[strongSwan] Site-to-site VPN configuration help
Dafydd Tomos
d at fydd.org
Wed Mar 25 16:13:41 CET 2020
On 25/03/2020 14:50, Noel Kuntze wrote:
>> server-to-aws: 10.100.15.1...y.y.y.y IKEv1, dpddelay=15s
>> I ended up adding an interface for 10.100.15.1 as that what appears to be required.
> The conn is configured for x.x.x.x, not 10.100.15.1. strongSwan doesn't need such an address.
> Set left=x.x.x.x.
>
Ah thanks. That's what I did originally in fact. The log now shows it
looping around those proposing traffic selectors. Before this change it
was trying to connect. Now it says 0 connecting.
Status of IKE charon daemon (strongSwan 5.5.1, Linux 4.9.0-11-amd64,
x86_64):
uptime: 5 seconds, since Mar 25 15:07:42 2020
malloc: sbrk 2297856, mmap 0, used 418656, free 1879200
worker threads: 11 of 16 idle, 5/0/0/0 working, job queue: 0/0/0/0,
scheduled: 0
loaded plugins: charon aesni aes rc2 sha2 sha1 md5 random nonce x509
revocation constraints pubkey pkcs1 pkcs7 pkcs8 pkcs12 p
gp dnskey sshkey pem openssl fips-prf gmp agent xcbc hmac gcm attr
kernel-netlink resolve socket-default connmark stroke updown
Listening IP addresses:
x.x.x.x
10.100.15.1
Connections:
server-to-aws: x.x.x.x...y.y.y.y IKEv1, dpddelay=15s
server-to-aws: local: [server] uses pre-shared key authentication
server-to-aws: remote: [aws] uses pre-shared key authentication
server-to-aws: child: 10.100.15.0/24 === 172.21.0.0/16 172.22.0.0/16
TUNNEL, dpdaction=restart
Security Associations (0 up, 0 connecting):
none
Wed, 2020-03-25 15:08 13[IKE] <3> y.y.y.y is initiating a Main Mode IKE_SA
Wed, 2020-03-25 15:08 13[IKE] <3> IKE_SA (unnamed)[3] state change:
CREATED => CONNECTING
Wed, 2020-03-25 15:08 13[CFG] <3> selecting proposal:
Wed, 2020-03-25 15:08 13[CFG] <3> proposal matches
Wed, 2020-03-25 15:08 13[CFG] <3> received proposals:
IKE:AES_CBC_256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1536
Wed, 2020-03-25 15:08 13[CFG] <3> configured proposals:
IKE:AES_CBC_256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1536, IKE:AES_
CBC_128/AES_CBC_192/AES_CBC_256/AES_CTR_128/AES_CTR_192/AES_CTR_256/CAMELLIA_CBC_128/CAMELLIA_CBC_192/CAMELLIA_CBC_256/3DES_CBC
/HMAC_SHA2_256_128/HMAC_SHA2_384_192/HMAC_SHA2_512_256/AES_XCBC_96/AES_CMAC_96/HMAC_MD5_96/HMAC_SHA1_96/PRF_AES128_XCBC/PRF_AES
128_CMAC/PRF_HMAC_SHA2_256/PRF_HMAC_SHA2_384/PRF_HMAC_SHA2_512/PRF_HMAC_MD5/PRF_HMAC_SHA1/ECP_256/ECP_384/ECP_521/ECP_256_BP/ECP_384_BP/ECP_512_BP/MODP_3072/MODP_4096/MODP_8192/MODP_2048/MODP_2048_256/MODP_1024,
IKE:AES_CCM_16_128/AES_CCM_16_192/AES_CCM_16_256/AES_GCM_16_128/AES_GCM_16_192/AES_GCM_16_256/AES_CCM_8_128/AES_CCM_8_192/AES_CCM_8_256/AES_CCM_12_128/AES_CCM_12_192/AES_CCM_12_256/AES_GCM_8_128/AES_GCM_8_192/AES_GCM_8_256/AES_GCM_12_128/AES_GCM_12_192/AES_GCM_12_256/PRF_AES128_XCBC/PRF_AES128_CMAC/PRF_HMAC_SHA2_256/PRF_HMAC_SHA2_384/PRF_HMAC_SHA2_512/PRF_HMAC_MD5/PRF_HMAC_SHA1/ECP_256/ECP_384/ECP_521/ECP_256_BP/ECP_384_BP/ECP_512_BP/MODP_3072/MODP_4096/MODP_8192/MODP_2048/MODP_2048_256/MODP_1024
Wed, 2020-03-25 15:08 13[CFG] <3> selected proposal:
IKE:AES_CBC_256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1536
Wed, 2020-03-25 15:08 13[IKE] <3> sending XAuth vendor ID
Wed, 2020-03-25 15:08 13[IKE] <3> sending DPD vendor ID
Wed, 2020-03-25 15:08 13[IKE] <3> sending FRAGMENTATION vendor ID
Wed, 2020-03-25 15:08 13[IKE] <3> sending NAT-T (RFC 3947) vendor ID
Wed, 2020-03-25 15:08 13[ENC] <3> generating ID_PROT response 0 [ SA V V
V V ]
Wed, 2020-03-25 15:08 13[NET] <3> sending packet: from x.x.x.x[500] to
y.y.y.y[500] (164 bytes)
Wed, 2020-03-25 15:08 10[NET] <3> received packet: from y.y.y.y[500] to
x.x.x.x[500] (316 bytes)
Wed, 2020-03-25 15:08 10[ENC] <3> parsed ID_PROT request 0 [ KE No NAT-D
NAT-D ]
Wed, 2020-03-25 15:08 10[LIB] <3> size of DH secret exponent: 1535 bits
Wed, 2020-03-25 15:08 10[IKE] <3> remote host is behind NAT
Wed, 2020-03-25 15:08 10[ENC] <3> generating ID_PROT response 0 [ KE No
NAT-D NAT-D ]
Wed, 2020-03-25 15:08 10[NET] <3> sending packet: from x.x.x.x[500] to
y.y.y.y[500] (332 bytes)
Wed, 2020-03-25 15:08 14[NET] <3> received packet: from y.y.y.y[4500] to
x.x.x.x[4500] (108 bytes)
Wed, 2020-03-25 15:08 14[ENC] <3> parsed ID_PROT request 0 [ ID HASH
N(INITIAL_CONTACT) ]
Wed, 2020-03-25 15:08 14[CFG] <3> looking for pre-shared key peer
configs matching x.x.x.x...y.y.y.y[172.20.0.10]
Wed, 2020-03-25 15:08 14[IKE] <3> no peer config found
Wed, 2020-03-25 15:08 14[IKE] <3> queueing INFORMATIONAL task
Wed, 2020-03-25 15:08 14[IKE] <3> activating new tasks
Wed, 2020-03-25 15:08 14[IKE] <3> activating INFORMATIONAL task
Wed, 2020-03-25 15:08 14[ENC] <3> generating INFORMATIONAL_V1 request
266312254 [ HASH N(AUTH_FAILED) ]
Wed, 2020-03-25 15:08 14[NET] <3> sending packet: from x.x.x.x[4500] to
y.y.y.y[4500] (108 bytes)
Wed, 2020-03-25 15:08 14[IKE] <3> IKE_SA (unnamed)[3] state change:
CONNECTING => DESTROYING
Wed, 2020-03-25 15:08 03[CFG] proposing traffic selectors for us:
Wed, 2020-03-25 15:08 03[CFG] 10.100.15.0/24
Wed, 2020-03-25 15:08 03[CFG] proposing traffic selectors for other:
Wed, 2020-03-25 15:08 03[CFG] 172.21.0.0/16
Wed, 2020-03-25 15:08 03[CFG] 172.22.0.0/16
More information about the Users
mailing list