Hallo,
habe ein Problem mit 24.1.5_3 VPN: IPsec: Connections - Roadwarriors IKEv2 EAP-MSCHAPv2 und Shared IP pool.
Eingerichtet nach: https://docs.opnsense.org/manual/how-tos/ipsec-swanctl-rw-ikev2-eap-mschapv2.html mit abweichungen:
Pool10.0.1.1/30
General settingsProposals: aes256gcm16-sha512-curve448 [DH32, Modern EC]
Send cert req: [ ]
Send certificate: if asked
ChildrenESP proposals aes256gcm16-curve448 [DH32, Modern EC]
Die Verbindung bleibt laut Android 13 strongswan Client bestehen,
WAN IP ersetzt
Benutzer ersetzt
stronswan Client IP = Original (Bogon / NAT?) aber nicht gleich wie im FW IPsec Log
Quote
Apr 10 21:22:00 00[DMN] +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
Apr 10 21:22:00 00[DMN] Starting IKE service (strongSwan 5.9.11, Android 13 - lineage_beryllium-userdebug 13 TQ3A.230901.001 eng.root.20240202.205748 dev-keys/2024-01-05, POCO F1 - Xiaomi/beryllium/Xiaomi, Linux 4.9.337-perf-g4583022b1192, aarch64, org.strongswan.android)
Apr 10 21:22:00 00[LIB] loaded plugins: androidbridge charon android-log socket-default openssl nonce pkcs1 pem x509 xcbc kdf revocation eap-identity eap-mschapv2 eap-md5 eap-gtc eap-tls
Apr 10 21:22:00 00[JOB] spawning 16 worker threads
Apr 10 21:22:00 00[LIB] all OCSP validation disabled
Apr 10 21:22:00 00[LIB] all CRL validation disabled
Apr 10 21:22:00 05[IKE] initiating IKE_SA android[125] to fixeWANip
Apr 10 21:22:00 05[ENC] generating IKE_SA_INIT request 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) N(HASH_ALG) N(REDIR_SUP) ]
Apr 10 21:22:00 05[NET] sending packet: from 100.76.196.82[42787] to fixeWANip[500] (948 bytes)
Apr 10 21:22:00 06[NET] received packet: from fixeWANip[500] to 100.76.196.82[42787] (38 bytes)
Apr 10 21:22:00 06[ENC] parsed IKE_SA_INIT response 0 [ N(INVAL_KE) ]
Apr 10 21:22:00 06[IKE] peer didn't accept DH group ECP_256, it requested CURVE_448
Apr 10 21:22:00 06[IKE] initiating IKE_SA android[125] to fixeWANip
Apr 10 21:22:00 06[ENC] generating IKE_SA_INIT request 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) N(HASH_ALG) N(REDIR_SUP) ]
Apr 10 21:22:00 06[NET] sending packet: from 100.76.196.82[42787] to fixeWANip[500] (940 bytes)
Apr 10 21:22:00 07[NET] received packet: from fixeWANip[500] to 100.76.196.82[42787] (264 bytes)
Apr 10 21:22:00 07[ENC] parsed IKE_SA_INIT response 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) N(HASH_ALG) N(CHDLESS_SUP) N(MULT_AUTH) ]
Apr 10 21:22:00 07[CFG] selected proposal: IKE:AES_GCM_16_256/PRF_HMAC_SHA2_512/CURVE_448
Apr 10 21:22:00 07[IKE] local host is behind NAT, sending keep alives
Apr 10 21:22:00 07[IKE] sending cert request for "C=AT, ST=Stadt, L=Stadt, O=Name, E=user@domain.tld, CN=IPsec CA ECC"
Apr 10 21:22:00 07[IKE] establishing CHILD_SA android{235}
Apr 10 21:22:00 07[ENC] generating IKE_AUTH request 1 [ IDi N(INIT_CONTACT) CERTREQ CPRQ(ADDR ADDR6 DNS DNS6) SA TSi TSr N(MOBIKE_SUP) N(NO_ADD_ADDR) N(MULT_AUTH) N(EAP_ONLY) N(MSG_ID_SYN_SUP) ]
Apr 10 21:22:00 07[NET] sending packet: from 100.76.196.82[39416] to fixeWANip[4500] (455 bytes)
Apr 10 21:22:00 10[NET] received packet: from fixeWANip[4500] to 100.76.196.82[39416] (1234 bytes)
Apr 10 21:22:00 10[ENC] parsed IKE_AUTH response 1 [ IDr CERT AUTH EAP/REQ/ID ]
Apr 10 21:22:00 10[IKE] received end entity cert "C=AT, ST=Stadt, L=Stadt, O=Name, E=user@domain.tld, CN=fixeWANip"
Apr 10 21:22:00 10[CFG] using certificate "C=AT, ST=Stadt, L=Stadt, O=Name, E=user@domain.tld, CN=fixeWANip"
Apr 10 21:22:00 10[CFG] using trusted ca certificate "C=AT, ST=Stadt, L=Stadt, O=Name, E=user@domain.tld, CN=IPsec CA ECC"
Apr 10 21:22:00 10[CFG] reached self-signed root ca with a path length of 0
Apr 10 21:22:00 10[IKE] authentication of 'fixeWANip' with ECDSA_WITH_SHA512_DER successful
Apr 10 21:22:00 10[IKE] server requested EAP_IDENTITY (id 0x00), sending 'user@domain.tld'
Apr 10 21:22:00 10[ENC] generating IKE_AUTH request 2 [ EAP/RES/ID ]
Apr 10 21:22:00 10[NET] sending packet: from 100.76.196.82[39416] to fixeWANip[4500] (87 bytes)
Apr 10 21:22:00 11[NET] received packet: from fixeWANip[4500] to 100.76.196.82[39416] (97 bytes)
Apr 10 21:22:00 11[ENC] parsed IKE_AUTH response 2 [ EAP/REQ/MSCHAPV2 ]
Apr 10 21:22:00 11[IKE] server requested EAP_MSCHAPV2 authentication (id 0x4A)
Apr 10 21:22:00 11[ENC] generating IKE_AUTH request 3 [ EAP/RES/MSCHAPV2 ]
Apr 10 21:22:00 11[NET] sending packet: from 100.76.196.82[39416] to fixeWANip[4500] (141 bytes)
Apr 10 21:22:00 12[NET] received packet: from fixeWANip[4500] to 100.76.196.82[39416] (134 bytes)
Apr 10 21:22:00 12[ENC] parsed IKE_AUTH response 3 [ EAP/REQ/MSCHAPV2 ]
Apr 10 21:22:00 12[IKE] EAP-MS-CHAPv2 succeeded: 'Welcome2strongSwan'
Apr 10 21:22:00 12[ENC] generating IKE_AUTH request 4 [ EAP/RES/MSCHAPV2 ]
Apr 10 21:22:00 12[NET] sending packet: from 100.76.196.82[39416] to fixeWANip[4500] (67 bytes)
Apr 10 21:22:00 13[NET] received packet: from fixeWANip[4500] to 100.76.196.82[39416] (65 bytes)
Apr 10 21:22:00 13[ENC] parsed IKE_AUTH response 4 [ EAP/SUCC ]
Apr 10 21:22:00 13[IKE] EAP method EAP_MSCHAPV2 succeeded, MSK established
Apr 10 21:22:00 13[IKE] authentication of 'user@domain.tld' (myself) with EAP
Apr 10 21:22:00 13[ENC] generating IKE_AUTH request 5 [ AUTH ]
Apr 10 21:22:00 13[NET] sending packet: from 100.76.196.82[39416] to fixeWANip[4500] (129 bytes)
Apr 10 21:22:01 14[NET] received packet: from fixeWANip[4500] to 100.76.196.82[39416] (277 bytes)
Apr 10 21:22:01 14[ENC] parsed IKE_AUTH response 5 [ AUTH CPRP(ADDR DNS) N(ESP_TFC_PAD_N) SA TSi TSr N(MOBIKE_SUP) N(ADD_4_ADDR) N(ADD_4_ADDR) ]
Apr 10 21:22:01 14[IKE] authentication of 'fixeWANip' with EAP successful
Apr 10 21:22:01 14[IKE] installing DNS server 10.0.0.1
Apr 10 21:22:01 14[IKE] installing new virtual IP 10.0.1.1
Apr 10 21:22:01 14[IKE] peer supports MOBIKE
Apr 10 21:22:01 14[IKE] IKE_SA android[125] established between 100.76.196.82[user@domain.tld]...fixeWANip[fixeWANip]
Apr 10 21:22:01 14[IKE] scheduling rekeying in 35584s
Apr 10 21:22:01 14[IKE] maximum IKE_SA lifetime 37384s
Apr 10 21:22:01 14[IKE] received ESP_TFC_PADDING_NOT_SUPPORTED, not using ESPv3 TFC padding
Apr 10 21:22:01 14[CFG] selected proposal: ESP:AES_GCM_16_256/NO_EXT_SEQ
Apr 10 21:22:01 14[IKE] CHILD_SA android{235} established with SPIs 8fc58f43_i cd9c01bb_o and TS 10.0.1.1/32 === 0.0.0.0/0
Apr 10 21:22:01 14[DMN] setting up TUN device for CHILD_SA android{235}
Apr 10 21:22:01 14[DMN] successfully created TUN device
Apr 10 21:22:31 13[NET] received packet: from fixeWANip[4500] to 100.76.196.82[39416] (57 bytes)
Apr 10 21:22:31 13[ENC] parsed INFORMATIONAL request 0 [ ]
Apr 10 21:22:31 13[ENC] generating INFORMATIONAL response 0 [ ]
Apr 10 21:22:31 13[NET] sending packet: from 100.76.196.82[39416] to fixeWANip[4500] (57 bytes)
Apr 10 21:23:01 06[NET] received packet: from fixeWANip[4500] to 100.76.196.82[39416] (57 bytes)
Apr 10 21:23:01 06[ENC] parsed INFORMATIONAL request 1 [ ]
Apr 10 21:23:01 06[ENC] generating INFORMATIONAL response 1 [ ]
Apr 10 21:23:01 06[NET] sending packet: from 100.76.196.82[39416] to fixeWANip[4500] (57 bytes)
Apr 10 21:23:31 07[NET] received packet: from fixeWANip[4500] to 100.76.196.82[39416] (57 bytes)
Apr 10 21:23:31 07[ENC] parsed INFORMATIONAL request 2 [ ]
Apr 10 21:23:31 07[ENC] generating INFORMATIONAL response 2 [ ]
Apr 10 21:23:31 07[NET] sending packet: from 100.76.196.82[39416] to fixeWANip[4500] (57 bytes)
Apr 10 21:24:01 08[NET] received packet: from fixeWANip[4500] to 100.76.196.82[39416] (57 bytes)
Apr 10 21:24:01 08[ENC] parsed INFORMATIONAL request 3 [ ]
Apr 10 21:24:01 08[ENC] generating INFORMATIONAL response 3 [ ]
Apr 10 21:24:01 08[NET] sending packet: from 100.76.196.82[39416] to fixeWANip[4500] (57 bytes)
Apr 10 21:24:32 11[NET] received packet: from fixeWANip[4500] to 100.76.196.82[39416] (57 bytes)
Apr 10 21:24:32 11[ENC] parsed INFORMATIONAL request 4 [ ]
Apr 10 21:24:32 11[ENC] generating INFORMATIONAL response 4 [ ]
Apr 10 21:24:32 11[NET] sending packet: from 100.76.196.82[39416] to fixeWANip[4500] (57 bytes)
Apr 10 21:25:02 13[NET] received packet: from fixeWANip[4500] to 100.76.196.82[39416] (57 bytes)
Apr 10 21:25:02 13[ENC] parsed INFORMATIONAL request 5 [ ]
Apr 10 21:25:02 13[ENC] generating INFORMATIONAL response 5 [ ]
Apr 10 21:25:02 13[NET] sending packet: from 100.76.196.82[39416] to fixeWANip[4500] (57 bytes)
Apr 10 21:25:32 14[NET] received packet: from fixeWANip[4500] to 100.76.196.82[39416] (57 bytes)
Apr 10 21:25:32 14[ENC] parsed INFORMATIONAL request 6 [ ]
Apr 10 21:25:32 14[ENC] generating INFORMATIONAL response 6 [ ]
Apr 10 21:25:32 14[NET] sending packet: from 100.76.196.82[39416] to fixeWANip[4500] (57 bytes)
Apr 10 21:26:03 09[NET] received packet: from fixeWANip[4500] to 100.76.196.82[39416] (57 bytes)
Apr 10 21:26:03 09[ENC] parsed INFORMATIONAL request 7 [ ]
Apr 10 21:26:03 09[ENC] generating INFORMATIONAL response 7 [ ]
Apr 10 21:26:03 09[NET] sending packet: from 100.76.196.82[39416] to fixeWANip[4500] (57 bytes)
Apr 10 21:26:34 08[NET] received packet: from fixeWANip[4500] to 100.76.196.82[39416] (57 bytes)
Apr 10 21:26:34 08[ENC] parsed INFORMATIONAL request 8 [ ]
Apr 10 21:26:34 08[ENC] generating INFORMATIONAL response 8 [ ]
Apr 10 21:26:34 08[NET] sending packet: from 100.76.196.82[39416] to fixeWANip[4500] (57 bytes)
Apr 10 21:27:04 11[NET] received packet: from fixeWANip[4500] to 100.76.196.82[39416] (57 bytes)
Apr 10 21:27:04 11[ENC] parsed INFORMATIONAL request 9 [ ]
Apr 10 21:27:04 11[ENC] generating INFORMATIONAL response 9 [ ]
Apr 10 21:27:04 11[NET] sending packet: from 100.76.196.82[39416] to fixeWANip[4500] (57 bytes)
Apr 10 21:27:34 13[NET] received packet: from fixeWANip[4500] to 100.76.196.82[39416] (57 bytes)
Apr 10 21:27:34 13[ENC] parsed INFORMATIONAL request 10 [ ]
Apr 10 21:27:34 13[ENC] generating INFORMATIONAL response 10 [ ]
Apr 10 21:27:34 13[NET] sending packet: from 100.76.196.82[39416] to fixeWANip[4500] (57 bytes)
allerdings sehe ich im Log auf der FW folgende Fehler:
WAN IP ersetzt
strongswan IP ersetzt
Benutzer ersetzt
Quote from: IPsec Log
2024-04-10T21:42:54 Informational charon 07[CFG] <b67d9c3f-7a90-4c7b-9066-b8d3979b2ea3|252> lease 10.0.1.1 by 'user@domain.tld' went offline
2024-04-10T21:42:54 Informational charon 07[KNL] <b67d9c3f-7a90-4c7b-9066-b8d3979b2ea3|252> unable to delete SAD entry with SPI d58e1c7f: No such process (3)
2024-04-10T21:42:54 Informational charon 07[KNL] <b67d9c3f-7a90-4c7b-9066-b8d3979b2ea3|252> unable to delete SAD entry with SPI c09ab254: No such process (3)
2024-04-10T21:42:54 Informational charon 07[IKE] <b67d9c3f-7a90-4c7b-9066-b8d3979b2ea3|252> giving up after 5 retransmits
2024-04-10T21:42:14 Informational charon 07[KNL] creating delete job for CHILD_SA ESP/0xd58e1c7f/stronswanClient
2024-04-10T21:42:14 Informational charon 11[KNL] creating delete job for CHILD_SA ESP/0xc09ab254/fixeWANip
....
....
2024-04-10T21:31:57 Informational charon 15[IKE] <b67d9c3f-7a90-4c7b-9066-b8d3979b2ea3|252> sending DPD request
2024-04-10T21:31:18 Informational charon 05[JOB] CHILD_SA ESP/0xcd9c01bb/fixeWANip not found for rekey
2024-04-10T21:31:13 Informational charon 05[NET] <b67d9c3f-7a90-4c7b-9066-b8d3979b2ea3|252> sending packet: from fixeWANip[4500] to stronswanClient[48938] (277 bytes)
2024-04-10T21:31:13 Informational charon 05[ENC] <b67d9c3f-7a90-4c7b-9066-b8d3979b2ea3|252> generating IKE_AUTH response 5 [ AUTH CPRP(ADDR DNS) N(ESP_TFC_PAD_N) SA TSi TSr N(MOBIKE_SUP) N(ADD_4_ADDR) N(ADD_4_ADDR) ]
2024-04-10T21:31:13 Notice charon [UPDOWN] received up-client event for reqid 1
2024-04-10T21:31:13 Informational charon 05[IKE] <b67d9c3f-7a90-4c7b-9066-b8d3979b2ea3|252> CHILD_SA 50d5bb11-9c85-418f-8fb3-4723cd142472{222} established with SPIs c09ab254_i d58e1c7f_o and TS 0.0.0.0/0 === 10.0.1.1/32
2024-04-10T21:31:13 Informational charon 05[CFG] <b67d9c3f-7a90-4c7b-9066-b8d3979b2ea3|252> selected proposal: ESP:AES_GCM_16_256/NO_EXT_SEQ
2024-04-10T21:31:13 Informational charon 05[IKE] <b67d9c3f-7a90-4c7b-9066-b8d3979b2ea3|252> maximum IKE_SA lifetime 2437s
2024-04-10T21:31:13 Informational charon 05[IKE] <b67d9c3f-7a90-4c7b-9066-b8d3979b2ea3|252> scheduling rekeying in 2197s
2024-04-10T21:31:13 Informational charon 05[IKE] <b67d9c3f-7a90-4c7b-9066-b8d3979b2ea3|252> IKE_SA b67d9c3f-7a90-4c7b-9066-b8d3979b2ea3[252] established between fixeWANip[fixeWANip]...stronswanClient[user@domain.tld]
2024-04-10T21:31:13 Informational charon 05[IKE] <b67d9c3f-7a90-4c7b-9066-b8d3979b2ea3|252> assigning virtual IP 10.0.1.1 to peer 'user@domain.tld'
2024-04-10T21:31:13 Informational charon 05[CFG] <b67d9c3f-7a90-4c7b-9066-b8d3979b2ea3|252> reassigning offline lease to 'user@domain.tld'
....
....
....
2024-04-10T16:05:06 Informational charon 13[CFG] <b67d9c3f-7a90-4c7b-9066-b8d3979b2ea3|241> reassigning offline lease to 'user@domain.tld'
2024-04-10T16:05:06 Informational charon 02[CFG] <b67d9c3f-7a90-4c7b-9066-b8d3979b2ea3|239> lease 10.0.1.1 by 'user@domain.tld' went offline
2024-04-10T15:55:45 Informational charon 05[CFG] <b67d9c3f-7a90-4c7b-9066-b8d3979b2ea3|239> reassigning offline lease to 'user@domain.tld'
2024-04-10T15:55:44 Informational charon 05[CFG] <b67d9c3f-7a90-4c7b-9066-b8d3979b2ea3|237> lease 10.0.1.1 by 'user@domain.tld' went offline
2024-04-10T15:46:37 Informational charon 10[CFG] <b67d9c3f-7a90-4c7b-9066-b8d3979b2ea3|237> reassigning offline lease to 'user@domain.tld'
2024-04-10T15:46:37 Informational charon 10[CFG] <b67d9c3f-7a90-4c7b-9066-b8d3979b2ea3|235> lease 10.0.1.1 by 'user@domain.tld' went offline
2024-04-10T15:37:18 Informational charon 12[CFG] <b67d9c3f-7a90-4c7b-9066-b8d3979b2ea3|235> reassigning offline lease to 'user@domain.tld'
2024-04-10T15:37:18 Informational charon 12[CFG] <b67d9c3f-7a90-4c7b-9066-b8d3979b2ea3|233> lease 10.0.1.1 by 'user@domain.tld' went offline
2024-04-10T15:28:04 Informational charon 11[CFG] <b67d9c3f-7a90-4c7b-9066-b8d3979b2ea3|233> reassigning offline lease to 'user@domain.tld'
2024-04-10T15:28:04 Informational charon 15[CFG] <b67d9c3f-7a90-4c7b-9066-b8d3979b2ea3|231> lease 10.0.1.1 by 'user@domain.tld' went offline
2024-04-10T15:18:39 Informational charon 13[CFG] <b67d9c3f-7a90-4c7b-9066-b8d3979b2ea3|231> reassigning offline lease to 'user@domain.tld'
2024-04-10T15:18:39 Informational charon 13[CFG] <b67d9c3f-7a90-4c7b-9066-b8d3979b2ea3|229> lease 10.0.1.1 by 'user@domain.tld' went offline
Ich freue mich über jede Hilfe.
grEEtZ,
gongoscho
Welche Auswirkungen auf die Verbindung haben die Fehler? Gibt es Verbindungsunterbrechungen, Paketloss, hohe Pingzeiten etc, oder läuft es einfach und die Fehler sind transient?
Ja, laut Client bin ich immer verbunden, aber nach einer Zeit funktioniert die VPN-Verbindung nicht mehr.
Muss die aktuelle Verbindung neu verbinden bzw. VPN aus- / ein- schalten.
Kannst du mal deine swanctl.conf teilen? Ich will sehen wie die Konfiguration genau aussieht, dann kann ich sie nachstellen.
/usr/local/etc/swanctl/swanctl.conf
Ja klar, kein Thema
WAN IP ersetzt
Benutzer ersetzt
# This file is automatically generated. Do not edit
connections {
b67d9c3f-7a90-4c7b-9066-b8d3979b2ea3 {
proposals = aes256gcm16-sha512-x448
unique = no
aggressive = no
version = 2
mobike = yes
encap = no
rekey_time = 2400
dpd_delay = 30
pools = pool-roadwarrior-ipv4
send_certreq = no
send_cert = ifasked
keyingtries = 0
local-dbce23c1-b493-410d-b77d-6ba8a78cd10d {
round = 0
auth = pubkey
id = fixeWANip
certs = 66034635e0793.crt
}
remote-829cf7fd-dea2-43ac-bf37-74dbd1cf0628 {
round = 0
auth = eap-mschapv2
eap_id = %any
}
children {
50d5bb11-9c85-418f-8fb3-4723cd142472 {
esp_proposals = aes256gcm16-x448
sha256_96 = no
start_action = trap
close_action = none
dpd_action = clear
mode = tunnel
policies = yes
local_ts = 0.0.0.0/0
rekey_time = 600
updown = /usr/local/opnsense/scripts/ipsec/updown_event.py --connection_child 50d5bb11-9c85-418f-8fb3-4723cd142472
}
}
}
}
pools {
pool-roadwarrior-ipv4 {
addrs = 10.0.1.1/30
dns = 10.0.0.1
}
}
secrets {
eap-04e3f318-ddcd-4336-a662-3e2341bd913f {
id-0 = user@domain.tld
secret = ***
}
eap-cfed74c7-7b04-4e65-a77c-67406002b6ae {
id-0 = user@domain.tld
secret = ***
}
}
# Include config snippets
include conf.d/*.conf
Was mir sofort aufgefallen ist, dass die Verschlüsselung nicht mit der in der UI übereinstimmt!
GUI: Curve448, swanctl.conf: x448
Seltsam...
Android Client v2.4.2
https://f-droid.org/de/packages/org.strongswan.android/
Auch mit 2.5.1 von https://strongswan.org/download.html (https://strongswan.org/download.html) probiert.
Mir fällt auf, das encap = no ist.
UDP Encapsulation muss auf android verwendet werden.
Zusätzlich hilft es das hier zu setzen:
```
local_port = 4500
remote_port = 4500
```
Der Pool sollte bei 0 gestartet werden.
10.0.1.1/30 ist vom CIDR her falsch.
Entweder: 10.0.1.0/30 oder das nächste 10.0.1.4/30
Ansonsten, das Zertifikat auf die IP Adresse zu setzen, das hab ich in der Anleitung auch anders geschrieben, da steht es soll ein FQDN sein. Aber da der Verbindungsaufbau geht, scheint die Methode auch gültig zu sein. Ist halt weniger flexibel wenn man das ausrollt und sich mal die IP ändert.
Oh man, UDP Encapsulation ist ein Fehler von mir!
Habe es ohne mal probiert, weil in der Anleitung ist es aktiv. Sorry! ::)
Danke für den Tipp mal mit den fixen UDP 4500 Port.
In der SAD stand zwar immer, esp-udp und im Android-Log auch immer 4500,
aber in den States am WAN sah ich auch 500 immer...
10.0.1.1 vertipper von mir :o und über geblieben von meinen Test mit nur einem Client: 10.0.1.1/32
Danke!
Also ganz kurios. Es hat sich mit UDP 4500 verschlimmert.
Habe auch probiert am Android Client NAT-T Keepalive Interval von 45 auf 20 zu setzen.
Habe jetzt eine neue IPsec Connection mit Curve25519 erstellt, Local addresses: fixeWANip gesetzt, ohne force UDP Encapsulation und die Verbindung ist jetzt stabil. Wird automatisch auf UDP 4500 aufgebaut, ohne was zu erzwingen.
Sehe keine Fehler mehr wie:
- lease 10.0.1.1 by 'user@domain.tld' went offline
- reassigning offline lease to 'user@domain.tld'
- not found for rekey, unable to delete SAD entry
WAN IP ersetzt
Benutzer ersetzt
Kennwörter ersetzt
# This file is automatically generated. Do not edit
connections {
5464e5a3-4a97-451f-b78f-8d18855e6188 {
proposals = aes256gcm16-sha512-x25519
unique = no
aggressive = no
version = 2
mobike = yes
local_addrs = fixeWANip
encap = no
rekey_time = 2400
dpd_delay = 30
pools = pool-roadwarrior-ipv4
send_certreq = no
send_cert = ifasked
keyingtries = 0
local-a1c07747-3e5b-4f13-8dda-b205da094557 {
round = 0
auth = pubkey
id = fixeWANip
certs = 66034635e0793.crt
}
remote-012c3dbd-2dde-4720-9c6c-eb3f7bcf8368 {
round = 0
auth = eap-mschapv2
eap_id = %any
}
children {
2a98dee1-e9d4-4383-864c-f6a13058bdd6 {
esp_proposals = aes256gcm16-x25519
sha256_96 = no
start_action = trap
close_action = none
dpd_action = clear
mode = tunnel
policies = yes
local_ts = 0.0.0.0/0
rekey_time = 600
updown = /usr/local/opnsense/scripts/ipsec/updown_event.py --connection_child 2a98dee1-e9d4-4383-864c-f6a13058bdd6
}
}
}
}
pools {
pool-roadwarrior-ipv4 {
addrs = 10.0.1.0/30
dns = 10.0.0.1
}
}
secrets {
eap-04e3f318-ddcd-4336-a662-3e2341bd913f {
id-0 = user@domain.tld
secret = ***
}
eap-cfed74c7-7b04-4e65-a77c-67406002b6ae {
id-0 = user@domain.tld
secret = ***
}
}
# Include config snippets
include conf.d/*.conf
Spannend dass hier wieder x25519 steht, und nicht Curve25519...
Allerdings habe ich ein seltsames Phänomen. Habe ja 2 Clients mit 10.0.1.0/30
Wenn 10.0.1.1 online ist, funktioniert alles, wenn zusätzlich 10.0.1.2 online ist können nicht mehr interne DNS-Einräge von 10.0.1.2 aufgelöst werden.
Meldet sich der betroffene Client an, wenn der andere nicht online ist, funktioniert alles.
Es liegt also nicht am Client.
Für das IPsec habe ich zum testen als FW Regel: from any to any.
Wegen dem FQDN, ich habe eine fixe IPv4 Adresse
Log
WAN IP ersetzt
strongswan IP ersetzt
2024-04-11T23:53:06 Informational charon 04[IKE] <5464e5a3-4a97-451f-b78f-8d18855e6188|8> CHILD_SA closed
2024-04-11T23:53:06 Informational charon 04[IKE] <5464e5a3-4a97-451f-b78f-8d18855e6188|8> received DELETE for ESP CHILD_SA with SPI 92faf950
2024-04-11T23:53:06 Informational charon 04[ENC] <5464e5a3-4a97-451f-b78f-8d18855e6188|8> parsed INFORMATIONAL response 11 [ D ]
2024-04-11T23:53:06 Informational charon 04[NET] <5464e5a3-4a97-451f-b78f-8d18855e6188|8> received packet: from stronswanClient [48476] to fixeWANip[4500] (69 bytes)
2024-04-11T23:53:05 Informational charon 04[NET] <5464e5a3-4a97-451f-b78f-8d18855e6188|8> sending packet: from fixeWANip[4500] to stronswanClient [48476] (69 bytes)
2024-04-11T23:53:05 Informational charon 04[ENC] <5464e5a3-4a97-451f-b78f-8d18855e6188|8> generating INFORMATIONAL request 11 [ D ]
2024-04-11T23:53:05 Informational charon 04[IKE] <5464e5a3-4a97-451f-b78f-8d18855e6188|8> sending DELETE for ESP CHILD_SA with SPI cd2ed3b8
2024-04-11T23:53:05 Informational charon 04[IKE] <5464e5a3-4a97-451f-b78f-8d18855e6188|8> closing CHILD_SA 2a98dee1-e9d4-4383-864c-f6a13058bdd6{4} with SPIs cd2ed3b8_i (48177 bytes) 92faf950_o (0 bytes) and TS 0.0.0.0/0 === 10.0.1.2/32
2024-04-11T23:53:05 Informational charon 04[IKE] <5464e5a3-4a97-451f-b78f-8d18855e6188|8> outbound CHILD_SA 2a98dee1-e9d4-4383-864c-f6a13058bdd6{6} established with SPIs c6efcc69_i 5f937ac8_o and TS 0.0.0.0/0 === 10.0.1.2/32
2024-04-11T23:53:05 Informational charon 04[IKE] <5464e5a3-4a97-451f-b78f-8d18855e6188|8> inbound CHILD_SA 2a98dee1-e9d4-4383-864c-f6a13058bdd6{6} established with SPIs c6efcc69_i 5f937ac8_o and TS 0.0.0.0/0 === 10.0.1.2/32
2024-04-11T23:53:05 Informational charon 04[CFG] <5464e5a3-4a97-451f-b78f-8d18855e6188|8> selected proposal: ESP:AES_GCM_16_256/CURVE_25519/NO_EXT_SEQ
2024-04-11T23:53:05 Informational charon 04[ENC] <5464e5a3-4a97-451f-b78f-8d18855e6188|8> parsed CREATE_CHILD_SA response 10 [ SA No KE TSi TSr ]
2024-04-11T23:53:05 Informational charon 04[NET] <5464e5a3-4a97-451f-b78f-8d18855e6188|8> received packet: from stronswanClient [48476] to fixeWANip[4500] (225 bytes)
2024-04-11T23:53:05 Informational charon 04[NET] <5464e5a3-4a97-451f-b78f-8d18855e6188|8> sending packet: from fixeWANip[4500] to stronswanClient [48476] (245 bytes)
2024-04-11T23:53:05 Informational charon 04[ENC] <5464e5a3-4a97-451f-b78f-8d18855e6188|8> generating CREATE_CHILD_SA request 10 [ N(REKEY_SA) N(ESP_TFC_PAD_N) SA No KE TSi TSr ]
2024-04-11T23:53:05 Informational charon 04[IKE] <5464e5a3-4a97-451f-b78f-8d18855e6188|8> establishing CHILD_SA 2a98dee1-e9d4-4383-864c-f6a13058bdd6{6} reqid 2
2024-04-11T23:53:05 Informational charon 04[KNL] creating rekey job for CHILD_SA ESP/0xcd2ed3b8/fixeWANip
2024-04-11T23:52:49 Informational charon 04[ENC] <5464e5a3-4a97-451f-b78f-8d18855e6188|8> parsed INFORMATIONAL response 9 [ ]
2024-04-11T23:52:49 Informational charon 04[NET] <5464e5a3-4a97-451f-b78f-8d18855e6188|8> received packet: from stronswanClient [48476] to fixeWANip[4500] (57 bytes)
2024-04-11T23:52:49 Informational charon 04[NET] <5464e5a3-4a97-451f-b78f-8d18855e6188|8> sending packet: from fixeWANip[4500] to stronswanClient [48476] (57 bytes)
2024-04-11T23:52:49 Informational charon 04[ENC] <5464e5a3-4a97-451f-b78f-8d18855e6188|8> generating INFORMATIONAL request 9 [ ]
2024-04-11T23:52:49 Informational charon 04[IKE] <5464e5a3-4a97-451f-b78f-8d18855e6188|8> sending DPD request
2024-04-11T23:52:38 Informational charon 01[KNL] creating rekey job for CHILD_SA ESP/0xcbaa7fd0/fixeWANip
2024-04-11T23:52:37 Informational charon 01[IKE] <5464e5a3-4a97-451f-b78f-8d18855e6188|6> CHILD_SA closed
2024-04-11T23:52:37 Informational charon 01[IKE] <5464e5a3-4a97-451f-b78f-8d18855e6188|6> received DELETE for ESP CHILD_SA with SPI 340d0612
2024-04-11T23:52:37 Informational charon 01[ENC] <5464e5a3-4a97-451f-b78f-8d18855e6188|6> parsed INFORMATIONAL response 1 [ D ]
2024-04-11T23:52:37 Informational charon 01[NET] <5464e5a3-4a97-451f-b78f-8d18855e6188|6> received packet: from stronswanClient [6029] to fixeWANip[4500] (69 bytes)
2024-04-11T23:52:37 Informational charon 01[NET] <5464e5a3-4a97-451f-b78f-8d18855e6188|6> sending packet: from fixeWANip[4500] to stronswanClient [6029] (69 bytes)
2024-04-11T23:52:37 Informational charon 01[ENC] <5464e5a3-4a97-451f-b78f-8d18855e6188|6> generating INFORMATIONAL request 1 [ D ]
2024-04-11T23:52:37 Informational charon 01[IKE] <5464e5a3-4a97-451f-b78f-8d18855e6188|6> sending DELETE for ESP CHILD_SA with SPI cbaa7fd0
2024-04-11T23:52:37 Informational charon 01[IKE] <5464e5a3-4a97-451f-b78f-8d18855e6188|6> closing CHILD_SA 2a98dee1-e9d4-4383-864c-f6a13058bdd6{3} with SPIs cbaa7fd0_i (258522 bytes) 340d0612_o (0 bytes) and TS 0.0.0.0/0 === 10.0.1.1/32
2024-04-11T23:52:37 Informational charon 01[IKE] <5464e5a3-4a97-451f-b78f-8d18855e6188|6> outbound CHILD_SA 2a98dee1-e9d4-4383-864c-f6a13058bdd6{5} established with SPIs c4f18030_i 5f3243a5_o and TS 0.0.0.0/0 === 10.0.1.1/32
2024-04-11T23:52:37 Informational charon 01[IKE] <5464e5a3-4a97-451f-b78f-8d18855e6188|6> inbound CHILD_SA 2a98dee1-e9d4-4383-864c-f6a13058bdd6{5} established with SPIs c4f18030_i 5f3243a5_o and TS 0.0.0.0/0 === 10.0.1.1/32
2024-04-11T23:52:37 Informational charon 01[CFG] <5464e5a3-4a97-451f-b78f-8d18855e6188|6> selected proposal: ESP:AES_GCM_16_256/CURVE_25519/NO_EXT_SEQ
2024-04-11T23:52:37 Informational charon 01[ENC] <5464e5a3-4a97-451f-b78f-8d18855e6188|6> parsed CREATE_CHILD_SA response 0 [ SA No KE TSi TSr ]
2024-04-11T23:52:37 Informational charon 01[NET] <5464e5a3-4a97-451f-b78f-8d18855e6188|6> received packet: from stronswanClient [6029] to fixeWANip[4500] (225 bytes)
2024-04-11T23:52:37 Informational charon 01[NET] <5464e5a3-4a97-451f-b78f-8d18855e6188|6> sending packet: from fixeWANip[4500] to stronswanClient [6029] (245 bytes)
2024-04-11T23:52:37 Informational charon 01[ENC] <5464e5a3-4a97-451f-b78f-8d18855e6188|6> generating CREATE_CHILD_SA request 0 [ N(REKEY_SA) N(ESP_TFC_PAD_N) SA No KE TSi TSr ]
2024-04-11T23:52:37 Informational charon 01[IKE] <5464e5a3-4a97-451f-b78f-8d18855e6188|6> establishing CHILD_SA 2a98dee1-e9d4-4383-864c-f6a13058bdd6{5} reqid 1
2024-04-11T23:52:37 Informational charon 01[KNL] creating rekey job for CHILD_SA ESP/0x340d0612/stronswanClient
2024-04-11T23:52:19 Informational charon 01[ENC] <5464e5a3-4a97-451f-b78f-8d18855e6188|8> parsed INFORMATIONAL response 8 [ ]
2024-04-11T23:52:19 Informational charon 01[NET] <5464e5a3-4a97-451f-b78f-8d18855e6188|8> received packet: from stronswanClient [48476] to fixeWANip[4500] (57 bytes)
2024-04-11T23:52:18 Informational charon 01[NET] <5464e5a3-4a97-451f-b78f-8d18855e6188|8> sending packet: from fixeWANip[4500] to stronswanClient [48476] (57 bytes)
2024-04-11T23:52:18 Informational charon 01[ENC] <5464e5a3-4a97-451f-b78f-8d18855e6188|8> generating INFORMATIONAL request 8 [ ]
2024-04-11T23:52:18 Informational charon 01[IKE] <5464e5a3-4a97-451f-b78f-8d18855e6188|8> sending DPD request
2024-04-11T23:51:25 Informational charon 01[ENC] <5464e5a3-4a97-451f-b78f-8d18855e6188|8> parsed INFORMATIONAL response 7 [ ]
2024-04-11T23:51:25 Informational charon 01[NET] <5464e5a3-4a97-451f-b78f-8d18855e6188|8> received packet: from stronswanClient [48476] to fixeWANip[4500] (57 bytes)
2024-04-11T23:51:25 Informational charon 01[NET] <5464e5a3-4a97-451f-b78f-8d18855e6188|8> sending packet: from fixeWANip[4500] to stronswanClient [48476] (57 bytes)
2024-04-11T23:51:25 Informational charon 01[ENC] <5464e5a3-4a97-451f-b78f-8d18855e6188|8> generating INFORMATIONAL request 7 [ ]
2024-04-11T23:51:25 Informational charon 01[IKE] <5464e5a3-4a97-451f-b78f-8d18855e6188|8> sending DPD request
Clone ich die IPsec ECC Curve25519 Connection, und ändere nur auf Curve448 habe ich sofort die aufgelisteten Fehler.
Ich weiß leider nicht woran es liegt. Ich benutze die Einstellungen aus der Anleitung produktiv bei Kunden. Ich hätte sehr schnell viele Anrufe wenn die so Probleme hätten.
Vielleicht liegt es an den Proposals in der Cipher Suite. Die vorgeschlagenen in der Anleitung sind eigentlich gerade die Safe Defaults die man verwenden kann. Das hackt einem keiner mal eben so aus der Hüfte.
Vielleicht macht ein Pool mit /30 irgendwelche Probleme beim Routing wenn ihn mehrere Clients verwenden. Verwende mal einen /24 Pool.
ja ich finde Curve448 bzw. Curve25519 einfach zu sexy,
und will die unbedingt verwenden ::) ;D
Ich taste mich heran ;D 10.0.1.0/29, also mit 6 Hosts, 10.0.1.1 bis: 10.0.1.6
funktioniert es jetzt ohne Probleme (inkl. interner DNS-Einträge / Outbound) mit 2 Clients und Curve25519.
Interessant ist, dass es ein Problem mit /30 gibt, mit Legacy < 23.1 hatte ich auch /30 und hätte das mit dem internen DNS nicht bemerkt.
Danke!
Ja das ist sehr interessant.
Wenn es reproduzierbar ist, das /30 Probleme macht und es ab /29 immer funktioniert, kannst du in github gerne einen Pull Request bei der Anleitung machen mit einem kleinen
.. Attention::
https://github.com/opnsense/docs
https://github.com/opnsense/docs/blob/master/source/manual/how-tos/ipsec-swanctl-rw-ikev2-eap-mschapv2.rst
Danke, es wäre mir eine Ehre. :-)
Werde es aber vorher noch zu 100% verifizieren,
und eine zweite FW aufsetzen mit Standardeinstellungen + IPsec.
Was ist besser?
- Sauberes OPNsense 24.1.5_3-amd64 auf Standardeinstellungen zurücksetzen.
oder
- Sauber OPNsense-24.1-dvd-amd64.iso installieren, + Update auf 24.1.5_3, und danach IPsec einrichten.
grEEtZ
Um so Sachen zu testen mach ich meistens eine neue saubere VM.