Hi Shelton,
Thanks for looking into it.
I tried configuring algorithms on the Responder side as well.
But I'm still getting same issue.
Following are new logs after configuring algorithms on the Responder side.
#################################################
Initiator logs
#################################################
vpp# sh version
vpp v22.06-rc0~419-g3bad8b62d built by root on 621e087e9003 at
2022-08-23T09:42:28
vpp#
vpp#
vpp# sh ikev2 sa details
iip 192.168.4.2 ispi fcc61beef0453f0b rip 192.168.4.1 rspi 9e829dfd7459e1e2
encr:aes-cbc-256 prf:hmac-sha2-256 integ:hmac-sha2-256-128
dh-group:modp-2048
nonce i:c27f0db96d146a3341234e44175b5c22bd99003568445b5ab1efc0ae7a9d1cad
r:8fda6a237bad68f5634bc726af060a1de519917f4697b52dd8b436ade609d3b3
SK_d 955729e2b56f7bcd1ea6fc90dc9a3578000e64383f77d1c427155b8bd10f63ec
SK_a i:213fc1a783dfa9676d67f574c33269506524629158b19f710223bf1235266050
r:dc5bcc89e2db45c75e3384db276af9fb92b56f408aceebcdb47e07f8e6ee0211
SK_e i:be8e5d171d0259bfc1a0256a38ec8583bfcfc23a16c60eae9ac7ff8bcf6df459
r:c59a59b1f07e6d4342585d2906f990253fcb6ba8ae75b399c29568a64620a91d
SK_p i:7c215210e7e405345d73341c8049b55227d49a1ecf1dbd77967f61e5c3565936
r:55776381aa80c244ce4e80e00479ce9142db34ec7abed697f1109c24bf66e457
identifier (i) id-type fqdn data roadwarrior.vpn.example.com
identifier (r) id-type fqdn data vpp.home
child sa 0:
spi(i) 92d8eaad spi(r) 0
SK_e i:
r:
traffic selectors (i):0 type 7 protocol_id 0 addr 192.168.5.0 -
192.168.5.255 port 0 - 65535
traffic selectors (r):0 type 7 protocol_id 0 addr 192.168.3.0 -
192.168.3.255 port 0 - 65535
Stats:
keepalives :0
rekey :0
SA init :0 (retransmit: 0)
retransmit: 0
SA auth :0
vpp#
vpp#
vpp# sh ikev2 profile
profile pr1
auth-method shared-key-mic auth data Vpp123
local id-type fqdn data roadwarrior.vpn.example.com
remote id-type fqdn data vpp.home
local traffic-selector addr 192.168.5.0 - 192.168.5.255 port 0 - 65535
protocol 0
remote traffic-selector addr 192.168.3.0 - 192.168.3.255 port 0 - 65535
protocol 0
responder fpeth0 192.168.4.1
ike-crypto-alg aes-cbc 256 ike-integ-alg hmac-sha2-256-128 ike-dh
modp-2048
esp-crypto-alg aes-cbc 256 esp-integ-alg none
lifetime 3600 jitter 10 handover 5 maxdata 0
vpp#
vpp#
vpp#
vpp# sh interface fpeth0
Name Idx State MTU (L3/IP4/IP6/MPLS)
Counter Count
fpeth0 1 up 9000/0/0/0 rx
packets 7
rx
bytes 1208
tx
packets 7
tx
bytes 1270
drops
3
ip4
6
vpp#
#################################################
Responder logs
#################################################
vpp#
vpp# set interface state fpeth0 up
vpp# set interface ip address fpeth0 192.168.4.1/24
vpp#
vpp# ikev2 profile add pr1
vpp# ikev2 profile set pr1 auth shared-key-mic string Vpp123
vpp# ikev2 profile set pr1 id local fqdn vpp.home
vpp# ikev2 profile set pr1 id remote fqdn roadwarrior.vpn.example.com
vpp# ikev2 profile set pr1 traffic-selector remote ip-range 192.168.5.0 -
192.168.5.255 port-range 0 - 65535 protocol 0
vpp# ikev2 profile set pr1 traffic-selector local ip-range 192.168.3.0 -
192.168.3.255 port-range 0 - 65535 protocol 0
vpp#
vpp# ikev2 profile set pr1 ike-crypto-alg aes-cbc 256 ike-integ-alg
hmac-sha2-256-128 ike-dh modp-2048
vpp# ikev2 profile set pr1 esp-crypto-alg aes-cbc 256
vpp# ikev2 profile set pr1 sa-lifetime 3600 10 5 0
vpp#
vpp# sh ikev2 sa
iip 192.168.4.2 ispi fcc61beef0453f0b rip 192.168.4.1 rspi 9e829dfd7459e1e2
vpp# sh ikev2 sa details
iip 192.168.4.2 ispi fcc61beef0453f0b rip 192.168.4.1 rspi 9e829dfd7459e1e2
encr:aes-cbc-256 prf:hmac-sha2-256 integ:hmac-sha2-256-128
dh-group:modp-2048
nonce i:c27f0db96d146a3341234e44175b5c22bd99003568445b5ab1efc0ae7a9d1cad
r:8fda6a237bad68f5634bc726af060a1de519917f4697b52dd8b436ade609d3b3
SK_d 955729e2b56f7bcd1ea6fc90dc9a3578000e64383f77d1c427155b8bd10f63ec
SK_a i:213fc1a783dfa9676d67f574c33269506524629158b19f710223bf1235266050
r:dc5bcc89e2db45c75e3384db276af9fb92b56f408aceebcdb47e07f8e6ee0211
SK_e i:be8e5d171d0259bfc1a0256a38ec8583bfcfc23a16c60eae9ac7ff8bcf6df459
r:c59a59b1f07e6d4342585d2906f990253fcb6ba8ae75b399c29568a64620a91d
SK_p i:7c215210e7e405345d73341c8049b55227d49a1ecf1dbd77967f61e5c3565936
r:55776381aa80c244ce4e80e00479ce9142db34ec7abed697f1109c24bf66e457
identifier (i) id-type fqdn data roadwarrior.vpn.example.com
identifier (r) id-type fqdn data vpp.home
child sa 0:encr:aes-cbc-256 esn:yes
spi(i) 92d8eaad spi(r) dc01af31
SK_e i:
r:
traffic selectors (i):0 type 7 protocol_id 0 addr 192.168.5.0 -
192.168.5.255 port 0 - 65535
traffic selectors (r):0 type 7 protocol_id 0 addr 192.168.3.0 -
192.168.3.255 port 0 - 65535
Stats:
keepalives :0
rekey :0
SA init :1 (retransmit: 0)
retransmit: 0
SA auth :1
vpp#
vpp#
vpp#
vpp# sh ikev2 profile
profile pr1
auth-method shared-key-mic auth data Vpp123
local id-type fqdn data vpp.home
remote id-type fqdn data roadwarrior.vpn.example.com
local traffic-selector addr 192.168.3.0 - 192.168.3.255 port 0 - 65535
protocol 0
remote traffic-selector addr 192.168.5.0 - 192.168.5.255 port 0 - 65535
protocol 0
ike-crypto-alg aes-cbc 256 ike-integ-alg hmac-sha2-256-128 ike-dh
modp-2048
esp-crypto-alg aes-cbc 256 esp-integ-alg none
lifetime 3600 jitter 10 handover 5 maxdata 0
vpp#
Anything else that needs to be checked ?
Thanks
Nilesh Inamdar
On Thu, Aug 25, 2022 at 11:06 PM Xiaodong Xu <[email protected]> wrote:
> Did you make sure the algorithms (for both encryption and authentication)
> used for initiator and responder match? It looks like you didn't configure
> the algorithms for either IKE SA or IPsec SA the responder, I don't know if
> the default setting will work.
> If you are unsure about it either, I'd suggest you specify the parameters
> explicitly like:
>
> # ikev2 profile set pr1 ike-crypto-alg aes-cbc 256 ike-integ-alg
> hmac-sha2-256-128 ike-dh modp-2048
> # ikev2 profile set pr1 esp-crypto-alg aes-cbc 256 esp-integ-alg
> hmac-sha2-256-128
>
> Shelton
>
> On Thu, Aug 25, 2022 at 10:13 AM Nilesh Inamdar <
> [email protected]> wrote:
>
>> Hi Team,
>>
>> I am new to VPP. I am trying to bringup IPSec session between 2 VPP using
>> IKEv2 plugin.
>> I followed this link : https://wiki.fd.io/view/VPP/IPSec_and_IKEv2
>>
>> After doing all the configuration and executing "ikev2 initiate sa-init
>> pr1",
>> I am guessing that child SA is not getting installed properly on the
>> Initiator side. (And ipip0 tunnel interface is not getting created.)
>>
>> Following is the topology:
>> vpp-responder (fpeth0) (192.168.4.1) ---------------------- (192.168.4.2)
>> (fpeth0)vpp-initiator
>>
>> Following are Initiator side logs:
>>
>> #######################################
>> Initiator side logs :
>> #######################################
>> vpp# sh version
>> vpp v22.06-rc0~419-g3bad8b62d built by root on 621e087e9003 at
>> 2022-08-23T09:42:28
>> vpp#
>> vpp#
>> vpp# ikev2 profile add pr1
>> vpp# ikev2 profile set pr1 auth shared-key-mic string Vpp123
>> vpp# ikev2 profile set pr1 id local fqdn roadwarrior.vpn.example.com
>> vpp# ikev2 profile set pr1 id remote fqdn vpp.home
>> vpp# ikev2 profile set pr1 traffic-selector local ip-range 192.168.5.0 -
>> 192.168.5.255 port-range 0 - 65535 protocol 0
>> vpp# ikev2 profile set pr1 traffic-selector remote ip-range 192.168.3.0 -
>> 192.168.3.255 port-range 0 - 65535 protocol 0
>> vpp#
>> vpp#
>> vpp# ikev2 profile set pr1 responder fpeth0 192.168.4.1
>> vpp# ikev2 profile set pr1 ike-crypto-alg aes-cbc 256 ike-integ-alg
>> sha1-96 ike-dh modp-2048
>> vpp# ikev2 profile set pr1 esp-crypto-alg aes-cbc 256
>> vpp# ikev2 profile set pr1 sa-lifetime 3600 10 5 0
>> vpp#
>> vpp#
>> vpp#
>> vpp# ikev2 initiate sa-init pr1
>> vpp#
>> vpp# sh ikev2 sa
>> iip 192.168.4.2 ispi e59b30749fdb90e9 rip 192.168.4.1 rspi
>> 23083f242006bd44
>> vpp#
>> vpp# sh ikev2 sa details
>> iip 192.168.4.2 ispi e59b30749fdb90e9 rip 192.168.4.1 rspi
>> 23083f242006bd44
>> encr:aes-cbc-256 prf:hmac-sha2-256 integ:sha1-96 dh-group:modp-2048
>> nonce i:b0f1ff98f782298f24adacd8f44bb239bab2715c94d11e64e5e10dc448749701
>> r:556eb695f2d950b9a96b76a5f159063f8e9af37834bfd2a0f0dce85f81b47a4b
>> SK_d 5834ae92d682b541a517062cf92e85fd34c1400732c1269eedb8e097db335fae
>> SK_a i:3b13c1603645860190751759274be0d04f036403
>> r:9d30918c5fde614ec883cc1a889b549733deac04
>> SK_e i:d4323c469246648d98b3b4432d4e4f4c64cd9e94f434c3af24d5af71c455ed6c
>> r:75717e36023e71401916f2e3d2a6a7bc21d6a9410c8548058f268036498dd5c1
>> SK_p i:bdda78f8c65cd043a102864c26ee0ad7db4af6a602c7c38e4e0a51be75169ebf
>> r:e1e88dbd92d97eee689433d2d33a926c398082b229d0d8e1d21f2662cf649056
>> identifier (i) id-type fqdn data roadwarrior.vpn.example.com
>> identifier (r) id-type fqdn data vpp.home
>> child sa 0:
>> spi(i) 858968d7 *spi(r) 0*
>> SK_e i:
>> r:
>> traffic selectors (i):0 type 7 protocol_id 0 addr 192.168.5.0 -
>> 192.168.5.255 port 0 - 65535
>> traffic selectors (r):0 type 7 protocol_id 0 addr 192.168.3.0 -
>> 192.168.3.255 port 0 - 65535
>> Stats:
>> keepalives :0
>> rekey :0
>> SA init :0 (retransmit: 0)
>> retransmit: 0
>> SA auth :0
>>
>> vpp#
>>
>>
>> ###########################################
>> Responder side logs :
>> ###########################################
>> vpp# sh version
>> vpp v22.06-rc0~419-g3bad8b62d built by root on 621e087e9003 at
>> 2022-08-23T09:42:28
>> vpp#
>> vpp# sh interface fpeth0 addr
>> fpeth0 (up):
>> L3 192.168.4.1/24
>> vpp# ping 192.168.4.2
>> 116 bytes from 192.168.4.2: icmp_seq=2 ttl=64 time=.1323 ms
>> 116 bytes from 192.168.4.2: icmp_seq=3 ttl=64 time=.0256 ms
>> 116 bytes from 192.168.4.2: icmp_seq=4 ttl=64 time=.0228 ms
>> 116 bytes from 192.168.4.2: icmp_seq=5 ttl=64 time=.0259 ms
>>
>> Statistics: 5 sent, 4 received, 20% packet loss
>> vpp#
>> vpp# ikev2 profile add pr1
>> vpp# ikev2 profile set pr1 auth shared-key-mic string Vpp123
>> vpp# ikev2 profile set pr1 id local fqdn vpp.home
>> vpp# ikev2 profile set pr1 id remote fqdn roadwarrior.vpn.example.com
>> vpp# ikev2 profile set pr1 traffic-selector remote ip-range 192.168.5.0 -
>> 192.168.5.255 port-range 0 - 65535 protocol 0
>> vpp# ikev2 profile set pr1 traffic-selector local ip-range 192.168.3.0 -
>> 192.168.3.255 port-range 0 - 65535 protocol 0
>> vpp#
>> vpp#
>> vpp# sh ikev2 sa details
>> iip 192.168.4.2 ispi e59b30749fdb90e9 rip 192.168.4.1 rspi
>> 23083f242006bd44
>> encr:aes-cbc-256 prf:hmac-sha2-256 integ:sha1-96 dh-group:modp-2048
>> nonce i:b0f1ff98f782298f24adacd8f44bb239bab2715c94d11e64e5e10dc448749701
>> r:556eb695f2d950b9a96b76a5f159063f8e9af37834bfd2a0f0dce85f81b47a4b
>> SK_d 5834ae92d682b541a517062cf92e85fd34c1400732c1269eedb8e097db335fae
>> SK_a i:3b13c1603645860190751759274be0d04f036403
>> r:9d30918c5fde614ec883cc1a889b549733deac04
>> SK_e i:d4323c469246648d98b3b4432d4e4f4c64cd9e94f434c3af24d5af71c455ed6c
>> r:75717e36023e71401916f2e3d2a6a7bc21d6a9410c8548058f268036498dd5c1
>> SK_p i:bdda78f8c65cd043a102864c26ee0ad7db4af6a602c7c38e4e0a51be75169ebf
>> r:e1e88dbd92d97eee689433d2d33a926c398082b229d0d8e1d21f2662cf649056
>> identifier (i) id-type fqdn data roadwarrior.vpn.example.com
>> identifier (r) id-type fqdn data vpp.home
>> child sa 0:encr:aes-cbc-256 esn:yes
>> spi(i) 858968d7 spi(r) ded8f883
>> SK_e i:
>> r:
>> traffic selectors (i):0 type 7 protocol_id 0 addr 192.168.5.0 -
>> 192.168.5.255 port 0 - 65535
>> traffic selectors (r):0 type 7 protocol_id 0 addr 192.168.3.0 -
>> 192.168.3.255 port 0 - 65535
>> Stats:
>> keepalives :0
>> rekey :0
>> SA init :1 (retransmit: 0)
>> retransmit: 0
>> SA auth :1
>>
>> vpp#
>>
>>
>> ########################
>> Plugins used in vpp.conf
>> ########################
>> plugins {
>> plugin default { disable }
>> plugin dpdk_plugin.so { enable }
>> plugin ping_plugin.so { enable }
>> plugin memif_plugin.so { enable }
>> plugin linux_cp_plugin.so {enable}
>> plugin linux_nl_plugin.so {enable}
>> plugin ikev2_plugin.so {enable}
>> }
>>
>> Can anyone please help with what I am missing here ?
>> Let me know if you need any more logs/debugs.
>>
>> Thanks
>> Nilesh Inamdar
>>
>>
>>
>>
>>
>
>
>
-=-=-=-=-=-=-=-=-=-=-=-
Links: You receive all messages sent to this group.
View/Reply Online (#21828): https://lists.fd.io/g/vpp-dev/message/21828
Mute This Topic: https://lists.fd.io/mt/93252927/21656
Group Owner: [email protected]
Unsubscribe: https://lists.fd.io/g/vpp-dev/leave/1480452/21656/631435203/xyzzy
[[email protected]]
-=-=-=-=-=-=-=-=-=-=-=-