[strongSwan] IKEv2 PFS status

Alexis Salinas alexis.salinas at inmotiontechnology.com
Fri Mar 18 00:45:22 CET 2011


Hi All,
I'm wondering if someone knows how to check if PFS is enabled, and the DH group being used by a given CHILD_SA. 
>From an older post (https://lists.strongswan.org/pipermail/users/2008-October/002822.html) I got this "The modp option in the esp definition is ignored when setting up the first CHILD_SA as part of the IKE_AUTH exchange. Separate DH factors are is used by  CREATE_CHILD_SA  exchanges establishing additional CHILD_SAs or during IPSec SA rekeying. With this behaviour "Perfect Forward Secrecy is achieved"."

So I configured a couple of gateways like shown below, but when I check 'ipsec statusall' I don't see any reference to PFS on the second CHILD_SA.
I'm I doing something wrong?
Thanks in advance.

config setup
        cachecrls=no
        charonstart=yes
        crlcheckinterval=0
        plutostart=yes
        strictcrlpolicy=no
        nat_traversal=yes
        plutodebug=none
        charondebug="dmn 0, mgr 0, ike 0, chd 0, job 0, cfg 0, knl 0, net 0, enc 0, lib 0"


#gw1-to-gw2
conn gw1-to-gw2
        left=192.168.3.31
        leftid=@H020109D0001
        leftsubnet=172.22.0.0/24
        leftnexthop=192.168.2.128
        leftfirewall=yes
        right=192.168.3.110
        rightsubnet=10.0.0.0/24
        ike=aes128-md5-modp1536!
        esp=aes128-md5-modp1024!
        keyexchange=ikev2
        mobike=yes
        ikelifetime=60m
        keylife=20m
        compress=no
        authby=secret
        dpdaction=restart
        dpddelay=10
        dpdtimeout=30
        auto=add
        keyingtries=1
        rekeymargin=3m
        forceencaps=yes
        reauth=yes

#gw1-to-gw2-child2
conn gw1-to-gw2-child2
        left=192.168.3.31
        leftid=@H020109D0001
        leftsubnet=172.22.1.0/24
        leftnexthop=192.168.2.128
        leftfirewall=yes
        right=192.168.3.110
        rightsubnet=10.1.0.0/24
        ike=aes128-md5-modp1536!
        esp=aes128-md5-modp1024!
        keyexchange=ikev2
        mobike=yes
        ikelifetime=60m
        keylife=20m
        compress=no
        authby=secret
        dpdaction=restart
        dpddelay=10
        dpdtimeout=30
        auto=add
        keyingtries=1
        rekeymargin=3m
        forceencaps=yes
        reauth=yes


Security Associations:
gw1-to-gw2[1]: ESTABLISHED 50 seconds ago, 192.168.3.31[H020109D0001]...192.168.3.110[192.168.3.110]
gw1-to-gw2[1]: IKE SPIs: e60a4f49fa294bcd_i* f6d5a905dfa97711_r, pre-shared key reauthentication in 55 minutes
gw1-to-gw2[1]: IKE proposal: AES_CBC_128/HMAC_MD5_96/PRF_HMAC_MD5/MODP_1536
gw1-to-gw2{1}:  INSTALLED, TUNNEL, ESP in UDP SPIs: c911f5f8_i cf631c91_o
gw1-to-gw2{1}:  AES_CBC_128/HMAC_MD5_96, 0 bytes_i, 0 bytes_o, rekeying in 16 minutes
gw1-to-gw2{1}:   172.22.0.0/24 === 10.0.0.0/24
gw1-to-gw2-child2{2}:  INSTALLED, TUNNEL, ESP in UDP SPIs: c3013ecc_i c2eb28c9_o
gw1-to-gw2-child2{2}:  AES_CBC_128/HMAC_MD5_96, 0 bytes_i, 0 bytes_o, rekeying in 15 minutes
gw1-to-gw2-child2{2}:   172.22.1.0/24 === 10.1.0.0/24




More information about the Users mailing list