[Openswan Users]
Fwd: Openswan 2.3.1 - Sig ABRT during rekeying (w/ attachs)
Jorge Daniel Sequeira Matias
martin at andorinha.ist.utl.pt
Fri Apr 22 14:27:19 CEST 2005
Hello everyone,
I have justed started to use Openswan a few days ago and I have a found a
critical BUG I suppose.
First, I'd like to describe my setup:
- Athlon MP 2000+ (with only in CPU at the moment)
- 1024MB ECC RAM
- Kernel 2.6.11 (vanilla)
- Distribution Debian (unstable)
- SNMPd (just in case. I saw a few msgs about this subject)
The intent of this system is to serve as a VPN Server and Firewall
solution. I want to use the Windows builtin VPN client (IPSec/L2TP) and I
want the clients, being behind NAT boxes, to be able to connect to the VPN
server. So far so good, because it works with Openswan.
The problem is:
With Openswan 2.3.0 (debian pkg) I had segmentation faults during some of
the NAT-T KEEPALIVE events.
Openswan v2.3.1 (original source) has segmentation faults during SA
renegotiation. It seems not be very predictive because it doesn't happen
every renegotiation
In attach I send a two log files during the moment of events:
/var/log/daemon.log
/var/log/auth.log
I also send my config file in attach (/etc/ipsec.conf)
I hope this will help to track down the BUG. It occurs occasionaly but is
sufficiently problematic for most users that don't understand what happened
with their VPN connection.
Best Regards,
Jorge Matias
-------------- next part --------------
A non-text attachment was scrubbed...
Name: auth.log
Type: text/x-log
Size: 24687 bytes
Desc: not available
Url : http://lists.openswan.org/pipermail/users/attachments/20050422/045235f2/auth-0001.bin
-------------- next part --------------
A non-text attachment was scrubbed...
Name: daemon.log
Type: text/x-log
Size: 926 bytes
Desc: not available
Url : http://lists.openswan.org/pipermail/users/attachments/20050422/045235f2/daemon-0001.bin
-------------- next part --------------
# /etc/ipsec.conf - Openswan IPsec configuration file
# RCSID $Id: ipsec.conf.in,v 1.13 2004/03/24 04:14:39 ken Exp $
# This file: /usr/share/doc/openswan/ipsec.conf-sample
#
# Manual: ipsec.conf.5
version 2.0 # conforms to second version of ipsec.conf specification
# basic configuration
config setup
# Debug-logging controls: "none" for (almost) none, "all" for lots.
# klipsdebug=none
plutodebug="control parsing"
# plutodebug="all"
interfaces=%defaultroute
forwardcontrol=yes
nat_traversal=yes
# virtual_private=
# Add connections here
# Aqui especificacam-se todos os parametros gerais que todas as ligacoes vao
# herdar.
conn %default
keyingtries=1
compress=yes
disablearrivalcheck=no
authby=rsasig
leftrsasigkey=%cert
rightrsasigkey=%cert
pfs=no
# Configuracao de parametros para L2TP/IPSec para clientes Windows
# Herda os parametros genericos da ligacao "roadwarrior".
# NOTA: O cliente do Windows 2000/XP nao suporta PFS
conn roadwarrior-l2tp-updatedwin
pfs=no
leftprotoport=17/1701
rightprotoport=17/1701
also=roadwarrior
## Nao sei para que serve este tipo de politica
## Fica desactivado ateh ser testada a sua necessidade
conn roadwarrior-l2tp
pfs=no
leftprotoport=17/0
rightprotoport=17/1701
also=roadwarrior
conn roadwarrior-l2tp-macosx
pfs=no
leftprotoport=17/1701
rightprotoport=17/%any
also=roadwarrior
conn roadwarrior
left=%defaultroute
leftcert=vpncert.pem
right=%any
auto=add # Indica que esta politica IPSec
# eh automaticamente instalada logo que o
# OpenS/Wan arrancar
type=transport
#Disable Opportunistic Encryption
include /etc/ipsec.d/examples/no_oe.conf
More information about the Users
mailing list