Hello Andreas,

I have been trying to setup rekeying of both IKE SA annd IPSEC SA. But there
is some confusion as to what is really the correct behaviour.
I understand that there some attributes which need to be set :

ikelifetime
lifetime
rekeymargin
rekeyfuzz
rekey
reauth

We have a requirement to start rekeying at 80% of the time given in
ikelifetime | lifetime. I am not sure as to how to get this done.
Can ikelifetime and lifetime values be close ? Or they have to be far apart
?

Also, can you please tell under what scenarios rekeyfuzz, rekey and reauth
are used ?

Whether these rekeying values have to be same on both the peers ? Or they
can be differenet ? If they are different, do the peers agree to a common
value ? Please explain this with respect to IKEv1 and IKEv2.

I tried with the below parameters and this is what I have got.
ikelifetime=24h
lifetime=10m
rekeymargin=2m

FBM# ipsec status
000 "host-host":
10.10.10.0/24===10.10.10.2[C=FI<http://10.10.10.0/24===10.10.10.2%5BC=FI>,
O=Insta, CN=Test]...10.10.10.5[C=FI, O=Insta, CN=Test]===10.10.10.0/24; ero2
000 "host-host":   newest ISAKMP SA: #1; newest IPsec SA: #2;
000
000 #2: "host-host" STATE_QUICK_I2 (sent QI2, IPsec SA established);
EVENT_SA_REPLACE in 377s; newest IPSEC; eroute owner
000 #2: "host-host" esp.fb533...@10.10.10.5 (0 bytes)
esp.dce7c...@10.10.10.2 (0 bytes); tunnel
000 #1: "host-host" STATE_MAIN_I4 (ISAKMP SA established); EVENT_SA_REPLACE
in 86121s; newest ISAKMP

*This is taken as soon as the IPSEC SA was established. From these I
understand IPSEC SA is going to replaced in 377s and ISAKMP SA in 86121s.
But these values on the other peer were different even though I have given
the same rekeying values.
*
FBM# ipsec status
000 "host-host":
10.10.10.0/24===10.10.10.2[C=FI<http://10.10.10.0/24===10.10.10.2%5BC=FI>,
O=Insta, CN=Test]...10.10.10.5[C=FI, O=Insta, CN=Test]===10.10.10.0/24; ero3
000 "host-host":   newest ISAKMP SA: #1; newest IPsec SA: #3;
000
000 #3: "host-host" STATE_QUICK_I2 (sent QI2, IPsec SA established);
EVENT_SA_REPLACE in 385s; newest IPSEC; eroute owner
000 #3: "host-host" esp.d31d7...@10.10.10.5 (0 bytes)
esp.bab02...@10.10.10.2 (0 bytes); tunnel
000 #2: "host-host" STATE_QUICK_I2 (sent QI2, IPsec SA established);
EVENT_SA_EXPIRE in 164s
000 #2: "host-host" esp.fb533...@10.10.10.5 (0 bytes)
esp.dce7c...@10.10.10.2 (0 bytes); tunnel
000 #1: "host-host" STATE_MAIN_I4 (ISAKMP SA established); EVENT_SA_REPLACE
in 85740s; newest ISAKMP

*This I took after the first IPSEC SA which was established the time of 377s
was elapsed. A new IPSec SA was established with the time showing 385s. The
previous IPSec SA says expire in 164s.

*Now, I am not sure how these values are being calculated.
Would it be possible for you to put working logs for rekeying in
wiki.strongswan so that i can refer.

btw, i am using 4.3.4 ver strongswan. I hope there are no patches related to
rekeying for this version. If there are, please let me know.

I am sorry to put up some many questions.

Thanks & Regards,
Ashish.
_______________________________________________
Users mailing list
Users@lists.strongswan.org
https://lists.strongswan.org/mailman/listinfo/users

Reply via email to