Date: Mon, 29 Dec 2008 06:18:36 -0800 (PST) From: Gabe <nrml@att.net> To: "Bjoern A. Zeeb" <bzeeb-lists@lists.zabbadoz.net> Cc: freebsd-net@freebsd.org Subject: Re: +ipsec_common_input: no key association found for SA Message-ID: <847488.86907.qm@web83814.mail.sp1.yahoo.com>
next in thread | raw e-mail | index | archive | help
> From: Bjoern A. Zeeb <bzeeb-lists@lists.zabbadoz.net> > To: Gabe <nrml@att.net> > Cc: freebsd-net@freebsd.org > Sent: Monday, December 29, 2008 5:19:16 AM > Subject: Re: +ipsec_common_input: no key association found for SA > > On Mon, 29 Dec 2008, Bjoern A. Zeeb wrote: > > > On Mon, 29 Dec 2008, Gabe wrote: > > > >> Anyone know what causes this error message? > >> > >> +ipsec_common_input: no key association found for SA > >> 69.x.x.x[0]/04e317a1/50 > > > > from what I remember without looking, this means that you ahve an > > IPsec policy for src/dst but no SA matching this pair or rather no > > matching destination + protocol + security parameter index (see rfc2401). > > > > The easiest thing you can do is to check > > setkey -Da > > for this tripple the time the printf happens. > > > > The first thing in the printf is your destination IP (your local side), > > the next is the SPI in hex and last is the protocol (50 == ESP). With > > that you can see if what the peer sends you is what you negotiated/expected. > > > > Are you using static keying or an ike daemon like racoon? > > Do this happen for all packets or just randomly or exactly every n > > minutes/hours? > > > > If you find an exact match of the triplet in setkey -Da you may also > > want to check if there is another one and/or the state of the entry/entries > > (state=.. at the end of the fourth line). > > If it's not "mature" check the time ralted values to see if there is > > an expiry problem.. This is what setkey -Da returns: box# setkey -Da Invalid extension type Invalid extension type box# I only have one peer (site to site link) and this appears to happen sporadically with no particular pattern that I can figure out. I also tried rebuilding the ipsec-tools port as a just in case and that made no change. This is some more log info: Dec 29 05:50:37 box kernel: ipsec_common_input: no key association found for SA 69.x.x.x[0]/03e4aece/50 Dec 29 05:50:39 box last message repeated 64 times Dec 29 05:51:33 box kernel: WARNING: pseudo-random number generator used for IPsec processing Dec 29 05:54:54 box kernel: ipsec_common_input: no key association found for SA 69.x.x.x[0]/0cb33e2b/50 Dec 29 05:54:56 box last message repeated 8 times Dec 29 06:07:32 box kernel: ipsec_common_input: no key association found for SA 69.x.x.x[0]/0c4ccc0d/50 Dec 29 06:07:44 box last message repeated 241 times This started happening after I patched the kernel for NAT_T and enabled NAT_T on racoon, perhaps the natt_keepalive is too long at 20 seconds? Here is the racoon.con: padding # options are not to be changed { maximum_length 20; randomize off; strict_check off; exclusive_tail off; } timer # timing options. change as needed { counter 5; interval 20 sec; persend 1; natt_keepalive 20 sec; phase1 30 sec; phase2 15 sec; } listen # address [port] that racoon will listening on { isakmp 69.x.x.x [500]; isakmp_natt 69.x.x.x [4500]; } remote 69.x.x.x [500] { exchange_mode main,base; doi ipsec_doi; situation identity_only; my_identifier address 69.x.x.x; peers_identifier address 69.x.x.x; lifetime time 12 hour; passive off; proposal_check obey; nat_traversal on; generate_policy off; proposal { encryption_algorithm blowfish; hash_algorithm md5; authentication_method pre_shared_key; lifetime time 24 hours; dh_group 1; } } sainfo (address 192.168.10.0/24 any address 192.168.20.0/24 any) # address $network/$netmask $type addres s $network/$netmask $type ( $type being any or esp) { # $network must be the two internal networks you are joining. pfs_group 1; lifetime time 36000 sec; encryption_algorithm blowfish,3des,des; authentication_algorithm hmac_md5,hmac_sha1; compression_algorithm deflate; Thanks in advance, /gabe > > One more thing - you may want to flip the sysctl to > net.key.preferred_oldsa=0 > and see if that makes a change. But beware - this is going to affect > all your peers, not just one, so if you have 99 working and 1 not > you'll most likely kill the other 99. > > /bz > > -- > Bjoern A. Zeeb The greatest risk is not taking one.
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?847488.86907.qm>