Hi Shelton,

Thanks for looking into it.
I tried configuring algorithms on the Responder side as well.
But I'm still getting same issue.

Following are new logs after configuring algorithms on the Responder side.



#################################################
Initiator logs
#################################################

vpp# sh version
vpp v22.06-rc0~419-g3bad8b62d built by root on 621e087e9003 at
2022-08-23T09:42:28
vpp#
vpp#
vpp# sh ikev2 sa details
iip 192.168.4.2 ispi fcc61beef0453f0b rip 192.168.4.1 rspi 9e829dfd7459e1e2
 encr:aes-cbc-256 prf:hmac-sha2-256 integ:hmac-sha2-256-128
dh-group:modp-2048
 nonce i:c27f0db96d146a3341234e44175b5c22bd99003568445b5ab1efc0ae7a9d1cad
       r:8fda6a237bad68f5634bc726af060a1de519917f4697b52dd8b436ade609d3b3
 SK_d    955729e2b56f7bcd1ea6fc90dc9a3578000e64383f77d1c427155b8bd10f63ec
 SK_a  i:213fc1a783dfa9676d67f574c33269506524629158b19f710223bf1235266050
       r:dc5bcc89e2db45c75e3384db276af9fb92b56f408aceebcdb47e07f8e6ee0211
 SK_e  i:be8e5d171d0259bfc1a0256a38ec8583bfcfc23a16c60eae9ac7ff8bcf6df459
       r:c59a59b1f07e6d4342585d2906f990253fcb6ba8ae75b399c29568a64620a91d
 SK_p  i:7c215210e7e405345d73341c8049b55227d49a1ecf1dbd77967f61e5c3565936
       r:55776381aa80c244ce4e80e00479ce9142db34ec7abed697f1109c24bf66e457
 identifier (i) id-type fqdn data roadwarrior.vpn.example.com
 identifier (r) id-type fqdn data vpp.home
   child sa 0:
    spi(i) 92d8eaad spi(r) 0
    SK_e  i:
          r:
    traffic selectors (i):0 type 7 protocol_id 0 addr 192.168.5.0 -
192.168.5.255 port 0 - 65535
    traffic selectors (r):0 type 7 protocol_id 0 addr 192.168.3.0 -
192.168.3.255 port 0 - 65535
Stats:
 keepalives :0
 rekey :0
 SA init :0 (retransmit: 0)
 retransmit: 0
 SA auth :0

vpp#
vpp#
vpp# sh ikev2 profile
profile pr1
  auth-method shared-key-mic auth data Vpp123
  local id-type fqdn data roadwarrior.vpn.example.com
  remote id-type fqdn data vpp.home
  local traffic-selector addr 192.168.5.0 - 192.168.5.255 port 0 - 65535
protocol 0
  remote traffic-selector addr 192.168.3.0 - 192.168.3.255 port 0 - 65535
protocol 0
  responder fpeth0 192.168.4.1
  ike-crypto-alg aes-cbc 256 ike-integ-alg hmac-sha2-256-128 ike-dh
modp-2048
  esp-crypto-alg aes-cbc 256 esp-integ-alg none
  lifetime 3600 jitter 10 handover 5 maxdata 0
vpp#
vpp#
vpp#
vpp# sh interface fpeth0
              Name               Idx    State  MTU (L3/IP4/IP6/MPLS)
Counter          Count
fpeth0                            1      up          9000/0/0/0     rx
packets                     7
                                                                    rx
bytes                    1208
                                                                    tx
packets                     7
                                                                    tx
bytes                    1270
                                                                    drops
                       3
                                                                    ip4
                       6
vpp#

#################################################
Responder logs
#################################################
vpp#
vpp# set interface state fpeth0 up
vpp# set interface ip address fpeth0 192.168.4.1/24
vpp#
vpp# ikev2 profile add pr1
vpp# ikev2 profile set pr1 auth shared-key-mic string Vpp123
vpp# ikev2 profile set pr1 id local fqdn vpp.home
vpp# ikev2 profile set pr1 id remote fqdn roadwarrior.vpn.example.com
vpp# ikev2 profile set pr1 traffic-selector remote ip-range 192.168.5.0 -
192.168.5.255 port-range 0 - 65535 protocol 0
vpp# ikev2 profile set pr1 traffic-selector local ip-range 192.168.3.0 -
192.168.3.255 port-range 0 - 65535 protocol 0
vpp#
vpp# ikev2 profile set pr1 ike-crypto-alg aes-cbc 256 ike-integ-alg
hmac-sha2-256-128 ike-dh modp-2048
vpp# ikev2 profile set pr1 esp-crypto-alg aes-cbc 256
vpp# ikev2 profile set pr1 sa-lifetime 3600 10 5 0
vpp#
vpp# sh ikev2 sa
iip 192.168.4.2 ispi fcc61beef0453f0b rip 192.168.4.1 rspi 9e829dfd7459e1e2
vpp# sh ikev2 sa details
iip 192.168.4.2 ispi fcc61beef0453f0b rip 192.168.4.1 rspi 9e829dfd7459e1e2
 encr:aes-cbc-256 prf:hmac-sha2-256 integ:hmac-sha2-256-128
dh-group:modp-2048
 nonce i:c27f0db96d146a3341234e44175b5c22bd99003568445b5ab1efc0ae7a9d1cad
       r:8fda6a237bad68f5634bc726af060a1de519917f4697b52dd8b436ade609d3b3
 SK_d    955729e2b56f7bcd1ea6fc90dc9a3578000e64383f77d1c427155b8bd10f63ec
 SK_a  i:213fc1a783dfa9676d67f574c33269506524629158b19f710223bf1235266050
       r:dc5bcc89e2db45c75e3384db276af9fb92b56f408aceebcdb47e07f8e6ee0211
 SK_e  i:be8e5d171d0259bfc1a0256a38ec8583bfcfc23a16c60eae9ac7ff8bcf6df459
       r:c59a59b1f07e6d4342585d2906f990253fcb6ba8ae75b399c29568a64620a91d
 SK_p  i:7c215210e7e405345d73341c8049b55227d49a1ecf1dbd77967f61e5c3565936
       r:55776381aa80c244ce4e80e00479ce9142db34ec7abed697f1109c24bf66e457
 identifier (i) id-type fqdn data roadwarrior.vpn.example.com
 identifier (r) id-type fqdn data vpp.home
   child sa 0:encr:aes-cbc-256  esn:yes
    spi(i) 92d8eaad spi(r) dc01af31
    SK_e  i:
          r:
    traffic selectors (i):0 type 7 protocol_id 0 addr 192.168.5.0 -
192.168.5.255 port 0 - 65535
    traffic selectors (r):0 type 7 protocol_id 0 addr 192.168.3.0 -
192.168.3.255 port 0 - 65535
Stats:
 keepalives :0
 rekey :0
 SA init :1 (retransmit: 0)
 retransmit: 0
 SA auth :1

vpp#
vpp#
vpp#
vpp# sh ikev2 profile
profile pr1
  auth-method shared-key-mic auth data Vpp123
  local id-type fqdn data vpp.home
  remote id-type fqdn data roadwarrior.vpn.example.com
  local traffic-selector addr 192.168.3.0 - 192.168.3.255 port 0 - 65535
protocol 0
  remote traffic-selector addr 192.168.5.0 - 192.168.5.255 port 0 - 65535
protocol 0
  ike-crypto-alg aes-cbc 256 ike-integ-alg hmac-sha2-256-128 ike-dh
modp-2048
  esp-crypto-alg aes-cbc 256 esp-integ-alg none
  lifetime 3600 jitter 10 handover 5 maxdata 0
vpp#

Anything else that needs to be checked ?

Thanks
Nilesh Inamdar

On Thu, Aug 25, 2022 at 11:06 PM Xiaodong Xu <stid.s...@gmail.com> wrote:

> Did you make sure the algorithms (for both encryption and authentication)
> used for initiator and responder match? It looks like you didn't configure
> the algorithms for either IKE SA or IPsec SA the responder, I don't know if
> the default setting will work.
> If you are unsure about it either, I'd suggest you specify the parameters
> explicitly like:
>
> # ikev2 profile set pr1 ike-crypto-alg aes-cbc 256 ike-integ-alg
> hmac-sha2-256-128 ike-dh modp-2048
> # ikev2 profile set pr1 esp-crypto-alg aes-cbc 256 esp-integ-alg
> hmac-sha2-256-128
>
> Shelton
>
> On Thu, Aug 25, 2022 at 10:13 AM Nilesh Inamdar <
> nileshinamdar1...@gmail.com> wrote:
>
>> Hi Team,
>>
>> I am new to VPP. I am trying to bringup IPSec session between 2 VPP using
>> IKEv2 plugin.
>> I followed this link : https://wiki.fd.io/view/VPP/IPSec_and_IKEv2
>>
>> After doing all the configuration and executing "ikev2 initiate sa-init
>> pr1",
>> I am guessing that child SA is not getting installed properly on the
>> Initiator side. (And ipip0 tunnel interface is not getting created.)
>>
>> Following is the topology:
>> vpp-responder (fpeth0) (192.168.4.1) ---------------------- (192.168.4.2)
>> (fpeth0)vpp-initiator
>>
>> Following are Initiator side logs:
>>
>> #######################################
>> Initiator side logs :
>> #######################################
>> vpp# sh version
>> vpp v22.06-rc0~419-g3bad8b62d built by root on 621e087e9003 at
>> 2022-08-23T09:42:28
>> vpp#
>> vpp#
>> vpp# ikev2 profile add pr1
>> vpp# ikev2 profile set pr1 auth shared-key-mic string Vpp123
>> vpp# ikev2 profile set pr1 id local fqdn roadwarrior.vpn.example.com
>> vpp# ikev2 profile set pr1 id remote fqdn vpp.home
>> vpp# ikev2 profile set pr1 traffic-selector local ip-range 192.168.5.0 -
>> 192.168.5.255 port-range 0 - 65535 protocol 0
>> vpp# ikev2 profile set pr1 traffic-selector remote ip-range 192.168.3.0 -
>> 192.168.3.255 port-range 0 - 65535 protocol 0
>> vpp#
>> vpp#
>> vpp# ikev2 profile set pr1 responder fpeth0 192.168.4.1
>> vpp# ikev2 profile set pr1 ike-crypto-alg aes-cbc 256  ike-integ-alg
>> sha1-96  ike-dh modp-2048
>> vpp# ikev2 profile set pr1 esp-crypto-alg aes-cbc 256
>> vpp# ikev2 profile set pr1 sa-lifetime 3600 10 5 0
>> vpp#
>> vpp#
>> vpp#
>> vpp# ikev2 initiate sa-init pr1
>> vpp#
>> vpp# sh ikev2 sa
>> iip 192.168.4.2 ispi e59b30749fdb90e9 rip 192.168.4.1 rspi
>> 23083f242006bd44
>> vpp#
>> vpp# sh ikev2 sa details
>> iip 192.168.4.2 ispi e59b30749fdb90e9 rip 192.168.4.1 rspi
>> 23083f242006bd44
>>  encr:aes-cbc-256 prf:hmac-sha2-256 integ:sha1-96 dh-group:modp-2048
>>  nonce i:b0f1ff98f782298f24adacd8f44bb239bab2715c94d11e64e5e10dc448749701
>>        r:556eb695f2d950b9a96b76a5f159063f8e9af37834bfd2a0f0dce85f81b47a4b
>>  SK_d    5834ae92d682b541a517062cf92e85fd34c1400732c1269eedb8e097db335fae
>>  SK_a  i:3b13c1603645860190751759274be0d04f036403
>>        r:9d30918c5fde614ec883cc1a889b549733deac04
>>  SK_e  i:d4323c469246648d98b3b4432d4e4f4c64cd9e94f434c3af24d5af71c455ed6c
>>        r:75717e36023e71401916f2e3d2a6a7bc21d6a9410c8548058f268036498dd5c1
>>  SK_p  i:bdda78f8c65cd043a102864c26ee0ad7db4af6a602c7c38e4e0a51be75169ebf
>>        r:e1e88dbd92d97eee689433d2d33a926c398082b229d0d8e1d21f2662cf649056
>>  identifier (i) id-type fqdn data roadwarrior.vpn.example.com
>>  identifier (r) id-type fqdn data vpp.home
>>    child sa 0:
>>     spi(i) 858968d7 *spi(r) 0*
>>     SK_e  i:
>>           r:
>>     traffic selectors (i):0 type 7 protocol_id 0 addr 192.168.5.0 -
>> 192.168.5.255 port 0 - 65535
>>     traffic selectors (r):0 type 7 protocol_id 0 addr 192.168.3.0 -
>> 192.168.3.255 port 0 - 65535
>> Stats:
>>  keepalives :0
>>  rekey :0
>>  SA init :0 (retransmit: 0)
>>  retransmit: 0
>>  SA auth :0
>>
>> vpp#
>>
>>
>> ###########################################
>> Responder side logs :
>> ###########################################
>> vpp# sh version
>> vpp v22.06-rc0~419-g3bad8b62d built by root on 621e087e9003 at
>> 2022-08-23T09:42:28
>> vpp#
>> vpp# sh interface fpeth0 addr
>> fpeth0 (up):
>>   L3 192.168.4.1/24
>> vpp# ping 192.168.4.2
>> 116 bytes from 192.168.4.2: icmp_seq=2 ttl=64 time=.1323 ms
>> 116 bytes from 192.168.4.2: icmp_seq=3 ttl=64 time=.0256 ms
>> 116 bytes from 192.168.4.2: icmp_seq=4 ttl=64 time=.0228 ms
>> 116 bytes from 192.168.4.2: icmp_seq=5 ttl=64 time=.0259 ms
>>
>> Statistics: 5 sent, 4 received, 20% packet loss
>> vpp#
>> vpp# ikev2 profile add pr1
>> vpp# ikev2 profile set pr1 auth shared-key-mic string Vpp123
>> vpp# ikev2 profile set pr1 id local fqdn vpp.home
>> vpp# ikev2 profile set pr1 id remote fqdn roadwarrior.vpn.example.com
>> vpp# ikev2 profile set pr1 traffic-selector remote ip-range 192.168.5.0 -
>> 192.168.5.255 port-range 0 - 65535 protocol 0
>> vpp# ikev2 profile set pr1 traffic-selector local ip-range 192.168.3.0 -
>> 192.168.3.255 port-range 0 - 65535 protocol 0
>> vpp#
>> vpp#
>> vpp# sh ikev2 sa details
>> iip 192.168.4.2 ispi e59b30749fdb90e9 rip 192.168.4.1 rspi
>> 23083f242006bd44
>>  encr:aes-cbc-256 prf:hmac-sha2-256 integ:sha1-96 dh-group:modp-2048
>>  nonce i:b0f1ff98f782298f24adacd8f44bb239bab2715c94d11e64e5e10dc448749701
>>        r:556eb695f2d950b9a96b76a5f159063f8e9af37834bfd2a0f0dce85f81b47a4b
>>  SK_d    5834ae92d682b541a517062cf92e85fd34c1400732c1269eedb8e097db335fae
>>  SK_a  i:3b13c1603645860190751759274be0d04f036403
>>        r:9d30918c5fde614ec883cc1a889b549733deac04
>>  SK_e  i:d4323c469246648d98b3b4432d4e4f4c64cd9e94f434c3af24d5af71c455ed6c
>>        r:75717e36023e71401916f2e3d2a6a7bc21d6a9410c8548058f268036498dd5c1
>>  SK_p  i:bdda78f8c65cd043a102864c26ee0ad7db4af6a602c7c38e4e0a51be75169ebf
>>        r:e1e88dbd92d97eee689433d2d33a926c398082b229d0d8e1d21f2662cf649056
>>  identifier (i) id-type fqdn data roadwarrior.vpn.example.com
>>  identifier (r) id-type fqdn data vpp.home
>>    child sa 0:encr:aes-cbc-256  esn:yes
>>     spi(i) 858968d7 spi(r) ded8f883
>>     SK_e  i:
>>           r:
>>     traffic selectors (i):0 type 7 protocol_id 0 addr 192.168.5.0 -
>> 192.168.5.255 port 0 - 65535
>>     traffic selectors (r):0 type 7 protocol_id 0 addr 192.168.3.0 -
>> 192.168.3.255 port 0 - 65535
>> Stats:
>>  keepalives :0
>>  rekey :0
>>  SA init :1 (retransmit: 0)
>>  retransmit: 0
>>  SA auth :1
>>
>> vpp#
>>
>>
>> ########################
>> Plugins used in vpp.conf
>> ########################
>> plugins {
>>     plugin default { disable }
>>     plugin dpdk_plugin.so  { enable }
>>     plugin ping_plugin.so  { enable }
>>     plugin memif_plugin.so  { enable }
>>     plugin linux_cp_plugin.so {enable}
>>     plugin linux_nl_plugin.so {enable}
>>     plugin ikev2_plugin.so {enable}
>> }
>>
>> Can anyone please help with what I am missing here ?
>> Let me know if you need any more logs/debugs.
>>
>> Thanks
>> Nilesh Inamdar
>>
>>
>>
>>
>>
> 
>
>
-=-=-=-=-=-=-=-=-=-=-=-
Links: You receive all messages sent to this group.
View/Reply Online (#21828): https://lists.fd.io/g/vpp-dev/message/21828
Mute This Topic: https://lists.fd.io/mt/93252927/21656
Group Owner: vpp-dev+ow...@lists.fd.io
Unsubscribe: https://lists.fd.io/g/vpp-dev/leave/1480452/21656/631435203/xyzzy 
[arch...@mail-archive.com]
-=-=-=-=-=-=-=-=-=-=-=-

Reply via email to