[strongSwan] Tunnels with dynamic IP and another route issue
Dusan Ilic
dusan at comhem.se
Fri Apr 21 10:31:42 CEST 2017
Okey, one correction
left=%hostname is working for one of my tunnels, but not the other. See
below.
The working:
sending cert request for "C=US, O=Let's Encrypt, CN=Let's Encrypt
Authority X3"
authentication of 'hostname' (myself) with pre-shared key
establishing CHILD_SA Azure
generating IKE_AUTH request 1 [ IDi CERTREQ IDr AUTH SA TSi TSr
N(EAP_ONLY) ]
sending packet: from 85.24.x.x[500] to 137.135.x.x[500] (380 bytes)
received packet: from 137.135.x.x[500] to 85.24.x.x[500] (204 bytes)
parsed IKE_AUTH response 1 [ IDr AUTH SA TSi TSr ]
authentication of '137.135.x.x' with pre-shared key successful
IKE_SA Azure[2] established between
85.24.x.x[hostname]...137.135.x.x[137.135.x.x]
scheduling reauthentication in 27923s
maximum IKE_SA lifetime 28463s
connection 'Azure' established successfully
The non-working:
sending cert request for "C=US, O=Let's Encrypt, CN=Let's Encrypt
Authority X3"
authentication of 'hostname' (myself) with pre-shared key
establishing CHILD_SA Wesafe
generating IKE_AUTH request 1 [ IDi CERTREQ IDr AUTH SA TSi TSr
N(MULT_AUTH) N(EAP_ONLY) ]
sending packet: from 85.24.x.x[500] to 94.254.x.x[500] (380 bytes)
received packet: from 94.254.x.x[500] to 85.24.x.x[500] (76 bytes)
parsed IKE_AUTH response 1 [ N(AUTH_FAILED) ]
received AUTHENTICATION_FAILED notify error
establishing connection 'Wesafe' failed
ipsec.secrets
%hostname 137.135.x.x : PSK "xxxx"
%hostname 94.254.x.x : PSK "xxxxx"
I don't know why Strongswan seems to send my local certificate, it
should only be used when roadwarriors connect.
Den 2017-04-21 kl. 10:16, skrev Dusan Ilic:
> Hi!
>
> I have some issues, please read on.
>
> 1. I have one side of the IP-sec tunnel with dynamic IP (associated
> with a dynamic hostname), I would like not need to change the
> "left"-parameter in both ipsec.conf and ipsec.secrets whenever the
> local WAN IP changes, so I have tried putting "left = %any" or "left =
> %hostname". Now, with %hostname (preferable) it wont connect, but with
> %any it does connect, sometimes. I can see in the documentation that
> %any does a local root lookup if the local host is initiating the
> connection, but only accepting all local IP-adresses if it responds to
> the remote peer initiation. In my case ths always work when the remote
> peer is initiating the connection, but if my local end initiates it
> (ie start=route) it seem to choose the wrong public source IP to
> connect from.
> In my case, my local gateway running Strongswan have multiple public
> interfaces (but only one should be used for IP-sec tunnels), se below
> route information:
>
> default
> nexthop via 90.225.x.x dev vlan845 weight 1
> nexthop via 10.248.x.x dev ppp0 weight 256
> nexthop via 85.24.x.x dev vlan847 weight 1
> nexthop via 46.195.x.x dev ppp1 weight 1
>
> My gateway is configured to use 10.248.0.x as "default route" (highest
> weight/priority), but when Strongswan tried to initiate the tunnel it
> seems to always default too the last route, 46.195.x.x, and this wont
> work as the remote peer is expecting 85.24.x.x. Now, is there a way to
> tell Strongswan to use this IP/interface? I hope "left=%hostname"
> would work, because the hostname is dynamically ponting to the IP at
> interface vlan847, but as already stated this isn't working either.
>
> Any suggestions?
>
> 2. Probably also cause by the above routing setup (wild guess), I also
> have IKEv2 EAP roadwarrior connectin in Strongswan on the same
> interface. The Strongswan client on Android connects to my public
> hostname, and everything works (and in this setup I can have
> left=%hostname on the server), it's a full tunnel with
> leftsubnet=0.0.0.0/0. However, all VPN-clients are beeing routed out
> on this same interface the connect to, so the third route above is
> being automatically used (vlan847) instead of the second route on ppp0
> (with higher weight/priority). Locally connected clients to the
> gateway all gets routed out on ppp0, but not VPN-clients. Why is this,
> and what can be done to correct this? The reason for me wanting the
> VPN clients connecting on vlan847 also routed on the the Internet on
> ppp0 is simple, ppp0 is a VPN connection from the gateway out to the
> Internet.
>
> I can add that in strongswan.conf I have changed so that all
> VPN-routes added by Strongswan is done in the standard, main routing
> table (instead of 220), so technically the VPN-clients should be
> routed the same as the local clients by the gateway.
> _______________________________________________
> Users mailing list
> Users at lists.strongswan.org
> https://lists.strongswan.org/mailman/listinfo/users
More information about the Users
mailing list