I’m having the same issue on OpenBSD 6.4. My iked.conf is similar to Rachel’s:

include "/etc/iked/macros.conf"

ikev2 quick active ipcomp esp proto gre\
        from 192.168.1.0/24 to $iked_server \
        local egress peer $iked_server \
        ikesa auth hmac-sha2-512 enc aes-256 prf hmac-sha2-512 group curve25519 
\
        childsa enc chacha20-poly130 group curve25519 \
        dstid "asgard.local"

Sites are reachable by ping, but https doesn’t respond at all. I was wondering 
if it is because the GRE part, will do more experiments.

> On Dec 11, 2018, at 9:04 AM, Theodore Wynnychenko <t...@uchicago.edu> wrote:
> 
> I would like to re-title this as something like "pf and iked instability on 
> recent snapshots," but don’t know if doing so would break the mailing list 
> thread, exiso, I left the subject unchanged...
> 
>> -----Original Message----- 
>> From: Theodore Wynnychenko [mailto:t...@uchicago.edu] 
>> Sent: Saturday, December 08, 2018 4:03 PM 
>> To: misc@openbsd.org 
>> Cc: 'Rachel Roch' 
>> Subject: RE: TLS suddenly not working over IKED site-to-site 
>> 
>>> 
> . 
> . 
> . 
>> I now find I can no longer connect to with TLS/SSL over the iked tunnel 
>> (the original behavior that seemed to have corrected itself).  Also, 
>> icinga continues to be unable to verify the status of the remote hosts 
>> over port 5665. 
>> 
>> I don't have time right now to try using s_client and s_server and 
>> watching enc0 to see what is happening, but I will when I can. 
>> 
>> If anyone has an ideas on what may be happening, please let me know. 
>> 
>> Thanks 
>> Ted 
> 
> 
> Hello again; 
> 
> So, I am at a complete loss to understand what is going on. 
> Today, I tried using openssl s_client and s_server to make a connection 
> through the iked vpn (as I described in my last post).  However, with NO 
> changes to iked.conf or pf.conf, today I had several connection attempts that 
> completed correctly.  I have not included any output from those sporadic, 
> completely functional connections.
> 
> Rather, today, most of the connections by s_client are not even acknowledged 
> by the s_server on the other side of the iked vpn.
> 
> For example: 
> On the s_client machine: 
> 
> # openssl s_client -state -connect "remote.host":https 
> SSL_connect:before/connect initialization 
> SSL_connect:SSLv3 write client hello A 
> ... and nothing more ... 
> 
> But on the s_server machine today all I see is: 
> # openssl s_sever -state -accept https ...certificate options... 
> Using auto DH parameters 
> Using default temp ECDH parameters 
> ACCEPT 
> ... and no connection attempt is ever acknowledged ... 
> 
> (Yesterday, at least this first part of the connection was received by the 
> s_server: 
> Using auto DH parameters 
> Using default temp ECDH parameters 
> ACCEPT 
> SSL_accept:before/accept initialization 
> ... and nothing more yesterday ...) 
> 
> 
> So, today using tcpdump on the outgoing interface of the s_client machine and 
> the incoming interface of the "local" iked vpn endpoint shows:
> 
> 16:43:05.107524 172.30.1.254.7305 > 172.30.7.205.443: S 
> 1751796302:1751796302(0) win 16384 <mss 1460,nop,nop,sackOK,nop,wscale 
> 6,nop,nop,timestamp 2698316052 0>
> 
> 16:43:05.149146 172.30.1.254.7305 > 172.30.7.205.443: . ack 2119500805 win 
> 256 <nop,nop,timestamp 2698316052 3536824996>
> 
> 16:43:05.149895 172.30.1.254.7305 > 172.30.7.205.443: P 0:196(196) ack 1 win 
> 256 <nop,nop,timestamp 2698316052 3536824996>
> 
> 16:43:06.648487 172.30.1.254.7305 > 172.30.7.205.443: P 0:196(196) ack 1 win 
> 256 <nop,nop,timestamp 2698316055 3536824996>
> 
> 16:43:09.648557 172.30.1.254.7305 > 172.30.7.205.443: P 0:196(196) ack 1 win 
> 256 <nop,nop,timestamp 2698316061 3536824996>
> 
> 16:43:09.948433 172.30.1.254.7305 > 172.30.7.205.443: F 196:196(0) ack 1 win 
> 256 <nop,nop,timestamp 2698316061 3536824996>
> 
> 16:43:15.648712 172.30.1.254.7305 > 172.30.7.205.443: FP 0:196(196) ack 1 win 
> 256 <nop,nop,timestamp 2698316073 3536825005>
> 
> And this traffic (incomplete thought it may be for an ssl handshake) appears 
> to be passed to enc0 intact: 
> 
> 16:43:05.105044 (authentic,confidential): SPI 0x151333df: 172.30.1.254.7305 > 
> 172.30.7.205.443: S 3570513915:3570513915(0) win 16384 <mss 
> 1300,nop,nop,sackOK,nop,wscale 6,nop,nop,timestamp 2698316052 0> (encap)
> 
> 16:43:05.146122 (authentic,confidential): SPI 0xe1c30e4a: 172.30.7.205.443 > 
> 172.30.1.254.7305: S 1312941075:1312941075(0) ack 3570513916 win 16384 <mss 
> 1300,nop,nop,sackOK,nop,wscale 6,nop,nop,timestamp 3536824996 2698316052> 
> (encap)
> 
> 16:43:05.146654 (authentic,confidential): SPI 0x151333df: 172.30.1.254.7305 > 
> 172.30.7.205.443: . ack 1 win 256 <nop,nop,timestamp 2698316052 3536824996> 
> (encap)
> 
> 16:43:05.147365 (unprotected): SPI 0x0000ef27: 172.30.1.254.7305 > 
> 172.30.7.205.443: P 1:197(196) ack 1 win 256 <nop,nop,timestamp 2698316052 
> 3536824996> (encap)
> 
> 16:43:06.645932 (unprotected): SPI 0x0000ef27: 172.30.1.254.7305 > 
> 172.30.7.205.443: P 1:197(196) ack 1 win 256 <nop,nop,timestamp 2698316055 
> 3536824996> (encap)
> 
> 16:43:09.646049 (unprotected): SPI 0x0000ef27: 172.30.1.254.7305 > 
> 172.30.7.205.443: P 1:197(196) ack 1 win 256 <nop,nop,timestamp 2698316061 
> 3536824996> (encap)
> 
> 16:43:09.945908 (authentic,confidential): SPI 0x151333df: 172.30.1.254.7305 > 
> 172.30.7.205.443: F 197:197(0) ack 1 win 256 <nop,nop,timestamp 2698316061 
> 3536824996> (encap)
> 
> 16:43:09.981966 (authentic,confidential): SPI 0xe1c30e4a: 172.30.7.205.443 > 
> 172.30.1.254.7305: . ack 1 win 261 <nop,nop,timestamp 3536825005 
> 2698316052,nop,nop,sack 1 {197:197} > (encap)
> 
> 16:43:15.646158 (unprotected): SPI 0x0000ef27: 172.30.1.254.7305 > 
> 172.30.7.205.443: FP 1:197(196) ack 1 win 256 <nop,nop,timestamp 2698316073 
> 3536825005> (encap)
> 
> 
> BUT, at the other end of the VPN, on enc0, all that is seen leaving the iked 
> VPN tunnel is: 
> 
> 16:43:05.130558 (authentic,confidential): SPI 0x151333df: 172.30.1.254.7305 > 
> 172.30.7.205.443: S 3570513915:3570513915(0) win 16384 <mss 
> 1300,nop,nop,sackOK,nop,wscale 6,nop,nop,timestamp 2698316052 0> (encap)
> 
> 16:43:05.131049 (authentic,confidential): SPI 0xe1c30e4a: 172.30.7.205.443 > 
> 172.30.1.254.7305: S 1312941075:1312941075(0) ack 3570513916 win 16384 <mss 
> 1300,nop,nop,sackOK,nop,wscale 6,nop,nop,timestamp 3536824996 2698316052> 
> (encap)
> 
> 16:43:05.174802 (authentic,confidential): SPI 0x151333df: 172.30.1.254.7305 > 
> 172.30.7.205.443: . ack 1 win 256 <nop,nop,timestamp 2698316052 3536824996> 
> (encap)
> 
> 16:43:09.966420 (authentic,confidential): SPI 0x151333df: 172.30.1.254.7305 > 
> 172.30.7.205.443: F 197:197(0) ack 1 win 256 <nop,nop,timestamp 2698316061 
> 3536824996> (encap)
> 
> 16:43:09.966853 (authentic,confidential): SPI 0xe1c30e4a: 172.30.7.205.443 > 
> 172.30.1.254.7305: . ack 1 win 261 <nop,nop,timestamp 3536825005 
> 2698316052,nop,nop,sack 1 {197:197} > (encap)
> 
> 
> I have no idea what this all means, or what to do with it. 
> But, I am following up in case anybody has any idea of what may be happening. 
> 
> Also, yesterday I described how the local iked machine appeared to be 
> blocking packets that were explicitly allowed by pf.conf.  From my post 
> yesterday:
> 
> (   For example, in the log I see: 
> Dec  8 15:50:01 ... pf: Dec 08 15:48:49.346816 rule 4/(match) block out on 
> em0: 172.30.7.205.22112 > 172.30.2.99.5665: R 3963276584:3963276584(0) ack 
> 252894831 win 0
> 
> But, pfctl is running with following: 
> 
> # pfctl -s rules 
> match in all scrub (no-df random-id max-mss 1300) 
> pass in quick on em1 all flags S/SA 
> pass out quick on em1 all flags S/SA 
> block drop in log on em0 all 
> block drop out log on em0 all 
> ... 
> pass quick inet proto tcp from 172.30.7.205 to 172.30.2.99 port = 5665 flags 
> S/SA 
> ... and on.    ) 
> 
> Well, whatever was happening appears to have been resolved, because at about 
> midnight local time on Sunday morning, icinga2 declared that the host was 
> back up.
> 
> To be clear, I have made no changes to either pf.conf or iked.conf on any of 
> the machines involved in this testing from Saturday.
> 
> Also, this had all been stable for the last (about) 2 years, until about 
> two-three weeks ago.  I did have another post, where I discussed the fact the 
> iked VPN had failed to be reestablished after an update about 3-4 snapshots 
> back.  I got it working again by changing the local endpoint on the "remote" 
> iked machine from the internal ip associated with the internal interface to 
> an internal "alias" ip address associated with the outgoing/external 
> interface of that machine.
> 
> But, again, it had been working for 2 years until the recent update. 
> 
> I don't have any idea of what may be helpful in figuring out what I am doing 
> wrong, or what has changed, but I am happy to provide any information that 
> may be of help.
> 
> I don't believe I have the knowledge to do more on my own at this point. 
> 
> Thanks for any advice. 
> Ted 
> 
> 
> 
> 

Reply via email to