Sorry for the msg spam. I think the issue is OVS is still using the legacy
*strongswan-starter* systemd service unit which uses *charon*, while the
strongswan on our OS is installed with the new version *strongswan* unit
which uses *charon-systemd*. At this point, I'm not sure if we can make OVS
work with our environment with strongSwan since I don't think we can fall
back to the legacy unit.

On Fri, Aug 16, 2024 at 12:03 AM Jim C <jimc84...@gmail.com> wrote:

> Actually, it's probably due to this on that strongSwan page: *Note: Some
> distributions (e.g. Fedora and its offsprings) rename the ipsec command to
> strongswan*
>
> We found out that we have the *strongswan* command on our Rocky host.
> Then we need to change all the fields in here
> <https://github.com/openvswitch/ovs/blob/v3.4.0/ipsec/ovs-monitor-ipsec.in#L222-L228>
>  to
> run strongswan command instead of ipsec?
>
> On Thu, Aug 15, 2024 at 11:33 PM Jim C <jimc84...@gmail.com> wrote:
>
>> From this strongSwan page
>> <https://wiki.strongswan.org/projects/strongswan/wiki/Ipseccommand>, it
>> seems we need to install strongswan-starter for ipsec cmd to pick it up.
>> But that's for the legacy use case. Now we should probably use swanctl?
>>
>> On Thu, Aug 15, 2024 at 5:10 PM Jim C <jimc84...@gmail.com> wrote:
>>
>>> Hi,
>>>
>>> This might be a follow up to our previous thread
>>> <https://mail.openvswitch.org/pipermail/ovs-discuss/2024-August/053256.html>
>>> on using strongSwan for OVS on Rocky (RHEL).
>>>
>>> We have updated the option --ike-daemon=libreswan to
>>> --ike-daemon=strongswan in file
>>> /usr/lib/systemd/system/openvswitch-ipsec.service. And restarting the
>>> openvswitch-ipsec service works this time.
>>>
>>> We next tried to create a gre tunnel with ipsec enabled (we specified
>>> PSK) between two machines. But we then saw this error from the
>>> openvswitch-ipsec daemon:
>>>
>>>
>>>
>>>
>>>
>>> *2024-08-15T22:44:47.154Z |  30 | ovs-monitor-ipsec | INFO | Tunnel tun
>>> appeared in OVSDB2024-08-15T22:44:47.155Z |  32 | ovs-monitor-ipsec | INFO
>>> | Refreshing StrongSwan configuration2024-08-15T22:44:47.162Z |  33 |
>>> ovs-monitor-ipsec | ERR | StrongSwan failed to update configuration:b''
>>>  b'/usr/sbin/ipsec: unknown IPsec command "update" ("ipsec --help" for
>>> list)\n'*
>>>
>>> We then checked our ipsec:
>>> *ipsec --version* returns *Libreswan 4.9*
>>> *ipsec --help* also does not have an option for update
>>>
>>> I assume ipsec.service is bound to libreswan, is that correct?
>>> If that's the case, then why do we need to call it for the strongSwan
>>> use case? I suppose they should not even co-exist.
>>> If ipsec.service is not only bound to libreswan, should we let
>>> ipsec.service know that we are using strongSwan now? How to config that?
>>>
>>> Thanks,
>>> Jim
>>>
>>
_______________________________________________
discuss mailing list
disc...@openvswitch.org
https://mail.openvswitch.org/mailman/listinfo/ovs-discuss

Reply via email to