Hello Stuart,

>>>
>>> strongSwan's module to install policies to the kernel (kernel-pfkey) does
>>> not support OpenBSD without making code changes. Not impossible but hasn't
>>> been done. Only their userland setup that works with tun(4) devices
>>> (slightly confusingly called kernel-ipsec) is available.
>>
>> Hm, after fiddling around for a while, I am a bit helpless on this. Do you 
>> happen to have
>> some example configuration? If yes, I would be very grateful to see it. :-)
> 
> I put a sanitized version of my config in the pkg-readme file in the
> strongswan package - but I only used it for a very basic EAP-MSCHAP
> client (and I don't know strongswan very well; I normally only use it
> on Android with the gui configuration tool) so there is nothing fancy
> in there.
> 

Thank you - unfortunately, it does not seem to work here. An IKE_SA is 
successfully
established, CHILD_SA fails with the same error message. If "installpolicy=no" 
is
appended to the appropriate connection in /etc/strongswan/ipsec.conf, both 
IKE_SA
and CHILD_SA can be established but no traffic will be routed through the 
tunnel:

> Status of IKE charon daemon (strongSwan 5.8.1, OpenBSD 6.6, amd64):
>   uptime: 2 minutes, since Feb 17 15:44:04 2020
>   worker threads: 6 of 16 idle, 6/0/4/0 working, job queue: 0/0/0/0, 
> scheduled: 6
>   loaded plugins: charon pkcs11 aes des rc2 sha2 sha1 md4 md5 mgf1 random 
> nonce x509 revocation constraints pubkey pkcs1 pkcs7 pkcs8 pkcs12 pgp dnskey 
> sshkey pem botan fips-prf gmp curve25519 chapoly xcbc cmac hmac gcm attr 
> kernel-libipsec kernel-pfroute resolve socket-default stroke vici updown 
> eap-identity eap-gtc eap-mschapv2 eap-radius eap-tls eap-ttls eap-peap 
> xauth-generic xauth-eap counters
> Listening IP addresses:
>   94.xxx.xxx.xxx
>   2a03:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx
> Connections:
>        N2NTESTCONN:  xxx...yyy  IKEv2, dpddelay=10s
>        N2NTESTCONN:   local:  [xxx] uses public key authentication
>        N2NTESTCONN:    cert:  "C=EU, O=xxx, CN=xxx"
>        N2NTESTCONN:   remote: [yyy] uses public key authentication
>        N2NTESTCONN:    cert:  "C=EU, O=yyy, CN=yyy"
>        N2NTESTCONN:   child:  10.xxx.xxx.2/32 === 10.yyy.yyy.0/24 TUNNEL, 
> dpdaction=restart
> Security Associations (1 up, 0 connecting):
>        N2NTESTCONN[1]: ESTABLISHED 2 minutes ago, 
> 94.xxx.xxx.xxx[xxx]...87.yyy.yyy.yyy[yyy]
>        N2NTESTCONN[1]: IKEv2 SPIs: a14ff33decbcc124_i* 2a6d95dc56127468_r, 
> public key reauthentication in 2 hours
>        N2NTESTCONN[1]: IKE proposal: 
> AES_GCM_16_256/PRF_HMAC_SHA2_512/CURVE_25519
>        N2NTESTCONN{1}:  INSTALLED, TUNNEL, reqid 1, ESP in UDP SPIs: 
> f44fa42e_i cf5467e8_o
>        N2NTESTCONN{1}:  AES_GCM_16_256, 5040 bytes_i (60 pkts, 0s ago), 0 
> bytes_o, rekeying in 42 minutes
>        N2NTESTCONN{1}:   10.xxx.xxx.2/32 === 10.yyy.yyy.0/24

Traffic from the remote IPsec peer (which is a Linux machine) successfully 
reaches the
OpenBSD system ("5040 bytes_i"), but responses do not make it back ("0 
bytes_o"). Actually,
this is where I need help - manually installing SAs does not make sense to me.

Thank you in advance for any hints.

Best regards,
Peter Müller

P.S.: Sorry, I thought I had sent this to <misc@openbsd.org> already, but put 
in some
crappy To-Header. Sleep is no adequate substitution for caffeine... :-/

Reply via email to