[Openswan Users] DPD / Multiple SA
Paul Wouters
paul at xelerance.com
Tue Nov 28 00:15:17 EST 2006
On Mon, 27 Nov 2006, GODARD Jean-Charles wrote:
>
> I post this message to have some advices on an issue we have with a setup we implemented.
>
> |Oswan + Radius Srv|----(icmp/radius)----|Pix|----|Radius Server|
>
> We successfully built a tunnel to cisco box, we allow on this tunnel only icmp and radius traffic thanks to the right/leftprotoport= statement.
> So we have one phase1 (isakmp) SA and 5 phase 2 (ipsec) SA established.
>
> The next step is to implement DPD, so after digging on the web, mailing list archives... we found a configuration that works pretty fine in the most of the cases of failure... except one :(
>
> If we switch off the pix or if we unplug the network cable from the pix for a while and then restart/plug back the cable, DPD does it job, detecting the failure, removing the SAs and trying to renegotiate the lost SAs.
> The problem we have then, is that only one SA (random) is renegotiated and brought up automatically.
> We need to have all the SA renegotiated and up, even after a network failure.
> Even if we try to send some traffic in the tunnel, the SA are not renegotiated.
>
> What i can't understand, is why only one SA on the 5 SAs is brought up back, same for eroute, only one up, others are in hold or trap status...
>
> The renegotiation does not fail, it is simply not initiated :/
>
> I have seen in a recent post that we can adapt the _updown script to add "ipsec auto --replace conn" and "ipsec auto --up conn" but i did not succeed to find the correct way to achieve this :(
I thought we recently added a fix for this. Perhaps it did not make it in 2.4.7.
I'll get back to you on this one.
Paul
> Any ideas are welcome.
> Thanks for your help !
>
> ipsec verify
> Checking your system to see if IPsec got installed and started correctly:
> Version check and ipsec on-path [OK]
> Linux Openswan 2.4.7 (klips)
> Checking for IPsec support in kernel [OK]
> Checking for RSA private key (/etc/ipsec.secrets) [OK]
> Checking that pluto is running [OK]
> Two or more interfaces found, checking IP forwarding [OK]
> Checking NAT and MASQUERADEing [OK]
> Checking for 'ip' command [OK]
> Checking for 'iptables' command [OK]
> Opportunistic Encryption Support [DISABLED]
>
>
> Here are the conf files in use :
> ========================
> /etc/ipsec.conf
> ========================
> ...
> include /etc/ipsec.d/ipsec.*.conf
>
> conn common
> authby=secret
> type=tunnel
> auto=add #We use a script to bring up the SAs in // @ startup
> compress=yes
> dpddelay=30
> dpdtimeout=10
> dpdaction=restart
> # Left security gateway, subnet behind it, next hop toward right.
> left=10.0.1.124
> leftsubnet=10.0.1.123/32
> leftnexthop=10.0.1.254
>
> ========================
> Conn Specific configuration file
> ========================
> conn cisco_SP_AUTH
> also=common
> pfs=no
> keyexchange=ike
> ike="3des-sha-modp1024"
> ikelifetime=28800
> esp="3des-md5"
> keylife=3600s
> # Left security gateway, subnet behind it, next hop toward right.
> leftprotoport="17/1814"
> # Right security gateway, subnet behind it, next hop toward left.
> right=X.Y.Z.52
> rightsubnet=X.Y.Z.57/32
> rightprotoport="17/1812"
>
> conn cisco_SP_ACCT
> also=common
> pfs=no
> keyexchange=ike
> ike="3des-sha-modp1024"
> ikelifetime=28800
> esp="3des-md5"
> keylife=3600s
> # Left security gateway, subnet behind it, next hop toward right.
> leftprotoport="17/1814"
> # Right security gateway, subnet behind it, next hop toward left.
> right=X.Y.Z.52
> rightsubnet=X.Y.Z.57/32
> rightprotoport="17/1813"
>
> conn cisco_NO_AUTH
> also=common
> pfs=no
> keyexchange=ike
> ike="3des-sha-modp1024"
> ikelifetime=28800
> esp="3des-md5"
> keylife=3600s
> # Left security gateway, subnet behind it, next hop toward right.
> leftprotoport="17/1812"
> # Right security gateway, subnet behind it, next hop toward left.
> right=X.Y.Z.52
> rightsubnet=X.Y.Z.57/32
> rightprotoport="17/0"
>
> conn cisco_NO_ACCT
> also=common
> pfs=no
> keyexchange=ike
> ike="3des-sha-modp1024"
> ikelifetime=28800
> esp="3des-md5"
> keylife=3600s
> # Left security gateway, subnet behind it, next hop toward right.
> leftprotoport="17/1813"
> # Right security gateway, subnet behind it, next hop toward left.
> right=X.Y.Z.52
> rightsubnet=X.Y.Z.57/32
> rightprotoport="17/0"
>
> conn cisco_ICMP
> also=common
> pfs=no
> keyexchange=ike
> ike="3des-sha-modp1024"
> ikelifetime=28800
> esp="3des-md5"
> keylife=3600s
> # Left security gateway, subnet behind it, next hop toward right.
> leftprotoport="1/0"
> # Right security gateway, subnet behind it, next hop toward left.
> right=X.Y.Z.52
> rightsubnet=X.Y.Z.57/32
> rightprotoport="1/0"
>
>
>
> ---------------------------------
> Découvrez une nouvelle façon d'obtenir des réponses à toutes vos questions ! Profitez des connaissances, des opinions et des expériences des internautes sur Yahoo! Questions/Réponses.
--
Building and integrating Virtual Private Networks with Openswan:
http://www.amazon.com/gp/product/1904811256/104-3099591-2946327?n=283155
More information about the Users
mailing list