<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=us-ascii">
</head>
<body style="word-wrap: break-word; -webkit-nbsp-mode: space; -webkit-line-break: after-white-space;" class="">
<font face="Courier" class="">Remote Access Client: StrongSwan v5.2.0 on Centos 6.6<br class="">
VPN Server: StrongSwan v5.2.0 on Centos 6.6<br class="">
<br class="">
Created an IPsec tunnel that was fairly long-lived, ~2 hours 5 minutes. The only application traffic was a periodic ping from the remote access client to a host inside the VPN, one per minute. Noticed the tunnel went down. Below is the log file around the
time of the failure. DMN claims it received a critical signal. No idea how that happened as there was no interactive use of the system at the time.<br class="">
<br class="">
Is this crash of interest? Is there any other data I could retrieve? If I rerun the test, is there any other debugging to enable?<br class="">
<br class="">
<br class="">
Mar 6 01:51:14 ip-10-100-34-179 charon: 01[IKE] reauthenticating IKE_SA cazena-pdc[3]<br class="">
Mar 6 01:51:14 ip-10-100-34-179 charon: 01[IKE] deleting IKE_SA cazena-pdc[3] between 10.100.34.179[linux-test]...a.b.c.d[<a href="http://secgw.cz-dev.com" class="">secgw.cz-dev.com</a>]<br class="">
Mar 6 01:51:14 ip-10-100-34-179 charon: 01[IKE] sending DELETE for IKE_SA cazena-pdc[3]<br class="">
Mar 6 01:51:14 ip-10-100-34-179 charon: 01[ENC] generating INFORMATIONAL request 5 [ D ] <br class="">
Mar 6 01:51:14 ip-10-100-34-179 charon: 01[NET] sending packet: from 10.100.34.179[4500] to a.b.c.d[4500] (76 bytes)<br class="">
Mar 6 01:51:14 ip-10-100-34-179 charon: 14[NET] received packet: from a.b.c.d[4500] to 10.100.34.179[4500] (76 bytes)<br class="">
Mar 6 01:51:14 ip-10-100-34-179 charon: 14[ENC] parsed INFORMATIONAL response 5 [ ] <br class="">
Mar 6 01:51:14 ip-10-100-34-179 charon: 14[IKE] IKE_SA deleted<br class="">
Mar 6 01:51:14 ip-10-100-34-179 vpn: - <a href="http://secgw.cz-dev.com" class="">
secgw.cz-dev.com</a> 10.8.64.0/23 == a.b.c.d -- 10.100.34.179 == 10.255.252.2/32<br class="">
Mar 6 01:51:19 ip-10-100-34-179 charon: 14[IKE] installing new virtual IP 10.255.252.2<br class="">
Mar 6 01:51:19 ip-10-100-34-179 charon: 14[IKE] restarting CHILD_SA cazena-pdc<br class="">
Mar 6 01:51:19 ip-10-100-34-179 charon: 14[IKE] initiating IKE_SA cazena-pdc[4] to a.b.c.d<br class="">
Mar 6 01:51:19 ip-10-100-34-179 charon: 14[ENC] generating IKE_SA_INIT request 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) ]<br class="">
Mar 6 01:51:19 ip-10-100-34-179 charon: 14[NET] sending packet: from 10.100.34.179[500] to a.b.c.d[500] (1132 bytes)<br class="">
Mar 6 01:51:19 ip-10-100-34-179 charon: 14[IKE] removing DNS server 10.8.65.164 from /etc/resolv.conf<br class="">
Mar 6 01:51:19 ip-10-100-34-179 charon: 09[NET] received packet: from a.b.c.d[500] to 10.100.34.179[500] (465 bytes)<br class="">
Mar 6 01:51:19 ip-10-100-34-179 charon: 09[ENC] parsed IKE_SA_INIT response 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) CERTREQ N(MULT_AUTH) ]<br class="">
Mar 6 01:51:19 ip-10-100-34-179 charon: 09[IKE] local host is behind NAT, sending keep alives<br class="">
Mar 6 01:51:19 ip-10-100-34-179 charon: 09[IKE] remote host is behind NAT <br class="">
Mar 6 01:51:19 ip-10-100-34-179 charon: 09[DMN] thread 9 received 11<br class="">
Mar 6 01:51:19 ip-10-100-34-179 charon: 09[LIB] dumping 2 stack frame addresses:<br class="">
Mar 6 01:51:19 ip-10-100-34-179 charon: 09[LIB] /lib64/libpthread.so.0 @ 0x7fb8fd3ab000 [0x7fb8fd3ba710]<br class="">
Mar 6 01:51:19 ip-10-100-34-179 charon: 09[LIB] -> sigaction.c:0<br class="">
Mar 6 01:51:19 ip-10-100-34-179 charon: 09[LIB] /lib64/libc.so.6 @ 0x7fb8fce13000 [0x7fb8fd1a2ed8]<br class="">
Mar 6 01:51:19 ip-10-100-34-179 charon: 09[LIB] -> interp.c:0<br class="">
Mar 6 01:51:19 ip-10-100-34-179 charon: 09[DMN] killing ourself, received critical signal<br class="">
Mar 6 01:51:24 ip-10-100-34-179 charon: 00[DMN] Starting IKE charon daemon (strongSwan 5.2.0, Linux 2.6.32-504.1.3.el6.x86_64, x86_64)<br class="">
</font><br class="">
</body>
</html>