[strongSwan] Output hangs, eventually completes
John Emerson
jemerson at irise.com
Wed Oct 22 19:10:13 CEST 2014
Martin,
Here are my log files when I got another occurrence of the hang. ‘reauth=no’ for both client and server.
The clocks are synced on the boxes.
Unfortunately, the logs don’t seem to provide much help. At 16:44:43, I executed ‘ps -ef’ on the server.
It’s now 17:06:41 and I still don’t see all the output.
SERVER:
Oct 22 16:44:07 vpn-server charon: 01[IKE] sending keep alive to AA.AAA.AA.A[57135]
Oct 22 16:44:07 vpn-server charon: 10[NET] sending packet: from 10.0.0.6[4500] to AA.AAA.AA.A[57135]
Oct 22 16:44:27 vpn-server charon: 02[IKE] sending keep alive to AA.AAA.AA.A[57135]
Oct 22 16:44:27 vpn-server charon: 10[NET] sending packet: from 10.0.0.6[4500] to AA.AAA.AA.A[57135]
Oct 22 16:44:47 vpn-server charon: 12[IKE] sending keep alive to AA.AAA.AA.A[57135]
Oct 22 16:44:47 vpn-server charon: 10[NET] sending packet: from 10.0.0.6[4500] to AA.AAA.AA.A[57135]
Oct 22 16:45:31 vpn-server charon: 06[IKE] sending keep alive to AA.AAA.AA.A[57135]
CLIENT:
Oct 22 16:44:25 vpn-client charon: 13[IKE] sending keep alive to BB.BBB.BBB.BB[4500]
Oct 22 16:44:25 vpn-client charon: 10[NET] sending packet: from CCC.CC.CCC.CCC[4500] to BB.BBB.BBB.BB[4500]
Oct 22 16:44:29 vpn-client charon: 11[IKE] sending keep alive to DD.DDD.DDD.DDD[4500]
Oct 22 16:44:29 vpn-client charon: 10[NET] sending packet: from CCC.CC.CCC.CCC[4500] to DD.DDD.DDD.DDD[4500]
Oct 22 16:44:45 vpn-client charon: 03[IKE] sending keep alive to BB.BBB.BBB.BB[4500]
Oct 22 16:44:45 vpn-client charon: 10[NET] sending packet: from CCC.CC.CCC.CCC[4500] to BB.BBB.BBB.BB[4500]
Oct 22 16:44:49 vpn-client charon: 15[IKE] sending keep alive to DD.DDD.DDD.DDD[4500]
Oct 22 16:44:49 vpn-client charon: 10[NET] sending packet: from CCC.CC.CCC.CCC[4500] to DD.DDD.DDD.DDD[4500]
Oct 22 16:45:05 vpn-client charon: 06[IKE] sending keep alive to BB.BBB.BBB.BB[4500]
Oct 22 16:45:05 vpn-client charon: 10[NET] sending packet: from CCC.CC.CCC.CCC[4500] to BB.BBB.BBB.BB[4500]
Oct 22 16:45:09 vpn-client charon: 14[IKE] sending keep alive to DD.DDD.DDD.DDD[4500]
Oct 22 16:45:09 vpn-client charon: 10[NET] sending packet: from CCC.CC.CCC.CCC[4500] to DD.DDD.DDD.DDD[4500]
SERVER CONFIG:
config setup
# strictcrlpolicy=yes
# uniqueids = no
charondebug="ike 3,cfg 3, dmn 3, ike 3, net 3"
# Add connections here.
# Sample VPN connections
conn %default
ikelifetime=60m
keylife=20m
rekeymargin=3m
keyingtries=1
keyexchange=ikev2
reauth=no
conn rw
left=10.0.0.6
leftid=bastion-host-us-west-1b
leftcert=vpnHostCert.pem
leftsubnet=10.0.0.0/16
leftfirewall=yes
right=%any
rightsourceip=10.100.255.0/28
auto=add
CLIENT CONFIG:
# ipsec.conf - strongSwan IPsec configuration file
# basic configuration
config setup
# strictcrlpolicy=yes
# uniqueids = no
charondebug="ike 3,cfg 3, dmn 3, ike 3, net 3"
# Add connections here.
conn %default
keyexchange=ikev2
left=%any
leftsourceip=%config
leftid=jemerson at iRise.com
leftfirewall=yes
leftcert=JEmersonCert.pem
reauth=no
auto=start
conn vpn1
right=DD.DDD.DDD.DDD
rightsubnet=10.0.0.0/28
rightid=vpn-server-1b
rightcert=vpnHostCert-1b.pem
conn vpn2
right=BB.BBB.BBB.BB
rightsubnet=10.0.0.16/28
rightid=vpn-server-1c
rightcert=vpnHostCert-1c.pem
> On Oct 20, 2014, at 12:14 AM, Martin Willi <martin at strongswan.org> wrote:
>
> Hi,
>
>> I have modified both sides of the VPN with ‘reauth=no’ and the problem persists.
>
>> Oct 15 19:51:40 CloudOpsVpns charon: 12[IKE] IKE_SA vpn1[23] established between AAA.AA.AAA.AAA[dkaufman at iRise.com]...BB.BBB.BBB.BBB[host-us-west-1b]
>> Oct 15 19:51:40 CloudOpsVpns charon: 12[IKE] scheduling rekeying in 9787s
>> Oct 15 19:51:40 CloudOpsVpns charon: 12[IKE] maximum IKE_SA lifetime 10327s
>> Oct 15 19:51:40 CloudOpsVpns charon: 12[IKE] installing new virtual IP 10.100.255.2
>> Oct 15 19:51:40 CloudOpsVpns charon: 12[IKE] CHILD_SA vpn1{1} established with SPIs cb5d4d03_i c25d94db_o and TS 10.100.255.2/32 === 10.0.0.0/28
>> Oct 15 19:51:40 CloudOpsVpns charon: 12[IKE] received AUTH_LIFETIME of 3381s, scheduling reauthentication in 2841s
>
> In this log I see a re-authentication procedure. After establishing the
> IKE_SA, the local host schedules re-authentication because it received
> an AUTH_LIFETIME notify from the responder. So it looks like
> re-authentication is still enabled on the peer.
>
> Regards
> Martin
>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: smime.p7s
Type: application/pkcs7-signature
Size: 1821 bytes
Desc: not available
URL: <http://lists.strongswan.org/pipermail/users/attachments/20141022/607f65cb/attachment.bin>
More information about the Users
mailing list