On Sun, May 15, 2011 at 05:49:47AM +0200, Pawel Wieleba wrote:
> On Tue, May 10, 2011 at 03:08:43PM +0200, Pawel Wieleba wrote:
> > >Number:         6601
> > >Category:       pending
> > >Synopsis:       [isakmpd] IPSEC SA is established with different keys
key_authkey and key_encrypt on both peers. The problem repeats every few
days.

Hello,

I've proceeded some more tests regarding the problem report 6601 I've
submitted.  PR 6601 describes the problem with different authkeys as
well as enckeys on both peers for the same IPSEC SA. The problem
repeats regularly and its frequency
depends on the default lifetimes. More information was gathered in my
previous posts.

I've created testing environments as described in my previous post:
Date: Tue, 10 May 2011 15:08:43 +0200
From: Pawel Wieleba <[email protected]>
To: [email protected]
Subject: [isakmpd] IPSEC SA is established with different keys key_authkey
                and key_encrypt on both peers -- VPN does not work.

The testing environments where run using the following OpenBSD
configurations.

1) The problem occurs when running:
        - OpenBSD 4.6 and OpenBSD 4.8 peer
        - OpenBSD 4.9 and OpenBSD 4.9 peer
        - OpenBSD 4.8 and OpenBSD 4.9 peer
        - OpenBSD 4.8 and OpenBSD 4.8 peer

2) The problem _does not_ occur (3 days without a problem) when
running:
        - OpenBSD 4.6 and OpenBSD 4.6 peer
        - OpenBSD 4.7 and OpenBSD 4.7 peer

The above test were done using the ISAKMP SA and IPSEC SA
configuration, which was mentioned in my previous post, and I qoute it
here:
  main auth hmac-sha1 enc aes group modp1024
  quick auth hmac-sha1 enc aes group
  psk "<shared_key"

Moreover I've tested a few more algorithms used for phase 1 and 2.
The following algorithms were tested for both OpenBSD 4.9 peers, and
the described problem existed in all cases:
 - main  auth hmac-sha1 enc aes group modp1024
   quick auth hmac-sha1 enc aes group modp1024
   psk "<shared_key>"
 - main  auth hmac-sha1 enc 3des group modp1024
   quick auth hmac-sha1 enc 3des group modp1024
   psk "<shared_key>"
 - main  auth hmac-md5 enc 3des group modp1024
   quick auth hmac-md5 enc 3des group modp1024
   psk "<shared_key>"
 - main  auth hmac-sha2-256 enc aes group modp1024
   quick auth hmac-sha2-256 enc aes group modp1024
   psk "<shared_key>"


It is a very important regression comparing to OpenBSD 4.6.
With default lifetimes set to 120sec, the problem repeats every 1 to 5
hours.

I think that it would be usefull to append this information to the
original PR, so if someone in charge can do this please update PR
6601:
http://cvs.openbsd.org/cgi-bin/query-pr-wrapper?full=yes&numbers=6601

Best regards,
PaweE Wieleba

Reply via email to