[strongSwan] Connection established but no traffic coming for auto=route

abi abi at abinet.ru
Thu Aug 25 09:11:22 CEST 2016


Hello, 

I have generic road warrior setup with virtual IPs between FreeBSD 10.2
server and FreeBSD 11-RC1 laptop. The issue is if I set client to
start=route connection is established, but no traffic coming through
tunnel (hooks are installed, so it just times outs). The very same
config is working flawlessly with  auto=start 

Client config: 

conn abinet
        keyexchange=ikev2
        authby=pubkey
        left=%any
        leftsourceip=%config
        leftid="xxx"
        leftcert=ipsec-sphinx-cert.pem
        right=xxx
        rightid="xxx"
        rightsubnet=0.0.0.0/0
        ikelifetime = 24h
        rekey=yes
        fragmentation=yes
        lifetime = 60m
        dpdaction=restart
        auto=start <- route here is not working. 

Logs for auto=route (not working tunnel) 

Aug 25 16:31:58 sphinx doas: xxx ran command service strongswan
onerestart as root from /home/xxx
Aug 25 16:31:58 sphinx charon: 00[DMN] signal of type SIGINT received.
Shutting down
Aug 25 16:31:58 sphinx charon: 00[IKE] deleting IKE_SA xxx[1] between
192.168.43.190[C=RU, O=xxx, CN=sphinx.xxx]...xxx[C=RU, O=xxx, CN=xxx]
Aug 25 16:31:58 sphinx charon: 00[IKE] sending DELETE for IKE_SA xxx[1]
Aug 25 16:31:58 sphinx charon: 00[ENC] generating INFORMATIONAL request
2 [ D ]
Aug 25 16:31:58 sphinx charon: 00[NET] sending packet: from
192.168.43.190[4500] to xxx[4500] (76 bytes)
Aug 25 16:31:58 sphinx charon: 00[IKE] removing DNS server 10.0.10.1 via
resolvconf
Aug 25 16:31:58 sphinx charon: 02[KNL] interface tun0 deactivated
Aug 25 16:31:58 sphinx ipsec_starter[8492]: charon stopped after 200 ms
Aug 25 16:31:58 sphinx ipsec_starter[8492]: ipsec starter stopped
Aug 25 16:32:01 sphinx ipsec_starter[53226]: Starting strongSwan 5.5.0
IPsec [starter]...
Aug 25 16:32:01 sphinx ipsec_starter[53226]: no netkey IPsec stack
detected
Aug 25 16:32:01 sphinx ipsec_starter[53226]: no KLIPS IPsec stack
detected
Aug 25 16:32:01 sphinx ipsec_starter[53226]: no known IPsec stack
detected, ignoring!
Aug 25 16:32:01 sphinx charon: 00[DMN] Starting IKE charon daemon
(strongSwan 5.5.0, FreeBSD 11.0-RC1, amd64)
Aug 25 16:32:01 sphinx charon: 00[NET] could not open socket: Address
family not supported by protocol family
Aug 25 16:32:01 sphinx charon: 00[NET] could not open IPv6 socket, IPv6
disabled
Aug 25 16:32:01 sphinx charon: 00[CFG] loading ca certificates from
'/usr/local/etc/ipsec.d/cacerts'
Aug 25 16:32:01 sphinx charon: 00[CFG]   loaded ca certificate "C=RU,
O=xxx, CN=xxx CA" from
'/usr/local/etc/ipsec.d/cacerts/ipsec-ca-cert.pem'
Aug 25 16:32:01 sphinx charon: 00[CFG] loading aa certificates from
'/usr/local/etc/ipsec.d/aacerts'
Aug 25 16:32:01 sphinx charon: 00[CFG] loading ocsp signer certificates
from '/usr/local/etc/ipsec.d/ocspcerts'
Aug 25 16:32:01 sphinx charon: 00[CFG] loading attribute certificates
from '/usr/local/etc/ipsec.d/acerts'
Aug 25 16:32:01 sphinx charon: 00[CFG] loading crls from
'/usr/local/etc/ipsec.d/crls'
Aug 25 16:32:01 sphinx charon: 00[CFG] loading secrets from
'/usr/local/etc/ipsec.secrets'
Aug 25 16:32:01 sphinx charon: 00[CFG]   loaded RSA private key from
'/usr/local/etc/ipsec.d/private/ipsec-sphinx-key.pem'
Aug 25 16:32:01 sphinx charon: 00[LIB] loaded plugins: charon aes des
blowfish rc2 sha2 sha1 md4 md5 random nonce x509 revocation constraints
pubkey pkcs1 pkcs7 pkcs8 pkcs12 pgp dnskey sshkey pem openssl fips-prf
xcbc cmac hmac attr kernel-pfkey kernel-pfroute resolve socket-default
stroke updown eap-identity eap-md5 eap-mschapv2 eap-tls eap-ttls
eap-peap whitelist addrblock
Aug 25 16:32:01 sphinx charon: 00[JOB] spawning 16 worker threads
Aug 25 16:32:01 sphinx ipsec_starter[53281]: charon (53282) started
after 40 ms
Aug 25 16:32:01 sphinx charon: 05[CFG] received stroke: add connection
'xxx'
Aug 25 16:32:01 sphinx charon: 05[CFG]   loaded certificate "C=RU,
O=xxx, CN=sphinx.xxx" from 'ipsec-sphinx-cert.pem'
Aug 25 16:32:01 sphinx charon: 05[CFG] added configuration 'xxx'
Aug 25 16:32:01 sphinx charon: 05[CFG] received stroke: route 'xxx'
Aug 25 16:32:01 sphinx ipsec_starter[53281]: 'xxx' routed
Aug 25 16:32:01 sphinx ipsec_starter[53281]: 
Aug 25 16:32:01 sphinx charon: 14[KNL] creating acquire job for policy
192.168.43.190/32 === xxx/32 with reqid {1}
Aug 25 16:32:01 sphinx charon: 14[IKE] initiating IKE_SA xxx[1] to xxx
Aug 25 16:32:01 sphinx charon: 14[ENC] generating IKE_SA_INIT request 0
[ SA KE No N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) N(HASH_ALG)
N(REDIR_SUP) ]
Aug 25 16:32:01 sphinx charon: 14[NET] sending packet: from
192.168.43.190[500] to xxx[500] (1156 bytes)
Aug 25 16:32:01 sphinx charon: 14[NET] received packet: from xxx[500] to
192.168.43.190[500] (38 bytes)
Aug 25 16:32:01 sphinx charon: 14[ENC] parsed IKE_SA_INIT response 0 [
N(INVAL_KE) ]
Aug 25 16:32:01 sphinx charon: 14[IKE] peer didn't accept DH group
MODP_3072, it requested MODP_2048
Aug 25 16:32:01 sphinx charon: 14[IKE] initiating IKE_SA xxx[1] to xxx
Aug 25 16:32:01 sphinx charon: 14[ENC] generating IKE_SA_INIT request 0
[ SA KE No N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) N(HASH_ALG)
N(REDIR_SUP) ]
Aug 25 16:32:01 sphinx charon: 14[NET] sending packet: from
192.168.43.190[500] to xxx[500] (1028 bytes)
Aug 25 16:32:01 sphinx charon: 14[NET] received packet: from xxx[500] to
192.168.43.190[500] (489 bytes)
Aug 25 16:32:01 sphinx charon: 14[ENC] parsed IKE_SA_INIT response 0 [
SA KE No N(NATD_S_IP) N(NATD_D_IP) CERTREQ N(FRAG_SUP) N(HASH_ALG)
N(MULT_AUTH) ]
Aug 25 16:32:01 sphinx charon: 14[IKE] local host is behind NAT, sending
keep alives
Aug 25 16:32:01 sphinx charon: 14[IKE] received cert request for "C=RU,
O=xxx, CN=xxx CA"
Aug 25 16:32:01 sphinx charon: 14[IKE] sending cert request for "C=RU,
O=xxx, CN=xxx CA"
Aug 25 16:32:01 sphinx charon: 14[IKE] authentication of 'C=RU, O=xxx,
CN=sphinx.xxx' (myself) with RSA_EMSA_PKCS1_SHA256 successful
Aug 25 16:32:01 sphinx charon: 14[IKE] sending end entity cert "C=RU,
O=xxx, CN=sphinx.xxx"
Aug 25 16:32:01 sphinx charon: 14[IKE] establishing CHILD_SA xxx
Aug 25 16:32:01 sphinx charon: 14[ENC] generating IKE_AUTH request 1 [
IDi CERT N(INIT_CONTACT) CERTREQ IDr AUTH CPRQ(ADDR DNS)
N(ESP_TFC_PAD_N) SA TSi TSr N(MOBIKE_SUP) N(NO_ADD_ADDR) N(MULT_AUTH)
N(EAP_ONLY) ]
Aug 25 16:32:01 sphinx charon: 14[ENC] splitting IKE message with length
of 1676 bytes into 4 fragments
Aug 25 16:32:01 sphinx charon: 14[ENC] generating IKE_AUTH request 1 [
EF(1/4) ]
Aug 25 16:32:01 sphinx charon: 14[ENC] generating IKE_AUTH request 1 [
EF(2/4) ]
Aug 25 16:32:01 sphinx charon: 14[ENC] generating IKE_AUTH request 1 [
EF(3/4) ]
Aug 25 16:32:01 sphinx charon: 14[ENC] generating IKE_AUTH request 1 [
EF(4/4) ]
Aug 25 16:32:01 sphinx charon: 14[NET] sending packet: from
192.168.43.190[4500] to xxx[4500] (544 bytes)
Aug 25 16:32:01 sphinx last message repeated 2 times
Aug 25 16:32:01 sphinx charon: 14[NET] sending packet: from
192.168.43.190[4500] to xxx[4500] (240 bytes)
Aug 25 16:32:01 sphinx charon: 14[NET] received packet: from xxx[4500]
to 192.168.43.190[4500] (544 bytes)
Aug 25 16:32:01 sphinx charon: 14[ENC] parsed IKE_AUTH response 1 [
EF(1/3) ]
Aug 25 16:32:01 sphinx charon: 14[ENC] received fragment #1 of 3,
waiting for complete IKE message
Aug 25 16:32:01 sphinx charon: 14[NET] received packet: from xxx[4500]
to 192.168.43.190[4500] (544 bytes)
Aug 25 16:32:01 sphinx charon: 14[ENC] parsed IKE_AUTH response 1 [
EF(2/3) ]
Aug 25 16:32:01 sphinx charon: 14[ENC] received fragment #2 of 3,
waiting for complete IKE message
Aug 25 16:32:01 sphinx charon: 14[NET] received packet: from xxx[4500]
to 192.168.43.190[4500] (416 bytes)
Aug 25 16:32:01 sphinx charon: 14[ENC] parsed IKE_AUTH response 1 [
EF(3/3) ]
Aug 25 16:32:01 sphinx charon: 14[ENC] received fragment #3 of 3,
reassembling fragmented IKE message
Aug 25 16:32:01 sphinx charon: 14[ENC] parsed IKE_AUTH response 1 [ IDr
CERT AUTH CPRP(ADDR DNS) N(ESP_TFC_PAD_N) SA TSi TSr ]
Aug 25 16:32:01 sphinx charon: 14[IKE] received end entity cert "C=RU,
O=xxx, CN=xxx"
Aug 25 16:32:01 sphinx charon: 14[CFG]   using certificate "C=RU, O=xxx,
CN=xxx"
Aug 25 16:32:01 sphinx charon: 14[CFG]   using trusted ca certificate
"C=RU, O=xxx, CN=xxx CA"
Aug 25 16:32:01 sphinx charon: 14[CFG] checking certificate status of
"C=RU, O=xxx, CN=xxx"
Aug 25 16:32:01 sphinx charon: 14[CFG] certificate status is not
available
Aug 25 16:32:01 sphinx charon: 14[CFG]   reached self-signed root ca
with a path length of 0
Aug 25 16:32:01 sphinx charon: 14[IKE] authentication of 'C=RU, O=xxx,
CN=xxx' with RSA_EMSA_PKCS1_SHA256 successful
Aug 25 16:32:01 sphinx charon: 14[IKE] IKE_SA xxx[1] established between
192.168.43.190[C=RU, O=xxx, CN=sphinx.xxx]...xxx[C=RU, O=xxx, CN=xxx]
Aug 25 16:32:01 sphinx charon: 14[IKE] scheduling reauthentication in
85846s
Aug 25 16:32:01 sphinx charon: 14[IKE] maximum IKE_SA lifetime 86386s
Aug 25 16:32:01 sphinx charon: 14[IKE] installing DNS server 10.0.10.1
via resolvconf
Aug 25 16:32:01 sphinx charon: 14[IKE] installing new virtual IP
192.168.2.2
Aug 25 16:32:01 sphinx charon: 14[LIB] created TUN device: tun0
Aug 25 16:32:01 sphinx charon: 05[KNL] interface tun0 appeared
Aug 25 16:32:01 sphinx charon: 05[KNL] interface tun0 activated
Aug 25 16:32:01 sphinx charon: 14[IKE] received
ESP_TFC_PADDING_NOT_SUPPORTED, not using ESPv3 TFC padding
Aug 25 16:32:01 sphinx charon: 14[IKE] CHILD_SA xxx{2} established with
SPIs c8213cc5_i cf1d9b0b_o and TS 192.168.2.2/32 === 0.0.0.0/0

Internet:
Destination        Gateway            Flags     Netif Expire
0.0.0.0/1          192.168.43.1       US        wlan0
default            192.168.43.1       UGS       wlan0
xxx     192.168.43.1       UGHS      wlan0
127.0.0.1          link#1             UH          lo0
128.0.0.0/1        192.168.43.1       US        wlan0
192.168.2.2        link#3             UH         tun0
192.168.43.0/24    link#2             U         wlan0
192.168.43.190     link#2             UHS         lo0 

Tunnel itself looks operational - keep alives are ticking. 

Logs for auto=start (works flawlessly)

Aug 25 16:33:47 sphinx doas: xxx ran command service strongswan
onerestart as root from /home/xxx
Aug 25 16:33:47 sphinx charon: 00[DMN] signal of type SIGINT received.
Shutting down
Aug 25 16:33:47 sphinx charon: 00[IKE] deleting IKE_SA xxx[1] between
192.168.43.190[C=RU, O=xxx, CN=sphinx.xxxxxx]...xxx[C=RU, O=xxx,
CN=xxxxxx]
Aug 25 16:33:47 sphinx charon: 00[IKE] sending DELETE for IKE_SA xxx[1]
Aug 25 16:33:47 sphinx charon: 00[ENC] generating INFORMATIONAL request
3 [ D ]
Aug 25 16:33:47 sphinx charon: 00[NET] sending packet: from
192.168.43.190[4500] to xxx[4500] (76 bytes)
Aug 25 16:33:47 sphinx charon: 00[IKE] removing DNS server 10.0.10.1 via
resolvconf
Aug 25 16:33:47 sphinx charon: 16[KNL] interface tun0 deactivated
Aug 25 16:33:47 sphinx charon: 16[KNL] interface tun0 disappeared
Aug 25 16:33:47 sphinx ipsec_starter[53281]: charon stopped after 200 ms
Aug 25 16:33:47 sphinx ipsec_starter[53281]: ipsec starter stopped
Aug 25 16:33:49 sphinx ipsec_starter[53351]: Starting strongSwan 5.5.0
IPsec [starter]...
Aug 25 16:33:49 sphinx ipsec_starter[53351]: no netkey IPsec stack
detected
Aug 25 16:33:49 sphinx ipsec_starter[53351]: no KLIPS IPsec stack
detected
Aug 25 16:33:49 sphinx ipsec_starter[53351]: no known IPsec stack
detected, ignoring!
Aug 25 16:33:49 sphinx charon: 00[DMN] Starting IKE charon daemon
(strongSwan 5.5.0, FreeBSD 11.0-RC1, amd64)
Aug 25 16:33:49 sphinx charon: 00[NET] could not open socket: Address
family not supported by protocol family
Aug 25 16:33:49 sphinx charon: 00[NET] could not open IPv6 socket, IPv6
disabled
Aug 25 16:33:49 sphinx charon: 00[CFG] loading ca certificates from
'/usr/local/etc/ipsec.d/cacerts'
Aug 25 16:33:49 sphinx charon: 00[CFG]   loaded ca certificate "C=RU,
O=xxx, CN=xxxxxx CA" from
'/usr/local/etc/ipsec.d/cacerts/ipsec-ca-cert.pem'
Aug 25 16:33:49 sphinx charon: 00[CFG] loading aa certificates from
'/usr/local/etc/ipsec.d/aacerts'
Aug 25 16:33:49 sphinx charon: 00[CFG] loading ocsp signer certificates
from '/usr/local/etc/ipsec.d/ocspcerts'
Aug 25 16:33:49 sphinx charon: 00[CFG] loading attribute certificates
from '/usr/local/etc/ipsec.d/acerts'
Aug 25 16:33:49 sphinx charon: 00[CFG] loading crls from
'/usr/local/etc/ipsec.d/crls'
Aug 25 16:33:49 sphinx charon: 00[CFG] loading secrets from
'/usr/local/etc/ipsec.secrets'
Aug 25 16:33:49 sphinx charon: 00[CFG]   loaded RSA private key from
'/usr/local/etc/ipsec.d/private/ipsec-sphinx-key.pem'
Aug 25 16:33:49 sphinx charon: 00[LIB] loaded plugins: charon aes des
blowfish rc2 sha2 sha1 md4 md5 random nonce x509 revocation constraints
pubkey pkcs1 pkcs7 pkcs8 pkcs12 pgp dnskey sshkey pem openssl fips-prf
xcbc cmac hmac attr kernel-pfkey kernel-pfroute resolve socket-default
stroke updown eap-identity eap-md5 eap-mschapv2 eap-tls eap-ttls
eap-peap whitelist addrblock
Aug 25 16:33:49 sphinx charon: 00[JOB] spawning 16 worker threads
Aug 25 16:33:49 sphinx ipsec_starter[53406]: charon (53407) started
after 20 ms
Aug 25 16:33:49 sphinx charon: 05[CFG] received stroke: add connection
'xxx'
Aug 25 16:33:49 sphinx charon: 05[CFG]   loaded certificate "C=RU,
O=xxx, CN=sphinx.xxxxxx" from 'ipsec-sphinx-cert.pem'
Aug 25 16:33:49 sphinx charon: 05[CFG] added configuration 'xxx'
Aug 25 16:33:49 sphinx charon: 16[CFG] received stroke: initiate 'xxx'
Aug 25 16:33:49 sphinx charon: 16[IKE] initiating IKE_SA xxx[1] to xxx
Aug 25 16:33:49 sphinx charon: 16[ENC] generating IKE_SA_INIT request 0
[ SA KE No N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) N(HASH_ALG)
N(REDIR_SUP) ]
Aug 25 16:33:49 sphinx charon: 16[NET] sending packet: from
192.168.43.190[500] to xxx[500] (1156 bytes)
Aug 25 16:33:50 sphinx charon: 16[NET] received packet: from xxx[500] to
192.168.43.190[500] (38 bytes)
Aug 25 16:33:50 sphinx charon: 16[ENC] parsed IKE_SA_INIT response 0 [
N(INVAL_KE) ]
Aug 25 16:33:50 sphinx charon: 16[IKE] peer didn't accept DH group
MODP_3072, it requested MODP_2048
Aug 25 16:33:50 sphinx charon: 16[IKE] initiating IKE_SA xxx[1] to xxx
Aug 25 16:33:50 sphinx charon: 16[ENC] generating IKE_SA_INIT request 0
[ SA KE No N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) N(HASH_ALG)
N(REDIR_SUP) ]
Aug 25 16:33:50 sphinx charon: 16[NET] sending packet: from
192.168.43.190[500] to xxx[500] (1028 bytes)
Aug 25 16:33:50 sphinx charon: 16[NET] received packet: from xxx[500] to
192.168.43.190[500] (489 bytes)
Aug 25 16:33:50 sphinx charon: 16[ENC] parsed IKE_SA_INIT response 0 [
SA KE No N(NATD_S_IP) N(NATD_D_IP) CERTREQ N(FRAG_SUP) N(HASH_ALG)
N(MULT_AUTH) ]
Aug 25 16:33:50 sphinx charon: 16[IKE] local host is behind NAT, sending
keep alives
Aug 25 16:33:50 sphinx charon: 16[IKE] received cert request for "C=RU,
O=xxx, CN=xxxxxx CA"
Aug 25 16:33:50 sphinx charon: 16[IKE] sending cert request for "C=RU,
O=xxx, CN=xxxxxx CA"
Aug 25 16:33:50 sphinx charon: 16[IKE] authentication of 'C=RU, O=xxx,
CN=sphinx.xxxxxx' (myself) with RSA_EMSA_PKCS1_SHA256 successful
Aug 25 16:33:50 sphinx charon: 16[IKE] sending end entity cert "C=RU,
O=xxx, CN=sphinx.xxxxxx"
Aug 25 16:33:50 sphinx charon: 16[IKE] establishing CHILD_SA xxx
Aug 25 16:33:50 sphinx charon: 16[ENC] generating IKE_AUTH request 1 [
IDi CERT N(INIT_CONTACT) CERTREQ IDr AUTH CPRQ(ADDR DNS)
N(ESP_TFC_PAD_N) SA TSi TSr N(MOBIKE_SUP) N(NO_ADD_ADDR) N(MULT_AUTH)
N(EAP_ONLY) ]
Aug 25 16:33:50 sphinx charon: 16[ENC] splitting IKE message with length
of 1644 bytes into 4 fragments
Aug 25 16:33:50 sphinx charon: 16[ENC] generating IKE_AUTH request 1 [
EF(1/4) ]
Aug 25 16:33:50 sphinx charon: 16[ENC] generating IKE_AUTH request 1 [
EF(2/4) ]
Aug 25 16:33:50 sphinx charon: 16[ENC] generating IKE_AUTH request 1 [
EF(3/4) ]
Aug 25 16:33:50 sphinx charon: 16[ENC] generating IKE_AUTH request 1 [
EF(4/4) ]
Aug 25 16:33:50 sphinx charon: 16[NET] sending packet: from
192.168.43.190[4500] to xxx[4500] (544 bytes)
Aug 25 16:33:50 sphinx last message repeated 2 times
Aug 25 16:33:50 sphinx charon: 16[NET] sending packet: from
192.168.43.190[4500] to xxx[4500] (208 bytes)
Aug 25 16:33:50 sphinx charon: 16[NET] received packet: from xxx[4500]
to 192.168.43.190[4500] (544 bytes)
Aug 25 16:33:50 sphinx charon: 16[ENC] parsed IKE_AUTH response 1 [
EF(1/3) ]
Aug 25 16:33:50 sphinx charon: 16[ENC] received fragment #1 of 3,
waiting for complete IKE message
Aug 25 16:33:50 sphinx charon: 15[NET] received packet: from xxx[4500]
to 192.168.43.190[4500] (544 bytes)
Aug 25 16:33:50 sphinx charon: 15[ENC] parsed IKE_AUTH response 1 [
EF(2/3) ]
Aug 25 16:33:50 sphinx charon: 15[ENC] received fragment #2 of 3,
waiting for complete IKE message
Aug 25 16:33:50 sphinx charon: 15[NET] received packet: from xxx[4500]
to 192.168.43.190[4500] (416 bytes)
Aug 25 16:33:50 sphinx charon: 15[ENC] parsed IKE_AUTH response 1 [
EF(3/3) ]
Aug 25 16:33:50 sphinx charon: 15[ENC] received fragment #3 of 3,
reassembling fragmented IKE message
Aug 25 16:33:50 sphinx charon: 15[ENC] parsed IKE_AUTH response 1 [ IDr
CERT AUTH CPRP(ADDR DNS) N(ESP_TFC_PAD_N) SA TSi TSr ]
Aug 25 16:33:50 sphinx charon: 15[IKE] received end entity cert "C=RU,
O=xxx, CN=xxxxxx"
Aug 25 16:33:50 sphinx charon: 15[CFG]   using certificate "C=RU, O=xxx,
CN=xxxxxx"
Aug 25 16:33:50 sphinx charon: 15[CFG]   using trusted ca certificate
"C=RU, O=xxx, CN=xxxxxx CA"
Aug 25 16:33:50 sphinx charon: 15[CFG] checking certificate status of
"C=RU, O=xxx, CN=xxxxxx"
Aug 25 16:33:50 sphinx charon: 15[CFG] certificate status is not
available
Aug 25 16:33:50 sphinx charon: 15[CFG]   reached self-signed root ca
with a path length of 0
Aug 25 16:33:50 sphinx charon: 15[IKE] authentication of 'C=RU, O=xxx,
CN=xxxxxx' with RSA_EMSA_PKCS1_SHA256 successful
Aug 25 16:33:50 sphinx charon: 15[IKE] IKE_SA xxx[1] established between
192.168.43.190[C=RU, O=xxx, CN=sphinx.xxxxxx]...xxx[C=RU, O=xxx,
CN=xxxxxx]
Aug 25 16:33:50 sphinx charon: 15[IKE] scheduling reauthentication in
85841s
Aug 25 16:33:50 sphinx charon: 15[IKE] maximum IKE_SA lifetime 86381s
Aug 25 16:33:50 sphinx charon: 15[IKE] installing DNS server 10.0.10.1
via resolvconf
Aug 25 16:33:50 sphinx charon: 15[IKE] installing new virtual IP
192.168.2.2
Aug 25 16:33:50 sphinx charon: 15[LIB] created TUN device: tun0
Aug 25 16:33:50 sphinx charon: 16[KNL] interface tun0 appeared
Aug 25 16:33:50 sphinx charon: 16[KNL] interface tun0 activated
Aug 25 16:33:50 sphinx charon: 15[IKE] received
ESP_TFC_PADDING_NOT_SUPPORTED, not using ESPv3 TFC padding
Aug 25 16:33:50 sphinx charon: 15[IKE] CHILD_SA xxx{1} established with
SPIs cf4bfaa3_i ce858a28_o and TS 192.168.2.2/32 === 0.0.0.0/0 

Routing tables

Internet:
Destination        Gateway            Flags     Netif Expire
0.0.0.0/1          192.168.43.1       US         tun0
default            192.168.43.1       UGS       wlan0
xxxxxx          192.168.43.1       UGHS      wlan0
localhost          link#1             UH          lo0
128.0.0.0/1        192.168.43.1       US         tun0
192.168.2.2        link#3             UH         tun0
192.168.43.0/24    link#2             U         wlan0
192.168.43.190     link#2             UHS         lo0 

Logs look the same for me. 

Looks like we should go deeper ? I don't understand the difference b/w
auto=start and auto=route after tunnel is established. Maybe route
option has some additional requirements? 
  


More information about the Users mailing list