Bug #9767
closedInteresting Traffic Will not Initiate an IPsec VTI tunnel.
100%
Description
Interesting Traffic Will not Initiate an IPsec VTI tunnel.
Steps to reproduce:
Configure a VTI tunnel between two pfSense nodes, assign the interfaces, etc.
Set a ping target on each side for the other side of the VTI. It looks like this must be saved after the if_ipsec is assigned/created or /var/db/ipsecpinghosts is not properly-populated which is probably another bug.
Let the tunnel come up and verify it works.
Manually disconnect one side or the other on the IPsec > Status page.
Wait for ping_hosts to fire.
The IPsec logs will show this:
Sep 16 18:20:53 charon 09[KNL] received an SADB_ACQUIRE with policy id 580 but no matching policy found
Sep 16 18:20:53 charon 09[KNL] creating acquire job for policy 172.25.228.5/32|/0 === 172.25.228.9/32|/0 with reqid {0}
Sep 16 18:20:53 charon 09[CFG] trap not found, unable to acquire reqid 0
The tunnel will not come up again until something causes an IPsec reload, the user manually connects the tunnel, etc.
This was tested with a tunnel between a 2.4.4-p3 and 2.5.0 host with the current snapshot version.
It has also been seen on a customer tunnel between pfSense and AWS VPC.
Was also tested with static routes and LAN-to-LAN traffic. Same reqid 0 logs.
/var/etc/ipsec/ipsec.conf ipsec statusall swanctl --list-conns ifconfig -vm ipsec1000 From each side. 2.4.4-p3 first, 2.5.0 second. # This file is automatically generated. Do not edit config setup uniqueids = yes conn bypasslan leftsubnet = 172.25.232.0/24,fda7:d53d:e3d3:1::/64 rightsubnet = 172.25.232.0/24,fda7:d53d:e3d3:1::/64 authby = never type = passthrough auto = route conn con1000 reqid = 1000 fragmentation = yes keyexchange = ikev1 reauth = yes forceencaps = no mobike = no rekey = yes installpolicy = no dpdaction = restart dpddelay = 10s dpdtimeout = 60s auto = start left = 172.25.228.5 right = 172.25.228.9 leftid = 172.25.228.5 ikelifetime = 28800s lifetime = 3600s ike = aes128-sha1-modp1024! esp = aes128-sha1-modp1024! leftauth = psk rightauth = psk rightid = 172.25.228.9 aggressive = no rightsubnet = 172.22.177.1,0.0.0.0/0 leftsubnet = 172.22.177.2/30,0.0.0.0/0 Status of IKE charon daemon (strongSwan 5.7.1, FreeBSD 11.2-RELEASE-p10, amd64): uptime: 70 minutes, since Sep 16 17:33:41 2019 worker threads: 11 of 16 idle, 5/0/0/0 working, job queue: 0/0/0/0, scheduled: 10 loaded plugins: charon unbound aes des blowfish rc2 sha2 sha1 md4 md5 random nonce x509 revocation constraints pubkey pkcs1 pkcs7 pkcs8 pkcs12 pgp dnskey sshkey ipseckey pem openssl fips-prf curve25519 xcbc cmac hmac curl attr kernel-pfkey kernel-pfroute resolve socket-default stroke vici updown eap-identity eap-sim eap-md5 eap-mschapv2 eap-dynamic eap-radius eap-tls eap-ttls eap-peap xauth-generic xauth-eap whitelist addrblock counters Listening IP addresses: 172.25.232.1 fda7:d53d:e3d3:1::1 172.25.101.1 2001:470:f00e:ff01:789e:acff:fe9a:e764 172.25.232.234 172.25.228.5 2001:470:f00e:7fff::c8fb:f578 2001:1111:2222:0:d8fa:e0ff:feb4:73cd 192.168.2.1 172.25.16.1 172.25.227.5 172.22.177.2 Connections: bypasslan: %any...%any IKEv1/2 bypasslan: local: uses public key authentication bypasslan: remote: uses public key authentication bypasslan: child: 172.25.232.0/24|/0 fda7:d53d:e3d3:1::/64|/0 === 172.25.232.0/24|/0 fda7:d53d:e3d3:1::/64|/0 PASS con1000: 172.25.228.5...172.25.228.9 IKEv1, dpddelay=10s con1000: local: [172.25.228.5] uses pre-shared key authentication con1000: remote: [172.25.228.9] uses pre-shared key authentication con1000: child: 0.0.0.0/0|/0 === 0.0.0.0/0|/0 TUNNEL, dpdaction=restart Shunted Connections: bypasslan: 172.25.232.0/24|/0 fda7:d53d:e3d3:1::/64|/0 === 172.25.232.0/24|/0 fda7:d53d:e3d3:1::/64|/0 PASS Security Associations (0 up, 0 connecting): none bypasslan: IKEv1/2, reauthentication every 10260s, no rekeying local: %any remote: %any local public key authentication: remote public key authentication: bypasslan: PASS, no rekeying local: 172.25.232.0/24|/0 fda7:d53d:e3d3:1::/64|/0 remote: 172.25.232.0/24|/0 fda7:d53d:e3d3:1::/64|/0 con1000: IKEv1, reauthentication every 28260s, dpd delay 10s local: 172.25.228.5 remote: 172.25.228.9 local pre-shared key authentication: id: 172.25.228.5 remote pre-shared key authentication: id: 172.25.228.9 con1000: TUNNEL, rekeying every 3060s, dpd action is restart local: 0.0.0.0/0|/0 remote: 0.0.0.0/0|/0 ipsec1000: flags=8051<UP,POINTOPOINT,RUNNING,MULTICAST> metric 0 mtu 1500 tunnel inet 172.25.228.5 --> 172.25.228.9 inet6 fe80::1cbb:e5a5:cb74:41fd%ipsec1000 prefixlen 64 scopeid 0xa inet 172.22.177.2 --> 172.22.177.1 netmask 0xfffffffc nd6 options=21<PERFORMNUD,AUTO_LINKLOCAL> reqid: 1000 groups: ipsec # This file is automatically generated. Do not edit config setup uniqueids = yes conn bypasslan leftsubnet = 172.25.233.0/24,2001:470:f00e:7b01::/64 rightsubnet = 172.25.233.0/24,2001:470:f00e:7b01::/64 authby = never type = passthrough auto = route conn con1000 reqid = 1000 fragmentation = yes keyexchange = ikev1 reauth = yes forceencaps = no mobike = no rekey = yes installpolicy = no dpdaction = restart dpddelay = 10s dpdtimeout = 60s auto = start left = 172.25.228.9 right = 172.25.228.5 leftid = 172.25.228.9 ikelifetime = 28800s lifetime = 3600s ike = aes128-sha1-modp1024! esp = aes128-sha1-modp1024! leftauth = psk rightauth = psk rightid = 172.25.228.5 aggressive = no rightsubnet = 172.22.177.2,0.0.0.0/0 leftsubnet = 172.22.177.1/30,0.0.0.0/0 Status of IKE charon daemon (strongSwan 5.8.0, FreeBSD 12.0-RELEASE-p10, amd64): uptime: 64 minutes, since Sep 16 17:35:09 2019 worker threads: 11 of 16 idle, 5/0/0/0 working, job queue: 0/0/0/0, scheduled: 10 loaded plugins: charon unbound aes des blowfish rc2 sha2 sha1 md4 md5 random nonce x509 revocation constraints pubkey pkcs1 pkcs7 pkcs8 pkcs12 pgp dnskey sshkey ipseckey pem openssl fips-prf curve25519 xcbc cmac hmac curl attr kernel-pfkey kernel-pfroute resolve socket-default stroke vici updown eap-identity eap-sim eap-md5 eap-mschapv2 eap-dynamic eap-radius eap-tls eap-ttls eap-peap xauth-generic xauth-eap xauth-pam whitelist addrblock counters Listening IP addresses: 172.25.233.1 2001:470:f00e:7b01::1 10.10.10.1 172.25.228.9 2001:470:f00e:7fff::ac19:e409 172.25.228.10 192.168.1.1 172.25.227.227 10.10.12.1 10.11.12.1 10.40.80.1 172.22.177.1 Connections: bypasslan: %any...%any IKEv1/2 bypasslan: local: uses public key authentication bypasslan: remote: uses public key authentication bypasslan: child: 172.25.233.0/24|/0 2001:470:f00e:7b01::/64|/0 === 172.25.233.0/24|/0 2001:470:f00e:7b01::/64|/0 PASS con1000: 172.25.228.9...172.25.228.5 IKEv1, dpddelay=10s con1000: local: [172.25.228.9] uses pre-shared key authentication con1000: remote: [172.25.228.5] uses pre-shared key authentication con1000: child: 0.0.0.0/0|/0 === 0.0.0.0/0|/0 TUNNEL, dpdaction=restart Shunted Connections: bypasslan: 172.25.233.0/24|/0 2001:470:f00e:7b01::/64|/0 === 172.25.233.0/24|/0 2001:470:f00e:7b01::/64|/0 PASS Security Associations (0 up, 0 connecting): none bypasslan: IKEv1/2, reauthentication every 10260s, no rekeying local: %any remote: %any local public key authentication: remote public key authentication: bypasslan: PASS, no rekeying local: 172.25.233.0/24|/0 2001:470:f00e:7b01::/64|/0 remote: 172.25.233.0/24|/0 2001:470:f00e:7b01::/64|/0 con1000: IKEv1, reauthentication every 28260s, dpd delay 10s local: 172.25.228.9 remote: 172.25.228.5 local pre-shared key authentication: id: 172.25.228.9 remote pre-shared key authentication: id: 172.25.228.5 con1000: TUNNEL, rekeying every 3060s, dpd action is restart local: 0.0.0.0/0|/0 remote: 0.0.0.0/0|/0 ipsec1000: flags=8051<UP,POINTOPOINT,RUNNING,MULTICAST> metric 0 mtu 1400 tunnel inet 172.25.228.9 --> 172.25.228.5 inet6 fe80::ecb1:1d31:aa45:6ee%ipsec1000 prefixlen 64 scopeid 0x9 inet 172.22.177.1 --> 172.22.177.2 netmask 0xfffffffc groups: ipsec reqid: 1000 nd6 options=21<PERFORMNUD,AUTO_LINKLOCAL>