[strongSwan] dpd not getting triggered
Kalyani Garigipati (kagarigi)
kagarigi at cisco.com
Fri Jan 12 12:52:18 CET 2018
Hi Andreas,
Sorry the message came unformatted.
Basically the message is going without nat payloads
generating INFORMATIONAL request 3 []
please let me know if I have to enable something. I already enabled mobike.
regards,
kalyani
-----Original Message-----
From: Users [mailto:users-bounces at lists.strongswan.org] On Behalf Of Kalyani Garigipati (kagarigi)
Sent: Friday, January 12, 2018 4:14 PM
To: Andreas Steffen <andreas.steffen at strongswan.org>; bls s <blscl at outlook.com>; users at lists.strongswan.org
Subject: Re: [strongSwan] dpd not getting triggered
Hi Andreas,
But I observed that even though I enabled mobike, dpd is not sending the NAT detection payload.
Below are the logs. I am using strongswan-5.6.1
charon: 08[NET] sending packet: from 10.127.47.104[500] to 10.104.108.110[500] (524 bytes) Jan 12 08:34:10 strongswan charon: 10[NET] received packet: from 10.104.108.110[500] to 10.127.47.104[500] (471 bytes) Jan 12 08:34:10 strongswan charon: 10[ENC] parsed IKE_SA_INIT response 0 [ SA KE No V V N(NATD_S_IP) N(NATD_D_IP) CERTREQ N(FRAG_SUP) V ] Jan 12 08:34:10 strongswan charon: 10[IKE] received Cisco Delete Reason vendor ID Jan 12 08:34:10 strongswan charon: 10[IKE] received Cisco Copyright (c) 2009 vendor ID Jan 12 08:34:10 strongswan charon: 10[IKE] received FRAGMENTATION vendor ID Jan 12 08:34:10 strongswan charon: 10[IKE] received 1 cert requests for an unknown ca Jan 12 08:34:10 strongswan charon: 10[IKE] sending cert request for "C=US, O=Cisco, CN=BrianMojaveRoot.cisco.com, CN=BrianMojaveRoot.cisco.com"
Jan 12 08:34:10 strongswan charon: 10[IKE] authentication of '10.127.47.104' (myself) with pre-shared key Jan 12 08:34:10 strongswan charon: 10[IKE] establishing CHILD_SA net-net{1} Jan 12 08:34:10 strongswan charon: 10[ENC] generating IKE_AUTH request 1 [ IDi N(INIT_CONTACT) CERTREQ IDr AUTH SA TSi TSr N(MOBIKE_SUP) N(ADD_4_ADDR) N(ADD_4_ADDR) N(ADD_4_ADDR) N(ADD_4_ADDR) N(ADD_6_ADDR) N(ADD_6_ADDR) N(ADD_6_ADDR) N(ADD_6_ADDR) N(EAP_ONLY) N(MSG_ID_SYN_SUP) ] Jan 12 08:34:10 strongswan charon: 10[NET] sending packet: from 10.127.47.104[4500] to 10.104.108.110[4500] (528 bytes) Jan 12 08:34:10 strongswan charon: 11[NET] received packet: from 10.104.108.110[4500] to 10.127.47.104[4500] (256 bytes) Jan 12 08:34:10 strongswan charon: 11[ENC] parsed IKE_AUTH response 1 [ V IDr AUTH SA TSi TSr N(ESP_TFC_PAD_N) N(NON_FIRST_FRAG) N(MOBIKE_SUP) ] Jan 12 08:34:10 strongswan charon: 11[IKE] authentication of '10.104.108.110' with pre-shared key successful Jan 12 08:34:10 strongswan charon: 11[IKE] IKE_SA net-net[1] established between 10.127.47.104[10.127.47.104]...10.104.108.110[10.104.108.110]
Jan 12 08:34:10 strongswan charon: 11[IKE] scheduling reauthentication in 5093s Jan 12 08:34:10 strongswan charon: 11[IKE] maximum IKE_SA lifetime 5573s Jan 12 08:34:10 strongswan charon: 11[IKE] received ESP_TFC_PADDING_NOT_SUPPORTED, not using ESPv3 TFC padding Jan 12 08:34:10 strongswan charon: 11[IKE] CHILD_SA net-net{1} established with SPIs c6fbf7d4_i 775e9cde_o and TS 10.127.47.104/32 === 10.104.108.110/32 Jan 12 08:34:10 strongswan charon: 11[IKE] peer supports MOBIKE Jan 12 08:34:15 strongswan charon: 06[IKE] sending DPD request Jan 12 08:34:15 strongswan charon: 06[ENC] generating INFORMATIONAL request 2 [ ] Jan 12 08:34:15 strongswan charon: 06[NET] sending packet: from 10.127.47.104[4500] to 10.104.108.110[4500] (80 bytes) Jan 12 08:34:15 strongswan charon: 15[NET] received packet: from 10.104.108.110[4500] to 10.127.47.104[4500] (80 bytes) Jan 12 08:34:15 strongswan charon: 15[ENC] parsed INFORMATIONAL response 2 [ ] Jan 12 08:34:20 strongswan charon: 05[IKE] sending DPD request Jan 12 08:34:20 strongswan charon: 05[ENC] generating INFORMATIONAL request 3 [ ] Jan 12 08:34:20 strongswan charon: 05[NET] sending packet: from 10.127.47.104[4500] to 10.104.108.110[4500] (80 bytes) Jan 12 08:34:20 strongswan charon: 07[NET] received packet: from 10.104.108.110[4500] to 10.127.47.104[4500] (80 bytes) Jan 12 08:34:20 strongswan charon: 07[ENC] parsed INFORMATIONAL response 3 [ ]
Regards,
Kalyani
-----Original Message-----
From: Andreas Steffen [mailto:andreas.steffen at strongswan.org]
Sent: Friday, January 12, 2018 2:46 PM
To: Kalyani Garigipati (kagarigi) <kagarigi at cisco.com>; bls s <blscl at outlook.com>; users at lists.strongswan.org
Subject: Re: [strongSwan] dpd not getting triggered
Hi Kalyani,
strongSwan uses NAT detection payloads in INFORMATIONAL messages with RFC 4555 MOBIKE which is enabled by default. See
https://tools.ietf.org/html/rfc4555#section-3.8
Regards
Andreas
On 12.01.2018 07:16, Kalyani Garigipati (kagarigi) wrote:
> Hi,
>
>
>
> Thanks a lot for the reply. It worked. I see the dpd triggering now.
>
>
>
> I am working on a case when dpd from strongswan sends the nat
> detection payloads.
>
> I wanted to know upon which conditions strongswan would send dpd
> request with nat_detection_src_ip and nat_detection_dst_ip.
>
>
>
> Is it done only in specific case like when strongswan is behind the
> nat ? and strongswan is in remote-access-client ?
>
>
>
> Regards,
>
> kalyani
>
>
>
> *From:*bls s [mailto:blscl at outlook.com]
> *Sent:* Friday, January 12, 2018 6:40 AM
> *To:* Kalyani Garigipati (kagarigi) <kagarigi at cisco.com>;
> users at lists.strongswan.org
> *Subject:* RE: [strongSwan] dpd not getting triggered
>
>
>
> By default dpdaction=none, which disables sending dpd messages.
>
>
>
> *From: *Kalyani Garigipati (kagarigi) <mailto:kagarigi at cisco.com>
> *Sent: *Thursday, January 11, 2018 10:47 AM
> *To: *users at lists.strongswan.org <mailto:users at lists.strongswan.org>
> *Subject: *[strongSwan] dpd not getting triggered
>
>
>
> Hi,
>
> I am using strongswan version 5.6.1
> I found that even though I configured dpd using dpddelay and
> dpdtimeout, dpd is not getting triggered from strongswan client at all
> even though there is no traffic passing.
> Please let me know how to debug this.
>
>
> config setup
> charondebug=all
> # crlcheckinterval=600
> # strictcrlpolicy=yes
> # cachecrls=yes
> # nat_traversal=yes
> # charonstart=no
>
> conn %default
> ikelifetime=100m
> keylife=20m
> rekeymargin=8m
> keyingtries=1
> authby=psk
> keyexchange=ikev2
> ike=aes256-sha256-modp1024
> esp=3des-sha1
> mobike=yes
> dpddelay=5s
> dpdtimeout=150s
>
> # Add connections here.
>
> # Add connections here.
> conn net-net
> left=10.127.47.104
> leftsubnet=10.127.47.104/32
> leftid=10.127.47.104
> right=10.104.108.110
> rightsubnet=10.104.108.110/32
> rightid=10.104.108.110
> auto=start
>
> ~
> Regards,
> kalyani
>
--
======================================================================
Andreas Steffen andreas.steffen at strongswan.org
strongSwan - the Open Source VPN Solution! www.strongswan.org
Institute for Networked Solutions
HSR University of Applied Sciences Rapperswil
CH-8640 Rapperswil (Switzerland)
===========================================================[INS-HSR]==
More information about the Users
mailing list