Hello,

SetupI have one IKE Responder and two IKE initiators (with different 
identities) which are able to establish IKE SA with the responder 
successfully.VersionstrongSwan 5.7.2dr2 swanctl

IssueI want to establish additional CHILD_SA for each of these IKE-SA 
initiators from ResponderHowever, both initiators IKE entries at IKE responder 
are assigned same connection name "net-net". In my ipsec.conf settings, 
connection name is given as "net-net". My problem is that when I initiate 
CHILD_SA using swanctl --initiate command, then I cannot identify separate 
IKE-SAs as both are assigned same name by Charon daemon.I understand it takes 
names from the configuration and creates a new IKE SA or CHILD SA with the name 
mentioned in the config.
Please find output of command and ipsec.conf in the attached file.
Queries1. How to configure Responder so that we can have each IKE SA entry as a 
separate connection?My main aim is to create additional CHILD SAs for each IKE 
SA.
Warm Regards,Pankaj

 swanctl --list-sas --pretty --raw
list-sa event {
  net-net {
    uniqueid = 2
    version = 2
    state = ESTABLISHED
    local-host = 10.10.1.2
    local-port = 500
    local-id = server.strongswan.org
    remote-host = 10.200.200.110
    remote-port = 500
    remote-id = client1.strongswan.org
    initiator-spi = b468934b8e969597
    responder-spi = 82a8ab360d4c9caa
    encr-alg = AES_CBC
    encr-keysize = 128
    integ-alg = HMAC_SHA2_256_128
    prf-alg = PRF_AES128_XCBC
    dh-group = CURVE_25519
    established = 2856
    reauth-time = 82626
    remote-vips = [
      10.3.1.2
    ]
    child-sas {
      net-net-2 {
        name = net-net
        uniqueid = 2
        reqid = 2
        state = INSTALLED
        mode = TUNNEL
        protocol = ESP
        spi-in = c760bd11
        spi-out = cf56579a
        encr-alg = AES_CBC
        encr-keysize = 128
        integ-alg = HMAC_SHA2_256_128
        bytes-in = 728
        packets-in = 0
        bytes-out = 0
        packets-out = 0
        rekey-time = 82521
        life-time = 83544
        install-time = 2856
        local-ts = [
          192.168.124.0/24
        ]
        remote-ts = [
          10.3.1.2/32
        ]
      }
    }
  }
}
list-sa event {
  net-net {
    uniqueid = 1
    version = 2
    state = ESTABLISHED
    local-host = 10.10.1.2
    local-port = 500
    local-id = server.strongswan.org
    remote-host = 10.200.200.100
    remote-port = 500
    remote-id = client.strongswan.org
    initiator-spi = f352c9ca2126bd32
    responder-spi = 7b1ce21f8a2dd4dd
    encr-alg = AES_CBC
    encr-keysize = 128
    integ-alg = HMAC_SHA2_256_128
    prf-alg = PRF_AES128_XCBC
    dh-group = CURVE_25519
    established = 2932
    reauth-time = 82849
    remote-vips = [
      10.3.1.1
    ]
    child-sas {
      net-net-1 {
        name = net-net
        uniqueid = 1
        reqid = 1
        state = INSTALLED
        mode = TUNNEL
        protocol = ESP
        spi-in = c78fa4b9
        spi-out = c3c40549
        encr-alg = AES_CBC
        encr-keysize = 128
        integ-alg = HMAC_SHA2_256_128
        bytes-in = 728
        packets-in = 0
        bytes-out = 0
        packets-out = 0
        rekey-time = 82456
        life-time = 83468
        install-time = 2932
        local-ts = [
          192.168.124.0/24
        ]
        remote-ts = [
          10.3.1.1/32
        ]
      }
    }
  }
}
list-sas reply {
}

==============================================================================Initiate
 command

1. NOT WORKING
swanctl --initiate --child net-net-1 --ike net-net
initiate failed: CHILD_SA config 'net-net-1' not found


2. NOT WORKING
swanctl --initiate --child net-net-2 --ike net-net
initiate failed: CHILD_SA config 'net-net-2' not found
[root@43ee2894ac18 /]#


3. WORKING
[root@43ee2894ac18 /]# swanctl --initiate --child net-net --ike net-net
initiate completed successfully


=======================================================================ipsec.conf

config setup
        strictcrlpolicy=no

conn %default
        #ike=aes256-sha1-modp2048!
        #esp=aes192-sha1-esn!
        mobike=no
        keyexchange=ikev2
        ikelifetime=24h
        lifetime=24h

conn net-net
        left=10.10.1.2
        leftsubnet=192.168.124.0/24
        leftauth=pubkey
        [email protected]
        leftcert=serverCert.pem
        right=%any
        rightauth=eap-expanded
        rightid=%any
        rightsendcert=never
        rightsourceip=10.3.1.0/24
        auto=add



Reply via email to