Project

General

Profile

MIPv6 Home Agent Setup » History » Version 6

Tobias Brunner, 05.05.2009 18:03
trac conversion errors fixed

1 6 Tobias Brunner
{{>toc}}
2 1 Andreas Steffen
3 5 Andreas Steffen
h1. MIPv6 Home Agent Setup
4 1 Andreas Steffen
5 1 Andreas Steffen
6 1 Andreas Steffen
7 5 Andreas Steffen
h2. mip6d.conf
8 5 Andreas Steffen
9 5 Andreas Steffen
10 5 Andreas Steffen
<pre>
11 6 Tobias Brunner
NodeConfig HA;
12 5 Andreas Steffen
13 6 Tobias Brunner
UseMnHaIPsec enabled;
14 6 Tobias Brunner
KeyMngMobCapability enabled;
15 6 Tobias Brunner
DefaultBindingAclPolicy deny;
16 5 Andreas Steffen
17 1 Andreas Steffen
Interface "eth0";
18 1 Andreas Steffen
19 1 Andreas Steffen
include "/etc/mip6d.conf.d/carol.mip6d.conf"
20 1 Andreas Steffen
include "/etc/mip6d.conf.d/dave.mip6d.conf"
21 5 Andreas Steffen
</pre>
22 1 Andreas Steffen
23 1 Andreas Steffen
24 5 Andreas Steffen
h2. mip6d.conf.d/carol.mip6d.conf
25 5 Andreas Steffen
26 5 Andreas Steffen
27 5 Andreas Steffen
<pre>
28 1 Andreas Steffen
Interface "eth1";
29 1 Andreas Steffen
 
30 1 Andreas Steffen
IPsecPolicySet {
31 6 Tobias Brunner
    HomeAgentAddress 2001:1::1;
32 6 Tobias Brunner
    HomeAddress 2001:1::10/64;
33 1 Andreas Steffen
 
34 6 Tobias Brunner
    IPsecPolicy Mh UseESP 1;
35 6 Tobias Brunner
    IPsecPolicy TunnelPayload UseESP 2;
36 1 Andreas Steffen
}
37 1 Andreas Steffen
38 6 Tobias Brunner
BindingAclPolicy 2001:1::10 allow;
39 5 Andreas Steffen
</pre>
40 1 Andreas Steffen
41 2 Andreas Steffen
42 5 Andreas Steffen
h2. mip6d.conf.d/dave.mip6d.conf
43 5 Andreas Steffen
44 5 Andreas Steffen
45 5 Andreas Steffen
<pre>
46 2 Andreas Steffen
IPsecPolicySet {
47 6 Tobias Brunner
    HomeAgentAddress 2001:1::1;
48 6 Tobias Brunner
    HomeAddress 2001:1::20/64;
49 2 Andreas Steffen
 
50 6 Tobias Brunner
    IPsecPolicy Mh UseESP 3;
51 6 Tobias Brunner
    IPsecPolicy TunnelPayload UseESP 4;
52 2 Andreas Steffen
}
53 2 Andreas Steffen
54 6 Tobias Brunner
BindingAclPolicy 2001:1::20 allow;
55 5 Andreas Steffen
</pre>
56 3 Andreas Steffen
57 5 Andreas Steffen
*A word of WARNING:*
58 3 Andreas Steffen
59 5 Andreas Steffen
The *reqid* defined in the IPsecPolicy lines of the *mip6d.conf* files currently must exactly match
60 5 Andreas Steffen
the *reqid* assigned by strongSwan to the corresponding IPsec SA. strongSwan does the assignment using
61 3 Andreas Steffen
a linear counter starting with reqid 1. Otherwise the communication between the mip6d and strongSwan daemons
62 4 Andreas Steffen
via MIGRATE and ACQUIRE kernel messages is simply not going to work. Thus make sure that you start up the
63 5 Andreas Steffen
MN-HA connections in the correct order, i.e. in our example first the connection from MN *carol*
64 5 Andreas Steffen
(reqids 1 and 2) and only after that the connection from MN *dave* (reqids 3 and 4). We are aware that
65 1 Andreas Steffen
this is a severe restriction and are working on a more robust scheme.
66 1 Andreas Steffen
67 1 Andreas Steffen
68 5 Andreas Steffen
h2. ipsec.conf
69 5 Andreas Steffen
70 5 Andreas Steffen
71 5 Andreas Steffen
<pre>
72 1 Andreas Steffen
config setup
73 1 Andreas Steffen
        crlcheckinterval=180
74 1 Andreas Steffen
        plutostart=no
75 1 Andreas Steffen
        charondebug="knl 2"
76 1 Andreas Steffen
        
77 1 Andreas Steffen
conn %default
78 1 Andreas Steffen
        keyexchange=ikev2
79 1 Andreas Steffen
        reauth=no
80 1 Andreas Steffen
        mobike=no
81 1 Andreas Steffen
        installpolicy=no
82 1 Andreas Steffen
83 1 Andreas Steffen
conn mh
84 1 Andreas Steffen
        also=ha
85 1 Andreas Steffen
        leftsubnet=2001:1::1/128
86 1 Andreas Steffen
        leftprotoport=135/0
87 1 Andreas Steffen
        rightprotoport=135/0
88 1 Andreas Steffen
        type=transport_proxy
89 1 Andreas Steffen
90 1 Andreas Steffen
conn tunnel
91 1 Andreas Steffen
        also=ha
92 1 Andreas Steffen
        leftsubnet=::/0
93 1 Andreas Steffen
94 1 Andreas Steffen
conn ha
95 1 Andreas Steffen
        left=2001:1::1
96 1 Andreas Steffen
        leftcert=moonCert.pem
97 1 Andreas Steffen
        leftid=@moon.strongswan.org
98 1 Andreas Steffen
        right=%any
99 1 Andreas Steffen
        ike=aes128-sha1-modp2048!
100 1 Andreas Steffen
        esp=aes128-sha1-modp2048!
101 1 Andreas Steffen
102 1 Andreas Steffen
include /etc/ipsec.conf.d/carol.ipsec.conf
103 1 Andreas Steffen
include /etc/ipsec.conf.d/dave.ipsec.conf
104 5 Andreas Steffen
</pre>
105 1 Andreas Steffen
106 1 Andreas Steffen
107 5 Andreas Steffen
h2. ipsec.conf.d/carol.ipsec.conf
108 5 Andreas Steffen
109 5 Andreas Steffen
110 5 Andreas Steffen
<pre>
111 1 Andreas Steffen
conn carol
112 1 Andreas Steffen
        rightsubnet=2001:1::10/128
113 1 Andreas Steffen
        rightid=carol@strongswan.org
114 1 Andreas Steffen
115 1 Andreas Steffen
conn carol-mh
116 1 Andreas Steffen
        also=carol
117 1 Andreas Steffen
        also=mh
118 1 Andreas Steffen
        auto=add
119 1 Andreas Steffen
120 1 Andreas Steffen
conn carol-tunnel
121 1 Andreas Steffen
        also=carol
122 2 Andreas Steffen
        also=tunnel
123 2 Andreas Steffen
        auto=add
124 5 Andreas Steffen
</pre>
125 2 Andreas Steffen
126 2 Andreas Steffen
127 5 Andreas Steffen
h2. ipsec.conf.d/dave.ipsec.conf
128 5 Andreas Steffen
129 5 Andreas Steffen
130 5 Andreas Steffen
<pre>
131 2 Andreas Steffen
conn dave 
132 2 Andreas Steffen
        rightsubnet=2001:1::20/128
133 2 Andreas Steffen
        rightid=dave@strongswan.org
134 2 Andreas Steffen
135 2 Andreas Steffen
conn dave-mh
136 2 Andreas Steffen
        also=dave
137 2 Andreas Steffen
        also=mh
138 2 Andreas Steffen
        auto=add
139 2 Andreas Steffen
140 1 Andreas Steffen
conn dave-tunnel
141 1 Andreas Steffen
        also=dave
142 1 Andreas Steffen
        also=tunnel
143 1 Andreas Steffen
        auto=add
144 5 Andreas Steffen
</pre>
145 1 Andreas Steffen
146 1 Andreas Steffen
147 5 Andreas Steffen
h2. MN-to-HA Connection Establishment
148 5 Andreas Steffen
149 5 Andreas Steffen
150 1 Andreas Steffen
Start strongSwan first and the IPsec connection definitions will be loaded
151 1 Andreas Steffen
152 5 Andreas Steffen
<pre>
153 1 Andreas Steffen
ipsec start
154 1 Andreas Steffen
155 1 Andreas Steffen
Nov 19 08:39:01 moon charon: 01[DMN] starting charon (strongSwan Version 4.2.9)
156 1 Andreas Steffen
Nov 19 08:39:01 moon charon: 01[CFG] loading ca certificates from '/etc/ipsec.d/cacerts'
157 1 Andreas Steffen
Nov 19 08:39:01 moon charon: 01[LIB]   loaded certificate file '/etc/ipsec.d/cacerts/strongswanCert.pem'
158 1 Andreas Steffen
Nov 19 08:39:01 moon charon: 01[CFG] loading aa certificates from '/etc/ipsec.d/aacerts'
159 1 Andreas Steffen
Nov 19 08:39:01 moon charon: 01[CFG] loading ocsp signer certificates from '/etc/ipsec.d/ocspcerts'
160 1 Andreas Steffen
Nov 19 08:39:01 moon charon: 01[CFG] loading attribute certificates from '/etc/ipsec.d/acerts'
161 1 Andreas Steffen
Nov 19 08:39:01 moon charon: 01[CFG] loading crls from '/etc/ipsec.d/crls'
162 1 Andreas Steffen
Nov 19 08:39:01 moon charon: 01[LIB]   loaded crl file '/etc/ipsec.d/crls/strongswan.crl'
163 1 Andreas Steffen
Nov 19 08:39:01 moon charon: 01[CFG] loading secrets from '/etc/ipsec.secrets'
164 1 Andreas Steffen
Nov 19 08:39:01 moon charon: 01[CFG]   loaded private key file '/etc/ipsec.d/private/moonKey.pem'
165 1 Andreas Steffen
Nov 19 08:39:01 moon charon: 01[DMN] loaded plugins: curl aes des sha1 sha2 md5 gmp random x509 pubkey hmac xcbc stroke kernel-netlink sqlite sql 
166 1 Andreas Steffen
Nov 19 08:39:01 moon charon: 01[KNL] listening on interfaces:
167 1 Andreas Steffen
Nov 19 08:39:01 moon charon: 01[KNL]   eth1
168 1 Andreas Steffen
Nov 19 08:39:01 moon charon: 01[KNL]     10.1.0.1
169 1 Andreas Steffen
Nov 19 08:39:01 moon charon: 01[KNL]     2001:1::1
170 1 Andreas Steffen
Nov 19 08:39:01 moon charon: 01[KNL]     fec1::1
171 1 Andreas Steffen
Nov 19 08:39:01 moon charon: 01[KNL]     fe80::90fb:65ff:fea0:1d83
172 1 Andreas Steffen
Nov 19 08:39:01 moon charon: 01[KNL]   eth0
173 1 Andreas Steffen
Nov 19 08:39:01 moon charon: 01[KNL]     192.168.0.1
174 1 Andreas Steffen
Nov 19 08:39:01 moon charon: 01[KNL]     2001::1
175 1 Andreas Steffen
Nov 19 08:39:01 moon charon: 01[KNL]     fec0::1
176 1 Andreas Steffen
Nov 19 08:39:01 moon charon: 01[KNL]     fe80::fc27:dff:fe75:c32d
177 1 Andreas Steffen
Nov 19 08:39:01 moon charon: 01[JOB] spawning 16 worker threads
178 1 Andreas Steffen
Nov 19 08:39:01 moon charon: 08[CFG] crl caching to /etc/ipsec.d/crls enabled
179 1 Andreas Steffen
Nov 19 08:39:01 moon charon: 10[CFG] received stroke: add connection 'carol-mh'
180 1 Andreas Steffen
Nov 19 08:39:01 moon charon: 10[KNL] getting interface name for %any
181 1 Andreas Steffen
Nov 19 08:39:01 moon charon: 10[KNL] %any is not a local address
182 1 Andreas Steffen
Nov 19 08:39:01 moon charon: 10[KNL] getting interface name for 2001:1::1
183 1 Andreas Steffen
Nov 19 08:39:01 moon charon: 10[KNL] 2001:1::1 is on interface eth1
184 1 Andreas Steffen
Nov 19 08:39:01 moon charon: 10[LIB]   loaded certificate file '/etc/ipsec.d/certs/moonCert.pem'
185 1 Andreas Steffen
Nov 19 08:39:01 moon charon: 10[CFG] added configuration 'carol-mh': 2001:1::1[moon.strongswan.org]...%any[carol@strongswan.org]
186 1 Andreas Steffen
Nov 19 08:39:01 moon charon: 12[CFG] received stroke: add connection 'carol-tunnel'
187 1 Andreas Steffen
Nov 19 08:39:01 moon charon: 12[KNL] getting interface name for %any
188 1 Andreas Steffen
Nov 19 08:39:01 moon charon: 12[KNL] %any is not a local address
189 1 Andreas Steffen
Nov 19 08:39:01 moon charon: 12[KNL] getting interface name for 2001:1::1
190 1 Andreas Steffen
Nov 19 08:39:01 moon charon: 12[KNL] 2001:1::1 is on interface eth1
191 1 Andreas Steffen
Nov 19 08:39:01 moon charon: 12[LIB]   loaded certificate file '/etc/ipsec.d/certs/moonCert.pem'
192 1 Andreas Steffen
Nov 19 08:39:01 moon charon: 12[CFG] added child to existing configuration 'carol-mh'
193 1 Andreas Steffen
Nov 19 08:39:01 moon charon: 14[CFG] received stroke: add connection 'dave-mh'
194 1 Andreas Steffen
Nov 19 08:39:01 moon charon: 14[KNL] getting interface name for %any
195 1 Andreas Steffen
Nov 19 08:39:01 moon charon: 14[KNL] %any is not a local address
196 1 Andreas Steffen
Nov 19 08:39:01 moon charon: 14[KNL] getting interface name for 2001:1::1
197 1 Andreas Steffen
Nov 19 08:39:01 moon charon: 14[KNL] 2001:1::1 is on interface eth1
198 1 Andreas Steffen
Nov 19 08:39:01 moon charon: 14[LIB]   loaded certificate file '/etc/ipsec.d/certs/moonCert.pem'
199 1 Andreas Steffen
Nov 19 08:39:01 moon charon: 14[CFG] added configuration 'dave-mh': 2001:1::1[moon.strongswan.org]...%any[dave@strongswan.org]
200 1 Andreas Steffen
Nov 19 08:39:01 moon charon: 15[CFG] received stroke: add connection 'dave-tunnel'
201 1 Andreas Steffen
Nov 19 08:39:01 moon charon: 15[KNL] getting interface name for %any
202 1 Andreas Steffen
Nov 19 08:39:01 moon charon: 15[KNL] %any is not a local address
203 1 Andreas Steffen
Nov 19 08:39:01 moon charon: 15[KNL] getting interface name for 2001:1::1
204 1 Andreas Steffen
Nov 19 08:39:01 moon charon: 15[KNL] 2001:1::1 is on interface eth1
205 1 Andreas Steffen
Nov 19 08:39:01 moon charon: 15[LIB]   loaded certificate file '/etc/ipsec.d/certs/moonCert.pem'
206 1 Andreas Steffen
Nov 19 08:39:01 moon charon: 15[CFG] added child to existing configuration 'dave-mh'
207 5 Andreas Steffen
</pre>
208 1 Andreas Steffen
209 1 Andreas Steffen
Next the MIPv6 daemon is activated
210 1 Andreas Steffen
211 5 Andreas Steffen
<pre>
212 1 Andreas Steffen
/etc/init.d/mip6d start
213 1 Andreas Steffen
214 5 Andreas Steffen
Nov 19 08:39:05 moon mip6dr1490: MIPL Mobile IPv6 for Linux v2.0.2-umip-0.4 started (Home Agent)
215 5 Andreas Steffen
</pre>
216 1 Andreas Steffen
217 1 Andreas Steffen
strongSwan is now waiting for the MN to initiate the IPsec transport SA for the Binding Update
218 1 Andreas Steffen
219 5 Andreas Steffen
<pre>
220 5 Andreas Steffen
Nov 19 08:39:23 moon charon: 03[NET] received packet: from 2001::41a:a8ff:fe6f:c67r500 to 2001:1::1r500
221 1 Andreas Steffen
Nov 19 08:39:23 moon charon: 03[ENC] parsed IKE_SA_INIT request 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) ]
222 1 Andreas Steffen
Nov 19 08:39:23 moon charon: 03[IKE] 2001::41a:a8ff:fe6f:c67 is initiating an IKE_SA
223 1 Andreas Steffen
Nov 19 08:39:23 moon charon: 03[IKE] sending cert request for "C=CH, O=Linux strongSwan, CN=strongSwan Root CA"
224 1 Andreas Steffen
Nov 19 08:39:23 moon charon: 03[ENC] generating IKE_SA_INIT response 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) CERTREQ ]
225 5 Andreas Steffen
Nov 19 08:39:23 moon charon: 03[NET] sending packet: from 2001:1::1r500 to 2001::41a:a8ff:fe6f:c67r500
226 5 Andreas Steffen
Nov 19 08:39:23 moon charon: 08[NET] received packet: from 2001::41a:a8ff:fe6f:c67r500 to 2001:1::1r500
227 1 Andreas Steffen
Nov 19 08:39:23 moon charon: 08[ENC] parsed IKE_AUTH request 1 [ IDi CERT CERTREQ IDr AUTH N(USE_TRANSP) SA TSi TSr ]
228 1 Andreas Steffen
Nov 19 08:39:23 moon charon: 08[IKE] received cert request for "C=CH, O=Linux strongSwan, CN=strongSwan Root CA"
229 1 Andreas Steffen
Nov 19 08:39:23 moon charon: 08[IKE] received end entity cert "C=CH, O=Linux strongSwan, OU=Research, CN=carol@strongswan.org"
230 1 Andreas Steffen
Nov 19 08:39:23 moon charon: 08[CFG]   using certificate "C=CH, O=Linux strongSwan, OU=Research, CN=carol@strongswan.org"
231 1 Andreas Steffen
Nov 19 08:39:23 moon charon: 08[CFG]   using trusted ca certificate "C=CH, O=Linux strongSwan, CN=strongSwan Root CA"
232 1 Andreas Steffen
Nov 19 08:39:23 moon charon: 08[CFG] checking certificate status of "C=CH, O=Linux strongSwan, OU=Research, CN=carol@strongswan.org"
233 1 Andreas Steffen
Nov 19 08:39:23 moon charon: 08[CFG]   using trusted certificate "C=CH, O=Linux strongSwan, CN=strongSwan Root CA"
234 1 Andreas Steffen
Nov 19 08:39:23 moon charon: 08[CFG]   crl correctly signed by "C=CH, O=Linux strongSwan, CN=strongSwan Root CA"
235 1 Andreas Steffen
Nov 19 08:39:23 moon charon: 08[CFG]   crl is valid: until Dec 13 07:58:20 2008
236 1 Andreas Steffen
Nov 19 08:39:23 moon charon: 08[CFG]   using cached crl
237 1 Andreas Steffen
Nov 19 08:39:23 moon charon: 08[CFG] certificate status is good
238 1 Andreas Steffen
Nov 19 08:39:23 moon charon: 08[IKE] authentication of 'carol@strongswan.org' with RSA signature successful
239 1 Andreas Steffen
Nov 19 08:39:23 moon charon: 08[CFG] found matching peer config "carol-mh": moon.strongswan.org...carol@strongswan.org with prio 40.5
240 1 Andreas Steffen
Nov 19 08:39:23 moon charon: 08[IKE] authentication of 'moon.strongswan.org' (myself) with RSA signature successful
241 1 Andreas Steffen
Nov 19 08:39:23 moon charon: 08[IKE] scheduling rekeying in 3323s
242 1 Andreas Steffen
Nov 19 08:39:23 moon charon: 08[IKE] maximum IKE_SA lifetime 3503s
243 5 Andreas Steffen
Nov 19 08:39:23 moon charon: 08[IKE] IKE_SA carol-mhr1 established between 2001:1::1[moon.strongswan.org]...2001::41a:a8ff:fe6f:c67[carol@strongswan.org]
244 1 Andreas Steffen
Nov 19 08:39:23 moon charon: 08[IKE] sending end entity cert "C=CH, O=Linux strongSwan, CN=moon.strongswan.org"
245 1 Andreas Steffen
Nov 19 08:39:23 moon charon: 08[CHD] other address: 2001::41a:a8ff:fe6f:c67 is a transport mode proxy for 2001:1::10
246 1 Andreas Steffen
Nov 19 08:39:23 moon charon: 08[KNL] getting SPI for reqid {1}
247 1 Andreas Steffen
Nov 19 08:39:23 moon charon: 08[KNL] got SPI ca64ae98 for reqid {1}
248 1 Andreas Steffen
Nov 19 08:39:23 moon charon: 08[KNL] adding SAD entry with SPI ca64ae98 and reqid {1}
249 1 Andreas Steffen
Nov 19 08:39:23 moon charon: 08[KNL]   using encryption algorithm AES_CBC with key size 128
250 1 Andreas Steffen
Nov 19 08:39:23 moon charon: 08[KNL]   using integrity algorithm HMAC_SHA1_96 with key size 160
251 1 Andreas Steffen
Nov 19 08:39:23 moon charon: 08[KNL] adding SAD entry with SPI c5959ac2 and reqid {1}
252 1 Andreas Steffen
Nov 19 08:39:23 moon charon: 08[KNL]   using encryption algorithm AES_CBC with key size 128
253 1 Andreas Steffen
Nov 19 08:39:23 moon charon: 08[KNL]   using integrity algorithm HMAC_SHA1_96 with key size 160
254 5 Andreas Steffen
Nov 19 08:39:23 moon charon: 08[IKE] CHILD_SA carol-mh{1} established with SPIs ca64ae98_i c5959ac2_o and TS 2001:1::1/128r135 === 2001:1::10/128r135 
255 1 Andreas Steffen
Nov 19 08:39:23 moon charon: 08[ENC] generating IKE_AUTH response 1 [ IDr CERT AUTH N(USE_TRANSP) SA TSi TSr ]
256 5 Andreas Steffen
Nov 19 08:39:23 moon charon: 08[NET] sending packet: from 2001:1::1r500 to 2001::41a:a8ff:fe6f:c67r500
257 5 Andreas Steffen
</pre>
258 1 Andreas Steffen
259 1 Andreas Steffen
The MIPv6 daemon then sends some MIGRATE messages to strongSwan
260 5 Andreas Steffen
<pre>
261 1 Andreas Steffen
Nov 19 08:39:24 moon charon: 04[KNL] received a XFRM_MSG_MIGRATE
262 5 Andreas Steffen
Nov 19 08:39:24 moon charon: 04[KNL]   policy: 2001:1::10/128r135 === 2001:1::1/128r135 in
263 1 Andreas Steffen
Nov 19 08:39:24 moon charon: 04[KNL]   XFRMA_KMADDRESS
264 1 Andreas Steffen
Nov 19 08:39:24 moon charon: 04[KNL]   kmaddress: 2001:1::1...2001::41a:a8ff:fe6f:c67
265 1 Andreas Steffen
Nov 19 08:39:24 moon charon: 04[KNL]   XFRMA_POLICY_TYPE
266 1 Andreas Steffen
Nov 19 08:39:24 moon charon: 04[KNL]   XFRMA_MIGRATE
267 1 Andreas Steffen
Nov 19 08:39:24 moon charon: 04[KNL]   migrate ESP %any...%any to 2001::41a:a8ff:fe6f:c67...2001:1::1, reqid {1}
268 5 Andreas Steffen
Nov 19 08:39:24 moon charon: 04[KNL] creating migrate job for policy 2001:1::10/128r135 === 2001:1::1/128r135 in with reqid {1}
269 1 Andreas Steffen
270 1 Andreas Steffen
Nov 19 08:39:24 moon charon: 05[KNL] interface ip6tnl1 activated
271 1 Andreas Steffen
272 1 Andreas Steffen
Nov 19 08:39:24 moon charon: 04[KNL] received a XFRM_MSG_MIGRATE
273 5 Andreas Steffen
Nov 19 08:39:24 moon charon: 04[KNL]   policy: 2001:1::1/128r135 === 2001:1::10/128r135 in
274 1 Andreas Steffen
Nov 19 08:39:24 moon charon: 04[KNL]   XFRMA_KMADDRESS
275 1 Andreas Steffen
Nov 19 08:39:24 moon charon: 04[KNL]   kmaddress: 2001:1::1...2001::41a:a8ff:fe6f:c67
276 1 Andreas Steffen
Nov 19 08:39:24 moon charon: 04[KNL]   XFRMA_POLICY_TYPE
277 1 Andreas Steffen
Nov 19 08:39:24 moon charon: 04[KNL]   XFRMA_MIGRATE
278 1 Andreas Steffen
Nov 19 08:39:24 moon charon: 04[KNL]   migrate ESP %any...%any to 2001:1::1...2001::41a:a8ff:fe6f:c67, reqid {1}
279 5 Andreas Steffen
Nov 19 08:39:24 moon charon: 04[KNL] creating migrate job for policy 2001:1::1/128r135 === 2001:1::10/128r135 out with reqid {1}
280 1 Andreas Steffen
281 1 Andreas Steffen
Nov 19 08:39:24 moon charon: 04[KNL] received a XFRM_MSG_MIGRATE
282 1 Andreas Steffen
Nov 19 08:39:24 moon charon: 04[KNL]   policy: 2001:1::10/128 === ::/0 out
283 1 Andreas Steffen
Nov 19 08:39:24 moon charon: 04[KNL]   XFRMA_KMADDRESS
284 1 Andreas Steffen
Nov 19 08:39:24 moon charon: 04[KNL]   kmaddress: 2001:1::1...2001::41a:a8ff:fe6f:c67
285 1 Andreas Steffen
Nov 19 08:39:24 moon charon: 04[KNL]   XFRMA_POLICY_TYPE
286 1 Andreas Steffen
Nov 19 08:39:24 moon charon: 04[KNL]   XFRMA_MIGRATE
287 1 Andreas Steffen
Nov 19 08:39:24 moon charon: 04[KNL]   migrate ESP 2001:1::10...2001:1::1 to 2001::41a:a8ff:fe6f:c67...2001:1::1, reqid {2}
288 1 Andreas Steffen
Nov 19 08:39:24 moon charon: 04[KNL] creating migrate job for policy 2001:1::10/128 === ::/0 in with reqid {2}
289 1 Andreas Steffen
290 1 Andreas Steffen
Nov 19 08:39:24 moon charon: 04[KNL] received a XFRM_MSG_MIGRATE
291 1 Andreas Steffen
Nov 19 08:39:24 moon charon: 04[KNL]   policy: 2001:1::10/128 === ::/0 in
292 1 Andreas Steffen
Nov 19 08:39:24 moon charon: 04[KNL]   XFRMA_KMADDRESS
293 1 Andreas Steffen
Nov 19 08:39:24 moon charon: 04[KNL]   kmaddress: 2001:1::1...2001::41a:a8ff:fe6f:c67
294 1 Andreas Steffen
Nov 19 08:39:24 moon charon: 04[KNL]   XFRMA_POLICY_TYPE
295 1 Andreas Steffen
Nov 19 08:39:24 moon charon: 04[KNL]   XFRMA_MIGRATE
296 1 Andreas Steffen
Nov 19 08:39:24 moon charon: 04[KNL]   migrate ESP 2001:1::10...2001:1::1 to 2001::41a:a8ff:fe6f:c67...2001:1::1, reqid {2}
297 1 Andreas Steffen
Nov 19 08:39:24 moon charon: 04[KNL] creating migrate job for policy 2001:1::10/128 === ::/0 fwd with reqid {2}
298 1 Andreas Steffen
299 1 Andreas Steffen
Nov 19 08:39:24 moon charon: 04[KNL] received a XFRM_MSG_MIGRATE
300 1 Andreas Steffen
Nov 19 08:39:24 moon charon: 04[KNL]   policy: ::/0 === 2001:1::10/128 fwd
301 1 Andreas Steffen
Nov 19 08:39:24 moon charon: 04[KNL]   XFRMA_KMADDRESS
302 1 Andreas Steffen
Nov 19 08:39:24 moon charon: 04[KNL]   kmaddress: 2001:1::1...2001::41a:a8ff:fe6f:c67
303 1 Andreas Steffen
Nov 19 08:39:24 moon charon: 04[KNL]   XFRMA_POLICY_TYPE
304 1 Andreas Steffen
Nov 19 08:39:24 moon charon: 04[KNL]   XFRMA_MIGRATE
305 1 Andreas Steffen
Nov 19 08:39:24 moon charon: 04[KNL]   migrate ESP 2001:1::1...2001:1::10 to 2001:1::1...2001::41a:a8ff:fe6f:c67, reqid {2}
306 1 Andreas Steffen
Nov 19 08:39:24 moon charon: 04[KNL] creating migrate job for policy ::/0 === 2001:1::10/128 out with reqid {2}
307 1 Andreas Steffen
Nov 19 08:39:24 moon charon: 11[JOB] no CHILD_SA found with reqid {2}
308 5 Andreas Steffen
</pre>
309 1 Andreas Steffen
310 1 Andreas Steffen
Immediately after that the MN initiates the IPsec payload tunnel SA
311 1 Andreas Steffen
312 5 Andreas Steffen
<pre>
313 5 Andreas Steffen
Nov 19 08:39:24 moon charon: 14[NET] received packet: from 2001::41a:a8ff:fe6f:c67r500 to 2001:1::1r500
314 1 Andreas Steffen
Nov 19 08:39:24 moon charon: 14[ENC] parsed CREATE_CHILD_SA request 2 [ SA No KE TSi TSr ]
315 1 Andreas Steffen
Nov 19 08:39:24 moon charon: 14[KNL] getting SPI for reqid {2}
316 1 Andreas Steffen
Nov 19 08:39:24 moon charon: 14[KNL] got SPI c190d5ba for reqid {2}
317 1 Andreas Steffen
Nov 19 08:39:24 moon charon: 14[KNL] adding SAD entry with SPI c190d5ba and reqid {2}
318 1 Andreas Steffen
Nov 19 08:39:24 moon charon: 14[KNL]   using encryption algorithm AES_CBC with key size 128
319 1 Andreas Steffen
Nov 19 08:39:24 moon charon: 14[KNL]   using integrity algorithm HMAC_SHA1_96 with key size 160
320 1 Andreas Steffen
Nov 19 08:39:24 moon charon: 14[KNL] adding SAD entry with SPI ce4db893 and reqid {2}
321 1 Andreas Steffen
Nov 19 08:39:24 moon charon: 14[KNL]   using encryption algorithm AES_CBC with key size 128
322 1 Andreas Steffen
Nov 19 08:39:24 moon charon: 14[KNL]   using integrity algorithm HMAC_SHA1_96 with key size 160
323 1 Andreas Steffen
Nov 19 08:39:24 moon charon: 14[IKE] CHILD_SA carol-tunnel{2} established with SPIs c190d5ba_i ce4db893_o and TS ::/0 === 2001:1::10/128 
324 1 Andreas Steffen
Nov 19 08:39:24 moon charon: 14[ENC] generating CREATE_CHILD_SA response 2 [ SA No KE TSi TSr ]
325 5 Andreas Steffen
Nov 19 08:39:24 moon charon: 14[NET] sending packet: from 2001:1::1r500 to 2001::41a:a8ff:fe6f:c67r500
326 1 Andreas Steffen
Nov 19 08:39:24 moon charon: 12[KNL] querying SAD entry with SPI c190d5ba for update
327 1 Andreas Steffen
Nov 19 08:39:24 moon charon: 12[KNL] querying replay state from SAD entry with SPI c190d5ba
328 1 Andreas Steffen
Nov 19 08:39:24 moon charon: 12[KNL] deleting SAD entry with SPI c190d5ba
329 1 Andreas Steffen
Nov 19 08:39:24 moon charon: 12[KNL] deleted SAD entry with SPI c190d5ba
330 5 Andreas Steffen
Nov 19 08:39:24 moon charon: 12[KNL] updating SAD entry with SPI c190d5ba from 2001::41a:a8ff:fe6f:c67r500..2001:1::1r500 to 2001::41a:a8ff:fe6f:c67r0..2001:1::1r0
331 1 Andreas Steffen
Nov 19 08:39:24 moon charon: 12[KNL] querying SAD entry with SPI ce4db893 for update
332 1 Andreas Steffen
Nov 19 08:39:24 moon charon: 12[KNL] querying replay state from SAD entry with SPI ce4db893
333 1 Andreas Steffen
Nov 19 08:39:24 moon charon: 12[KNL] deleting SAD entry with SPI ce4db893
334 1 Andreas Steffen
Nov 19 08:39:24 moon charon: 12[KNL] deleted SAD entry with SPI ce4db893
335 5 Andreas Steffen
Nov 19 08:39:24 moon charon: 12[KNL] updating SAD entry with SPI ce4db893 from 2001:1::1r500..2001::41a:a8ff:fe6f:c67r500 to 2001:1::1r0..2001::41a:a8ff:fe6f:c67r0
336 5 Andreas Steffen
</pre>
337 1 Andreas Steffen
338 1 Andreas Steffen
339 5 Andreas Steffen
h2. IPsec Status after Establishment
340 5 Andreas Steffen
341 5 Andreas Steffen
342 5 Andreas Steffen
<pre>
343 1 Andreas Steffen
ipsec statusall
344 1 Andreas Steffen
345 1 Andreas Steffen
Performance:
346 1 Andreas Steffen
  uptime: 2 minutes, since Nov 19 08:39:01 2008
347 1 Andreas Steffen
  worker threads: 9 idle of 16, job queue load: 0, scheduled events: 2
348 1 Andreas Steffen
  loaded plugins: curl aes des sha1 sha2 md5 gmp random x509 pubkey hmac xcbc stroke kernel-netlink sqlite sql 
349 1 Andreas Steffen
Listening IP addresses:
350 1 Andreas Steffen
  10.1.0.1
351 1 Andreas Steffen
  2001:1::1
352 1 Andreas Steffen
  fec1::1
353 1 Andreas Steffen
  192.168.0.1
354 1 Andreas Steffen
  2001::1
355 1 Andreas Steffen
  fec0::1
356 1 Andreas Steffen
Connections:
357 1 Andreas Steffen
    carol-mh:  2001:1::1[moon.strongswan.org]...%any[carol@strongswan.org]
358 1 Andreas Steffen
    carol-mh:  CAs: "C=CH, O=Linux strongSwan, CN=strongSwan Root CA"...%any
359 1 Andreas Steffen
    carol-mh:  public key authentication
360 5 Andreas Steffen
    carol-mh:    2001:1::1/128r135 === 2001:1::10/128r135 
361 1 Andreas Steffen
carol-tunnel:    ::/0 === 2001:1::10/128 
362 1 Andreas Steffen
     dave-mh:  2001:1::1[moon.strongswan.org]...%any[dave@strongswan.org]
363 1 Andreas Steffen
     dave-mh:  CAs: "C=CH, O=Linux strongSwan, CN=strongSwan Root CA"...%any
364 1 Andreas Steffen
     dave-mh:  public key authentication
365 5 Andreas Steffen
     dave-mh:    2001:1::1/128r135 === 2001:1::20/128r135 
366 1 Andreas Steffen
 dave-tunnel:    ::/0 === 2001:1::20/128 
367 1 Andreas Steffen
Security Associations:
368 5 Andreas Steffen
    carol-mhr1: ESTABLISHED, 2001:1::1[moon.strongswan.org]...2001::41a:a8ff:fe6f:c67[carol@strongswan.org]
369 5 Andreas Steffen
    carol-mhr1: IKE SPIs: 58b6f8e6f23188fa_i 63fdcfb55179c548_r*, rekeying in 53 minutes
370 5 Andreas Steffen
    carol-mhr1: IKE proposal: AES_CBC-128/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_2048_BIT
371 1 Andreas Steffen
    carol-mh{1}:  INSTALLED, TRANSPORT_PROXY, ESP SPIs: ca64ae98_i c5959ac2_o
372 1 Andreas Steffen
    carol-mh{1}:  AES_CBC-128/HMAC_SHA1_96, rekeying in 12 minutes, last use: 101s_i no_o 
373 5 Andreas Steffen
    carol-mh{1}:   2001:1::1/128r135 === 2001:1::10/128r135 
374 1 Andreas Steffen
carol-tunnel{2}:  INSTALLED, TUNNEL, ESP SPIs: c190d5ba_i ce4db893_o
375 1 Andreas Steffen
carol-tunnel{2}:  AES_CBC-128/HMAC_SHA1_96, rekeying in 14 minutes, last use: 2s_i 2s_o 
376 1 Andreas Steffen
carol-tunnel{2}:   ::/0 === 2001:1::10/128 
377 1 Andreas Steffen
378 5 Andreas Steffen
</pre>
379 1 Andreas Steffen
380 1 Andreas Steffen
The IPsec policy in the Linux 2.6 kernel
381 1 Andreas Steffen
382 5 Andreas Steffen
<pre>
383 1 Andreas Steffen
ip xfrm policy
384 1 Andreas Steffen
385 1 Andreas Steffen
src 2001:1::10/128 dst 2001:1::1/128 proto 135 
386 1 Andreas Steffen
        dir in priority 2 ptype main 
387 1 Andreas Steffen
        tmpl src :: dst ::
388 1 Andreas Steffen
                proto esp reqid 1 mode transport
389 1 Andreas Steffen
390 1 Andreas Steffen
src 2001:1::1/128 dst 2001:1::10/128 proto 135 
391 1 Andreas Steffen
        dir out priority 2 ptype main 
392 1 Andreas Steffen
        tmpl src :: dst ::
393 1 Andreas Steffen
                proto esp reqid 1 mode transport
394 1 Andreas Steffen
395 1 Andreas Steffen
src 2001:1::20/128 dst 2001:1::1/128 proto 135 
396 1 Andreas Steffen
        dir in priority 2 ptype main 
397 1 Andreas Steffen
        tmpl src :: dst ::
398 1 Andreas Steffen
                proto esp reqid 3 mode transport
399 1 Andreas Steffen
400 1 Andreas Steffen
src 2001:1::1/128 dst 2001:1::20/128 proto 135 
401 1 Andreas Steffen
        dir out priority 2 ptype main 
402 1 Andreas Steffen
        tmpl src :: dst ::
403 1 Andreas Steffen
                proto esp reqid 3 mode transport
404 1 Andreas Steffen
405 1 Andreas Steffen
src 2001:1::10/128 dst ::/0 
406 1 Andreas Steffen
        dir in priority 10 ptype main 
407 1 Andreas Steffen
        tmpl src 2001::41a:a8ff:fe6f:c67 dst 2001:1::1
408 1 Andreas Steffen
                proto esp reqid 2 mode tunnel
409 1 Andreas Steffen
410 1 Andreas Steffen
src 2001:1::10/128 dst ::/0 
411 1 Andreas Steffen
        dir fwd priority 10 ptype main 
412 1 Andreas Steffen
        tmpl src 2001::41a:a8ff:fe6f:c67 dst 2001:1::1
413 1 Andreas Steffen
                proto esp reqid 2 mode tunnel
414 1 Andreas Steffen
415 1 Andreas Steffen
src ::/0 dst 2001:1::10/128 
416 1 Andreas Steffen
        dir out priority 10 ptype main 
417 1 Andreas Steffen
        tmpl src 2001:1::1 dst 2001::41a:a8ff:fe6f:c67
418 1 Andreas Steffen
                proto esp reqid 2 mode tunnel
419 5 Andreas Steffen
</pre>
420 1 Andreas Steffen
421 1 Andreas Steffen
and the IPsec state in the Linux 2.6 kernel
422 1 Andreas Steffen
423 5 Andreas Steffen
<pre>
424 1 Andreas Steffen
ip xfrm state
425 1 Andreas Steffen
426 1 Andreas Steffen
src :: dst ::
427 1 Andreas Steffen
        proto hao reqid 0 mode ro
428 1 Andreas Steffen
        replay-window 0 flag wildrecv
429 1 Andreas Steffen
        coa ::
430 1 Andreas Steffen
        sel src ::/0 dst ::/0 
431 1 Andreas Steffen
432 1 Andreas Steffen
src 2001:1::10 dst 2001:1::1
433 1 Andreas Steffen
        proto esp spi 0xca64ae98 reqid 1 mode transport
434 1 Andreas Steffen
        replay-window 32 
435 1 Andreas Steffen
        auth hmac(sha1) 0x419c41d8807fb521e947988cef4a6181d810b611
436 1 Andreas Steffen
        enc cbc(aes) 0xed90ae3f4f12a697f40cce1893b54e20
437 1 Andreas Steffen
        sel src ::/0 dst ::/0 
438 1 Andreas Steffen
439 1 Andreas Steffen
src 2001:1::1 dst 2001:1::10
440 1 Andreas Steffen
        proto esp spi 0xc5959ac2 reqid 1 mode transport
441 1 Andreas Steffen
        replay-window 32 
442 1 Andreas Steffen
        auth hmac(sha1) 0xea26afc566143c25959a060c90be3053c50ddcff
443 1 Andreas Steffen
        enc cbc(aes) 0x0bd5bd34d5523c0929f2efd7a7c93359
444 1 Andreas Steffen
        sel src ::/0 dst ::/0 
445 1 Andreas Steffen
446 1 Andreas Steffen
src 2001:1::1 dst 2001:1::10
447 1 Andreas Steffen
        proto route2 reqid 0 mode ro
448 1 Andreas Steffen
        replay-window 0 
449 1 Andreas Steffen
        coa 2001::41a:a8ff:fe6f:c67
450 1 Andreas Steffen
        lastused 2008-11-19 08:39:25
451 1 Andreas Steffen
        sel src 2001:1::1/128 dst 2001:1::10/128 
452 1 Andreas Steffen
453 1 Andreas Steffen
src 2001:1::10 dst 2001:1::1
454 1 Andreas Steffen
        proto hao reqid 0 mode ro
455 1 Andreas Steffen
        replay-window 0 
456 1 Andreas Steffen
        coa 2001::41a:a8ff:fe6f:c67
457 1 Andreas Steffen
        sel src 2001:1::10/128 dst 2001:1::1/128 
458 1 Andreas Steffen
459 1 Andreas Steffen
src 2001::41a:a8ff:fe6f:c67 dst 2001:1::1
460 1 Andreas Steffen
        proto esp spi 0xc190d5ba reqid 2 mode tunnel
461 1 Andreas Steffen
        replay-window 32 flag 20
462 1 Andreas Steffen
        auth hmac(sha1) 0x672c1ea4359956c6a3b869b388b424b7058eee02
463 1 Andreas Steffen
        enc cbc(aes) 0xaaf5be1d604e64028d4e0a41f0d92b56
464 1 Andreas Steffen
465 1 Andreas Steffen
src 2001:1::1 dst 2001::41a:a8ff:fe6f:c67
466 1 Andreas Steffen
        proto esp spi 0xce4db893 reqid 2 mode tunnel
467 1 Andreas Steffen
        replay-window 32 flag 20
468 1 Andreas Steffen
        auth hmac(sha1) 0xdf1eeff5b86dfbd183c7a932c8250fc57d9632af
469 1 Andreas Steffen
        enc cbc(aes) 0x4d138f1363c1810f8c9cb2fcb1ee8bdf
470 5 Andreas Steffen
</pre>
471 1 Andreas Steffen
472 1 Andreas Steffen
473 5 Andreas Steffen
h2. Care-of-Address (CoA) Change
474 5 Andreas Steffen
475 5 Andreas Steffen
476 1 Andreas Steffen
After some time the MN changes its Care-of-Address (CoA) to 2001::50
477 1 Andreas Steffen
which is communicated to the HA via a Binding Update message. This
478 1 Andreas Steffen
causes the MIPv6 daemon to issue a MIGRATE message to strongSwan
479 1 Andreas Steffen
480 5 Andreas Steffen
<pre>
481 1 Andreas Steffen
Nov 19 08:41:56 moon charon: 04[KNL] received a XFRM_MSG_MIGRATE
482 5 Andreas Steffen
Nov 19 08:41:56 moon charon: 04[KNL]   policy: 2001:1::10/128r135 === 2001:1::1/128r135 out
483 1 Andreas Steffen
Nov 19 08:41:56 moon charon: 04[KNL]   XFRMA_KMADDRESS
484 1 Andreas Steffen
Nov 19 08:41:56 moon charon: 04[KNL]   kmaddress: 2001:1::1...2001::50
485 1 Andreas Steffen
Nov 19 08:41:56 moon charon: 04[KNL]   XFRMA_POLICY_TYPE
486 1 Andreas Steffen
Nov 19 08:41:56 moon charon: 04[KNL]   XFRMA_MIGRATE
487 1 Andreas Steffen
Nov 19 08:41:56 moon charon: 04[KNL]   migrate ESP %any...%any to 2001::50...2001:1::1, reqid {1}
488 5 Andreas Steffen
Nov 19 08:41:56 moon charon: 04[KNL] creating migrate job for policy 2001:1::10/128r135 === 2001:1::1/128r135 in with reqid {1}
489 1 Andreas Steffen
490 1 Andreas Steffen
Nov 19 08:41:56 moon charon: 04[KNL] received a XFRM_MSG_MIGRATE
491 5 Andreas Steffen
Nov 19 08:41:56 moon charon: 04[KNL]   policy: 2001:1::1/128r135 === 2001:1::10/128r135 in
492 1 Andreas Steffen
Nov 19 08:41:56 moon charon: 04[KNL]   XFRMA_KMADDRESS
493 1 Andreas Steffen
Nov 19 08:41:56 moon charon: 04[KNL]   kmaddress: 2001:1::1...2001::50
494 1 Andreas Steffen
Nov 19 08:41:56 moon charon: 04[KNL]   XFRMA_POLICY_TYPE
495 1 Andreas Steffen
Nov 19 08:41:56 moon charon: 04[KNL]   XFRMA_MIGRATE
496 1 Andreas Steffen
Nov 19 08:41:56 moon charon: 04[KNL]   migrate ESP %any...%any to 2001:1::1...2001::50, reqid {1}
497 5 Andreas Steffen
Nov 19 08:41:56 moon charon: 04[KNL] creating migrate job for policy 2001:1::1/128r135 === 2001:1::10/128r135 out with reqid {1}
498 1 Andreas Steffen
499 1 Andreas Steffen
Nov 19 08:41:56 moon charon: 04[KNL] received a XFRM_MSG_MIGRATE
500 1 Andreas Steffen
Nov 19 08:41:56 moon charon: 04[KNL]   policy: 2001:1::10/128 === ::/0 out
501 1 Andreas Steffen
Nov 19 08:41:56 moon charon: 04[KNL]   XFRMA_KMADDRESS
502 1 Andreas Steffen
Nov 19 08:41:56 moon charon: 04[KNL]   kmaddress: 2001:1::1...2001::50
503 1 Andreas Steffen
Nov 19 08:41:56 moon charon: 04[KNL]   XFRMA_POLICY_TYPE
504 1 Andreas Steffen
Nov 19 08:41:56 moon charon: 04[KNL]   XFRMA_MIGRATE
505 1 Andreas Steffen
Nov 19 08:41:56 moon charon: 04[KNL]   migrate ESP 2001::41a:a8ff:fe6f:c67...2001:1::1 to 2001::50...2001:1::1, reqid {2}
506 1 Andreas Steffen
Nov 19 08:41:56 moon charon: 04[KNL] creating migrate job for policy 2001:1::10/128 === ::/0 in with reqid {2}
507 1 Andreas Steffen
508 1 Andreas Steffen
Nov 19 08:41:56 moon charon: 10[KNL] querying SAD entry with SPI c190d5ba for update
509 1 Andreas Steffen
Nov 19 08:41:56 moon charon: 10[KNL] querying replay state from SAD entry with SPI c190d5ba
510 1 Andreas Steffen
Nov 19 08:41:56 moon charon: 10[KNL] deleting SAD entry with SPI c190d5ba
511 1 Andreas Steffen
Nov 19 08:41:56 moon charon: 10[KNL] deleted SAD entry with SPI c190d5ba
512 5 Andreas Steffen
Nov 19 08:41:56 moon charon: 10[KNL] updating SAD entry with SPI c190d5ba from 2001::41a:a8ff:fe6f:c67r0..2001:1::1r0 to 2001::50r0..2001:1::1r0
513 1 Andreas Steffen
514 1 Andreas Steffen
Nov 19 08:41:56 moon charon: 10[KNL] querying SAD entry with SPI ce4db893 for update
515 1 Andreas Steffen
Nov 19 08:41:56 moon charon: 10[KNL] querying SAD entry failed: No such process (3)
516 1 Andreas Steffen
Nov 19 08:41:56 moon charon: 10[KNL] unable to update SAD entry with SPI ce4db893
517 1 Andreas Steffen
518 1 Andreas Steffen
Nov 19 08:41:56 moon charon: 04[KNL] received a XFRM_MSG_MIGRATE
519 1 Andreas Steffen
Nov 19 08:41:56 moon charon: 04[KNL]   policy: 2001:1::10/128 === ::/0 in
520 1 Andreas Steffen
Nov 19 08:41:56 moon charon: 04[KNL]   XFRMA_KMADDRESS
521 1 Andreas Steffen
Nov 19 08:41:56 moon charon: 04[KNL]   kmaddress: 2001:1::1...2001::50
522 1 Andreas Steffen
Nov 19 08:41:56 moon charon: 04[KNL]   XFRMA_POLICY_TYPE
523 1 Andreas Steffen
Nov 19 08:41:56 moon charon: 04[KNL]   XFRMA_MIGRATE
524 1 Andreas Steffen
Nov 19 08:41:56 moon charon: 04[KNL]   migrate ESP 2001::41a:a8ff:fe6f:c67...2001:1::1 to 2001::50...2001:1::1, reqid {2}
525 1 Andreas Steffen
Nov 19 08:41:56 moon charon: 04[KNL] creating migrate job for policy 2001:1::10/128 === ::/0 fwd with reqid {2}
526 1 Andreas Steffen
527 1 Andreas Steffen
Nov 19 08:41:56 moon charon: 04[KNL] received a XFRM_MSG_MIGRATE
528 1 Andreas Steffen
Nov 19 08:41:56 moon charon: 04[KNL]   policy: ::/0 === 2001:1::10/128 fwd
529 1 Andreas Steffen
Nov 19 08:41:56 moon charon: 04[KNL]   XFRMA_KMADDRESS
530 1 Andreas Steffen
Nov 19 08:41:56 moon charon: 04[KNL]   kmaddress: 2001:1::1...2001::50
531 1 Andreas Steffen
Nov 19 08:41:56 moon charon: 04[KNL]   XFRMA_POLICY_TYPE
532 1 Andreas Steffen
Nov 19 08:41:56 moon charon: 04[KNL]   XFRMA_MIGRATE
533 1 Andreas Steffen
Nov 19 08:41:56 moon charon: 04[KNL]   migrate ESP 2001:1::1...2001::41a:a8ff:fe6f:c67 to 2001:1::1...2001::50, reqid {2}
534 1 Andreas Steffen
535 5 Andreas Steffen
</pre>
536 1 Andreas Steffen
537 1 Andreas Steffen
538 5 Andreas Steffen
h2. IPSec Status after CoA Change
539 5 Andreas Steffen
540 5 Andreas Steffen
541 5 Andreas Steffen
<pre>
542 1 Andreas Steffen
ipsec statusall
543 1 Andreas Steffen
544 1 Andreas Steffen
Performance:
545 1 Andreas Steffen
  uptime: 3 minutes, since Nov 19 08:39:01 2008
546 1 Andreas Steffen
  worker threads: 9 idle of 16, job queue load: 0, scheduled events: 2
547 1 Andreas Steffen
  loaded plugins: curl aes des sha1 sha2 md5 gmp random x509 pubkey hmac xcbc stroke kernel-netlink sqlite sql 
548 1 Andreas Steffen
Listening IP addresses:
549 1 Andreas Steffen
  10.1.0.1
550 1 Andreas Steffen
  2001:1::1
551 1 Andreas Steffen
  fec1::1
552 1 Andreas Steffen
  192.168.0.1
553 1 Andreas Steffen
  2001::1
554 1 Andreas Steffen
  fec0::1
555 1 Andreas Steffen
Connections:
556 1 Andreas Steffen
    carol-mh:  2001:1::1[moon.strongswan.org]...%any[carol@strongswan.org]
557 1 Andreas Steffen
    carol-mh:  CAs: "C=CH, O=Linux strongSwan, CN=strongSwan Root CA"...%any
558 1 Andreas Steffen
    carol-mh:  public key authentication
559 5 Andreas Steffen
    carol-mh:    2001:1::1/128r135 === 2001:1::10/128r135 
560 1 Andreas Steffen
561 1 Andreas Steffen
carol-tunnel:    ::/0 === 2001:1::10/128 
562 1 Andreas Steffen
     dave-mh:  2001:1::1[moon.strongswan.org]...%any[dave@strongswan.org]
563 1 Andreas Steffen
     dave-mh:  CAs: "C=CH, O=Linux strongSwan, CN=strongSwan Root CA"...%any
564 1 Andreas Steffen
     dave-mh:  public key authentication
565 5 Andreas Steffen
     dave-mh:    2001:1::1/128r135 === 2001:1::20/128r135 
566 1 Andreas Steffen
 dave-tunnel:    ::/0 === 2001:1::20/128 
567 1 Andreas Steffen
Security Associations:
568 5 Andreas Steffen
    carol-mhr1: ESTABLISHED, 2001:1::1[moon.strongswan.org]...2001::50[carol@strongswan.org]
569 5 Andreas Steffen
    carol-mhr1: IKE SPIs: 58b6f8e6f23188fa_i 63fdcfb55179c548_r*, rekeying in 52 minutes
570 5 Andreas Steffen
    carol-mhr1: IKE proposal: AES_CBC-128/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_2048_BIT
571 1 Andreas Steffen
    carol-mh{1}:  INSTALLED, TRANSPORT_PROXY, ESP SPIs: ca64ae98_i c5959ac2_o
572 1 Andreas Steffen
    carol-mh{1}:  AES_CBC-128/HMAC_SHA1_96, rekeying in 11 minutes, last use: 45s_i no_o 
573 5 Andreas Steffen
    carol-mh{1}:   2001:1::1/128r135 === 2001:1::10/128r135 
574 1 Andreas Steffen
carol-tunnel{2}:  INSTALLED, TUNNEL, ESP SPIs: c190d5ba_i ce4db893_o
575 1 Andreas Steffen
carol-tunnel{2}:  AES_CBC-128/HMAC_SHA1_96, rekeying in 13 minutes, last use: 8s_i 8s_o 
576 1 Andreas Steffen
carol-tunnel{2}:   ::/0 === 2001:1::10/128
577 5 Andreas Steffen
</pre>
578 1 Andreas Steffen
579 1 Andreas Steffen
and the IPsec state in the Linux 2.6 kernel
580 1 Andreas Steffen
581 5 Andreas Steffen
<pre>
582 1 Andreas Steffen
ip xfrm state
583 1 Andreas Steffen
584 1 Andreas Steffen
src :: dst ::
585 1 Andreas Steffen
        proto hao reqid 0 mode ro
586 1 Andreas Steffen
        replay-window 0 flag wildrecv
587 1 Andreas Steffen
        coa ::
588 1 Andreas Steffen
        sel src ::/0 dst ::/0 
589 1 Andreas Steffen
590 1 Andreas Steffen
src 2001:1::10 dst 2001:1::1
591 1 Andreas Steffen
        proto esp spi 0xca64ae98 reqid 1 mode transport
592 1 Andreas Steffen
        replay-window 32 
593 1 Andreas Steffen
        auth hmac(sha1) 0x419c41d8807fb521e947988cef4a6181d810b611
594 1 Andreas Steffen
        enc cbc(aes) 0xed90ae3f4f12a697f40cce1893b54e20
595 1 Andreas Steffen
        sel src ::/0 dst ::/0 
596 1 Andreas Steffen
597 1 Andreas Steffen
src 2001:1::1 dst 2001:1::10
598 1 Andreas Steffen
        proto esp spi 0xc5959ac2 reqid 1 mode transport
599 1 Andreas Steffen
        replay-window 32 
600 1 Andreas Steffen
        auth hmac(sha1) 0xea26afc566143c25959a060c90be3053c50ddcff
601 1 Andreas Steffen
        enc cbc(aes) 0x0bd5bd34d5523c0929f2efd7a7c93359
602 1 Andreas Steffen
        sel src ::/0 dst ::/0 
603 1 Andreas Steffen
604 1 Andreas Steffen
src 2001:1::1 dst 2001:1::10
605 1 Andreas Steffen
        proto route2 reqid 0 mode ro
606 1 Andreas Steffen
        replay-window 0 
607 1 Andreas Steffen
        coa 2001::50
608 1 Andreas Steffen
        lastused 2008-11-19 08:39:25
609 1 Andreas Steffen
        sel src 2001:1::1/128 dst 2001:1::10/128 
610 1 Andreas Steffen
611 1 Andreas Steffen
src 2001:1::10 dst 2001:1::1
612 1 Andreas Steffen
        proto hao reqid 0 mode ro
613 1 Andreas Steffen
        replay-window 0 
614 1 Andreas Steffen
        coa 2001::50
615 1 Andreas Steffen
        sel src 2001:1::10/128 dst 2001:1::1/128 
616 1 Andreas Steffen
617 1 Andreas Steffen
src 2001:1::1 dst 2001::50
618 1 Andreas Steffen
        proto esp spi 0xce4db893 reqid 2 mode tunnel
619 1 Andreas Steffen
        replay-window 32 flag 20
620 1 Andreas Steffen
        auth hmac(sha1) 0xdf1eeff5b86dfbd183c7a932c8250fc57d9632af
621 1 Andreas Steffen
        enc cbc(aes) 0x4d138f1363c1810f8c9cb2fcb1ee8bdf
622 1 Andreas Steffen
623 1 Andreas Steffen
src 2001::50 dst 2001:1::1
624 1 Andreas Steffen
        proto esp spi 0xc190d5ba reqid 2 mode tunnel
625 1 Andreas Steffen
        replay-window 32 flag 20
626 1 Andreas Steffen
        auth hmac(sha1) 0x672c1ea4359956c6a3b869b388b424b7058eee02
627 1 Andreas Steffen
        enc cbc(aes) 0xaaf5be1d604e64028d4e0a41f0d92b56
628 5 Andreas Steffen
</pre>