[strongSwan] Cannot ping in tunnel
Hoggins!
hoggins at radiom.fr
Wed Dec 7 11:45:07 CET 2016
Hello list,
This is my first post here, I'm hoping I'm not asking something too stupid.
I have a tunnel definition towards a provider (OVH, french ISP), and
it's working well on my Ubuntu 16.04 (ipsec version shows : "Linux
strongSwan U5.3.5/K4.4.0-51-generic") with the following ipsec.conf file :
conn %default
ikelifetime=60m
keylife=20m
rekeymargin=3m
keyingtries=1
authby=secret
keyexchange=ikev2
mobike=no
reauth=no
conn vrack3576_psk
auto=add
type=tunnel
dpdaction=restart
dpddelay=30s
dpdtimeout=120s
right=92.222.188.77
rightsubnet=192.168.55.0/24
leftsourceip=%config
... fairly simple actually.
It connects without problem and I can ping the other party.
... now I'm trying the same config on another server. It's distribution
is fairly old (Fedora 18, can't upgrade for the moment), and it's using
"Linux strongSwan U5.0.0/K4.4.8".
When issuing "strongswan up vrack3576_psk", everything looks fine :
strongswan up vrack3576_psk
initiating IKE_SA vrack3576_psk[5] to 92.222.188.77
generating IKE_SA_INIT request 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) ]
sending packet: from 192.168.1.72[500] to 92.222.188.77[500]
received packet: from 92.222.188.77[500] to 192.168.1.72[500]
parsed IKE_SA_INIT response 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP)
CERTREQ N(MULT_AUTH) ]
local host is behind NAT, sending keep alives
received 1 cert requests for an unknown ca
no IDi configured, fall back on IP address
authentication of '192.168.1.72' (myself) with pre-shared key
establishing CHILD_SA vrack3576_psk
generating IKE_AUTH request 1 [ IDi N(INIT_CONTACT) IDr AUTH CP(ADDR
DNS) SA TSi TSr N(MULT_AUTH) N(EAP_ONLY) ]
sending packet: from 192.168.1.72[4500] to 92.222.188.77[4500]
received packet: from 92.222.188.77[4500] to 192.168.1.72[4500]
parsed IKE_AUTH response 1 [ IDr AUTH CP(ADDR) SA TSi TSr N(AUTH_LFT) ]
authentication of '92.222.188.77' with pre-shared key successful
IKE_SA vrack3576_psk[5] established between
192.168.1.72[192.168.1.72]...92.222.188.77[92.222.188.77]
scheduling rekeying in 3322s
maximum IKE_SA lifetime 3502s
installing new virtual IP 192.168.100.10
CHILD_SA vrack3576_psk{5} established with SPIs c17a934e_i
c57dfbbe_o and TS 192.168.100.10/32 === 192.168.55.0/24
... and strongswan statusall shows :
Status of IKE charon daemon (strongSwan 5.0.0, Linux 4.4.8, x86_64):
uptime: 24 minutes, since Dec 07 11:19:09 2016
malloc: sbrk 270336, mmap 0, used 197104, free 73232
worker threads: 8 of 16 idle, 7/1/0/0 working, job queue: 0/0/0/0,
scheduled: 17
loaded plugins: charon aes des sha1 sha2 md5 random nonce x509
revocation constraints pubkey pkcs1 pkcs8 pgp dnskey pem openssl
fips-prf gmp xcbc cmac hmac attr kernel-netlink resolve
socket-default stroke updown xauth-generic
Listening IP addresses:
192.168.34.10
10.2.1.2
10.5.1.2
10.3.1.2
192.168.35.10
192.168.36.10
192.168.37.10
192.168.38.10
192.168.39.10
192.168.100.10
192.168.1.72
Connections:
vrack3576_psk: %any...92.222.188.77 IKEv2, dpddelay=30s
vrack3576_psk: local: [%any] uses pre-shared key authentication
vrack3576_psk: remote: [92.222.188.77] uses pre-shared key
authentication
vrack3576_psk: child: dynamic === 192.168.55.0/24 TUNNEL,
dpdaction=restart
Security Associations (1 up, 0 connecting):
vrack3576_psk[5]: ESTABLISHED 11 minutes ago,
192.168.1.72[192.168.1.72]...92.222.188.77[92.222.188.77]
vrack3576_psk[5]: IKEv2 SPIs: 8e08ef882cbc4b61_i*
0455f833b266865e_r, rekeying in 44 minutes, pre-shared key
reauthentication in 39 minutes
vrack3576_psk[5]: IKE proposal:
AES_CBC_128/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_2048
vrack3576_psk{5}: INSTALLED, TUNNEL, ESP in UDP SPIs: c17a934e_i
c57dfbbe_o
vrack3576_psk{5}: AES_CBC_128/HMAC_SHA1_96, 0 bytes_i, 0 bytes_o,
rekeying in 4 minutes
vrack3576_psk{5}: 192.168.100.10/32 === 192.168.55.0/24
But I can't ping any address in 192.168.55.0/24.
Can you help me on what additional info I need to provide to help
debugging ?
Thanks !
Hoggins!
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 181 bytes
Desc: OpenPGP digital signature
URL: <http://lists.strongswan.org/pipermail/users/attachments/20161207/54b1259f/attachment.sig>
More information about the Users
mailing list