[strongSwan] Frequent rekey causes lost tunnel after about 30 minutes

Ruel, Ryan rruel at akamai.com
Wed May 6 12:27:17 CEST 2015


Any suggestions on this?

Is it necessary to run DPD and set the “dpdaction” and “closeaction” to restart in order to maintain long lived connections?

I’m now finding that even with normal rekey intervals, if I leave the tunnel up for a long period of time (even with traffic), I find that it’s gone the next day.

/Ryan

From: Ryan Ruel
Date: Monday, May 4, 2015 at 7:50 PM
To: "users at lists.strongswan.org<mailto:users at lists.strongswan.org>"
Subject: [strongSwan] Frequent rekey causes lost tunnel after about 30 minutes

I’ve been performing some rekey testing, and purposely configured low lifetimes to force rekey’s to happen frequently in order to test the system.

I’m seeing that any rekey values less than 10m or so winds up causing issues, such as tunnels completely down, or the outbound SA deleted on one side (but the inbound SA remains).

I’ve just ran a test with two back to back Linux machines running 5.2.2.  In this case, I’m running the tunnel as transport mode over a GRE tunnel, but the problem seems to happen without the GRE tunnel as well:

conn b2b
    left=198.168.73.101
    leftsubnet=198.168.73.101/32[gre]
    leftid=198.168.73.101
    right=198.168.73.102
    rightsubnet=198.168.73.102/32[gre]
    rightid=198.168.73.102
    ike=aes-128-sha1-modp2048
    esp=null-sha256-noesn!
    type=transport
    auto=add

conn b2b
    left=198.168.73.102
    leftsubnet=198.168.73.102/32[gre]
    leftid=198.168.73.102
    right=198.168.73.101
    rightsubnet=198.168.73.101/32[gre]
    rightid=198.168.73.101
    ike=aes-128-sha1-modp2048
    esp=null-sha256-noesn!
    type=transport
    auto=add

I brought up the tunnel and left it running.  When I came back about 30 minutes later, both machines show:

Every 2.0s: setkey -D                                                                           Mon May  4 23:44:54 2015

No SAD entries.

I noticed this in one of the logs:
May  4 23:25:54 a198-168-73-102 charon: 04[IKE] initiator did not reauthenticate as requested
May  4 23:25:54 a198-168-73-102 charon: 04[IKE] reauthenticating IKE_SA b2b[5] actively

And the other side seems to be scheduling a re-auth event earlier:
May  4 23:15:54 a198-168-73-101 charon: 10[IKE] scheduling reauthentication in 600s
May  4 23:15:54 a198-168-73-101 charon: 10[IKE] maximum IKE_SA lifetime 600s
May  4 23:15:54 a198-168-73-101 charon: 10[IKE] received AUTH_LIFETIME of 600s, reauthentication already scheduled in 600s

Any ideas?  Is the reauth to blame?

I know this lifetime is unusually short, but I’m concerned that the same type of rekey issue may happen if I let the system run for much longer periods of time.

Thanks!

/Ryan
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.strongswan.org/pipermail/users/attachments/20150506/e687b228/attachment.html>


More information about the Users mailing list