASHER:HASH_SHA3_224
Wed, 2017-11-22 18:24 00[LIB] feature PUBKEY_VERIFY:RSA_EMSA_PKCS1_SHA3_256 in 
plugin 'gmp' has unmet dependency: HASHER:HASH_SHA3_256
Wed, 2017-11-22 18:24 00[LIB] feature PUBKEY_VERIFY:RSA_EMSA_PKCS1_SHA3_384 in 
plugin 'gmp' has unmet dependency: HASHER:HASH_SHA3_384
Wed, 2017-11-22 18:24 00[LIB] feature PUBKEY_VERIFY:RSA_EMSA_PKCS1_SHA3_512 in 
plugin 'gmp' has unmet dependency: HASHER:HASH_SHA3_512
Wed, 2017-11-22 18:24 00[CFG] loading ca certificates from 
'/etc/strongswan/ipsec.d/cacerts'
Wed, 2017-11-22 18:24 00[CFG]   loaded ca certificate "C=US, O=Let's Encrypt, 
CN=Let's Encrypt Authority X3" from 
'/etc/strongswan/ipsec.d/cacerts/lets-encrypt-x3-cross-signed.pem'
Wed, 2017-11-22 18:24 00[CFG]   loaded ca certificate "O=Digital Signature 
Trust Co., CN=DST Root CA X3" from '/etc/strongswan/ipsec.d/cacerts/dst.pem'
Wed, 2017-11-22 18:24 00[CFG] loading aa certificates from 
'/etc/strongswan/ipsec.d/aacerts'
Wed, 2017-11-22 18:24 00[CFG] loading ocsp signer certificates from 
'/etc/strongswan/ipsec.d/ocspcerts'
Wed, 2017-11-22 18:24 00[CFG] loading attribute certificates from 
'/etc/strongswan/ipsec.d/acerts'
Wed, 2017-11-22 18:24 00[CFG] loading crls from '/etc/strongswan/ipsec.d/crls'
Wed, 2017-11-22 18:24 00[CFG] loading secrets from 
'/etc/strongswan/ipsec.secrets'
Wed, 2017-11-22 18:24 00[CFG]   loaded EAP secret for bmanovic
Wed, 2017-11-22 18:24 00[LIB] loaded plugins: charon aes des rc2 sha2 sha1 md4 
md5 random nonce x509 revocation constraints acert pubkey pkcs1 pkcs8 pkcs12 
pgp dnskey sshkey pem openssl gcrypt fips-prf gmp curve25519 xcbc cmac hmac ctr 
ccm gcm curl attr kernel-netlink resolve socket-default farp stroke vici updown 
eap-identity eap-md5 eap-gtc eap-mschapv2 eap-tls eap-ttls eap-peap 
xauth-generic xauth-eap xauth-pam xauth-noauth dhcp unity
Wed, 2017-11-22 18:24 00[LIB] unable to load 13 plugin features (13 due to 
unmet dependencies)
Wed, 2017-11-22 18:24 00[JOB] spawning 16 worker threads
Wed, 2017-11-22 18:24 01[LIB] created thread 01 [2818]
Wed, 2017-11-22 18:24 03[LIB] created thread 03 [2821]
Wed, 2017-11-22 18:24 02[LIB] created thread 02 [2819]
Wed, 2017-11-22 18:24 04[LIB] created thread 04 [2820]
Wed, 2017-11-22 18:24 05[LIB] created thread 05 [2822]
Wed, 2017-11-22 18:24 06[LIB] created thread 06 [2824]
Wed, 2017-11-22 18:24 08[LIB] created thread 08 [2825]
Wed, 2017-11-22 18:24 07[LIB] created thread 07 [2823]
Wed, 2017-11-22 18:24 09[LIB] created thread 09 [2827]
Wed, 2017-11-22 18:24 10[LIB] created thread 10 [2826]
Wed, 2017-11-22 18:24 11[LIB] created thread 11 [2828]
Wed, 2017-11-22 18:24 13[LIB] created thread 13 [2830]
Wed, 2017-11-22 18:24 12[LIB] created thread 12 [2829]
Wed, 2017-11-22 18:24 14[LIB] created thread 14 [2831]
Wed, 2017-11-22 18:24 15[LIB] created thread 15 [2833]
Wed, 2017-11-22 18:24 16[LIB] created thread 16 [2832]
Wed, 2017-11-22 18:24 04[CFG] received stroke: add connection 'alconet'
Wed, 2017-11-22 18:24 04[CFG] conn alconet
Wed, 2017-11-22 18:24 04[CFG]   left=%any
Wed, 2017-11-22 18:24 04[CFG]   leftsourceip=%config4,%config6
Wed, 2017-11-22 18:24 04[CFG]   leftauth=eap
Wed, 2017-11-22 18:24 04[CFG]   leftid=bmanovic
Wed, 2017-11-22 18:24 04[CFG]   leftupdown=/usr/local/sbin/ipsec-notify.sh
Wed, 2017-11-22 18:24 04[CFG]   right=ipsec.domena.sk
Wed, 2017-11-22 18:24 04[CFG]   rightsubnet=0.0.0.0/0,::/0
Wed, 2017-11-22 18:24 04[CFG]   rightauth=pubkey
Wed, 2017-11-22 18:24 04[CFG]   [email protected]
Wed, 2017-11-22 18:24 04[CFG]   eap_identity=%identity
Wed, 2017-11-22 18:24 04[CFG]   ike=aes128-sha256-curve25519
Wed, 2017-11-22 18:24 04[CFG]   esp=aes128-sha256
Wed, 2017-11-22 18:24 04[CFG]   dpddelay=30
Wed, 2017-11-22 18:24 04[CFG]   dpdtimeout=150
Wed, 2017-11-22 18:24 04[CFG]   dpdaction=3
Wed, 2017-11-22 18:24 04[CFG]   sha256_96=no
Wed, 2017-11-22 18:24 04[CFG]   mediation=no
Wed, 2017-11-22 18:24 04[CFG]   keyexchange=ikev2
Wed, 2017-11-22 18:24 17[LIB] created thread 17 [2834]
Wed, 2017-11-22 18:24 04[CFG] added configuration 'alconet'
Wed, 2017-11-22 18:24 06[CFG] received stroke: initiate 'alconet'
Wed, 2017-11-22 18:24 06[IKE] <alconet|1> queueing IKE_VENDOR task
Wed, 2017-11-22 18:24 06[IKE] <alconet|1> queueing IKE_INIT task
Wed, 2017-11-22 18:24 06[IKE] <alconet|1> queueing IKE_NATD task
Wed, 2017-11-22 18:24 06[IKE] <alconet|1> queueing IKE_CERT_PRE task
Wed, 2017-11-22 18:24 06[IKE] <alconet|1> queueing IKE_AUTH task
Wed, 2017-11-22 18:24 06[IKE] <alconet|1> queueing IKE_CERT_POST task
Wed, 2017-11-22 18:24 06[IKE] <alconet|1> queueing IKE_CONFIG task
Wed, 2017-11-22 18:24 06[IKE] <alconet|1> queueing IKE_AUTH_LIFETIME task
Wed, 2017-11-22 18:24 06[IKE] <alconet|1> queueing IKE_MOBIKE task
Wed, 2017-11-22 18:24 06[IKE] <alconet|1> queueing CHILD_CREATE task
Wed, 2017-11-22 18:24 06[IKE] <alconet|1> activating new tasks
Wed, 2017-11-22 18:24 06[IKE] <alconet|1>   activating IKE_VENDOR task
Wed, 2017-11-22 18:24 06[IKE] <alconet|1>   activating IKE_INIT task
Wed, 2017-11-22 18:24 06[IKE] <alconet|1>   activating IKE_NATD task
Wed, 2017-11-22 18:24 06[IKE] <alconet|1>   activating IKE_CERT_PRE task
Wed, 2017-11-22 18:24 06[IKE] <alconet|1>   activating IKE_AUTH task
Wed, 2017-11-22 18:24 06[IKE] <alconet|1>   activating IKE_CERT_POST task
Wed, 2017-11-22 18:24 06[IKE] <alconet|1>   activating IKE_CONFIG task
Wed, 2017-11-22 18:24 06[IKE] <alconet|1>   activating CHILD_CREATE task
Wed, 2017-11-22 18:24 06[IKE] <alconet|1>   activating IKE_AUTH_LIFETIME task
Wed, 2017-11-22 18:24 06[IKE] <alconet|1>   activating IKE_MOBIKE task
Wed, 2017-11-22 18:24 06[IKE] <alconet|1> initiating IKE_SA alconet[1] to 
95.115.254.165
Wed, 2017-11-22 18:24 06[IKE] <alconet|1> IKE_SA alconet[1] state change: 
CREATED => CONNECTING
Wed, 2017-11-22 18:24 06[CFG] <alconet|1> configured proposals: 
IKE:AES_CBC_128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/CURVE_25519, 
IKE:AES_CBC_128/AES_CBC_192/AES_CBC_256/CAMELLIA_CBC_128/CAMELLIA_CBC_192/CAMELLIA_CBC_256/AES_CTR_128/AES_CTR_192/AES_CTR_256/CAMELLIA_CTR_128/CAMELLIA_CTR_192/CAMELLIA_CTR_256/3DES_CBC/HMAC_SHA2_256_128/HMAC_SHA2_384_192/HMAC_SHA2_512_256/HMAC_MD5_96/HMAC_SHA1_96/AES_XCBC_96/AES_CMAC_96/PRF_HMAC_SHA2_256/PRF_HMAC_SHA2_384/PRF_HMAC_SHA2_512/PRF_AES128_XCBC/PRF_AES128_CMAC/PRF_HMAC_MD5/PRF_HMAC_SHA1/ECP_256/ECP_384/ECP_521/ECP_256_BP/ECP_384_BP/ECP_512_BP/CURVE_25519/MODP_3072/MODP_4096/MODP_8192/MODP_2048/MODP_1024,
 
IKE:AES_GCM_16_128/AES_GCM_16_192/AES_GCM_16_256/AES_CCM_16_128/AES_CCM_16_192/AES_CCM_16_256/CAMELLIA_CCM_16_128/CAMELLIA_CCM_16_192/CAMELLIA_CCM_16_256/AES_GCM_12_128/AES_GCM_12_192/AES_GCM_12_256/AES_GCM_8_128/AES_GCM_8_192/AES_GCM_8_256/AES_CCM_8_128/AES_CCM_8_192/AES_CCM_8_256/AES_CCM_12_128/AES_CCM_12_192/AES_CCM_12_256/CAMELLIA_CCM_8_128/CAMELLIA_CCM_8_192/CAMELLIA_CCM_8_256/CAMELLIA_CCM_12_128/CAMELLIA_CCM_12_192/CAMELLIA_CCM_12_256/PRF_HMAC_SHA2_256/PRF_HMAC_SHA2_384/PRF_HMAC_SHA2_512/PRF_AES128_XCBC/PRF_AES128_CMAC/PRF_HMAC_MD5/PRF_HMAC_SHA1/ECP_256/ECP_384/ECP_521/ECP_256_BP/ECP_384_BP/ECP_512_BP/CURVE_25519/MODP_3072/MODP_4096/MODP_8192/MODP_2048/MODP_1024
Wed, 2017-11-22 18:24 06[CFG] <alconet|1> sending supported signature hash 
algorithms: sha1 sha256 sha384 sha512 identity
Wed, 2017-11-22 18:24 06[ENC] <alconet|1> generating IKE_SA_INIT request 0 [ SA 
KE No N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) N(HASH_ALG) N(REDIR_SUP) ]
Wed, 2017-11-22 18:24 06[NET] <alconet|1> sending packet: from 
10.198.54.208[500] to 95.115.254.165[500] (1094 bytes)
Wed, 2017-11-22 18:24 07[NET] <alconet|1> received packet: from 
95.115.254.165[500] to 10.198.54.208[500] (267 bytes)
Wed, 2017-11-22 18:24 07[ENC] <alconet|1> parsed IKE_SA_INIT response 0 [ SA KE 
No N(NATD_S_IP) N(NATD_D_IP) CERTREQ N(FRAG_SUP) N(HASH_ALG) N(MULT_AUTH) ]
Wed, 2017-11-22 18:24 07[IKE] <alconet|1> received FRAGMENTATION_SUPPORTED 
notify
Wed, 2017-11-22 18:24 07[IKE] <alconet|1> received SIGNATURE_HASH_ALGORITHMS 
notify
Wed, 2017-11-22 18:24 07[CFG] <alconet|1> selecting proposal:
Wed, 2017-11-22 18:24 07[CFG] <alconet|1>   proposal matches
Wed, 2017-11-22 18:24 07[CFG] <alconet|1> received proposals: 
IKE:AES_CBC_128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/CURVE_25519
Wed, 2017-11-22 18:24 07[CFG] <alconet|1> configured proposals: 
IKE:AES_CBC_128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/CURVE_25519, 
IKE:AES_CBC_128/AES_CBC_192/AES_CBC_256/CAMELLIA_CBC_128/CAMELLIA_CBC_192/CAMELLIA_CBC_256/AES_CTR_128/AES_CTR_192/AES_CTR_256/CAMELLIA_CTR_128/CAMELLIA_CTR_192/CAMELLIA_CTR_256/3DES_CBC/HMAC_SHA2_256_128/HMAC_SHA2_384_192/HMAC_SHA2_512_256/HMAC_MD5_96/HMAC_SHA1_96/AES_XCBC_96/AES_CMAC_96/PRF_HMAC_SHA2_256/PRF_HMAC_SHA2_384/PRF_HMAC_SHA2_512/PRF_AES128_XCBC/PRF_AES128_CMAC/PRF_HMAC_MD5/PRF_HMAC_SHA1/ECP_256/ECP_384/ECP_521/ECP_256_BP/ECP_384_BP/ECP_512_BP/CURVE_25519/MODP_3072/MODP_4096/MODP_8192/MODP_2048/MODP_1024,
 
IKE:AES_GCM_16_128/AES_GCM_16_192/AES_GCM_16_256/AES_CCM_16_128/AES_CCM_16_192/AES_CCM_16_256/CAMELLIA_CCM_16_128/CAMELLIA_CCM_16_192/CAMELLIA_CCM_16_256/AES_GCM_12_128/AES_GCM_12_192/AES_GCM_12_256/AES_GCM_8_128/AES_GCM_8_192/AES_GCM_8_256/AES_CCM_8_128/AES_CCM_8_192/AES_CCM_8_256/AES_CCM_12_128/AES_CCM_12_192/AES_CCM_12_256/CAMELLIA_CCM_8_128/CAMELLIA_CCM_8_192/CAMELLIA_CCM_8_256/CAMELLIA_CCM_12_128/CAMELLIA_CCM_12_192/CAMELLIA_CCM_12_256/PRF_HMAC_SHA2_256/PRF_HMAC_SHA2_384/PRF_HMAC_SHA2_512/PRF_AES128_XCBC/PRF_AES128_CMAC/PRF_HMAC_MD5/PRF_HMAC_SHA1/ECP_256/ECP_384/ECP_521/ECP_256_BP/ECP_384_BP/ECP_512_BP/CURVE_25519/MODP_3072/MODP_4096/MODP_8192/MODP_2048/MODP_1024
Wed, 2017-11-22 18:24 07[CFG] <alconet|1> selected proposal: 
IKE:AES_CBC_128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/CURVE_25519
Wed, 2017-11-22 18:24 07[CFG] <alconet|1> received supported signature hash 
algorithms: sha1 sha256 sha384 sha512 identity
Wed, 2017-11-22 18:24 07[IKE] <alconet|1> local host is behind NAT, sending 
keep alives
Wed, 2017-11-22 18:24 07[IKE] <alconet|1> received cert request for "C=US, 
O=Let's Encrypt, CN=Let's Encrypt Authority X3"
Wed, 2017-11-22 18:24 07[IKE] <alconet|1> reinitiating already active tasks
Wed, 2017-11-22 18:24 07[IKE] <alconet|1>   IKE_CERT_PRE task
Wed, 2017-11-22 18:24 07[IKE] <alconet|1>   IKE_AUTH task
Wed, 2017-11-22 18:24 07[IKE] <alconet|1> sending cert request for "C=US, 
O=Let's Encrypt, CN=Let's Encrypt Authority X3"
Wed, 2017-11-22 18:24 07[IKE] <alconet|1> sending cert request for "O=Digital 
Signature Trust Co., CN=DST Root CA X3"
Wed, 2017-11-22 18:24 07[IKE] <alconet|1> building INTERNAL_IP4_DNS attribute
Wed, 2017-11-22 18:24 07[IKE] <alconet|1> building INTERNAL_IP6_DNS attribute
Wed, 2017-11-22 18:24 07[IKE] <alconet|1> establishing CHILD_SA alconet
Wed, 2017-11-22 18:24 07[CFG] <alconet|1> proposing traffic selectors for us:
Wed, 2017-11-22 18:24 07[CFG] <alconet|1>  0.0.0.0/0
Wed, 2017-11-22 18:24 07[CFG] <alconet|1>  ::/0
Wed, 2017-11-22 18:24 07[CFG] <alconet|1> proposing traffic selectors for other:
Wed, 2017-11-22 18:24 07[CFG] <alconet|1>  0.0.0.0/0
Wed, 2017-11-22 18:24 07[CFG] <alconet|1>  ::/0
Wed, 2017-11-22 18:24 07[CFG] <alconet|1> configured proposals: 
ESP:AES_CBC_128/HMAC_SHA2_256_128/NO_EXT_SEQ, 
ESP:AES_CBC_128/AES_CBC_192/AES_CBC_256/3DES_CBC/BLOWFISH_CBC_256/HMAC_SHA2_256_128/HMAC_SHA2_384_192/HMAC_SHA2_512_256/HMAC_SHA1_96/AES_XCBC_96/HMAC_MD5_96/NO_EXT_SEQ
Wed, 2017-11-22 18:24 07[ENC] <alconet|1> generating IKE_AUTH request 1 [ IDi 
N(INIT_CONTACT) CERTREQ IDr CPRQ(ADDR ADDR6 DNS DNS6) N(IPCOMP_SUP) SA TSi TSr 
N(MOBIKE_SUP) N(ADD_4_ADDR) N(MULT_AUTH) N(EAP_ONLY) N(MSG_ID_SYN_SUP) ]
Wed, 2017-11-22 18:24 07[NET] <alconet|1> sending packet: from 
10.198.54.208[4500] to 95.115.254.165[4500] (544 bytes)
Wed, 2017-11-22 18:24 02[NET] <alconet|1> received packet: from 
95.115.254.165[4500] to 10.198.54.208[4500] (1236 bytes)
Wed, 2017-11-22 18:24 02[ENC] <alconet|1> parsed IKE_AUTH response 1 [ EF(1/2) ]
Wed, 2017-11-22 18:24 02[ENC] <alconet|1> received fragment #1 of 2, waiting 
for complete IKE message
Wed, 2017-11-22 18:24 09[NET] <alconet|1> received packet: from 
95.115.254.165[4500] to 10.198.54.208[4500] (516 bytes)
Wed, 2017-11-22 18:24 09[ENC] <alconet|1> parsed IKE_AUTH response 1 [ EF(2/2) ]
Wed, 2017-11-22 18:24 09[ENC] <alconet|1> received fragment #2 of 2, 
reassembling fragmented IKE message
Wed, 2017-11-22 18:24 09[ENC] <alconet|1> parsed IKE_AUTH response 1 [ IDr CERT 
AUTH EAP/REQ/ID ]
Wed, 2017-11-22 18:24 09[IKE] <alconet|1> received end entity cert 
"CN=ipsec.domena.sk"
Wed, 2017-11-22 18:24 09[CFG] <alconet|1>   using certificate 
"CN=ipsec.domena.sk"
Wed, 2017-11-22 18:24 09[CFG] <alconet|1>   certificate "CN=ipsec.domena.sk" 
key: 2048 bit RSA
Wed, 2017-11-22 18:24 09[CFG] <alconet|1>   using trusted intermediate ca 
certificate "C=US, O=Let's Encrypt, CN=Let's Encrypt Authority X3"
Wed, 2017-11-22 18:24 09[CFG] <alconet|1> checking certificate status of 
"CN=ipsec.domena.sk"
Wed, 2017-11-22 18:24 09[CFG] <alconet|1>   requesting ocsp status from 
'http://ocsp.int-x3.letsencrypt.org' ...
Wed, 2017-11-22 18:24 09[LIB] <alconet|1>   sending request to 
'http://ocsp.int-x3.letsencrypt.org'...
Wed, 2017-11-22 18:24 09[LIB] <alconet|1> libcurl request failed [7]: Failed to 
connect to 2a02:26f0:ea::1706:70f0: Network is unreachable
Wed, 2017-11-22 18:24 09[CFG] <alconet|1> ocsp request to 
http://ocsp.int-x3.letsencrypt.org failed
Wed, 2017-11-22 18:24 09[CFG] <alconet|1> ocsp check failed, fallback to crl
Wed, 2017-11-22 18:24 09[CFG] <alconet|1> certificate status is not available
Wed, 2017-11-22 18:24 09[CFG] <alconet|1>   certificate "C=US, O=Let's Encrypt, 
CN=Let's Encrypt Authority X3" key: 2048 bit RSA
Wed, 2017-11-22 18:24 09[CFG] <alconet|1>   using trusted ca certificate 
"O=Digital Signature Trust Co., CN=DST Root CA X3"
Wed, 2017-11-22 18:24 09[CFG] <alconet|1> checking certificate status of "C=US, 
O=Let's Encrypt, CN=Let's Encrypt Authority X3"
Wed, 2017-11-22 18:24 09[CFG] <alconet|1>   requesting ocsp status from 
'http://isrg.trustid.ocsp.identrust.com' ...
Wed, 2017-11-22 18:24 09[LIB] <alconet|1>   sending request to 
'http://isrg.trustid.ocsp.identrust.com'...
Wed, 2017-11-22 18:24 09[LIB] <alconet|1> libcurl request failed [7]: Failed 
connect to isrg.trustid.ocsp.identrust.com:80; Connection refused
Wed, 2017-11-22 18:24 09[CFG] <alconet|1> ocsp request to 
http://isrg.trustid.ocsp.identrust.com failed
Wed, 2017-11-22 18:24 09[CFG] <alconet|1> ocsp check failed, fallback to crl
Wed, 2017-11-22 18:24 09[CFG] <alconet|1>   fetching crl from 
'http://crl.identrust.com/DSTROOTCAX3CRL.crl' ...
Wed, 2017-11-22 18:24 09[LIB] <alconet|1>   sending request to 
'http://crl.identrust.com/DSTROOTCAX3CRL.crl'...
Wed, 2017-11-22 18:24 09[LIB] <alconet|1> libcurl request failed [7]: Failed 
connect to crl.identrust.com:80; Connection refused
Wed, 2017-11-22 18:24 09[CFG] <alconet|1> crl fetching failed
Wed, 2017-11-22 18:24 09[CFG] <alconet|1> certificate status is not available
Wed, 2017-11-22 18:24 09[CFG] <alconet|1> certificate policy 2.23.140.1.2.1 for 
'CN=ipsec.domena.sk' not allowed by trustchain, ignored
Wed, 2017-11-22 18:24 09[CFG] <alconet|1> certificate policy 
1.3.6.1.4.1.44947.1.1.1 for 'CN=ipsec.domena.sk' not allowed by trustchain, 
ignored
Wed, 2017-11-22 18:24 09[CFG] <alconet|1>   certificate "O=Digital Signature 
Trust Co., CN=DST Root CA X3" key: 2048 bit RSA
Wed, 2017-11-22 18:24 09[CFG] <alconet|1>   reached self-signed root ca with a 
path length of 1
Wed, 2017-11-22 18:24 09[IKE] <alconet|1> authentication of 'ipsec.domena.sk' 
with RSA_EMSA_PKCS1_SHA2_256 successful
Wed, 2017-11-22 18:24 09[IKE] <alconet|1> server requested EAP_IDENTITY (id 
0x00), sending 'bmanovic'
Wed, 2017-11-22 18:24 09[IKE] <alconet|1> reinitiating already active tasks
Wed, 2017-11-22 18:24 09[IKE] <alconet|1>   IKE_AUTH task
Wed, 2017-11-22 18:24 09[ENC] <alconet|1> generating IKE_AUTH request 2 [ 
EAP/RES/ID ]
Wed, 2017-11-22 18:24 09[NET] <alconet|1> sending packet: from 
10.198.54.208[4500] to 95.115.254.165[4500] (96 bytes)
Wed, 2017-11-22 18:24 10[NET] <alconet|1> received packet: from 
95.115.254.165[4500] to 10.198.54.208[4500] (112 bytes)
Wed, 2017-11-22 18:24 10[ENC] <alconet|1> parsed IKE_AUTH response 2 [ 
EAP/REQ/MSCHAPV2 ]
Wed, 2017-11-22 18:24 10[IKE] <alconet|1> server requested EAP_MSCHAPV2 
authentication (id 0xFA)
Wed, 2017-11-22 18:24 10[IKE] <alconet|1> reinitiating already active tasks
Wed, 2017-11-22 18:24 10[IKE] <alconet|1>   IKE_AUTH task
Wed, 2017-11-22 18:24 10[ENC] <alconet|1> generating IKE_AUTH request 3 [ 
EAP/RES/MSCHAPV2 ]
Wed, 2017-11-22 18:24 10[NET] <alconet|1> sending packet: from 
10.198.54.208[4500] to 95.115.254.165[4500] (144 bytes)
Wed, 2017-11-22 18:24 11[NET] <alconet|1> received packet: from 
95.115.254.165[4500] to 10.198.54.208[4500] (144 bytes)
Wed, 2017-11-22 18:24 11[ENC] <alconet|1> parsed IKE_AUTH response 3 [ 
EAP/REQ/MSCHAPV2 ]
Wed, 2017-11-22 18:24 11[IKE] <alconet|1> EAP-MS-CHAPv2 succeeded: 
'Welcome2strongSwan'
Wed, 2017-11-22 18:24 11[IKE] <alconet|1> reinitiating already active tasks
Wed, 2017-11-22 18:24 11[IKE] <alconet|1>   IKE_AUTH task
Wed, 2017-11-22 18:24 11[ENC] <alconet|1> generating IKE_AUTH request 4 [ 
EAP/RES/MSCHAPV2 ]
Wed, 2017-11-22 18:24 11[NET] <alconet|1> sending packet: from 
10.198.54.208[4500] to 95.115.254.165[4500] (80 bytes)
Wed, 2017-11-22 18:24 13[NET] <alconet|1> received packet: from 
95.115.254.165[4500] to 10.198.54.208[4500] (80 bytes)
Wed, 2017-11-22 18:24 13[ENC] <alconet|1> parsed IKE_AUTH response 4 [ EAP/SUCC 
]
Wed, 2017-11-22 18:24 13[IKE] <alconet|1> EAP method EAP_MSCHAPV2 succeeded, 
MSK established
Wed, 2017-11-22 18:24 13[IKE] <alconet|1> reinitiating already active tasks
Wed, 2017-11-22 18:24 13[IKE] <alconet|1>   IKE_AUTH task
Wed, 2017-11-22 18:24 13[IKE] <alconet|1> authentication of 'bmanovic' (myself) 
with EAP
Wed, 2017-11-22 18:24 13[ENC] <alconet|1> generating IKE_AUTH request 5 [ AUTH ]
Wed, 2017-11-22 18:24 13[NET] <alconet|1> sending packet: from 
10.198.54.208[4500] to 95.115.254.165[4500] (112 bytes)
Wed, 2017-11-22 18:24 12[NET] <alconet|1> received packet: from 
95.115.254.165[4500] to 10.198.54.208[4500] (256 bytes)
Wed, 2017-11-22 18:24 12[ENC] <alconet|1> parsed IKE_AUTH response 5 [ AUTH 
CPRP(ADDR DNS) N(IPCOMP_SUP) SA TSi TSr N(MOBIKE_SUP) N(NO_ADD_ADDR) ]
Wed, 2017-11-22 18:24 12[IKE] <alconet|1> received IPCOMP_SUPPORTED notify
Wed, 2017-11-22 18:24 12[IKE] <alconet|1> received NO_ADDITIONAL_ADDRESSES 
notify
Wed, 2017-11-22 18:24 12[IKE] <alconet|1> authentication of 'ipsec.domena.sk' 
with EAP successful
Wed, 2017-11-22 18:24 12[IKE] <alconet|1> IKE_SA alconet[1] established between 
10.198.54.208[bmanovic]...95.115.254.165[ipsec.domena.sk]
Wed, 2017-11-22 18:24 12[IKE] <alconet|1> IKE_SA alconet[1] state change: 
CONNECTING => ESTABLISHED
Wed, 2017-11-22 18:24 12[IKE] <alconet|1> processing INTERNAL_IP4_ADDRESS 
attribute
Wed, 2017-11-22 18:24 12[IKE] <alconet|1> processing INTERNAL_IP4_DNS attribute
Wed, 2017-11-22 18:24 12[IKE] <alconet|1> installing DNS server 8.8.8.8 to 
/etc/strongswan/resolv.conf
Wed, 2017-11-22 18:24 12[IKE] <alconet|1> installing new virtual IP 
95.115.254.161
Wed, 2017-11-22 18:24 12[CFG] <alconet|1> selecting proposal:
Wed, 2017-11-22 18:24 12[CFG] <alconet|1>   proposal matches
Wed, 2017-11-22 18:24 12[CFG] <alconet|1> received proposals: 
ESP:AES_CBC_128/HMAC_SHA2_256_128/NO_EXT_SEQ
Wed, 2017-11-22 18:24 12[CFG] <alconet|1> configured proposals: 
ESP:AES_CBC_128/HMAC_SHA2_256_128/NO_EXT_SEQ, 
ESP:AES_CBC_128/AES_CBC_192/AES_CBC_256/3DES_CBC/BLOWFISH_CBC_256/HMAC_SHA2_256_128/HMAC_SHA2_384_192/HMAC_SHA2_512_256/HMAC_SHA1_96/AES_XCBC_96/HMAC_MD5_96/NO_EXT_SEQ
Wed, 2017-11-22 18:24 12[CFG] <alconet|1> selected proposal: 
ESP:AES_CBC_128/HMAC_SHA2_256_128/NO_EXT_SEQ
Wed, 2017-11-22 18:24 12[CFG] <alconet|1> selecting traffic selectors for us:
Wed, 2017-11-22 18:24 12[CFG] <alconet|1>  config: 95.115.254.161/32, received: 
95.115.254.161/32 => match: 95.115.254.161/32
Wed, 2017-11-22 18:24 12[CFG] <alconet|1> selecting traffic selectors for other:
Wed, 2017-11-22 18:24 12[CFG] <alconet|1>  config: 0.0.0.0/0, received: 
0.0.0.0/0 => match: 0.0.0.0/0
Wed, 2017-11-22 18:24 12[CFG] <alconet|1>  config: ::/0, received: 0.0.0.0/0 => 
no match
Wed, 2017-11-22 18:24 12[CHD] <alconet|1> CHILD_SA alconet{1} state change: 
CREATED => INSTALLING
Wed, 2017-11-22 18:24 12[CHD] <alconet|1>   using AES_CBC for encryption
Wed, 2017-11-22 18:24 12[CHD] <alconet|1>   using HMAC_SHA2_256_128 for 
integrity
Wed, 2017-11-22 18:24 12[CHD] <alconet|1> adding inbound ESP SA
Wed, 2017-11-22 18:24 12[CHD] <alconet|1>   SPI 0xc5b4c087, src 95.115.254.165 
dst 10.198.54.208
Wed, 2017-11-22 18:24 12[CHD] <alconet|1> adding outbound ESP SA
Wed, 2017-11-22 18:24 12[CHD] <alconet|1>   SPI 0xc57212ba, src 10.198.54.208 
dst 95.115.254.165
Wed, 2017-11-22 18:24 12[CHD] <alconet|1> CHILD_SA alconet{1} state change: 
INSTALLING => INSTALLED
Wed, 2017-11-22 18:24 12[IKE] <alconet|1> CHILD_SA alconet{1} established with 
SPIs c5b4c087_i c57212ba_o and TS 95.115.254.161/32 === 0.0.0.0/0
Wed, 2017-11-22 18:24 12[CHD] <alconet|1> updown: + set -o nounset
Wed, 2017-11-22 18:24 12[CHD] <alconet|1> updown: + set -o errexit
Wed, 2017-11-22 18:24 12[CHD] <alconet|1> updown: + exec
Wed, 2017-11-22 18:24 12[CHD] <alconet|1> updown: + trap 'exec 2>&4 1>&3' 0 1 2 
3
Wed, 2017-11-22 18:24 12[CHD] <alconet|1> updown: + exec
Wed, 2017-11-22 18:24 05[KNL] interface vti1 activated
Wed, 2017-11-22 18:24 04[KNL] 95.115.254.161 appeared on vti1
Wed, 2017-11-22 18:24 12[IKE] <alconet|1> peer supports MOBIKE
Wed, 2017-11-22 18:24 12[IKE] <alconet|1> activating new tasks
Wed, 2017-11-22 18:24 12[IKE] <alconet|1> nothing to initiate
Wed, 2017-11-22 18:24 07[IKE] <alconet|1> keeping connection path 10.198.54.208 
- 95.115.254.165
Wed, 2017-11-22 18:24 07[IKE] <alconet|1> sending address list update using 
MOBIKE
Wed, 2017-11-22 18:24 07[IKE] <alconet|1> queueing IKE_MOBIKE task
Wed, 2017-11-22 18:24 07[IKE] <alconet|1> activating new tasks
Wed, 2017-11-22 18:24 07[IKE] <alconet|1>   activating IKE_MOBIKE task
Wed, 2017-11-22 18:24 07[ENC] <alconet|1> generating INFORMATIONAL request 6 [ 
N(ADD_4_ADDR) N(ADD_4_ADDR) ]
Wed, 2017-11-22 18:24 07[NET] <alconet|1> sending packet: from 
10.198.54.208[4500] to 95.115.254.165[4500] (96 bytes)
Wed, 2017-11-22 18:24 10[NET] <alconet|1> received packet: from 
95.115.254.165[4500] to 10.198.54.208[4500] (80 bytes)
Wed, 2017-11-22 18:24 10[ENC] <alconet|1> parsed INFORMATIONAL response 6 [ ]
Wed, 2017-11-22 18:24 10[IKE] <alconet|1> activating new tasks
Wed, 2017-11-22 18:24 10[IKE] <alconet|1> nothing to initiate
1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 qdisc noqueue state UNKNOWN qlen 1
    link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
    inet 127.0.0.1/8 scope host lo
       valid_lft forever preferred_lft forever
    inet6 ::1/128 scope host 
       valid_lft forever preferred_lft forever
2: eth0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc pfifo_fast state UP 
qlen 1000
    link/ether 52:54:00:ff:11:9b brd ff:ff:ff:ff:ff:ff
    inet 10.198.54.208/24 brd 10.198.54.255 scope global eth0
       valid_lft forever preferred_lft forever
    inet6 fe80::5054:ff:feff:119b/64 scope link 
       valid_lft forever preferred_lft forever
3: eth1: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc pfifo_fast state UP 
qlen 1000
    link/ether 52:54:00:d5:dd:1c brd ff:ff:ff:ff:ff:ff
    inet 10.248.43.15/24 brd 10.248.43.255 scope global eth1
       valid_lft forever preferred_lft forever
    inet6 fe80::5054:ff:fed5:dd1c/64 scope link 
       valid_lft forever preferred_lft forever
4: ip_vti0@NONE: <NOARP> mtu 1480 qdisc noop state DOWN qlen 1
    link/ipip 0.0.0.0 brd 0.0.0.0
24: vti1@NONE: <POINTOPOINT,NOARP,UP,LOWER_UP> mtu 1480 qdisc noqueue state 
UNKNOWN qlen 1
    link/ipip 10.198.54.208 peer 95.115.254.165
    inet 95.115.254.161/32 scope global vti1
       valid_lft forever preferred_lft forever
# ipsec.conf - strongSwan IPsec configuration file

config setup
  charondebug = ike 3, cfg 3

conn %default
  keyexchange=ikev2
  ikelifetime=60m
  keylife=20m
  rekeymargin=3m
  rekey=no
  dpdaction=restart
  dpddelay=30s
  compress=yes
  auto=start

conn alconet
  leftupdown=/usr/local/sbin/ipsec-notify.sh
  left=%defaultroute
  leftauth=eap
  leftsourceip=%config4,%config6
  rightauth=pubkey
  rightsubnet=0.0.0.0/0,::/0
  eap_identity=%identity
  leftid=bmanovic
  right=ipsec.domena.sk
  [email protected]
  mark=38
#!/bin/bash
set -x
set -o nounset
set -o errexit

exec 3>&1 4>&2
trap 'exec 2>&4 1>&3' 0 1 2 3
exec 1>/log.out 2>&1

VTI_IF="vti${PLUTO_UNIQUEID}"

case "${PLUTO_VERB}" in
    up-client)
        ip tunnel add "${VTI_IF}" local "${PLUTO_ME}" remote "${PLUTO_PEER}" mode vti \
		key "${PLUTO_MARK_OUT%%/*}" ikey "${PLUTO_MARK_IN%%/*}"
        ip link set "${VTI_IF}" up
        ip addr add ${PLUTO_MY_SOURCEIP} dev "${VTI_IF}"
	ip route add 195.210.28.0/24 dev "${VTI_IF}" 
        sysctl -w "net.ipv4.conf.${VTI_IF}.disable_policy=1"
        ;;
    down-client)
        ip tunnel del "${VTI_IF}"
        ;;
esac
firewall is disabled. no rules when running iptables-save
vti1: ip/ip  remote 95.115.254.165  local 10.198.54.208  ttl inherit  key 38
RX: Packets    Bytes        Errors CsumErrs OutOfSeq Mcasts
    0          0            432    0        0        0       
TX: Packets    Bytes        Errors DeadLoop NoRoute  NoBufs
    413        73514        0      0        0        0     
ip_vti0: ip/ip  remote any  local any  ttl inherit  nopmtudisc key 0
RX: Packets    Bytes        Errors CsumErrs OutOfSeq Mcasts
    0          0            0      0        0        0       
TX: Packets    Bytes        Errors DeadLoop NoRoute  NoBufs
    0          0            0      0        0        0     
default via 10.198.54.1 dev eth0 proto static metric 100 
10.198.54.0/24 dev eth0 proto kernel scope link src 10.198.54.208 metric 100 
10.248.43.0/24 dev eth1 proto kernel scope link src 10.248.43.15 metric 100 
195.210.28.0/24 dev vti1 scope link 
broadcast 10.198.54.0 dev eth0 table local proto kernel scope link src 
10.198.54.208 
local 10.198.54.208 dev eth0 table local proto kernel scope host src 
10.198.54.208 
broadcast 10.198.54.255 dev eth0 table local proto kernel scope link src 
10.198.54.208 
broadcast 10.248.43.0 dev eth1 table local proto kernel scope link src 
10.248.43.15 
local 10.248.43.15 dev eth1 table local proto kernel scope host src 
10.248.43.15 
broadcast 10.248.43.255 dev eth1 table local proto kernel scope link src 
10.248.43.15 
local 95.115.254.161 dev vti1 table local proto kernel scope host src 
95.115.254.161 
broadcast 127.0.0.0 dev lo table local proto kernel scope link src 127.0.0.1 
local 127.0.0.0/8 dev lo table local proto kernel scope host src 127.0.0.1 
local 127.0.0.1 dev lo table local proto kernel scope host src 127.0.0.1 
broadcast 127.255.255.255 dev lo table local proto kernel scope link src 
127.0.0.1 
unreachable default dev lo table unspec proto kernel metric 4294967295 error 
-101 
unreachable ::/96 dev lo metric 1024 error -113 
unreachable ::ffff:0.0.0.0/96 dev lo metric 1024 error -113 
unreachable 2002:a00::/24 dev lo metric 1024 error -113 
unreachable 2002:7f00::/24 dev lo metric 1024 error -113 
unreachable 2002:a9fe::/32 dev lo metric 1024 error -113 
unreachable 2002:ac10::/28 dev lo metric 1024 error -113 
unreachable 2002:c0a8::/32 dev lo metric 1024 error -113 
unreachable 2002:e000::/19 dev lo metric 1024 error -113 
unreachable 3ffe:ffff::/32 dev lo metric 1024 error -113 
fe80::/64 dev eth0 proto kernel metric 256 
fe80::/64 dev eth1 proto kernel metric 256 
unreachable default dev lo table unspec proto kernel metric 4294967295 error 
-101 
local ::1 dev lo table local proto none metric 0 
local fe80::5054:ff:fed5:dd1c dev lo table local proto none metric 0 
local fe80::5054:ff:feff:119b dev lo table local proto none metric 0 
ff00::/8 dev eth0 table local metric 256 
ff00::/8 dev eth1 table local metric 256 
unreachable default dev lo table unspec proto kernel metric 4294967295 error 
-101 
Status of IKE charon daemon (strongSwan 5.5.3, Linux 3.10.0-693.5.2.el7.x86_64, 
x86_64):
  uptime: 67 seconds, since Nov 22 18:24:44 2017
  malloc: sbrk 2854912, mmap 0, used 562704, free 2292208
  worker threads: 11 of 16 idle, 5/0/0/0 working, job queue: 0/0/0/0, 
scheduled: 2
  loaded plugins: charon aes des rc2 sha2 sha1 md4 md5 random nonce x509 
revocation constraints acert pubkey pkcs1 pkcs8 pkcs12 pgp dnskey sshkey pem 
openssl gcrypt fips-prf gmp curve25519 xcbc cmac hmac ctr ccm gcm curl attr 
kernel-netlink resolve socket-default farp stroke vici updown eap-identity 
eap-md5 eap-gtc eap-mschapv2 eap-tls eap-ttls eap-peap xauth-generic xauth-eap 
xauth-pam xauth-noauth dhcp unity
Listening IP addresses:
  10.198.54.208
  10.248.43.15
  95.115.254.161
Connections:
     alconet:  %any...ipsec.domena.sk  IKEv2, dpddelay=30s
     alconet:   local:  [bmanovic] uses EAP authentication with EAP identity 
'%any'
     alconet:   remote: [ipsec.domena.sk] uses public key authentication
     alconet:   child:  dynamic === 0.0.0.0/0 ::/0 TUNNEL, dpdaction=restart
Security Associations (1 up, 0 connecting):
     alconet[1]: ESTABLISHED 67 seconds ago, 
10.198.54.208[bmanovic]...95.115.254.165[ipsec.domena.sk]
     alconet[1]: IKEv2 SPIs: 6f13473e65cc0d68_i* 8b1aea928aa59f1e_r, rekeying 
disabled
     alconet[1]: IKE proposal: 
AES_CBC_128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/CURVE_25519
     alconet{1}:  INSTALLED, TUNNEL, reqid 1, ESP in UDP SPIs: c5b4c087_i 
c57212ba_o, IPCOMP CPIs: 86dd_i 2255_o
     alconet{1}:  AES_CBC_128/HMAC_SHA2_256_128, 0 bytes_i, 5712 bytes_o (68 
pkts, 0s ago), rekeying disabled
     alconet{1}:   95.115.254.161/32 === 0.0.0.0/0
src 95.115.254.161/32 dst 0.0.0.0/0 
        dir out priority 383615 ptype main 
        mark 38/0xffffffff
        tmpl src 10.198.54.208 dst 95.115.254.165
                proto comp reqid 1 mode tunnel
        tmpl src 0.0.0.0 dst 0.0.0.0
                proto esp reqid 1 mode transport
src 0.0.0.0/0 dst 95.115.254.161/32 
        dir fwd priority 383615 ptype main 
        mark 38/0xffffffff
        tmpl src 95.115.254.165 dst 10.198.54.208
                proto comp reqid 1 mode tunnel
                level use 
        tmpl src 0.0.0.0 dst 0.0.0.0
                proto esp reqid 1 mode transport
src 0.0.0.0/0 dst 95.115.254.161/32 
        dir in priority 383615 ptype main 
        mark 38/0xffffffff
        tmpl src 95.115.254.165 dst 10.198.54.208
                proto comp reqid 1 mode tunnel
                level use 
        tmpl src 0.0.0.0 dst 0.0.0.0
                proto esp reqid 1 mode transport
src 0.0.0.0/0 dst 0.0.0.0/0 
        socket in priority 0 ptype main 
src 0.0.0.0/0 dst 0.0.0.0/0 
        socket out priority 0 ptype main 
src 0.0.0.0/0 dst 0.0.0.0/0 
        socket in priority 0 ptype main 
src 0.0.0.0/0 dst 0.0.0.0/0 
        socket out priority 0 ptype main 
src ::/0 dst ::/0 
        socket in priority 0 ptype main 
src ::/0 dst ::/0 
        socket out priority 0 ptype main 
src ::/0 dst ::/0 
        socket in priority 0 ptype main 
src ::/0 dst ::/0 
        socket out priority 0 ptype main 

Reply via email to