Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Need help testing ipsec-tools 0.8.0

    Scheduled Pinned Locked Moved 2.0-RC Snapshot Feedback and Problems - RETIRED
    17 Posts 10 Posters 7.5k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • C
      cmb
      last edited by

      ipsec-tools is nearing version 0.8.0 release and this is the version we're going to include in 2.0. It's confirmed to fix two issues (DPD not functioning, and incorrect return code from racoonctl), and confirmed working with mobile clients (iPhone Cisco client), site to site connections, and multiple P2s per P1. DPD not working is the last remaining issue aside from a couple kernel panics before 2.0-RC1 and this looks to fix it.

      This will be in snapshots before too long (a few days, needs some manual source hacking to compile at the moment), you can test now though by going to a command prompt and running:

      cd /usr/local/sbin/
      fetch http://cvs.pfsense.org/~cmb/0/ipsectools-0.8.0b2-hybrid.tgz
      tar zxvf ipsectools-0.8.0b2-hybrid.tgz
      chmod +x racoon*
      rm ipsectools-0.8.0b2-hybrid.tgz

      then go to Status>Services and restart racoon.

      NOTE: that is i386 only. AMD64 version here:
      http://cvs.pfsense.org/~cmb/0/ipsectools-0.8.0b2-amd64-hybrid.tgz

      which is currently entirely untested, all the test setups I have are i386.

      1 Reply Last reply Reply Quote 0
      • C
        cmb
        last edited by

        bump.

        Would appreciate feedback, this has been running in a variety of scenarios working well for me.

        1 Reply Last reply Reply Quote 0
        • R
          rpsmith
          last edited by

          Chris,

          can you do this from the GUI or is this done from the console?  I haven't had any luck from the GUI but maybe I'm not doing it right.

          Roy…

          1 Reply Last reply Reply Quote 0
          • A
            azzido
            last edited by

            Tested it with my setup and it is working fine.

            I have single P1 with single P2 for roadwarriors (iPhone) using Mutual RSA + Xauth.
            Not sure how to test if DPD is working fine, but I see this in the logs:

            
            Feb  6 21:45:04 abc racoon: ERROR: such policy does not already exist: "0.0.0.0/0[0] 192.168.103.1/32[0] proto=any dir=out"                                                                                     
            Feb  6 21:46:31 abc racoon: [a.b.c.d] INFO: DPD: remote (ISAKMP-SA spi=b238e67c4f68f38b:34914d21787f0188) seems to be dead.                                                                             
            Feb  6 21:46:31 abc racoon: INFO: purging ISAKMP-SA spi=b238e67c4f68f38b:34914d21787f0188:000089c1.                                                                                                             
            Feb  6 21:46:31 abc racoon: INFO: generated policy, deleting it.
            

            which makes me to believe it is working fine.

            1 Reply Last reply Reply Quote 0
            • C
              cmb
              last edited by

              You can only follow the exact instructions I gave from a SSH session or at the console, exec.php isn't going to keep that 'cd' between commands so you'll have to modify that a bit to do it there.

              The DPD log was always there, it just previously didn't actually remove the SA. After it detects the dead peer ("DPD remote … seems to be dead"), it should no longer have that SA shown under Status>IPsec, SAD tab.

              I've confirmed DPD works in a wide range of configurations, and everything else looks to be working fine too. Additional reports welcome.

              1 Reply Last reply Reply Quote 0
              • C
                Cino
                last edited by

                2 days with no issues with a site2site tunnel to a Cisco PIX 501. No heavy traffic as this was a proof-of-concept for me using IPSec.

                1 Reply Last reply Reply Quote 0
                • A
                  andrew0401
                  last edited by

                  Running on build Sun Feb  6 05:09:46 EST 2011 for about 6 hours - no problem between two pfsense boxes running a VPN

                  Regards

                  Andrew

                  1 Reply Last reply Reply Quote 0
                  • G
                    geewhz01
                    last edited by

                    Installed here and seems to be ok.  I have a couple of vpns setup to a couple of Sonicwall Units, i.e. NS240 and a TZ170 I believe.  It appears to be working with no problem.

                    Andy

                    1 Reply Last reply Reply Quote 0
                    • W
                      wallacebw
                      last edited by

                      I installed the AMD64 version successfully, and was able to establish a tunnel, but I had difficulty stacking AES-256 for both phase 1 and phase 2.  does this make any since?

                      I am currently running a AES-256 phase 1 and a blowfish-256 phase 2 successfully

                      1 Reply Last reply Reply Quote 0
                      • R
                        rpsmith
                        last edited by

                        Seems to be working fine.  Tested with both m0n0wall and pfSense 1.23. Only tested AES 128.

                        Roy…

                        1 Reply Last reply Reply Quote 0
                        • A
                          andrew0401
                          last edited by

                          Can you tell us when this is included in the snapshots as it seems to be working well and I do not want to revert to earlier version by updating from the "wrong" snapshot

                          Thanks

                          Andrew

                          1 Reply Last reply Reply Quote 0
                          • L
                            luma
                            last edited by

                            Works fine on NanoBSD. 6 tunnels up with Blowfish 128 bits and remote endpoint pfSense (mix of 1.2.3 and 2.0b5).

                            1 Reply Last reply Reply Quote 0
                            • C
                              cmb
                              last edited by

                              @andrew0401:

                              Can you tell us when this is included in the snapshots as it seems to be working well and I do not want to revert to earlier version by updating from the "wrong" snapshot

                              The stock source doesn't build on FreeBSD and I haven't gotten a response to that, we're going to update our port with the change needed in the mean time and then it'll be in snapshots, may be a day or two. The systems I'm running it on get updated quite a bit so that's a heck of an annoyance for me too. I'll post back here when it's done.

                              1 Reply Last reply Reply Quote 0
                              • jimpJ
                                jimp Rebel Alliance Developer Netgate
                                last edited by

                                I just switched the snapshots over to use ipsec-tools 0.8. It should be in the next new snapshots that will upload later today.

                                Remember: Upvote with the 👍 button for any user/post you find to be helpful, informative, or deserving of recognition!

                                Need help fast? Netgate Global Support!

                                Do not Chat/PM for help!

                                1 Reply Last reply Reply Quote 0
                                • R
                                  rpsmith
                                  last edited by

                                  Thanks jimp!

                                  re-installing it with every new snapshot was a pain.

                                  Roy…

                                  1 Reply Last reply Reply Quote 0
                                  • C
                                    cmb
                                    last edited by

                                    newest snapshot does indeed have this in it now.

                                    1 Reply Last reply Reply Quote 0
                                    • B
                                      bwlang
                                      last edited by

                                      I'm sad to report some problem we have with 0.8 that we did not have with a snapshot from the week before.

                                      I'm using x509 with a unique cert assigned to each of ~ 10 mobile peers.

                                      I had to switch from using asn1 dn for id on both sides to using the server's ip on one side and asn1 dn on the client to get through phase1 - I don't know why that happened (forgot to grab logs of that)

                                      Now i have all the mobile client connected again with one fairly minor problem (detailed below)

                                      At a site with two clients behind the same NAT,
                                      when one gets DPDed (i'm makin' it a verb dammit)

                                      the other sa gets deleted 10 seconds later.

                                      Should this go upstream?

                                      Feb 16 20:44:32 cujo racoon: [96.233.121.193] INFO: DPD: remote (ISAKMP-SA spi=1b1561a52a7ee073:72a9610bf3426989
                                      ) seems to be dead.
                                      Feb 16 20:44:32 cujo racoon: INFO: purging ISAKMP-SA spi=1b1561a52a7ee073:72a9610bf3426989.
                                      Feb 16 20:44:32 cujo racoon: INFO: generated policy, deleting it.
                                      Feb 16 20:44:32 cujo racoon: INFO: purged IPsec-SA spi=2355238107.
                                      Feb 16 20:44:32 cujo racoon: INFO: purged IPsec-SA spi=181612763.
                                      Feb 16 20:44:32 cujo racoon: INFO: purged ISAKMP-SA spi=1b1561a52a7ee073:72a9610bf3426989.
                                      Feb 16 20:44:33 cujo racoon: INFO: ISAKMP-SA deleted 216.177.7.226[4500]-96.233.121.193[4500] spi:1b1561a52a7ee0
                                      73:72a9610bf3426989
                                      Feb 16 20:44:42 cujo racoon: INFO: generated policy, deleting it.
                                      Feb 16 20:44:42 cujo racoon: INFO: purged IPsec-SA proto_id=ESP spi=698705967.
                                      Feb 16 20:44:42 cujo racoon: INFO: purging ISAKMP-SA spi=61974f5574b5226a:6b9d10203bcb3a5d.
                                      Feb 16 20:44:42 cujo racoon: INFO: purged IPsec-SA spi=67173315.
                                      Feb 16 20:44:42 cujo racoon: INFO: purged ISAKMP-SA spi=61974f5574b5226a:6b9d10203bcb3a5d.
                                      Feb 16 20:44:43 cujo racoon: INFO: ISAKMP-SA deleted 216.177.7.226[4500]-96.233.121.193[28505] spi:61974f5574b5226a:6b9d10203bcb3a5d

                                      1 Reply Last reply Reply Quote 0
                                      • First post
                                        Last post
                                      Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.