[strongSwan] roadwarrior IKEv2 PSK reauthentication issue
Noel Kuntze
noel.kuntze+strongswan-users-ml at thermi.consulting
Sat Jun 10 13:50:26 CEST 2017
Hello Lars,
You need to run `ipsec stroke leases` on the host that assigns the virtual IPs.
Kind regards
Noel
On 10.06.2017 08:08, Lars Alex Pedersen wrote:
> Thanks for your response.
>
> We have looked into make-before-break and somehow decided to not use it, so
> I'll look into that again. Ipsec stroke leases gives a "no pools found" on a
> strongswan 5.3.5. We are using following ipsec.conf, but without TFC since
> it isn't supported in pfsense.
>
> # /etc/ipsec.conf - strongSwan IPsec configuration file
>
> config setup
> #charondebug="cfg 4, dmn 4, ike 4, net 4"
> charondebug="cfg 1, dmn 2, ike 1"
>
> conn %default
> ikelifetime=28800s
> lifetime=10800s
> margintime=600s
> keyingtries=1
> keyexchange=ikev2
> type=tunnel
> dpdaction=clear
> dpddelay=900s
> ike=aes256gcm128-sha512-ecp512bp,aes256gcm128-sha512-ecp521!
> esp=aes256gcm128-ecp512bp,aes256gcm128-ecp521,aes128gcm128-ecp256bp!
> authby=psk
>
> # Configuration notes:
> # left = local, right = remote
> # leftid/rightid: ID payload exchanged during IKE (certificate: DN or
> subjectAltName)
> # ! in ike and esp only allow specified cypher suites (no NSA downgrade)
> # TFC: Traffic Flow Confidentiality
> # DPD: Dead Peer Detection
> conn roadwarrior
> left=192.168.248.17
> leftid=rwclient
> leftsourceip=%config
> leftfirewall=no
> right=200.100.10.1
> rightid=roadwarriorvpn-1
> rightsubnet=10.75.0.0/16
> tfc=1280
> auto=add
>
> Best regards
> Lars Alex Pedersen
>
>
>
> -----Original Message-----
> From: Noel Kuntze [mailto:noel.kuntze+strongswan-users-ml at thermi.consulting]
>
> Sent: 8. juni 2017 14:53
> To: Lars Alex Pedersen <laa at kamstrup.com>; users at lists.strongswan.org
> Subject: Re: [strongSwan] roadwarrior IKEv2 PSK reauthentication issue
>
>
>
> On 07.06.2017 11:31, Lars Alex Pedersen wrote:
>> I got about 100 RW clients that are connecting to a pfsense 2.2.6 and
>> are seeing something odd when the clients are reauthenticating IKE_SA.
>> Can anybody tell why two different virtual IP's are received within 1
>> second? On the pfsense side I see that the same two roadwarriors are
>> "fighting" between the two virtuel ip's, so if one gets 10.75.4.75 the
>> other will get 10.75.4.54.
>
> What's your ipsec.conf and the current pool status (`ipsec stroke leases`)?
> If you can, use make_before_break in strongswan.conf.
>
> Kind regards
>
> Noel
>
> ---
> Noel Kuntze
> IT security consultant
>
> GPG Key ID: 0x0739AD6C
> Fingerprint: 3524 93BE B5F7 8E63 1372 AF2D F54E E40B 0739 AD6C
>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 833 bytes
Desc: OpenPGP digital signature
URL: <http://lists.strongswan.org/pipermail/users/attachments/20170610/8fcbb608/attachment.sig>
More information about the Users
mailing list