[strongSwan] Site-to-site VPN configuration help

Noel Kuntze noel.kuntze+strongswan-users-ml at thermi.consulting
Wed Mar 25 15:29:19 CET 2020


Hi,

Configure debug logging as shown on the HelpRequests[1] page and post it.

Kind regards

Noel

[1] https://wiki.strongswan.org/projects/strongswan/wiki/HelpRequests

Am 25.03.20 um 15:13 schrieb Dafydd Tomos:
> Hi,
> 
> I am using strongSwan to connect to a supplier's VPN, but am having trouble understanding the IP network ranges required.
> 
> The server I'm connecting from is a Debian server with strongswan 5.5.1. It has one public IP in a /29 so has one interface (bond0 using eth0/eth1). There are iptables rules for incoming traffic, nothing for outgoing. I ended up adding an interface for 10.100.15.1 as that what appears to be required.
> 
> The 3rd party has supplied details for a Fortigate VPN. I have an AWS VPN endpoint IP along with the usual encryption details, using a PSK. It wants  AES256 + SHA256 + DH Group 5
> 
> It lists two 'encryption domain' IP ranges for their side. It also provides an encryption domain for our side. Here's the ipsec.conf, anonymised
> 
> 
> config setup
>         # strictcrlpolicy=yes
>         # uniqueids = no
>         charondebug="all"
>         uniqueids=yes
>         strictcrlpolicy=no
> 
> conn server-to-aws
>         authby=secret
>         type=tunnel
>         auto=start
>         compress=no
> 
>         leftid=server
> # I tried these first
> #       left=x.x.x.x (public IP of our server)
> #       leftsubnet=x.x.x.x/29
>         left=10.100.15.1
>         leftsubnet=10.100.15.0/24 (encryption domain for our side, mandated by 3rd party)
>         leftfirewall=no
> 
>         right=y.y.y.y (public VPN endpoint of 3rd party)
>         rightid=aws
>         rightsubnet=172.21.0.0/16, 172.22.0.0/16 (encryption domain of 3rd party)
>         keyexchange=ikev1
>         ike=aes256-sha256-modp1536
>         esp=aes256-sha256-modp1536
>         ikelifetime=24h
>         lifetime=24h
>         dpddelay=15
>         dpdtimeout=30
> 
> Here's the log, anonymised with the same IPs
> 
> Mar 25 14:03:55  charon: 00[DMN] Starting IKE charon daemon (strongSwan 5.5.1, Linux 4.9.0-11-amd64, x86_64)
> Mar 25 14:03:55  charon: 00[CFG] loading ca certificates from '/etc/ipsec.d/cacerts'
> Mar 25 14:03:55  charon: 00[CFG] loading aa certificates from '/etc/ipsec.d/aacerts'
> Mar 25 14:03:55  charon: 00[CFG] loading ocsp signer certificates from '/etc/ipsec.d/ocspcerts'
> Mar 25 14:03:55  charon: 00[CFG] loading attribute certificates from '/etc/ipsec.d/acerts'
> Mar 25 14:03:55  charon: 00[CFG] loading crls from '/etc/ipsec.d/crls'
> Mar 25 14:03:55  charon: 00[CFG] loading secrets from '/etc/ipsec.secrets'
> Mar 25 14:03:55  charon: 00[CFG] expanding file expression '/var/lib/strongswan/ipsec.secrets.inc' failed
> Mar 25 14:03:55  charon: 00[CFG]   loaded IKE secret for 10.100.15.1 y.y.y.y
> Mar 25 14:03:55  charon: 00[CFG]   loaded IKE secret for x.x.x.x y.y.y.y
> Mar 25 14:03:55  charon: 00[LIB] loaded plugins: charon aesni aes rc2 sha2 sha1 md5 random nonce x509 revocation constrai
> nts pubkey pkcs1 pkcs8 pkcs12 pgp dnskey sshkey pem openssl fips-prf gmp agent xcbc hmac gcm attr kernel-netlink resolve
> socket-default ck stroke updown
> Mar 25 14:03:55  charon: 00[LIB] dropped capabilities, running as uid 0, gid 0
> Mar 25 14:03:55  charon: 00[JOB] spawning 16 worker threads
> Mar 25 14:03:55  charon: 16[CFG] received stroke: add connection 'server-to-aws'
> Mar 25 14:03:55  charon: 16[CFG] added configuration 'server-to-aws'
> Mar 25 14:03:55  charon: 07[CFG] received stroke: initiate 'server-to-aws'
> Mar 25 14:03:55  charon: 07[IKE] initiating Main Mode IKE_SA server-to-aws[1] to y.y.y.y
> Mar 25 14:03:55  charon: 07[ENC] generating ID_PROT request 0 [ SA V V V V V ]
> Mar 25 14:03:55  charon: 07[NET] sending packet: from 10.100.15.1[500] to y.y.y.y[500] (252 bytes)
> Mar 25 14:03:59  charon: 12[IKE] sending retransmit 1 of request message ID 0, seq 1
> Mar 25 14:03:59  charon: 12[NET] sending packet: from 10.100.15.1[500] to y.y.y.y[500] (252 bytes)
> Mar 25 14:04:06  charon: 11[IKE] sending retransmit 2 of request message ID 0, seq 1
> Mar 25 14:04:06  charon: 11[NET] sending packet: from 10.100.15.1[500] to y.y.y.y[500] (252 bytes)
> Mar 25 14:04:15  charon: 07[NET] received packet: from y.y.y.y[500] to x.x.x.x[500] (292 bytes)
> Mar 25 14:04:15  charon: 07[ENC] parsed ID_PROT request 0 [ SA V V V V V V V V V V ]
> Mar 25 14:04:15  charon: 07[IKE] no IKE config found for x.x.x.x...y.y.y.y, sending NO_PROPOSAL_CHOSEN
> Mar 25 14:04:15  charon: 07[ENC] generating INFORMATIONAL_V1 request 852369688 [ N(NO_PROP) ]
> Mar 25 14:04:15  charon: 07[NET] sending packet: from x.x.x.x[500] to y.y.y.y[500] (40 bytes)
> Mar 25 14:04:16  snmpd[1797]: error on subcontainer 'ia_addr' insert (-1)
> Mar 25 14:04:18  charon: 10[NET] received packet: from y.y.y.y[500] to x.x.x.x[500] (292 bytes)
> Mar 25 14:04:18  charon: 10[ENC] parsed ID_PROT request 0 [ SA V V V V V V V V V V ]
> Mar 25 14:04:18  charon: 10[IKE] no IKE config found for x.x.x.x...y.y.y.y, sending NO_PROPOSAL_CHOSEN
> Mar 25 14:04:18  charon: 10[ENC] generating INFORMATIONAL_V1 request 699850337 [ N(NO_PROP) ]
> Mar 25 14:04:18  charon: 10[NET] sending packet: from x.x.x.x[500] to y.y.y.y[500] (40 bytes)
> Mar 25 14:04:19  charon: 14[IKE] sending retransmit 3 of request message ID 0, seq 1
> Mar 25 14:04:19  charon: 14[NET] sending packet: from 10.100.15.1[500] to y.y.y.y[500] (252 bytes)
> Mar 25 14:04:24  charon: 00[DMN] signal of type SIGINT received. Shutting down
> Mar 25 14:04:24  charon: 00[IKE] destroying IKE_SA in state CONNECTING without notification
> 
> 
> thanks
> 

-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 833 bytes
Desc: OpenPGP digital signature
URL: <http://lists.strongswan.org/pipermail/users/attachments/20200325/717b3d36/attachment.sig>


More information about the Users mailing list