Bug #4202
closedIPsec - completely broken after last round of changes
100%
Description
Had perfectly working IKEv2 Mutual RSA configurations. After last round of messing with IPSec (presumably related to the reqid's), nothing works on Jan 10 snapshots, not even simple staff with a single P2.
Jan 12 11:34:40 ipsec_starter[46113]: Jan 12 11:34:40 ipsec_starter[46113]: 'con1' routed Jan 12 11:34:40 ipsec_starter[46113]: Jan 12 11:34:40 ipsec_starter[46113]: configuration 'con1' unrouted Jan 12 11:31:06 ipsec_starter[46113]: Jan 12 11:31:06 ipsec_starter[46113]: 'con1' routed Jan 12 11:31:06 ipsec_starter[46113]: Jan 12 11:31:06 ipsec_starter[46113]: configuration 'con1' unrouted Jan 12 11:31:05 ipsec_starter[46113]: Jan 12 11:31:05 ipsec_starter[46113]: 'con1' routed Jan 12 11:31:05 ipsec_starter[46113]: Jan 12 11:31:05 ipsec_starter[46113]: configuration 'con1' unrouted Jan 12 11:29:19 ipsec_starter[46113]: Jan 12 11:29:19 ipsec_starter[46113]: 'con1' routed Jan 12 11:29:19 ipsec_starter[46113]: Jan 12 11:29:19 ipsec_starter[46113]: configuration 'con1' unrouted Jan 12 10:00:46 ipsec_starter[46113]: Jan 12 10:00:46 ipsec_starter[46113]: 'con1' routed Jan 12 10:00:46 ipsec_starter[46113]: Jan 12 10:00:46 ipsec_starter[46113]: configuration 'con1' unrouted Jan 12 10:00:14 ipsec_starter[46113]: Jan 12 10:00:14 ipsec_starter[46113]: 'con1' routed Jan 12 10:00:14 ipsec_starter[46113]: Jan 12 10:00:14 ipsec_starter[46113]: configuration 'con1' unrouted
is all that the previously perfectly working config managed to produce. :-(
Updated by Ermal Luçi almost 11 years ago
- Status changed from New to Rejected
I am sorry this is not something you call a bug report.
Please provide the contents of your /var/etc/ipsec and your ipsec and system log.
I would advise to start from the forum!
Updated by Kill Bill almost 11 years ago
The IPsec log is above. There is nothing relevant in system log. Relevant configuration from both endpoints:
conn con1
fragmentation = yes
keyexchange = ikev2
reauth = yes
forceencaps = no
rekey = yes
installpolicy = yes
type = tunnel
dpdaction = restart
dpddelay = 10s
dpdtimeout = 60s
auto = route
left = xx.xx.xx.xx
right = yy.yy.yy.yy
leftid = asn1dn:
ikelifetime = 28800s
lifetime = 3600s
ike = aes128-sha1-modp1024!
esp = aes128-sha1-modp1024!
leftauth = pubkey
rightauth = pubkey
leftcert=/var/etc/ipsec/ipsec.d/certs/cert-1.crt
rightid = asn1dn:
rightsubnet = 10.0.0.0/24
leftsubnet = 192.168.0.0/24
conn con3
fragmentation = yes
keyexchange = ikev2
reauth = yes
forceencaps = no
rekey = yes
installpolicy = yes
type = tunnel
dpdaction = restart
dpddelay = 10s
dpdtimeout = 60s
auto = route
left = yy.yy.yy.yy
right = xx.xx.xx.xx
leftid = asn1dn:
ikelifetime = 28800s
lifetime = 3600s
ike = aes128-sha1-modp1024!
esp = aes128-sha1-modp1024!
leftauth = pubkey
rightauth = pubkey
leftcert=/var/etc/ipsec/ipsec.d/certs/cert-3.crt
rightid = asn1dn:
rightsubnet = 192.168.0.0/24
leftsubnet = 10.0.0.0/24
Again, this was perfectly working across many previous snapshots, until recently.
Updated by Ermal Luçi almost 11 years ago
Well your problem is on
leftid = asn1dn:
What do you have configured as leftid?
Updated by Ermal Luçi almost 11 years ago
- Status changed from Rejected to Feedback
Just pushed a commit for this.
Thx for the catch.
Updated by Ermal Luçi almost 11 years ago
- % Done changed from 0 to 100
Applied in changeset 83b8ed6b2bec13d3b60acd9bd4786e5a7df4de90.
Updated by Ermal Luçi almost 11 years ago
Applied in changeset 324311043385aed357ca8838bde2c3af3111e564.
Updated by Chris Buechler almost 11 years ago
- Status changed from Feedback to Resolved
that looks like the only issue that existed here and that works fine now.