[strongSwan] Planning an upgrade of strongswan from 4.4.1 to 5.2.1

Rayson Zhu vfreex at gmail.com
Sat Jan 9 15:57:54 CET 2016


Sorry I'm not an expert of strongSwan. Have you googled for this problem?
Do you have clients behind the same NAT?


On Sat, Jan 9, 2016 at 9:52 PM, CJ Fearnley <cjf at linuxforce.net> wrote:

> I cleared the 3DEC_CBC hurdle by installing libstrongswan-standard-plugins
>
> Now three clients have connected. Whoo hoo!
>
> However, I'm getting this behavior with one of the other clients:
>
> Jan  9 08:45:57 cw1 ipsec[19931]: 05[NET] received packet: from
> 67.151.41.186[500] to 216.130.102.66 [500] (292 bytes)
> Jan  9 08:45:57 cw1 ipsec[19931]: 05[IKE] received retransmit of request
> with ID 3004727439, but no response to retransmit
>
> What does that mean?
>
> On Sat, Jan 09, 2016 at 08:58:42PM +0800, Rayson Zhu wrote:
> > Both peers should use identical cipher algorithms.
> > The former message you got shows that your local peer uses
> > aes128-sha256-modp2048 but the remote peer is configured to use
> > 3des-sha1-modp1024.
> > The latter one shows your local peer doesn't support for 3des, maybe
> caused
> > by lack of some libraries. By the way, 3des is an outdated encryption
> > algorithm.
> >
> >
> >
> > On Sat, Jan 9, 2016 at 8:32 PM, CJ Fearnley <cjf at linuxforce.net> wrote:
> >
> > > I added those two lines to the conn %default section. Then I ran "ipsec
> > > restart". There failure messages have changed slightly:
> > >
> > > Jan  9 07:23:18 cw1 ipsec[19452]: 12[IKE] 67.151.55.146 is initiating a
> > > Main Mode IKE_SA
> > > Jan  9 07:23:18 cw1 ipsec[19452]: 12[CFG] received proposals:
> > > IKE:3DES_CBC/HMAC_SHA1_96/PRF_HMAC_SHA
> > > 1/MODP_1024
> > > Jan  9 07:23:18 cw1 ipsec[19452]: 12[CFG] configured proposals:
> > > IKE:AES_CBC_128/HMAC_SHA2_256_128/PR
> > > F_HMAC_SHA2_256/MODP_2048
> > > Jan  9 07:23:18 cw1 ipsec[19452]: 12[IKE] no proposal found
> > > Jan  9 07:23:18 cw1 ipsec[19452]: 12[ENC] generating INFORMATIONAL_V1
> > > request 1836105202 [ N(NO_PROP
> > > ) ]
> > >
> > > So I tried
> > >     ike = 3des-sha1-modp1024!
> > >     esp = 3des-sha1-modp1024!
> > >
> > > But now I run into this:
> > >
> > > Jan  9 07:29:28 cw1 ipsec[19697]: 13[IKE] 67.151.55.146 is initiating a
> > > Main Mode IKE_SA
> > > Jan  9 07:29:29 cw1 charon: 15[NET] received packet: from
> > > 67.151.55.146[500] to 216.130.102.66[500] (200 bytes)
> > > Jan  9 07:29:29 cw1 charon: 15[ENC] parsed ID_PROT request 0 [ KE No V
> ]
> > > Jan  9 07:29:29 cw1 charon: 15[ENC] received unknown vendor ID:
> > > 70:03:cb:c1:09:7d:be:9c:26:00:ba:69:83:bc:8b:35
> > > Jan  9 07:29:29 cw1 charon: 15[IKE] sending cert request for "C=US,
> > > [redacted ...]"
> > > Jan  9 07:29:29 cw1 charon: 15[IKE] ENCRYPTION_ALGORITHM 3DES_CBC (key
> > > size 0) not supported!
> > > Jan  9 07:29:29 cw1 charon: 15[IKE] key derivation for RSA signature
> failed
> > > Jan  9 07:29:29 cw1 charon: 15[ENC] generating INFORMATIONAL_V1 request
> > > 1044526370 [ HASH N(INVAL_KE) ]
> > >
> > > And I'm stuck again.
> > >
> > > On Sat, Jan 09, 2016 at 02:15:51PM +0800, Rayson Zhu wrote:
> > > > Hi, try specifying IKE & ESP cipher suits explicitly for all peers.
> For
> > > > example
> > > > ike = aes128-sha256-modp2048!
> > > > esp = aes128-sha256-modp2048!
> > > >
> > > > On Sat, Jan 9, 2016 at 2:04 PM, CJ Fearnley <cjf at linuxforce.net>
> wrote:
> > > >
> > > > > Well, my upgrade from strongswan 4.4.1-5.7 to 5.2.1-6+deb8u1
> (Debian
> > > > > Squeeze to Jessie on new hardware) is not going well. No
> connections
> > > > > have re-established.
> > > > >
> > > > > I'm using the same ipsec.conf that worked on 4.4.1-5.7. See the
> > > referenced
> > > > > e-mail from Dec 9th when I asked about the upgrade process.
> > > > >
> > > > > Each client is generating this pattern in the logs over and over:
> > > > >
> > > > > Jan  9 01:01:07 cw1 charon: 06[IKE] 67.151.55.146 is initiating a
> Main
> > > > > Mode IKE_SA
> > > > > Jan  9 01:01:07 cw1 charon: 06[CFG] received proposals:
> > > > > IKE:3DES_CBC/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024
> > > > > Jan  9 01:01:07 cw1 charon: 06[CFG] configured proposals:
> > > > > IKE:AES_CBC_128/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_2048,
> > > > > IKE:3DES_CBC/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1536,
> > > > >
> > >
> IKE:AES_CBC_128/AES_CBC_192/AES_CBC_256/HMAC_SHA1_96/HMAC_MD5_96/HMAC_SHA2_256_128/HMAC_SHA2_384_192/HMAC_SHA2_512_256/AES_XCBC_96/PRF_HMAC_SHA1/PRF_HMAC_MD5/PRF_HMAC_SHA2_256/PRF_HMAC_SHA2_384/PRF_HMAC_SHA2_512/PRF_AES128_XCBC/MODP_2048/MODP_2048_224/MODP_2048_256/MODP_1536/MODP_3072/MODP_4096/MODP_8192/MODP_1024/MODP_1024_160
> > > > > Jan  9 01:01:07 cw1 charon: 06[IKE] no proposal found
> > > > > Jan  9 01:01:07 cw1 charon: 06[ENC] generating INFORMATIONAL_V1
> request
> > > > > 3117715548 [ N(NO_PROP) ]
> > > > >
> > > > > I have double checked that I copied from backups the contents of
> > > > > /etc/ipsec.d/cacerts
> > > > > /etc/ipsec.d/certs
> > > > > /etc/ipsec.d/private
> > > > >
> > > > > Do I need to add some encryption plugins? Or can I simply specify
> using
> > > > > the ike= configuration option for the actual algorithm used by the
> > > > > Netgears FVG318?
> > > > >
> > > > > I tried adding the sha1 hmac xcbc and x509 modules to the load =
> line
> > > > > in /etc/strongswan.d/charon.conf. No go.
> > > > >
> > > > > The output of
> > > > > $ sudo ipsec version
> > > > > Linux strongSwan U5.2.1/K3.16.0-4-amd64
> > > > > Institute for Internet Technologies and Applications
> > > > > University of Applied Sciences Rapperswil, Switzerland
> > > > > See 'ipsec --copyright' for copyright information.
> > > > >
> > > > > On Wed, Dec 09, 2015 at 08:12:42PM -0500, CJ Fearnley wrote:
> > > > > > I have a working strongswan system running the Debian package at
> > > version
> > > > > > 4.4.1-5.7 (Squeeze oldoldstable). In a week or so, I'll be
> replacing
> > > > > > the box with a fresh install of Debian running 5.2.1-6+deb8u1
> > > (Jessie).
> > > > > >
> > > > > > I have two questions:
> > > > > >
> > > > > > 1. Have any config options changed in strongswan that I need to
> > > study?
> > > > > >
> > > > > > 2. Are there any issues with strongswan in connecting with a
> Netgear
> > > > > >    FVG318 of various vintages. All of our clients connect with
> this
> > > > > >    model of Netgear which is the only thing we've been able to
> get
> > > > > >    working with certificates.
> > > > > >
> > > > > > Here is a cleaned up version of /etc/ipsec.conf:
> > > > > >
> > > > > > config setup
> > > > > >     charonstart=yes
> > > > > >     plutostart=yes
> > > > > >     virtual_private=%v4:
> > > > >
> 10.0.0.0/8,%v4:192.168.0.0/16,%v4:172.16.0.0/12,%v4:!192.168.101.0/24
> > > > > >     uniqueids=no
> > > > > >
> > > > > > conn %default
> > > > > >     mobike=no
> > > > > >     keyexchange=ikev1
> > > > > >     left=xxx.xxx.xxx.xx
> > > > > >     leftsubnet=192.168.xxx.0/24
> > > > > >     auto=add
> > > > > >
> > > > > > conn someplace
> > > > > >     rightsubnet=192.168.yyy.0/24
> > > > > >     right=%any
> > > > > >     leftid="C=US, ST=ST, L=Some City, O=Some Company, CN=
> > > > > something.example.com, E=some at example.com"
> > > > > >     leftcert=something.crt
> > > > > >     leftsendcert=always
> > > > > >
> > > > > > plus a half-dozen others of similar nature.
> > > > > >
> > > > > > All of the systems that connect to this are various vintages of
> the
> > > > > > Netgear FVG318.
> > > > > >
> > > > > > Are there any known compatibility issues with strongswan 5.2.1
> and
> > > the
> > > > > > Netgear FVG318?
> > > > > >
> > > > > > Have there been any relevant changes to the syntax of ipsec.conf
> > > since
> > > > > > 4.4.1 and 5.2.1-6+deb8u1?
> > > > > >
> > > > > > Any general strongswan relevant advice for planning such an
> upgrade?
> > > > >
> > > > > --
> > > > > CJ Fearnley                 |   LinuxForce Inc.
> > > > > cjf at LinuxForce.net          |   IT Projects & Systems Maintenance
> > > > > http://www.LinuxForce.net   |   http://blog.remoteresponder.net
> > > > > _______________________________________________
> > > > > Users mailing list
> > > > > Users at lists.strongswan.org
> > > > > https://lists.strongswan.org/mailman/listinfo/users
> > > > >
> > >
> > > --
> > > CJ Fearnley                 |   LinuxForce Inc.
> > > cjf at LinuxForce.net          |   IT Projects & Systems Maintenance
> > > http://www.LinuxForce.net   |   http://blog.remoteresponder.net
> > >
>
> --
> CJ Fearnley                 |   LinuxForce Inc.
> cjf at LinuxForce.net          |   IT Projects & Systems Maintenance
> http://www.LinuxForce.net   |   http://blog.remoteresponder.net
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.strongswan.org/pipermail/users/attachments/20160109/9a355cc8/attachment.html>


More information about the Users mailing list