[strongSwan] %defaultroute resolves to link-local address
Simon Deziel
simon.deziel at gmail.com
Thu Jul 4 20:48:20 CEST 2013
Hi Daniel
On 13-07-04 10:30 AM, Daniel Pocock wrote:
>
> I have v5.0.0 on OpenWRT (using the binary packages) and v4.5.2 on Debian
>
> It works fine for IPv4
>
> Then I tried to make OpenWRT connect to the Debian server on IPv6
>
> The OpenWRT router initiating the connection has a PPPoE connection with
> only a link-local address.
>
> There is a routable IPv6 address on the internal ethernet though.
> left=%defaultroute tries to use the link-local address as source address
> and consequently it fails to bring up the connection.
>
> If I manually put an extra routable address on the PPPoE interface,
> strongSwan uses that instead.
>
> However, it doesn't get much further, tcpdump shows it retrying. This
> was captured on the VPN gateway receiving connection, so I know that the
> packets are getting through:
>
> 14:09:28.263105 IP6 SOURCENET::2.500 > DESTNET::6.500: isakmp: parent_sa
> ikev2_init[I]
> 14:09:28.297420 IP6 DESTNET::6.500 > SOURCENET::2.500: isakmp: parent_sa
> ikev2_init[R]
> 14:09:28.907202 IP6 SOURCENET::2 > DESTNET::6: frag (0|1400) 4500 >
> 4500: NONESP-encap: isakmp: child_sa ikev2_auth[I]
> 14:09:28.907442 IP6 SOURCENET::2 > DESTNET::6: frag (1400|352)
> 14:09:32.908541 IP6 SOURCENET::2 > DESTNET::6: frag (0|1400) 4500 >
> 4500: NONESP-encap: isakmp: child_sa ikev2_auth[I]
> 14:09:32.908793 IP6 SOURCENET::2 > DESTNET::6: frag (1400|352)
> 14:09:40.108915 IP6 SOURCENET::2 > DESTNET::6: frag (0|1400) 4500 >
> 4500: NONESP-encap: isakmp: child_sa ikev2_auth[I]
> 14:09:40.109216 IP6 SOURCENET::2 > DESTNET::6: frag (1400|352)
> 14:09:53.069743 IP6 SOURCENET::2 > DESTNET::6: frag (0|1400) 4500 >
> 4500: NONESP-encap: isakmp: child_sa ikev2_auth[I]
> 14:09:53.070185 IP6 SOURCENET::2 > DESTNET::6: frag (1400|352)
> 14:10:06.802214 IP6 DESTNET::6 > SOURCENET::2: ICMP6, time exceeded
> in-transit (reassembly), length 1240
I ran into the same issue when moving from PSK to certificates. This
made the packets too big to avoid fragmentation. I managed to workaround
this by installing all the certs on both sides and using this in my conn
stanza:
conn foo
# Sending cert leads to too big packets requiring
# fragmentation (not optimal in IPv6).
leftsendcert=never
rightsendcert=never
HTH,
Simon
More information about the Users
mailing list