Mobile IPv6 HOWTO » History » Version 3
Andreas Steffen, 20.11.2008 00:23
update Mobile Node documentation
1 | 2 | Andreas Steffen | [[TOC(heading=Mobile IPv6)]] |
---|---|---|---|
2 | 1 | Andreas Steffen | = Mobile IPv6 = |
3 | 1 | Andreas Steffen | |
4 | 3 | Andreas Steffen | Starting with version 4.2.9, strongSwan can be used to secure the Mobile IPv6 Binding Update messages and all payload traffic between a Mobile Node (MN) and its Home Agent (HA) using an IPsec transport and an IPsec tunnel Security Association (SA), respectively. For the installation and configuration of the IPsec-enabled Mobile IPv6 '''mip6d''' daemon consult Arnaud Ebalard's fine [http://www.natisbad.org/MIPv6/ MIPv6 site]. |
5 | 1 | Andreas Steffen | |
6 | 2 | Andreas Steffen | == Mobile Node "carol" == |
7 | 1 | Andreas Steffen | |
8 | 1 | Andreas Steffen | === /etc/mip6d.conf === |
9 | 1 | Andreas Steffen | |
10 | 1 | Andreas Steffen | {{{ |
11 | 1 | Andreas Steffen | NodeConfig MN; |
12 | 1 | Andreas Steffen | |
13 | 1 | Andreas Steffen | UseMnHaIPsec enabled; |
14 | 1 | Andreas Steffen | KeyMngMobCapability enabled; |
15 | 1 | Andreas Steffen | DoRouteOptimizationMN disabled; |
16 | 1 | Andreas Steffen | |
17 | 1 | Andreas Steffen | Interface "eth0"; |
18 | 1 | Andreas Steffen | |
19 | 1 | Andreas Steffen | MnHomeLink "eth0" { |
20 | 1 | Andreas Steffen | HomeAgentAddress 2001:1::1; |
21 | 1 | Andreas Steffen | HomeAddress 2001:1::10/64; |
22 | 1 | Andreas Steffen | } |
23 | 1 | Andreas Steffen | |
24 | 1 | Andreas Steffen | IPsecPolicySet { |
25 | 1 | Andreas Steffen | HomeAgentAddress 2001:1::1; |
26 | 1 | Andreas Steffen | HomeAddress 2001:1::10/64; |
27 | 1 | Andreas Steffen | |
28 | 1 | Andreas Steffen | IPsecPolicy Mh UseESP 1; |
29 | 1 | Andreas Steffen | IPsecPolicy TunnelPayload UseESP 2; |
30 | 1 | Andreas Steffen | } |
31 | 1 | Andreas Steffen | }}} |
32 | 1 | Andreas Steffen | |
33 | 1 | Andreas Steffen | === /etc/ipsec.conf === |
34 | 1 | Andreas Steffen | |
35 | 1 | Andreas Steffen | {{{ |
36 | 1 | Andreas Steffen | config setup |
37 | 1 | Andreas Steffen | crlcheckinterval=180 |
38 | 1 | Andreas Steffen | plutostart=no |
39 | 1 | Andreas Steffen | charondebug="knl 2" |
40 | 1 | Andreas Steffen | |
41 | 1 | Andreas Steffen | conn %default |
42 | 1 | Andreas Steffen | keyexchange=ikev2 |
43 | 1 | Andreas Steffen | reauth=no |
44 | 1 | Andreas Steffen | mobike=no |
45 | 1 | Andreas Steffen | installpolicy=no |
46 | 1 | Andreas Steffen | |
47 | 1 | Andreas Steffen | conn mh |
48 | 1 | Andreas Steffen | also=home |
49 | 1 | Andreas Steffen | rightsubnet=2001:1::1/128 |
50 | 1 | Andreas Steffen | leftprotoport=135/0 |
51 | 1 | Andreas Steffen | rightprotoport=135/0 |
52 | 1 | Andreas Steffen | type=transport_proxy |
53 | 1 | Andreas Steffen | auto=route |
54 | 1 | Andreas Steffen | |
55 | 1 | Andreas Steffen | conn tunnel |
56 | 1 | Andreas Steffen | also=home |
57 | 1 | Andreas Steffen | rightsubnet=::/0 |
58 | 1 | Andreas Steffen | auto=route |
59 | 1 | Andreas Steffen | |
60 | 1 | Andreas Steffen | conn home |
61 | 1 | Andreas Steffen | leftcert=carolCert.pem |
62 | 1 | Andreas Steffen | leftid=carol@strongswan.org |
63 | 1 | Andreas Steffen | leftsubnet=2001:1::10/128 |
64 | 1 | Andreas Steffen | right=2001:1::1 |
65 | 1 | Andreas Steffen | rightid=moon.strongswan.org |
66 | 1 | Andreas Steffen | ike=aes128-sha1-modp2048! |
67 | 1 | Andreas Steffen | esp=aes128-sha1-modp2048! |
68 | 1 | Andreas Steffen | }}} |
69 | 1 | Andreas Steffen | |
70 | 3 | Andreas Steffen | Start strongSwan first and the IPsec connection definitions will be loaded and routed: |
71 | 1 | Andreas Steffen | |
72 | 3 | Andreas Steffen | |
73 | 1 | Andreas Steffen | {{{ |
74 | 3 | Andreas Steffen | ipsec start |
75 | 3 | Andreas Steffen | |
76 | 3 | Andreas Steffen | Nov 19 08:39:19 carol charon: 01[DMN] starting charon (strongSwan Version 4.2.9) |
77 | 3 | Andreas Steffen | Nov 19 08:39:19 carol charon: 01[CFG] loading ca certificates from '/etc/ipsec.d/cacerts' |
78 | 3 | Andreas Steffen | Nov 19 08:39:19 carol charon: 01[LIB] loaded certificate file '/etc/ipsec.d/cacerts/strongswanCert.pem' |
79 | 3 | Andreas Steffen | Nov 19 08:39:19 carol charon: 01[CFG] loading aa certificates from '/etc/ipsec.d/aacerts' |
80 | 3 | Andreas Steffen | Nov 19 08:39:19 carol charon: 01[CFG] loading ocsp signer certificates from '/etc/ipsec.d/ocspcerts' |
81 | 3 | Andreas Steffen | Nov 19 08:39:19 carol charon: 01[CFG] loading attribute certificates from '/etc/ipsec.d/acerts' |
82 | 3 | Andreas Steffen | Nov 19 08:39:19 carol charon: 01[CFG] loading crls from '/etc/ipsec.d/crls' |
83 | 3 | Andreas Steffen | Nov 19 08:39:19 carol charon: 01[LIB] loaded crl file '/etc/ipsec.d/crls/strongswan.crl' |
84 | 3 | Andreas Steffen | Nov 19 08:39:19 carol charon: 01[CFG] loading secrets from '/etc/ipsec.secrets' |
85 | 3 | Andreas Steffen | Nov 19 08:39:19 carol charon: 01[CFG] loaded private key file '/etc/ipsec.d/private/carolKey.pem' |
86 | 3 | Andreas Steffen | Nov 19 08:39:19 carol charon: 01[DMN] loaded plugins: curl aes des sha1 sha2 md5 gmp random x509 pubkey hmac xcbc stroke kernel-netlink |
87 | 3 | Andreas Steffen | Nov 19 08:39:19 carol charon: 01[KNL] listening on interfaces: |
88 | 3 | Andreas Steffen | Nov 19 08:39:19 carol charon: 01[KNL] eth0 |
89 | 3 | Andreas Steffen | Nov 19 08:39:19 carol charon: 01[KNL] 192.168.0.100 |
90 | 3 | Andreas Steffen | Nov 19 08:39:19 carol charon: 01[KNL] 2001::41a:a8ff:fe6f:c67 |
91 | 3 | Andreas Steffen | Nov 19 08:39:19 carol charon: 01[KNL] fec0::41a:a8ff:fe6f:c67 |
92 | 3 | Andreas Steffen | Nov 19 08:39:19 carol charon: 01[KNL] fe80::41a:a8ff:fe6f:c67 |
93 | 3 | Andreas Steffen | Nov 19 08:39:19 carol charon: 01[JOB] spawning 16 worker threads |
94 | 3 | Andreas Steffen | Nov 19 08:39:19 carol charon: 08[CFG] crl caching to /etc/ipsec.d/crls enabled |
95 | 3 | Andreas Steffen | |
96 | 3 | Andreas Steffen | Nov 19 08:39:19 carol charon: 10[CFG] received stroke: add connection 'mh' |
97 | 3 | Andreas Steffen | Nov 19 08:39:19 carol charon: 10[KNL] getting interface name for 2001:1::1 |
98 | 3 | Andreas Steffen | Nov 19 08:39:19 carol charon: 10[KNL] 2001:1::1 is not a local address |
99 | 3 | Andreas Steffen | Nov 19 08:39:19 carol charon: 10[KNL] getting interface name for %any |
100 | 3 | Andreas Steffen | Nov 19 08:39:19 carol charon: 10[KNL] %any is not a local address |
101 | 3 | Andreas Steffen | Nov 19 08:39:19 carol charon: 10[CFG] left nor right host is our side, assuming left=local |
102 | 3 | Andreas Steffen | Nov 19 08:39:19 carol charon: 10[LIB] loaded certificate file '/etc/ipsec.d/certs/carolCert.pem' |
103 | 3 | Andreas Steffen | Nov 19 08:39:19 carol charon: 10[CFG] added configuration 'mh': %any[carol@strongswan.org]...2001:1::1[moon.strongswan.org] |
104 | 3 | Andreas Steffen | Nov 19 08:39:19 carol charon: 09[CFG] received stroke: route 'mh' |
105 | 3 | Andreas Steffen | Nov 19 08:39:19 carol charon: 11[KNL] getting address to reach 2001:1::1 |
106 | 3 | Andreas Steffen | Nov 19 08:39:19 carol charon: 11[CHD] my address: 2001::41a:a8ff:fe6f:c67 is a transport mode proxy for 2001:1::10 |
107 | 3 | Andreas Steffen | Nov 19 08:39:19 carol charon: 11[IKE] CHILD_SA routed |
108 | 3 | Andreas Steffen | |
109 | 3 | Andreas Steffen | Nov 19 08:39:19 carol charon: 14[CFG] received stroke: add connection 'tunnel' |
110 | 3 | Andreas Steffen | Nov 19 08:39:19 carol charon: 14[KNL] getting interface name for 2001:1::1 |
111 | 3 | Andreas Steffen | Nov 19 08:39:19 carol charon: 14[KNL] 2001:1::1 is not a local address |
112 | 3 | Andreas Steffen | Nov 19 08:39:19 carol charon: 14[KNL] getting interface name for %any |
113 | 3 | Andreas Steffen | Nov 19 08:39:19 carol charon: 14[KNL] %any is not a local address |
114 | 3 | Andreas Steffen | Nov 19 08:39:19 carol charon: 14[CFG] left nor right host is our side, assuming left=local |
115 | 3 | Andreas Steffen | Nov 19 08:39:19 carol charon: 14[LIB] loaded certificate file '/etc/ipsec.d/certs/carolCert.pem' |
116 | 3 | Andreas Steffen | Nov 19 08:39:19 carol charon: 14[CFG] added child to existing configuration 'mh' |
117 | 3 | Andreas Steffen | Nov 19 08:39:19 carol charon: 17[CFG] received stroke: route 'tunnel' |
118 | 3 | Andreas Steffen | Nov 19 08:39:19 carol charon: 10[KNL] getting address to reach 2001:1::1 |
119 | 3 | Andreas Steffen | Nov 19 08:39:19 carol charon: 10[IKE] CHILD_SA routed |
120 | 3 | Andreas Steffen | }}} |
121 | 3 | Andreas Steffen | |
122 | 3 | Andreas Steffen | Next the MIPv6 daemon is activated |
123 | 3 | Andreas Steffen | |
124 | 3 | Andreas Steffen | {{{ |
125 | 3 | Andreas Steffen | /etc/init.d/mip6d start |
126 | 3 | Andreas Steffen | |
127 | 3 | Andreas Steffen | Nov 19 08:39:23 carol mip6d[1317]: MIPL Mobile IPv6 for Linux v2.0.2-umip-0.4 started (Mobile Node) |
128 | 3 | Andreas Steffen | Nov 19 08:39:23 carol charon: 05[KNL] interface ip6tnl1 activated |
129 | 3 | Andreas Steffen | Nov 19 08:39:23 carol charon: 05[KNL] 2001:1::10 appeared on ip6tnl1 |
130 | 3 | Andreas Steffen | }}} |
131 | 3 | Andreas Steffen | |
132 | 3 | Andreas Steffen | which triggers strongSwan to automatically sets up the IPsec transport SA for the Binding Update messages |
133 | 3 | Andreas Steffen | |
134 | 3 | Andreas Steffen | {{{ |
135 | 3 | Andreas Steffen | Nov 19 08:39:23 carol charon: 04[KNL] received a XFRM_MSG_MIGRATE |
136 | 3 | Andreas Steffen | Nov 19 08:39:23 carol charon: 04[KNL] policy: 2001:1::10/128[135] === 2001:1::1/128[135] in |
137 | 3 | Andreas Steffen | Nov 19 08:39:23 carol charon: 04[KNL] XFRMA_KMADDRESS |
138 | 3 | Andreas Steffen | Nov 19 08:39:23 carol charon: 04[KNL] kmaddress: 2001::41a:a8ff:fe6f:c67...2001:1::1 |
139 | 3 | Andreas Steffen | Nov 19 08:39:23 carol charon: 04[KNL] XFRMA_POLICY_TYPE |
140 | 3 | Andreas Steffen | Nov 19 08:39:23 carol charon: 04[KNL] XFRMA_MIGRATE |
141 | 3 | Andreas Steffen | Nov 19 08:39:23 carol charon: 04[KNL] migrate ESP %any...%any to 2001::41a:a8ff:fe6f:c67...2001:1::1, reqid {1} |
142 | 3 | Andreas Steffen | Nov 19 08:39:23 carol charon: 04[KNL] creating migrate job for policy 2001:1::10/128[135] === 2001:1::1/128[135] out with reqid {1} |
143 | 3 | Andreas Steffen | |
144 | 3 | Andreas Steffen | Nov 19 08:39:23 carol charon: 04[KNL] received a XFRM_MSG_MIGRATE |
145 | 3 | Andreas Steffen | Nov 19 08:39:23 carol charon: 04[KNL] policy: 2001:1::1/128[135] === 2001:1::10/128[135] out |
146 | 3 | Andreas Steffen | Nov 19 08:39:23 carol charon: 04[KNL] XFRMA_KMADDRESS |
147 | 3 | Andreas Steffen | Nov 19 08:39:23 carol charon: 04[KNL] kmaddress: 2001::41a:a8ff:fe6f:c67...2001:1::1 |
148 | 3 | Andreas Steffen | Nov 19 08:39:23 carol charon: 04[KNL] XFRMA_POLICY_TYPE |
149 | 3 | Andreas Steffen | Nov 19 08:39:23 carol charon: 04[KNL] XFRMA_MIGRATE |
150 | 3 | Andreas Steffen | Nov 19 08:39:23 carol charon: 04[KNL] migrate ESP %any...%any to 2001:1::1...2001::41a:a8ff:fe6f:c67, reqid {1} |
151 | 3 | Andreas Steffen | Nov 19 08:39:23 carol charon: 04[KNL] creating migrate job for policy 2001:1::1/128[135] === 2001:1::10/128[135] in with reqid {1} |
152 | 3 | Andreas Steffen | |
153 | 3 | Andreas Steffen | Nov 19 08:39:23 carol charon: 04[KNL] received a XFRM_MSG_MIGRATE |
154 | 3 | Andreas Steffen | Nov 19 08:39:23 carol charon: 04[KNL] policy: 2001:1::10/128 === ::/0 in |
155 | 3 | Andreas Steffen | Nov 19 08:39:23 carol charon: 04[KNL] XFRMA_KMADDRESS |
156 | 3 | Andreas Steffen | Nov 19 08:39:23 carol charon: 04[KNL] kmaddress: 2001::41a:a8ff:fe6f:c67...2001:1::1 |
157 | 3 | Andreas Steffen | Nov 19 08:39:23 carol charon: 04[KNL] XFRMA_POLICY_TYPE |
158 | 3 | Andreas Steffen | Nov 19 08:39:23 carol charon: 04[KNL] XFRMA_MIGRATE |
159 | 3 | Andreas Steffen | Nov 19 08:39:23 carol charon: 04[KNL] migrate ESP 2001:1::10...2001:1::1 to 2001::41a:a8ff:fe6f:c67...2001:1::1, reqid {2} |
160 | 3 | Andreas Steffen | Nov 19 08:39:23 carol charon: 04[KNL] creating migrate job for policy 2001:1::10/128 === ::/0 out with reqid {2} |
161 | 3 | Andreas Steffen | |
162 | 3 | Andreas Steffen | Nov 19 08:39:23 carol charon: 04[KNL] received a XFRM_MSG_MIGRATE |
163 | 3 | Andreas Steffen | Nov 19 08:39:23 carol charon: 04[KNL] policy: ::/0 === 2001:1::10/128 out |
164 | 3 | Andreas Steffen | Nov 19 08:39:23 carol charon: 04[KNL] XFRMA_KMADDRESS |
165 | 3 | Andreas Steffen | Nov 19 08:39:23 carol charon: 04[KNL] kmaddress: 2001::41a:a8ff:fe6f:c67...2001:1::1 |
166 | 3 | Andreas Steffen | Nov 19 08:39:23 carol charon: 04[KNL] XFRMA_POLICY_TYPE |
167 | 3 | Andreas Steffen | Nov 19 08:39:23 carol charon: 04[KNL] XFRMA_MIGRATE |
168 | 3 | Andreas Steffen | Nov 19 08:39:23 carol charon: 04[KNL] migrate ESP 2001:1::1...2001:1::10 to 2001:1::1...2001::41a:a8ff:fe6f:c67, reqid {2} |
169 | 3 | Andreas Steffen | Nov 19 08:39:23 carol charon: 04[KNL] creating migrate job for policy ::/0 === 2001:1::10/128 in with reqid {2} |
170 | 3 | Andreas Steffen | |
171 | 3 | Andreas Steffen | Nov 19 08:39:23 carol charon: 04[KNL] received a XFRM_MSG_ACQUIRE |
172 | 3 | Andreas Steffen | Nov 19 08:39:23 carol charon: 04[KNL] XFRMA_TMPL |
173 | 3 | Andreas Steffen | Nov 19 08:39:23 carol charon: 04[KNL] XFRMA_POLICY_TYPE |
174 | 3 | Andreas Steffen | Nov 19 08:39:23 carol charon: 04[KNL] creating acquire job for policy 2001:1::10/128[135/5] === 2001:1::1/128[135] with reqid {1} |
175 | 3 | Andreas Steffen | Nov 19 08:39:23 carol charon: 09[IKE] initiating IKE_SA mh[1] to 2001:1::1 |
176 | 3 | Andreas Steffen | Nov 19 08:39:23 carol charon: 09[ENC] generating IKE_SA_INIT request 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) ] |
177 | 3 | Andreas Steffen | Nov 19 08:39:23 carol charon: 09[NET] sending packet: from 2001::41a:a8ff:fe6f:c67[500] to 2001:1::1[500] |
178 | 3 | Andreas Steffen | Nov 19 08:39:23 carol charon: 16[KNL] getting address to reach 2001:1::1 |
179 | 3 | Andreas Steffen | Nov 19 08:39:23 carol charon: 12[NET] received packet: from 2001:1::1[500] to 2001::41a:a8ff:fe6f:c67[500] |
180 | 3 | Andreas Steffen | Nov 19 08:39:23 carol charon: 12[ENC] parsed IKE_SA_INIT response 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) CERTREQ ] |
181 | 3 | Andreas Steffen | Nov 19 08:39:23 carol charon: 12[IKE] received cert request for "C=CH, O=Linux strongSwan, CN=strongSwan Root CA" |
182 | 3 | Andreas Steffen | Nov 19 08:39:23 carol charon: 12[IKE] sending cert request for "C=CH, O=Linux strongSwan, CN=strongSwan Root CA" |
183 | 3 | Andreas Steffen | Nov 19 08:39:23 carol charon: 12[IKE] authentication of 'carol@strongswan.org' (myself) with RSA signature successful |
184 | 3 | Andreas Steffen | Nov 19 08:39:23 carol charon: 12[IKE] sending end entity cert "C=CH, O=Linux strongSwan, OU=Research, CN=carol@strongswan.org" |
185 | 3 | Andreas Steffen | Nov 19 08:39:23 carol charon: 12[IKE] establishing CHILD_SA mh{1} |
186 | 3 | Andreas Steffen | Nov 19 08:39:23 carol charon: 12[CHD] my address: 2001::41a:a8ff:fe6f:c67 is a transport mode proxy for 2001:1::10 |
187 | 3 | Andreas Steffen | Nov 19 08:39:23 carol charon: 12[KNL] getting SPI for reqid {1} |
188 | 3 | Andreas Steffen | Nov 19 08:39:23 carol charon: 12[KNL] got SPI c5959ac2 for reqid {1} |
189 | 3 | Andreas Steffen | Nov 19 08:39:23 carol charon: 12[ENC] generating IKE_AUTH request 1 [ IDi CERT CERTREQ IDr AUTH N(USE_TRANSP) SA TSi TSr ] |
190 | 3 | Andreas Steffen | Nov 19 08:39:23 carol charon: 12[NET] sending packet: from 2001::41a:a8ff:fe6f:c67[500] to 2001:1::1[500] |
191 | 3 | Andreas Steffen | Nov 19 08:39:23 carol charon: 14[NET] received packet: from 2001:1::1[500] to 2001::41a:a8ff:fe6f:c67[500] |
192 | 3 | Andreas Steffen | Nov 19 08:39:23 carol charon: 14[ENC] parsed IKE_AUTH response 1 [ IDr CERT AUTH N(USE_TRANSP) SA TSi TSr ] |
193 | 3 | Andreas Steffen | Nov 19 08:39:23 carol charon: 14[IKE] received end entity cert "C=CH, O=Linux strongSwan, CN=moon.strongswan.org" |
194 | 3 | Andreas Steffen | Nov 19 08:39:23 carol charon: 14[CFG] using certificate "C=CH, O=Linux strongSwan, CN=moon.strongswan.org" |
195 | 3 | Andreas Steffen | Nov 19 08:39:23 carol charon: 14[CFG] using trusted ca certificate "C=CH, O=Linux strongSwan, CN=strongSwan Root CA" |
196 | 3 | Andreas Steffen | Nov 19 08:39:23 carol charon: 14[CFG] checking certificate status of "C=CH, O=Linux strongSwan, CN=moon.strongswan.org" |
197 | 3 | Andreas Steffen | Nov 19 08:39:23 carol charon: 14[CFG] using trusted certificate "C=CH, O=Linux strongSwan, CN=strongSwan Root CA" |
198 | 3 | Andreas Steffen | Nov 19 08:39:23 carol charon: 14[CFG] crl correctly signed by "C=CH, O=Linux strongSwan, CN=strongSwan Root CA" |
199 | 3 | Andreas Steffen | Nov 19 08:39:23 carol charon: 14[CFG] crl is valid: until Dec 13 07:58:20 2008 |
200 | 3 | Andreas Steffen | Nov 19 08:39:23 carol charon: 14[CFG] using cached crl |
201 | 3 | Andreas Steffen | Nov 19 08:39:23 carol charon: 14[CFG] certificate status is good |
202 | 3 | Andreas Steffen | Nov 19 08:39:23 carol charon: 14[IKE] authentication of 'moon.strongswan.org' with RSA signature successful |
203 | 3 | Andreas Steffen | Nov 19 08:39:23 carol charon: 14[IKE] scheduling rekeying in 3327s |
204 | 3 | Andreas Steffen | Nov 19 08:39:23 carol charon: 14[IKE] maximum IKE_SA lifetime 3507s |
205 | 3 | Andreas Steffen | Nov 19 08:39:23 carol charon: 14[IKE] IKE_SA mh[1] established between 2001::41a:a8ff:fe6f:c67[carol@strongswan.org]...2001:1::1[moon.strongswan.org] |
206 | 3 | Andreas Steffen | Nov 19 08:39:23 carol charon: 14[KNL] adding SAD entry with SPI ca64ae98 and reqid {1} |
207 | 3 | Andreas Steffen | Nov 19 08:39:23 carol charon: 14[KNL] using encryption algorithm AES_CBC with key size 128 |
208 | 3 | Andreas Steffen | Nov 19 08:39:23 carol charon: 14[KNL] using integrity algorithm HMAC_SHA1_96 with key size 160 |
209 | 3 | Andreas Steffen | Nov 19 08:39:23 carol charon: 14[KNL] adding SAD entry with SPI c5959ac2 and reqid {1} |
210 | 3 | Andreas Steffen | Nov 19 08:39:23 carol charon: 14[KNL] using encryption algorithm AES_CBC with key size 128 |
211 | 3 | Andreas Steffen | Nov 19 08:39:23 carol charon: 14[KNL] using integrity algorithm HMAC_SHA1_96 with key size 160 |
212 | 3 | Andreas Steffen | Nov 19 08:39:23 carol charon: 14[IKE] CHILD_SA mh{1} established with SPIs c5959ac2_i ca64ae98_o and TS 2001:1::10/128[135] === 2001:1::1/128[135] |
213 | 3 | Andreas Steffen | }}} |
214 | 3 | Andreas Steffen | |
215 | 3 | Andreas Steffen | and right after that the IPsec tunnel SA for the payload between the MN and the HA is created. |
216 | 3 | Andreas Steffen | |
217 | 3 | Andreas Steffen | {{{ |
218 | 3 | Andreas Steffen | Nov 19 08:39:24 carol charon: 04[KNL] received a XFRM_MSG_ACQUIRE |
219 | 3 | Andreas Steffen | Nov 19 08:39:24 carol charon: 04[KNL] XFRMA_TMPL |
220 | 3 | Andreas Steffen | Nov 19 08:39:24 carol charon: 04[KNL] XFRMA_POLICY_TYPE |
221 | 3 | Andreas Steffen | Nov 19 08:39:24 carol charon: 04[KNL] creating acquire job for policy 2001:1::10/128[ipv6-icmp/146] === 2001:1::1/128[ipv6-icmp] with reqid {2} |
222 | 3 | Andreas Steffen | Nov 19 08:39:24 carol charon: 17[IKE] establishing CHILD_SA tunnel{2} |
223 | 3 | Andreas Steffen | Nov 19 08:39:24 carol charon: 17[KNL] getting SPI for reqid {2} |
224 | 3 | Andreas Steffen | Nov 19 08:39:24 carol charon: 17[KNL] got SPI ce4db893 for reqid {2} |
225 | 3 | Andreas Steffen | Nov 19 08:39:24 carol charon: 17[ENC] generating CREATE_CHILD_SA request 2 [ SA No KE TSi TSr ] |
226 | 3 | Andreas Steffen | Nov 19 08:39:24 carol charon: 17[NET] sending packet: from 2001::41a:a8ff:fe6f:c67[500] to 2001:1::1[500] |
227 | 3 | Andreas Steffen | Nov 19 08:39:24 carol charon: 11[NET] received packet: from 2001:1::1[500] to 2001::41a:a8ff:fe6f:c67[500] |
228 | 3 | Andreas Steffen | Nov 19 08:39:24 carol charon: 11[ENC] parsed CREATE_CHILD_SA response 2 [ SA No KE TSi TSr ] |
229 | 3 | Andreas Steffen | Nov 19 08:39:25 carol charon: 11[KNL] adding SAD entry with SPI c190d5ba and reqid {2} |
230 | 3 | Andreas Steffen | Nov 19 08:39:25 carol charon: 11[KNL] using encryption algorithm AES_CBC with key size 128 |
231 | 3 | Andreas Steffen | Nov 19 08:39:25 carol charon: 11[KNL] using integrity algorithm HMAC_SHA1_96 with key size 160 |
232 | 3 | Andreas Steffen | Nov 19 08:39:25 carol charon: 11[KNL] adding SAD entry with SPI ce4db893 and reqid {2} |
233 | 3 | Andreas Steffen | Nov 19 08:39:25 carol charon: 11[KNL] using encryption algorithm AES_CBC with key size 128 |
234 | 3 | Andreas Steffen | Nov 19 08:39:25 carol charon: 11[KNL] using integrity algorithm HMAC_SHA1_96 with key size 160 |
235 | 3 | Andreas Steffen | Nov 19 08:39:25 carol charon: 11[IKE] CHILD_SA tunnel{2} established with SPIs ce4db893_i c190d5ba_o and TS 2001:1::10/128 === ::/0 |
236 | 3 | Andreas Steffen | }}} |
237 | 3 | Andreas Steffen | |
238 | 3 | Andreas Steffen | === MN status information after establishment === |
239 | 3 | Andreas Steffen | |
240 | 3 | Andreas Steffen | {{{ |
241 | 3 | Andreas Steffen | ipsec statusall |
242 | 3 | Andreas Steffen | |
243 | 1 | Andreas Steffen | Performance: |
244 | 3 | Andreas Steffen | uptime: 50 seconds, since Nov 19 08:39:19 2008 |
245 | 1 | Andreas Steffen | worker threads: 9 idle of 16, job queue load: 0, scheduled events: 2 |
246 | 1 | Andreas Steffen | loaded plugins: curl aes des sha1 sha2 md5 gmp random x509 pubkey hmac xcbc stroke kernel-netlink |
247 | 1 | Andreas Steffen | Listening IP addresses: |
248 | 1 | Andreas Steffen | 192.168.0.100 |
249 | 3 | Andreas Steffen | 2001::41a:a8ff:fe6f:c67 |
250 | 3 | Andreas Steffen | fec0::41a:a8ff:fe6f:c67 |
251 | 1 | Andreas Steffen | 2001:1::10 |
252 | 1 | Andreas Steffen | Connections: |
253 | 1 | Andreas Steffen | mh: %any[carol@strongswan.org]...2001:1::1[moon.strongswan.org] |
254 | 1 | Andreas Steffen | mh: CAs: "C=CH, O=Linux strongSwan, CN=strongSwan Root CA"...%any |
255 | 1 | Andreas Steffen | mh: public key authentication |
256 | 1 | Andreas Steffen | mh: 2001:1::10/128[135] === 2001:1::1/128[135] |
257 | 1 | Andreas Steffen | tunnel: 2001:1::10/128 === ::/0 |
258 | 1 | Andreas Steffen | Security Associations: |
259 | 3 | Andreas Steffen | mh[1]: ESTABLISHED, 2001::41a:a8ff:fe6f:c67[carol@strongswan.org]...2001:1::1[moon.strongswan.org] |
260 | 3 | Andreas Steffen | mh[1]: IKE SPIs: 58b6f8e6f23188fa_i* 63fdcfb55179c548_r, rekeying in 54 minutes |
261 | 1 | Andreas Steffen | mh[1]: IKE proposal: AES_CBC-128/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_2048_BIT |
262 | 3 | Andreas Steffen | mh{1}: ROUTED, TRANSPORT_PROXY |
263 | 1 | Andreas Steffen | mh{1}: 2001:1::10/128[135] === 2001:1::1/128[135] |
264 | 1 | Andreas Steffen | tunnel{2}: ROUTED, TUNNEL |
265 | 1 | Andreas Steffen | tunnel{2}: 2001:1::10/128 === ::/0 |
266 | 3 | Andreas Steffen | mh{1}: INSTALLED, TRANSPORT_PROXY, ESP SPIs: c5959ac2_i ca64ae98_o |
267 | 3 | Andreas Steffen | mh{1}: AES_CBC-128/HMAC_SHA1_96, rekeying in 16 minutes, last use: 45s_i no_o |
268 | 1 | Andreas Steffen | mh{1}: 2001:1::10/128[135] === 2001:1::1/128[135] |
269 | 3 | Andreas Steffen | tunnel{2}: INSTALLED, TUNNEL, ESP SPIs: ce4db893_i c190d5ba_o |
270 | 3 | Andreas Steffen | tunnel{2}: AES_CBC-128/HMAC_SHA1_96, rekeying in 16 minutes, last use: 6s_i 6s_o |
271 | 1 | Andreas Steffen | tunnel{2}: 2001:1::10/128 === ::/0 |
272 | 1 | Andreas Steffen | }}} |
273 | 1 | Andreas Steffen | |
274 | 3 | Andreas Steffen | The IPsec policy in the kernel |
275 | 1 | Andreas Steffen | |
276 | 1 | Andreas Steffen | {{{ |
277 | 3 | Andreas Steffen | ip xfrm policy |
278 | 3 | Andreas Steffen | |
279 | 1 | Andreas Steffen | src 2001:1::1/128 dst 2001:1::10/128 proto 135 |
280 | 1 | Andreas Steffen | dir in priority 2 ptype main |
281 | 1 | Andreas Steffen | tmpl src :: dst :: |
282 | 1 | Andreas Steffen | proto esp reqid 1 mode transport |
283 | 1 | Andreas Steffen | |
284 | 1 | Andreas Steffen | src 2001:1::10/128 dst 2001:1::1/128 proto 135 |
285 | 1 | Andreas Steffen | dir out priority 2 ptype main |
286 | 1 | Andreas Steffen | tmpl src :: dst :: |
287 | 1 | Andreas Steffen | proto esp reqid 1 mode transport |
288 | 1 | Andreas Steffen | |
289 | 1 | Andreas Steffen | src ::/0 dst 2001:1::10/128 |
290 | 1 | Andreas Steffen | dir in priority 10 ptype main |
291 | 3 | Andreas Steffen | tmpl src 2001:1::1 dst 2001::41a:a8ff:fe6f:c67 |
292 | 1 | Andreas Steffen | proto esp reqid 2 mode tunnel |
293 | 1 | Andreas Steffen | |
294 | 1 | Andreas Steffen | src 2001:1::10/128 dst ::/0 |
295 | 1 | Andreas Steffen | dir out priority 10 ptype main |
296 | 3 | Andreas Steffen | tmpl src 2001::41a:a8ff:fe6f:c67 dst 2001:1::1 |
297 | 1 | Andreas Steffen | proto esp reqid 2 mode tunnel |
298 | 3 | Andreas Steffen | |
299 | 1 | Andreas Steffen | }}} |
300 | 1 | Andreas Steffen | |
301 | 3 | Andreas Steffen | and the IPsec state in the kernel |
302 | 1 | Andreas Steffen | |
303 | 1 | Andreas Steffen | {{{ |
304 | 3 | Andreas Steffen | ip xfrm state |
305 | 3 | Andreas Steffen | |
306 | 3 | Andreas Steffen | src 2001:1::10 dst 2001:1::1 |
307 | 3 | Andreas Steffen | proto hao reqid 0 mode ro |
308 | 3 | Andreas Steffen | replay-window 0 |
309 | 3 | Andreas Steffen | coa 2001::41a:a8ff:fe6f:c67 |
310 | 3 | Andreas Steffen | lastused 2008-11-19 08:39:25 |
311 | 3 | Andreas Steffen | sel src 2001:1::10/128 dst 2001:1::1/128 |
312 | 3 | Andreas Steffen | |
313 | 3 | Andreas Steffen | src 2001:1::10 dst 2001:1::1 |
314 | 3 | Andreas Steffen | proto esp spi 0xca64ae98 reqid 1 mode transport |
315 | 3 | Andreas Steffen | replay-window 32 |
316 | 3 | Andreas Steffen | auth hmac(sha1) 0x419c41d8807fb521e947988cef4a6181d810b611 |
317 | 3 | Andreas Steffen | enc cbc(aes) 0xed90ae3f4f12a697f40cce1893b54e20 |
318 | 3 | Andreas Steffen | sel src ::/0 dst ::/0 |
319 | 3 | Andreas Steffen | |
320 | 3 | Andreas Steffen | src 2001:1::1 dst 2001:1::10 |
321 | 3 | Andreas Steffen | proto esp spi 0xc5959ac2 reqid 1 mode transport |
322 | 3 | Andreas Steffen | replay-window 32 |
323 | 3 | Andreas Steffen | auth hmac(sha1) 0xea26afc566143c25959a060c90be3053c50ddcff |
324 | 3 | Andreas Steffen | enc cbc(aes) 0x0bd5bd34d5523c0929f2efd7a7c93359 |
325 | 3 | Andreas Steffen | sel src ::/0 dst ::/0 |
326 | 3 | Andreas Steffen | |
327 | 3 | Andreas Steffen | src 2001::41a:a8ff:fe6f:c67 dst 2001:1::1 |
328 | 3 | Andreas Steffen | proto esp spi 0xc190d5ba reqid 2 mode tunnel |
329 | 3 | Andreas Steffen | replay-window 32 flag 20 |
330 | 3 | Andreas Steffen | auth hmac(sha1) 0x672c1ea4359956c6a3b869b388b424b7058eee02 |
331 | 3 | Andreas Steffen | enc cbc(aes) 0xaaf5be1d604e64028d4e0a41f0d92b56 |
332 | 3 | Andreas Steffen | |
333 | 3 | Andreas Steffen | src 2001:1::1 dst 2001::41a:a8ff:fe6f:c67 |
334 | 3 | Andreas Steffen | proto esp spi 0xce4db893 reqid 2 mode tunnel |
335 | 3 | Andreas Steffen | replay-window 32 flag 20 |
336 | 3 | Andreas Steffen | auth hmac(sha1) 0xdf1eeff5b86dfbd183c7a932c8250fc57d9632af |
337 | 3 | Andreas Steffen | enc cbc(aes) 0x4d138f1363c1810f8c9cb2fcb1ee8bdf |
338 | 3 | Andreas Steffen | }}} |
339 | 3 | Andreas Steffen | |
340 | 3 | Andreas Steffen | === Migration of the Care-of-Address === |
341 | 3 | Andreas Steffen | |
342 | 3 | Andreas Steffen | After some time the MN changes its Care-of-Address (CoA) to 2001::50 |
343 | 3 | Andreas Steffen | |
344 | 3 | Andreas Steffen | {{{ |
345 | 3 | Andreas Steffen | |
346 | 3 | Andreas Steffen | Nov 19 08:41:43 carol charon: 05[KNL] 2001::50 appeared on eth0 |
347 | 3 | Andreas Steffen | Nov 19 08:41:43 carol charon: 12[KNL] getting address to reach 2001:1::1 |
348 | 3 | Andreas Steffen | Nov 19 08:41:56 carol charon: 05[KNL] 2001::41a:a8ff:fe6f:c67 disappeared from eth0 |
349 | 3 | Andreas Steffen | }}} |
350 | 3 | Andreas Steffen | |
351 | 3 | Andreas Steffen | which causes the MIPv6 daemon to issue a MIGRATE message to strongSwan |
352 | 3 | Andreas Steffen | |
353 | 3 | Andreas Steffen | {{{ |
354 | 3 | Andreas Steffen | Nov 19 08:41:56 carol charon: 04[KNL] received a XFRM_MSG_MIGRATE |
355 | 3 | Andreas Steffen | Nov 19 08:41:56 carol charon: 04[KNL] policy: 2001:1::10/128[135] === 2001:1::1/128[135] in |
356 | 3 | Andreas Steffen | Nov 19 08:41:56 carol charon: 04[KNL] XFRMA_KMADDRESS |
357 | 3 | Andreas Steffen | Nov 19 08:41:56 carol charon: 04[KNL] kmaddress: 2001::50...2001:1::1 |
358 | 3 | Andreas Steffen | Nov 19 08:41:56 carol charon: 04[KNL] XFRMA_POLICY_TYPE |
359 | 3 | Andreas Steffen | Nov 19 08:41:56 carol charon: 04[KNL] XFRMA_MIGRATE |
360 | 3 | Andreas Steffen | Nov 19 08:41:56 carol charon: 04[KNL] migrate ESP %any...%any to 2001::50...2001:1::1, reqid {1} |
361 | 3 | Andreas Steffen | Nov 19 08:41:56 carol charon: 04[KNL] creating migrate job for policy 2001:1::10/128[135] === 2001:1::1/128[135] out with reqid {1} |
362 | 3 | Andreas Steffen | |
363 | 3 | Andreas Steffen | Nov 19 08:41:56 carol charon: 04[KNL] received a XFRM_MSG_MIGRATE |
364 | 3 | Andreas Steffen | Nov 19 08:41:56 carol charon: 04[KNL] policy: 2001:1::1/128[135] === 2001:1::10/128[135] out |
365 | 3 | Andreas Steffen | Nov 19 08:41:56 carol charon: 04[KNL] XFRMA_KMADDRESS |
366 | 3 | Andreas Steffen | Nov 19 08:41:56 carol charon: 04[KNL] kmaddress: 2001::50...2001:1::1 |
367 | 3 | Andreas Steffen | Nov 19 08:41:56 carol charon: 04[KNL] XFRMA_POLICY_TYPE |
368 | 3 | Andreas Steffen | Nov 19 08:41:56 carol charon: 04[KNL] XFRMA_MIGRATE |
369 | 3 | Andreas Steffen | Nov 19 08:41:56 carol charon: 04[KNL] migrate ESP %any...%any to 2001:1::1...2001::50, reqid {1} |
370 | 3 | Andreas Steffen | Nov 19 08:41:56 carol charon: 04[KNL] creating migrate job for policy 2001:1::1/128[135] === 2001:1::10/128[135] in with reqid {1} |
371 | 3 | Andreas Steffen | |
372 | 3 | Andreas Steffen | Nov 19 08:41:56 carol charon: 04[KNL] received a XFRM_MSG_MIGRATE |
373 | 3 | Andreas Steffen | Nov 19 08:41:56 carol charon: 04[KNL] policy: 2001:1::10/128 === ::/0 in |
374 | 3 | Andreas Steffen | Nov 19 08:41:56 carol charon: 04[KNL] XFRMA_KMADDRESS |
375 | 3 | Andreas Steffen | Nov 19 08:41:56 carol charon: 04[KNL] kmaddress: 2001::50...2001:1::1 |
376 | 3 | Andreas Steffen | Nov 19 08:41:56 carol charon: 04[KNL] XFRMA_POLICY_TYPE |
377 | 3 | Andreas Steffen | Nov 19 08:41:56 carol charon: 04[KNL] XFRMA_MIGRATE |
378 | 3 | Andreas Steffen | Nov 19 08:41:56 carol charon: 04[KNL] migrate ESP 2001::41a:a8ff:fe6f:c67...2001:1::1 to 2001::50...2001:1::1, reqid {2} |
379 | 3 | Andreas Steffen | Nov 19 08:41:56 carol charon: 04[KNL] creating migrate job for policy 2001:1::10/128 === ::/0 out with reqid {2} |
380 | 3 | Andreas Steffen | |
381 | 3 | Andreas Steffen | Nov 19 08:41:56 carol charon: 04[KNL] received a XFRM_MSG_MIGRATE |
382 | 3 | Andreas Steffen | Nov 19 08:41:56 carol charon: 04[KNL] policy: ::/0 === 2001:1::10/128 out |
383 | 3 | Andreas Steffen | Nov 19 08:41:56 carol charon: 04[KNL] XFRMA_KMADDRESS |
384 | 3 | Andreas Steffen | Nov 19 08:41:56 carol charon: 04[KNL] kmaddress: 2001::50...2001:1::1 |
385 | 3 | Andreas Steffen | Nov 19 08:41:56 carol charon: 04[KNL] XFRMA_POLICY_TYPE |
386 | 3 | Andreas Steffen | Nov 19 08:41:56 carol charon: 04[KNL] XFRMA_MIGRATE |
387 | 3 | Andreas Steffen | Nov 19 08:41:56 carol charon: 04[KNL] migrate ESP 2001:1::1...2001::41a:a8ff:fe6f:c67 to 2001:1::1...2001::50, reqid {2} |
388 | 3 | Andreas Steffen | Nov 19 08:41:56 carol charon: 04[KNL] creating migrate job for policy ::/0 === 2001:1::10/128 in with reqid {2} |
389 | 3 | Andreas Steffen | }}} |
390 | 3 | Andreas Steffen | |
391 | 3 | Andreas Steffen | The IKEv2 connection status after the CoA migration to 2001::50 |
392 | 3 | Andreas Steffen | |
393 | 3 | Andreas Steffen | {{{ |
394 | 3 | Andreas Steffen | ipsec statusall |
395 | 3 | Andreas Steffen | |
396 | 3 | Andreas Steffen | Performance: |
397 | 3 | Andreas Steffen | uptime: 3 minutes, since Nov 19 08:39:19 2008 |
398 | 3 | Andreas Steffen | worker threads: 9 idle of 16, job queue load: 0, scheduled events: 2 |
399 | 3 | Andreas Steffen | loaded plugins: curl aes des sha1 sha2 md5 gmp random x509 pubkey hmac xcbc stroke kernel-netlink |
400 | 3 | Andreas Steffen | Listening IP addresses: |
401 | 3 | Andreas Steffen | 192.168.0.100 |
402 | 3 | Andreas Steffen | fec0::41a:a8ff:fe6f:c67 |
403 | 3 | Andreas Steffen | 2001::50 |
404 | 3 | Andreas Steffen | 2001:1::10 |
405 | 3 | Andreas Steffen | Connections: |
406 | 3 | Andreas Steffen | mh: %any[carol@strongswan.org]...2001:1::1[moon.strongswan.org] |
407 | 3 | Andreas Steffen | mh: CAs: "C=CH, O=Linux strongSwan, CN=strongSwan Root CA"...%any |
408 | 3 | Andreas Steffen | mh: public key authentication |
409 | 3 | Andreas Steffen | mh: 2001:1::10/128[135] === 2001:1::1/128[135] |
410 | 3 | Andreas Steffen | tunnel: 2001:1::10/128 === ::/0 |
411 | 3 | Andreas Steffen | Security Associations: |
412 | 3 | Andreas Steffen | mh[1]: ESTABLISHED, 2001::50[carol@strongswan.org]...2001:1::1[moon.strongswan.org] |
413 | 3 | Andreas Steffen | mh[1]: IKE SPIs: 58b6f8e6f23188fa_i* 63fdcfb55179c548_r, rekeying in 52 minutes |
414 | 3 | Andreas Steffen | mh[1]: IKE proposal: AES_CBC-128/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_2048_BIT |
415 | 3 | Andreas Steffen | mh{1}: ROUTED, TRANSPORT_PROXY |
416 | 3 | Andreas Steffen | mh{1}: 2001:1::10/128[135] === 2001:1::1/128[135] |
417 | 3 | Andreas Steffen | tunnel{2}: ROUTED, TUNNEL |
418 | 3 | Andreas Steffen | tunnel{2}: 2001:1::10/128 === ::/0 |
419 | 3 | Andreas Steffen | mh{1}: INSTALLED, TRANSPORT_PROXY, ESP SPIs: c5959ac2_i ca64ae98_o |
420 | 3 | Andreas Steffen | mh{1}: AES_CBC-128/HMAC_SHA1_96, rekeying in 13 minutes, last use: 30s_i no_o |
421 | 3 | Andreas Steffen | mh{1}: 2001:1::10/128[135] === 2001:1::1/128[135] |
422 | 3 | Andreas Steffen | tunnel{2}: INSTALLED, TUNNEL, ESP SPIs: ce4db893_i c190d5ba_o |
423 | 3 | Andreas Steffen | tunnel{2}: AES_CBC-128/HMAC_SHA1_96, rekeying in 13 minutes, last use: 3s_i 3s_o |
424 | 3 | Andreas Steffen | tunnel{2}: 2001:1::10/128 === ::/0 |
425 | 3 | Andreas Steffen | }}} |
426 | 3 | Andreas Steffen | |
427 | 3 | Andreas Steffen | and in the Linux 2.6 kernel |
428 | 3 | Andreas Steffen | |
429 | 3 | Andreas Steffen | {{{ |
430 | 3 | Andreas Steffen | ip xfrm state |
431 | 3 | Andreas Steffen | |
432 | 1 | Andreas Steffen | src :: dst :: |
433 | 1 | Andreas Steffen | proto hao reqid 0 mode ro |
434 | 1 | Andreas Steffen | replay-window 0 flag wildrecv |
435 | 1 | Andreas Steffen | coa :: |
436 | 1 | Andreas Steffen | sel src ::/0 dst ::/0 |
437 | 1 | Andreas Steffen | |
438 | 1 | Andreas Steffen | src :: dst :: |
439 | 1 | Andreas Steffen | proto route2 reqid 0 mode ro |
440 | 1 | Andreas Steffen | replay-window 0 flag wildrecv |
441 | 1 | Andreas Steffen | coa :: |
442 | 1 | Andreas Steffen | sel src ::/0 dst ::/0 |
443 | 1 | Andreas Steffen | |
444 | 1 | Andreas Steffen | src 2001:1::10 dst 2001:1::1 |
445 | 1 | Andreas Steffen | proto hao reqid 0 mode ro |
446 | 1 | Andreas Steffen | replay-window 0 |
447 | 3 | Andreas Steffen | coa 2001::50 |
448 | 3 | Andreas Steffen | lastused 2008-11-19 08:41:56 |
449 | 1 | Andreas Steffen | sel src 2001:1::10/128 dst 2001:1::1/128 |
450 | 1 | Andreas Steffen | |
451 | 1 | Andreas Steffen | src 2001:1::10 dst 2001:1::1 |
452 | 3 | Andreas Steffen | proto esp spi 0xca64ae98 reqid 1 mode transport |
453 | 1 | Andreas Steffen | replay-window 32 |
454 | 3 | Andreas Steffen | auth hmac(sha1) 0x419c41d8807fb521e947988cef4a6181d810b611 |
455 | 3 | Andreas Steffen | enc cbc(aes) 0xed90ae3f4f12a697f40cce1893b54e20 |
456 | 1 | Andreas Steffen | sel src ::/0 dst ::/0 |
457 | 1 | Andreas Steffen | |
458 | 1 | Andreas Steffen | src 2001:1::1 dst 2001:1::10 |
459 | 3 | Andreas Steffen | proto esp spi 0xc5959ac2 reqid 1 mode transport |
460 | 1 | Andreas Steffen | replay-window 32 |
461 | 3 | Andreas Steffen | auth hmac(sha1) 0xea26afc566143c25959a060c90be3053c50ddcff |
462 | 3 | Andreas Steffen | enc cbc(aes) 0x0bd5bd34d5523c0929f2efd7a7c93359 |
463 | 1 | Andreas Steffen | sel src ::/0 dst ::/0 |
464 | 1 | Andreas Steffen | |
465 | 3 | Andreas Steffen | src 2001::50 dst 2001:1::1 |
466 | 3 | Andreas Steffen | proto esp spi 0xc190d5ba reqid 2 mode tunnel |
467 | 1 | Andreas Steffen | replay-window 32 flag 20 |
468 | 3 | Andreas Steffen | auth hmac(sha1) 0x672c1ea4359956c6a3b869b388b424b7058eee02 |
469 | 3 | Andreas Steffen | enc cbc(aes) 0xaaf5be1d604e64028d4e0a41f0d92b56 |
470 | 1 | Andreas Steffen | |
471 | 3 | Andreas Steffen | src 2001:1::1 dst 2001::50 |
472 | 3 | Andreas Steffen | proto esp spi 0xce4db893 reqid 2 mode tunnel |
473 | 1 | Andreas Steffen | replay-window 32 flag 20 |
474 | 3 | Andreas Steffen | auth hmac(sha1) 0xdf1eeff5b86dfbd183c7a932c8250fc57d9632af |
475 | 3 | Andreas Steffen | enc cbc(aes) 0x4d138f1363c1810f8c9cb2fcb1ee8bdf |
476 | 1 | Andreas Steffen | }}} |
477 | 1 | Andreas Steffen | |
478 | 1 | Andreas Steffen | == Home Agent "moon" == |
479 | 1 | Andreas Steffen | |
480 | 1 | Andreas Steffen | === /etc/mip6d.conf === |
481 | 1 | Andreas Steffen | |
482 | 1 | Andreas Steffen | {{{ |
483 | 1 | Andreas Steffen | NodeConfig HA; |
484 | 1 | Andreas Steffen | |
485 | 1 | Andreas Steffen | UseMnHaIPsec enabled; |
486 | 1 | Andreas Steffen | KeyMngMobCapability enabled; |
487 | 1 | Andreas Steffen | DefaultBindingAclPolicy deny; |
488 | 1 | Andreas Steffen | |
489 | 1 | Andreas Steffen | Interface "eth0"; |
490 | 1 | Andreas Steffen | |
491 | 1 | Andreas Steffen | include "/etc/mip6d.conf.d/carol.mip6d.conf" |
492 | 1 | Andreas Steffen | }}} |
493 | 1 | Andreas Steffen | |
494 | 1 | Andreas Steffen | === /etc/mip6d.conf.d/carol.mip6d.conf === |
495 | 1 | Andreas Steffen | |
496 | 1 | Andreas Steffen | {{{ |
497 | 1 | Andreas Steffen | Interface "eth1"; |
498 | 1 | Andreas Steffen | |
499 | 1 | Andreas Steffen | IPsecPolicySet { |
500 | 1 | Andreas Steffen | HomeAgentAddress 2001:1::1; |
501 | 1 | Andreas Steffen | HomeAddress 2001:1::10/64; |
502 | 1 | Andreas Steffen | |
503 | 1 | Andreas Steffen | IPsecPolicy Mh UseESP 1; |
504 | 1 | Andreas Steffen | IPsecPolicy TunnelPayload UseESP 2; |
505 | 1 | Andreas Steffen | } |
506 | 1 | Andreas Steffen | |
507 | 1 | Andreas Steffen | BindingAclPolicy 2001:1::10 allow; |
508 | 1 | Andreas Steffen | }}} |
509 | 1 | Andreas Steffen | |
510 | 1 | Andreas Steffen | === /etc/ipsec.conf === |
511 | 1 | Andreas Steffen | |
512 | 1 | Andreas Steffen | {{{ |
513 | 1 | Andreas Steffen | config setup |
514 | 1 | Andreas Steffen | crlcheckinterval=180 |
515 | 1 | Andreas Steffen | plutostart=no |
516 | 1 | Andreas Steffen | charondebug="knl 2" |
517 | 1 | Andreas Steffen | |
518 | 1 | Andreas Steffen | conn %default |
519 | 1 | Andreas Steffen | keyexchange=ikev2 |
520 | 1 | Andreas Steffen | reauth=no |
521 | 1 | Andreas Steffen | mobike=no |
522 | 1 | Andreas Steffen | installpolicy=no |
523 | 1 | Andreas Steffen | |
524 | 1 | Andreas Steffen | conn mh |
525 | 1 | Andreas Steffen | also=ha |
526 | 1 | Andreas Steffen | leftsubnet=2001:1::1/128 |
527 | 1 | Andreas Steffen | leftprotoport=135/0 |
528 | 1 | Andreas Steffen | rightprotoport=135/0 |
529 | 1 | Andreas Steffen | type=transport_proxy |
530 | 1 | Andreas Steffen | |
531 | 1 | Andreas Steffen | conn tunnel |
532 | 1 | Andreas Steffen | also=ha |
533 | 1 | Andreas Steffen | leftsubnet=::/0 |
534 | 1 | Andreas Steffen | |
535 | 1 | Andreas Steffen | conn ha |
536 | 1 | Andreas Steffen | left=2001:1::1 |
537 | 1 | Andreas Steffen | leftcert=moonCert.pem |
538 | 1 | Andreas Steffen | leftid=@moon.strongswan.org |
539 | 1 | Andreas Steffen | right=%any |
540 | 1 | Andreas Steffen | ike=aes128-sha1-modp2048! |
541 | 1 | Andreas Steffen | esp=aes128-sha1-modp2048! |
542 | 1 | Andreas Steffen | |
543 | 1 | Andreas Steffen | include /etc/ipsec.conf.d/carol.ipsec.conf |
544 | 1 | Andreas Steffen | include /etc/ipsec.conf.d/dave.ipsec.conf |
545 | 1 | Andreas Steffen | }}} |
546 | 1 | Andreas Steffen | |
547 | 1 | Andreas Steffen | === /etc/ipsec.conf.d/carol.ipsec.conf === |
548 | 1 | Andreas Steffen | |
549 | 1 | Andreas Steffen | {{{ |
550 | 1 | Andreas Steffen | conn carol |
551 | 1 | Andreas Steffen | rightsubnet=2001:1::10/128 |
552 | 1 | Andreas Steffen | rightid=carol@strongswan.org |
553 | 1 | Andreas Steffen | |
554 | 1 | Andreas Steffen | conn carol-mh |
555 | 1 | Andreas Steffen | also=carol |
556 | 1 | Andreas Steffen | also=mh |
557 | 1 | Andreas Steffen | auto=add |
558 | 1 | Andreas Steffen | |
559 | 1 | Andreas Steffen | conn carol-tunnel |
560 | 1 | Andreas Steffen | also=carol |
561 | 1 | Andreas Steffen | also=tunnel |
562 | 1 | Andreas Steffen | auto=add |
563 | 1 | Andreas Steffen | }}} |
564 | 1 | Andreas Steffen | |
565 | 1 | Andreas Steffen | === ipsec statusall === |
566 | 1 | Andreas Steffen | |
567 | 1 | Andreas Steffen | {{{ |
568 | 1 | Andreas Steffen | Performance: |
569 | 1 | Andreas Steffen | uptime: 9 minutes, since Nov 13 01:05:33 2008 |
570 | 1 | Andreas Steffen | worker threads: 91 idle of 98, job queue load: 0, scheduled events: 2 |
571 | 1 | Andreas Steffen | loaded plugins: curl aes des sha1 sha2 md5 gmp random x509 pubkey hmac xcbc stroke kernel-netlink sqlite sql |
572 | 1 | Andreas Steffen | Listening IP addresses: |
573 | 1 | Andreas Steffen | 10.1.0.1 |
574 | 1 | Andreas Steffen | 2001:1::1 |
575 | 1 | Andreas Steffen | fec1::1 |
576 | 1 | Andreas Steffen | 192.168.0.1 |
577 | 1 | Andreas Steffen | 2001::1 |
578 | 1 | Andreas Steffen | fec0::1 |
579 | 1 | Andreas Steffen | Connections: |
580 | 1 | Andreas Steffen | carol-mh: 2001:1::1[moon.strongswan.org]...%any[carol@strongswan.org] |
581 | 1 | Andreas Steffen | carol-mh: CAs: "C=CH, O=Linux strongSwan, CN=strongSwan Root CA"...%any |
582 | 1 | Andreas Steffen | carol-mh: public key authentication |
583 | 1 | Andreas Steffen | carol-mh: 2001:1::1/128[135] === 2001:1::10/128[135] |
584 | 1 | Andreas Steffen | carol-tunnel: ::/0 === 2001:1::10/128 |
585 | 1 | Andreas Steffen | dave-mh: 2001:1::1[moon.strongswan.org]...%any[dave@strongswan.org] |
586 | 1 | Andreas Steffen | dave-mh: CAs: "C=CH, O=Linux strongSwan, CN=strongSwan Root CA"...%any |
587 | 1 | Andreas Steffen | dave-mh: public key authentication |
588 | 1 | Andreas Steffen | dave-mh: 2001:1::1/128[135] === 2001:1::20/128[135] |
589 | 1 | Andreas Steffen | dave-tunnel: ::/0 === 2001:1::20/128 |
590 | 1 | Andreas Steffen | Security Associations: |
591 | 1 | Andreas Steffen | carol-mh[1]: ESTABLISHED, 2001:1::1[moon.strongswan.org]...2001::18d9:88ff:fe7d:36b3[carol@strongswan.org] |
592 | 1 | Andreas Steffen | carol-mh[1]: IKE SPIs: 372bdbd1320c2eb4_i a53801fd03fbffee_r*, rekeying in 47 minutes |
593 | 1 | Andreas Steffen | carol-mh[1]: IKE proposal: AES_CBC-128/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_2048_BIT |
594 | 1 | Andreas Steffen | carol-mh{1}: INSTALLED, TRANSPORT, ESP SPIs: c31ec667_i cf472638_o |
595 | 1 | Andreas Steffen | carol-mh{1}: AES_CBC-128/HMAC_SHA1_96, rekeying in 8 minutes, last use: 485s_i no_o |
596 | 1 | Andreas Steffen | carol-mh{1}: 2001:1::1/128[135] === 2001:1::10/128[135] |
597 | 1 | Andreas Steffen | carol-tunnel{2}: INSTALLED, TUNNEL, ESP SPIs: c0f90752_i c4f98106_o |
598 | 1 | Andreas Steffen | carol-tunnel{2}: AES_CBC-128/HMAC_SHA1_96, rekeying in 8 minutes, last use: 481s_i no_o |
599 | 1 | Andreas Steffen | carol-tunnel{2}: ::/0 === 2001:1::10/128 |
600 | 1 | Andreas Steffen | }}} |
601 | 1 | Andreas Steffen | |
602 | 1 | Andreas Steffen | === ip xfrm policy === |
603 | 1 | Andreas Steffen | |
604 | 1 | Andreas Steffen | {{{ |
605 | 1 | Andreas Steffen | src 2001:1::10/128 dst 2001:1::1/128 proto 135 |
606 | 1 | Andreas Steffen | dir in priority 2 ptype main |
607 | 1 | Andreas Steffen | tmpl src :: dst :: |
608 | 1 | Andreas Steffen | proto esp reqid 1 mode transport |
609 | 1 | Andreas Steffen | |
610 | 1 | Andreas Steffen | src 2001:1::1/128 dst 2001:1::10/128 proto 135 |
611 | 1 | Andreas Steffen | dir out priority 2 ptype main |
612 | 1 | Andreas Steffen | tmpl src :: dst :: |
613 | 1 | Andreas Steffen | proto esp reqid 1 mode transport |
614 | 1 | Andreas Steffen | |
615 | 1 | Andreas Steffen | src 2001:1::10/128 dst ::/0 |
616 | 1 | Andreas Steffen | dir in priority 10 ptype main |
617 | 1 | Andreas Steffen | tmpl src 2001::18d9:88ff:fe7d:36b3 dst 2001:1::1 |
618 | 1 | Andreas Steffen | proto esp reqid 2 mode tunnel |
619 | 1 | Andreas Steffen | |
620 | 1 | Andreas Steffen | src 2001:1::10/128 dst ::/0 |
621 | 1 | Andreas Steffen | dir fwd priority 10 ptype main |
622 | 1 | Andreas Steffen | tmpl src 2001::18d9:88ff:fe7d:36b3 dst 2001:1::1 |
623 | 1 | Andreas Steffen | proto esp reqid 2 mode tunnel |
624 | 1 | Andreas Steffen | |
625 | 1 | Andreas Steffen | src ::/0 dst 2001:1::10/128 |
626 | 1 | Andreas Steffen | dir out priority 10 ptype main |
627 | 1 | Andreas Steffen | tmpl src 2001:1::1 dst 2001::18d9:88ff:fe7d:36b3 |
628 | 1 | Andreas Steffen | proto esp reqid 2 mode tunnel |
629 | 1 | Andreas Steffen | }}} |
630 | 1 | Andreas Steffen | |
631 | 1 | Andreas Steffen | === ip xfrm state === |
632 | 1 | Andreas Steffen | |
633 | 1 | Andreas Steffen | {{{ |
634 | 1 | Andreas Steffen | src :: dst :: |
635 | 1 | Andreas Steffen | proto hao reqid 0 mode ro |
636 | 1 | Andreas Steffen | replay-window 0 flag wildrecv |
637 | 1 | Andreas Steffen | coa :: |
638 | 1 | Andreas Steffen | sel src ::/0 dst ::/0 |
639 | 1 | Andreas Steffen | |
640 | 1 | Andreas Steffen | src 2001:1::10 dst 2001:1::1 |
641 | 1 | Andreas Steffen | proto esp spi 0xc31ec667 reqid 1 mode transport |
642 | 1 | Andreas Steffen | replay-window 32 |
643 | 1 | Andreas Steffen | auth hmac(sha1) 0xf6815c3cd001ff884eb6c1b4112ea9db0daf1eef |
644 | 1 | Andreas Steffen | enc cbc(aes) 0xa51f577d694f46beb85179ecc5d35251 |
645 | 1 | Andreas Steffen | sel src ::/0 dst ::/0 |
646 | 1 | Andreas Steffen | |
647 | 1 | Andreas Steffen | src 2001:1::1 dst 2001:1::10 |
648 | 1 | Andreas Steffen | proto esp spi 0xcf472638 reqid 1 mode transport |
649 | 1 | Andreas Steffen | replay-window 32 |
650 | 1 | Andreas Steffen | auth hmac(sha1) 0x8d9790093b1baa89a128e92c7019c32d776eccac |
651 | 1 | Andreas Steffen | enc cbc(aes) 0xe02ea1231d5e1908564992ccafdc97cd |
652 | 1 | Andreas Steffen | sel src ::/0 dst ::/0 |
653 | 1 | Andreas Steffen | |
654 | 1 | Andreas Steffen | src 2001:1::1 dst 2001:1::10 |
655 | 1 | Andreas Steffen | proto route2 reqid 0 mode ro |
656 | 1 | Andreas Steffen | replay-window 0 |
657 | 1 | Andreas Steffen | coa 2001::18d9:88ff:fe7d:36b3 |
658 | 1 | Andreas Steffen | lastused 2008-11-13 01:06:50 |
659 | 1 | Andreas Steffen | sel src 2001:1::1/128 dst 2001:1::10/128 |
660 | 1 | Andreas Steffen | |
661 | 1 | Andreas Steffen | src 2001:1::10 dst 2001:1::1 |
662 | 1 | Andreas Steffen | proto hao reqid 0 mode ro |
663 | 1 | Andreas Steffen | replay-window 0 |
664 | 1 | Andreas Steffen | coa 2001::18d9:88ff:fe7d:36b3 |
665 | 1 | Andreas Steffen | sel src 2001:1::10/128 dst 2001:1::1/128 |
666 | 1 | Andreas Steffen | |
667 | 1 | Andreas Steffen | src 2001::18d9:88ff:fe7d:36b3 dst 2001:1::1 |
668 | 1 | Andreas Steffen | proto esp spi 0xc0f90752 reqid 2 mode tunnel |
669 | 1 | Andreas Steffen | replay-window 32 flag 20 |
670 | 1 | Andreas Steffen | auth hmac(sha1) 0x8339d597ed1d92d820443171d3e3282d83186572 |
671 | 1 | Andreas Steffen | enc cbc(aes) 0xcba21b583a2330897e33339b72855eaa |
672 | 1 | Andreas Steffen | |
673 | 1 | Andreas Steffen | src 2001:1::1 dst 2001::18d9:88ff:fe7d:36b3 |
674 | 1 | Andreas Steffen | proto esp spi 0xc4f98106 reqid 2 mode tunnel |
675 | 1 | Andreas Steffen | replay-window 32 flag 20 |
676 | 1 | Andreas Steffen | auth hmac(sha1) 0xf4ffd5a21d52b4766ea81c22945f3f558f24c675 |
677 | 1 | Andreas Steffen | enc cbc(aes) 0x7c0d20968090085fbb17557f53c8818b |
678 | 1 | Andreas Steffen | }}} |
679 | 1 | Andreas Steffen | |
680 | 1 | Andreas Steffen | === /var/log/daemon.log === |
681 | 1 | Andreas Steffen | |
682 | 1 | Andreas Steffen | {{{ |
683 | 1 | Andreas Steffen | Nov 13 01:05:33 moon charon: 01[DMN] starting charon (strongSwan Version 4.2.9rc18) |
684 | 1 | Andreas Steffen | Nov 13 01:05:33 moon charon: 01[CFG] loading ca certificates from '/etc/ipsec.d/cacerts' |
685 | 1 | Andreas Steffen | Nov 13 01:05:33 moon charon: 01[LIB] loaded certificate file '/etc/ipsec.d/cacerts/strongswanCert.pem' |
686 | 1 | Andreas Steffen | Nov 13 01:05:33 moon charon: 01[CFG] loading aa certificates from '/etc/ipsec.d/aacerts' |
687 | 1 | Andreas Steffen | Nov 13 01:05:33 moon charon: 01[CFG] loading ocsp signer certificates from '/etc/ipsec.d/ocspcerts' |
688 | 1 | Andreas Steffen | Nov 13 01:05:33 moon charon: 01[CFG] loading attribute certificates from '/etc/ipsec.d/acerts' |
689 | 1 | Andreas Steffen | Nov 13 01:05:33 moon charon: 01[CFG] loading crls from '/etc/ipsec.d/crls' |
690 | 1 | Andreas Steffen | Nov 13 01:05:33 moon charon: 01[LIB] loaded crl file '/etc/ipsec.d/crls/strongswan.crl' |
691 | 1 | Andreas Steffen | Nov 13 01:05:33 moon charon: 01[CFG] loading secrets from '/etc/ipsec.secrets' |
692 | 1 | Andreas Steffen | Nov 13 01:05:33 moon charon: 01[CFG] loaded private key file '/etc/ipsec.d/private/moonKey.pem' |
693 | 1 | Andreas Steffen | Nov 13 01:05:34 moon charon: 01[DMN] loaded plugins: curl aes des sha1 sha2 md5 gmp random x509 pubkey hmac xcbc stroke kernel-netlink sqlite sql |
694 | 1 | Andreas Steffen | Nov 13 01:05:34 moon charon: 01[KNL] listening on interfaces: |
695 | 1 | Andreas Steffen | Nov 13 01:05:34 moon charon: 01[KNL] eth1 |
696 | 1 | Andreas Steffen | Nov 13 01:05:34 moon charon: 01[KNL] 10.1.0.1 |
697 | 1 | Andreas Steffen | Nov 13 01:05:34 moon charon: 01[KNL] 2001:1::1 |
698 | 1 | Andreas Steffen | Nov 13 01:05:34 moon charon: 01[KNL] fec1::1 |
699 | 1 | Andreas Steffen | Nov 13 01:05:34 moon charon: 01[KNL] fe80::b8d5:baff:feea:d493 |
700 | 1 | Andreas Steffen | Nov 13 01:05:34 moon charon: 01[KNL] eth0 |
701 | 1 | Andreas Steffen | Nov 13 01:05:34 moon charon: 01[KNL] 192.168.0.1 |
702 | 1 | Andreas Steffen | Nov 13 01:05:34 moon charon: 01[KNL] 2001::1 |
703 | 1 | Andreas Steffen | Nov 13 01:05:34 moon charon: 01[KNL] fec0::1 |
704 | 1 | Andreas Steffen | Nov 13 01:05:34 moon charon: 01[KNL] fe80::e4f6:c7ff:fe59:80e1 |
705 | 1 | Andreas Steffen | Nov 13 01:05:34 moon charon: 01[JOB] spawning 98 worker threads |
706 | 1 | Andreas Steffen | Nov 13 01:05:35 moon charon: 23[CFG] crl caching to /etc/ipsec.d/crls enabled |
707 | 1 | Andreas Steffen | Nov 13 01:05:35 moon charon: 25[CFG] received stroke: add connection 'carol-mh' |
708 | 1 | Andreas Steffen | Nov 13 01:05:35 moon charon: 25[KNL] getting interface name for %any |
709 | 1 | Andreas Steffen | Nov 13 01:05:35 moon charon: 25[KNL] %any is not a local address |
710 | 1 | Andreas Steffen | Nov 13 01:05:35 moon charon: 25[KNL] getting interface name for 2001:1::1 |
711 | 1 | Andreas Steffen | Nov 13 01:05:35 moon charon: 25[KNL] 2001:1::1 is on interface eth1 |
712 | 1 | Andreas Steffen | Nov 13 01:05:35 moon charon: 25[LIB] loaded certificate file '/etc/ipsec.d/certs/moonCert.pem' |
713 | 1 | Andreas Steffen | Nov 13 01:05:35 moon charon: 25[CFG] added configuration 'carol-mh': 2001:1::1[moon.strongswan.org]...%any[carol@strongswan.org] |
714 | 1 | Andreas Steffen | Nov 13 01:05:35 moon charon: 27[CFG] received stroke: add connection 'carol-tunnel' |
715 | 1 | Andreas Steffen | Nov 13 01:05:35 moon charon: 27[KNL] getting interface name for %any |
716 | 1 | Andreas Steffen | Nov 13 01:05:35 moon charon: 27[KNL] %any is not a local address |
717 | 1 | Andreas Steffen | Nov 13 01:05:35 moon charon: 27[KNL] getting interface name for 2001:1::1 |
718 | 1 | Andreas Steffen | Nov 13 01:05:35 moon charon: 27[KNL] 2001:1::1 is on interface eth1 |
719 | 1 | Andreas Steffen | Nov 13 01:05:35 moon charon: 27[LIB] loaded certificate file '/etc/ipsec.d/certs/moonCert.pem' |
720 | 1 | Andreas Steffen | Nov 13 01:05:35 moon charon: 27[CFG] added child to existing configuration 'carol-mh' |
721 | 1 | Andreas Steffen | Nov 13 01:05:35 moon charon: 28[CFG] received stroke: add connection 'dave-mh' |
722 | 1 | Andreas Steffen | Nov 13 01:05:35 moon charon: 28[KNL] getting interface name for %any |
723 | 1 | Andreas Steffen | Nov 13 01:05:35 moon charon: 28[KNL] %any is not a local address |
724 | 1 | Andreas Steffen | Nov 13 01:05:35 moon charon: 28[KNL] getting interface name for 2001:1::1 |
725 | 1 | Andreas Steffen | Nov 13 01:05:35 moon charon: 28[KNL] 2001:1::1 is on interface eth1 |
726 | 1 | Andreas Steffen | Nov 13 01:05:35 moon charon: 28[LIB] loaded certificate file '/etc/ipsec.d/certs/moonCert.pem' |
727 | 1 | Andreas Steffen | Nov 13 01:05:35 moon charon: 28[CFG] added configuration 'dave-mh': 2001:1::1[moon.strongswan.org]...%any[dave@strongswan.org] |
728 | 1 | Andreas Steffen | Nov 13 01:05:35 moon charon: 30[CFG] received stroke: add connection 'dave-tunnel' |
729 | 1 | Andreas Steffen | Nov 13 01:05:35 moon charon: 30[KNL] getting interface name for %any |
730 | 1 | Andreas Steffen | Nov 13 01:05:35 moon charon: 30[KNL] %any is not a local address |
731 | 1 | Andreas Steffen | Nov 13 01:05:35 moon charon: 30[KNL] getting interface name for 2001:1::1 |
732 | 1 | Andreas Steffen | Nov 13 01:05:35 moon charon: 30[KNL] 2001:1::1 is on interface eth1 |
733 | 1 | Andreas Steffen | Nov 13 01:05:35 moon charon: 30[LIB] loaded certificate file '/etc/ipsec.d/certs/moonCert.pem' |
734 | 1 | Andreas Steffen | Nov 13 01:05:35 moon charon: 30[CFG] added child to existing configuration 'dave-mh' |
735 | 1 | Andreas Steffen | |
736 | 1 | Andreas Steffen | Nov 13 01:05:39 moon mip6d[1167]: MIPL Mobile IPv6 for Linux v2.0.2-umip-0.4 started (Home Agent) |
737 | 1 | Andreas Steffen | |
738 | 1 | Andreas Steffen | Nov 13 01:06:45 moon charon: 33[NET] received packet: from 2001::18d9:88ff:fe7d:36b3[500] to 2001:1::1[500] |
739 | 1 | Andreas Steffen | Nov 13 01:06:45 moon charon: 33[ENC] parsed IKE_SA_INIT request 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) ] |
740 | 1 | Andreas Steffen | Nov 13 01:06:45 moon charon: 33[IKE] 2001::18d9:88ff:fe7d:36b3 is initiating an IKE_SA |
741 | 1 | Andreas Steffen | Nov 13 01:06:45 moon charon: 33[IKE] sending cert request for "C=CH, O=Linux strongSwan, CN=strongSwan Root CA" |
742 | 2 | Andreas Steffen | Nov 13 01:06:45 moon charon: 33[ENC] generating IKE_SA_INIT response 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) CERTREQ ] |
743 | 1 | Andreas Steffen | Nov 13 01:06:45 moon charon: 33[NET] sending packet: from 2001:1::1[500] to 2001::18d9:88ff:fe7d:36b3[500] |
744 | 1 | Andreas Steffen | Nov 13 01:06:45 moon charon: 34[NET] received packet: from 2001::18d9:88ff:fe7d:36b3[500] to 2001:1::1[500] |
745 | 1 | Andreas Steffen | Nov 13 01:06:45 moon charon: 34[ENC] parsed IKE_AUTH request 1 [ IDi CERT CERTREQ IDr AUTH N(USE_TRANSP) SA TSi TSr ] |
746 | 1 | Andreas Steffen | Nov 13 01:06:45 moon charon: 34[IKE] received cert request for "C=CH, O=Linux strongSwan, CN=strongSwan Root CA" |
747 | 1 | Andreas Steffen | Nov 13 01:06:45 moon charon: 34[IKE] received end entity cert "C=CH, O=Linux strongSwan, OU=Research, CN=carol@strongswan.org" |
748 | 1 | Andreas Steffen | Nov 13 01:06:45 moon charon: 34[CFG] using certificate "C=CH, O=Linux strongSwan, OU=Research, CN=carol@strongswan.org" |
749 | 1 | Andreas Steffen | |
750 | 1 | Andreas Steffen | Nov 13 01:06:45 moon charon: 34[CFG] using trusted ca certificate "C=CH, O=Linux strongSwan, CN=strongSwan Root CA" |
751 | 1 | Andreas Steffen | Nov 13 01:06:45 moon charon: 34[CFG] checking certificate status of "C=CH, O=Linux strongSwan, OU=Research, CN=carol@strongswan.org" |
752 | 1 | Andreas Steffen | Nov 13 01:06:45 moon charon: 34[CFG] using trusted certificate "C=CH, O=Linux strongSwan, CN=strongSwan Root CA" |
753 | 1 | Andreas Steffen | Nov 13 01:06:45 moon charon: 34[CFG] crl correctly signed by "C=CH, O=Linux strongSwan, CN=strongSwan Root CA" |
754 | 1 | Andreas Steffen | Nov 13 01:06:45 moon charon: 34[CFG] crl is valid: until Nov 13 22:27:58 2008 |
755 | 1 | Andreas Steffen | Nov 13 01:06:45 moon charon: 34[CFG] using cached crl |
756 | 1 | Andreas Steffen | Nov 13 01:06:45 moon charon: 34[CFG] certificate status is good |
757 | 1 | Andreas Steffen | Nov 13 01:06:45 moon charon: 34[IKE] authentication of 'carol@strongswan.org' with RSA signature successful |
758 | 1 | Andreas Steffen | Nov 13 01:06:45 moon charon: 34[CFG] found matching peer config "carol-mh": moon.strongswan.org...carol@strongswan.org with prio 40.5 |
759 | 1 | Andreas Steffen | Nov 13 01:06:45 moon charon: 34[IKE] authentication of 'moon.strongswan.org' (myself) with RSA signature successful |
760 | 1 | Andreas Steffen | Nov 13 01:06:45 moon charon: 34[IKE] scheduling rekeying in 3365s |
761 | 1 | Andreas Steffen | Nov 13 01:06:45 moon charon: 34[IKE] maximum IKE_SA lifetime 3545s |
762 | 1 | Andreas Steffen | Nov 13 01:06:45 moon charon: 34[IKE] IKE_SA carol-mh[1] established between 2001:1::1[moon.strongswan.org]...2001::18d9:88ff:fe7d:36b3[carol@strongswan.org] |
763 | 1 | Andreas Steffen | Nov 13 01:06:45 moon charon: 34[IKE] sending end entity cert "C=CH, O=Linux strongSwan, CN=moon.strongswan.org" |
764 | 1 | Andreas Steffen | Nov 13 01:06:45 moon charon: 34[CHD] other address: 2001::18d9:88ff:fe7d:36b3 is a transport mode proxy for 2001:1::10 |
765 | 1 | Andreas Steffen | Nov 13 01:06:45 moon charon: 34[KNL] getting SPI for reqid {1} |
766 | 1 | Andreas Steffen | Nov 13 01:06:45 moon charon: 34[KNL] got SPI c31ec667 for reqid {1} |
767 | 1 | Andreas Steffen | Nov 13 01:06:45 moon charon: 34[KNL] adding SAD entry with SPI c31ec667 and reqid {1} |
768 | 1 | Andreas Steffen | Nov 13 01:06:45 moon charon: 34[KNL] using encryption algorithm AES_CBC with key size 128 |
769 | 1 | Andreas Steffen | Nov 13 01:06:45 moon charon: 34[KNL] using integrity algorithm HMAC_SHA1_96 with key size 160 |
770 | 1 | Andreas Steffen | Nov 13 01:06:45 moon charon: 34[KNL] adding SAD entry with SPI cf472638 and reqid {1} |
771 | 1 | Andreas Steffen | Nov 13 01:06:45 moon charon: 34[KNL] using encryption algorithm AES_CBC with key size 128 |
772 | 1 | Andreas Steffen | Nov 13 01:06:45 moon charon: 34[KNL] using integrity algorithm HMAC_SHA1_96 with key size 160 |
773 | 1 | Andreas Steffen | Nov 13 01:06:45 moon charon: 34[IKE] CHILD_SA carol-mh{1} established with SPIs c31ec667_i cf472638_o and TS 2001:1::1/128[135] === 2001:1::10/128[135] |
774 | 1 | Andreas Steffen | Nov 13 01:06:45 moon charon: 34[ENC] generating IKE_AUTH response 1 [ IDr CERT AUTH N(USE_TRANSP) SA TSi TSr ] |
775 | 1 | Andreas Steffen | Nov 13 01:06:45 moon charon: 34[NET] sending packet: from 2001:1::1[500] to 2001::18d9:88ff:fe7d:36b3[500] |
776 | 1 | Andreas Steffen | |
777 | 1 | Andreas Steffen | Nov 13 01:06:47 moon charon: 04[KNL] received a XFRM_MSG_MIGRATE |
778 | 1 | Andreas Steffen | Nov 13 01:06:47 moon charon: 04[KNL] policy: 2001:1::10/128[135] === 2001:1::1/128[135] in, index 0 |
779 | 1 | Andreas Steffen | Nov 13 01:06:47 moon charon: 04[KNL] XFRMA_KMADDRESS |
780 | 1 | Andreas Steffen | Nov 13 01:06:47 moon charon: 04[KNL] kmaddress: 2001:1::1...2001::18d9:88ff:fe7d:36b3 |
781 | 1 | Andreas Steffen | Nov 13 01:06:47 moon charon: 04[KNL] XFRMA_POLICY_TYPE |
782 | 1 | Andreas Steffen | Nov 13 01:06:47 moon charon: 04[KNL] XFRMA_MIGRATE |
783 | 1 | Andreas Steffen | Nov 13 01:06:47 moon charon: 04[KNL] migrate ESP %any...%any to 2001::18d9:88ff:fe7d:36b3...2001:1::1, reqid {1} |
784 | 1 | Andreas Steffen | Nov 13 01:06:47 moon charon: 04[KNL] creating migrate job for policy 2001:1::10/128[135] === 2001:1::1/128[135] in with reqid {1} |
785 | 1 | Andreas Steffen | Nov 13 01:06:47 moon charon: 05[KNL] interface ip6tnl1 activated |
786 | 1 | Andreas Steffen | Nov 13 01:06:47 moon charon: 04[KNL] received a XFRM_MSG_MIGRATE |
787 | 1 | Andreas Steffen | Nov 13 01:06:47 moon charon: 04[KNL] policy: 2001:1::1/128[135] === 2001:1::10/128[135] out, index 0 |
788 | 1 | Andreas Steffen | Nov 13 01:06:47 moon charon: 04[KNL] XFRMA_KMADDRESS |
789 | 1 | Andreas Steffen | Nov 13 01:06:47 moon charon: 04[KNL] kmaddress: 2001:1::1...2001::18d9:88ff:fe7d:36b3 |
790 | 1 | Andreas Steffen | Nov 13 01:06:47 moon charon: 04[KNL] XFRMA_POLICY_TYPE |
791 | 1 | Andreas Steffen | Nov 13 01:06:47 moon charon: 04[KNL] XFRMA_MIGRATE |
792 | 1 | Andreas Steffen | Nov 13 01:06:47 moon charon: 04[KNL] migrate ESP %any...%any to 2001:1::1...2001::18d9:88ff:fe7d:36b3, reqid {1} |
793 | 1 | Andreas Steffen | Nov 13 01:06:47 moon charon: 04[KNL] creating migrate job for policy 2001:1::1/128[135] === 2001:1::10/128[135] out with reqid {1} |
794 | 1 | Andreas Steffen | Nov 13 01:06:47 moon charon: 04[KNL] received a XFRM_MSG_MIGRATE |
795 | 1 | Andreas Steffen | Nov 13 01:06:47 moon charon: 04[KNL] policy: 2001:1::10/128 === ::/0 in, index 0 |
796 | 1 | Andreas Steffen | Nov 13 01:06:47 moon charon: 04[KNL] XFRMA_KMADDRESS |
797 | 1 | Andreas Steffen | Nov 13 01:06:47 moon charon: 04[KNL] kmaddress: 2001:1::1...2001::18d9:88ff:fe7d:36b3 |
798 | 1 | Andreas Steffen | Nov 13 01:06:47 moon charon: 04[KNL] XFRMA_POLICY_TYPE |
799 | 1 | Andreas Steffen | Nov 13 01:06:47 moon charon: 04[KNL] XFRMA_MIGRATE |
800 | 1 | Andreas Steffen | Nov 13 01:06:47 moon charon: 04[KNL] migrate ESP 2001:1::10...2001:1::1 to 2001::18d9:88ff:fe7d:36b3...2001:1::1, reqid {2} |
801 | 1 | Andreas Steffen | Nov 13 01:06:47 moon charon: 04[KNL] creating migrate job for policy 2001:1::10/128 === ::/0 in with reqid {2} |
802 | 1 | Andreas Steffen | Nov 13 01:06:47 moon charon: 37[JOB] no CHILD_SA found with reqid {2} |
803 | 1 | Andreas Steffen | Nov 13 01:06:47 moon charon: 04[KNL] received a XFRM_MSG_MIGRATE |
804 | 1 | Andreas Steffen | Nov 13 01:06:47 moon charon: 04[KNL] policy: 2001:1::10/128 === ::/0 fwd, index 0 |
805 | 1 | Andreas Steffen | Nov 13 01:06:47 moon charon: 04[KNL] XFRMA_KMADDRESS |
806 | 1 | Andreas Steffen | Nov 13 01:06:47 moon charon: 04[KNL] kmaddress: 2001:1::1...2001::18d9:88ff:fe7d:36b3 |
807 | 1 | Andreas Steffen | Nov 13 01:06:47 moon charon: 04[KNL] XFRMA_POLICY_TYPE |
808 | 1 | Andreas Steffen | Nov 13 01:06:47 moon charon: 04[KNL] XFRMA_MIGRATE |
809 | 1 | Andreas Steffen | Nov 13 01:06:47 moon charon: 04[KNL] migrate ESP 2001:1::10...2001:1::1 to 2001::18d9:88ff:fe7d:36b3...2001:1::1, reqid {2} |
810 | 1 | Andreas Steffen | Nov 13 01:06:47 moon charon: 04[KNL] creating migrate job for policy 2001:1::10/128 === ::/0 fwd with reqid {2} |
811 | 1 | Andreas Steffen | Nov 13 01:06:47 moon charon: 38[JOB] no CHILD_SA found with reqid {2} |
812 | 1 | Andreas Steffen | Nov 13 01:06:47 moon charon: 04[KNL] received a XFRM_MSG_MIGRATE |
813 | 1 | Andreas Steffen | Nov 13 01:06:47 moon charon: 04[KNL] policy: ::/0 === 2001:1::10/128 out, index 0 |
814 | 1 | Andreas Steffen | Nov 13 01:06:47 moon charon: 04[KNL] XFRMA_KMADDRESS |
815 | 1 | Andreas Steffen | Nov 13 01:06:47 moon charon: 04[KNL] kmaddress: 2001:1::1...2001::18d9:88ff:fe7d:36b3 |
816 | 1 | Andreas Steffen | Nov 13 01:06:47 moon charon: 04[KNL] XFRMA_POLICY_TYPE |
817 | 1 | Andreas Steffen | Nov 13 01:06:47 moon charon: 04[KNL] XFRMA_MIGRATE |
818 | 1 | Andreas Steffen | Nov 13 01:06:47 moon charon: 04[KNL] migrate ESP 2001:1::1...2001:1::10 to 2001:1::1...2001::18d9:88ff:fe7d:36b3, reqid {2} |
819 | 1 | Andreas Steffen | Nov 13 01:06:47 moon charon: 04[KNL] creating migrate job for policy ::/0 === 2001:1::10/128 out with reqid {2} |
820 | 1 | Andreas Steffen | Nov 13 01:06:47 moon charon: 39[JOB] no CHILD_SA found with reqid {2} |
821 | 1 | Andreas Steffen | Nov 13 01:06:47 moon charon: 05[KNL] fe80::b8d5:baff:feea:d493 appeared on ip6tnl1 |
822 | 1 | Andreas Steffen | |
823 | 1 | Andreas Steffen | Nov 13 01:06:47 moon charon: 40[NET] received packet: from 2001::18d9:88ff:fe7d:36b3[500] to 2001:1::1[500] |
824 | 1 | Andreas Steffen | Nov 13 01:06:47 moon charon: 40[ENC] parsed CREATE_CHILD_SA request 2 [ SA No KE TSi TSr ] |
825 | 1 | Andreas Steffen | Nov 13 01:06:47 moon charon: 40[KNL] getting SPI for reqid {2} |
826 | 1 | Andreas Steffen | Nov 13 01:06:47 moon charon: 40[KNL] got SPI c0f90752 for reqid {2} |
827 | 1 | Andreas Steffen | Nov 13 01:06:47 moon charon: 40[KNL] adding SAD entry with SPI c0f90752 and reqid {2} |
828 | 1 | Andreas Steffen | Nov 13 01:06:47 moon charon: 40[KNL] using encryption algorithm AES_CBC with key size 128 |
829 | 1 | Andreas Steffen | Nov 13 01:06:47 moon charon: 40[KNL] using integrity algorithm HMAC_SHA1_96 with key size 160 |
830 | 1 | Andreas Steffen | Nov 13 01:06:47 moon charon: 40[KNL] adding SAD entry with SPI c4f98106 and reqid {2} |
831 | 1 | Andreas Steffen | Nov 13 01:06:47 moon charon: 40[KNL] using encryption algorithm AES_CBC with key size 128 |
832 | 1 | Andreas Steffen | Nov 13 01:06:47 moon charon: 40[KNL] using integrity algorithm HMAC_SHA1_96 with key size 160 |
833 | 1 | Andreas Steffen | Nov 13 01:06:47 moon charon: 40[IKE] CHILD_SA carol-tunnel{2} established with SPIs c0f90752_i c4f98106_o and TS ::/0 === 2001:1::10/128 |
834 | 1 | Andreas Steffen | Nov 13 01:06:47 moon charon: 40[ENC] generating CREATE_CHILD_SA response 2 [ SA No KE TSi TSr ] |
835 | 1 | Andreas Steffen | Nov 13 01:06:47 moon charon: 40[NET] sending packet: from 2001:1::1[500] to 2001::18d9:88ff:fe7d:36b3[500] |
836 | 1 | Andreas Steffen | }}} |