[Openswan Users] VPN always up, but one way after a while

Gavin Henry ghenry at suretecsystems.com
Mon Nov 20 18:05:37 EST 2006


Hi All,

Just quick one to try and confirm where I should be looking.

VPN is fine from a remote public IP into our network.

Public IP -- Gateway for that IP -- Internet -- Vigor 2600 -- Private Lan

Vigor 2600 and Openswan 2.4.7.

Traffic passes fine from the public machine into the private lan all the
time. The VPN is always up, but after a while you can't ping or get to
anything on the public ip machine, but the public ip machine can always
get to anything inside the private lan.

I tend to think this is a Vigor issue, as a VPN restart makes everything
work again. Could this be re-keying issues? Or fixing the settings in the
below "ipsec verify"?

"ipsec verfiy" on the public machine:

ipsec verify
Checking your system to see if IPsec got installed and started correctly:
Version check and ipsec on-path                                 [OK]
Linux Openswan U2.4.7/K2.6.9-42.0.2.ELsmp (netkey)
Checking for IPsec support in kernel                            [OK]
Testing against enforced SElinux mode                           [OK]
Hardware RNG detected, testing if used properly                 [OK]
NETKEY detected, testing for disabled ICMP send_redirects       [FAILED]

  Please disable /proc/sys/net/ipv4/conf/*/send_redirects
  or NETKEY will cause the sending of bogus ICMP redirects!

NETKEY detected, testing for disabled ICMP accept_redirects     [FAILED]

  Please disable /proc/sys/net/ipv4/conf/*/accept_redirects
  or NETKEY will accept bogus ICMP redirects!

Checking for RSA private key (/etc/ipsec.secrets)               [DISABLED]
  ipsec showhostkey: no default key in "/etc/ipsec.secrets"
Checking that pluto is running                                  [OK]
Two or more interfaces found, checking IP forwarding            [OK]
Checking NAT and MASQUERADEing                                  [OK]
Checking for 'ip' command                                       [OK]
Checking for 'iptables' command                                 [OK]
Opportunistic Encryption Support                                [DISABLED]


ipsec.conf:

version 2.0

config setup
        plutodebug="control"
        nhelpers=0

conn net-to-lan
        auto=start
        authby=secret
        keyexchange=ike
        auth=esp
        compress=no
        left=86.xx.xx.xx
        leftnexthop=%defaultroute
        right=217.xx.xx.xx
        rightsubnet=192.168.xx.xx/24
        rightnexthop=%defaultroute

#Disable Opportunistic Encryption
include /etc/ipsec.d/examples/no_oe.conf

Thanks,

Gavin.



More information about the Users mailing list