[Openswan Users] Couldn't start up tunnel in openswan 2.6.43 (klips)
Feng Dai
freedai at hotmail.com
Tue May 5 13:51:35 EDT 2015
ipsec.conf.
version 2.0
config setup interfaces=ipsec0=eth1 klipsdebug=none plutodebug=none uniqueids=yes virtual_private=%v4:10.0.0.0/8,%v4:172.16.0.0/12,%v4:192.168.0.0/16,%v4:!192.168.44.0/24 nat_traversal=yes nhelpers=0
conn connection-10.50.10.129-10.50.11.95-0 right=10.50.11.95 left=10.50.10.129 #rightnexthop=10.50.0.0 #leftnexthop=10.50.0.0 authby=rsasig rightid="xxxx" leftid="xxxx" leftsubnet=192.168.44.1/24 rightsubnet=192.168.164.0/24 auto=start ikelifetime=600s keylife=600s dpddelay=60 dpdtimeout=180 dpdaction=restart_by_peer leftupdown="" pfs=no leftcert=/etc/pki/TrustOS/identity.crt leftca=/etc/ipsec.d/cacerts/tw-bundle.crt ike=3des-md5;modp1536 phase2alg=3des-md5;modp1536
-Feng
From: freedai at hotmail.com
To: users at lists.openswan.org
Date: Mon, 4 May 2015 12:13:33 -0700
Subject: [Openswan Users] Couldn't start up tunnel in openswan 2.6.43 (klips)
Hello there,
I have ipsec.conf used to work with 2.6.41. After I upgraded to 2.6.43, it failed to start up tunnel.
May 4 19:01:34 vpn-spoke-03 pluto[7434]: address family inconsistency in this connection=2 host=2/nexthop=0May 4 19:01:34 vpn-spoke-03 pluto[7434]: attempt to load incomplete connection
After I added left/rightnexthop, it could work. %defaultroute didn't work though. I have to put in specific IP. #rightnexthop=10.50.10.129 #leftnexthop=10.50.11.95So my question is would nexthop be required from now on? Or will it be fixed in next release and when will be the release if this is a bug?
BTW, I believe there's a bug in pfkey_v2.c. 2.6.43 compile out the creation of pk_key but it still have cleanup of pk_key. So I can see kernal panic when stopping the service.---- pfkey_init ----#if 0 /* XXX - does anyone actually use this interface at all? */#ifdef CONFIG_PROC_FS { struct proc_dir_entry* entry;
entry = create_proc_entry ("pf_key", 0, init_net.proc_net); entry->read_proc = pfkey_get_info; entry = create_proc_entry ("pf_key_supported", 0, init_net.proc_net); entry->read_proc = pfkey_supported_get_info; entry = create_proc_entry ("pf_key_registered", 0, init_net.proc_net); entry->read_proc = pfkey_registered_get_info; }#endif /* CONFIG_PROC_FS */#endif
---- pfkey_cleanup ----#ifdef CONFIG_PROC_FS remove_proc_subtree("pf_key", init_net.proc_net); remove_proc_subtree("pf_key_supported", init_net.proc_net); remove_proc_subtree("pf_key_registered", init_net.proc_net);#endif /* CONFIG_PROC_FS */
Thanks. - Feng
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.openswan.org/pipermail/users/attachments/20150505/95cb2369/attachment.html>
More information about the Users
mailing list