Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

IPsec not working - Please help urgent request ! #103

Closed
ashutosh1701204 opened this issue Dec 31, 2014 · 22 comments
Closed

IPsec not working - Please help urgent request ! #103

ashutosh1701204 opened this issue Dec 31, 2014 · 22 comments

Comments

@ashutosh1701204
Copy link

[root@redhat-1 ~]# ipsec auto --up myconnect
022 "myconnect": We cannot identify ourselves with either end of this connection
We have the same configuration on both gateway severs.

Once this setup works we need to setup IPsec tunnel between CentOS 7 machine and Checkpoint.
Please send KB article or let us know how can we achieve this.
[root@redhat-1 ~]# more /etc/ipsec.d/ipsec.conf
conn myconnect
type=tunnel
left=104.155.211.218
leftsubnet=10.240.0.0/16
right=104.155.216.232
rightsubnet=10.240.0.0/16
keyexchange=ike
auth=esp
auto=start
authby=secret
ike=aes256-sha1-modp2048
esp=aes256-sha1
root@redhat-1 ~]# ipsec verify
Checking your system to see if IPsec got installed and started correctly:
Version check and ipsec on-path [OK]
Linux Openswan U2.6.32/K2.6.32-504.3.3.el6.x86_64 (netkey)
Checking for IPsec support in kernel [OK]
SAref kernel support [N/A]
NETKEY: Testing for disabled ICMP send_redirects [OK]
NETKEY detected, testing for disabled ICMP accept_redirects [OK]
Testing against enforced SElinux mode [OK]
Checking that pluto is running [OK]
Pluto listening for IKE on udp 500 [OK]
Pluto listening for NAT-T on udp 4500 [OK]
Checking for 'ip' command [OK]
Checking /bin/sh is not /bin/dash [OK]
Checking for 'iptables' command [OK]
Opportunistic Encryption Support [DISABLED]
[root@redhat-1 ~]#

@libreswan
Copy link

neither left= or right= is identified with your machine. You must configure either left= or right= with an IP address (or hostname resolving to an IP address) that is locally on the machine. If that local address is dynamic, use the magic value "%defaultroute"

if you are on AWS, you cannot have identical configuration files because on the AWS side, you need to use (if AWS is left) left=%defaultroute with leftid=elasticip (if using IP as ID)

See also: https://libreswan.org/wiki/Interoperability#Amazon_EC2

@ashutosh1701204
Copy link
Author

We are creating VM instance on google Cloud platform running CentOS 7/ openswan and customer is having Checkpoint :

Can you please send us the exact configuration to put on ipsec.conf file on Google VM instance and Customer checkpoint configuration,as we some doubt with example.

We will be highly obliged to you.

Thanks
Ashutosh

@benileo
Copy link

benileo commented Dec 31, 2014

Bud you need to NAT one side. You can't have the same left/right subnet.

On Tuesday, December 30, 2014, ashutosh1701204 notifications@github.com
wrote:

[root@redhat-1 ~]# ipsec auto --up myconnect
022 "myconnect": We cannot identify ourselves with either end of this
connection
We have the same configuration on both gateway severs.

Once this setup works we need to setup IPsec tunnel between CentOS 7
machine and Checkpoint.
Please send KB article or let us know how can we achieve this.
[root@redhat-1 ~]# more /etc/ipsec.d/ipsec.conf
conn myconnect
type=tunnel
left=104.155.211.218
leftsubnet=10.240.0.0/16
right=104.155.216.232
rightsubnet=10.240.0.0/16
keyexchange=ike
auth=esp
auto=start
authby=secret
ike=aes256-sha1-modp2048
esp=aes256-sha1
root@redhat-1 ~]# ipsec verify
Checking your system to see if IPsec got installed and started correctly:
Version check and ipsec on-path [OK]
Linux Openswan U2.6.32/K2.6.32-504.3.3.el6.x86_64 (netkey)
Checking for IPsec support in kernel [OK]
SAref kernel support [N/A]
NETKEY: Testing for disabled ICMP send_redirects [OK]
NETKEY detected, testing for disabled ICMP accept_redirects [OK]
Testing against enforced SElinux mode [OK]
Checking that pluto is running [OK]
Pluto listening for IKE on udp 500 [OK]
Pluto listening for NAT-T on udp 4500 [OK]
Checking for 'ip' command [OK]
Checking /bin/sh is not /bin/dash [OK]
Checking for 'iptables' command [OK]
Opportunistic Encryption Support [DISABLED]
[root@redhat-1 ~]#

Reply to this email directly or view it on GitHub
#103.

Sent from Gmail Mobile

@ashutosh1701204
Copy link
Author

Hi

Can you please confirm if the below configuration is correct on google
cloud Platform server ,we will ask customer to do the required configure on
checkpoint on their end.

Please note we have DB and APP server , Customer AD/SSO server will
communicate with this gateway server below using IPSEC tunnel.

[root@redhat-1 ~]# more /etc/ipsec.d/ipsec.conf
conn myconnect
type=tunnel
left=104.155.211.218
leftsubnet=10.240.0.0/16
right=104.155.216.232
rightsubnet=10.240.0.0/16
keyexchange=ike
auth=esp
auto=start
authby=secret
ike=aes256-sha1-modp2048
esp=aes256-sha1

On Wed, Dec 31, 2014 at 12:59 PM, Ben Irving notifications@github.com
wrote:

Bud you need to NAT one side. You can't have the same left/right subnet.

On Tuesday, December 30, 2014, ashutosh1701204 notifications@github.com
wrote:

[root@redhat-1 ~]# ipsec auto --up myconnect
022 "myconnect": We cannot identify ourselves with either end of this
connection
We have the same configuration on both gateway severs.

Once this setup works we need to setup IPsec tunnel between CentOS 7
machine and Checkpoint.
Please send KB article or let us know how can we achieve this.
[root@redhat-1 ~]# more /etc/ipsec.d/ipsec.conf
conn myconnect
type=tunnel
left=104.155.211.218
leftsubnet=10.240.0.0/16
right=104.155.216.232
rightsubnet=10.240.0.0/16
keyexchange=ike
auth=esp
auto=start
authby=secret
ike=aes256-sha1-modp2048
esp=aes256-sha1
root@redhat-1 ~]# ipsec verify
Checking your system to see if IPsec got installed and started correctly:
Version check and ipsec on-path [OK]
Linux Openswan U2.6.32/K2.6.32-504.3.3.el6.x86_64 (netkey)
Checking for IPsec support in kernel [OK]
SAref kernel support [N/A]
NETKEY: Testing for disabled ICMP send_redirects [OK]
NETKEY detected, testing for disabled ICMP accept_redirects [OK]
Testing against enforced SElinux mode [OK]
Checking that pluto is running [OK]
Pluto listening for IKE on udp 500 [OK]
Pluto listening for NAT-T on udp 4500 [OK]
Checking for 'ip' command [OK]
Checking /bin/sh is not /bin/dash [OK]
Checking for 'iptables' command [OK]
Opportunistic Encryption Support [DISABLED]
[root@redhat-1 ~]#

Reply to this email directly or view it on GitHub
#103.

Sent from Gmail Mobile


Reply to this email directly or view it on GitHub
#103 (comment).

@ashutosh1701204
Copy link
Author

Leftsubnet and rightsubnet range will be modify later . but please confirm
if other configurations are correct.

Thanks
Ashutosh

On Wed, Dec 31, 2014 at 1:07 PM, Ashutosh Adhikari <
ashutosh.adhikari@gmail.com> wrote:

Hi

Can you please confirm if the below configuration is correct on google
cloud Platform server ,we will ask customer to do the required configure on
checkpoint on their end.

Please note we have DB and APP server , Customer AD/SSO server will
communicate with this gateway server below using IPSEC tunnel.

[root@redhat-1 ~]# more /etc/ipsec.d/ipsec.conf
conn myconnect
type=tunnel
left=104.155.211.218
leftsubnet=10.240.0.0/16
right=104.155.216.232
rightsubnet=10.240.0.0/16
keyexchange=ike
auth=esp
auto=start
authby=secret
ike=aes256-sha1-modp2048
esp=aes256-sha1

On Wed, Dec 31, 2014 at 12:59 PM, Ben Irving notifications@github.com
wrote:

Bud you need to NAT one side. You can't have the same left/right subnet.

On Tuesday, December 30, 2014, ashutosh1701204 notifications@github.com
wrote:

[root@redhat-1 ~]# ipsec auto --up myconnect
022 "myconnect": We cannot identify ourselves with either end of this
connection
We have the same configuration on both gateway severs.

Once this setup works we need to setup IPsec tunnel between CentOS 7
machine and Checkpoint.
Please send KB article or let us know how can we achieve this.
[root@redhat-1 ~]# more /etc/ipsec.d/ipsec.conf
conn myconnect
type=tunnel
left=104.155.211.218
leftsubnet=10.240.0.0/16
right=104.155.216.232
rightsubnet=10.240.0.0/16
keyexchange=ike
auth=esp
auto=start
authby=secret
ike=aes256-sha1-modp2048
esp=aes256-sha1
root@redhat-1 ~]# ipsec verify
Checking your system to see if IPsec got installed and started
correctly:
Version check and ipsec on-path [OK]
Linux Openswan U2.6.32/K2.6.32-504.3.3.el6.x86_64 (netkey)
Checking for IPsec support in kernel [OK]
SAref kernel support [N/A]
NETKEY: Testing for disabled ICMP send_redirects [OK]
NETKEY detected, testing for disabled ICMP accept_redirects [OK]
Testing against enforced SElinux mode [OK]
Checking that pluto is running [OK]
Pluto listening for IKE on udp 500 [OK]
Pluto listening for NAT-T on udp 4500 [OK]
Checking for 'ip' command [OK]
Checking /bin/sh is not /bin/dash [OK]
Checking for 'iptables' command [OK]
Opportunistic Encryption Support [DISABLED]
[root@redhat-1 ~]#

Reply to this email directly or view it on GitHub
#103.

Sent from Gmail Mobile


Reply to this email directly or view it on GitHub
#103 (comment).

@ashutosh1701204
Copy link
Author

Now we are getting this error
[root@redhat-1 ~]# ipsec auto --up myconnect104 "myconnect" #5:
STATE_MAIN_I1: initiate003 "myconnect" #5: ignoring informational payload,
type NO_PROPOSAL_CHOSEN msgid=00000000003 "myconnect" #5: received and
ignored informational message010 "myconnect" #5: STATE_MAIN_I1:
retransmission; will wait 20s for response003 "myconnect" #5: ignoring
informational payload, type NO_PROPOSAL_CHOSEN msgid=00000000003
"myconnect" #5: received and ignored informational message010 "myconnect"
#5: STATE_MAIN_I1: retransmission; will wait 40s for response003
"myconnect" #5: ignoring informational payload, type NO_PROPOSAL_CHOSEN
msgid=00000000003 "myconnect" #5: received and ignored informational message

On Wed, Dec 31, 2014 at 1:09 PM, Ashutosh Adhikari <
ashutosh.adhikari@gmail.com> wrote:

Leftsubnet and rightsubnet range will be modify later . but please confirm
if other configurations are correct.

Thanks
Ashutosh

On Wed, Dec 31, 2014 at 1:07 PM, Ashutosh Adhikari <
ashutosh.adhikari@gmail.com> wrote:

Hi

Can you please confirm if the below configuration is correct on google
cloud Platform server ,we will ask customer to do the required configure on
checkpoint on their end.

Please note we have DB and APP server , Customer AD/SSO server will
communicate with this gateway server below using IPSEC tunnel.

[root@redhat-1 ~]# more /etc/ipsec.d/ipsec.conf
conn myconnect
type=tunnel
left=104.155.211.218
leftsubnet=10.240.0.0/16
right=104.155.216.232
rightsubnet=10.240.0.0/16
keyexchange=ike
auth=esp
auto=start
authby=secret
ike=aes256-sha1-modp2048
esp=aes256-sha1

On Wed, Dec 31, 2014 at 12:59 PM, Ben Irving notifications@github.com
wrote:

Bud you need to NAT one side. You can't have the same left/right subnet.

On Tuesday, December 30, 2014, ashutosh1701204 <notifications@github.com

wrote:

[root@redhat-1 ~]# ipsec auto --up myconnect
022 "myconnect": We cannot identify ourselves with either end of this
connection
We have the same configuration on both gateway severs.

Once this setup works we need to setup IPsec tunnel between CentOS 7
machine and Checkpoint.
Please send KB article or let us know how can we achieve this.
[root@redhat-1 ~]# more /etc/ipsec.d/ipsec.conf
conn myconnect
type=tunnel
left=104.155.211.218
leftsubnet=10.240.0.0/16
right=104.155.216.232
rightsubnet=10.240.0.0/16
keyexchange=ike
auth=esp
auto=start
authby=secret
ike=aes256-sha1-modp2048
esp=aes256-sha1
root@redhat-1 ~]# ipsec verify
Checking your system to see if IPsec got installed and started
correctly:
Version check and ipsec on-path [OK]
Linux Openswan U2.6.32/K2.6.32-504.3.3.el6.x86_64 (netkey)
Checking for IPsec support in kernel [OK]
SAref kernel support [N/A]
NETKEY: Testing for disabled ICMP send_redirects [OK]
NETKEY detected, testing for disabled ICMP accept_redirects [OK]
Testing against enforced SElinux mode [OK]
Checking that pluto is running [OK]
Pluto listening for IKE on udp 500 [OK]
Pluto listening for NAT-T on udp 4500 [OK]
Checking for 'ip' command [OK]
Checking /bin/sh is not /bin/dash [OK]
Checking for 'iptables' command [OK]
Opportunistic Encryption Support [DISABLED]
[root@redhat-1 ~]#

Reply to this email directly or view it on GitHub
#103.

Sent from Gmail Mobile


Reply to this email directly or view it on GitHub
#103 (comment)
.

@letoams
Copy link
Contributor

letoams commented Dec 31, 2014

Why are you using openswan on centos7? centos7 is based on rhel7 which obsoleted openswan for libreswan.
Run "ipsec auto --add myconnect" on both sides to see if the connection loads at all or if you have a syntax error. If this fails, fix it until the add command works.

clearly you cannot use the same subne on both ends, so you must change that

@ashutosh1701204
Copy link
Author

Is it ok to use to centos 6 , can you please give us the exact output of
ipsec.conf configuration file which we need to add.

Please help us....
On 31 Dec 2014 20:33, "Paul Wouters (libreswan)" notifications@github.com
wrote:

Why are you using openswan on centos7? centos7 is based on rhel7 which
obsoleted openswan for libreswan.
Run "ipsec auto --add myconnect" on both sides to see if the connection
loads at all or if you have a syntax error. If this fails, fix it until the
add command works.

clearly you cannot use the same subne on both ends, so you must change that


Reply to this email directly or view it on GitHub
#103 (comment).

@letoams
Copy link
Contributor

letoams commented Dec 31, 2014

apart from the bad identical subnet, the config looks fine, asuming all entries of the conn are indented. which is why i asked you to run those commands that will show errors.
no proposal chosen most likely means your connection did not load properly due to bad syntax

@xelerance
Copy link
Collaborator

You can use CentOS 6 or CentOS 7 with Openswan.

@xelerance
Copy link
Collaborator

If you wish for a CentOS 7 RPM of Openswan, you can download it here https://download.openswan.org/rhel7/x86_64/openswanX-2.6.43-2.1.x86_64.rpm

You can install this version if you wish, but the description of your problem does point towards a configuration error, and letoams and puravidahope are trying to help you.

@letoams
Copy link
Contributor

letoams commented Dec 31, 2014

note that 2.6.42 seems to be the latest release. not sure what the 2.6.43 rpms are. I guess a pre-release

@ashutosh1701204
Copy link
Author

Can we use centos 6 ..which version of openswan works please let us know.
On 31 Dec 2014 20:55, "Paul Wouters (libreswan)" notifications@github.com
wrote:

note that 2.6.42 seems to be the latest release. not sure what the 2.6.43
rpms are. I guess a pre-release


Reply to this email directly or view it on GitHub
#103 (comment).

@xelerance
Copy link
Collaborator

@ashutosh1701204 Your problem is configuration, not the version of Openswan. The version you are currently running, 2.6.32, will work once you have answered letoams' questions and implement whatever suggestions we may have. You can use Openswan 2.6.32, or 2.6.42, on CentOS6. All of them will work.

Please show us the configuration that you are currently using.

@ashutosh1701204
Copy link
Author

The cconfiguration file is given below. we will use different version but
please validate it the configuration are correct.
On 31 Dec 2014 13:07, "Ashutosh Adhikari" ashutosh.adhikari@gmail.com
wrote:

Hi

Can you please confirm if the below configuration is correct on google
cloud Platform server ,we will ask customer to do the required configure on
checkpoint on their end.

Please note we have DB and APP server , Customer AD/SSO server will
communicate with this gateway server below using IPSEC tunnel.

[root@redhat-1 ~]# more /etc/ipsec.d/ipsec.conf
conn myconnect
type=tunnel
left=104.155.211.218
leftsubnet=10.240.0.0/16
right=104.155.216.232
rightsubnet=10.240.0.0/16
keyexchange=ike
auth=esp
auto=start
authby=secret
ike=aes256-sha1-modp2048
esp=aes256-sha1

On Wed, Dec 31, 2014 at 12:59 PM, Ben Irving notifications@github.com
wrote:

Bud you need to NAT one side. You can't have the same left/right subnet.

On Tuesday, December 30, 2014, ashutosh1701204 notifications@github.com
wrote:

[root@redhat-1 ~]# ipsec auto --up myconnect
022 "myconnect": We cannot identify ourselves with either end of this
connection
We have the same configuration on both gateway severs.

Once this setup works we need to setup IPsec tunnel between CentOS 7
machine and Checkpoint.
Please send KB article or let us know how can we achieve this.
[root@redhat-1 ~]# more /etc/ipsec.d/ipsec.conf
conn myconnect
type=tunnel
left=104.155.211.218
leftsubnet=10.240.0.0/16
right=104.155.216.232
rightsubnet=10.240.0.0/16
keyexchange=ike
auth=esp
auto=start
authby=secret
ike=aes256-sha1-modp2048
esp=aes256-sha1
root@redhat-1 ~]# ipsec verify
Checking your system to see if IPsec got installed and started
correctly:
Version check and ipsec on-path [OK]
Linux Openswan U2.6.32/K2.6.32-504.3.3.el6.x86_64 (netkey)
Checking for IPsec support in kernel [OK]
SAref kernel support [N/A]
NETKEY: Testing for disabled ICMP send_redirects [OK]
NETKEY detected, testing for disabled ICMP accept_redirects [OK]
Testing against enforced SElinux mode [OK]
Checking that pluto is running [OK]
Pluto listening for IKE on udp 500 [OK]
Pluto listening for NAT-T on udp 4500 [OK]
Checking for 'ip' command [OK]
Checking /bin/sh is not /bin/dash [OK]
Checking for 'iptables' command [OK]
Opportunistic Encryption Support [DISABLED]
[root@redhat-1 ~]#

Reply to this email directly or view it on GitHub
#103.

Sent from Gmail Mobile


Reply to this email directly or view it on GitHub
#103 (comment).

@ashutosh1701204
Copy link
Author

This is the error we get while runing the command below.
On 31 Dec 2014 13:53, "Ashutosh Adhikari" ashutosh.adhikari@gmail.com
wrote:

Now we are getting this error
[root@redhat-1 ~]# ipsec auto --up myconnect104 "myconnect" #5:
STATE_MAIN_I1: initiate003 "myconnect" #5: ignoring informational payload,
type NO_PROPOSAL_CHOSEN msgid=00000000003 "myconnect" #5: received and
ignored informational message010 "myconnect" #5: STATE_MAIN_I1:
retransmission; will wait 20s for response003 "myconnect" #5: ignoring
informational payload, type NO_PROPOSAL_CHOSEN msgid=00000000003
"myconnect" #5: received and ignored informational message010 "myconnect"
#5: STATE_MAIN_I1: retransmission; will wait 40s for response003
"myconnect" #5: ignoring informational payload, type NO_PROPOSAL_CHOSEN
msgid=00000000003 "myconnect" #5: received and ignored informational message

On Wed, Dec 31, 2014 at 1:09 PM, Ashutosh Adhikari <
ashutosh.adhikari@gmail.com> wrote:

Leftsubnet and rightsubnet range will be modify later . but please
confirm if other configurations are correct.

Thanks
Ashutosh

On Wed, Dec 31, 2014 at 1:07 PM, Ashutosh Adhikari <
ashutosh.adhikari@gmail.com> wrote:

Hi

Can you please confirm if the below configuration is correct on google
cloud Platform server ,we will ask customer to do the required configure on
checkpoint on their end.

Please note we have DB and APP server , Customer AD/SSO server will
communicate with this gateway server below using IPSEC tunnel.

[root@redhat-1 ~]# more /etc/ipsec.d/ipsec.conf
conn myconnect
type=tunnel
left=104.155.211.218
leftsubnet=10.240.0.0/16
right=104.155.216.232
rightsubnet=10.240.0.0/16
keyexchange=ike
auth=esp
auto=start
authby=secret
ike=aes256-sha1-modp2048
esp=aes256-sha1

On Wed, Dec 31, 2014 at 12:59 PM, Ben Irving notifications@github.com
wrote:

Bud you need to NAT one side. You can't have the same left/right subnet.

On Tuesday, December 30, 2014, ashutosh1701204 <
notifications@github.com>
wrote:

[root@redhat-1 ~]# ipsec auto --up myconnect
022 "myconnect": We cannot identify ourselves with either end of this
connection
We have the same configuration on both gateway severs.

Once this setup works we need to setup IPsec tunnel between CentOS 7
machine and Checkpoint.
Please send KB article or let us know how can we achieve this.
[root@redhat-1 ~]# more /etc/ipsec.d/ipsec.conf
conn myconnect
type=tunnel
left=104.155.211.218
leftsubnet=10.240.0.0/16
right=104.155.216.232
rightsubnet=10.240.0.0/16
keyexchange=ike
auth=esp
auto=start
authby=secret
ike=aes256-sha1-modp2048
esp=aes256-sha1
root@redhat-1 ~]# ipsec verify
Checking your system to see if IPsec got installed and started
correctly:
Version check and ipsec on-path [OK]
Linux Openswan U2.6.32/K2.6.32-504.3.3.el6.x86_64 (netkey)
Checking for IPsec support in kernel [OK]
SAref kernel support [N/A]
NETKEY: Testing for disabled ICMP send_redirects [OK]
NETKEY detected, testing for disabled ICMP accept_redirects [OK]
Testing against enforced SElinux mode [OK]
Checking that pluto is running [OK]
Pluto listening for IKE on udp 500 [OK]
Pluto listening for NAT-T on udp 4500 [OK]
Checking for 'ip' command [OK]
Checking /bin/sh is not /bin/dash [OK]
Checking for 'iptables' command [OK]
Opportunistic Encryption Support [DISABLED]
[root@redhat-1 ~]#

Reply to this email directly or view it on GitHub
#103.

Sent from Gmail Mobile


Reply to this email directly or view it on GitHub
#103 (comment)
.

@dinukasal
Copy link

dinukasal commented Jun 15, 2018

Hi all,

I am running Libreswan 3.23 on Cent OS 7 on google cloud,

``

 conn ez-cash
authby=secret
    auto=start
    # phase 1
    ike=aes128-sha1
    keyexchange=ike
    ikelifetime=86400

    # phase 2
    phase2=esp
    phase2alg=aes128-sha1
    compress=no
    pfs=yes
    type=tunnel
    leftsourceip=35.229.xx.xx
    left=10.142.0.4
    leftsubnet=10.142.0.0/24
    leftnexthop=%defaultroute
    leftid=@35.229.20.19

    right=125.214.xx.xx
    rightsourceip=125.21
    rightsubnet=172.26.0.0/16
    salifetime=28800
    rightnexthop=%defaultroute

``

Tunnel is not connecting, it hangs up in phase 2 and keeps reconnecting,
Enabled ip forwarding, added firewall rules tcp:4500, udp:4500, udp:500

When pinged from the other network sometimes tunnel gets connected, and doesnt connect when ipsec restarts.
Where could be the issue?
Please help!

@letoams
Copy link
Contributor

letoams commented Jun 15, 2018 via email

@dinukasal
Copy link

dinukasal commented Jun 16, 2018

Thank you for the response,
unfortunately traffic is NAT'ed, so I cannot use libreswan if traffic is NAT'ed?
NAT'ed in the the sense this right ip is public,

but when the tunnel is ip communication is NAT'ed

@letoams
Copy link
Contributor

letoams commented Jun 16, 2018 via email

@dinukasal
Copy link

This is the output of "watch -n0.5 ipsec status"
https://dinukasthoughts.wordpress.com/2018/06/16/libreswan-log/

@shussain
Copy link
Collaborator

@dinukasal as you have noted, this issue is on Libreswan.

As such, I will locking this closed issue. If you have any Openswan specific issues, please feel free to open a new issue

@xelerance xelerance locked as off-topic and limited conversation to collaborators Jun 16, 2018
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
None yet
Projects
None yet
Development

No branches or pull requests

5 participants