From: Michael Tremer <michael.tremer@ipfire.org>
To: development@lists.ipfire.org
Subject: Re: IPsec default to rekey=no - tests
Date: Fri, 05 Jun 2015 16:30:26 +0200 [thread overview]
Message-ID: <1433514626.27049.21.camel@ipfire.org> (raw)
In-Reply-To: <000c01d09f97$4b484550$e1d8cff0$@apolinarski.de>
[-- Attachment #1: Type: text/plain, Size: 2259 bytes --]
Hello,
On Fri, 2015-06-05 at 15:55 +0200, Wolfgang Apolinarski wrote:
> Hi!
>
> I performed some tests with ipfire and the Windows VPN client (for the
> rekey=no issue). I usually use short-time VPN connections (<3 hours), so I
> did not recognize any problems.
>
> During the tests, I did not find any configuration that allowed me a stable
> VPN connection, all connections drop after 3-4 hours (IKE re-negotiation,
> CHILD_SA re-negotiation works fine). The problem could also be located in
> one of the used routers... If you have any suggestion on what configuration
> I should test as well, please let me know.
This clearly is the IKE re-negotiation. The messages suggest that from
the log below and the configuration, too.
> My default configuration (1st try):
> conn WinAndroidVPN
> left=%defaultroute
> leftsubnet=0.0.0.0/0
> leftfirewall=yes
> lefthostaccess=yes
> leftallowany=yes
> leftcert=/var/ipfire/certs/hostcert.pem
> ike=aes256-sha1-modp1024!
> esp=aes256-sha1!
> right=%any
> keyexchange=ikev2
> compress=yes
> dpdaction=clear
> dpddelay=30s
> auto=add
> rightsourceip=%dhcp
> ikelifetime=4h
> lifetime=2h
> keylife=8h
> rightcert=/var/ipfire/certs/WinAndroidVPNcert.pem
>
> The protocol for this config is located here: http://pastebin.com/iXjjp71R
>
> 2nd try changes:
> ikelifetime=4h
> lifetime=90m
> The protocol for the 2nd config is located here:
> http://pastebin.com/xyarBvub
>
> 3rd try changes:
> rekey=no
> ikelifetime=4h
> lifetime=2h
> The protocol for the 3rd config is located here:
> http://pastebin.com/jmPNzxUX
>
> So, sorry, I was not able to find a stable connection and have no suggestion
> on how to change the default config such that a stable connection with
> Windows 7/8.1 is possible.
Have you tried to capture the packets on the client as well and check if
the IKE messages reach that system? strongSwan had some bugs/features?
in the past where it ignored IKE messages. Maybe that is the case in the
Windows client - or maybe that is something in the standard.
That way we can at least make sure that there is some other NAT router
that is causing the problems...
Best,
-Michael
>
> Best regards,
> Wolfgang
>
>
>
[-- Attachment #2: signature.asc --]
[-- Type: application/pgp-signature, Size: 819 bytes --]
prev parent reply other threads:[~2015-06-05 14:30 UTC|newest]
Thread overview: 2+ messages / expand[flat|nested] mbox.gz Atom feed top
2015-06-05 13:55 Wolfgang Apolinarski
2015-06-05 14:30 ` Michael Tremer [this message]
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=1433514626.27049.21.camel@ipfire.org \
--to=michael.tremer@ipfire.org \
--cc=development@lists.ipfire.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox