[strongSwan-dev] Load-tester issue

meenakshi bangad mbangad at gmail.com
Wed Feb 11 23:11:30 CET 2015


Hello,

routing Problems to reach out thru the tunnel using load-tester

I am trying to use the load-tester to stress test my VPN server. Using ver
5.2.2. For simplicity I am trying to bring just one connection up. My
tunnel gets
established but I am not able to ping the outside world. Here is what my ip
route shows:

I did a ipsec load-tester initiate 1 1 and got a private IP if 10.10.3.1

*# ip route show table 220*
10.101.248.152 via 10.101.248.152 dev eno16780032  proto static  src
10.10.3.1

The above line rather should be ( I would think)
default via 10.101.248.152 dev eno16780032  proto static  src 10.10.3.1

Not sure how to fix this.
*Also I see that my ipsec statusall shows everything to be /32 but i have
configured on the server for it to be /24.*
Sample output
# ipsec statusall
Status of IKE charon daemon (strongSwan 5.2.2, Linux
3.10.0-123.13.1.el7.x86_64, x86_64):
  uptime: 3 minutes, since Feb 11 17:02:20 2015
  malloc: sbrk 2560000, mmap 0, used 541936, free 2018064
  worker threads: 27 of 32 idle, 5/0/0/0 working, job queue: 0/0/0/0,
scheduled: 0
  loaded plugins: charon ldap pkcs11 aes des rc2 sha1 sha2 md4 md5 random
nonce x509 revocation constraints pubkey pkcs1 pkcs7 pkcs8 pkcs12 pgp
dnskey sshkey pem openssl fips-prf gmp xcbc cmac hmac ccm gcm curl attr
load-tester kernel-netlink resolve socket-default farp stroke updown
eap-identity eap-aka eap-aka-3gpp2 eap-md5 eap-gtc eap-mschapv2 eap-dynamic
eap-radius eap-tls eap-ttls eap-peap eap-tnc xauth-generic xauth-eap
xauth-pam xauth-noauth tnc-tnccs dhcp
Listening IP addresses:
  10.101.248.153
Connections:
   load-test:  10.101.248.152...0.0.0.0  IKEv1
   load-test:   local:  [C=CH, O=strongSwan, CN=vpntest.x.com] uses public
key authentication
   load-test:   remote: [%any] uses public key authentication
   load-test:   remote: [%any] uses XAuth authentication: any with XAuth
identity '%any'
   load-test:   child:  dynamic === dynamic TUNNEL
Security Associations (1 up, 0 connecting):
   load-test[1]: ESTABLISHED 3 minutes ago,
10.101.248.153[CN=r]...10.101.248.152[C=CH, O=strongSwan, CN=vpntest.x.com]
   load-test[1]: IKEv1 SPIs: f0850451c41b60ae_i* 245d2d63feb59e08_r,
rekeying disabled
   load-test[1]: IKE proposal:
AES_CBC_128/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_2048
   load-test{1}:  REKEYING, TUNNEL, expires in 35 seconds
   load-test{1}:   10.10.3.1/32 === 10.101.248.152/32
   load-test{1}:  INSTALLED, TUNNEL, ESP SPIs: c712d0f2_i c00b39c3_o
   load-test{1}:  AES_CBC_128/HMAC_SHA1_96, 0 bytes_i, 0 bytes_o, rekeying
in 35 seconds
   load-test{1}:   10.10.3.1/32 === 10.101.248.152/32


Here is my server side ipsec.conf

conn rw
    keyexchange=ikev1
    left=10.101.248.152
    leftauth=pubkey
    leftsubnet=0.0.0.0/0
    leftid="C=CH, O=strongSwan, CN=vpntest.x.com"
    leftcert=serverCert.pem
    leftfirewall=yes
    right=%any
    rightsourceip=10.10.3.0/24
    rightauth=pubkey
    rightauth2=xauth-radius
    eap_identity=%identity
    auto=add


On the client side, my ipsec.conf is empty. Everything is configured thru
strongswan.conf .
# Refer to the strongswan.conf(5) manpage for details
#
# Configuration changes should be made in the included files

charon {
#   load = sha1 sha2 md5 aes des hmac pem pkcs1 x509 revocation gmp random
nonce curl xauth-generic kernel-netlink socket-default updown stroke

    dh_exponent_ansi_x9_42 = no
    reuse_ikesa = no
    threads = 32

#    install_routes=no

    plugins {
        load-tester {
            # enable the plugin
            enable = yes
            # 10000 connections, ten in parallel
            initiators = 0
            iterations = 1
            # use a delay of 100ms, overall time is: iterations * delay =
100s
            delay = 100
            # address of the gateway (releases before 5.0.2 used the
"remote" keyword!)
            responder = 10.101.248.152
            # IKE-proposal to use
            proposal = aes128-sha1-modp2048
            esp = aes128-sha1
            #proposal = aes128-sha1-modp768
            # use faster PSK authentication instead of 1024bit RSA
            initiator_auth = pubkey|xauth
            responder_auth = pubkey
            # request a virtual IP using configuration payloads
            request_virtual_ip = yes
            # disable IKE_SA rekeying (default)
            ike_rekey = 0
            # enable CHILD_SA every 60s
            child_rekey = 60
            #initiator_id = "OU=MobileXpression, CN=r"
            initiator_id = "CN=r"
            initiator_match = *
            responder_id="C=CH, O=strongSwan, CN=vpntest.x.com"
            issuer_cert = /etc/ipsec.d/cacerts/caCert.pem
            issuer_key = /home/mbangad/caKey.pem
            #ca_dir = /path/to/trustchain/certs
            # do not delete the IKE_SA after it has been established
(default)
            delete_after_established = no
            # do not shut down the daemon if all IKE_SAs established
            shutdown_when_complete = no
            version=1
            initiator_ts = 10.10.3.1/24
        }
    }
}


thanks,

Meenakshi
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.strongswan.org/pipermail/dev/attachments/20150211/9530c40c/attachment.html>


More information about the Dev mailing list