+ipsec_common_input: no key association found for SA
Gabe
nrml at att.net
Mon Dec 29 14:31:31 UTC 2008
> To: Bjoern A. Zeeb <bzeeb-lists at lists.zabbadoz.net>
> Cc: freebsd-net at freebsd.org
> Sent: Monday, December 29, 2008 6:18:36 AM
> Subject: Re: +ipsec_common_input: no key association found for SA
>
> > From: Bjoern A. Zeeb
> > To: Gabe
> > Cc: freebsd-net at freebsd.org
> > Sent: Monday, December 29, 2008 5:19:16 AM
> > Subject: Re: +ipsec_common_input: no key association found for SA
> >
> > On Mon, 29 Dec 2008, Bjoern A. Zeeb wrote:
> >
> > > On Mon, 29 Dec 2008, Gabe wrote:
> > >
> > >> Anyone know what causes this error message?
> > >>
> > >> +ipsec_common_input: no key association found for SA
> > >> 69.x.x.x[0]/04e317a1/50
> > >
> > > from what I remember without looking, this means that you ahve an
> > > IPsec policy for src/dst but no SA matching this pair or rather no
> > > matching destination + protocol + security parameter index (see rfc2401).
> > >
> > > The easiest thing you can do is to check
> > > setkey -Da
> > > for this tripple the time the printf happens.
> > >
> > > The first thing in the printf is your destination IP (your local side),
> > > the next is the SPI in hex and last is the protocol (50 == ESP). With
> > > that you can see if what the peer sends you is what you negotiated/expected.
> > >
> > > Are you using static keying or an ike daemon like racoon?
> > > Do this happen for all packets or just randomly or exactly every n
> > > minutes/hours?
> > >
> > > If you find an exact match of the triplet in setkey -Da you may also
> > > want to check if there is another one and/or the state of the entry/entries
> > > (state=.. at the end of the fourth line).
> > > If it's not "mature" check the time ralted values to see if there is
> > > an expiry problem..
>
> This is what setkey -Da returns:
> box# setkey -Da
> Invalid extension type
> Invalid extension type
> box#
>
> I only have one peer (site to site link) and this appears to happen sporadically
> with no particular pattern that I can figure out. I also tried rebuilding the
> ipsec-tools port as a just in case and that made no change. This is some more
> log info:
>
> Dec 29 05:50:37 box kernel: ipsec_common_input: no key association found for SA
> 69.x.x.x[0]/03e4aece/50
> Dec 29 05:50:39 box last message repeated 64 times
> Dec 29 05:51:33 box kernel: WARNING: pseudo-random number generator used for
> IPsec processing
> Dec 29 05:54:54 box kernel: ipsec_common_input: no key association found for SA
> 69.x.x.x[0]/0cb33e2b/50
> Dec 29 05:54:56 box last message repeated 8 times
> Dec 29 06:07:32 box kernel: ipsec_common_input: no key association found for SA
> 69.x.x.x[0]/0c4ccc0d/50
> Dec 29 06:07:44 box last message repeated 241 times
>
> This started happening after I patched the kernel for NAT_T and enabled NAT_T on
> racoon, perhaps the natt_keepalive is too long at 20 seconds?
>
> Here is the racoon.con:
>
> padding # options are not to be changed
> {
> maximum_length 20;
> randomize off;
> strict_check off;
> exclusive_tail off;
>
> }
>
> timer # timing options. change as needed
> {
> counter 5;
> interval 20 sec;
> persend 1;
> natt_keepalive 20 sec;
> phase1 30 sec;
> phase2 15 sec;
> }
>
> listen # address [port] that racoon will listening on
> {
> isakmp 69.x.x.x [500];
> isakmp_natt 69.x.x.x [4500];
> }
>
> remote 69.x.x.x [500]
> {
> exchange_mode main,base;
> doi ipsec_doi;
> situation identity_only;
> my_identifier address 69.x.x.x;
> peers_identifier address 69.x.x.x;
> lifetime time 12 hour;
> passive off;
> proposal_check obey;
> nat_traversal on;
> generate_policy off;
>
> proposal {
> encryption_algorithm blowfish;
> hash_algorithm md5;
> authentication_method pre_shared_key;
> lifetime time 24 hours;
> dh_group 1;
> }
> }
>
> sainfo (address 192.168.10.0/24 any address 192.168.20.0/24 any)
> # address $network/$netmask $type addres
> s $network/$netmask $type ( $type being any or esp)
> { # $network must be the two internal networks you
> are joining.
> pfs_group 1;
> lifetime time 36000 sec;
> encryption_algorithm blowfish,3des,des;
> authentication_algorithm hmac_md5,hmac_sha1;
> compression_algorithm deflate;
>
> Thanks in advance,
>
> /gabe
>
> >
> > One more thing - you may want to flip the sysctl to
> > net.key.preferred_oldsa=0
> > and see if that makes a change. But beware - this is going to affect
> > all your peers, not just one, so if you have 99 working and 1 not
> > you'll most likely kill the other 99.
> >
> > /bz
> >
> > --
> > Bjoern A. Zeeb The greatest risk is not taking one.
>
I guess more importantly would be the ipsec configuration:
spdadd 192.168.10.0/24 192.168.10.165/32 any -P in none;
spdadd 192.168.10.165/32 192.168.10.0/24 any -P out none;
spdadd 192.168.10.0/24 192.168.20.0/24 any -P out ipsec esp/tunnel/box-box2/unique;
spdadd 192.168.20.0/24 192.168.10.0/24 any -P in ipsec esp/tunnel/box-box2/unique;
"box" being the server with the error message and box2 being the server at the end, which also has this error message.
/gabe
More information about the freebsd-net
mailing list