[strongSwan] Cisco IOS flexvpn client with sVTI, create child SA every minute.

Igor j at owind.com
Mon Jul 6 15:40:17 CEST 2015


Hi list,

I'm using Strongswan 5.3.2 and CSR 1000v 3.14, got a flexvpn client
with sVTI tunnel interface, but it keeps creating child SA every 60s,
like below. Any suggestion? Thanks.

P.S. The logs from several different test cases.

Strongswan log:

Jul  6 20:27:38 08[NET] received packet: from x.x.x.x.x[500] to
y.y.y.y[500] (256 bytes)

Jul  6 20:27:38 08[ENC] parsed CREATE_CHILD_SA request 9 [ SA No KE TSi TSr ]

Jul  6 20:27:38 08[IKE] CHILD_SA IOS{12} established with SPIs
cac35673_i 086a1ade_o and TS 0.0.0.0/0 === 10.0.0.0/8

Jul  6 20:27:38 08[ENC] generating CREATE_CHILD_SA response 9 [ SA No
KE TSi TSr ]

Jul  6 20:27:38 08[NET] sending packet: from y.y.y.y[500] to
x.x.x.x.x[500] (272 bytes)

Jul  6 20:28:38 10[NET] received packet: from x.x.x.x.x[500] to
y.y.y.y[500] (256 bytes)

Jul  6 20:28:38 10[ENC] parsed CREATE_CHILD_SA request 10 [ SA No KE TSi TSr ]

Jul  6 20:28:38 10[IKE] CHILD_SA IOS{13} established with SPIs
ccc856f5_i 70094df2_o and TS 0.0.0.0/0 === 10.0.0.0/8

Jul  6 20:28:38 10[ENC] generating CREATE_CHILD_SA response 10 [ SA No
KE TSi TSr ]

Jul  6 20:28:38 10[NET] sending packet: from y.y.y.y[500] to
x.x.x.x.x[500] (272 bytes)


IOS debug log:

*Jul  6 11:56:04.061: IPSEC(sa_request): ,

  (key eng. msg.) OUTBOUND local= x.x.x.x.x:500, remote= y.y.y.y:500,

    local_proxy= 0.0.0.0/0.0.0.0/256/0,

    remote_proxy= 0.0.0.0/0.0.0.0/256/0,

    protocol= ESP, transform= esp-gcm  (Tunnel),

    lifedur= 86400s and 4608000kb,

    spi= 0x0(0), conn_id= 0, keysize= 128, flags= 0x0

*Jul  6 11:56:04.061: IKEv2:Searching Policy with fvrf 0, local
address x.x.x.x.x

*Jul  6 11:56:04.061: IKEv2:Using the Default Policy for Proposal

*Jul  6 11:56:04.061: IKEv2:Found Policy 'default'

*Jul  6 11:56:04.061: IKEv2:(SESSION ID = 1,SA ID = 1):Check for IPSEC rekey

*Jul  6 11:56:04.061: IKEv2:(SESSION ID = 1,SA ID = 1):Set IPSEC DH group

*Jul  6 11:56:04.061: IKEv2:(SESSION ID = 1,SA ID = 1):Checking for
PFS configuration

*Jul  6 11:56:04.061: IKEv2:(SESSION ID = 1,SA ID = 1):PFS configured,
DH group 19

*Jul  6 11:56:04.061: IKEv2:(SESSION ID = 1,SA ID = 1):[IKEv2 ->
Crypto Engine] Computing DH public key, DH Group 19

*Jul  6 11:56:04.062: IKEv2:(SA ID = 1):[Crypto Engine -> IKEv2] DH
key Computation PASSED

*Jul  6 11:56:04.062: IKEv2:(SESSION ID = 1,SA ID = 1):Request queued
for computation of DH key

*Jul  6 11:56:04.062: IKEv2:(SESSION ID = 1,SA ID = 1):Generating
CREATE_CHILD_SA exchange

*Jul  6 11:56:04.062: IKEv2:(SESSION ID = 1,SA ID = 1):ESP Proposal:
1, SPI size: 4 (IPSec negotiation),

Num. transforms: 3

   AES-GCM   DH_GROUP_256_ECP/Group 19   Don't use ESN

*Jul  6 11:56:04.062: IKEv2:(SESSION ID = 1,SA ID = 1):Building packet
for encryption.

Payload contents:

 SA N KE TSi TSr

*Jul  6 11:56:04.062: IKEv2:(SESSION ID = 1,SA ID = 1):Checking if
request will fit in peer window


*Jul  6 11:56:04.063: IKEv2:(SESSION ID = 1,SA ID = 1):Sending Packet
[To y.y.y.y:500/From x.x.x.x.x:500/VRF i0:f0]

Initiator SPI : 35F67CE104837269 - Responder SPI : 9FA0E76515EFD5EE
Message id: 5

IKEv2 CREATE_CHILD_SA Exchange REQUEST

Payload contents:

 ENCR



Stongswan conf:

conn IOS
        type=tunnel
        keyexchange=ikev2
        auto=start
        ike=aes128gcm16
        esp=aes128gcm16-ecp256,aes256gcm16-ecp384!
        left=%defaultroute
        leftid=a285l.domain.com
        leftsubnet=0.0.0.0/0
        leftauth=pubkey
        leftcert=gw.cer
        right=%any
        rightsendcert=never
        rightid=IOS
        rightauth=eap-radius
        eap_identity=%identity
        rightsourceip=10.16.100.0/24
        rightsubnet=10.0.0.0/8
        ikelifetime=1440m
        lifetime=1440m
        keylife=60s
        rekeymargin=3m
        keyingtries=1
        rekey=no
        reauth=no


IOS config:

crypto ikev2 profile g3pf

 match identity remote fqdn a285l.domain.com

 identity local fqdn IOS

 authentication remote rsa-sig

 authentication local eap md5 username test password pass

 pki trustpoint pca

!

crypto ikev2 client flexvpn ff

  peer 1 xx.x.x.x

  peer reactivate

  client connect Tunnel0

crypto ipsec transform-set TSPFS esp-gcm

 mode tunnel

!

!

crypto ipsec profile g3ipf

 set transform-set TSPFS

 set ikev2-profile g3pf


interface Tunnel0

 ip address negotiated

 ip tcp adjust-mss 1200

 tunnel source Dialer1

 tunnel mode ipsec ipv4

 tunnel destination dynamic

 tunnel protection ipsec profile g3ipf

!



CSR#do sh cry ike se

 IPv4 Crypto IKEv2 Session


Session-id:2, Status:UP-ACTIVE, IKE count:1, CHILD count:39


Tunnel-id Local                 Remote                fvrf/ivrf
    Status

1         x.1.x.x4/500      y.y.y.y/500    none/none            READY

      Encr: AES-CBC, keysize: 128, PRF: MD5, Hash: MD596, DH Grp:5,
Auth sign: EAP, Auth verify: RSA

      Life/Active Time: 86400/2339 sec

Child sa: local selector  10.0.0.0/0 - 10.255.255.255/65535

          remote selector 0.0.0.0/0 - 255.255.255.255/65535

          ESP spi in/out: 0x3EC54188/0xC60050F4

Child sa: local selector  10.0.0.0/0 - 10.255.255.255/65535

          remote selector 0.0.0.0/0 - 255.255.255.255/65535

          ESP spi in/out: 0xFC4FB0E8/0xC931F3F8

Child sa: local selector  10.0.0.0/0 - 10.255.255.255/65535

          remote selector 0.0.0.0/0 - 255.255.255.255/65535

          ESP spi in/out: 0x92AEB325/0xCC4160B7

Child sa: local selector  10.0.0.0/0 - 10.255.255.255/65535

          remote selector 0.0.0.0/0 - 255.255.255.255/65535

          ESP spi in/out: 0x63C48FE4/0xCC8E3FA3



Bests,
-Igor


More information about the Users mailing list