[strongSwan] Packet loss in ipsec tunnel

wax g. waxitau at gmail.com
Mon Oct 12 14:41:51 CEST 2020


Hi,
I have a route based ipsec tunnel that's working fine except that I'm
observing some packet loss over the tunnel (but no packet loss on the
underlying physical interface).

** RX Errors can be seen on the vti interface **:

root at spoke:~# ip -s -s -s l sh ipsec1
244: ipsec1 at NONE: <POINTOPOINT,MULTICAST,NOARP,UP,LOWER_UP> mtu 1420 qdisc
noqueue state UNKNOWN mode DEFAULT group default qlen 1
    link/ipip 169.254.255.1 peer 169.254.255.2
    RX: bytes  packets  errors  dropped overrun mcast
    45605608340 42900723 54170   54170   0       0
    RX errors: length   crc     frame   fifo    missed
               0        0       0       0       0
    TX: bytes  packets  errors  dropped carrier collsns
    7614392646 33201401 0       0       0       0
    TX errors: aborted  fifo   window heartbeat transns
               0        0       0       0       0

** But no errors on the underlying physical interface (ruling out frame crc
errors i guess) **:

root at spoke:~# ip -s  l sh eth0
2: eth0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc mq state UP mode
DEFAULT group default qlen 1000
    link/ether xx:xx:xx:xx:xx:xx brd ff:ff:ff:ff:ff:ff
    RX: bytes  packets  errors  dropped overrun mcast
    387884665702 347613392 0       0       0       84505
    TX: bytes  packets  errors  dropped carrier collsns
    102682750607 284163570 0       0       0       0

** Also the replay window stats > 0 in xfrm state ** :

root at spoke:~# ip -s xfrm state
src 169.254.255.1  dst 169.254.255.2
proto esp spi 0x67d21812(1741821970) reqid 98(0x00000062) mode tunnel
replay-window 0 seq 0x00000000 flag af-unspec (0x00100000)
mark 0x1/0xffffffff
auth-trunc hmac(sha1) 0xf2969aaxxxx (160 bits) 96
enc cbc(aes) 0x180c774xxxxx (128 bits)
anti-replay context: seq 0x0, oseq 0x21184d2, bitmap 0x00000000
lifetime config:
 limit: soft (INF)(bytes), hard (INF)(bytes)
 limit: soft (INF)(packets), hard (INF)(packets)
 expire add: soft 0(sec), hard 0(sec)
 expire use: soft 0(sec), hard 0(sec)
lifetime current:
 8141152159(bytes), 34702546(packets)
 add 2020-10-11 13:22:28 use 2020-10-11 13:22:30
stats:
 replay-window 0 replay 0 failed 0
src 169.254.255.2 dst 169.254.255.1
proto esp spi 0xccc9ea89(3435784841) reqid 98(0x00000062) mode tunnel
replay-window 32 seq 0x00000000 flag af-unspec (0x00100000)
mark 0x1/0xffffffff
auth-trunc hmac(sha1) 0x6b508daf6xxxxx(160 bits) 96
enc cbc(aes) 0xe545c1bxxxxxx (128 bits)
anti-replay context: seq 0x30dd997, oseq 0x0, bitmap 0xffffffff
lifetime config:
 limit: soft (INF)(bytes), hard (INF)(bytes)
 limit: soft (INF)(packets), hard (INF)(packets)
 expire add: soft 0(sec), hard 0(sec)
 expire use: soft 0(sec), hard 0(sec)
lifetime current:
 47548096033(bytes), 44810813(packets)
 add 2020-10-11 13:22:28 use 2020-10-11 13:22:34
stats:
 replay-window 54493 replay 0 failed 0
root at spoke:~#


* When is replay-window stats increased ?

* I've noticed that on devices not experiencing packet losses over the
ipsec tunnel all the stats = 0 (replay-window, replay & fail).

* I'm suspecting a replay window issue for received ipsec packets that are
dropped..

Has anyone encountered a similar problem ? any suggestions are welcome.

Thx & Regards,
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.strongswan.org/pipermail/users/attachments/20201012/eb452cf8/attachment.html>


More information about the Users mailing list