Racoon site-to site
Mike Tancsa
mike at sentex.net
Thu Dec 17 16:34:08 UTC 2009
At 02:50 AM 12/15/2009, Jon Otterholm wrote:
>On 2009-12-11 20.23, "Mike Tancsa" <mike at sentex.net> wrote:
> >
> >
> > You might also want to turn on DPD (dead peer
> > detection) in ipsectools if you dont already have
> > it on both sides. Are you really using des for
> > the crypto ? Also, when the session is
> > negotiated, take a look at the output of
> > setkey -D
> > and see what was actually negotiated and post it
> > here (just make sure you get rid of the info on the E and A lines.
> >
> > e.g.
> > 1.1.1.2 2.2.2.2
> > esp mode=tunnel spi=125444787(0x077a22b3) reqid=16416(0x00004020)
> > E: 3des-cbc 770cdd7b 770cdd7b 770cdd7b 770cdd7b 770cdd7b 770cdd7b
> > A: hmac-sha1 5cfdbabb 5cfdbabb 5cfdbabb 5cfdbabb 5cfdbabb
> >
> > ie. mask out the 5cfdbabb and 770cdd7b values
> > before posting as thats your crypto :)
> >
> >
>
>Here is output from setkey -D when we lost connection:
>
>localip remoteip
> esp mode=tunnel spi=989823717(0x3aff82e5) reqid=0(0x00000000)
> E: des-cbc x x
> A: hmac-md5 x x x x
> seq=0x000009ac replay=4 flags=0x00000000 state=mature
> created: Dec 15 07:57:41 2009 current: Dec 15 08:26:04 2009
> diff: 1703(s) hard: 3600(s) soft: 2880(s)
> last: Dec 15 08:26:03 2009 hard: 0(s) soft: 0(s)
> current: 400400(bytes) hard: 0(bytes) soft: 0(bytes)
> allocated: 2476 hard: 0 soft: 0
> sadb_seq=1 pid=23175 refcnt=2
>remoteip remoteip
> esp mode=tunnel spi=117094840(0x06fab9b8) reqid=0(0x00000000)
> E: des-cbc x x
> A: hmac-md5 x x x x
> seq=0x00000b73 replay=4 flags=0x00000000 state=mature
> created: Dec 15 07:57:41 2009 current: Dec 15 08:26:04 2009
> diff: 1703(s) hard: 3600(s) soft: 2880(s)
> last: Dec 15 08:25:37 2009 hard: 0(s) soft: 0(s)
> current: 2960978(bytes) hard: 0(bytes) soft: 0(bytes)
> allocated: 2931 hard: 0 soft: 0
> sadb_seq=0 pid=23175 refcnt=1
The state looks good (mature). It would be useful to see what the
other side thinks is going on. 3 different things to try when its down.
racoonctl vpn-disconnect remoteip
... where remoteip is the public IP of the endpoint and then generate
some traffic and see if things are re-established.
setkey -F
to flush the associations on this side... and again, generate some traffic.
Another thing to try is
sysctl -w net.key.preferred_oldsa=0
setkey -F
restart racoon
and then see if the hangs still happen. But you should try and get
some debugging info from the other side to see what state things are
in when the tunnel fails. In general, I have found setting
net.key.preferred_oldsa=0 important when inter-operating with other
platforms. Also, check and make sure you have dpd compiled into
ipsectools and make sure enabled.
---Mike
--------------------------------------------------------------------
Mike Tancsa, tel +1 519 651 3400
Sentex Communications, mike at sentex.net
Providing Internet since 1994 www.sentex.net
Cambridge, Ontario Canada www.sentex.net/mike
More information about the freebsd-net
mailing list