[Openswan Users] IPSEC SA only being installed on one side

Paul Wouters paul at xelerance.com
Thu Jan 1 19:52:10 EST 2009


On Tue, 30 Dec 2008, openswan at thefeds.net wrote:

There have been some fixes to rekeying lately. Please try the latest
test release (2.6.20rc1). Though this bug might still exist.

Paul

> Date: Tue, 30 Dec 2008 18:35:42 +0000 (GMT)
> From:  <openswan at thefeds.net>
> To:  <users at openswan.org>
> Subject: [Openswan Users] IPSEC SA only being installed on one side
> 
> I am trying to track down a problem I am having quite frequently where my 
> phase 1 SA is fine (and thus DPD doesn't see any problems) but my phase 2 
> SAs aren't in step and thus traffic can't get through.
> 
> The problem appears to be that sometimes when a new phase 2 SA is 
> negotiated one side is happy and installs the SA, but the other side 
> (never the initiator) doesn't install the SA. The side with the newer SA 
> then sends packets encrypted with the new SPI which the other side cannot 
> understand.
> 
> I have the following extracts from /var/log/secure:
> 
> The initiator:
> Dec 30 12:40:04 vpn01d pluto[4943]: "tun02a01d" #442: STATE_MAIN_I4: 
> ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY cipher=aes_256 
> prf=oakley_sha group=modp1536}
> Dec 30 12:40:04 vpn01d pluto[4943]: "tun02a01d" #442: Dead Peer Detection 
> (RFC 3706): enabled
> Dec 30 14:32:40 vpn01d pluto[4943]: "tun02a01d" #455: initiating Quick 
> Mode PSK+ENCRYPT+PFS+UP+IKEv2ALLOW to replace #428 {using isakmp#442 
> msgid:1ff67d30 proposal=AES(12)_256-SHA1(2)_160 
> pfsgroup=OAKLEY_GROUP_MODP1536}
> Dec 30 14:32:40 vpn01d pluto[4943]: "tun02a01d" #455: Dead Peer Detection 
> (RFC 3706): enabled
> Dec 30 14:32:40 vpn01d pluto[4943]: "tun02a01d" #455: transition from 
> state STATE_QUICK_I1 to state STATE_QUICK_I2
> Dec 30 14:32:40 vpn01d pluto[4943]: "tun02a01d" #455: STATE_QUICK_I2: sent 
> QI2, IPsec SA established transport mode {ESP=>0x0f2d2e3a <0x36134870 
> xfrm=AES_256-HMAC_SHA1 NATOA=none NATD=none DPD=enabled}
> Dec 30 14:32:50 vpn01d pluto[4943]: "tun02a01d" #455: message ignored 
> because it contains an unexpected payload type (ISAKMP_NEXT_HASH)
> Dec 30 14:32:50 vpn01d pluto[4943]: "tun02a01d" #455: sending encrypted 
> notification INVALID_PAYLOAD_TYPE to <vpn02a ip>:500
> 
> The reciever:
> Dec 30 12:40:04 vpn02a pluto[547]: "tun02a01d" #480: STATE_MAIN_R3: sent 
> MR3, ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY cipher=aes_256 
> prf=oakley_sha group=modp1536}
> Dec 30 12:40:04 vpn02a pluto[547]: "tun02a01d" #480: Dead Peer Detection 
> (RFC 3706): enabled
> Dec 30 14:32:40 vpn02a pluto[547]: "tun02a01d" #480: the peer proposed: 
> <vpn02a ip>/32:0/0 -> <vpn02d ip>/32:0/0
> Dec 30 14:32:40 vpn02a pluto[547]: "tun02a01d" #515: responding to Quick 
> Mode proposal {msgid:1ff67d30}
> Dec 30 14:32:40 vpn02a pluto[547]: "tun02a01d" #515:     us: 
> <vpn02a ip><<vpn02a ip>>[+S=C]---<vpn02a nh>
> Dec 30 14:32:40 vpn02a pluto[547]: "tun02a01d" #515:   them: 
> <vpn01d nh>---<vpn01d ip><<vpn01d ip>>[+S=C]
> Dec 30 14:32:40 vpn02a pluto[547]: "tun02a01d" #515: keeping 
> refhim=4294901761 during rekey
> Dec 30 14:32:40 vpn02a pluto[547]: "tun02a01d" #515: transition from state 
> STATE_QUICK_R0 to state STATE_QUICK_R1
> Dec 30 14:32:40 vpn02a pluto[547]: "tun02a01d" #515: STATE_QUICK_R1: sent 
> QR1, inbound IPsec SA installed, expecting QI2
> Dec 30 14:32:40 vpn02a pluto[547]: packet from <vpn01d ip>:500: 
> Informational Exchange is for an unknown (expired?) SA
> Dec 30 14:32:50 vpn02a pluto[547]: "tun02a01d" #480: ignoring 
> informational payload, type INVALID_PAYLOAD_TYPE msgid=00000000
> Dec 30 14:32:50 vpn02a pluto[547]: "tun02a01d" #480: received and ignored 
> informational message
> 
> I then end up with the following SAs on vpn02a:
> 000 #523: "tun02a01d":500 STATE_MAIN_R3 (sent MR3, ISAKMP SA established); 
> EVENT_SA_REPLACE in 9590s; newest ISAKMP; lastdpd=2s(seq in:24780 out:0); 
> idle; import:not set
> 000 #480: "tun02a01d":500 STATE_MAIN_R3 (sent MR3, ISAKMP SA established); 
> EVENT_SA_REPLACE in 2449s; lastdpd=1210s(seq in:7855 out:0); idle; 
> import:not set
> 000 #470: "tun02a01d":500 STATE_QUICK_R2 (IPsec SA established); 
> EVENT_SA_REPLACE in 2026s; newest IPSEC; eroute owner; isakmp#454; idle; 
> import:not set
> 000 #470: "tun02a01d" esp.f2d777e3@<vpn01d ip> esp.8ca1e089@<vpn02a ip> 
> ref=0 refhim=4294901761
> 
> and vpn01d:
> 000 #466: "tun02a01d":500 STATE_MAIN_I4 (ISAKMP SA established); 
> EVENT_SA_REPLACE in 5934s; newest ISAKMP; lastdpd=1s(seq in:3752 out:0); 
> idle; import:admin initiate
> 000 #455: "tun02a01d":500 STATE_QUICK_I2 (sent QI2, IPsec SA established); 
> EVENT_SA_REPLACE in 5593s; newest IPSEC; eroute owner; isakmp#442; idle; 
> import:admin initiate
> 000 #455: "tun02a01d" esp.f2d2e3a@<vpn02a ip> esp.36134870@<vpn01d ip> 
> ref=0 refhim=4294901761
> 000 #442: "tun02a01d":500 STATE_MAIN_I4 (ISAKMP SA established); 
> EVENT_SA_EXPIRE in 6050s; lastdpd=1209s(seq in:17036 out:0); idle; 
> import:admin initiate
> 000 #428: "tun02a01d":500 STATE_QUICK_I2 (sent QI2, IPsec SA established); 
> EVENT_SA_EXPIRE in 5627s; isakmp#411; idle; import:admin initiate
> 000 #428: "tun02a01d" esp.8ca1e089@<vpn02a ip> esp.f2d777e3@<vpn01d ip> 
> ref=0 refhim=4294901761
> 
> So you can see that vpn02a does have esp.36134870@<vpn01d ip> 
> esp.f2d2e3a@<vpn02a ip> installed and as that is newest on vpn01d that is 
> what it is using for all traffic to vpn02a.
> 
> I am guessing that the log entry of:
> Dec 30 14:32:40 vpn02a pluto[547]: packet from <vpn01d ip>:500: 
> Informational Exchange is for an unknown (expired?) SA
> May be the QI2 packet from vpn01d that vpn01d doesn't understand? I 
> thought at one time that the phase 1 SA may be expiring at this point, but 
> I am seeing this happen far too often for that. Plus as the logs show the 
> phase 1 SA was renegotiated 112 minutes and 48 seconds earlier and I have 
> a key life of 240 minutes with a rekeying margin of 120 minutes and a 
> rekeying fuzz of 1% so the next phase 1 rekeying isn't due for another 6 
> minutes to 7 minutes 12 seconds. I do see the phase 1 rekey happen in the 
> logs 6 minutes and 25 seconds later.
> 
> Does anyone have any idea how I can go about finding out why the recieving 
> end sometimes doesn't install the new phase 2 SA?
> 
> Thanks in advance for any help
> Tim
> _______________________________________________
> Users at openswan.org
> http://lists.openswan.org/mailman/listinfo/users
> Building and Integrating Virtual Private Networks with Openswan: 
> http://www.amazon.com/gp/product/1904811256/104-3099591-2946327?n=283155
> 


More information about the Users mailing list