[strongSwan] FW: ikev2 vpn using PKI auth with a Blackberry Z10

G. B. gawd0wns at hotmail.com
Wed Sep 18 13:40:45 CEST 2013


> As suggested in my previous mail, you should check if the hosts on the
> LAN have a route to return packets to the IPsec clients.

Thanks for your prompt reply.  I have strongswan running on my lan router, which is acting as a gateway, dhcp server to the entire network.  I have not manually added any routes, because as I understood the documentation on forwarding, no manually added routes were required - "The virtual IPs are from a distinct subnet: If the VPN gateway is the default gateway of the accessed LAN nothing special has to be done." (http://wiki.strongswan.org/projects/strongswan/wiki/ForwardingAndSplitTunneling).  


> Are you using the default updown script to install these rules? Adding
> some debug logs to your script might help.

I am running the default scripts that came with the strongswan package.


>What does "ipsec statusall" show when such a tunnel is up?

Status of IKE charon daemon (strongSwan 5.0.4, Linux 2.6.22.19, mips):
  uptime: 7 minutes, since Sep 18 07:58:25 2013
  malloc: sbrk 221184, mmap 0, used 187616, free 33568
  worker threads: 3 of 16 idle, 12/1/0/0 working, job queue: 0/0/0/0, scheduled: 2
  loaded plugins: charon test-vectors curl ldap mysql sqlite pkcs11 aes des blowfish sha1 sha2 md4 md5 random nonce x509 revocation constraints pubkey pkcs1 pkcs8 pgp dnskey pem openssl gcrypt fips-prf gmp agent xcbc cmac hmac ctr ccm gcm attr kernel-pfkey kernel-klips kernel-netlink resolve socket-default socket-dynamic farp stroke smp updown eap-identity eap-md5 eap-mschapv2 xauth-generic xauth-eap dhcp whitelist led duplicheck addrblock unity
Virtual IP pools (size/online/offline):
  10.10.10.0/24: 254/1/0
Listening IP addresses:
  99.234.220.200
  192.168.16.50
Connections:
         z10:  myhost.com...%any  IKEv2
         z10:   local:  [C=CA, O=none, CN=server] uses public key authentication
         z10:    cert:  "C=CA, O=none, CN=server"
         z10:   remote: [C=CA, O=none, CN=z10] uses public key authentication
         z10:   child:  0.0.0.0/24 === dynamic TUNNEL
Security Associations (1 up, 0 connecting):
         z10[2]: ESTABLISHED 7 minutes ago, 99.234.220.200[C=CA, O=none, CN=server]...24.114.94.100[C=CA, O=none, CN=z10]
         z10[2]: IKEv2 SPIs: ddf237166cae8ed5_i fb3ef59124377fba_r*, public key reauthentication in 48 minutes
         z10[2]: IKE proposal: AES_CBC_256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_2048
         z10{1}:  INSTALLED, TUNNEL, ESP in UDP SPIs: c7133340_i d518991a_o
         z10{1}:  AES_CBC_256/HMAC_SHA2_256_128, 0 bytes_i, 0 bytes_o, rekeying in 6 minutes
         z10{1}:   0.0.0.0/24 === 10.10.10.1/32

The only thing I can see coming through the tunnel are keep-alive requests.

> Subject: Re: [strongSwan] FW: ikev2 vpn using PKI auth with a Blackberry Z10
> From: martin at strongswan.org
> To: gawd0wns at hotmail.com
> CC: users at lists.strongswan.org
> Date: Wed, 18 Sep 2013 10:23:18 +0200
> 
> Hi,
> 
> > Tcpdump is clearly showing the packets making their way to the client
> > (on my wan and lan), though I do not see anything coming back in
> > return.
> 
> As suggested in my previous mail, you should check if the hosts on the
> LAN have a route to return packets to the IPsec clients.
> 
> > Why did strongswan insert these rules
> 
> Because you have defined leftfirewall=yes or leftupdown?
> 
> > and what do they mean?
> 
> These rules enable forwarding of traffic coming in / going out of the
> tunnel should you have a DROP policy.
> 
> > Neither my client device or my strongswan server are on the
> > 67.215.65.0/24 ip range.  I have no idea where strongswan is getting
> > this 67.xxx network range.
> 
> Are you using the default updown script to install these rules? Adding
> some debug logs to your script might help.
> 
> What does "ipsec statusall" show when such a tunnel is up?
> 
> Regards
> Martin
> 
 		 	   		  
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.strongswan.org/pipermail/users/attachments/20130918/bbf3a350/attachment.html>


More information about the Users mailing list