[Swan] IPComp and xfrmi
Wolfgang Nothdurft
wolfgang at linogate.de
Fri Jul 21 11:58:43 EEST 2023
Hi,
i have a problem that if ipcomp is active using xfrmi (either ikev1 and
ikev2), packets through the tunnel trigger a new connection.
This is reproducible if I use the test ikev1-xfrmi-01 and activate
compress=yes in ipsec.conf. The test fails and I see following log
message after the tunnel was established:
initiate on-demand for packet 192.0.3.254:8-ICMP->192.0.2.254:0
| routing: dispatch ACQUIRE to ROUTED_TUNNEL PERMANENT $1 routing#2
IPsec#2 IKE#1 (initiate_ondemand() +145 programs/pluto/acquire.c)
EXPECTATION FAILED: routing: unhandled ACQUIRE to ROUTED_TUNNEL
PERMANENT $1 routing#2 IPsec#2 IKE#1 (initiate_ondemand() +145
programs/pluto/acquire.c)
I also added ip xfrm monitor to northrun.sh:
ping -n -q -w 4 -c 4 192.0.2.254
PING 192.0.2.254 (192.0.2.254) 56(84) bytes of data.
--- 192.0.2.254 ping statistics ---
1 packets transmitted, 0 received, +1 errors, 100% packet loss, time
acquire proto comp
sel src 192.0.3.254/32 dst 192.0.2.254/32 proto icmp type 8 code 0
dev eth1
policy src 192.0.3.0/24 dst 192.0.2.0/24
dir out priority 1757393 ptype main
tmpl src 192.1.3.33 dst 192.1.2.23
proto comp reqid 16390 mode tunnel
tmpl src 0.0.0.0 dst 0.0.0.0
proto esp reqid 16389 mode transport
if_id 0x1
Test was running with nsrun --ns on Kernel is 5.11.22-100.fc32.x86_64.
This seems the same problem described in
https://github.com/libreswan/libreswan/issues/716 where andrew commented
"This is a linux kernel bug.".
Can you tell me which one?
If this is a new one, i will create an issue on github.
Regards
Wolfgang
More information about the Swan
mailing list