[strongSwan] Frequent rekey causes lost tunnel after about 30 minutes
rruel at akamai.com
Tue May 5 01:50:41 CEST 2015
I’ve been performing some rekey testing, and purposely configured low lifetimes to force rekey’s to happen frequently in order to test the system.
I’m seeing that any rekey values less than 10m or so winds up causing issues, such as tunnels completely down, or the outbound SA deleted on one side (but the inbound SA remains).
I’ve just ran a test with two back to back Linux machines running 5.2.2. In this case, I’m running the tunnel as transport mode over a GRE tunnel, but the problem seems to happen without the GRE tunnel as well:
I brought up the tunnel and left it running. When I came back about 30 minutes later, both machines show:
Every 2.0s: setkey -D Mon May 4 23:44:54 2015
No SAD entries.
I noticed this in one of the logs:
May 4 23:25:54 a198-168-73-102 charon: 04[IKE] initiator did not reauthenticate as requested
May 4 23:25:54 a198-168-73-102 charon: 04[IKE] reauthenticating IKE_SA b2b actively
And the other side seems to be scheduling a re-auth event earlier:
May 4 23:15:54 a198-168-73-101 charon: 10[IKE] scheduling reauthentication in 600s
May 4 23:15:54 a198-168-73-101 charon: 10[IKE] maximum IKE_SA lifetime 600s
May 4 23:15:54 a198-168-73-101 charon: 10[IKE] received AUTH_LIFETIME of 600s, reauthentication already scheduled in 600s
Any ideas? Is the reauth to blame?
I know this lifetime is unusually short, but I’m concerned that the same type of rekey issue may happen if I let the system run for much longer periods of time.
-------------- next part --------------
An HTML attachment was scrubbed...
More information about the Users