Ok I've got the same error on three different OpenBSD, tell me what error
do you want or if you want an access.

Kind regards

On Mon, Feb 22, 2021 at 11:33 AM Tobias Heider <tobias.hei...@stusta.de>
wrote:

> On Mon, Feb 22, 2021 at 09:06:58AM +0100, Riccardo Giuntoli wrote:
> > I there I've got a lot of problems putting a IKE2 point to point
> connection
> > stable between OpenBSD/OpenIKED and VyOS/Strongswan.
> >
> > Basically OpenBSD is a transport GRE in passive mode. Strongswan active
> GRE
> > transport. Gre tunnel is builded above and keepalive work in all the two
> > sides, because I've changed the beaviour of the tun interface in linux.
> >
> > This is the error that I've got also in the OpenBSD side:
> >
> > Feb 22 07:54:34 ganesha iked[26646]: spi=0x53365c1f26b25ca8:
> > ikev2_ike_sa_rekey: busy, delaying rekey
> > Feb 22 07:54:34 ganesha iked[26646]: spi=0xbbc576f1b7bbeff8:
> > ikev2_ike_sa_rekey: busy, delaying rekey
> > Feb 22 07:54:35 ganesha iked[26646]: pfkey_sa_lookup: message: No such
> > process
> > Feb 22 07:54:35 ganesha iked[26646]: pfkey_sa_lookup: message: No such
> > process
> > Feb 22 07:54:38 ganesha iked[26646]: spi=0xa74b9d54a7346659:
> > ikev2_ike_sa_rekey: busy, delaying rekey
> > Feb 22 07:54:38 ganesha iked[26646]: pfkey_sa_lookup: message: No such
> > process
> > Feb 22 07:54:38 ganesha iked[26646]: pfkey_sa_lookup: message: No such
> > process
> > Feb 22 07:54:39 ganesha iked[26646]: spi=0xb1cc5054712c2e6e:
> > ikev2_ike_sa_rekey: busy, delaying rekey
> > Feb 22 07:54:40 ganesha iked[26646]: spi=0x56465bd460d16d54:
> > ikev2_ike_sa_rekey: busy, delaying rekey
> > Feb 22 07:54:40 ganesha iked[26646]: pfkey_sa_lookup: message: No such
> > process
> >
>
> I don't see any obvious misconfiguration so this might be a bug,
> but without the log i won't be able to help.
>
> - Tobias
>
> >
> > Here you are the Strongswan configuration:
> >
> > conn XXXX
> > keyexchange=ikev2
> > type=transport
> > auto=start
> > reauth=no
> > ikelifetime=1h
> > dpdaction=restart
> >         dpddelay=15
> >         dpdtimeout=1
> > closeaction=restart
> >
> > left=%defaultroute
> > leftsourceip=%config4
> > leftauth=pubkey
> > leftid=%indra@XXXX
> > leftprotoport=gre
> > leftupdown=/config/ipsec/ESJP-updown.sh
> >
> > right=XXXX
> > rightsubnet=XXXX
> > rightauth=pubkey
> > rightid=%jXXXX
> > rightcert=/etc/ipsec.d/certs/XXXX.crt
> > rightprotoport=gre
> >
> > #!/bin/bash
> >
> > set -o nounset
> > set -o errexit
> >
> > TUN_IFACE="tun2"
> >
> > case "${PLUTO_VERB}" in
> > up-host)
> > echo "Putting interface ${TUN_IFACE} up"
> > ifconfig $TUN_IFACE up
> > echo "Disabling IPsec policy (SPD) for ${TUN_IFACE}"
> > sysctl -w "net.ipv4.conf.${TUN_IFACE}.disable_policy=1"
> > echo "Accepting gre keepalive"
> > sysctl -w "net.ipv4.conf.${TUN_IFACE}.accept_local=1"
> > ;;
> > down-host)
> > ifconfig $TUN_IFACE down
> > ;;
> > esac
> >
> > IKE is checked with DPD
> > SA is checked with te script
> >
> > above also a cron script acting in this way:
> >
> > #!/bin/bash
> > ROUTER_IP=XXXX
> > IPSEC="XXXX"
> > GRE="tun2"
> >
> > PING_RESULT=$(fping -I$GRE $ROUTER_IP 2>&1)
> > ALIVE="alive"
> > STATUS=$(ipsec status $IPSEC)
> > ESTABLISED="INSTALLED"
> >
> > if [[ "$PING_RESULT" != *"$ALIVE"* ]]; then
> > if [[ "$STATUS" == *"$ESTABLISHED"* ]]; then
> > ipsec stroke down-nb $IPSEC
> > ipsec up $IPSEC
> > else
> > ipsec up $IPSEC
> > fi
> > fi
> >
> > In the OpenBSD side:
> >
> > set dpd_check_interval 15
> > ikev2 "XXXX" passive transport \
> > proto gre \
> > from XXXX to XXXX\
> > local jXXXXpeer any \
> > ikesa uth hmac-sha2-256 enc aes-256 group ecp256  \
> >         childsa auth hmac-sha2-256 enc aes-256 group ecp256 \
> > srcid "shiva@XXXX"  \
> > ikelifetime 86400 lifetime 3600
> >
> > root@shiva:/etc# cat hostname.gre1
> >
> >
> >
> > description "XXXX"
> > keepalive 5 2
> > mtu 1392
> > !ifconfig gre1 XXXX4 XXXX netmask 0xfffffffc up
> > !ifconfig gre1 tunnel XXXX XXXX
> > root@shiva:/etc#
> >
> > And some ifstated to check keepalive status.
> >
> > Any suggestions?
> >
> > --
> > Name: Riccardo Giuntoli
> > Email: tag...@gmail.com
> > Location: sant Pere de Ribes, BCN, Spain
> > PGP Key: 0x67123739
> > PGP Fingerprint: CE75 16B5 D855 842FAB54 FB5C DDC6 4640 6712 3739
> > Key server: hkp://wwwkeys.eu.pgp.net
>


-- 
Name: Riccardo Giuntoli
Email: tag...@gmail.com
Location: sant Pere de Ribes, BCN, Spain
PGP Key: 0x67123739
PGP Fingerprint: CE75 16B5 D855 842FAB54 FB5C DDC6 4640 6712 3739
Key server: hkp://wwwkeys.eu.pgp.net

Reply via email to