[Openswan Users] klips and setkey
avital sela
avitalsela95 at gmail.com
Thu Apr 1 01:08:00 EDT 2010
Helllo ,
On Thu, Apr 1, 2010 at 2:31 AM, David McCullough <
david_mccullough at mcafee.com> wrote:
>
> Jivin avital sela lays it down ...
> > Hello Paul,
> >
> >
> > On Wed, Mar 17, 2010 at 8:56 PM, Paul Wouters <paul at xelerance.com>
> wrote:
> >
> >
> > On Wed, 17 Mar 2010, avital sela wrote:
> >
> >
> >
> > I recently built KLIPS stack to a 2.6.29.6 based kernel.
> The module
> > loads fine but when I tried to use setkey to setup a tunnel
> manually
> >
> >
> >
> > KLIPS uses the PFKEY interface, not the NETLINK/XFRM interface, so
> setkey
> > and other ipsec-tools utilities and the kernel XFRM utilities (ip
> xfrm)
> > do not work with these.
> >
> > Instead, see "ipsec --help" for commands or look at
> /proc/net/ipsec/
> >
> >
> >
> > Thanks. I created a simple ipsec.conf file and am able to successfuly
> ping packets across the tunnel.
> >
> > When I added support for OCF (I'm using cryptosoft driver for now) I get
> the following messages all the time
> > KLIPS klips_debug:ipsec_rcv: auth failed on incoming packet from
> 192.168.16.124 (replay=4): calculated hash=000040210000000000000200 received
> hash=ae4383e40fca800003d1f1ac, dropped
>
>
> I have another report of this on the ocf-linux mailing list. Something
> must
> have gone astray in the last round of cryptosoft updates. cryptosoft was
> pretty much rewritten for this release (I am assuming you are using the
> 2010
> ocf release ?).
>
Yes, ocf-linux-26-20100325.patch , openswan-2.6.25
>
> > In the message above I thought that "calculated hash" was the value
> computed by the crypto sub-system and the "received hash" is the value that
> was placed in the packet by the sender. Looking at the actual packets using
> Wireshark it seems that its actually the other way around.
> > Is it just a misunderstanding on my part or are the printk variables in
> the following code snippet from ipsec_rcv reversed
>
>
> I check when I look at it today, but the first hash result is obviously
> busted :-(
>
> > if (memcmp(irs->hash, irs->authenticator, irs->authlen)) {
> > irs->ipsp->ips_errs.ips_auth_errs += 1;
> > KLIPS_ERROR(debug_rcv & DB_RX_INAU,
> > "klips_debug:ipsec_rcv: "
> > "auth failed on incoming packet from
> %s (replay=%d): calculated hash=%08x%08x%08x received hash=%08x%08x%08x,
> dropped\n",
> > irs->ipsaddr_txt,
> > irs->replay,
> > ntohl(*(__u32*)&irs->hash[0]),
> > ntohl(*(__u32*)&irs->hash[4]),
> > ntohl(*(__u32*)&irs->hash[8]),
> > ntohl(*(__u32*)irs->authenticator),
> > ntohl(*((__u32*)irs->authenticator +
> 1)),
> > ntohl(*((__u32*)irs->authenticator +
> 2)));
> > if(irs->stats) {
> > irs->stats->rx_dropped++;
> > }
>
> Just for reference, is this an x86 system ? SMP ?
>
>
mips (24k) uniprocessor with RT patch.
Thanks ,
Avital
-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://lists.openswan.org/pipermail/users/attachments/20100401/d4838b3f/attachment.html
More information about the Users
mailing list