[Openswan Users] openswan 2.6.38 Segmentation fault

Ozai ozai.tien at gmail.com
Wed Nov 14 22:34:17 EST 2012


Dear Sirs,

I setup a VPN to another client and it works fine.it works for between 4 and 8 hours and then drops out and refuses to re-establish the connection until a change is made to the settings (eg turning on or off dead peer detection)If it is working and I reboot the router, the vpn comes on fine.I attached the message as below.How do I need to do to fix this iquestion,Please help.Thank's.

======================================================================
Nov 13 13:16:14 authpriv warn pluto[4435]: packet from 116.212.223.250:500: received and ignored informational message
Nov 13 13:42:04 authpriv warn pluto[4435]: "torbowden" #10: initiating Quick Mode PSK+ENCRYPT+TUNNEL+PFS+UP+IKEv2ALLOW+SAREFTRACK to replace #8 {using isakmp#9 msgid:9a468d10 proposal=3DES(3)_192-MD5(1)_128 pfsgroup=OAKLEY_GROUP_MODP1024}
Nov 13 13:42:04 authpriv warn pluto[4435]: "torbowden" #10: transition from state STATE_QUICK_I1 to state STATE_QUICK_I2
Nov 13 13:42:04 authpriv warn pluto[4435]: "torbowden" #10: STATE_QUICK_I2: sent QI2, IPsec SA established tunnel mode {ESP=>0x8831d006 <0x58364096 xfrm=3DES_0-HMAC_MD5 NATOA=none NATD=none DPD=none}
Nov 13 13:46:33 authpriv warn pluto[4435]: "torbowden" #9: received Delete SA(0x8831cffc) payload: deleting IPSEC State #8
Nov 13 13:46:33 authpriv warn pluto[4435]: "torbowden" #9: received and ignored informational message
Nov 13 13:50:56 authpriv warn pluto[4435]: "torbowden" #11: initiating Main Mode to replace #9
Nov 13 13:50:56 authpriv warn pluto[4435]: "torbowden" #11: received Vendor ID payload [Dead Peer Detection]
Nov 13 13:50:56 authpriv warn pluto[4435]: "torbowden" #11: received Vendor ID payload [Cisco-Unity]
Nov 13 13:50:56 authpriv warn pluto[4435]: "torbowden" #11: transition from state STATE_MAIN_I1 to state STATE_MAIN_I2
Nov 13 13:50:56 authpriv warn pluto[4435]: "torbowden" #11: STATE_MAIN_I2: sent MI2, expecting MR2
Nov 13 13:50:56 authpriv warn pluto[4435]: "torbowden" #11: transition from state STATE_MAIN_I2 to state STATE_MAIN_I3
Nov 13 13:50:56 authpriv warn pluto[4435]: "torbowden" #11: STATE_MAIN_I3: sent MI3, expecting MR3
Nov 13 13:50:56 authpriv warn pluto[4435]: "torbowden" #11: Main mode peer ID is ID_IPV4_ADDR: '116.212.223.250'
Nov 13 13:50:56 authpriv warn pluto[4435]: "torbowden" #11: transition from state STATE_MAIN_I3 to state STATE_MAIN_I4
Nov 13 13:50:56 authpriv warn pluto[4435]: "torbowden" #11: STATE_MAIN_I4: ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY cipher=oakley_3des_cbc_192 prf=oakley_md5 group=modp1024}
Nov 13 14:01:11 authpriv warn pluto[4435]: "torbowden" #9: received Delete SA payload: deleting ISAKMP State #9
Nov 13 14:01:11 authpriv warn pluto[4435]: packet from 116.212.223.250:500: received and ignored informational message
Nov 13 14:36:25 authpriv warn pluto[4435]: "torbowden" #12: initiating Main Mode to replace #11
Nov 13 14:36:25 authpriv warn pluto[4435]: "torbowden" #12: received Vendor ID payload [Dead Peer Detection]
Nov 13 14:36:25 authpriv warn pluto[4435]: "torbowden" #12: received Vendor ID payload [Cisco-Unity]
Nov 13 14:36:25 authpriv warn pluto[4435]: "torbowden" #12: transition from state STATE_MAIN_I1 to state STATE_MAIN_I2
Nov 13 14:36:25 authpriv warn pluto[4435]: "torbowden" #12: STATE_MAIN_I2: sent MI2, expecting MR2
Nov 13 14:36:25 authpriv warn pluto[4435]: "torbowden" #12: transition from state STATE_MAIN_I2 to state STATE_MAIN_I3
Nov 13 14:36:25 authpriv warn pluto[4435]: "torbowden" #12: STATE_MAIN_I3: sent MI3, expecting MR3
Nov 13 14:36:25 authpriv warn pluto[4435]: "torbowden" #12: Main mode peer ID is ID_IPV4_ADDR: '116.212.223.250'
Nov 13 14:36:25 authpriv warn pluto[4435]: "torbowden" #12: transition from state STATE_MAIN_I3 to state STATE_MAIN_I4
Nov 13 14:36:25 authpriv warn pluto[4435]: "torbowden" #12: STATE_MAIN_I4: ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY cipher=oakley_3des_cbc_192 prf=oakley_md5 group=modp1024}
Nov 13 14:41:03 authpriv warn pluto[4435]: "torbowden" #12: the peer proposed: 10.193.36.0/24:0/0 -> 192.168.0.0/24:0/0
Nov 13 14:41:03 authpriv warn pluto[4435]: "torbowden" #13: responding to Quick Mode proposal {msgid:2325c9f9}
Nov 13 14:41:03 authpriv warn pluto[4435]: "torbowden" #13:     us: 10.193.36.0/24===150.101.52.25<150.101.52.25>
Nov 13 14:41:03 authpriv warn pluto[4435]: "torbowden" #13:   them: 116.212.223.250<116.212.223.250>===192.168.0.0/24
Nov 13 14:41:03 authpriv warn pluto[4435]: "torbowden" #13: keeping refhim=4294901761 during rekey
Nov 13 14:41:03 authpriv warn pluto[4435]: "torbowden" #13: transition from state STATE_QUICK_R0 to state STATE_QUICK_R1
Nov 13 14:41:03 authpriv warn pluto[4435]: "torbowden" #13: STATE_QUICK_R1: sent QR1, inbound IPsec SA installed, expecting QI2
Nov 13 14:41:03 authpriv warn pluto[4435]: "torbowden" #13: transition from state STATE_QUICK_R1 to state STATE_QUICK_R2
Nov 13 14:41:03 authpriv warn pluto[4435]: "torbowden" #13: STATE_QUICK_R2: IPsec SA established tunnel mode {ESP=>0x8831d011 <0x3b970532 xfrm=3DES_0-HMAC_MD5 NATOA=none NATD=none DPD=none}
Nov 13 14:42:03 authpriv warn pluto[4435]: "torbowden" #12: received Delete SA(0x8831d006) payload: deleting IPSEC State #10
Nov 13 14:42:03 authpriv warn pluto[4435]: "torbowden" #12: received and ignored informational message
Nov 13 14:50:56 authpriv warn pluto[4435]: packet from 116.212.223.250:500: Informational Exchange is for an unknown (expired?) SA with MSGID:0x4df4de72
Nov 13 15:24:29 authpriv warn pluto[4435]: "torbowden" #14: initiating Main Mode to replace #12
Nov 13 15:24:29 authpriv warn pluto[4435]: "torbowden" #14: received Vendor ID payload [Dead Peer Detection]
Nov 13 15:24:29 authpriv warn pluto[4435]: "torbowden" #14: received Vendor ID payload [Cisco-Unity]
Nov 13 15:24:29 authpriv warn pluto[4435]: "torbowden" #14: transition from state STATE_MAIN_I1 to state STATE_MAIN_I2
Nov 13 15:24:29 authpriv warn pluto[4435]: "torbowden" #14: STATE_MAIN_I2: sent MI2, expecting MR2
Nov 13 15:24:29 authpriv warn pluto[4435]: "torbowden" #14: transition from state STATE_MAIN_I2 to state STATE_MAIN_I3
Nov 13 15:24:29 authpriv warn pluto[4435]: "torbowden" #14: STATE_MAIN_I3: sent MI3, expecting MR3
Nov 13 15:24:29 authpriv warn pluto[4435]: "torbowden" #14: Main mode peer ID is ID_IPV4_ADDR: '116.212.223.250'
Nov 13 15:24:29 authpriv warn pluto[4435]: "torbowden" #14: transition from state STATE_MAIN_I3 to state STATE_MAIN_I4
Nov 13 15:24:29 authpriv warn pluto[4435]: "torbowden" #14: STATE_MAIN_I4: ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY cipher=oakley_3des_cbc_192 prf=oakley_md5 group=modp1024}
Nov 13 15:36:25 authpriv warn pluto[4435]: packet from 116.212.223.250:500: Informational Exchange is for an unknown (expired?) SA with MSGID:0x3bccda3c
Nov 13 15:36:33 authpriv warn pluto[4435]: "torbowden" #15: initiating Quick Mode PSK+ENCRYPT+TUNNEL+PFS+UP+IKEv2ALLOW+SAREFTRACK to replace #13 {using isakmp#14 msgid:250c651b proposal=3DES(3)_192-MD5(1)_128 pfsgroup=OAKLEY_GROUP_MODP1024}
Nov 13 15:36:33 authpriv warn pluto[4435]: "torbowden" #15: transition from state STATE_QUICK_I1 to state STATE_QUICK_I2
Nov 13 15:36:33 daemon warn kernel: pluto/4435: potentially unexpected fatal signal 11.
Nov 13 15:36:33 daemon warn kernel: Cpu 0
Nov 13 15:36:33 daemon warn kernel: $ 0   : 00000000
Nov 13 15:36:33 daemon info kernel:  10000d00
Nov 13 15:36:33 daemon info kernel:  ffffffc9
Nov 13 15:36:33 daemon info kernel:  00000074
Nov 13 15:36:33 daemon warn kernel: $ 4   : 7ff89f74
Nov 13 15:36:33 daemon info kernel:  73287365 7ff89080
Nov 13 15:36:33 daemon info kernel:  00000001
Nov 13 15:36:33 daemon warn kernel: $ 8   : 00000000
Nov 13 15:36:33 daemon info kernel:  31373631 00000001
Nov 13 15:36:33 daemon info kernel:  00000057
Nov 13 15:36:34 daemon warn kernel: $12   : 00000807
Nov 13 15:36:34 daemon info kernel:  00000800 00000400
Nov 13 15:36:34 daemon info kernel:  00000008
Nov 13 15:36:34 daemon warn kernel: $16   : 00000003
Nov 13 15:36:34 daemon info kernel:  000002de 7ff89f74
Nov 13 15:36:34 daemon info kernel:  00000000
Nov 13 15:36:34 daemon warn kernel: $20   : 0054b878
Nov 13 15:36:34 daemon info kernel:  00000000 0054b878
Nov 13 15:36:34 daemon info kernel:  7ff8a374
Nov 13 15:36:34 daemon warn kernel: $24   : 00000001
Nov 13 15:36:34 daemon info kernel:  2ab4bf70         
Nov 13 15:36:34 daemon info kernel:          
Nov 13 15:36:34 daemon warn kernel: $28   : 00534bb0
Nov 13 15:36:34 daemon info kernel:  7ff896a0
Nov 13 15:36:34 daemon info kernel:  0054cd88 0041dc18
Nov 13 15:36:34 daemon warn kernel: Hi    : 00000004
Nov 13 15:36:34 daemon warn kernel: Lo    : 00000000
Nov 13 15:36:34 daemon warn kernel: epc   : 2ab4bf74 0x2ab4bf74
Nov 13 15:36:34 daemon warn kernel:     Tainted: P          
Nov 13 15:36:34 daemon warn kernel: ra    : 0041dc18 0x41dc18
Nov 13 15:36:34 daemon warn kernel: Status: 00000d13    USER 
Nov 13 15:36:34 daemon info kernel: EXL IE 
Nov 13 15:36:34 daemon warn kernel: Cause : 00008008
Nov 13 15:36:34 daemon warn kernel: BadVA : 73287365
Nov 13 15:36:34 daemon warn kernel: PrId  : 0002a070 (Broadcom4350)
Nov 13 15:36:34 authpriv warn pluto[4440]: pluto_crypto_helper: helper (0) is  normal exiting 
Nov 13 15:36:34 daemon err ipsec__plutorun: Segmentation fault
Nov 13 15:36:34 daemon err ipsec__plutorun: !pluto failure!:  exited with error status 139 (signal 11)
Nov 13 15:36:34 daemon err ipsec__plutorun: restarting IPsec after pause...
Nov 13 15:36:44 daemon err ipsec_setup: Stopping Openswan IPsec...
Nov 13 15:36:44 daemon err ipsec_setup: Removing orphaned /var/run/pluto/pluto.pid:
Nov 13 15:36:45 daemon err ipsec_setup: ...Openswan IPsec stopped
Nov 13 15:36:45 daemon err ipsec_setup: Starting Openswan IPsec U2.6.38/K2.6.30...
Nov 13 15:36:45 daemon err ipsec_setup: Using NETKEY(XFRM) stack
Nov 13 15:36:47 authpriv err ipsec__plutorun: Starting Pluto subsystem...


Best Regards,
Ozai
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.openswan.org/pipermail/users/attachments/20121115/120c74dc/attachment-0001.html>


More information about the Users mailing list