[strongSwan] strongswan 5.0.1, iOS4.3.5, problems when client is not behind NAT

Bharath Kumar cbkumar at gmail.com
Fri Dec 28 22:19:20 CET 2012


Klaus,

You're welcome.

I think AH is only needed if you intend to support that mode. ESP should be
good enough for the case you described.

As to NAT-T, yes, if both sides play well -- which seems to be the case in
your case -- use it alleviates the firewall issues you might otherwise face.

Thanks,
Bharath Kumar




On Fri, Dec 28, 2012 at 11:11 AM, Klaus Darilion <
klaus.mailinglists at pernau.at> wrote:

>
>
> On 28.12.2012 16:34, Bharath Kumar wrote:
>
>> Klaus,
>>
>> The firewall on either end could be blocking ESP traffic (IP Protocol =
>> 50) and that's where forcing NAT-T would help.
>>
>
> Indeed, I was blocking ESP on the server side. I allowed now ESP and it
> works fine now.
>
> Btw: do I also have to allow AH (ip proto 51)? If I understand correctly,
> IPsec tunnel mode only requires ESP.
>
>
> > Have you tried setting
>
>> this in ipsec.conf?
>>       forceencaps=true
>>
>
> This also helped.
>
> I think I will stay with "force NAT traversal" to avoid problems with ESP
> blocking firewalls on the client side.
>
>
> Thanks for the fast response,
> Klaus
>
>
>
>> The traffic in the log file seems to be for Dead Peer Detection.
>>
>> Thanks,
>> Bharath Kumar
>>
>> On Friday, December 28, 2012, Klaus Darilion wrote:
>>
>>     Hi!
>>
>>     I have setup strongSwan 5.0.1 with certificate authentication. The
>>     tunnel creation works fine, and if the iPhone is behind NAT,
>>     strongSwan detects the NAT, uses port 4500 and everything works fine.
>>
>>     But if the iPhone is not behind NAT, the tunnel creation works fine,
>>     but then, if I want to surf on the iPhone it does not work. Attached
>>     is the output of "tail -f /var/log/syslog|grep charon" multiplexed
>>     with "tcpdump -i any -n port 500 or 4500 or host 192.168.102.2":
>>
>>     There is some traffic after the tunnel is created, but what kind of
>>     traffic is this? "real" traffic or some "keep alive" traffic?
>>
>>     Any ideas why it does not work when the client uses a public IP
>> address?
>>
>>     Is it possible to force "NAT" behavior also if clients are not
>>     behind NAT?
>>
>>     Any hints are appreciated.
>>
>>     Thanks
>>     Klaus
>>
>>
>>     # ipsec.conf - strongSwan IPsec configuration file
>>     ##############################**__####################
>>
>>     config setup
>>              charondebug=all
>>
>>     conn RoadWarrior-CiscoIPsec-klaus
>>              type=tunnel
>>              dpdaction=clear
>>              dpddelay=60
>>              dpdtimeout=60
>>              keyexchange=ikev1
>>              authby=xauthrsasig
>>              xauth=server
>>              left=%defaultroute
>>              leftsubnet=0.0.0.0/0 <http://0.0.0.0/0>
>>
>>              leftfirewall=yes
>>              leftcert=serverCert.pem
>>              right=%any
>>              rightsourceip=192.168.102.2
>>              rightcert=clientCert.pem
>>              auto=add
>>
>>
>>     # strongswan.conf - strongSwan configuration file
>>     ##############################**__###################
>>
>>     charon {
>>              threads = 16
>>              dns1=192.168.99.1
>>     }
>>
>>
>>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.strongswan.org/pipermail/users/attachments/20121228/5a55e3ce/attachment.html>


More information about the Users mailing list