[strongSwan] PSK_with_ideal_keys, charon_crashes_with_8m_keylife_?

o Encryptos encryptos at gmail.com
Mon Mar 21 14:07:02 CET 2011


Hello all,

It is my first post and I would like to thank the strongSwan creators and
all who contribute to this excellent suite of tools.
I've been watching almost all e-mails and I'm impressed by the almost
immediate response of Andreas, Willi, Tobias

I have a couple of questions:

Q1:
===
If someone could supply me with a group of a couple of thousands of
cryptographically ideal keys (statistically independent, FIPS 140-2, etc.)
and also guarantee that the keys could be safely distributed to all peers
then if I use these keys as PSK this is what really happens:

The PSK keys will be used to derive all SKEYSEED values SK_x but the actual
mathematical characteristics of the given group of cryptokeys will not be
inherited to the keys used by the CHILD_SA because DH is the base mechanism
for the creation of the "traffic keys".

How could I take advantage of the "given ideal keys" ?
Is it possible to use the DH derived keys as an index to the pool of those
"ideal keys"?


Q2:
===
I've been testing the following scenario:
(test
pc:192.168.123.23)->192.168.123.223---192.168.2.23===back-to-back===192.168.2.24---192.168.124.224->(test
pc:192.168.124.24)

After many hours (14h appx.) of continuous but low traffic (0.01%, that is
about 15 packets/sec),
I received the debug messages:

charon: 08[DMN] thread 10 received 11
charon: 08[DMN] killing ourself, received critical signal

while the configuration is like that:

config setup
      plutostart=no
      charonstart=yes
      charondebug=all
conn %default
        ikelifetime=1h
        keylife=8m
        rekeymargin=2m
        keyingtries=%forever
        authby=secret
        keyexchange=ikev2
        mobike=no
        esp=aes256-sha2_256-modp2048!
        ike=aes256-sha2_256-modp2048!
        inactivity=10m
conn net23-net24-1222
        left=192.168.2.223
        leftsubnet=192.168.123.0/24
        leftid=device23
        leftfirewall= yes
        right=192.168.2.224
        rightsubnet=192.168.124.0/24
        rightid=device24
        auto=route

I've seen the same messages (Bug#614105, regarding version 4.5.0-1)

but I'm using 4.4.1 and was quite stable from the beginning, even under
heavy stress
(rfc2544, tens of peers each with a couple of sub-nets)

Should I blame the short keylife (8m) ?
Is it possible that the rekey happens at 4m (rekeyfuzz=100%) and the time
left is not enough to make all calculations?


I would appreciate any help,
Best Regards,
Nikos
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.strongswan.org/pipermail/users/attachments/20110321/63197b04/attachment.html>


More information about the Users mailing list