[strongSwan-dev] ISAKMP SA lifetime, Mode Config, and DHCP
Thor Simon
Thor.Simon at twosigma.com
Thu Apr 5 18:22:42 CEST 2018
Thanks for your comments! It sounds to me like the best (practically, nearly the only) way, then, is:
>> 3) Artificially constrain the effective phase 1 SA lifetime server-side so that the server tries to renew the phase 1 before the DHCP lease expires. This should still trigger a new config pull by the client.
>>
>> * This is an abstraction violation - the DHCP plugin would have to
>> find the relevant client state and mess with it directly, unless the
>> plugin's API were changed as per #1 above
>
> The server can't reauthenticate in all cases (in particular with asymmetric authentication, or with IKEv2 and virtual IPs). But with
> IKEv2 you could pass the lease time to the IKE_SA (via
> set_auth_lifetime() method), which would then request the client to reauthenticate before this (if it supports > RFC 4478, otherwise the server will close the IKE_SA when it expires if the client did not reauthenticate before > that).
The DHCP provider's acquire method gets the ike_sa so it looks like this should be relatively straightforward. We'll give it a try!
My remarks on tying things to the phase 2 SA were based on what may have been a misunderstanding of 3.4 and 4 in the original mode config draft. In any case, it sounds like we may have a method that should work, at least for StrongSwan server and client. Thanks!
Thor
More information about the Dev
mailing list