[strongSwan] IKE_SA_INIT response with notification data missing
Balaji Thoguluva Bapulal
balaji.thoguluva.bapulal at oracle.com
Mon Apr 16 13:34:05 CEST 2018
Thanks Andreas, will take a look at it. Is there any reason why UDP checksum in the packet shows as wrong in the wireshark?
-----Original Message-----
From: Andreas Steffen [mailto:andreas.steffen at strongswan.org]
Sent: Monday, April 16, 2018 5:04 AM
To: Balaji Thoguluva Bapulal <balaji.thoguluva.bapulal at oracle.com>; users at lists.strongswan.org
Subject: Re: [strongSwan] IKE_SA_INIT response with notification data missing
Hi Balaji,
RFC 4739 "Multiple Authenticaton Exchanges in IKEv2"
https://tools.ietf.org/html/rfc4739#section-3.1
defines the format of the MULTIPLE_AUTH_SUPPORT Notify Payload as
3.1. MULTIPLE_AUTH_SUPPORTED Notify Payload
The MULTIPLE_AUTH_SUPPORTED notification is included in the
IKE_SA_INIT response or the first IKE_AUTH request to indicate that
the peer supports this specification. The Notify Message Type is
MULTIPLE_AUTH_SUPPORTED (16404). The Protocol ID and SPI Size fields
MUST be set to zero, and there is no data associated with this Notify
type.
So I don't understand why you expect notification data?
Regards
Andreas
On 15.04.2018 04:42, Balaji Thoguluva Bapulal wrote:
> Dear users,
>
> I am trying to establish a IKEv2/IPsec tunnel from a security gateway
> towards strongswan with strongswan acting as a responder. In response
> to IKE_SA_INIT request packet, strongswan sends back IKE_SA_INIT
> response with a Notify payload of MULTIPLE_AUTH_SUPPORTED with
> notification data missing. I have attached the wireshark. It would be
> great if someone can explain why this behavior.
>
> [IKEv2]$ ipsec --version
>
> Linux strongSwan U5.3.0/K3.8.13-16.2.1.el6uek.x86_64
>
> Institute for Internet Technologies and Applications
>
> University of Applied Sciences Rapperswil, Switzerland
>
> See 'ipsec --copyright' for copyright information.
>
> The following is the configuration.
>
> config setup
>
> charondebug=all
>
> conn %default
>
> keyingtries=1
>
> keyexchange=ikev2
>
> reauth=no
>
> conn psk
>
> left=172.16.55.62
>
> leftsourceip=%config%
>
> leftfirewall=no
>
> leftauth=psk
>
> leftsubnet=172.16.0.0/16
>
> right=172.16.135.192
>
> rightid=172.16.135.192
>
> rightsubnet=172.16.0.0/16
>
> rightauth=psk
>
> esp=3des-aes-sha1-md5-modp1024
>
> ike=3des-sha1-md5-modp1024
>
> auto=add
>
> type=tunnel
>
> Thanks,
>
> Balaji
>
--
======================================================================
Andreas Steffen andreas.steffen at strongswan.org
strongSwan - the Open Source VPN Solution! www.strongswan.org
Institute for Networked Solutions
University of Applied Sciences Rapperswil
CH-8640 Rapperswil (Switzerland)
===========================================================[INS-HSR]==
More information about the Users
mailing list