Discussion:
after upgrade to 6.9, iked does not pass traffic
Leclerc, Sebastien
2021-05-27 14:10:03 UTC
Permalink
Hello,

I have a vpn from a Windows machine to a network behind an OpenBSD router. It was working fine until I upgraded the router to 6.9 (amd64).
The VPN is still coming up fine, but the traffic is blocked somehow. Using tcpdump on the interface protected by the router (vlan0 in my case), I see the ping requests from the remote vpn address, and the ping replies, but on enc0 I only see the requests. I confirmed that pf is not blocking packets.

My setup :

Remote Windows machine : fixed IP address 192.168.1.109

OpenBSD router :
bge0 192.168.8.2
vlan0 192.168.9.2
also arp -s 192.168.9.208 12:34:56:ab:cd:ef permanent pub

iked.conf :
set nomobike
ikev2 "windows" passive esp \
from 192.168.8.2 to 192.168.1.109 \
from 192.168.9.0/24 to 192.168.9.208 \
local 192.168.8.2 peer 192.168.1.109 \
srcid 192.168.8.2 \
rsa \
config address 192.168.9.208 \
config netmask 255.255.255.0 \
config name-server 192.168.1.222 \
config netbios-server 192.168.1.222

netstat -rn -inet (removing unrelated interfaces) :
Name Mtu Network Address Ipkts Ierrs Opkts Oerrs Colls Time
lo0 32768 <Link> 0 0 0 0 0 0
lo0 32768 ::1/128 ::1 0 0 0 0 0 0
lo0 32768 fe80::%lo0/ fe80::1%lo0 0 0 0 0 0 0
lo0 32768 127/8 127.0.0.1 0 0 0 0 0 0
bge0 1500 <Link> 12:34:56:ab:cd:ef 167154089 0 36267061 0 0 0
bge0 1500 192.168.8/2 192.168.8.2 167154089 0 36267061 0 0 0
enc0* 0 <Link> 140 0 0 0 0 0
vlan0 1500 <Link> 12:34:56:ab:cd:ef 126698124 0 360 0 0 0
vlan0 1500 192.168.9/2 192.168.9.2 126698124 0 360 0 0 0
pflog0 33136 <Link> 0 0 1642609 0 0 0

Log extract :
May 27 08:10:20 mymachine iked[14895]: spi=0x41f8d1c369853156: recv IKE_SA_INIT req 0 peer 192.168.1.109:500 local 192.168.8.2:500, 528 bytes, policy 'windows'
May 27 08:10:20 mymachine iked[14895]: spi=0x41f8d1c369853156: send IKE_SA_INIT res 0 peer 192.168.1.109:500 local 192.168.8.2:500, 278 bytes
May 27 08:10:20 mymachine iked[14895]: spi=0x41f8d1c369853156: recv IKE_AUTH req 1 peer 192.168.1.109:500 local 192.168.8.2:500, 7440 bytes, policy 'windows'
May 27 08:10:20 mymachine iked[14895]: spi=0x41f8d1c369853156: send IKE_AUTH res 1 peer 192.168.1.109:500 local 192.168.8.2:500, 1600 bytes
May 27 08:10:20 mymachine iked[14895]: spi=0x41f8d1c369853156: ikev2_childsa_enable: loaded SPIs: 0x6487e520, 0x36d4127b (enc aes-256 auth hmac-sha1)
May 27 08:10:20 mymachine iked[14895]: spi=0x41f8d1c369853156: established peer 192.168.1.109:500[ASN1_DN//C=CA/ST=Quebec/L=Somewhere/O=Org/OU=Department/CN=192.168.1.109/emailAddress=***@domain.local] local 192.168.8.2:500[IPV4/192.168.8.2] policy 'windows' as responder (enc aes-256 auth hmac-sha2-256 group modp1024 prf hmac-sha2-256)

doas tcpdump -nni enc0
tcpdump: listening on enc0, link-type ENC
08:48:05.289341 (authentic,confidential): SPI 0x11aad700: 192.168.9.208 > 192.168.9.101: icmp: echo request (encap)
08:48:09.914843 (authentic,confidential): SPI 0x11aad700: 192.168.9.208 > 192.168.9.101: icmp: echo request (encap)
08:48:14.914988 (authentic,confidential): SPI 0x11aad700: 192.168.9.208 > 192.168.9.101: icmp: echo request (encap)
08:48:19.915348 (authentic,confidential): SPI 0x11aad700: 192.168.9.208 > 192.168.9.101: icmp: echo request (encap)
^C
4 packets received by filter
0 packets dropped by kernel

tcpdump -nni vlan0 host 192.168.9.208
tcpdump: listening on vlan0, link-type EN10MB
09:12:21.467671 192.168.9.208 > 192.168.9.101: icmp: echo request
09:12:21.468371 arp who-has 192.168.9.208 tell 192.168.9.101
09:12:21.468386 arp reply 192.168.9.208 is-at ec:eb:b8:5d:94:a0
09:12:21.468937 192.168.9.101 > 192.168.9.208: icmp: echo reply
09:12:21.468961 192.168.9.101 > 192.168.9.208: icmp: echo reply
09:12:26.410587 192.168.9.208 > 192.168.9.101: icmp: echo request
09:12:26.411144 192.168.9.101 > 192.168.9.208: icmp: echo reply
09:12:26.411168 192.168.9.101 > 192.168.9.208: icmp: echo reply
09:12:31.414257 192.168.9.208 > 192.168.9.101: icmp: echo request
09:12:31.415117 192.168.9.101 > 192.168.9.208: icmp: echo reply
09:12:31.415141 192.168.9.101 > 192.168.9.208: icmp: echo reply
09:12:36.409094 192.168.9.208 > 192.168.9.101: icmp: echo request
09:12:36.409680 192.168.9.101 > 192.168.9.208: icmp: echo reply
09:12:36.409705 192.168.9.101 > 192.168.9.208: icmp: echo reply
^C
3134 packets received by filter
0 packets dropped by kernel

Thanks!

Sebastien Leclerc
Jason Tubnor
2021-05-28 01:11:57 UTC
Permalink
I have a vpn from a Windows machine to a network behind an OpenBSD router. It was working fine until I upgraded the router to 6.9 (amd64).
The VPN is still coming up fine, but the traffic is blocked somehow. Using tcpdump on the interface protected by the router (vlan0 in my case), I see the ping requests from the remote vpn address, and the ping replies, but on enc0 I only see the requests. I confirmed that pf is not blocking packets.

doas tcpdump -nni enc0
tcpdump: listening on enc0, link-type ENC
08:48:05.289341 (authentic,confidential): SPI 0x11aad700: 192.168.9.208 > 192.168.9.101: icmp: echo request (encap)
08:48:09.914843 (authentic,confidential): SPI 0x11aad700: 192.168.9.208 > 192.168.9.101: icmp: echo request (encap)
08:48:14.914988 (authentic,confidential): SPI 0x11aad700: 192.168.9.208 > 192.168.9.101: icmp: echo request (encap)
08:48:19.915348 (authentic,confidential): SPI 0x11aad700: 192.168.9.208 > 192.168.9.101: icmp: echo request (encap)
^C
4 packets received by filter
0 packets dropped by kernel

tcpdump -nni vlan0 host 192.168.9.208
tcpdump: listening on vlan0, link-type EN10MB
09:12:21.467671 192.168.9.208 > 192.168.9.101: icmp: echo request
09:12:21.468371 arp who-has 192.168.9.208 tell 192.168.9.101
09:12:21.468386 arp reply 192.168.9.208 is-at ec:eb:b8:5d:94:a0
09:12:21.468937 192.168.9.101 > 192.168.9.208: icmp: echo reply
09:12:21.468961 192.168.9.101 > 192.168.9.208: icmp: echo reply
09:12:26.410587 192.168.9.208 > 192.168.9.101: icmp: echo request
09:12:26.411144 192.168.9.101 > 192.168.9.208: icmp: echo reply
09:12:26.411168 192.168.9.101 > 192.168.9.208: icmp: echo reply
09:12:31.414257 192.168.9.208 > 192.168.9.101: icmp: echo request

It looks like 'keep state (if-bound)' iked.conf(5) is not present or being respected on the return traffic to the VPN device/firewall from your internal network. ICMP traffic is coming into the VPN device encrypted, being decrypted and passed to the destination. The destination responds back but the VPN device is not taking those responses and pushing them back through enc0.

We have updated a number of IKEv2 devices already without issue. Our testing environment where we are trying out different configurations and scenarios also working fine.

Cheers,

Jason.
Leclerc, Sebastien
2021-05-28 11:56:54 UTC
Permalink
It looks like 'keep state (if-bound)' iked.conf(5) is not present or being respected on the return traffic to the VPN device/firewall from your internal network.  ICMP traffic is coming into the VPN device >encrypted, being decrypted and passed to the destination.  The destination responds back but the VPN device is not taking those responses and pushing them back through enc0.
Thank you for your response Jason.
Here is the relevant pf.conf configuration, keep state (if-bound) is there, so I don't think it's the cause of the problem :

pass inet proto udp from 192.168.1.109 to bge0 port 500
pass inet proto esp from 192.168.1.109 to bge0
pass on bge0 proto ipencap keep state (if-bound)
pass inet from 192.168.9.208 to vlan0:network
Tobias Heider
2021-05-30 14:16:15 UTC
Permalink
Post by Leclerc, Sebastien
It looks like 'keep state (if-bound)' iked.conf(5) is not present or being respected on the return traffic to the VPN device/firewall from your internal network.  ICMP traffic is coming into the VPN device >encrypted, being decrypted and passed to the destination.  The destination responds back but the VPN device is not taking those responses and pushing them back through enc0.
Thank you for your response Jason.
pass inet proto udp from 192.168.1.109 to bge0 port 500
pass inet proto esp from 192.168.1.109 to bge0
pass on bge0 proto ipencap keep state (if-bound)
pass inet from 192.168.9.208 to vlan0:network
I'm not sure about that bge0 rule. iked.conf(5) mentions ipencap only
in the context of enc interfaces.
You could try adding 'set skip on enc0' to find out if pf is the problem.

If that doesn't help you could share the output of 'ipsecctl -sa' to find
out if the IPsec SAs or flows are the problem.
Leclerc, Sebastien
2021-05-31 12:20:29 UTC
Permalink
Post by Tobias Heider
I'm not sure about that bge0 rule. iked.conf(5) mentions ipencap only
in the context of enc interfaces.
You could try adding 'set skip on enc0' to find out if pf is the problem.
That rule has been the same for some years now, without problem. I tried
adding set skip on enc0, but the problem persists.
Post by Tobias Heider
If that doesn't help you could share the output of 'ipsecctl -sa' to find
out if the IPsec SAs or flows are the problem.
That may be the problem, there is nothing between 192.168.1.109 and 192.168.9.101 :
(192.168.8.2 is the firewall interface that 192.168.1.109 is connecting to,
192.168.9.101 is what the vpn client is trying to communicate with)

# ipsecctl -sa
FLOWS:
No flows

SAD:
esp tunnel from 192.168.8.2 to 192.168.1.109 spi 0x0e7b0e8b auth hmac-sha1 enc aes-256
esp tunnel from 192.168.1.109 to 192.168.8.2 spi 0x6830eab4 auth hmac-sha1 enc aes-256
Tobias Heider
2021-05-31 13:51:50 UTC
Permalink
Post by Leclerc, Sebastien
Post by Tobias Heider
I'm not sure about that bge0 rule. iked.conf(5) mentions ipencap only
in the context of enc interfaces.
You could try adding 'set skip on enc0' to find out if pf is the problem.
That rule has been the same for some years now, without problem. I tried
adding set skip on enc0, but the problem persists.
Post by Tobias Heider
If that doesn't help you could share the output of 'ipsecctl -sa' to find
out if the IPsec SAs or flows are the problem.
(192.168.8.2 is the firewall interface that 192.168.1.109 is connecting to,
192.168.9.101 is what the vpn client is trying to communicate with)
# ipsecctl -sa
No flows
esp tunnel from 192.168.8.2 to 192.168.1.109 spi 0x0e7b0e8b auth hmac-sha1 enc aes-256
esp tunnel from 192.168.1.109 to 192.168.8.2 spi 0x6830eab4 auth hmac-sha1 enc aes-256
Ok, so this seems to be the cause. From your log snippet i can see that
there must have been SAs at some point because it shows an
"ikev2_childsa_enable" line.
Try running iked with -vv. Maybe the verbose log contains an error message
that helps us find out what's wrong.
Leclerc, Sebastien
2021-05-31 14:31:22 UTC
Permalink
Post by Tobias Heider
Post by Leclerc, Sebastien
Post by Tobias Heider
If that doesn't help you could share the output of 'ipsecctl -sa' to find
out if the IPsec SAs or flows are the problem.
(192.168.8.2 is the firewall interface that 192.168.1.109 is connecting to,
192.168.9.101 is what the vpn client is trying to communicate with)
# ipsecctl -sa
No flows
esp tunnel from 192.168.8.2 to 192.168.1.109 spi 0x0e7b0e8b auth hmac-sha1 enc aes-256
esp tunnel from 192.168.1.109 to 192.168.8.2 spi 0x6830eab4 auth hmac-sha1 enc aes-256
Ok, so this seems to be the cause. From your log snippet i can see that
there must have been SAs at some point because it shows an
"ikev2_childsa_enable" line.
Try running iked with -vv. Maybe the verbose log contains an error message
that helps us find out what's wrong.
The SAs seem to be only the first "from" clause (from 192.168.8.2 to 192.168.1.109), which are the VPN endpoints, not the second one, which covers the network behind the OpenBSD machine, and the IP assigned to the Windows machine in this same subnet (arp-proxied).

Here is the verbose log :

# iked -Tdvv
create_ike: using rsa for peer 192.168.1.109
ikev2 "windows" passive tunnel esp inet from 192.168.8.2 to 192.168.1.109 from 192.168.9.0/24 to 192.168.9.208 local 192.168.8.2 peer 192.168.1.109 ikesa enc aes-128-gcm enc aes-256-gcm prf hmac-sha2-256 prf hmac-sha2-384 prf hmac-sha2-512 prf hmac-sha1 group curve25519 group ecp521 group ecp384 group ecp256 group modp4096 group modp3072 group modp2048 group modp1536 group modp1024 ikesa enc aes-256 enc aes-192 enc aes-128 enc 3des prf hmac-sha2-256 prf hmac-sha2-384 prf hmac-sha2-512 prf hmac-sha1 auth hmac-sha2-256 auth hmac-sha2-384 auth hmac-sha2-512 auth hmac-sha1 group curve25519 group ecp521 group ecp384 group ecp256 group modp4096 group modp3072 group modp2048 group modp1536 group modp1024 childsa enc aes-128-gcm enc aes-256-gcm group none esn noesn childsa enc aes-256 enc aes-192 enc aes-128 auth hmac-sha2-256 auth hmac-sha2-384 auth hmac-sha2-512 auth hmac-sha1 group none esn noesn srcid 192.168.8.2 lifetime 10800 bytes 536870912 rsa config address 192.168.9.208 config netmask 255.255.255.0 config name-server 192.168.1.222 config netbios-server 192.168.1.222
/etc/iked.conf: loaded 1 configuration rules
ca_privkey_serialize: type RSA_KEY length 1191
ca_pubkey_serialize: type RSA_KEY length 270
ca_privkey_to_method: type RSA_KEY method RSA_SIG
ca_getkey: received private key type RSA_KEY length 1191
config_getpolicy: received policy
ca_getkey: received public key type RSA_KEY length 270
ca_dispatch_parent: config reset
config_getpfkey: received pfkey fd 3
config_getcompile: compilation done
config_getsocket: received socket fd 4
config_getsocket: received socket fd 5
config_getstatic: dpd_check_interval 60
config_getstatic: no enforcesingleikesa
config_getstatic: no fragmentation
config_getstatic: no mobike
config_getstatic: nattport 4500
config_getstatic: no stickyaddress
ca_reload: loaded ca file ca.crt
ca_reload: loaded crl file ca.crl
ca_reload: /C=CA/ST=State/L=City-Name/O=Ville de City-Name/OU=Department/CN=VPN CA/emailAddress=***@domain.local
ca_reload: loaded 1 ca certificate
ca_reload: loaded cert file 192.168.8.2.crt
ca_validate_cert: /C=CA/ST=State/L=City-Name/O=Ville de City-Name/OU=Department/CN=192.168.8.2/emailAddress=***@domain.local ok
ca_reload: local cert type X509_CERT
config_getocsp: ocsp_url none tolerate 0 maxage -1
ikev2_dispatch_cert: updated local CERTREQ type X509_CERT length 20
ikev2_dispatch_cert: updated local CERTREQ type X509_CERT length 20
policy_lookup: setting policy 'windows'
spi=0xd5f403b2c665646e: recv IKE_SA_INIT req 0 peer 192.168.1.109:500 local 192.168.8.2:500, 528 bytes, policy 'windows'
ikev2_recv: ispi 0xd5f403b2c665646e rspi 0x0000000000000000
ikev2_policy2id: srcid IPV4/192.168.8.2 length 8
ikev2_pld_parse: header ispi 0xd5f403b2c665646e rspi 0x0000000000000000 nextpayload SA version 0x20 exchange IKE_SA_INIT flags 0x08 msgid 0 length 528 response 0
ikev2_pld_payloads: payload SA nextpayload KE critical 0x00 length 256
ikev2_pld_sa: more 2 reserved 0 length 40 proposal #1 protoid IKE spisize 0 xforms 4 spi 0
ikev2_pld_xform: more 3 reserved 0 length 8 type ENCR id 3DES
ikev2_pld_xform: more 3 reserved 0 length 8 type INTEGR id HMAC_SHA1_96
ikev2_pld_xform: more 3 reserved 0 length 8 type PRF id HMAC_SHA1
ikev2_pld_xform: more 0 reserved 0 length 8 type DH id MODP_1024
ikev2_pld_sa: more 2 reserved 0 length 44 proposal #2 protoid IKE spisize 0 xforms 4 spi 0
ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_CBC
ikev2_pld_attr: attribute type KEY_LENGTH length 256 total 4
ikev2_pld_xform: more 3 reserved 0 length 8 type INTEGR id HMAC_SHA1_96
ikev2_pld_xform: more 3 reserved 0 length 8 type PRF id HMAC_SHA1
ikev2_pld_xform: more 0 reserved 0 length 8 type DH id MODP_1024
ikev2_pld_sa: more 2 reserved 0 length 40 proposal #3 protoid IKE spisize 0 xforms 4 spi 0
ikev2_pld_xform: more 3 reserved 0 length 8 type ENCR id 3DES
ikev2_pld_xform: more 3 reserved 0 length 8 type INTEGR id HMAC_SHA2_256_128
ikev2_pld_xform: more 3 reserved 0 length 8 type PRF id HMAC_SHA2_256
ikev2_pld_xform: more 0 reserved 0 length 8 type DH id MODP_1024
ikev2_pld_sa: more 2 reserved 0 length 44 proposal #4 protoid IKE spisize 0 xforms 4 spi 0
ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_CBC
ikev2_pld_attr: attribute type KEY_LENGTH length 256 total 4
ikev2_pld_xform: more 3 reserved 0 length 8 type INTEGR id HMAC_SHA2_256_128
ikev2_pld_xform: more 3 reserved 0 length 8 type PRF id HMAC_SHA2_256
ikev2_pld_xform: more 0 reserved 0 length 8 type DH id MODP_1024
ikev2_pld_sa: more 2 reserved 0 length 40 proposal #5 protoid IKE spisize 0 xforms 4 spi 0
ikev2_pld_xform: more 3 reserved 0 length 8 type ENCR id 3DES
ikev2_pld_xform: more 3 reserved 0 length 8 type INTEGR id HMAC_SHA2_384_192
ikev2_pld_xform: more 3 reserved 0 length 8 type PRF id HMAC_SHA2_384
ikev2_pld_xform: more 0 reserved 0 length 8 type DH id MODP_1024
ikev2_pld_sa: more 0 reserved 0 length 44 proposal #6 protoid IKE spisize 0 xforms 4 spi 0
ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_CBC
ikev2_pld_attr: attribute type KEY_LENGTH length 256 total 4
ikev2_pld_xform: more 3 reserved 0 length 8 type INTEGR id HMAC_SHA2_384_192
ikev2_pld_xform: more 3 reserved 0 length 8 type PRF id HMAC_SHA2_384
ikev2_pld_xform: more 0 reserved 0 length 8 type DH id MODP_1024
ikev2_pld_payloads: payload KE nextpayload NONCE critical 0x00 length 136
ikev2_pld_ke: dh group MODP_1024 reserved 0
ikev2_pld_payloads: payload NONCE nextpayload NOTIFY critical 0x00 length 52
ikev2_pld_payloads: payload NOTIFY nextpayload NOTIFY critical 0x00 length 28
ikev2_pld_notify: protoid NONE spisize 0 type NAT_DETECTION_SOURCE_IP
ikev2_nat_detection: peer source 0xd5f403b2c665646e 0x0000000000000000 192.168.1.109:500
ikev2_pld_payloads: payload NOTIFY nextpayload NONE critical 0x00 length 28
ikev2_pld_notify: protoid NONE spisize 0 type NAT_DETECTION_DESTINATION_IP
ikev2_nat_detection: peer destination 0xd5f403b2c665646e 0x0000000000000000 192.168.8.2:500
proposals_negotiate: score 0
proposals_negotiate: score 0
proposals_negotiate: score 0
proposals_negotiate: score 0
proposals_negotiate: score 0
proposals_negotiate: score 0
proposals_negotiate: score 41
proposals_negotiate: score 32
proposals_negotiate: score 29
proposals_negotiate: score 20
proposals_negotiate: score 33
proposals_negotiate: score 24
policy_lookup: setting policy 'windows'
spi=0xd5f403b2c665646e: sa_state: INIT -> SA_INIT
proposals_negotiate: score 0
proposals_negotiate: score 0
proposals_negotiate: score 0
proposals_negotiate: score 0
proposals_negotiate: score 0
proposals_negotiate: score 0
proposals_negotiate: score 41
proposals_negotiate: score 32
proposals_negotiate: score 29
proposals_negotiate: score 20
proposals_negotiate: score 33
proposals_negotiate: score 24
sa_stateok: SA_INIT flags 0x0000, require 0x0000
sa_stateflags: 0x0000 -> 0x0020 sa (required 0x0000 )
spi=0xd5f403b2c665646e: ikev2_sa_keys: DHSECRET with 128 bytes
ikev2_sa_keys: SKEYSEED with 32 bytes
spi=0xd5f403b2c665646e: ikev2_sa_keys: S with 96 bytes
ikev2_prfplus: T1 with 32 bytes
ikev2_prfplus: T2 with 32 bytes
ikev2_prfplus: T3 with 32 bytes
ikev2_prfplus: T4 with 32 bytes
ikev2_prfplus: T5 with 32 bytes
ikev2_prfplus: T6 with 32 bytes
ikev2_prfplus: T7 with 32 bytes
ikev2_prfplus: Tn with 224 bytes
ikev2_sa_keys: SK_d with 32 bytes
ikev2_sa_keys: SK_ai with 32 bytes
ikev2_sa_keys: SK_ar with 32 bytes
ikev2_sa_keys: SK_ei with 32 bytes
ikev2_sa_keys: SK_er with 32 bytes
ikev2_sa_keys: SK_pi with 32 bytes
ikev2_sa_keys: SK_pr with 32 bytes
ikev2_add_proposals: length 44
ikev2_next_payload: length 48 nextpayload KE
ikev2_next_payload: length 136 nextpayload NONCE
ikev2_next_payload: length 36 nextpayload CERTREQ
ikev2_add_certreq: type X509_CERT length 21
ikev2_next_payload: length 25 nextpayload CERTREQ
ikev2_add_certreq: type RSA_KEY length 1
ikev2_next_payload: length 5 nextpayload NONE
ikev2_pld_parse: header ispi 0xd5f403b2c665646e rspi 0x1c65b0250699bcd2 nextpayload SA version 0x20 exchange IKE_SA_INIT flags 0x20 msgid 0 length 278 response 1
ikev2_pld_payloads: payload SA nextpayload KE critical 0x00 length 48
ikev2_pld_sa: more 0 reserved 0 length 44 proposal #4 protoid IKE spisize 0 xforms 4 spi 0
ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_CBC
ikev2_pld_attr: attribute type KEY_LENGTH length 256 total 4
ikev2_pld_xform: more 3 reserved 0 length 8 type PRF id HMAC_SHA2_256
ikev2_pld_xform: more 3 reserved 0 length 8 type INTEGR id HMAC_SHA2_256_128
ikev2_pld_xform: more 0 reserved 0 length 8 type DH id MODP_1024
ikev2_pld_payloads: payload KE nextpayload NONCE critical 0x00 length 136
ikev2_pld_ke: dh group MODP_1024 reserved 0
ikev2_pld_payloads: payload NONCE nextpayload CERTREQ critical 0x00 length 36
ikev2_pld_payloads: payload CERTREQ nextpayload CERTREQ critical 0x00 length 25
ikev2_pld_certreq: type X509_CERT length 20
ikev2_pld_payloads: payload CERTREQ nextpayload NONE critical 0x00 length 5
ikev2_pld_certreq: type RSA_KEY length 0
spi=0xd5f403b2c665646e: send IKE_SA_INIT res 0 peer 192.168.1.109:500 local 192.168.8.2:500, 278 bytes
config_free_proposals: free 0x212b5bf4c80
config_free_proposals: free 0x212b5bd0700
config_free_proposals: free 0x212b5c0bb00
config_free_proposals: free 0x212b5bf3f80
config_free_proposals: free 0x212b5bf3d00
config_free_proposals: free 0x212b5bd0380
spi=0xd5f403b2c665646e: recv IKE_AUTH req 1 peer 192.168.1.109:500 local 192.168.8.2:500, 7440 bytes, policy 'windows'
ikev2_recv: ispi 0xd5f403b2c665646e rspi 0x1c65b0250699bcd2
ikev2_recv: updated SA to peer 192.168.1.109:500 local 192.168.8.2:500
ikev2_pld_parse: header ispi 0xd5f403b2c665646e rspi 0x1c65b0250699bcd2 nextpayload SK version 0x20 exchange IKE_AUTH flags 0x08 msgid 1 length 7440 response 0
ikev2_pld_payloads: payload SK nextpayload IDi critical 0x00 length 7412
ikev2_msg_decrypt: IV length 16
ikev2_msg_decrypt: encrypted payload length 7376
ikev2_msg_decrypt: integrity checksum length 16
ikev2_msg_decrypt: integrity check succeeded
ikev2_msg_decrypt: decrypted payload length 7376/7376 padding 10
ikev2_pld_payloads: decrypted payload IDi nextpayload CERT critical 0x00 length 199
ikev2_pld_id: id ASN1_DN//C=CA/ST=State/L=City-Name/O=Ville de City-Name/OU=Department/CN=192.168.1.109/emailAddress=***@domain.local length 195
ikev2_pld_payloads: decrypted payload CERT nextpayload CERTREQ critical 0x00 length 1097
ikev2_pld_cert: type X509_CERT length 1092
ikev2_pld_payloads: decrypted payload CERTREQ nextpayload AUTH critical 0x00 length 5645
ikev2_pld_certreq: type X509_CERT length 5640
ikev2_pld_payloads: decrypted payload AUTH nextpayload NOTIFY critical 0x00 length 264
ikev2_pld_auth: method RSA_SIG length 256
ikev2_pld_payloads: decrypted payload NOTIFY nextpayload CP critical 0x00 length 8
ikev2_pld_notify: protoid NONE spisize 0 type MOBIKE_SUPPORTED
ikev2_pld_payloads: decrypted payload CP nextpayload SA critical 0x00 length 24
ikev2_pld_cp: type REQUEST length 16
ikev2_pld_cp: INTERNAL_IP4_ADDRESS 0x0001 length 0
ikev2_pld_cp: INTERNAL_IP4_DNS 0x0003 length 0
ikev2_pld_cp: INTERNAL_IP4_NBNS 0x0004 length 0
ikev2_pld_cp: INTERNAL_IP4_SERVER 0x5ba0 length 0
ikev2_pld_payloads: decrypted payload SA nextpayload TSi critical 0x00 length 80
ikev2_pld_sa: more 2 reserved 0 length 40 proposal #1 protoid ESP spisize 4 xforms 3 spi 0x1436a680
ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_CBC
ikev2_pld_attr: attribute type KEY_LENGTH length 256 total 4
ikev2_pld_xform: more 3 reserved 0 length 8 type INTEGR id HMAC_SHA1_96
ikev2_pld_xform: more 0 reserved 0 length 8 type ESN id NONE
ikev2_pld_sa: more 0 reserved 0 length 36 proposal #2 protoid ESP spisize 4 xforms 3 spi 0x1436a680
ikev2_pld_xform: more 3 reserved 0 length 8 type ENCR id 3DES
ikev2_pld_xform: more 3 reserved 0 length 8 type INTEGR id HMAC_SHA1_96
ikev2_pld_xform: more 0 reserved 0 length 8 type ESN id NONE
ikev2_pld_payloads: decrypted payload TSi nextpayload TSr critical 0x00 length 24
ikev2_pld_tss: count 1 length 16
ikev2_pld_tss: type IPV4_ADDR_RANGE protoid 0 length 16 startport 0 endport 65535
ikev2_pld_ts: start 0.0.0.0 end 255.255.255.255
ikev2_pld_payloads: decrypted payload TSr nextpayload NONE critical 0x00 length 24
ikev2_pld_tss: count 1 length 16
ikev2_pld_tss: type IPV4_ADDR_RANGE protoid 0 length 16 startport 0 endport 65535
ikev2_pld_ts: start 0.0.0.0 end 255.255.255.255
sa_stateok: SA_INIT flags 0x0000, require 0x0000
spi=0xd5f403b2c665646e: sa_state: SA_INIT -> AUTH_REQUEST
policy_lookup: peerid '/C=CA/ST=State/L=City-Name/O=Ville de City-Name/OU=Department/CN=192.168.1.109/emailAddress=***@domain.local'
proposals_negotiate: score 0
proposals_negotiate: score 20
policy_lookup: setting policy 'windows'
ikev2_policy2id: srcid IPV4/192.168.8.2 length 8
sa_stateflags: 0x0020 -> 0x0024 certreq,sa (required 0x003b cert,certvalid,auth,authvalid,sa)
ikev2_msg_auth: responder auth data length 358
ca_setauth: auth length 358
proposals_negotiate: score 0
proposals_negotiate: score 0
proposals_negotiate: score 13
proposals_negotiate: score 0
sa_stateflags: 0x0024 -> 0x0024 certreq,sa (required 0x003b cert,certvalid,auth,authvalid,sa)
config_free_proposals: free 0x212b5c0b680
config_free_proposals: free 0x212b5c0b700
ca_getreq: found CA /C=CA/ST=State/L=City-Name/O=Ville de City-Name/OU=Department/CN=VPN CA/emailAddress=***@domain.local
ca_getreq: found local certificate /C=CA/ST=State/L=City-Name/O=Ville de City-Name/OU=Department/CN=192.168.8.2/emailAddress=***@domain.local
ca_setauth: auth length 256
ikev2_getimsgdata: imsg 23 rspi 0x1c65b0250699bcd2 ispi 0xd5f403b2c665646e initiator 0 sa valid type 4 data length 1090
ikev2_dispatch_cert: cert type X509_CERT length 1090, ok
sa_stateflags: 0x0024 -> 0x0025 cert,certreq,sa (required 0x003b cert,certvalid,auth,authvalid,sa)
ikev2_getimsgdata: imsg 34 rspi 0x1c65b0250699bcd2 ispi 0xd5f403b2c665646e initiator 0 sa valid type 1 data length 256
ikev2_dispatch_cert: AUTH type 1 len 256
sa_stateflags: 0x0025 -> 0x002d cert,certreq,auth,sa (required 0x003b cert,certvalid,auth,authvalid,sa)
ca_validate_pubkey: unsupported public key type ASN1_DN
ca_validate_cert: /C=CA/ST=State/L=City-Name/O=Ville de City-Name/OU=Department/CN=192.168.1.109/emailAddress=***@domain.local ok
ikev2_getimsgdata: imsg 24 rspi 0x1c65b0250699bcd2 ispi 0xd5f403b2c665646e initiator 0 sa valid type 4 data length 1092
ikev2_msg_auth: initiator auth data length 592
ikev2_msg_authverify: method RSA_SIG keylen 1092 type X509_CERT
ikev2_msg_authverify: authentication successful
spi=0xd5f403b2c665646e: sa_state: AUTH_REQUEST -> AUTH_SUCCESS
sa_stateflags: 0x002d -> 0x003d cert,certreq,auth,authvalid,sa (required 0x003b cert,certvalid,auth,authvalid,sa)
ikev2_dispatch_cert: peer certificate is valid
sa_stateflags: 0x003d -> 0x003f cert,certvalid,certreq,auth,authvalid,sa (required 0x003b cert,certvalid,auth,authvalid,sa)
sa_stateok: VALID flags 0x003b, require 0x003b cert,certvalid,auth,authvalid,sa
spi=0xd5f403b2c665646e: sa_state: AUTH_SUCCESS -> VALID
sa_stateok: VALID flags 0x003b, require 0x003b cert,certvalid,auth,authvalid,sa
sa_stateok: VALID flags 0x003b, require 0x003b cert,certvalid,auth,authvalid,sa
ikev2_sa_tag: (0)
ikev2_childsa_negotiate: proposal 1
ikev2_childsa_negotiate: key material length 104
ikev2_prfplus: T1 with 32 bytes
ikev2_prfplus: T2 with 32 bytes
ikev2_prfplus: T3 with 32 bytes
ikev2_prfplus: T4 with 32 bytes
ikev2_prfplus: Tn with 128 bytes
pfkey_sa_getspi: spi 0x6cab2e28
pfkey_sa_init: new spi 0x6cab2e28
ikev2_next_payload: length 12 nextpayload CERT
ikev2_next_payload: length 1095 nextpayload AUTH
ikev2_next_payload: length 264 nextpayload CP
ikev2_next_payload: length 40 nextpayload SA
ikev2_add_proposals: length 40
ikev2_next_payload: length 44 nextpayload TSi
ikev2_next_payload: length 40 nextpayload TSr
ikev2_next_payload: length 40 nextpayload NONE
ikev2_next_payload: length 1572 nextpayload IDr
ikev2_msg_encrypt: decrypted length 1535
ikev2_msg_encrypt: padded length 1536
ikev2_msg_encrypt: length 1536, padding 0, output length 1568
ikev2_msg_integr: message length 1600
ikev2_msg_integr: integrity checksum length 16
ikev2_pld_parse: header ispi 0xd5f403b2c665646e rspi 0x1c65b0250699bcd2 nextpayload SK version 0x20 exchange IKE_AUTH flags 0x20 msgid 1 length 1600 response 1
ikev2_pld_payloads: payload SK nextpayload IDr critical 0x00 length 1572
ikev2_msg_decrypt: IV length 16
ikev2_msg_decrypt: encrypted payload length 1536
ikev2_msg_decrypt: integrity checksum length 16
ikev2_msg_decrypt: integrity check succeeded
ikev2_msg_decrypt: decrypted payload length 1536/1536 padding 0
ikev2_pld_payloads: decrypted payload IDr nextpayload CERT critical 0x00 length 12
ikev2_pld_id: id IPV4/192.168.8.2 length 8
ikev2_pld_payloads: decrypted payload CERT nextpayload AUTH critical 0x00 length 1095
ikev2_pld_cert: type X509_CERT length 1090
ikev2_pld_payloads: decrypted payload AUTH nextpayload CP critical 0x00 length 264
ikev2_pld_auth: method RSA_SIG length 256
ikev2_pld_payloads: decrypted payload CP nextpayload SA critical 0x00 length 40
ikev2_pld_cp: type REPLY length 32
ikev2_pld_cp: INTERNAL_IP4_ADDRESS 0x0001 length 4
ikev2_pld_cp: INTERNAL_IP4_NETMASK 0x0002 length 4
ikev2_pld_cp: INTERNAL_IP4_DNS 0x0003 length 4
ikev2_pld_cp: INTERNAL_IP4_NBNS 0x0004 length 4
ikev2_pld_payloads: decrypted payload SA nextpayload TSi critical 0x00 length 44
ikev2_pld_sa: more 0 reserved 0 length 40 proposal #1 protoid ESP spisize 4 xforms 3 spi 0x6cab2e28
ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_CBC
ikev2_pld_attr: attribute type KEY_LENGTH length 256 total 4
ikev2_pld_xform: more 3 reserved 0 length 8 type INTEGR id HMAC_SHA1_96
ikev2_pld_xform: more 0 reserved 0 length 8 type ESN id NONE
ikev2_pld_payloads: decrypted payload TSi nextpayload TSr critical 0x00 length 40
ikev2_pld_tss: count 2 length 32
ikev2_pld_tss: type IPV4_ADDR_RANGE protoid 0 length 16 startport 0 endport 65535
ikev2_pld_ts: start 192.168.1.109 end 192.168.1.109
ikev2_pld_tss: type IPV4_ADDR_RANGE protoid 0 length 16 startport 0 endport 65535
ikev2_pld_ts: start 192.168.9.208 end 192.168.9.208
ikev2_pld_payloads: decrypted payload TSr nextpayload NONE critical 0x00 length 40
ikev2_pld_tss: count 2 length 32
ikev2_pld_tss: type IPV4_ADDR_RANGE protoid 0 length 16 startport 0 endport 65535
ikev2_pld_ts: start 192.168.8.2 end 192.168.8.2
ikev2_pld_tss: type IPV4_ADDR_RANGE protoid 0 length 16 startport 0 endport 65535
ikev2_pld_ts: start 192.168.9.0 end 192.168.9.255
spi=0xd5f403b2c665646e: send IKE_AUTH res 1 peer 192.168.1.109:500 local 192.168.8.2:500, 1600 bytes
pfkey_sa_add: update spi 0x6cab2e28
ikev2_childsa_enable: loaded CHILD SA spi 0x6cab2e28
pfkey_sa_add: add spi 0x1436a680
ikev2_childsa_enable: loaded CHILD SA spi 0x1436a680
ikev2_childsa_enable: remember SA peer 192.168.1.109:500
spi=0xd5f403b2c665646e: ikev2_childsa_enable: loaded SPIs: 0x6cab2e28, 0x1436a680 (enc aes-256 auth hmac-sha1)
spi=0xd5f403b2c665646e: sa_state: VALID -> ESTABLISHED from 192.168.1.109:500 to 192.168.8.2:500 policy 'windows'
spi=0xd5f403b2c665646e: established peer 192.168.1.109:500[ASN1_DN//C=CA/ST=State/L=City-Name/O=Ville de City-Name/OU=Department/CN=192.168.1.109/emailAddress=***@domain.local] local 192.168.8.2:500[IPV4/192.168.8.2] policy 'windows' as responder (enc aes-256 auth hmac-sha2-256 group modp1024 prf hmac-sha2-256)
pfkey_sa_lookup: last_used 1622470299
ikev2_ike_sa_alive: incoming CHILD SA spi 0x6cab2e28 last used 43 second(s) ago
spi=0xd5f403b2c665646e: recv INFORMATIONAL req 2 peer 192.168.1.109:500 local 192.168.8.2:500, 80 bytes, policy 'windows'
ikev2_recv: ispi 0xd5f403b2c665646e rspi 0x1c65b0250699bcd2
ikev2_recv: updated SA to peer 192.168.1.109:500 local 192.168.8.2:500
ikev2_pld_parse: header ispi 0xd5f403b2c665646e rspi 0x1c65b0250699bcd2 nextpayload SK version 0x20 exchange INFORMATIONAL flags 0x08 msgid 2 length 80 response 0
ikev2_pld_payloads: payload SK nextpayload DELETE critical 0x00 length 52
ikev2_msg_decrypt: IV length 16
ikev2_msg_decrypt: encrypted payload length 16
ikev2_msg_decrypt: integrity checksum length 16
ikev2_msg_decrypt: integrity check succeeded
ikev2_msg_decrypt: decrypted payload length 16/16 padding 3
ikev2_pld_payloads: decrypted payload DELETE nextpayload NONE critical 0x00 length 12
ikev2_pld_delete: proto ESP spisize 4 nspi 1
ikev2_handle_delete: spi 0x1436a680
spi=0xd5f403b2c665646e: ikev2_childsa_delete: deleted CHILD SA spi 0x6cab2e28
spi=0xd5f403b2c665646e: ikev2_childsa_delete: deleted CHILD SA spi 0x1436a680
spi=0xd5f403b2c665646e: deleted 1 SPI: 0x1436a680
ikev2_next_payload: length 12 nextpayload NONE
ikev2_next_payload: length 52 nextpayload DELETE
ikev2_msg_encrypt: decrypted length 12
ikev2_msg_encrypt: padded length 16
ikev2_msg_encrypt: length 13, padding 3, output length 48
ikev2_msg_integr: message length 80
ikev2_msg_integr: integrity checksum length 16
ikev2_pld_parse: header ispi 0xd5f403b2c665646e rspi 0x1c65b0250699bcd2 nextpayload SK version 0x20 exchange INFORMATIONAL flags 0x20 msgid 2 length 80 response 1
ikev2_pld_payloads: payload SK nextpayload DELETE critical 0x00 length 52
ikev2_msg_decrypt: IV length 16
ikev2_msg_decrypt: encrypted payload length 16
ikev2_msg_decrypt: integrity checksum length 16
ikev2_msg_decrypt: integrity check succeeded
ikev2_msg_decrypt: decrypted payload length 16/16 padding 3
ikev2_pld_payloads: decrypted payload DELETE nextpayload NONE critical 0x00 length 12
ikev2_pld_delete: proto ESP spisize 4 nspi 1
spi=0xd5f403b2c665646e: send INFORMATIONAL res 2 peer 192.168.1.109:500 local 192.168.8.2:500, 80 bytes
spi=0xd5f403b2c665646e: recv INFORMATIONAL req 2 peer 192.168.1.109:500 local 192.168.8.2:500, 80 bytes, policy 'windows'
ikev2_recv: ispi 0xd5f403b2c665646e rspi 0x1c65b0250699bcd2
spi=0xd5f403b2c665646e: retransmit INFORMATIONAL res 2 local 192.168.8.2:500 peer 192.168.1.109:500
spi=0xd5f403b2c665646e: recv INFORMATIONAL req 3 peer 192.168.1.109:500 local 192.168.8.2:500, 80 bytes, policy 'windows'
ikev2_recv: ispi 0xd5f403b2c665646e rspi 0x1c65b0250699bcd2
ikev2_recv: updated SA to peer 192.168.1.109:500 local 192.168.8.2:500
ikev2_pld_parse: header ispi 0xd5f403b2c665646e rspi 0x1c65b0250699bcd2 nextpayload SK version 0x20 exchange INFORMATIONAL flags 0x08 msgid 3 length 80 response 0
ikev2_pld_payloads: payload SK nextpayload DELETE critical 0x00 length 52
ikev2_msg_decrypt: IV length 16
ikev2_msg_decrypt: encrypted payload length 16
ikev2_msg_decrypt: integrity checksum length 16
ikev2_msg_decrypt: integrity check succeeded
ikev2_msg_decrypt: decrypted payload length 16/16 padding 7
ikev2_pld_payloads: decrypted payload DELETE nextpayload NONE critical 0x00 length 8
ikev2_pld_delete: proto IKE spisize 0 nspi 0
spi=0xd5f403b2c665646e: ikev2_ikesa_recv_delete: received delete
spi=0xd5f403b2c665646e: sa_state: ESTABLISHED -> CLOSED from 192.168.1.109:500 to 192.168.8.2:500 policy 'windows'
ikev2_next_payload: length 52 nextpayload NONE
ikev2_msg_encrypt: decrypted length 0
ikev2_msg_encrypt: padded length 16
ikev2_msg_encrypt: length 1, padding 15, output length 48
ikev2_msg_integr: message length 80
ikev2_msg_integr: integrity checksum length 16
ikev2_pld_parse: header ispi 0xd5f403b2c665646e rspi 0x1c65b0250699bcd2 nextpayload SK version 0x20 exchange INFORMATIONAL flags 0x20 msgid 3 length 80 response 1
ikev2_pld_payloads: payload SK nextpayload NONE critical 0x00 length 52
ikev2_msg_decrypt: IV length 16
ikev2_msg_decrypt: encrypted payload length 16
ikev2_msg_decrypt: integrity checksum length 16
ikev2_msg_decrypt: integrity check succeeded
ikev2_msg_decrypt: decrypted payload length 16/16 padding 15
spi=0xd5f403b2c665646e: send INFORMATIONAL res 3 peer 192.168.1.109:500 local 192.168.8.2:500, 80 bytes
ikev2_recv: closing SA
spi=0xd5f403b2c665646e: sa_free: received delete
config_free_proposals: free 0x212b5bd0c00
config_free_proposals: free 0x212b5bf4300
^Cparent_sig_handler: stopping iked
config_getreset: flushing policies
ca_dispatch_parent: config reset
config_free_proposals: free 0x212b5bd0f80
config_free_proposals: free 0x212b5c0b080
config_free_proposals: free 0x212b5bf3f00
config_free_proposals: free 0x212b5bf4b80
config_free_flows: free 0x212b5c06000
config_free_flows: free 0x212b5c04000
config_getreset: flushing SAs
config_getreset: flushing users
ca_reload: loaded ca file ca.crt
ikev2 exiting, pid 39542
control exiting, pid 10641
ca_reload: loaded crl file ca.crl
ca_reload: /C=CA/ST=State/L=City-Name/O=Ville de City-Name/OU=Department/CN=VPN CA/emailAddress=***@domain.local
ca_reload: loaded 1 ca certificate
ca_reload: loaded cert file 192.168.8.2.crt
ca_validate_cert: /C=CA/ST=State/L=City-Name/O=Ville de City-Name/OU=Department/CN=192.168.8.2/emailAddress=***@domain.local ok
ca_reload: local cert type X509_CERT
ca exiting, pid 41593
parent terminating

While the VPN was connected on the Windows machine :
$ doas ipsecctl -sa
FLOWS:
No flows

SAD:
esp tunnel from 192.168.8.2 to 192.168.1.109 spi 0x1436a680 auth hmac-sha1 enc aes-256
esp tunnel from 192.168.1.109 to 192.168.8.2 spi 0x6cab2e28 auth hmac-sha1 enc aes-256

And after it was disconnected :
tp-fw-epu-01$ doas ipsecctl -sa
FLOWS:
No flows

SAD:
No entries
Tobias Heider
2021-06-01 09:57:13 UTC
Permalink
Post by Leclerc, Sebastien
Post by Tobias Heider
Post by Leclerc, Sebastien
Post by Tobias Heider
If that doesn't help you could share the output of 'ipsecctl -sa' to find
out if the IPsec SAs or flows are the problem.
(192.168.8.2 is the firewall interface that 192.168.1.109 is connecting to,
192.168.9.101 is what the vpn client is trying to communicate with)
# ipsecctl -sa
No flows
esp tunnel from 192.168.8.2 to 192.168.1.109 spi 0x0e7b0e8b auth hmac-sha1 enc aes-256
esp tunnel from 192.168.1.109 to 192.168.8.2 spi 0x6830eab4 auth hmac-sha1 enc aes-256
Ok, so this seems to be the cause. From your log snippet i can see that
there must have been SAs at some point because it shows an
"ikev2_childsa_enable" line.
Try running iked with -vv. Maybe the verbose log contains an error message
that helps us find out what's wrong.
The SAs seem to be only the first "from" clause (from 192.168.8.2 to 192.168.1.109), which are the VPN endpoints, not the second one, which covers the network behind the OpenBSD machine, and the IP assigned to the Windows machine in this same subnet (arp-proxied).
The SAs are ok but the flows are not loaded correctly. Looks like it is an
actual bug in 6.9. It is triggered by the 'config address' line in your
configuration, so working around that one line would be one solution.

The diff below should also fix your problem and allow you to keep your config
unchanged.

Index: ikev2.c
===================================================================
RCS file: /mount/openbsd/cvs/src/sbin/iked/ikev2.c,v
retrieving revision 1.319
diff -u -p -r1.319 ikev2.c
--- ikev2.c 23 Mar 2021 21:31:29 -0000 1.319
+++ ikev2.c 1 Jun 2021 09:27:08 -0000
@@ -7062,7 +7062,7 @@ ikev2_cp_fixaddr(struct iked_sa *sa, str
naddr = (sa->sa_cp == IKEV2_CP_REQUEST) ?
sa->sa_addrpool : sa->sa_cp_addr;
if (naddr == NULL)
- return (-1);
+ return (-2);
in4 = (struct sockaddr_in *)&addr->addr;
if (in4->sin_addr.s_addr)
return (-2);
@@ -7074,7 +7074,7 @@ ikev2_cp_fixaddr(struct iked_sa *sa, str
naddr = (sa->sa_cp == IKEV2_CP_REQUEST) ?
sa->sa_addrpool6 : sa->sa_cp_addr6;
if (naddr == NULL)
- return (-1);
+ return (-2);
in6 = (struct sockaddr_in6 *)&addr->addr;
if (!IN6_IS_ADDR_UNSPECIFIED(&in6->sin6_addr))
return (-2);
Leclerc, Sebastien
2021-06-01 13:16:45 UTC
Permalink
Post by Tobias Heider
The SAs are ok but the flows are not loaded correctly. Looks like it is an
actual bug in 6.9. It is triggered by the 'config address' line in your
configuration, so working around that one line would be one solution.
I tried to assign a static IP address in the Windows VPN connection, but it
didn't work.
Post by Tobias Heider
The diff below should also fix your problem and allow you to keep your config
unchanged.
The diff fixed the problem, thank you very much!

Loading...