OK, we've had our test DCD-DCD, gw-gw vpn up continuously for several
weeks. In fact, I used it earlier this evening to transfer files.
Of a sudden, the tunnel no longer functioned!
This is what we saw:
root@bluetrout:/var/log
# ipsec eroute
192.168.1.0/24 -> 192.168.123.0/24 => %hold (21)
root@trout:/var/log
# ipsec eroute
192.168.123.0/24 -> 192.168.1.0/24 => %hold (34)
Where are these documented?
And, this in /var/log/auth.log:
Feb 2 20:24:15 bluetrout Pluto[25694]: packet from 12.248.253.86:500:
Main Mode message is part of an unknown exchange
Feb 2 20:24:15 bluetrout Pluto[25694]: packet from 12.248.253.86:500:
Quick Mode message is for a non-existent (expired?) ISAKMP SA
Feb 2 20:24:16 bluetrout Pluto[25694]: packet from 12.248.253.86:500:
Main Mode message is part of an unknown exchange
Feb 2 20:24:16 bluetrout Pluto[25694]: packet from 12.248.253.86:500:
Main Mode message is part of an unknown exchange
Feb 2 20:24:17 bluetrout Pluto[25694]: packet from 12.248.253.86:500:
Quick Mode message is for a non-existent (expired?) ISAKMP SA
Feb 2 20:24:17 bluetrout Pluto[25694]: packet from 12.248.253.86:500:
Main Mode message is part of an unknown exchange
Feb 2 20:24:17 bluetrout Pluto[25694]: packet from 12.248.253.86:500:
Main Mode message is part of an unknown exchange
Feb 2 20:24:17 bluetrout Pluto[25694]: "trout" #756: discarding
duplicate packet; already STATE_MAIN_I2
Feb 2 20:24:15 trout Pluto[8589]: "bluetrout" #1444: STATE_MAIN_R3:
sent MR3, ISAKMP SA established
Feb 2 20:24:15 trout Pluto[8589]: "bluetrout" #1438: max number of
retransmissions (2) reached STATE_MAIN_R1
Feb 2 20:24:15 trout Pluto[8589]: "bluetrout" #1437: max number of
retransmissions (2) reached STATE_QUICK_I1
Feb 2 20:24:15 trout Pluto[8589]: "bluetrout" #1437: starting keying
attempt 25 of an unlimited number
Feb 2 20:24:15 trout Pluto[8589]: "bluetrout" #1445: initiating Quick
Mode RSASIG+ENCRYPT+TUNNEL+PFS
Feb 2 20:24:16 trout Pluto[8589]: "bluetrout" #1339: ISAKMP SA expired
(superseded by #1444)
Feb 2 20:24:16 trout Pluto[8589]: "bluetrout" #1347: not replacing
stale ISAKMP SA: #1444 will do
Feb 2 20:24:16 trout Pluto[8589]: "bluetrout" #1444: retransmitting in
response to duplicate packet; already STATE_MAIN_R3
Feb 2 20:24:16 trout Pluto[8589]: "bluetrout" #1444: retransmitting in
response to duplicate packet; already STATE_MAIN_R3
Feb 2 20:24:16 trout Pluto[8589]: "bluetrout" #1446: responding to Main
Mode
Feb 2 20:24:17 trout Pluto[8589]: "bluetrout" #1447: responding to Main
Mode
We tried cycling both sides, without successful reconnection:
root@bluetrout:/var/log
# ipsec auto --down trout
# ipsec auto --up trout
root@trout:/var/log
# ipsec auto --down trout
# ipsec auto --up trout
We tried completely cycling ipsec:
root@bluetrout:/var/log
# ipsec auto --down trout
# svi ipsec --stop
# svi ipsec --start
# ipsec auto --up trout
root@trout:/var/log
# ipsec auto --down trout
# svi ipsec --stop
# svi ipsec --start
# ipsec auto --up trout
Then, we got this:
root@bluetrout:/var/log
# ipsec eroute
192.168.1.0/24 -> 192.168.123.0/24 => %trap (0)
root@trout:/var/log
# ipsec eroute
192.168.123.0/24 -> 192.168.1.0/24 => %trap (0)
Where are these documented?
Finally, we stopped ipsec, reloaded the entire network, then restarted
ipsec:
root@bluetrout:/var/log
# ipsec auto --down trout
# svi ipsec --stop
# svi network reload
# svi ipsec --start
# ipsec auto --up trout
root@trout:/var/log
# ipsec auto --down trout
# svi ipsec --stop
# svi network reload
# svi ipsec --start
# ipsec auto --up trout
Now, we see this, as expected:
root@bluetrout:/root
# ipsec eroute
8 192.168.1.0/24 -> 192.168.123.0/24 =>
[EMAIL PROTECTED]
root@trout:/var/log
# ipsec eroute
8 192.168.123.0/24 -> 192.168.1.0/24 =>
[EMAIL PROTECTED]
What have we done that could have precipitated this?
[1] Weird messages began appearing in /etc/auth.log here:
Jan 30 18:39:39 bluetrout Pluto[25694]: "trout" #201: max number of
retransmissions (2) reached STATE_MAIN_I3. Possible authentication
failure: no acceptable response to our first encrypted message
Began seeing consecutive instances, like this, here:
Jan 30 18:40:29 trout Pluto[8589]: "bluetrout" #202: responding to Main
Mode
Jan 30 18:40:29 trout Pluto[8589]: "bluetrout" #203: responding to Main
Mode
Jan 30 18:40:29 trout Pluto[8589]: "bluetrout" #204: responding to Main
Mode
And, began seeing this here:
Jan 30 18:46:59 trout Pluto[8589]: "bluetrout" #203: max number of
retransmissions (2) reached STATE_MAIN_R1
Jan 30 18:46:59 trout Pluto[8589]: "bluetrout" #202: max number of
retransmissions (2) reached STATE_MAIN_R1
[2] root@bluetrout:/var/log
# ipchains -nvL | grep 5[01]
root@trout:/var/log
# ipchains -nvL | grep 5[01]
Each system had four (4) pairs of ACCEPT's for each of protocol 50 &
51 at the top, as well as another further down, from /etc/network.conf.
[3] Yesterday afternoon, we began using this to allow each gateway to
communicate with the other via the tunnel:
# bluetrout
ip route change 192.168.123.0/24 via 64.4.x.z src 192.168.1.254 dev
ipsec0
# trout
ip route change 192.168.1.0/24 via 12.248.c.d src 192.168.123.254 dev
ipsec0
What is going on here?
--
Best Regards,
mds
mds resource
888.250.3987
Dare to fix things before they break . . .
Our capacity for understanding is inversely proportional to how much we
think we know. The more I know, the more I know I don't know . . .
_______________________________________________
Leaf-user mailing list
[EMAIL PROTECTED]
https://lists.sourceforge.net/lists/listinfo/leaf-user