[strongSwan] swanctl -l - loses transport info?

Noel Kuntze noel.kuntze+strongswan-users-ml at thermi.consulting
Thu Apr 4 20:47:54 CEST 2019


Hi,

> - the initial SA doesn't need to do a key exchange because it was just done by IKE

Yes.

> - rekeying does, and uses that configured ECP256 (or DH groups etc.)

Yes.

Kind regards

Noel


Am 04.04.19 um 20:45 schrieb Kostya Vasilyev:
> On Thu, Apr 4, 2019, at 9:42 PM, Noel Kuntze wrote:
>> Hi,
>>
>> In IKEv2, the KEX in P2 is only displayed when it actually occurs. In 
>> any case, in the first CHILD_SA of a new IKE_SA, there's no KEX when it 
>> is negotiated, so it's not displayed, because the KEX algorithm and 
>> keylength are unknown. When a new CHILD_SA is negotiated (which 
>> rekeying uses), a KEX is made, thus the algorithm and keylengtha re 
>> known and it is displayed. You can easily recreate that scenario with 
>> `swanctl --rekey [...]`.
> 
> Thank you. Exactly what I just discovered too :)
> 
> So I guess another way to look at this is - 
> 
> - the initial SA doesn't need to do a key exchange because it was just done by IKE
> 
> - rekeying does, and uses that configured ECP256 (or DH groups etc.)
> 
> Correct (more or less)?
> 
> -- K
> 
>>
>> Kind regards
>>
>> Noel
>>
>> Am 04.04.19 um 20:32 schrieb Kostya Vasilyev:
>>> Hi,
>>>
>>> I'm seeing something weird with the output of "swanctl -l".
>>>
>>> Sometimes the SA's are output like this:
>>>
>>> home_gre: #3, reqid 3, INSTALLED, TRANSPORT, ESP:AES_CTR-128/HMAC_SHA2_256_128
>>>
>>> linode: #4, reqid 4, INSTALLED, TRANSPORT, ESP:AES_GCM_16-128
>>>
>>> And sometimes like this:
>>>
>>> home_gre: #6, reqid 6, INSTALLED, TRANSPORT, ESP:AES_CTR-128/HMAC_SHA2_256_128/ECP_256
>>>
>>> linode: #4, reqid 4, INSTALLED, TRANSPORT, ESP:AES_GCM_16-128/ECP_256
>>>
>>> The variation is in the "/ECP256" at the end.
>>>
>>> I think this varies depending on how I start strongSwan (swanctl -q vs. systemctl restart) or maybe rekeying.
>>>
>>> But my server and client configs don't change.
>>>
>>> My server config is like this:
>>>
>>> connections {
>>> 	ec_tunnel {
>>> 		version = 2
>>> 		proposals = aes128-sha256-ecp256
>>>
>>> 		// local, remote adds and auth omitted
>>> 		
>>> 		children {
>>> 			home_gre {
>>> 				local_ts  = dynamic[gre]
>>> 				remote_ts = dynamic[gre]
>>>
>>> 				mode = transport
>>> 				esp_proposals = aes128ctr-sha256-ecp256
>>> 			}
>>>
>>> 			linode {
>>> 				mode = transport
>>> 				esp_proposals = aes128gcm128-ecp256
>>> 			}
>>> 		}
>>> 	}
>>> }
>>>
>>> Client config for "linode" clinets:
>>>
>>> connections {
>>> 	ecdsa_tunnel {
>>> 		version = 2
>>> 		proposals = aes128-sha256-ecp256
>>>
>>> 		// local, remote adds and auth omitted
>>> 		
>>> 		children {
>>> 			fra  {
>>> 				mode = transport
>>> 				esp_proposals = aes128gcm128-ecp256
>>> 				start_action = start
>>> 				close_action = start
>>> 				dpd_action = restart
>>> 			}
>>> 		}
>>> 	}
>>> }
>>>
>>> Client "home_gre" (AES CTR) is a Miktotik at home and it also has ECP256 in its SA encryption config.
>>>
>>> Does this look like a bug in swanctl -l ?
>>>
>>> Or - most likely - user error?
>>>
>>> I got ideas for my crypto settings from here:
>>>
>>> https://wiki.strongswan.org/projects/strongswan/wiki/IKEv2CipherSuites
>>>
>>> Suite-B-GCM-128:
>>> IKEv2: aes128gcm16-prfsha256-ecp256
>>> ESP: aes128gcm16-ecp256
>>>
>>> Except I can't use GCM or PRF for IKE because of the Mikrotik client.
>>>
>>
>>
>> Attachments:
>> * signature.asc

-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 833 bytes
Desc: OpenPGP digital signature
URL: <http://lists.strongswan.org/pipermail/users/attachments/20190404/e350a268/attachment.sig>


More information about the Users mailing list