[strongSwan] second connection from the same machine fails

Naveen Neelakanta naveen.b.neelakanta at gmail.com
Fri Mar 2 09:33:13 CET 2018


Hi Noel,


Need some guidance on the below issues using strongswan .


1) The second connection with the below configuration fails .



config setup


conn %default

        ikelifetime=8h

        keylife=8h

        rekeymargin=3m

        keyingtries=2

        keyexchange=ikev1

        authby=secret

        type=tunnel

        left=10.24.18.209

        leftsubnet=0.0.0.0/0

        ike=aes128-sha1-modp1024

        esp=null-md5-modp1024



conn net-net

        right=10.24.18.35

        rightsubnet=0.0.0.0/0

        mark_out=32

        auto=add

        installpolicy=yes


conn net1-net1

        right=10.24.18.36

        rightsubnet=0.0.0.0/0

        mark_out=33

        auto=add

        installpolicy=yes


#ipsec up net1-net1


unable to install policy 0.0.0.0/0 === 0.0.0.0/0 in for reqid 2, the same
policy for reqid 1 exists

unable to install policy 0.0.0.0/0 === 0.0.0.0/0 fwd for reqid 2, the same
policy for reqid 1 exists

unable to install IPsec policies (SPD) in kernel

*establishing connection 'net1-net1' failed*



2)  I intend to use marking as selector using VTI interface , i see that
the packet gets encrypted and leave the machine, however my intention is
identify return traffic after decryption to be marked with the same
marking, so that i can route based on the marked packet to a specific
interface, but i see that the inbound SA does not have the mark and the
policy drops the return traffic .

src 0.0.0.0/0 dst 0.0.0.0/0

dir out priority 399999

mark 32/0xffffffff

tmpl src 10.24.18.209 dst 10.24.18.35

proto esp spi 0xce437d69 reqid 1 mode tunnel


src 0.0.0.0/0 dst 0.0.0.0/0

dir in priority 399999

        mark 32/0xffffffff

tmpl src 10.24.18.35 dst 10.24.18.209

proto esp reqid 1 mode tunnel

 SADB:

src 10.24.18.209 dst 10.24.18.35

proto esp spi 0xce437d69 reqid 1 mode tunnel

replay-window 0 flag af-unspec

mark 32/0xffffffff

auth-trunc hmac(md5) 0x73f7dac6b9ef4de0dd6965ce30e2e548 96

enc ecb(cipher_null)

src 10.24.18.35 dst 10.24.18.209

proto esp spi 0xca115267 reqid 1 mode tunnel

replay-window 32 flag af-unspec

auth-trunc hmac(md5) 0xcc44e5211adb4b23d281e9b94853b31c 96

enc ecb(cipher_null)



How can i get the return traffic to be marked so that there is no policy
mismatch.

3) When i bring up the tunnel with the leftsubnet any and rightsubnet any ,
i lose ssh access, i have disabled route install from strongswan
configuration file .

conn %default

        ikelifetime=8h

        keylife=8h

        rekeymargin=3m

        keyingtries=2

        keyexchange=ikev1

        authby=secret

        type=tunnel

        left=10.24.18.209

        leftsubnet=0.0.0.0/0

        ike=aes128-sha1-modp1024

        esp=null-md5-modp1024

        installpolicy=no



conn net-net

        right=10.24.18.35

        rightsubnet=0.0.0.0/0

        mark_out=32

        auto=add

        installpolicy=yes

######### strongswan.conf #######

        interfaces_use = eth3

        install_routes = no

Please provide some light on the above issues.

Thanks,
Naveen
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.strongswan.org/pipermail/users/attachments/20180302/50441952/attachment-0001.html>


More information about the Users mailing list