Hi,

Testing sec(4) between 2 end points with iperf3, iked has lost the associated 
iface for the sec(4) point to point link. Specifically:

pfkey_sa: unsupported interface

Here is the surround log for the event:

Aug 14 11:30:54 terminator iked[93171]: spi=0x635987a83a22a13e: recv 
CREATE_CHILD_SA req 3 peer 4.4.4.2:64893 local 4.4.4.1:4500, 305 bytes, policy 
'policy1'
Aug 14 11:30:54 terminator iked[93171]: spi=0x635987a83a22a13e: send 
CREATE_CHILD_SA res 3 peer 4.4.4.2:64893 local 4.4.4.1:4500, 177 bytes, NAT-T
Aug 14 11:30:54 terminator iked[93171]: pfkey_sa: unsupported interface
Aug 14 11:30:54 terminator iked[93171]: spi=0x635987a83a22a13e: 
ikev2_log_proposal: ESP #1 ENCR=AES_GCM_16-128
Aug 14 11:30:54 terminator iked[93171]: spi=0x635987a83a22a13e: 
ikev2_log_proposal: ESP #1 ENCR=AES_GCM_16-256
Aug 14 11:30:54 terminator iked[93171]: spi=0x635987a83a22a13e: 
ikev2_log_proposal: ESP #1 ESN=ESN
Aug 14 11:30:54 terminator iked[93171]: spi=0x635987a83a22a13e: 
ikev2_log_proposal: ESP #1 ESN=NONE
Aug 14 11:30:54 terminator iked[93171]: spi=0x635987a83a22a13e: 
ikev2_log_proposal: ESP #2 ENCR=AES_CBC-256
Aug 14 11:30:54 terminator iked[93171]: spi=0x635987a83a22a13e: 
ikev2_log_proposal: ESP #2 ENCR=AES_CBC-192
Aug 14 11:30:54 terminator iked[93171]: spi=0x635987a83a22a13e: 
ikev2_log_proposal: ESP #2 ENCR=AES_CBC-128
Aug 14 11:30:54 terminator iked[93171]: spi=0x635987a83a22a13e: 
ikev2_log_proposal: ESP #2 INTEGR=HMAC_SHA2_256_128
Aug 14 11:30:54 terminator iked[93171]: spi=0x635987a83a22a13e: 
ikev2_log_proposal: ESP #2 INTEGR=HMAC_SHA2_384_192
Aug 14 11:30:54 terminator iked[93171]: spi=0x635987a83a22a13e: 
ikev2_log_proposal: ESP #2 INTEGR=HMAC_SHA2_512_256
Aug 14 11:30:54 terminator iked[93171]: spi=0x635987a83a22a13e: 
ikev2_log_proposal: ESP #2 INTEGR=HMAC_SHA1_96
Aug 14 11:30:54 terminator iked[93171]: spi=0x635987a83a22a13e: 
ikev2_log_proposal: ESP #2 ESN=ESN
Aug 14 11:30:54 terminator iked[93171]: spi=0x635987a83a22a13e: 
ikev2_log_proposal: ESP #2 ESN=NONE
Aug 14 11:30:54 terminator iked[93171]: spi=0x635987a83a22a13e: 
ikev2_add_error: NO_PROPOSAL_CHOSEN
Aug 14 11:30:54 terminator iked[93171]: spi=0x635987a83a22a13e: send 
CREATE_CHILD_SA res 3 peer 4.4.4.2:64893 local 4.4.4.1:4500, 65 bytes, NAT-T
Aug 14 11:30:54 terminator iked[93171]: spi=0x635987a83a22a13e: deleted 1 SPI: 
0x37249f77
Aug 14 11:33:04 terminator iked[93171]: spi=0xffb183f53eae6546: recv 
IKE_SA_INIT req 0 peer 4.4.4.2:60926 local 4.4.4.1:500, 518 bytes, policy 
'policy2'
Aug 14 11:33:04 terminator iked[93171]: spi=0xffb183f53eae6546: send 
IKE_SA_INIT res 0 peer 4.4.4.2:60926 local 4.4.4.1:500, 235 bytes
Aug 14 11:33:04 terminator iked[93171]: spi=0xffb183f53eae6546: recv IKE_AUTH 
req 1 peer 4.4.4.2:64893 local 4.4.4.1:4500, 475 bytes, policy 'policy2'
Aug 14 11:33:04 terminator iked[93171]: spi=0xffb183f53eae6546: send IKE_AUTH 
res 1 peer 4.4.4.2:64893 local 4.4.4.1:4500, 341 bytes, NAT-T
Aug 14 11:33:04 terminator iked[93171]: pfkey_sa: unsupported interface
Aug 14 11:35:43 terminator iked[93171]: spi=0xffb183f53eae6546: sa_free: reload
Aug 14 11:37:45 terminator iked[93171]: spi=0x635987a83a22a13e: retransmit 1 
INFORMATIONAL req 6 peer 4.4.4.2:64893 local 4.4.4.1:4500
Aug 14 11:37:49 terminator iked[93171]: spi=0x635987a83a22a13e: retransmit 2 
INFORMATIONAL req 6 peer 4.4.4.2:64893 local 4.4.4.1:4500
Aug 14 11:37:57 terminator iked[93171]: spi=0x635987a83a22a13e: retransmit 3 
INFORMATIONAL req 6 peer 4.4.4.2:64893 local 4.4.4.1:4500
Aug 14 11:38:13 terminator iked[93171]: spi=0x635987a83a22a13e: retransmit 4 
INFORMATIONAL req 6 peer 4.4.4.2:64893 local 4.4.4.1:4500
Aug 14 11:38:45 terminator iked[93171]: spi=0x635987a83a22a13e: retransmit 5 
INFORMATIONAL req 6 peer 4.4.4.2:64893 local 4.4.4.1:4500
Aug 14 11:39:04 terminator iked[93171]: spi=0x8e5dc9e7e8a397e0: recv 
IKE_SA_INIT req 0 peer 4.4.4.2:63301 local 4.4.4.1:500, 518 bytes, policy 
'policy6'
Aug 14 11:39:04 terminator iked[93171]: spi=0x8e5dc9e7e8a397e0: send 
IKE_SA_INIT res 0 peer 4.4.4.2:63301 local 4.4.4.1:500, 235 bytes
Aug 14 11:39:04 terminator iked[93171]: spi=0x8e5dc9e7e8a397e0: recv IKE_AUTH 
req 1 peer 4.4.4.2:64893 local 4.4.4.1:4500, 473 bytes, policy 'policy6'
Aug 14 11:39:04 terminator iked[93171]: spi=0x8e5dc9e7e8a397e0: send IKE_AUTH 
res 1 peer 4.4.4.2:64893 local 4.4.4.1:4500, 342 bytes, NAT-T
Aug 14 11:39:04 terminator iked[93171]: spi=0x8e5dc9e7e8a397e0: 
ikev2_childsa_enable: loaded SPIs: 0xbd533d62, 0xf7d5e5fd (enc aes-128-gcm esn)
Aug 14 11:39:04 terminator iked[93171]: spi=0x8e5dc9e7e8a397e0: established 
peer 4.4.4.2:64893[IPV4/10.56.0.0] local 4.4.4.1:4500[IPV4/4.4.4.1] policy 
'policy5' as responder (enc aes-128-gcm group curve25519 prf hmac-sha2-256)
Aug 14 11:39:49 terminator iked[93171]: spi=0x635987a83a22a13e: sa_free: 
retransmit limit reached

To fix the connection and bring it back online the following had to be 
performed (sec30 was the interface for context):

ifconfig sec30 destroy
ifconfig sec30 create 10.56.2.254/24 10.56.2.1 mtu 1438 up
ikectl reload

The tunnel from the active peer is eventually negotiated and the connection 
resumes.

/etc/iked.conf:

ikev2 passive from 4.4.4.1 to 10.56.0.0 peer any srcid 4.4.4.1 dstid 10.56.0.0 
iface sec30
ikev2 passive from 4.4.4.1 to 10.56.0.1 peer any srcid 4.4.4.1 dstid 10.56.0.1 
iface sec31

Happy to provide anything else that might be necessary.

Thanks, Jason.

Reply via email to