[strongSwan] roadwarrior IKEv2 PSK reauthentication issue
Lars Alex Pedersen
laa at kamstrup.com
Sat Jun 10 08:08:09 CEST 2017
Thanks for your response.
We have looked into make-before-break and somehow decided to not use it, so
I'll look into that again. Ipsec stroke leases gives a "no pools found" on a
strongswan 5.3.5. We are using following ipsec.conf, but without TFC since
it isn't supported in pfsense.
# /etc/ipsec.conf - strongSwan IPsec configuration file
config setup
#charondebug="cfg 4, dmn 4, ike 4, net 4"
charondebug="cfg 1, dmn 2, ike 1"
conn %default
ikelifetime=28800s
lifetime=10800s
margintime=600s
keyingtries=1
keyexchange=ikev2
type=tunnel
dpdaction=clear
dpddelay=900s
ike=aes256gcm128-sha512-ecp512bp,aes256gcm128-sha512-ecp521!
esp=aes256gcm128-ecp512bp,aes256gcm128-ecp521,aes128gcm128-ecp256bp!
authby=psk
# Configuration notes:
# left = local, right = remote
# leftid/rightid: ID payload exchanged during IKE (certificate: DN or
subjectAltName)
# ! in ike and esp only allow specified cypher suites (no NSA downgrade)
# TFC: Traffic Flow Confidentiality
# DPD: Dead Peer Detection
conn roadwarrior
left=192.168.248.17
leftid=rwclient
leftsourceip=%config
leftfirewall=no
right=200.100.10.1
rightid=roadwarriorvpn-1
rightsubnet=10.75.0.0/16
tfc=1280
auto=add
Best regards
Lars Alex Pedersen
-----Original Message-----
From: Noel Kuntze [mailto:noel.kuntze+strongswan-users-ml at thermi.consulting]
Sent: 8. juni 2017 14:53
To: Lars Alex Pedersen <laa at kamstrup.com>; users at lists.strongswan.org
Subject: Re: [strongSwan] roadwarrior IKEv2 PSK reauthentication issue
On 07.06.2017 11:31, Lars Alex Pedersen wrote:
> I got about 100 RW clients that are connecting to a pfsense 2.2.6 and
> are seeing something odd when the clients are reauthenticating IKE_SA.
> Can anybody tell why two different virtual IP's are received within 1
> second? On the pfsense side I see that the same two roadwarriors are
> "fighting" between the two virtuel ip's, so if one gets 10.75.4.75 the
> other will get 10.75.4.54.
What's your ipsec.conf and the current pool status (`ipsec stroke leases`)?
If you can, use make_before_break in strongswan.conf.
Kind regards
Noel
---
Noel Kuntze
IT security consultant
GPG Key ID: 0x0739AD6C
Fingerprint: 3524 93BE B5F7 8E63 1372 AF2D F54E E40B 0739 AD6C
-------------- next part --------------
A non-text attachment was scrubbed...
Name: smime.p7s
Type: application/pkcs7-signature
Size: 3545 bytes
Desc: not available
URL: <http://lists.strongswan.org/pipermail/users/attachments/20170610/d621340d/attachment.bin>
More information about the Users
mailing list