I think I'm getting closer to what I'm looking for.

So this event happens because I have dpdaction=restart. At least that's
what I found.
Problem is that with auto=route, if there is any connection drop, the
tunnel is never reestablished again, hence the dpdaction=restart, which
was obviously a workaround for me.

So I guess I need to understand why :
    - when there is excessive latency on the link, the tunnel fails
(should I work on the replay_window parameter ? The StrongSwan "server"
audit daemon complains with an "MAC_IPSEC_EVENT op=SA-replayed-pkt")
    - why, after having failed, the tunnel is not reestablished, why the
traps are not catching anything

    Hoggins!

Le 18/01/2018 à 14:38, Hoggins! a écrit :
> Thank you Anvar,
>
> Le 18/01/2018 à 14:09, Anvar Kuchkartaev a écrit :
>> I had similar type of error and it was kernel-libipsec plugin was 
>> conflicting with selinux. I disabled the kernel-libipsec and issue has been 
>> resolved.
> However, I did not compile StrongSwan with --enable-kernel-libipsec and
> no TUN device is created on the host, so I believe the plugin is already
> inactive on my implementation. I guess the Truth is out there.
>
>     Hoggins!
>


Attachment: signature.asc
Description: OpenPGP digital signature

Reply via email to