Project

General

Profile

Mobile IPv6 HOWTO » History » Version 4

Andreas Steffen, 20.11.2008 00:32
Created links to HomeAgent and MobileNode setup

1 2 Andreas Steffen
[[TOC(heading=Mobile IPv6)]]
2 1 Andreas Steffen
= Mobile IPv6 =
3 1 Andreas Steffen
4 3 Andreas Steffen
Starting with version 4.2.9, strongSwan can be used to secure the Mobile IPv6 Binding Update messages and all payload traffic between a Mobile Node (MN) and its Home Agent (HA) using an IPsec transport and an IPsec tunnel Security Association (SA), respectively. For the installation and configuration of the IPsec-enabled Mobile IPv6 '''mip6d''' daemon consult Arnaud Ebalard's fine [http://www.natisbad.org/MIPv6/ MIPv6 site].
5 1 Andreas Steffen
6 4 Andreas Steffen
 * [HomeAgentSetup Home Agent setup]
7 4 Andreas Steffen
 * [MobileNodeSetup Mobile Node setup]
8 1 Andreas Steffen
9 4 Andreas Steffen
10 1 Andreas Steffen
=== /etc/mip6d.conf ===
11 1 Andreas Steffen
12 1 Andreas Steffen
{{{
13 1 Andreas Steffen
NodeConfig MN;
14 1 Andreas Steffen
15 1 Andreas Steffen
UseMnHaIPsec enabled;
16 1 Andreas Steffen
KeyMngMobCapability enabled;
17 1 Andreas Steffen
DoRouteOptimizationMN disabled;
18 1 Andreas Steffen
 
19 1 Andreas Steffen
Interface "eth0";
20 1 Andreas Steffen
21 1 Andreas Steffen
MnHomeLink "eth0" {
22 1 Andreas Steffen
    HomeAgentAddress 2001:1::1;
23 1 Andreas Steffen
    HomeAddress 2001:1::10/64;
24 1 Andreas Steffen
}
25 1 Andreas Steffen
 
26 1 Andreas Steffen
IPsecPolicySet {
27 1 Andreas Steffen
    HomeAgentAddress 2001:1::1;
28 1 Andreas Steffen
    HomeAddress 2001:1::10/64;
29 1 Andreas Steffen
 
30 1 Andreas Steffen
    IPsecPolicy Mh UseESP 1;
31 1 Andreas Steffen
    IPsecPolicy TunnelPayload UseESP 2;
32 1 Andreas Steffen
}
33 1 Andreas Steffen
}}}
34 1 Andreas Steffen
35 1 Andreas Steffen
=== /etc/ipsec.conf ===
36 1 Andreas Steffen
37 1 Andreas Steffen
{{{
38 1 Andreas Steffen
config setup
39 1 Andreas Steffen
        crlcheckinterval=180
40 1 Andreas Steffen
        plutostart=no
41 1 Andreas Steffen
        charondebug="knl 2"
42 1 Andreas Steffen
43 1 Andreas Steffen
conn %default
44 1 Andreas Steffen
        keyexchange=ikev2
45 1 Andreas Steffen
        reauth=no
46 1 Andreas Steffen
        mobike=no
47 1 Andreas Steffen
        installpolicy=no
48 1 Andreas Steffen
49 1 Andreas Steffen
conn mh
50 1 Andreas Steffen
        also=home
51 1 Andreas Steffen
        rightsubnet=2001:1::1/128
52 1 Andreas Steffen
        leftprotoport=135/0
53 1 Andreas Steffen
        rightprotoport=135/0
54 1 Andreas Steffen
        type=transport_proxy
55 1 Andreas Steffen
        auto=route
56 1 Andreas Steffen
57 1 Andreas Steffen
conn tunnel
58 1 Andreas Steffen
        also=home
59 1 Andreas Steffen
        rightsubnet=::/0
60 1 Andreas Steffen
        auto=route
61 1 Andreas Steffen
62 1 Andreas Steffen
conn home
63 1 Andreas Steffen
        leftcert=carolCert.pem
64 1 Andreas Steffen
        leftid=carol@strongswan.org
65 1 Andreas Steffen
        leftsubnet=2001:1::10/128
66 1 Andreas Steffen
        right=2001:1::1
67 1 Andreas Steffen
        rightid=moon.strongswan.org
68 1 Andreas Steffen
        ike=aes128-sha1-modp2048!
69 1 Andreas Steffen
        esp=aes128-sha1-modp2048!
70 1 Andreas Steffen
}}}
71 1 Andreas Steffen
72 3 Andreas Steffen
Start strongSwan first and the IPsec connection definitions will be loaded and routed:
73 1 Andreas Steffen
74 3 Andreas Steffen
75 1 Andreas Steffen
{{{
76 3 Andreas Steffen
ipsec start
77 3 Andreas Steffen
78 3 Andreas Steffen
Nov 19 08:39:19 carol charon: 01[DMN] starting charon (strongSwan Version 4.2.9)
79 3 Andreas Steffen
Nov 19 08:39:19 carol charon: 01[CFG] loading ca certificates from '/etc/ipsec.d/cacerts'
80 3 Andreas Steffen
Nov 19 08:39:19 carol charon: 01[LIB]   loaded certificate file '/etc/ipsec.d/cacerts/strongswanCert.pem'
81 3 Andreas Steffen
Nov 19 08:39:19 carol charon: 01[CFG] loading aa certificates from '/etc/ipsec.d/aacerts'
82 3 Andreas Steffen
Nov 19 08:39:19 carol charon: 01[CFG] loading ocsp signer certificates from '/etc/ipsec.d/ocspcerts'
83 3 Andreas Steffen
Nov 19 08:39:19 carol charon: 01[CFG] loading attribute certificates from '/etc/ipsec.d/acerts'
84 3 Andreas Steffen
Nov 19 08:39:19 carol charon: 01[CFG] loading crls from '/etc/ipsec.d/crls'
85 3 Andreas Steffen
Nov 19 08:39:19 carol charon: 01[LIB]   loaded crl file '/etc/ipsec.d/crls/strongswan.crl'
86 3 Andreas Steffen
Nov 19 08:39:19 carol charon: 01[CFG] loading secrets from '/etc/ipsec.secrets'
87 3 Andreas Steffen
Nov 19 08:39:19 carol charon: 01[CFG]   loaded private key file '/etc/ipsec.d/private/carolKey.pem'
88 3 Andreas Steffen
Nov 19 08:39:19 carol charon: 01[DMN] loaded plugins: curl aes des sha1 sha2 md5 gmp random x509 pubkey hmac xcbc stroke kernel-netlink 
89 3 Andreas Steffen
Nov 19 08:39:19 carol charon: 01[KNL] listening on interfaces:
90 3 Andreas Steffen
Nov 19 08:39:19 carol charon: 01[KNL]   eth0
91 3 Andreas Steffen
Nov 19 08:39:19 carol charon: 01[KNL]     192.168.0.100
92 3 Andreas Steffen
Nov 19 08:39:19 carol charon: 01[KNL]     2001::41a:a8ff:fe6f:c67
93 3 Andreas Steffen
Nov 19 08:39:19 carol charon: 01[KNL]     fec0::41a:a8ff:fe6f:c67
94 3 Andreas Steffen
Nov 19 08:39:19 carol charon: 01[KNL]     fe80::41a:a8ff:fe6f:c67
95 3 Andreas Steffen
Nov 19 08:39:19 carol charon: 01[JOB] spawning 16 worker threads
96 3 Andreas Steffen
Nov 19 08:39:19 carol charon: 08[CFG] crl caching to /etc/ipsec.d/crls enabled
97 3 Andreas Steffen
98 3 Andreas Steffen
Nov 19 08:39:19 carol charon: 10[CFG] received stroke: add connection 'mh'
99 3 Andreas Steffen
Nov 19 08:39:19 carol charon: 10[KNL] getting interface name for 2001:1::1
100 3 Andreas Steffen
Nov 19 08:39:19 carol charon: 10[KNL] 2001:1::1 is not a local address
101 3 Andreas Steffen
Nov 19 08:39:19 carol charon: 10[KNL] getting interface name for %any
102 3 Andreas Steffen
Nov 19 08:39:19 carol charon: 10[KNL] %any is not a local address
103 3 Andreas Steffen
Nov 19 08:39:19 carol charon: 10[CFG] left nor right host is our side, assuming left=local
104 3 Andreas Steffen
Nov 19 08:39:19 carol charon: 10[LIB]   loaded certificate file '/etc/ipsec.d/certs/carolCert.pem'
105 3 Andreas Steffen
Nov 19 08:39:19 carol charon: 10[CFG] added configuration 'mh': %any[carol@strongswan.org]...2001:1::1[moon.strongswan.org]
106 3 Andreas Steffen
Nov 19 08:39:19 carol charon: 09[CFG] received stroke: route 'mh'
107 3 Andreas Steffen
Nov 19 08:39:19 carol charon: 11[KNL] getting address to reach 2001:1::1
108 3 Andreas Steffen
Nov 19 08:39:19 carol charon: 11[CHD] my address: 2001::41a:a8ff:fe6f:c67 is a transport mode proxy for 2001:1::10
109 3 Andreas Steffen
Nov 19 08:39:19 carol charon: 11[IKE] CHILD_SA routed
110 3 Andreas Steffen
111 3 Andreas Steffen
Nov 19 08:39:19 carol charon: 14[CFG] received stroke: add connection 'tunnel'
112 3 Andreas Steffen
Nov 19 08:39:19 carol charon: 14[KNL] getting interface name for 2001:1::1
113 3 Andreas Steffen
Nov 19 08:39:19 carol charon: 14[KNL] 2001:1::1 is not a local address
114 3 Andreas Steffen
Nov 19 08:39:19 carol charon: 14[KNL] getting interface name for %any
115 3 Andreas Steffen
Nov 19 08:39:19 carol charon: 14[KNL] %any is not a local address
116 3 Andreas Steffen
Nov 19 08:39:19 carol charon: 14[CFG] left nor right host is our side, assuming left=local
117 3 Andreas Steffen
Nov 19 08:39:19 carol charon: 14[LIB]   loaded certificate file '/etc/ipsec.d/certs/carolCert.pem'
118 3 Andreas Steffen
Nov 19 08:39:19 carol charon: 14[CFG] added child to existing configuration 'mh'
119 3 Andreas Steffen
Nov 19 08:39:19 carol charon: 17[CFG] received stroke: route 'tunnel'
120 3 Andreas Steffen
Nov 19 08:39:19 carol charon: 10[KNL] getting address to reach 2001:1::1
121 3 Andreas Steffen
Nov 19 08:39:19 carol charon: 10[IKE] CHILD_SA routed
122 3 Andreas Steffen
}}}
123 3 Andreas Steffen
124 3 Andreas Steffen
Next the MIPv6 daemon is activated
125 3 Andreas Steffen
126 3 Andreas Steffen
{{{
127 3 Andreas Steffen
/etc/init.d/mip6d start
128 3 Andreas Steffen
129 3 Andreas Steffen
Nov 19 08:39:23 carol mip6d[1317]: MIPL Mobile IPv6 for Linux v2.0.2-umip-0.4 started (Mobile Node)
130 3 Andreas Steffen
Nov 19 08:39:23 carol charon: 05[KNL] interface ip6tnl1 activated
131 3 Andreas Steffen
Nov 19 08:39:23 carol charon: 05[KNL] 2001:1::10 appeared on ip6tnl1
132 3 Andreas Steffen
}}}
133 3 Andreas Steffen
134 3 Andreas Steffen
which triggers strongSwan to automatically sets up the IPsec transport SA for the Binding Update messages
135 3 Andreas Steffen
136 3 Andreas Steffen
{{{
137 3 Andreas Steffen
Nov 19 08:39:23 carol charon: 04[KNL] received a XFRM_MSG_MIGRATE
138 3 Andreas Steffen
Nov 19 08:39:23 carol charon: 04[KNL]   policy: 2001:1::10/128[135] === 2001:1::1/128[135] in
139 3 Andreas Steffen
Nov 19 08:39:23 carol charon: 04[KNL]   XFRMA_KMADDRESS
140 3 Andreas Steffen
Nov 19 08:39:23 carol charon: 04[KNL]   kmaddress: 2001::41a:a8ff:fe6f:c67...2001:1::1
141 3 Andreas Steffen
Nov 19 08:39:23 carol charon: 04[KNL]   XFRMA_POLICY_TYPE
142 3 Andreas Steffen
Nov 19 08:39:23 carol charon: 04[KNL]   XFRMA_MIGRATE
143 3 Andreas Steffen
Nov 19 08:39:23 carol charon: 04[KNL]   migrate ESP %any...%any to 2001::41a:a8ff:fe6f:c67...2001:1::1, reqid {1}
144 3 Andreas Steffen
Nov 19 08:39:23 carol charon: 04[KNL] creating migrate job for policy 2001:1::10/128[135] === 2001:1::1/128[135] out with reqid {1}
145 3 Andreas Steffen
146 3 Andreas Steffen
Nov 19 08:39:23 carol charon: 04[KNL] received a XFRM_MSG_MIGRATE
147 3 Andreas Steffen
Nov 19 08:39:23 carol charon: 04[KNL]   policy: 2001:1::1/128[135] === 2001:1::10/128[135] out
148 3 Andreas Steffen
Nov 19 08:39:23 carol charon: 04[KNL]   XFRMA_KMADDRESS
149 3 Andreas Steffen
Nov 19 08:39:23 carol charon: 04[KNL]   kmaddress: 2001::41a:a8ff:fe6f:c67...2001:1::1
150 3 Andreas Steffen
Nov 19 08:39:23 carol charon: 04[KNL]   XFRMA_POLICY_TYPE
151 3 Andreas Steffen
Nov 19 08:39:23 carol charon: 04[KNL]   XFRMA_MIGRATE
152 3 Andreas Steffen
Nov 19 08:39:23 carol charon: 04[KNL]   migrate ESP %any...%any to 2001:1::1...2001::41a:a8ff:fe6f:c67, reqid {1}
153 3 Andreas Steffen
Nov 19 08:39:23 carol charon: 04[KNL] creating migrate job for policy 2001:1::1/128[135] === 2001:1::10/128[135] in with reqid {1}
154 3 Andreas Steffen
155 3 Andreas Steffen
Nov 19 08:39:23 carol charon: 04[KNL] received a XFRM_MSG_MIGRATE
156 3 Andreas Steffen
Nov 19 08:39:23 carol charon: 04[KNL]   policy: 2001:1::10/128 === ::/0 in
157 3 Andreas Steffen
Nov 19 08:39:23 carol charon: 04[KNL]   XFRMA_KMADDRESS
158 3 Andreas Steffen
Nov 19 08:39:23 carol charon: 04[KNL]   kmaddress: 2001::41a:a8ff:fe6f:c67...2001:1::1
159 3 Andreas Steffen
Nov 19 08:39:23 carol charon: 04[KNL]   XFRMA_POLICY_TYPE
160 3 Andreas Steffen
Nov 19 08:39:23 carol charon: 04[KNL]   XFRMA_MIGRATE
161 3 Andreas Steffen
Nov 19 08:39:23 carol charon: 04[KNL]   migrate ESP 2001:1::10...2001:1::1 to 2001::41a:a8ff:fe6f:c67...2001:1::1, reqid {2}
162 3 Andreas Steffen
Nov 19 08:39:23 carol charon: 04[KNL] creating migrate job for policy 2001:1::10/128 === ::/0 out with reqid {2}
163 3 Andreas Steffen
164 3 Andreas Steffen
Nov 19 08:39:23 carol charon: 04[KNL] received a XFRM_MSG_MIGRATE
165 3 Andreas Steffen
Nov 19 08:39:23 carol charon: 04[KNL]   policy: ::/0 === 2001:1::10/128 out
166 3 Andreas Steffen
Nov 19 08:39:23 carol charon: 04[KNL]   XFRMA_KMADDRESS
167 3 Andreas Steffen
Nov 19 08:39:23 carol charon: 04[KNL]   kmaddress: 2001::41a:a8ff:fe6f:c67...2001:1::1
168 3 Andreas Steffen
Nov 19 08:39:23 carol charon: 04[KNL]   XFRMA_POLICY_TYPE
169 3 Andreas Steffen
Nov 19 08:39:23 carol charon: 04[KNL]   XFRMA_MIGRATE
170 3 Andreas Steffen
Nov 19 08:39:23 carol charon: 04[KNL]   migrate ESP 2001:1::1...2001:1::10 to 2001:1::1...2001::41a:a8ff:fe6f:c67, reqid {2}
171 3 Andreas Steffen
Nov 19 08:39:23 carol charon: 04[KNL] creating migrate job for policy ::/0 === 2001:1::10/128 in with reqid {2}
172 3 Andreas Steffen
173 3 Andreas Steffen
Nov 19 08:39:23 carol charon: 04[KNL] received a XFRM_MSG_ACQUIRE
174 3 Andreas Steffen
Nov 19 08:39:23 carol charon: 04[KNL]   XFRMA_TMPL
175 3 Andreas Steffen
Nov 19 08:39:23 carol charon: 04[KNL]   XFRMA_POLICY_TYPE
176 3 Andreas Steffen
Nov 19 08:39:23 carol charon: 04[KNL] creating acquire job for policy 2001:1::10/128[135/5] === 2001:1::1/128[135] with reqid {1}
177 3 Andreas Steffen
Nov 19 08:39:23 carol charon: 09[IKE] initiating IKE_SA mh[1] to 2001:1::1
178 3 Andreas Steffen
Nov 19 08:39:23 carol charon: 09[ENC] generating IKE_SA_INIT request 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) ]
179 3 Andreas Steffen
Nov 19 08:39:23 carol charon: 09[NET] sending packet: from 2001::41a:a8ff:fe6f:c67[500] to 2001:1::1[500]
180 3 Andreas Steffen
Nov 19 08:39:23 carol charon: 16[KNL] getting address to reach 2001:1::1
181 3 Andreas Steffen
Nov 19 08:39:23 carol charon: 12[NET] received packet: from 2001:1::1[500] to 2001::41a:a8ff:fe6f:c67[500]
182 3 Andreas Steffen
Nov 19 08:39:23 carol charon: 12[ENC] parsed IKE_SA_INIT response 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) CERTREQ ]
183 3 Andreas Steffen
Nov 19 08:39:23 carol charon: 12[IKE] received cert request for "C=CH, O=Linux strongSwan, CN=strongSwan Root CA"
184 3 Andreas Steffen
Nov 19 08:39:23 carol charon: 12[IKE] sending cert request for "C=CH, O=Linux strongSwan, CN=strongSwan Root CA"
185 3 Andreas Steffen
Nov 19 08:39:23 carol charon: 12[IKE] authentication of 'carol@strongswan.org' (myself) with RSA signature successful
186 3 Andreas Steffen
Nov 19 08:39:23 carol charon: 12[IKE] sending end entity cert "C=CH, O=Linux strongSwan, OU=Research, CN=carol@strongswan.org"
187 3 Andreas Steffen
Nov 19 08:39:23 carol charon: 12[IKE] establishing CHILD_SA mh{1}
188 3 Andreas Steffen
Nov 19 08:39:23 carol charon: 12[CHD] my address: 2001::41a:a8ff:fe6f:c67 is a transport mode proxy for 2001:1::10
189 3 Andreas Steffen
Nov 19 08:39:23 carol charon: 12[KNL] getting SPI for reqid {1}
190 3 Andreas Steffen
Nov 19 08:39:23 carol charon: 12[KNL] got SPI c5959ac2 for reqid {1}
191 3 Andreas Steffen
Nov 19 08:39:23 carol charon: 12[ENC] generating IKE_AUTH request 1 [ IDi CERT CERTREQ IDr AUTH N(USE_TRANSP) SA TSi TSr ]
192 3 Andreas Steffen
Nov 19 08:39:23 carol charon: 12[NET] sending packet: from 2001::41a:a8ff:fe6f:c67[500] to 2001:1::1[500]
193 3 Andreas Steffen
Nov 19 08:39:23 carol charon: 14[NET] received packet: from 2001:1::1[500] to 2001::41a:a8ff:fe6f:c67[500]
194 3 Andreas Steffen
Nov 19 08:39:23 carol charon: 14[ENC] parsed IKE_AUTH response 1 [ IDr CERT AUTH N(USE_TRANSP) SA TSi TSr ]
195 3 Andreas Steffen
Nov 19 08:39:23 carol charon: 14[IKE] received end entity cert "C=CH, O=Linux strongSwan, CN=moon.strongswan.org"
196 3 Andreas Steffen
Nov 19 08:39:23 carol charon: 14[CFG]   using certificate "C=CH, O=Linux strongSwan, CN=moon.strongswan.org"
197 3 Andreas Steffen
Nov 19 08:39:23 carol charon: 14[CFG]   using trusted ca certificate "C=CH, O=Linux strongSwan, CN=strongSwan Root CA"
198 3 Andreas Steffen
Nov 19 08:39:23 carol charon: 14[CFG] checking certificate status of "C=CH, O=Linux strongSwan, CN=moon.strongswan.org"
199 3 Andreas Steffen
Nov 19 08:39:23 carol charon: 14[CFG]   using trusted certificate "C=CH, O=Linux strongSwan, CN=strongSwan Root CA"
200 3 Andreas Steffen
Nov 19 08:39:23 carol charon: 14[CFG]   crl correctly signed by "C=CH, O=Linux strongSwan, CN=strongSwan Root CA"
201 3 Andreas Steffen
Nov 19 08:39:23 carol charon: 14[CFG]   crl is valid: until Dec 13 07:58:20 2008
202 3 Andreas Steffen
Nov 19 08:39:23 carol charon: 14[CFG]   using cached crl
203 3 Andreas Steffen
Nov 19 08:39:23 carol charon: 14[CFG] certificate status is good
204 3 Andreas Steffen
Nov 19 08:39:23 carol charon: 14[IKE] authentication of 'moon.strongswan.org' with RSA signature successful
205 3 Andreas Steffen
Nov 19 08:39:23 carol charon: 14[IKE] scheduling rekeying in 3327s
206 3 Andreas Steffen
Nov 19 08:39:23 carol charon: 14[IKE] maximum IKE_SA lifetime 3507s
207 3 Andreas Steffen
Nov 19 08:39:23 carol charon: 14[IKE] IKE_SA mh[1] established between 2001::41a:a8ff:fe6f:c67[carol@strongswan.org]...2001:1::1[moon.strongswan.org]
208 3 Andreas Steffen
Nov 19 08:39:23 carol charon: 14[KNL] adding SAD entry with SPI ca64ae98 and reqid {1}
209 3 Andreas Steffen
Nov 19 08:39:23 carol charon: 14[KNL]   using encryption algorithm AES_CBC with key size 128
210 3 Andreas Steffen
Nov 19 08:39:23 carol charon: 14[KNL]   using integrity algorithm HMAC_SHA1_96 with key size 160
211 3 Andreas Steffen
Nov 19 08:39:23 carol charon: 14[KNL] adding SAD entry with SPI c5959ac2 and reqid {1}
212 3 Andreas Steffen
Nov 19 08:39:23 carol charon: 14[KNL]   using encryption algorithm AES_CBC with key size 128
213 3 Andreas Steffen
Nov 19 08:39:23 carol charon: 14[KNL]   using integrity algorithm HMAC_SHA1_96 with key size 160
214 3 Andreas Steffen
Nov 19 08:39:23 carol charon: 14[IKE] CHILD_SA mh{1} established with SPIs c5959ac2_i ca64ae98_o and TS 2001:1::10/128[135] === 2001:1::1/128[135] 
215 3 Andreas Steffen
}}}
216 3 Andreas Steffen
217 3 Andreas Steffen
and right after that the IPsec tunnel SA for the payload between the MN and the HA is created.
218 3 Andreas Steffen
219 3 Andreas Steffen
{{{
220 3 Andreas Steffen
Nov 19 08:39:24 carol charon: 04[KNL] received a XFRM_MSG_ACQUIRE
221 3 Andreas Steffen
Nov 19 08:39:24 carol charon: 04[KNL]   XFRMA_TMPL
222 3 Andreas Steffen
Nov 19 08:39:24 carol charon: 04[KNL]   XFRMA_POLICY_TYPE
223 3 Andreas Steffen
Nov 19 08:39:24 carol charon: 04[KNL] creating acquire job for policy 2001:1::10/128[ipv6-icmp/146] === 2001:1::1/128[ipv6-icmp] with reqid {2}
224 3 Andreas Steffen
Nov 19 08:39:24 carol charon: 17[IKE] establishing CHILD_SA tunnel{2}
225 3 Andreas Steffen
Nov 19 08:39:24 carol charon: 17[KNL] getting SPI for reqid {2}
226 3 Andreas Steffen
Nov 19 08:39:24 carol charon: 17[KNL] got SPI ce4db893 for reqid {2}
227 3 Andreas Steffen
Nov 19 08:39:24 carol charon: 17[ENC] generating CREATE_CHILD_SA request 2 [ SA No KE TSi TSr ]
228 3 Andreas Steffen
Nov 19 08:39:24 carol charon: 17[NET] sending packet: from 2001::41a:a8ff:fe6f:c67[500] to 2001:1::1[500]
229 3 Andreas Steffen
Nov 19 08:39:24 carol charon: 11[NET] received packet: from 2001:1::1[500] to 2001::41a:a8ff:fe6f:c67[500]
230 3 Andreas Steffen
Nov 19 08:39:24 carol charon: 11[ENC] parsed CREATE_CHILD_SA response 2 [ SA No KE TSi TSr ]
231 3 Andreas Steffen
Nov 19 08:39:25 carol charon: 11[KNL] adding SAD entry with SPI c190d5ba and reqid {2}
232 3 Andreas Steffen
Nov 19 08:39:25 carol charon: 11[KNL]   using encryption algorithm AES_CBC with key size 128
233 3 Andreas Steffen
Nov 19 08:39:25 carol charon: 11[KNL]   using integrity algorithm HMAC_SHA1_96 with key size 160
234 3 Andreas Steffen
Nov 19 08:39:25 carol charon: 11[KNL] adding SAD entry with SPI ce4db893 and reqid {2}
235 3 Andreas Steffen
Nov 19 08:39:25 carol charon: 11[KNL]   using encryption algorithm AES_CBC with key size 128
236 3 Andreas Steffen
Nov 19 08:39:25 carol charon: 11[KNL]   using integrity algorithm HMAC_SHA1_96 with key size 160
237 3 Andreas Steffen
Nov 19 08:39:25 carol charon: 11[IKE] CHILD_SA tunnel{2} established with SPIs ce4db893_i c190d5ba_o and TS 2001:1::10/128 === ::/0 
238 3 Andreas Steffen
}}}
239 3 Andreas Steffen
240 3 Andreas Steffen
=== MN status information after establishment ===
241 3 Andreas Steffen
242 3 Andreas Steffen
{{{
243 3 Andreas Steffen
ipsec statusall
244 3 Andreas Steffen
245 1 Andreas Steffen
Performance:
246 3 Andreas Steffen
  uptime: 50 seconds, since Nov 19 08:39:19 2008
247 1 Andreas Steffen
  worker threads: 9 idle of 16, job queue load: 0, scheduled events: 2
248 1 Andreas Steffen
  loaded plugins: curl aes des sha1 sha2 md5 gmp random x509 pubkey hmac xcbc stroke kernel-netlink 
249 1 Andreas Steffen
Listening IP addresses:
250 1 Andreas Steffen
  192.168.0.100
251 3 Andreas Steffen
  2001::41a:a8ff:fe6f:c67
252 3 Andreas Steffen
  fec0::41a:a8ff:fe6f:c67
253 1 Andreas Steffen
  2001:1::10
254 1 Andreas Steffen
Connections:
255 1 Andreas Steffen
          mh:  %any[carol@strongswan.org]...2001:1::1[moon.strongswan.org]
256 1 Andreas Steffen
          mh:  CAs: "C=CH, O=Linux strongSwan, CN=strongSwan Root CA"...%any
257 1 Andreas Steffen
          mh:  public key authentication
258 1 Andreas Steffen
          mh:    2001:1::10/128[135] === 2001:1::1/128[135] 
259 1 Andreas Steffen
      tunnel:    2001:1::10/128 === ::/0 
260 1 Andreas Steffen
Security Associations:
261 3 Andreas Steffen
          mh[1]: ESTABLISHED, 2001::41a:a8ff:fe6f:c67[carol@strongswan.org]...2001:1::1[moon.strongswan.org]
262 3 Andreas Steffen
          mh[1]: IKE SPIs: 58b6f8e6f23188fa_i* 63fdcfb55179c548_r, rekeying in 54 minutes
263 1 Andreas Steffen
          mh[1]: IKE proposal: AES_CBC-128/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_2048_BIT
264 3 Andreas Steffen
          mh{1}:  ROUTED, TRANSPORT_PROXY
265 1 Andreas Steffen
          mh{1}:   2001:1::10/128[135] === 2001:1::1/128[135] 
266 1 Andreas Steffen
      tunnel{2}:  ROUTED, TUNNEL
267 1 Andreas Steffen
      tunnel{2}:   2001:1::10/128 === ::/0 
268 3 Andreas Steffen
          mh{1}:  INSTALLED, TRANSPORT_PROXY, ESP SPIs: c5959ac2_i ca64ae98_o
269 3 Andreas Steffen
          mh{1}:  AES_CBC-128/HMAC_SHA1_96, rekeying in 16 minutes, last use: 45s_i no_o 
270 1 Andreas Steffen
          mh{1}:   2001:1::10/128[135] === 2001:1::1/128[135] 
271 3 Andreas Steffen
      tunnel{2}:  INSTALLED, TUNNEL, ESP SPIs: ce4db893_i c190d5ba_o
272 3 Andreas Steffen
      tunnel{2}:  AES_CBC-128/HMAC_SHA1_96, rekeying in 16 minutes, last use: 6s_i 6s_o 
273 1 Andreas Steffen
      tunnel{2}:   2001:1::10/128 === ::/0 
274 1 Andreas Steffen
}}}
275 1 Andreas Steffen
276 3 Andreas Steffen
The IPsec policy in the kernel
277 1 Andreas Steffen
278 1 Andreas Steffen
{{{
279 3 Andreas Steffen
ip xfrm policy
280 3 Andreas Steffen
281 1 Andreas Steffen
src 2001:1::1/128 dst 2001:1::10/128 proto 135 
282 1 Andreas Steffen
        dir in priority 2 ptype main 
283 1 Andreas Steffen
        tmpl src :: dst ::
284 1 Andreas Steffen
                proto esp reqid 1 mode transport
285 1 Andreas Steffen
286 1 Andreas Steffen
src 2001:1::10/128 dst 2001:1::1/128 proto 135 
287 1 Andreas Steffen
        dir out priority 2 ptype main 
288 1 Andreas Steffen
        tmpl src :: dst ::
289 1 Andreas Steffen
                proto esp reqid 1 mode transport
290 1 Andreas Steffen
291 1 Andreas Steffen
src ::/0 dst 2001:1::10/128 
292 1 Andreas Steffen
        dir in priority 10 ptype main 
293 3 Andreas Steffen
        tmpl src 2001:1::1 dst 2001::41a:a8ff:fe6f:c67
294 1 Andreas Steffen
                proto esp reqid 2 mode tunnel
295 1 Andreas Steffen
296 1 Andreas Steffen
src 2001:1::10/128 dst ::/0 
297 1 Andreas Steffen
        dir out priority 10 ptype main 
298 3 Andreas Steffen
        tmpl src 2001::41a:a8ff:fe6f:c67 dst 2001:1::1
299 1 Andreas Steffen
                proto esp reqid 2 mode tunnel
300 3 Andreas Steffen
301 1 Andreas Steffen
}}}
302 1 Andreas Steffen
303 1 Andreas Steffen
and the IPsec state in the kernel
304 4 Andreas Steffen
305 1 Andreas Steffen
306 1 Andreas Steffen
{{{
307 3 Andreas Steffen
ip xfrm state
308 3 Andreas Steffen
309 3 Andreas Steffen
src 2001:1::10 dst 2001:1::1
310 3 Andreas Steffen
        proto hao reqid 0 mode ro
311 3 Andreas Steffen
        replay-window 0 
312 3 Andreas Steffen
        coa 2001::41a:a8ff:fe6f:c67
313 3 Andreas Steffen
        lastused 2008-11-19 08:39:25
314 3 Andreas Steffen
        sel src 2001:1::10/128 dst 2001:1::1/128 
315 3 Andreas Steffen
316 3 Andreas Steffen
src 2001:1::10 dst 2001:1::1
317 3 Andreas Steffen
        proto esp spi 0xca64ae98 reqid 1 mode transport
318 3 Andreas Steffen
        replay-window 32 
319 3 Andreas Steffen
        auth hmac(sha1) 0x419c41d8807fb521e947988cef4a6181d810b611
320 3 Andreas Steffen
        enc cbc(aes) 0xed90ae3f4f12a697f40cce1893b54e20
321 3 Andreas Steffen
        sel src ::/0 dst ::/0 
322 3 Andreas Steffen
323 3 Andreas Steffen
src 2001:1::1 dst 2001:1::10
324 3 Andreas Steffen
        proto esp spi 0xc5959ac2 reqid 1 mode transport
325 3 Andreas Steffen
        replay-window 32 
326 3 Andreas Steffen
        auth hmac(sha1) 0xea26afc566143c25959a060c90be3053c50ddcff
327 3 Andreas Steffen
        enc cbc(aes) 0x0bd5bd34d5523c0929f2efd7a7c93359
328 3 Andreas Steffen
        sel src ::/0 dst ::/0 
329 3 Andreas Steffen
330 3 Andreas Steffen
src 2001::41a:a8ff:fe6f:c67 dst 2001:1::1
331 3 Andreas Steffen
        proto esp spi 0xc190d5ba reqid 2 mode tunnel
332 3 Andreas Steffen
        replay-window 32 flag 20
333 3 Andreas Steffen
        auth hmac(sha1) 0x672c1ea4359956c6a3b869b388b424b7058eee02
334 3 Andreas Steffen
        enc cbc(aes) 0xaaf5be1d604e64028d4e0a41f0d92b56
335 3 Andreas Steffen
336 3 Andreas Steffen
src 2001:1::1 dst 2001::41a:a8ff:fe6f:c67
337 3 Andreas Steffen
        proto esp spi 0xce4db893 reqid 2 mode tunnel
338 3 Andreas Steffen
        replay-window 32 flag 20
339 3 Andreas Steffen
        auth hmac(sha1) 0xdf1eeff5b86dfbd183c7a932c8250fc57d9632af
340 3 Andreas Steffen
        enc cbc(aes) 0x4d138f1363c1810f8c9cb2fcb1ee8bdf
341 3 Andreas Steffen
}}}
342 3 Andreas Steffen
343 3 Andreas Steffen
=== Migration of the Care-of-Address ===
344 3 Andreas Steffen
345 3 Andreas Steffen
After some time the MN changes its Care-of-Address (CoA) to 2001::50
346 3 Andreas Steffen
347 3 Andreas Steffen
{{{
348 3 Andreas Steffen
349 3 Andreas Steffen
Nov 19 08:41:43 carol charon: 05[KNL] 2001::50 appeared on eth0
350 3 Andreas Steffen
Nov 19 08:41:43 carol charon: 12[KNL] getting address to reach 2001:1::1
351 3 Andreas Steffen
Nov 19 08:41:56 carol charon: 05[KNL] 2001::41a:a8ff:fe6f:c67 disappeared from eth0
352 3 Andreas Steffen
}}}
353 3 Andreas Steffen
354 3 Andreas Steffen
which causes the MIPv6 daemon to issue a MIGRATE message to strongSwan
355 3 Andreas Steffen
356 3 Andreas Steffen
{{{
357 3 Andreas Steffen
Nov 19 08:41:56 carol charon: 04[KNL] received a XFRM_MSG_MIGRATE
358 3 Andreas Steffen
Nov 19 08:41:56 carol charon: 04[KNL]   policy: 2001:1::10/128[135] === 2001:1::1/128[135] in
359 3 Andreas Steffen
Nov 19 08:41:56 carol charon: 04[KNL]   XFRMA_KMADDRESS
360 3 Andreas Steffen
Nov 19 08:41:56 carol charon: 04[KNL]   kmaddress: 2001::50...2001:1::1
361 3 Andreas Steffen
Nov 19 08:41:56 carol charon: 04[KNL]   XFRMA_POLICY_TYPE
362 3 Andreas Steffen
Nov 19 08:41:56 carol charon: 04[KNL]   XFRMA_MIGRATE
363 3 Andreas Steffen
Nov 19 08:41:56 carol charon: 04[KNL]   migrate ESP %any...%any to 2001::50...2001:1::1, reqid {1}
364 3 Andreas Steffen
Nov 19 08:41:56 carol charon: 04[KNL] creating migrate job for policy 2001:1::10/128[135] === 2001:1::1/128[135] out with reqid {1}
365 3 Andreas Steffen
366 3 Andreas Steffen
Nov 19 08:41:56 carol charon: 04[KNL] received a XFRM_MSG_MIGRATE
367 3 Andreas Steffen
Nov 19 08:41:56 carol charon: 04[KNL]   policy: 2001:1::1/128[135] === 2001:1::10/128[135] out
368 3 Andreas Steffen
Nov 19 08:41:56 carol charon: 04[KNL]   XFRMA_KMADDRESS
369 3 Andreas Steffen
Nov 19 08:41:56 carol charon: 04[KNL]   kmaddress: 2001::50...2001:1::1
370 3 Andreas Steffen
Nov 19 08:41:56 carol charon: 04[KNL]   XFRMA_POLICY_TYPE
371 3 Andreas Steffen
Nov 19 08:41:56 carol charon: 04[KNL]   XFRMA_MIGRATE
372 3 Andreas Steffen
Nov 19 08:41:56 carol charon: 04[KNL]   migrate ESP %any...%any to 2001:1::1...2001::50, reqid {1}
373 3 Andreas Steffen
Nov 19 08:41:56 carol charon: 04[KNL] creating migrate job for policy 2001:1::1/128[135] === 2001:1::10/128[135] in with reqid {1}
374 3 Andreas Steffen
375 3 Andreas Steffen
Nov 19 08:41:56 carol charon: 04[KNL] received a XFRM_MSG_MIGRATE
376 3 Andreas Steffen
Nov 19 08:41:56 carol charon: 04[KNL]   policy: 2001:1::10/128 === ::/0 in
377 3 Andreas Steffen
Nov 19 08:41:56 carol charon: 04[KNL]   XFRMA_KMADDRESS
378 3 Andreas Steffen
Nov 19 08:41:56 carol charon: 04[KNL]   kmaddress: 2001::50...2001:1::1
379 3 Andreas Steffen
Nov 19 08:41:56 carol charon: 04[KNL]   XFRMA_POLICY_TYPE
380 3 Andreas Steffen
Nov 19 08:41:56 carol charon: 04[KNL]   XFRMA_MIGRATE
381 3 Andreas Steffen
Nov 19 08:41:56 carol charon: 04[KNL]   migrate ESP 2001::41a:a8ff:fe6f:c67...2001:1::1 to 2001::50...2001:1::1, reqid {2}
382 3 Andreas Steffen
Nov 19 08:41:56 carol charon: 04[KNL] creating migrate job for policy 2001:1::10/128 === ::/0 out with reqid {2}
383 3 Andreas Steffen
384 3 Andreas Steffen
Nov 19 08:41:56 carol charon: 04[KNL] received a XFRM_MSG_MIGRATE
385 3 Andreas Steffen
Nov 19 08:41:56 carol charon: 04[KNL]   policy: ::/0 === 2001:1::10/128 out
386 3 Andreas Steffen
Nov 19 08:41:56 carol charon: 04[KNL]   XFRMA_KMADDRESS
387 3 Andreas Steffen
Nov 19 08:41:56 carol charon: 04[KNL]   kmaddress: 2001::50...2001:1::1
388 3 Andreas Steffen
Nov 19 08:41:56 carol charon: 04[KNL]   XFRMA_POLICY_TYPE
389 3 Andreas Steffen
Nov 19 08:41:56 carol charon: 04[KNL]   XFRMA_MIGRATE
390 3 Andreas Steffen
Nov 19 08:41:56 carol charon: 04[KNL]   migrate ESP 2001:1::1...2001::41a:a8ff:fe6f:c67 to 2001:1::1...2001::50, reqid {2}
391 3 Andreas Steffen
Nov 19 08:41:56 carol charon: 04[KNL] creating migrate job for policy ::/0 === 2001:1::10/128 in with reqid {2}
392 3 Andreas Steffen
}}}
393 3 Andreas Steffen
394 3 Andreas Steffen
The IKEv2 connection status after the CoA migration to 2001::50
395 3 Andreas Steffen
396 3 Andreas Steffen
{{{
397 3 Andreas Steffen
ipsec statusall
398 3 Andreas Steffen
399 3 Andreas Steffen
Performance:
400 3 Andreas Steffen
  uptime: 3 minutes, since Nov 19 08:39:19 2008
401 3 Andreas Steffen
  worker threads: 9 idle of 16, job queue load: 0, scheduled events: 2
402 3 Andreas Steffen
  loaded plugins: curl aes des sha1 sha2 md5 gmp random x509 pubkey hmac xcbc stroke kernel-netlink 
403 3 Andreas Steffen
Listening IP addresses:
404 3 Andreas Steffen
  192.168.0.100
405 3 Andreas Steffen
  fec0::41a:a8ff:fe6f:c67
406 3 Andreas Steffen
  2001::50
407 3 Andreas Steffen
  2001:1::10
408 3 Andreas Steffen
Connections:
409 3 Andreas Steffen
          mh:  %any[carol@strongswan.org]...2001:1::1[moon.strongswan.org]
410 3 Andreas Steffen
          mh:  CAs: "C=CH, O=Linux strongSwan, CN=strongSwan Root CA"...%any
411 3 Andreas Steffen
          mh:  public key authentication
412 3 Andreas Steffen
          mh:    2001:1::10/128[135] === 2001:1::1/128[135] 
413 3 Andreas Steffen
      tunnel:    2001:1::10/128 === ::/0 
414 3 Andreas Steffen
Security Associations:
415 3 Andreas Steffen
          mh[1]: ESTABLISHED, 2001::50[carol@strongswan.org]...2001:1::1[moon.strongswan.org]
416 3 Andreas Steffen
          mh[1]: IKE SPIs: 58b6f8e6f23188fa_i* 63fdcfb55179c548_r, rekeying in 52 minutes
417 3 Andreas Steffen
          mh[1]: IKE proposal: AES_CBC-128/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_2048_BIT
418 3 Andreas Steffen
          mh{1}:  ROUTED, TRANSPORT_PROXY
419 3 Andreas Steffen
          mh{1}:   2001:1::10/128[135] === 2001:1::1/128[135] 
420 3 Andreas Steffen
      tunnel{2}:  ROUTED, TUNNEL
421 3 Andreas Steffen
      tunnel{2}:   2001:1::10/128 === ::/0 
422 3 Andreas Steffen
          mh{1}:  INSTALLED, TRANSPORT_PROXY, ESP SPIs: c5959ac2_i ca64ae98_o
423 3 Andreas Steffen
          mh{1}:  AES_CBC-128/HMAC_SHA1_96, rekeying in 13 minutes, last use: 30s_i no_o 
424 3 Andreas Steffen
          mh{1}:   2001:1::10/128[135] === 2001:1::1/128[135] 
425 3 Andreas Steffen
      tunnel{2}:  INSTALLED, TUNNEL, ESP SPIs: ce4db893_i c190d5ba_o
426 3 Andreas Steffen
      tunnel{2}:  AES_CBC-128/HMAC_SHA1_96, rekeying in 13 minutes, last use: 3s_i 3s_o 
427 3 Andreas Steffen
      tunnel{2}:   2001:1::10/128 === ::/0 
428 3 Andreas Steffen
}}}
429 3 Andreas Steffen
430 3 Andreas Steffen
and in the Linux 2.6 kernel
431 3 Andreas Steffen
432 3 Andreas Steffen
{{{
433 3 Andreas Steffen
ip xfrm state
434 3 Andreas Steffen
435 1 Andreas Steffen
src :: dst ::
436 1 Andreas Steffen
        proto hao reqid 0 mode ro
437 1 Andreas Steffen
        replay-window 0 flag wildrecv
438 1 Andreas Steffen
        coa ::
439 1 Andreas Steffen
        sel src ::/0 dst ::/0 
440 1 Andreas Steffen
441 1 Andreas Steffen
src :: dst ::
442 1 Andreas Steffen
        proto route2 reqid 0 mode ro
443 1 Andreas Steffen
        replay-window 0 flag wildrecv
444 1 Andreas Steffen
        coa ::
445 1 Andreas Steffen
        sel src ::/0 dst ::/0 
446 1 Andreas Steffen
447 1 Andreas Steffen
src 2001:1::10 dst 2001:1::1
448 1 Andreas Steffen
        proto hao reqid 0 mode ro
449 1 Andreas Steffen
        replay-window 0 
450 3 Andreas Steffen
        coa 2001::50
451 3 Andreas Steffen
        lastused 2008-11-19 08:41:56
452 1 Andreas Steffen
        sel src 2001:1::10/128 dst 2001:1::1/128 
453 1 Andreas Steffen
454 1 Andreas Steffen
src 2001:1::10 dst 2001:1::1
455 3 Andreas Steffen
        proto esp spi 0xca64ae98 reqid 1 mode transport
456 1 Andreas Steffen
        replay-window 32 
457 3 Andreas Steffen
        auth hmac(sha1) 0x419c41d8807fb521e947988cef4a6181d810b611
458 3 Andreas Steffen
        enc cbc(aes) 0xed90ae3f4f12a697f40cce1893b54e20
459 1 Andreas Steffen
        sel src ::/0 dst ::/0 
460 1 Andreas Steffen
461 1 Andreas Steffen
src 2001:1::1 dst 2001:1::10
462 3 Andreas Steffen
        proto esp spi 0xc5959ac2 reqid 1 mode transport
463 1 Andreas Steffen
        replay-window 32 
464 3 Andreas Steffen
        auth hmac(sha1) 0xea26afc566143c25959a060c90be3053c50ddcff
465 3 Andreas Steffen
        enc cbc(aes) 0x0bd5bd34d5523c0929f2efd7a7c93359
466 1 Andreas Steffen
        sel src ::/0 dst ::/0 
467 1 Andreas Steffen
468 3 Andreas Steffen
src 2001::50 dst 2001:1::1
469 3 Andreas Steffen
        proto esp spi 0xc190d5ba reqid 2 mode tunnel
470 1 Andreas Steffen
        replay-window 32 flag 20
471 3 Andreas Steffen
        auth hmac(sha1) 0x672c1ea4359956c6a3b869b388b424b7058eee02
472 3 Andreas Steffen
        enc cbc(aes) 0xaaf5be1d604e64028d4e0a41f0d92b56
473 1 Andreas Steffen
474 3 Andreas Steffen
src 2001:1::1 dst 2001::50
475 3 Andreas Steffen
        proto esp spi 0xce4db893 reqid 2 mode tunnel
476 1 Andreas Steffen
        replay-window 32 flag 20
477 3 Andreas Steffen
        auth hmac(sha1) 0xdf1eeff5b86dfbd183c7a932c8250fc57d9632af
478 3 Andreas Steffen
        enc cbc(aes) 0x4d138f1363c1810f8c9cb2fcb1ee8bdf
479 1 Andreas Steffen
}}}
480 1 Andreas Steffen
481 1 Andreas Steffen
== Home Agent "moon" ==
482 1 Andreas Steffen
483 1 Andreas Steffen
=== /etc/mip6d.conf ===
484 1 Andreas Steffen
485 1 Andreas Steffen
{{{
486 1 Andreas Steffen
NodeConfig HA;
487 1 Andreas Steffen
488 1 Andreas Steffen
UseMnHaIPsec enabled;
489 1 Andreas Steffen
KeyMngMobCapability enabled;
490 1 Andreas Steffen
DefaultBindingAclPolicy deny;
491 1 Andreas Steffen
492 1 Andreas Steffen
Interface "eth0";
493 1 Andreas Steffen
494 1 Andreas Steffen
include "/etc/mip6d.conf.d/carol.mip6d.conf"
495 1 Andreas Steffen
}}}
496 1 Andreas Steffen
497 1 Andreas Steffen
=== /etc/mip6d.conf.d/carol.mip6d.conf ===
498 1 Andreas Steffen
499 1 Andreas Steffen
{{{
500 1 Andreas Steffen
Interface "eth1";
501 1 Andreas Steffen
 
502 1 Andreas Steffen
IPsecPolicySet {
503 1 Andreas Steffen
    HomeAgentAddress 2001:1::1;
504 1 Andreas Steffen
    HomeAddress 2001:1::10/64;
505 1 Andreas Steffen
 
506 1 Andreas Steffen
    IPsecPolicy Mh UseESP 1;
507 1 Andreas Steffen
    IPsecPolicy TunnelPayload UseESP 2;
508 1 Andreas Steffen
}
509 1 Andreas Steffen
510 1 Andreas Steffen
BindingAclPolicy 2001:1::10 allow;
511 1 Andreas Steffen
}}}
512 1 Andreas Steffen
513 1 Andreas Steffen
=== /etc/ipsec.conf ===
514 1 Andreas Steffen
515 1 Andreas Steffen
{{{
516 1 Andreas Steffen
config setup
517 1 Andreas Steffen
        crlcheckinterval=180
518 1 Andreas Steffen
        plutostart=no
519 1 Andreas Steffen
        charondebug="knl 2"
520 1 Andreas Steffen
        
521 1 Andreas Steffen
conn %default
522 1 Andreas Steffen
        keyexchange=ikev2
523 1 Andreas Steffen
        reauth=no
524 1 Andreas Steffen
        mobike=no
525 1 Andreas Steffen
        installpolicy=no
526 1 Andreas Steffen
527 1 Andreas Steffen
conn mh
528 1 Andreas Steffen
        also=ha
529 1 Andreas Steffen
        leftsubnet=2001:1::1/128
530 1 Andreas Steffen
        leftprotoport=135/0
531 1 Andreas Steffen
        rightprotoport=135/0
532 1 Andreas Steffen
        type=transport_proxy
533 1 Andreas Steffen
534 1 Andreas Steffen
conn tunnel
535 1 Andreas Steffen
        also=ha
536 1 Andreas Steffen
        leftsubnet=::/0
537 1 Andreas Steffen
538 1 Andreas Steffen
conn ha
539 1 Andreas Steffen
        left=2001:1::1
540 1 Andreas Steffen
        leftcert=moonCert.pem
541 1 Andreas Steffen
        leftid=@moon.strongswan.org
542 1 Andreas Steffen
        right=%any
543 1 Andreas Steffen
        ike=aes128-sha1-modp2048!
544 1 Andreas Steffen
        esp=aes128-sha1-modp2048!
545 1 Andreas Steffen
546 1 Andreas Steffen
include /etc/ipsec.conf.d/carol.ipsec.conf
547 1 Andreas Steffen
include /etc/ipsec.conf.d/dave.ipsec.conf
548 1 Andreas Steffen
}}}
549 1 Andreas Steffen
550 1 Andreas Steffen
=== /etc/ipsec.conf.d/carol.ipsec.conf ===
551 1 Andreas Steffen
552 1 Andreas Steffen
{{{
553 1 Andreas Steffen
conn carol
554 1 Andreas Steffen
        rightsubnet=2001:1::10/128
555 1 Andreas Steffen
        rightid=carol@strongswan.org
556 1 Andreas Steffen
557 1 Andreas Steffen
conn carol-mh
558 1 Andreas Steffen
        also=carol
559 1 Andreas Steffen
        also=mh
560 1 Andreas Steffen
        auto=add
561 1 Andreas Steffen
562 1 Andreas Steffen
conn carol-tunnel
563 1 Andreas Steffen
        also=carol
564 1 Andreas Steffen
        also=tunnel
565 1 Andreas Steffen
        auto=add
566 1 Andreas Steffen
}}}
567 1 Andreas Steffen
568 1 Andreas Steffen
=== ipsec statusall ===
569 1 Andreas Steffen
570 1 Andreas Steffen
{{{
571 1 Andreas Steffen
Performance:
572 1 Andreas Steffen
  uptime: 9 minutes, since Nov 13 01:05:33 2008
573 1 Andreas Steffen
  worker threads: 91 idle of 98, job queue load: 0, scheduled events: 2
574 1 Andreas Steffen
  loaded plugins: curl aes des sha1 sha2 md5 gmp random x509 pubkey hmac xcbc stroke kernel-netlink sqlite sql 
575 1 Andreas Steffen
Listening IP addresses:
576 1 Andreas Steffen
  10.1.0.1
577 1 Andreas Steffen
  2001:1::1
578 1 Andreas Steffen
  fec1::1
579 1 Andreas Steffen
  192.168.0.1
580 1 Andreas Steffen
  2001::1
581 1 Andreas Steffen
  fec0::1
582 1 Andreas Steffen
Connections:
583 1 Andreas Steffen
    carol-mh:  2001:1::1[moon.strongswan.org]...%any[carol@strongswan.org]
584 1 Andreas Steffen
    carol-mh:  CAs: "C=CH, O=Linux strongSwan, CN=strongSwan Root CA"...%any
585 1 Andreas Steffen
    carol-mh:  public key authentication
586 1 Andreas Steffen
    carol-mh:    2001:1::1/128[135] === 2001:1::10/128[135] 
587 1 Andreas Steffen
carol-tunnel:    ::/0 === 2001:1::10/128 
588 1 Andreas Steffen
     dave-mh:  2001:1::1[moon.strongswan.org]...%any[dave@strongswan.org]
589 1 Andreas Steffen
     dave-mh:  CAs: "C=CH, O=Linux strongSwan, CN=strongSwan Root CA"...%any
590 1 Andreas Steffen
     dave-mh:  public key authentication
591 1 Andreas Steffen
     dave-mh:    2001:1::1/128[135] === 2001:1::20/128[135] 
592 1 Andreas Steffen
 dave-tunnel:    ::/0 === 2001:1::20/128 
593 1 Andreas Steffen
Security Associations:
594 1 Andreas Steffen
    carol-mh[1]: ESTABLISHED, 2001:1::1[moon.strongswan.org]...2001::18d9:88ff:fe7d:36b3[carol@strongswan.org]
595 1 Andreas Steffen
    carol-mh[1]: IKE SPIs: 372bdbd1320c2eb4_i a53801fd03fbffee_r*, rekeying in 47 minutes
596 1 Andreas Steffen
    carol-mh[1]: IKE proposal: AES_CBC-128/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_2048_BIT
597 1 Andreas Steffen
    carol-mh{1}:  INSTALLED, TRANSPORT, ESP SPIs: c31ec667_i cf472638_o
598 1 Andreas Steffen
    carol-mh{1}:  AES_CBC-128/HMAC_SHA1_96, rekeying in 8 minutes, last use: 485s_i no_o 
599 1 Andreas Steffen
    carol-mh{1}:   2001:1::1/128[135] === 2001:1::10/128[135] 
600 1 Andreas Steffen
carol-tunnel{2}:  INSTALLED, TUNNEL, ESP SPIs: c0f90752_i c4f98106_o
601 1 Andreas Steffen
carol-tunnel{2}:  AES_CBC-128/HMAC_SHA1_96, rekeying in 8 minutes, last use: 481s_i no_o 
602 1 Andreas Steffen
carol-tunnel{2}:   ::/0 === 2001:1::10/128 
603 1 Andreas Steffen
}}}
604 1 Andreas Steffen
605 1 Andreas Steffen
=== ip xfrm policy ===
606 1 Andreas Steffen
607 1 Andreas Steffen
{{{
608 1 Andreas Steffen
src 2001:1::10/128 dst 2001:1::1/128 proto 135 
609 1 Andreas Steffen
        dir in priority 2 ptype main 
610 1 Andreas Steffen
        tmpl src :: dst ::
611 1 Andreas Steffen
                proto esp reqid 1 mode transport
612 1 Andreas Steffen
613 1 Andreas Steffen
src 2001:1::1/128 dst 2001:1::10/128 proto 135 
614 1 Andreas Steffen
        dir out priority 2 ptype main 
615 1 Andreas Steffen
        tmpl src :: dst ::
616 1 Andreas Steffen
                proto esp reqid 1 mode transport
617 1 Andreas Steffen
618 1 Andreas Steffen
src 2001:1::10/128 dst ::/0 
619 1 Andreas Steffen
        dir in priority 10 ptype main 
620 1 Andreas Steffen
        tmpl src 2001::18d9:88ff:fe7d:36b3 dst 2001:1::1
621 1 Andreas Steffen
                proto esp reqid 2 mode tunnel
622 1 Andreas Steffen
623 1 Andreas Steffen
src 2001:1::10/128 dst ::/0 
624 1 Andreas Steffen
        dir fwd priority 10 ptype main 
625 1 Andreas Steffen
        tmpl src 2001::18d9:88ff:fe7d:36b3 dst 2001:1::1
626 1 Andreas Steffen
                proto esp reqid 2 mode tunnel
627 1 Andreas Steffen
628 1 Andreas Steffen
src ::/0 dst 2001:1::10/128 
629 1 Andreas Steffen
        dir out priority 10 ptype main 
630 1 Andreas Steffen
        tmpl src 2001:1::1 dst 2001::18d9:88ff:fe7d:36b3
631 1 Andreas Steffen
                proto esp reqid 2 mode tunnel
632 1 Andreas Steffen
}}}
633 1 Andreas Steffen
634 1 Andreas Steffen
=== ip xfrm state ===
635 1 Andreas Steffen
636 1 Andreas Steffen
{{{
637 1 Andreas Steffen
src :: dst ::
638 1 Andreas Steffen
        proto hao reqid 0 mode ro
639 1 Andreas Steffen
        replay-window 0 flag wildrecv
640 1 Andreas Steffen
        coa ::
641 1 Andreas Steffen
        sel src ::/0 dst ::/0 
642 1 Andreas Steffen
643 1 Andreas Steffen
src 2001:1::10 dst 2001:1::1
644 1 Andreas Steffen
        proto esp spi 0xc31ec667 reqid 1 mode transport
645 1 Andreas Steffen
        replay-window 32 
646 1 Andreas Steffen
        auth hmac(sha1) 0xf6815c3cd001ff884eb6c1b4112ea9db0daf1eef
647 1 Andreas Steffen
        enc cbc(aes) 0xa51f577d694f46beb85179ecc5d35251
648 1 Andreas Steffen
        sel src ::/0 dst ::/0 
649 1 Andreas Steffen
650 1 Andreas Steffen
src 2001:1::1 dst 2001:1::10
651 1 Andreas Steffen
        proto esp spi 0xcf472638 reqid 1 mode transport
652 1 Andreas Steffen
        replay-window 32 
653 1 Andreas Steffen
        auth hmac(sha1) 0x8d9790093b1baa89a128e92c7019c32d776eccac
654 1 Andreas Steffen
        enc cbc(aes) 0xe02ea1231d5e1908564992ccafdc97cd
655 1 Andreas Steffen
        sel src ::/0 dst ::/0 
656 1 Andreas Steffen
657 1 Andreas Steffen
src 2001:1::1 dst 2001:1::10
658 1 Andreas Steffen
        proto route2 reqid 0 mode ro
659 1 Andreas Steffen
        replay-window 0 
660 1 Andreas Steffen
        coa 2001::18d9:88ff:fe7d:36b3
661 1 Andreas Steffen
        lastused 2008-11-13 01:06:50
662 1 Andreas Steffen
        sel src 2001:1::1/128 dst 2001:1::10/128 
663 1 Andreas Steffen
664 1 Andreas Steffen
src 2001:1::10 dst 2001:1::1
665 1 Andreas Steffen
        proto hao reqid 0 mode ro
666 1 Andreas Steffen
        replay-window 0 
667 1 Andreas Steffen
        coa 2001::18d9:88ff:fe7d:36b3
668 1 Andreas Steffen
        sel src 2001:1::10/128 dst 2001:1::1/128 
669 1 Andreas Steffen
670 1 Andreas Steffen
src 2001::18d9:88ff:fe7d:36b3 dst 2001:1::1
671 1 Andreas Steffen
        proto esp spi 0xc0f90752 reqid 2 mode tunnel
672 1 Andreas Steffen
        replay-window 32 flag 20
673 1 Andreas Steffen
        auth hmac(sha1) 0x8339d597ed1d92d820443171d3e3282d83186572
674 1 Andreas Steffen
        enc cbc(aes) 0xcba21b583a2330897e33339b72855eaa
675 1 Andreas Steffen
676 1 Andreas Steffen
src 2001:1::1 dst 2001::18d9:88ff:fe7d:36b3
677 1 Andreas Steffen
        proto esp spi 0xc4f98106 reqid 2 mode tunnel
678 1 Andreas Steffen
        replay-window 32 flag 20
679 1 Andreas Steffen
        auth hmac(sha1) 0xf4ffd5a21d52b4766ea81c22945f3f558f24c675
680 1 Andreas Steffen
        enc cbc(aes) 0x7c0d20968090085fbb17557f53c8818b
681 1 Andreas Steffen
}}}
682 1 Andreas Steffen
683 1 Andreas Steffen
=== /var/log/daemon.log ===
684 1 Andreas Steffen
685 1 Andreas Steffen
{{{
686 1 Andreas Steffen
Nov 13 01:05:33 moon charon: 01[DMN] starting charon (strongSwan Version 4.2.9rc18)
687 1 Andreas Steffen
Nov 13 01:05:33 moon charon: 01[CFG] loading ca certificates from '/etc/ipsec.d/cacerts'
688 1 Andreas Steffen
Nov 13 01:05:33 moon charon: 01[LIB]   loaded certificate file '/etc/ipsec.d/cacerts/strongswanCert.pem'
689 1 Andreas Steffen
Nov 13 01:05:33 moon charon: 01[CFG] loading aa certificates from '/etc/ipsec.d/aacerts'
690 1 Andreas Steffen
Nov 13 01:05:33 moon charon: 01[CFG] loading ocsp signer certificates from '/etc/ipsec.d/ocspcerts'
691 1 Andreas Steffen
Nov 13 01:05:33 moon charon: 01[CFG] loading attribute certificates from '/etc/ipsec.d/acerts'
692 1 Andreas Steffen
Nov 13 01:05:33 moon charon: 01[CFG] loading crls from '/etc/ipsec.d/crls'
693 1 Andreas Steffen
Nov 13 01:05:33 moon charon: 01[LIB]   loaded crl file '/etc/ipsec.d/crls/strongswan.crl'
694 1 Andreas Steffen
Nov 13 01:05:33 moon charon: 01[CFG] loading secrets from '/etc/ipsec.secrets'
695 1 Andreas Steffen
Nov 13 01:05:33 moon charon: 01[CFG]   loaded private key file '/etc/ipsec.d/private/moonKey.pem'
696 1 Andreas Steffen
Nov 13 01:05:34 moon charon: 01[DMN] loaded plugins: curl aes des sha1 sha2 md5 gmp random x509 pubkey hmac xcbc stroke kernel-netlink sqlite sql 
697 1 Andreas Steffen
Nov 13 01:05:34 moon charon: 01[KNL] listening on interfaces:
698 1 Andreas Steffen
Nov 13 01:05:34 moon charon: 01[KNL]   eth1
699 1 Andreas Steffen
Nov 13 01:05:34 moon charon: 01[KNL]     10.1.0.1
700 1 Andreas Steffen
Nov 13 01:05:34 moon charon: 01[KNL]     2001:1::1
701 1 Andreas Steffen
Nov 13 01:05:34 moon charon: 01[KNL]     fec1::1
702 1 Andreas Steffen
Nov 13 01:05:34 moon charon: 01[KNL]     fe80::b8d5:baff:feea:d493
703 1 Andreas Steffen
Nov 13 01:05:34 moon charon: 01[KNL]   eth0
704 1 Andreas Steffen
Nov 13 01:05:34 moon charon: 01[KNL]     192.168.0.1
705 1 Andreas Steffen
Nov 13 01:05:34 moon charon: 01[KNL]     2001::1
706 1 Andreas Steffen
Nov 13 01:05:34 moon charon: 01[KNL]     fec0::1
707 1 Andreas Steffen
Nov 13 01:05:34 moon charon: 01[KNL]     fe80::e4f6:c7ff:fe59:80e1
708 1 Andreas Steffen
Nov 13 01:05:34 moon charon: 01[JOB] spawning 98 worker threads
709 1 Andreas Steffen
Nov 13 01:05:35 moon charon: 23[CFG] crl caching to /etc/ipsec.d/crls enabled
710 1 Andreas Steffen
Nov 13 01:05:35 moon charon: 25[CFG] received stroke: add connection 'carol-mh'
711 1 Andreas Steffen
Nov 13 01:05:35 moon charon: 25[KNL] getting interface name for %any
712 1 Andreas Steffen
Nov 13 01:05:35 moon charon: 25[KNL] %any is not a local address
713 1 Andreas Steffen
Nov 13 01:05:35 moon charon: 25[KNL] getting interface name for 2001:1::1
714 1 Andreas Steffen
Nov 13 01:05:35 moon charon: 25[KNL] 2001:1::1 is on interface eth1
715 1 Andreas Steffen
Nov 13 01:05:35 moon charon: 25[LIB]   loaded certificate file '/etc/ipsec.d/certs/moonCert.pem'
716 1 Andreas Steffen
Nov 13 01:05:35 moon charon: 25[CFG] added configuration 'carol-mh': 2001:1::1[moon.strongswan.org]...%any[carol@strongswan.org]
717 1 Andreas Steffen
Nov 13 01:05:35 moon charon: 27[CFG] received stroke: add connection 'carol-tunnel'
718 1 Andreas Steffen
Nov 13 01:05:35 moon charon: 27[KNL] getting interface name for %any
719 1 Andreas Steffen
Nov 13 01:05:35 moon charon: 27[KNL] %any is not a local address
720 1 Andreas Steffen
Nov 13 01:05:35 moon charon: 27[KNL] getting interface name for 2001:1::1
721 1 Andreas Steffen
Nov 13 01:05:35 moon charon: 27[KNL] 2001:1::1 is on interface eth1
722 1 Andreas Steffen
Nov 13 01:05:35 moon charon: 27[LIB]   loaded certificate file '/etc/ipsec.d/certs/moonCert.pem'
723 1 Andreas Steffen
Nov 13 01:05:35 moon charon: 27[CFG] added child to existing configuration 'carol-mh'
724 1 Andreas Steffen
Nov 13 01:05:35 moon charon: 28[CFG] received stroke: add connection 'dave-mh'
725 1 Andreas Steffen
Nov 13 01:05:35 moon charon: 28[KNL] getting interface name for %any
726 1 Andreas Steffen
Nov 13 01:05:35 moon charon: 28[KNL] %any is not a local address
727 1 Andreas Steffen
Nov 13 01:05:35 moon charon: 28[KNL] getting interface name for 2001:1::1
728 1 Andreas Steffen
Nov 13 01:05:35 moon charon: 28[KNL] 2001:1::1 is on interface eth1
729 1 Andreas Steffen
Nov 13 01:05:35 moon charon: 28[LIB]   loaded certificate file '/etc/ipsec.d/certs/moonCert.pem'
730 1 Andreas Steffen
Nov 13 01:05:35 moon charon: 28[CFG] added configuration 'dave-mh': 2001:1::1[moon.strongswan.org]...%any[dave@strongswan.org]
731 1 Andreas Steffen
Nov 13 01:05:35 moon charon: 30[CFG] received stroke: add connection 'dave-tunnel'
732 1 Andreas Steffen
Nov 13 01:05:35 moon charon: 30[KNL] getting interface name for %any
733 1 Andreas Steffen
Nov 13 01:05:35 moon charon: 30[KNL] %any is not a local address
734 1 Andreas Steffen
Nov 13 01:05:35 moon charon: 30[KNL] getting interface name for 2001:1::1
735 1 Andreas Steffen
Nov 13 01:05:35 moon charon: 30[KNL] 2001:1::1 is on interface eth1
736 1 Andreas Steffen
Nov 13 01:05:35 moon charon: 30[LIB]   loaded certificate file '/etc/ipsec.d/certs/moonCert.pem'
737 1 Andreas Steffen
Nov 13 01:05:35 moon charon: 30[CFG] added child to existing configuration 'dave-mh'
738 1 Andreas Steffen
739 1 Andreas Steffen
Nov 13 01:05:39 moon mip6d[1167]: MIPL Mobile IPv6 for Linux v2.0.2-umip-0.4 started (Home Agent)
740 1 Andreas Steffen
741 1 Andreas Steffen
Nov 13 01:06:45 moon charon: 33[NET] received packet: from 2001::18d9:88ff:fe7d:36b3[500] to 2001:1::1[500]
742 1 Andreas Steffen
Nov 13 01:06:45 moon charon: 33[ENC] parsed IKE_SA_INIT request 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) ]
743 1 Andreas Steffen
Nov 13 01:06:45 moon charon: 33[IKE] 2001::18d9:88ff:fe7d:36b3 is initiating an IKE_SA
744 1 Andreas Steffen
Nov 13 01:06:45 moon charon: 33[IKE] sending cert request for "C=CH, O=Linux strongSwan, CN=strongSwan Root CA"
745 2 Andreas Steffen
Nov 13 01:06:45 moon charon: 33[ENC] generating IKE_SA_INIT response 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) CERTREQ ]
746 1 Andreas Steffen
Nov 13 01:06:45 moon charon: 33[NET] sending packet: from 2001:1::1[500] to 2001::18d9:88ff:fe7d:36b3[500]
747 1 Andreas Steffen
Nov 13 01:06:45 moon charon: 34[NET] received packet: from 2001::18d9:88ff:fe7d:36b3[500] to 2001:1::1[500]
748 1 Andreas Steffen
Nov 13 01:06:45 moon charon: 34[ENC] parsed IKE_AUTH request 1 [ IDi CERT CERTREQ IDr AUTH N(USE_TRANSP) SA TSi TSr ]
749 1 Andreas Steffen
Nov 13 01:06:45 moon charon: 34[IKE] received cert request for "C=CH, O=Linux strongSwan, CN=strongSwan Root CA"
750 1 Andreas Steffen
Nov 13 01:06:45 moon charon: 34[IKE] received end entity cert "C=CH, O=Linux strongSwan, OU=Research, CN=carol@strongswan.org"
751 1 Andreas Steffen
Nov 13 01:06:45 moon charon: 34[CFG]   using certificate "C=CH, O=Linux strongSwan, OU=Research, CN=carol@strongswan.org"
752 1 Andreas Steffen
753 1 Andreas Steffen
Nov 13 01:06:45 moon charon: 34[CFG]   using trusted ca certificate "C=CH, O=Linux strongSwan, CN=strongSwan Root CA"
754 1 Andreas Steffen
Nov 13 01:06:45 moon charon: 34[CFG] checking certificate status of "C=CH, O=Linux strongSwan, OU=Research, CN=carol@strongswan.org"
755 1 Andreas Steffen
Nov 13 01:06:45 moon charon: 34[CFG]   using trusted certificate "C=CH, O=Linux strongSwan, CN=strongSwan Root CA"
756 1 Andreas Steffen
Nov 13 01:06:45 moon charon: 34[CFG]   crl correctly signed by "C=CH, O=Linux strongSwan, CN=strongSwan Root CA"
757 1 Andreas Steffen
Nov 13 01:06:45 moon charon: 34[CFG]   crl is valid: until Nov 13 22:27:58 2008
758 1 Andreas Steffen
Nov 13 01:06:45 moon charon: 34[CFG]   using cached crl
759 1 Andreas Steffen
Nov 13 01:06:45 moon charon: 34[CFG] certificate status is good
760 1 Andreas Steffen
Nov 13 01:06:45 moon charon: 34[IKE] authentication of 'carol@strongswan.org' with RSA signature successful
761 1 Andreas Steffen
Nov 13 01:06:45 moon charon: 34[CFG] found matching peer config "carol-mh": moon.strongswan.org...carol@strongswan.org with prio 40.5
762 1 Andreas Steffen
Nov 13 01:06:45 moon charon: 34[IKE] authentication of 'moon.strongswan.org' (myself) with RSA signature successful
763 1 Andreas Steffen
Nov 13 01:06:45 moon charon: 34[IKE] scheduling rekeying in 3365s
764 1 Andreas Steffen
Nov 13 01:06:45 moon charon: 34[IKE] maximum IKE_SA lifetime 3545s
765 1 Andreas Steffen
Nov 13 01:06:45 moon charon: 34[IKE] IKE_SA carol-mh[1] established between 2001:1::1[moon.strongswan.org]...2001::18d9:88ff:fe7d:36b3[carol@strongswan.org]
766 1 Andreas Steffen
Nov 13 01:06:45 moon charon: 34[IKE] sending end entity cert "C=CH, O=Linux strongSwan, CN=moon.strongswan.org"
767 1 Andreas Steffen
Nov 13 01:06:45 moon charon: 34[CHD] other address: 2001::18d9:88ff:fe7d:36b3 is a transport mode proxy for 2001:1::10
768 1 Andreas Steffen
Nov 13 01:06:45 moon charon: 34[KNL] getting SPI for reqid {1}
769 1 Andreas Steffen
Nov 13 01:06:45 moon charon: 34[KNL] got SPI c31ec667 for reqid {1}
770 1 Andreas Steffen
Nov 13 01:06:45 moon charon: 34[KNL] adding SAD entry with SPI c31ec667 and reqid {1}
771 1 Andreas Steffen
Nov 13 01:06:45 moon charon: 34[KNL]   using encryption algorithm AES_CBC with key size 128
772 1 Andreas Steffen
Nov 13 01:06:45 moon charon: 34[KNL]   using integrity algorithm HMAC_SHA1_96 with key size 160
773 1 Andreas Steffen
Nov 13 01:06:45 moon charon: 34[KNL] adding SAD entry with SPI cf472638 and reqid {1}
774 1 Andreas Steffen
Nov 13 01:06:45 moon charon: 34[KNL]   using encryption algorithm AES_CBC with key size 128
775 1 Andreas Steffen
Nov 13 01:06:45 moon charon: 34[KNL]   using integrity algorithm HMAC_SHA1_96 with key size 160
776 1 Andreas Steffen
Nov 13 01:06:45 moon charon: 34[IKE] CHILD_SA carol-mh{1} established with SPIs c31ec667_i cf472638_o and TS 2001:1::1/128[135] === 2001:1::10/128[135] 
777 1 Andreas Steffen
Nov 13 01:06:45 moon charon: 34[ENC] generating IKE_AUTH response 1 [ IDr CERT AUTH N(USE_TRANSP) SA TSi TSr ]
778 1 Andreas Steffen
Nov 13 01:06:45 moon charon: 34[NET] sending packet: from 2001:1::1[500] to 2001::18d9:88ff:fe7d:36b3[500]
779 1 Andreas Steffen
780 1 Andreas Steffen
Nov 13 01:06:47 moon charon: 04[KNL] received a XFRM_MSG_MIGRATE
781 1 Andreas Steffen
Nov 13 01:06:47 moon charon: 04[KNL]   policy: 2001:1::10/128[135] === 2001:1::1/128[135] in, index 0
782 1 Andreas Steffen
Nov 13 01:06:47 moon charon: 04[KNL]   XFRMA_KMADDRESS
783 1 Andreas Steffen
Nov 13 01:06:47 moon charon: 04[KNL]   kmaddress: 2001:1::1...2001::18d9:88ff:fe7d:36b3
784 1 Andreas Steffen
Nov 13 01:06:47 moon charon: 04[KNL]   XFRMA_POLICY_TYPE
785 1 Andreas Steffen
Nov 13 01:06:47 moon charon: 04[KNL]   XFRMA_MIGRATE
786 1 Andreas Steffen
Nov 13 01:06:47 moon charon: 04[KNL]   migrate ESP %any...%any to 2001::18d9:88ff:fe7d:36b3...2001:1::1, reqid {1}
787 1 Andreas Steffen
Nov 13 01:06:47 moon charon: 04[KNL] creating migrate job for policy 2001:1::10/128[135] === 2001:1::1/128[135] in with reqid {1}
788 1 Andreas Steffen
Nov 13 01:06:47 moon charon: 05[KNL] interface ip6tnl1 activated
789 1 Andreas Steffen
Nov 13 01:06:47 moon charon: 04[KNL] received a XFRM_MSG_MIGRATE
790 1 Andreas Steffen
Nov 13 01:06:47 moon charon: 04[KNL]   policy: 2001:1::1/128[135] === 2001:1::10/128[135] out, index 0
791 1 Andreas Steffen
Nov 13 01:06:47 moon charon: 04[KNL]   XFRMA_KMADDRESS
792 1 Andreas Steffen
Nov 13 01:06:47 moon charon: 04[KNL]   kmaddress: 2001:1::1...2001::18d9:88ff:fe7d:36b3
793 1 Andreas Steffen
Nov 13 01:06:47 moon charon: 04[KNL]   XFRMA_POLICY_TYPE
794 1 Andreas Steffen
Nov 13 01:06:47 moon charon: 04[KNL]   XFRMA_MIGRATE
795 1 Andreas Steffen
Nov 13 01:06:47 moon charon: 04[KNL]   migrate ESP %any...%any to 2001:1::1...2001::18d9:88ff:fe7d:36b3, reqid {1}
796 1 Andreas Steffen
Nov 13 01:06:47 moon charon: 04[KNL] creating migrate job for policy 2001:1::1/128[135] === 2001:1::10/128[135] out with reqid {1}
797 1 Andreas Steffen
Nov 13 01:06:47 moon charon: 04[KNL] received a XFRM_MSG_MIGRATE
798 1 Andreas Steffen
Nov 13 01:06:47 moon charon: 04[KNL]   policy: 2001:1::10/128 === ::/0 in, index 0
799 1 Andreas Steffen
Nov 13 01:06:47 moon charon: 04[KNL]   XFRMA_KMADDRESS
800 1 Andreas Steffen
Nov 13 01:06:47 moon charon: 04[KNL]   kmaddress: 2001:1::1...2001::18d9:88ff:fe7d:36b3
801 1 Andreas Steffen
Nov 13 01:06:47 moon charon: 04[KNL]   XFRMA_POLICY_TYPE
802 1 Andreas Steffen
Nov 13 01:06:47 moon charon: 04[KNL]   XFRMA_MIGRATE
803 1 Andreas Steffen
Nov 13 01:06:47 moon charon: 04[KNL]   migrate ESP 2001:1::10...2001:1::1 to 2001::18d9:88ff:fe7d:36b3...2001:1::1, reqid {2}
804 1 Andreas Steffen
Nov 13 01:06:47 moon charon: 04[KNL] creating migrate job for policy 2001:1::10/128 === ::/0 in with reqid {2}
805 1 Andreas Steffen
Nov 13 01:06:47 moon charon: 37[JOB] no CHILD_SA found with reqid {2}
806 1 Andreas Steffen
Nov 13 01:06:47 moon charon: 04[KNL] received a XFRM_MSG_MIGRATE
807 1 Andreas Steffen
Nov 13 01:06:47 moon charon: 04[KNL]   policy: 2001:1::10/128 === ::/0 fwd, index 0
808 1 Andreas Steffen
Nov 13 01:06:47 moon charon: 04[KNL]   XFRMA_KMADDRESS
809 1 Andreas Steffen
Nov 13 01:06:47 moon charon: 04[KNL]   kmaddress: 2001:1::1...2001::18d9:88ff:fe7d:36b3
810 1 Andreas Steffen
Nov 13 01:06:47 moon charon: 04[KNL]   XFRMA_POLICY_TYPE
811 1 Andreas Steffen
Nov 13 01:06:47 moon charon: 04[KNL]   XFRMA_MIGRATE
812 1 Andreas Steffen
Nov 13 01:06:47 moon charon: 04[KNL]   migrate ESP 2001:1::10...2001:1::1 to 2001::18d9:88ff:fe7d:36b3...2001:1::1, reqid {2}
813 1 Andreas Steffen
Nov 13 01:06:47 moon charon: 04[KNL] creating migrate job for policy 2001:1::10/128 === ::/0 fwd with reqid {2}
814 1 Andreas Steffen
Nov 13 01:06:47 moon charon: 38[JOB] no CHILD_SA found with reqid {2}
815 1 Andreas Steffen
Nov 13 01:06:47 moon charon: 04[KNL] received a XFRM_MSG_MIGRATE
816 1 Andreas Steffen
Nov 13 01:06:47 moon charon: 04[KNL]   policy: ::/0 === 2001:1::10/128 out, index 0
817 1 Andreas Steffen
Nov 13 01:06:47 moon charon: 04[KNL]   XFRMA_KMADDRESS
818 1 Andreas Steffen
Nov 13 01:06:47 moon charon: 04[KNL]   kmaddress: 2001:1::1...2001::18d9:88ff:fe7d:36b3
819 1 Andreas Steffen
Nov 13 01:06:47 moon charon: 04[KNL]   XFRMA_POLICY_TYPE
820 1 Andreas Steffen
Nov 13 01:06:47 moon charon: 04[KNL]   XFRMA_MIGRATE
821 1 Andreas Steffen
Nov 13 01:06:47 moon charon: 04[KNL]   migrate ESP 2001:1::1...2001:1::10 to 2001:1::1...2001::18d9:88ff:fe7d:36b3, reqid {2}
822 1 Andreas Steffen
Nov 13 01:06:47 moon charon: 04[KNL] creating migrate job for policy ::/0 === 2001:1::10/128 out with reqid {2}
823 1 Andreas Steffen
Nov 13 01:06:47 moon charon: 39[JOB] no CHILD_SA found with reqid {2}
824 1 Andreas Steffen
Nov 13 01:06:47 moon charon: 05[KNL] fe80::b8d5:baff:feea:d493 appeared on ip6tnl1
825 1 Andreas Steffen
826 1 Andreas Steffen
Nov 13 01:06:47 moon charon: 40[NET] received packet: from 2001::18d9:88ff:fe7d:36b3[500] to 2001:1::1[500]
827 1 Andreas Steffen
Nov 13 01:06:47 moon charon: 40[ENC] parsed CREATE_CHILD_SA request 2 [ SA No KE TSi TSr ]
828 1 Andreas Steffen
Nov 13 01:06:47 moon charon: 40[KNL] getting SPI for reqid {2}
829 1 Andreas Steffen
Nov 13 01:06:47 moon charon: 40[KNL] got SPI c0f90752 for reqid {2}
830 1 Andreas Steffen
Nov 13 01:06:47 moon charon: 40[KNL] adding SAD entry with SPI c0f90752 and reqid {2}
831 1 Andreas Steffen
Nov 13 01:06:47 moon charon: 40[KNL]   using encryption algorithm AES_CBC with key size 128
832 1 Andreas Steffen
Nov 13 01:06:47 moon charon: 40[KNL]   using integrity algorithm HMAC_SHA1_96 with key size 160
833 1 Andreas Steffen
Nov 13 01:06:47 moon charon: 40[KNL] adding SAD entry with SPI c4f98106 and reqid {2}
834 1 Andreas Steffen
Nov 13 01:06:47 moon charon: 40[KNL]   using encryption algorithm AES_CBC with key size 128
835 1 Andreas Steffen
Nov 13 01:06:47 moon charon: 40[KNL]   using integrity algorithm HMAC_SHA1_96 with key size 160
836 1 Andreas Steffen
Nov 13 01:06:47 moon charon: 40[IKE] CHILD_SA carol-tunnel{2} established with SPIs c0f90752_i c4f98106_o and TS ::/0 === 2001:1::10/128 
837 1 Andreas Steffen
Nov 13 01:06:47 moon charon: 40[ENC] generating CREATE_CHILD_SA response 2 [ SA No KE TSi TSr ]
838 1 Andreas Steffen
Nov 13 01:06:47 moon charon: 40[NET] sending packet: from 2001:1::1[500] to 2001::18d9:88ff:fe7d:36b3[500]
839 1 Andreas Steffen
}}}