Hi,

On Tue, Jun 16, 2020 at 03:25:12PM +0200, tris...@pilat.me wrote:
> Hi guys,
> 
> First of all, thanks for the amazing work you've done with 6.7!
> 
> That said, I've got the same issue here after I updated to 6.7. The VPN
> keeps cutting off every 10 minutes or so. Is there any way I could fix that
> ?

This sound like a different problem.
The unanswered INFORMATIONAL messages are used to check if the peer is still
there.  After they go unanswered the connection is restarted.
May I ask which IKE implementation is running on the peer?

You can try https://marc.info/?l=openbsd-misc&m=159178866010830&w=2
to see if disabling DPD would actually solve your problem.

> 
> Here's my configuration:
> 
> local_gw="203.0.113.1"
> local_network="198.51.100.0/24"
> 
> remote_gw="203.0.113.2"
> remote_network="192.0.2.0/26"
> remote_network2="192.0.2.64/26"
> 
> ikev2 active esp \
>     from $local_gw to $remote_gw \
>     from $local_network to $remote_network \
>     from $local_network to $remote_network2 \
>     peer $remote_gw \
>     ikesa enc aes-128 auth hmac-sha1 prf hmac-sha1 group modp1536 \
>     childsa auth hmac-sha1 enc aes-128 group modp1536 \
>     ikelifetime 86400 lifetime 43200 \
>     psk "XXXXXXXXXXXXXXXXX"
> 
> That's what I can see in the logs:
> 
> Jun 16 08:07:00 vpn00 iked[31977]: ikev2_init_ike_sa: initiating "policy1"
> Jun 16 08:07:00 vpn00 iked[31977]: spi=0x462d6a0792f85aa5: send IKE_SA_INIT
> req 0 peer 203.0.113.2:500 local 0.0.0.0:500, 382 bytes
> Jun 16 08:07:00 vpn00 iked[31977]: spi=0x462d6a0792f85aa5: recv IKE_SA_INIT
> res 0 peer 203.0.113.2:500 local 203.0.113.1:500, 352 bytes, policy
> 'policy1'
> Jun 16 08:07:00 vpn00 iked[31977]: spi=0x462d6a0792f85aa5: send IKE_AUTH req
> 1 peer 203.0.113.2:4500 local 203.0.113.1:4500, 284 bytes, NAT-T
> Jun 16 08:07:00 vpn00 iked[31977]: spi=0x462d6a0792f85aa5: recv IKE_AUTH res
> 1 peer 203.0.113.2:4500 local 203.0.113.1:4500, 252 bytes, policy 'policy1'
> Jun 16 08:07:00 vpn00 iked[31977]: spi=0x462d6a0792f85aa5:
> ikev2_childsa_enable: loaded SPIs: 0xae51c8bb, 0x3ab61433
> Jun 16 08:07:00 vpn00 iked[31977]: spi=0x462d6a0792f85aa5:
> ikev2_childsa_enable: loaded flows: ESP-198.51.100.0/24=192.0.2.64/26(0),
> ESP-198.51.100.0/24=192.0.2.0/26(0), ESP-203.0.113.1/32=203.0.113.2/32(0)
> Jun 16 08:07:00 vpn00 iked[31977]: spi=0x462d6a0792f85aa5: established peer
> 203.0.113.2:4500[IPV4/203.0.113.2] local
> 203.0.113.1:4500[FQDN/vpn00.example.net] policy 'policy1' as initiator
> Jun 16 08:12:02 vpn00 iked[31977]: spi=0x462d6a0792f85aa5: retransmit 1
> INFORMATIONAL req 2 peer 203.0.113.2:4500 local 203.0.113.1:4500
> Jun 16 08:12:06 vpn00 iked[31977]: spi=0x462d6a0792f85aa5: retransmit 2
> INFORMATIONAL req 2 peer 203.0.113.2:4500 local 203.0.113.1:4500
> Jun 16 08:12:14 vpn00 iked[31977]: spi=0x462d6a0792f85aa5: retransmit 3
> INFORMATIONAL req 2 peer 203.0.113.2:4500 local 203.0.113.1:4500
> Jun 16 08:12:30 vpn00 iked[31977]: spi=0x462d6a0792f85aa5: retransmit 4
> INFORMATIONAL req 2 peer 203.0.113.2:4500 local 203.0.113.1:4500
> Jun 16 08:13:02 vpn00 iked[31977]: spi=0x462d6a0792f85aa5: retransmit 5
> INFORMATIONAL req 2 peer 203.0.113.2:4500 local 203.0.113.1:4500
> Jun 16 08:14:06 vpn00 iked[31977]: spi=0x462d6a0792f85aa5: sa_free:
> retransmit limit reached
> Jun 16 08:15:00 vpn00 iked[31977]: ikev2_init_ike_sa: initiating "policy1"
> Jun 16 08:15:00 vpn00 iked[31977]: spi=0x3f6d5768feb36565: send IKE_SA_INIT
> req 0 peer 203.0.113.2:500 local 0.0.0.0:500, 382 bytes
> Jun 16 08:15:00 vpn00 iked[31977]: spi=0x3f6d5768feb36565: recv IKE_SA_INIT
> res 0 peer 203.0.113.2:500 local 203.0.113.1:500, 352 bytes, policy
> 'policy1'
> Jun 16 08:15:00 vpn00 iked[31977]: spi=0x3f6d5768feb36565: send IKE_AUTH req
> 1 peer 203.0.113.2:500 local 203.0.113.1:500, 284 bytes
> Jun 16 08:15:00 vpn00 iked[31977]: spi=0x3f6d5768feb36565: recv IKE_AUTH res
> 1 peer 203.0.113.2:500 local 203.0.113.1:500, 252 bytes, policy 'policy1'
> Jun 16 08:15:00 vpn00 iked[31977]: spi=0x3f6d5768feb36565:
> ikev2_childsa_enable: loaded SPIs: 0xae51c8bd, 0x7009bc39
> Jun 16 08:15:00 vpn00 iked[31977]: spi=0x3f6d5768feb36565:
> ikev2_childsa_enable: loaded flows: ESP-198.51.100.0/24=192.0.2.64/26(0),
> ESP-198.51.100.0/24=192.0.2.0/26(0), ESP-203.0.113.1/32=203.0.113.2/32(0)
> Jun 16 08:15:00 vpn00 iked[31977]: spi=0x3f6d5768feb36565: established peer
> 203.0.113.2:500[IPV4/203.0.113.2] local
> 203.0.113.1:500[FQDN/vpn00.example.net] policy 'policy1' as initiator
> Jun 16 08:16:02 vpn00 iked[31977]: spi=0x3f6d5768feb36565: retransmit 1
> INFORMATIONAL req 2 peer 203.0.113.2:500 local 203.0.113.1:500
> Jun 16 08:16:06 vpn00 iked[31977]: spi=0x3f6d5768feb36565: retransmit 2
> INFORMATIONAL req 2 peer 203.0.113.2:500 local 203.0.113.1:500
> Jun 16 08:16:14 vpn00 iked[31977]: spi=0x3f6d5768feb36565: retransmit 3
> INFORMATIONAL req 2 peer 203.0.113.2:500 local 203.0.113.1:500
> Jun 16 08:16:30 vpn00 iked[31977]: spi=0x3f6d5768feb36565: retransmit 4
> INFORMATIONAL req 2 peer 203.0.113.2:500 local 203.0.113.1:500
> Jun 16 08:17:02 vpn00 iked[31977]: spi=0x3f6d5768feb36565: retransmit 5
> INFORMATIONAL req 2 peer 203.0.113.2:500 local 203.0.113.1:500
> Jun 16 08:18:06 vpn00 iked[31977]: spi=0x3f6d5768feb36565: sa_free:
> retransmit limit reached
> 
> On 2020-06-16 02:55, Daniel Ouellet wrote:
> > 
> > Just for the records, I just took a copy of iked version 6.6 and used
> > that instead of 6.7 and all is good. I saved the 6.7 version.
> > 
> > gateway# ls -al /sbin/iked*
> > -r-xr-xr-x  1 root  bin  436584 Jun 15 20:42 /sbin/iked
> > -r-xr-xr-x  1 root  bin  448744 May  7 12:52 /sbin/iked.original
> > 
> > So it's definitely nothing else that is stopping it from working.
> > 
> > Just a new requirement for iked to use this new way and so far I am
> > coming short as to how to get this done right.
> 
> As a workaround, that did the trick for me too, thanks for the hint! At
> least it is fixed for now.
> 
> Cheers,
> -- 
> Tristan
> 

Reply via email to