Ok, thanks for the clarification!

On Fri, May 21, 2021 at 12:30 PM csszep <css...@gmail.com> wrote:

> Hi!
>
> Not only Cisco ASA. Checkpoint, Fortinet, Juniper only support single set
> of subnets per CHILD_SA too.
>
> https://wiki.strongswan.org/projects/strongswan/wiki/Checkpoint
> https://wiki.strongswan.org/projects/strongswan/wiki/Fortinet
> https://wiki.strongswan.org/projects/strongswan/wiki/Juniper
> https://wiki.strongswan.org/projects/strongswan/wiki/CiscoInteroperability
>
> Unfortunately the workaround does not always work. IKED established multiple 
> IKE SA to the same peer if set up separate connection per subnet.
>
> For example Strongswan drop multiple IKE SA from the same peer if 
> uniqueid=yes (default setup):
>
> *Uniqueness* of an IKE_SA, used to drop multiple connections with one peer.
>
> Of course, for Strongswan, this is not a problem because it handles multiple 
> SAs per CHILD SA, but other implementation this can be a problem.
>
>
>
>
>
>
> Денис Давыдов <dyna...@gmail.com> ezt írta (időpont: 2021. máj. 21., P,
> 10:02):
>
>> It turns out that the Cisco ASA has a bug CSCue42170 with open status that
>> prevents multiple traffic selectors from being supported in one child SA
>> in
>> IKEv2.
>>
>> For more information:
>>
>> https://bst.cloudapps.cisco.com/bugsearch/bug/CSCue42170/?reffering_site=dumpcr
>>
>> Known affected releases: 8.6(1), 9.1(7.13), 9.4(3.6)
>>
>> On Wed, May 12, 2021 at 7:44 PM Денис Давыдов <dyna...@gmail.com> wrote:
>>
>> > Finally solved! Tried TS one after another. To put it mildly, I'm
>> > surprised. it turns out that the equipment on the remote side is
>> configured
>> > in such a way that for each TS I had to set up a separate connection.
>> This
>> > configuration working fine now:
>> >
>> > ikev2 crypto-primary active esp \
>> >       from 10.21.139.8/30 to 2.2.2.2 \
>> >       peer 7.7.7.7 \
>> >       ikesa auth hmac-sha2-256 enc aes-256 prf hmac-sha2-256 group
>> > modp2048 \
>> >       childsa auth hmac-sha2-256 enc aes-256 group modp2048 \
>> >       ikelifetime 86400 lifetime 28800 \
>> >       psk "*****"
>> >
>> > ikev2 crypto-primary active esp \
>> >       from 10.21.139.8/30 to 3.3.3.3 \
>> >       peer 7.7.7.7 \
>> >       ikesa auth hmac-sha2-256 enc aes-256 prf hmac-sha2-256 group
>> > modp2048 \
>> >       childsa auth hmac-sha2-256 enc aes-256 group modp2048 \
>> >       ikelifetime 86400 lifetime 28800 \
>> >       psk "*****"
>> >
>> > Tobias, thanks for your time and attention to my problem.
>> >
>> > On Wed, May 12, 2021 at 3:36 PM Денис Давыдов <dyna...@gmail.com>
>> wrote:
>> >
>> >> Tobias,
>> >>
>> >> I replaced the OpenBSD with the same configuration:
>> >> -> % uname -r -p
>> >> 6.9 amd64
>> >>
>> >> Now, with this configuration:
>> >>
>> >> ikev2 crypto-primary active esp \
>> >>       from any to any \
>> >>       peer 7.7.7.7 \
>> >>       ikesa auth hmac-sha2-256 enc aes-256 prf hmac-sha2-256 group
>> >> modp2048 \
>> >>       childsa auth hmac-sha2-256 enc aes-256 group modp2048 \
>> >>       ikelifetime 86400 lifetime 28800 \
>> >>       psk "*****"
>> >>
>> >> I got NO_PROPOSAL_CHOSEN: https://pastebin.com/Puhx41DZ
>> >>
>> >> And with the original configuration, which was agreed with the
>> provider:
>> >>
>> >> ikev2 crypto-primary active esp \
>> >>       from 10.21.139.8/30 to 2.2.2.2 \
>> >>       from 10.21.139.8/30 to 3.3.3.3 \
>> >>       peer 7.7.7.7 \
>> >>       ikesa auth hmac-sha2-256 enc aes-256 prf hmac-sha2-256 group
>> >> modp2048 \
>> >>       childsa auth hmac-sha2-256 enc aes-256 group modp2048 \
>> >>       ikelifetime 86400 lifetime 28800 \
>> >>       psk "*****"
>> >>
>> >> I still got TS_UNACCEPTABLE: https://pastebin.com/nw0usUJi
>> >>
>> >> I don't know where to dig anymore. The remote side is not responding
>> yet.
>> >> I contacted another provider who shared their configuration from the
>> same
>> >> Cisco model ASA 5585 (IKEv2 works with that hardware without
>> problems). The
>> >> only difference is that they have no these two options (although, I am
>> not
>> >> an expert in Cisco IKEv2 configuration either):
>> >>
>> >> crypto map outside_map 2470 set connection-type answer-only
>> >> crypto map outside_map 2470 set reverse-route
>> >>
>> >> I understand that everyone is already tired of this topic. I will be in
>> >> close contact with this provider. If I can connect to their equipment,
>> I'll
>> >> write what the problem was. Most likely the problem is in their
>> >> configuration, rather than the problem in iked itself. I am sorry for
>> the
>> >> time wasted.
>> >>
>> >> Oh! One more question: Can iked work with the same TS but different
>> peers
>> >> at the same time?  Am I correct in understanding that this is not
>> possible?
>> >> The remote side just offers the same settings for two public IP
>> addresses
>> >> from their side (they have two different crypto peers). So far, I just
>> >> commented out the configuration with the second peer.
>> >>
>> >>
>> >> On Wed, May 12, 2021 at 12:33 PM Tobias Heider <
>> tobias.hei...@stusta.de>
>> >> wrote:
>> >>
>> >>> On Wed, May 12, 2021 at 12:06:21PM +0300, Денис Давыдов wrote:
>> >>> > I tried to specify an explicit parameter -T to disable NAT-Traversal
>> >>> > auto-detection and use `local' parameter. Also according to your
>> advice
>> >>> > tried a configuration like this:
>> >>> >
>> >>> > ikev2 crypto-primary active esp \
>> >>> >       from any to any \
>> >>> >       local 1.1.1.1 peer 7.7.7.7 \
>> >>> >       ikesa auth hmac-sha2-256 enc aes-256 prf hmac-sha2-256 group
>> >>> modp2048
>> >>> > \
>> >>> >       childsa auth hmac-sha2-256 enc aes-256 group modp2048 \
>> >>> >       ikelifetime 86400 lifetime 28800 \
>> >>> >       psk "secret"
>> >>> >
>> >>> > And I got:
>> >>> >
>> >>> > May 12 08:45:17 crypto-gw2 iked[17640]: ikev2_pld_payloads:
>> decrypted
>> >>> > payload TSi nextpayload TSr critical 0x00 length 8
>> >>> > May 12 08:45:17 crypto-gw2 iked[17640]: ikev2_pld_tss: count 1
>> length 0
>> >>> > May 12 08:45:17 crypto-gw2 iked[17640]: ikev2_validate_ts: malformed
>> >>> > payload: too short for header (0 < 8)
>> >>> > May 12 08:45:17 crypto-gw2 iked[17640]: ikev2_validate_pld:
>> malformed
>> >>> > payload: shorter than minimum header size (0 < 4)
>> >>>
>> >>> This looks like you're running < 6.9 where any doesn't work for
>> traffic
>> >>> selectors.  Either try using 0.0.0.0/0 instead or even better update
>> >>> to the latest version.
>> >>>
>> >>> >
>> >>> > Full log: https://pastebin.com/MLC4VXSs
>> >>> >
>> >>> > P.S. Tried removing the ikelifetime and lifetime parameters as well.
>> >>> Did
>> >>> > not help, the same behavior.
>> >>> >
>> >>> > On Tue, May 11, 2021 at 7:43 PM Tobias Heider <
>> tobias.hei...@stusta.de
>> >>> >
>> >>> > wrote:
>> >>> >
>> >>> > > From my limited understanding of cisco ASA configs i can't see any
>> >>> > > obvious problems.
>> >>> > >
>> >>> > > You could try setting 'from any to any' on your side to see how
>> the
>> >>> server
>> >>> > > responds. If the server is configured to narrow traffic selectors,
>> >>> the
>> >>> > > handshake
>> >>> > > should succeed and the log will tell you the exact traffic
>> selectors
>> >>> you
>> >>> > > need
>> >>> > > in your config (look for ikev2_pld_ts in the verbose log).
>> >>> > >
>> >>> > > On Tue, May 11, 2021 at 01:47:53PM +0300, Денис Давыдов wrote:
>> >>> > > > Tobias,
>> >>> > > >
>> >>> > > > The remote side gave me their Cisco ASA 5585 settings and they
>> >>> showed the
>> >>> > > > logs:
>> >>> > > >
>> >>> > > > object network Svc_2_2_2_2
>> >>> > > > host 2.2.2.2
>> >>> > > > object network Svc_3_3_3_3
>> >>> > > > host 3.3.3.3
>> >>> > > > crypto ipsec ikev2 ipsec-proposal ESP-AES256-SHA2
>> >>> > > > protocol esp encryption aes-256
>> >>> > > > protocol esp integrity sha-256
>> >>> > > >
>> >>> > > > object-group network Customer
>> >>> > > > description Customer
>> >>> > > > network-object 10.21.139.8 255.255.255.252
>> >>> > > > object-group network ISP-to-Customer
>> >>> > > > description ISP-to-Customer
>> >>> > > > network-object object Svc_2_2_2_2
>> >>> > > > network-object object Svc_3_3_3_3
>> >>> > > > access-list outside_cryptomap_2470 extended permit ip
>> object-group
>> >>> > > > ISP-to-Customer object-group Customer
>> >>> > > > crypto ipsec ikev2 ipsec-proposal ESP-AES256-SHA2
>> >>> > > > crypto map outside_map 2470 match address outside_cryptomap_2470
>> >>> > > > crypto map outside_map 2470 set pfs group14
>> >>> > > > crypto map outside_map 2470 set connection-type answer-only
>> >>> > > > crypto map outside_map 2470 set peer 1.1.1.1
>> >>> > > > crypto map outside_map 2470 set ikev2 ipsec-proposal
>> >>> ESP-AES256-SHA2
>> >>> > > > crypto map outside_map 2470 set nat-t-disable
>> >>> > > > crypto map outside_map 2470 set reverse-route
>> >>> > > > crypto ikev2 policy 100
>> >>> > > > encryption aes-256
>> >>> > > > integrity sha
>> >>> > > > group 21 20 19 24 14 5 2
>> >>> > > > prf sha
>> >>> > > > lifetime seconds 28800
>> >>> > > > tunnel-group 1.1.1.1 type ipsec-l2l
>> >>> > > > tunnel-group 1.1.1.1 general-attributes
>> >>> > > > default-group-policy GroupPolicy-Def-IKE2
>> >>> > > > tunnel-group 1.1.1.1 ipsec-attributes
>> >>> > > > ikev1 pre-shared-key *****
>> >>> > > > ikev2 remote-authentication pre-shared-key *****
>> >>> > > > ikev2 local-authentication pre-shared-key *****
>> >>> > > >  ikev2 local-authentication pre-shared-key *****
>> >>> > > >
>> >>> > > > asa-8m-a5-820-l2l/sec/act# sh logg | i 1.1.1.1
>> >>> > > > May 11 2021 13:35:11: %ASA-7-609001: Built local-host
>> >>> outside:1.1.1.1
>> >>> > > > May 11 2021 13:35:11: %ASA-6-302015: Built inbound UDP
>> connection
>> >>> > > > 1392894457 for outside:1.1.1.1/500 (1.1.1.1/500) to identity:
>> >>> 7.7.7.7/500
>> >>> > > (
>> >>> > > > 7.7.7.7/500)
>> >>> > > > May 11 2021 13:35:11: %ASA-7-713906: IKE Receiver: Packet
>> received
>> >>> on
>> >>> > > > 7.7.7.7:500 from 1.1.1.1:500
>> >>> > > > May 11 2021 13:35:11: %ASA-5-750002: Local:7.7.7.7:500 Remote:
>> >>> > > 1.1.1.1:500
>> >>> > > > Username:Unknown IKEv2 Received a IKE_INIT_SA request
>> >>> > > > May 11 2021 13:35:11: %ASA-7-713906: IKE Receiver: Packet
>> received
>> >>> on
>> >>> > > > 7.7.7.7:500 from 1.1.1.1:500
>> >>> > > > May 11 2021 13:35:11: %ASA-5-750007: Local:7.7.7.7:500 Remote:
>> >>> > > 1.1.1.1:500
>> >>> > > > Username:1.1.1.1 IKEv2 SA DOWN. Reason: application initiated
>> >>> > > > May 11 2021 13:35:11: %ASA-4-113019: Group = 1.1.1.1, Username =
>> >>> 1.1.1.1,
>> >>> > > > IP = 1.1.1.1, Session disconnected. Session Type: LAN-to-LAN,
>> >>> Duration:
>> >>> > > > 0h:05m:00s, Bytes xmt: 0, Bytes rcv: 0, Reason: IKE Delete
>> >>> > > > May 11 2021 13:35:11: %ASA-5-750006: Local:7.7.7.7:500 Remote:
>> >>> > > 1.1.1.1:500
>> >>> > > > Username:1.1.1.1 IKEv2 SA UP. Reason: New Connection Established
>> >>> > > > May 11 2021 13:35:11: %ASA-6-113009: AAA retrieved default group
>> >>> policy
>> >>> > > > (GroupPolicy-Def-IKE2) for user = 1.1.1.1
>> >>> > > >
>> >>> > > >
>> >>> > > > P.S. This is strange, but with another provider, which has the
>> >>> Cisco ASA
>> >>> > > > 5585-SSP10, there are no such problems.
>> >>> > > >
>> >>> > > > --
>> >>> > > > Sincerely,
>> >>> > > > Denis
>> >>> > > >
>> >>> > > > On Fri, May 7, 2021 at 1:10 PM Tobias Heider <
>> >>> tobias.hei...@stusta.de>
>> >>> > > > wrote:
>> >>> > > >
>> >>> > > > > On Fri, May 07, 2021 at 12:17:35PM +0300, Денис Давыдов wrote:
>> >>> > > > > > Hello all,
>> >>> > > > > >
>> >>> > > > > > I can't understand why I got SA_INIT timeout:
>> >>> > > > > > May  5 13:18:54 crypto-gw2 iked[65530]:
>> spi=0x73bcd531eb2e8899:
>> >>> > > sa_free:
>> >>> > > > > > SA_INIT timeout
>> >>> > > > > >
>> >>> > > > > > 1.1.1.1 (crypto-gw2) - my host
>> >>> > > > > > 7.7.7.7 - our isp provider (some of cisco devices)
>> >>> > > > > >
>> >>> > > > > > /etc/iked.conf (on 1.1.1.1):
>> >>> > > > > >
>> >>> > > > > > ikev2 crypto-primary active esp \
>> >>> > > > > >       from 10.21.139.8/30 to 2.2.2.2 \
>> >>> > > > > >       from 10.21.139.8/30 to 3.3.3.3 \
>> >>> > > > > >       peer 7.7.7.7 \
>> >>> > > > > >       ikesa auth hmac-sha2-256 enc aes-256 prf hmac-sha2-256
>> >>> group
>> >>> > > > > modp2048
>> >>> > > > > > \
>> >>> > > > > >       childsa auth hmac-sha2-256 enc aes-256 group modp2048
>> \
>> >>> > > > > >       ikelifetime 86400 lifetime 28800 \
>> >>> > > > > >       psk "secret"
>> >>> > > > > >
>> >>> > > > > > The remote side claims to have the same settings.
>> >>> > > > > >
>> >>> > > > > > crypto-gw2# ikectl sh sa | grep 7.7.7.7
>> >>> > > > > > iked_sas: 0xb0e1878b7d0 rspi 0x2d606f017d098928 ispi
>> >>> > > 0xd0497626849535cd
>> >>> > > > > > 1.1.1.1:500->7.7.7.7:500<IPV4/217.118.86.15>[]
>> AUTH_SUCCESS i
>> >>> nexti
>> >>> > > 0x0
>> >>> > > > > pol
>> >>> > > > > > 0xb0e9b38d000
>> >>> > > > > >
>> >>> > > > > > Why CHILD_SA is not being created? I tried to figure it out
>> >>> from the
>> >>> > > logs
>> >>> > > > > > but couldn't.
>> >>> > > > >
>> >>> > > > >
>> >>> > > > > It looks like the peer sends its IKE_AUTH reply without SA
>> >>> payload but
>> >>> > > > > with a TS_UNACCEPTABLE notification.
>> >>> > > > > The most likely cause is that your "from ... to ..."
>> >>> configuration is
>> >>> > > > > incompatible with the configuration of your peer.
>> >>> > > > >
>> >>> > > > > Thanks for the report, I will see how I can make this error
>> more
>> >>> > > obvious
>> >>> > > > > in the logs.
>> >>> > > > >
>> >>> > >
>> >>>
>> >>
>>
>

Reply via email to