[strongSwan] sending DHCP RELEASE failed: No buffer space available

Harald Dunkel harri at afaics.de
Sat Dec 3 15:42:32 CET 2016


On 12/03/16 14:52, Harald Dunkel wrote:
> Hi folks,
> 
> charon mentions a few lines in syslog every day saying
> 
> sending DHCP RELEASE failed: No buffer space available
> 
> I found https://lists.strongswan.org/pipermail/users/2015-February/007438.html
> but this seems to be a different problem.
> 
> What would be your advice?
> 

PS: Plattform is Debian, strongswan 5.5.1. dhcp.conf:

dhcp {
    identity_lease = yes
    interface = eth1
    load = yes
    # server = 255.255.255.255
}

ipsec.conf is attached. Sorry, I should have included this right
from the start.

Usually there are about 15+ road warriors connected, all using
DHCP.


Regards
Harri
-------------- next part --------------
# ipsec.conf - strongSwan IPsec configuration file
# see	https://wiki.strongswan.org/projects/strongswan/wiki/IpsecConf
#	https://wiki.strongswan.org/projects/strongswan/wiki/ConnSection

config setup
	# forbid parallel use of certificates (default).
	# uniqueids=never
	# http://wiki.strongswan.org/projects/strongswan/wiki/LoggerConfiguration
	charondebug="dmn 1, mgr 1, ike 1, chd 1, cfg 1, net 1"

#
# default for all road warrior and P2P IPsec connections
conn %default
	left		= gateway.example.com
	fragmentation	= yes

	leftsubnet	= 10.200.0.0/16
	leftfirewall	= no
	ikelifetime	= 1d
	lifetime	= 1h
	rekey		= yes
	dpdaction	= none		# default: no dead peer detection
	dpddelay	= 30s		# default: 30s
	dpdtimeout	= 150s		# default: 150s, used for IKEv1 only

#
# common road warrior params
conn roadwarrior
	leftcert	= gateway.example.com.pem
	leftsendcert	= always
	dpdaction	= clear
	dpddelay	= 90s
	dpdtimeout	= 300s

#
# IKEv2 using RSA authentication
conn IPSec-IKEv2
	keyexchange	= ikev2
	also		= roadwarrior
	ike		= aes256-sha256-modp2048,aes256-sha1-modp1024,aes128-sha1-modp1024!
	esp		= aes256-sha256-modp2048,aes256-sha1-modp1024,aes128-sha1-modp1024,aes256-sha256,aes256-sha1,aes128-sha1!
	right		= %any
	rightsendcert	= ifasked
	rightsourceip	= %dhcp
	lifetime	= 70m		# workaround for rekey annoyance on Windows
	auto		= add

#
# IKEv1 using xauth (i.e. enter password)
conn IPsec-IKEv1
	keyexchange	= ikev1
	# rekey		= no
	also		= roadwarrior
	ike		= aes256-sha1-modp1536!
	esp		= aes256-sha1!
	rightauth	= pubkey
	right		= %any
	rightsourceip	= %dhcp
	rightauth2	= xauth
	auto		= add

### include /var/lib/strongswan/ipsec.conf.inc
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 488 bytes
Desc: OpenPGP digital signature
URL: <http://lists.strongswan.org/pipermail/users/attachments/20161203/7ee927f2/attachment.sig>


More information about the Users mailing list