[strongSwan] Netlink error Invalid Argument(22)
A Lee
aganguly14 at gmail.com
Mon Sep 16 15:44:20 CEST 2013
Hi,
I have been trying to setup a ikev1 tunnel with ESP and authentication
algorithm SHA256.
The IKE tunnel is being created fine. But in quick mode exchange when it
receives the packet with Authentication algorithm as SHA256 (attribute
value 5), this error is happening.
According to strong swan documentation sha256 is supported.
Can anybody help me out with this one?
I am pasting portion of pluto log and also the ipsec.conf file.
PLUTO-LOG
------------------
HASH(2) computed:
| af da 55 9b 5f 40 52 a8 b8 75 b3 04 67 c1 ec 1b
| 39 bc 5c ca 96 ae c1 10 4b fe bb d1 2f ea f6 27
| kernel_alg_esp_enc_keylen(): alg_id=3, keylen=24
| kernel_alg_esp_auth_keylen(auth=5, sadb_aalg=5): a_keylen=32
| KEYMAT computed:
| a4 85 19 78 5c a1 b7 2b b2 f4 ce ac fd 50 6e 12
| f5 dc 18 9a ac fc 2d 38 08 da ba 4d 80 40 2e f3
| b8 50 7a 33 2b 96 9b 3e 6a ff c1 9a f5 6e d1 20
| 20 72 6e d7 7f d9 66 15
| install_inbound_ipsec_sa() checking if we can route
| route owner of "conn1" unrouted: NULL; eroute owner: NULL
| kernel_alg_esp_info():transid=3, auth=5, ei=0x80b7ae8, enckeylen=24,
authkeylen=32, encryptalg=3, authalg=5
| adding SAD entry with SPI c5ad47ee and reqid {16384}
| using encryption algorithm 3DES_CBC with key size 192
| using integrity algorithm HMAC_SHA2_256_128 with key size 256
| sending XFRM_MSG_UPDSA: => 440 bytes @ 0xbff65fd8
0: B8 01 00 00 1A 00 05 00 CA 00 00 00 12 24 00 00 .............$..
16: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
32: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
48: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
64: 00 00 00 00 00 00 00 00 0A 0A 0A 14 00 00 00 00 ................
80: 00 00 00 00 00 00 00 00 C5 AD 47 EE 32 00 00 00 ..........G.2...
96: 0A 0A 0A 32 00 00 00 00 00 00 00 00 00 00 00 00 ...2............
112: FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF ................
128: FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF ................
144: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
160: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
176: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
192: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
208: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
224: 00 40 00 00 02 00 01 20 20 00 00 00 60 00 02 00 . at ..... ...`...
240: 64 65 73 33 5F 65 64 65 00 00 00 00 00 00 00 00 des3_ede........
256: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
272: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
288: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
304: C0 00 00 00 A4 85 19 78 5C A1 B7 2B B2 F4 CE AC .......x\..+....
320: FD 50 6E 12 F5 DC 18 9A AC FC 2D 38 6C 00 14 00 .Pn.......-8l...
336: 68 6D 61 63 28 73 68 61 32 35 36 29 00 00 00 00 hmac(sha256)....
352: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
368: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
384: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
400: 00 01 00 00 80 00 00 00 08 DA BA 4D 80 40 2E F3 ...........M. at ..
416: B8 50 7A 33 2B 96 9B 3E 6A FF C1 9A F5 6E D1 20 .Pz3+..>j....n.
432: 20 72 6E D7 7F D9 66 15 rn...f.
received netlink error: Invalid argument (22)
unable to add SAD entry with SPI c5ad47ee
| state transition function for STATE_QUICK_R0 had internal error
| next event EVENT_SO_DISCARD in 0 seconds for #2
|
| *time to handle event
| event after this is EVENT_SA_REPLACE in 1165 seconds
| ICOOKIE: 85 22 00 00 85 22 00 00
| RCOOKIE: 3b 12 6a 76 de 5f 2c 0c
| peer: 0a 0a 0a 32
| state hash entry 22
| next event EVENT_SA_REPLACE in 1165 seconds for #1
| received a XFRM_MSG_EXPIRE
|
ipsec.conf
----------------
config setup
interfaces="ipsec0=eth1"
klipsdebug=all
uniqueids=yes
charonstart=no
plutodebug=all
plutostart=yes
plutostderrlog="/etc/pluto.log"
conn %default
ikelifetime=20m
keylife=10m
rekeymargin=1m
keyingtries=1
forceencaps=yes
reauth=no
mobike=no
conn conn1
type=tunnel
left=10.10.10.20
leftid=%any
leftsubnet=20.0.2.20/32
right=10.10.10.50
rightid=%any
pfs=no
pfsgroup=modp1024
ike=3des-sha256-modp1024
esp=3des-sha256-modp1024
auto=add
auth=esp
authby=secret
keyexchange=ikev1
Thanks and Regards,
Avishek Ganguly
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.strongswan.org/pipermail/users/attachments/20130916/faddaa66/attachment.html>
More information about the Users
mailing list