[Openswan Users] Vista Rekeying solution available yet?

Julien DELEAN julien.delean at peer2me.com
Thu Jun 12 06:52:33 EDT 2008


I tried your patch on openswan 2.4.12 but it doesn't seem to prevent Vista
deconnections.

In order to quickly provoke this behavior, I download a large file, on Vista
client, to reach transfer volume limitations on Windows side and to force
rekeying.

I still have the same error message :
Jun 12 11:56:02 xxx pluto[6962]: "roadwarrior-l2tp"[1] xx.xx.xx.xx #1:
responding to Main Mode from unknown peer xx.xx.xx.xx
...
Jun 12 11:56:03 xxx pluto[6962]: "roadwarrior-l2tp"[2] xx.xx.xx.xx #2:
STATE_QUICK_R2: IPsec SA established {ESP=>0xfb7982a1 <0xf516b8d0
xfrm=AES_128-HMAC_SHA1 NATD=xx.xx.xx.xx:4500 DPD=none}
Jun 12 12:18:18 xxx pluto[6962]: "roadwarrior-l2tp"[3] xx.xx.xx.xx #3:
responding to Quick Mode {msgid:02000000}
Jun 12 12:18:18 xxx pluto[6962]: "roadwarrior-l2tp"[3] xx.xx.xx.xx #3:
cannot install eroute -- it is in use for "roadwarrior-l2tp"[2] xx.xx.xx.xx
#2

James, are we talking about the same problem ?

I think that the only solution is, as you said Paul, to write a patch that
allows rekeys to happen to "the same ip/port as currently used". Am I right
?

I could try to write this patch but I really don't know how begin to study
Pluto's source code. Could anybody help me ?

--
Julien



2008/6/11 Paul Wouters <paul at xelerance.com>:

> On Wed, 11 Jun 2008, James wrote:
>
>  How would i configure ipsec.conf to do that?
>>
>
> the workaround is a hack, not a config option. diff against 2.6.14...
> Might require tweaking for 2.4.x
>
> diff --git a/programs/pluto/ikev1_main.c b/programs/pluto/ikev1_main.c
> index e7dbe4f..64a9c00 100644
> --- a/programs/pluto/ikev1_main.c
> +++ b/programs/pluto/ikev1_main.c
> @@ -2948,11 +2948,27 @@ accept_delete(struct state *st, struct msg_digest
> *md, struct payload_digest *p)
>                }
>                else
>                {
> +
> +               /*
> +                * attempt at workaround bug 888. If we're in
> STATE_QUICK_R2, and
> +                * we receive a Delete AND Rekey, we will hit
> +                * the passert(sr->eroute_owner == SOS_NOBODY) in state.c
> +                * Workaround: don't delete IPsec SA now, let it linger
> +                */
> +                if(dst->st_state == STATE_QUICK_R2) {
> +                   loglog(RC_LOG_SERIOUS, "BUG 888 workaround triggered\n.
> Received and "
> +                          "ignored Delete SA(0x%08lx) payload: keeping
> IPSEC state #%lu"
> +                          , (unsigned long)ntohl((unsigned
> long)*(ipsec_spi_t *)spi)
> +                          , dst->st_serialno);
> +                }
> +                else
> +                {
>                    loglog(RC_LOG_SERIOUS, "received Delete SA(0x%08lx)
> payload: "
>                           "deleting IPSEC State #%lu"
>                           , (unsigned long)ntohl((unsigned
> long)*(ipsec_spi_t *)spi)
>                           , dst->st_serialno);
>                    delete_state(dst);
> +                 }
>                }
>
>                /* reset connection */
>
>
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://lists.openswan.org/pipermail/users/attachments/20080612/35670a0d/attachment.html 


More information about the Users mailing list