[strongSwan] Help with Issue#2583

Anne Ambe anne.ambe at air-lynx.com
Thu Mar 22 14:42:49 CET 2018


Hi all,

Please can someone look into my issue with the forecast plugin?

Issue number: 2583.

Thank you for your assistance.


Anne


On 3/22/2018 12:26 AM, Kristian McColm wrote:
> Hello List,
>
> I seem to have a very similar problem to the following:
>
> https://wiki.strongswan.org/issues/1532
>
> I am wondering if anyone on the list has had any success with IKEv2 or any other IPSec VPNs over NAT64.
>
> I am currently working on a project to migrate a large number of mobile devices from dual-stack mode to IPv6 only mode. I have a stateful NAT64 / DNS64 solution that is working fine for the majority of protocols but I believe something is getting mangled when it comes to IPSec using UDP encapsulated ESP (NAT-T).
>
> I have tested with both the latest Android and iPhone devices and they are not able to successfully do two-way data after phase 2 is established. Below is my connection defined in ipsec.conf:
>
> conn ikev2-vpn-ipv4v6
>    auto=add
>    compress=no
>    type=tunnel
>    keyexchange=ikev2
>    fragmentation=yes
>    forceencaps=no
>    ike=aes256-sha1-modp1024,3des-sha1-modp1024!
>    esp=aes256-sha1,3des-sha1!
>    dpdaction=clear
>    dpddelay=5s
>    left=<vpn_server_fqdn>
>    leftid=@<vpn_server_identifier>
>    leftcert=/etc/strongswan/ipsec.d/certs/vpn-server-cert.pem
>    leftsendcert=always
>    leftsubnet=0.0.0.0/0,::/0
>    leftdns=<ipv4_dns_server_ip>,<ipv6_dns_server_ip>
>    right=%any
>    rightid=%any
>    rightauth=eap-mschapv2
>    rightsourceip=<ipv4_virtualIP_subnet>,<ipv6_virtualIP_prefix>
>    rightsendcert=never
>    eap_identity=%identity
>
> Below is a strongswan statusall:
>
> [root at gw ~]# strongswan statusall
> Status of IKE charon daemon (strongSwan 5.6.0, Linux 4.15.9-200.fc26.x86_64, x86_64):
>    uptime: 20 hours, since Mar 20 22:57:20 2018
>    malloc: sbrk 2703360, mmap 0, used 700784, free 2002576
>    worker threads: 11 of 16 idle, 5/0/0/0 working, job queue: 0/0/0/0, scheduled: 12
>    loaded plugins: charon pkcs11 tpm aes des rc2 sha2 sha1 md4 md5 random nonce x509 revocation constraints acert pubkey pkcs1 pkcs8 pkcs12 pgp dnskey sshkey pem openssl gcrypt fips-prf gmp curve25519 chapoly xcbc cmac hmac ctr ccm gcm curl attr kernel-netlink resolve socket-default farp stroke vici updown eap-identity eap-sim eap-aka eap-aka-3gpp eap-aka-3gpp2 eap-md5 eap-gtc eap-mschapv2 eap-dynamic eap-tls eap-ttls eap-peap xauth-generic xauth-eap xauth-pam xauth-noauth dhcp led duplicheck unity
> Virtual IP pools (size/online/offline):
>    <redacted>
> Listening IP addresses:
>    <redacted>
> Connections:
> ikev2-vpn-ipv4v6:  <redacted>...%any  IKEv2, dpddelay=5s
> ikev2-vpn-ipv4v6:   local:  [<redacted>] uses public key authentication
> ikev2-vpn-ipv4v6:    cert:  "<redacted>"
> ikev2-vpn-ipv4v6:   remote: uses EAP_MSCHAPV2 authentication with EAP identity '%any'
> ikev2-vpn-ipv4v6:   child:  0.0.0.0/0 ::/0 === dynamic TUNNEL, dpdaction=clear
> Security Associations (1 up, 0 connecting):
> ikev2-vpn-ipv4v6[33]: ESTABLISHED 6 seconds ago, <redacted> [<redacted>]...<redacted> [<redacted>]
> ikev2-vpn-ipv4v6[33]: Remote EAP identity: <redacted>
> ikev2-vpn-ipv4v6[33]: IKEv2 SPIs: 877e5afe818caada_i 5eb7c2351f6a3a8d_r*, public key reauthentication in 2 hours
> ikev2-vpn-ipv4v6[33]: IKE proposal: 3DES_CBC/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024
> ikev2-vpn-ipv4v6{16}:  INSTALLED, TUNNEL, reqid 15, ESP in UDP SPIs: cefb5147_i 0373162d_o
> ikev2-vpn-ipv4v6{16}:  3DES_CBC/HMAC_SHA1_96, 1940 bytes_i (32 pkts, 2s ago), 6616 bytes_o (32 pkts, 2s ago), rekeying in 44 minutes
> ikev2-vpn-ipv4v6{16}:   0.0.0.0/0 ::/0 === <redacted>/32 <redacted>/128
>
> The connection works fine over IPv4 (via our NAT44), also over native IPv6, but when we use DNS64/NAT64 the tunnel comes up but data transfer fails (ICMP / HTTP / SSL / whatever..).
>
> The Wiki post does not seem to have found any resolution. Can anyone suggest if this use case is valid, (ie. Should this even work at all), or what I might be missing to make it work?
>
> Thanks
> KM
>
>
>
>
>


---
This email has been checked for viruses by Avast antivirus software.
https://www.avast.com/antivirus



More information about the Users mailing list