On 12/11/15 12:11 PM, Daniel Ouellet wrote:
> One question. Is it the only way to re-key the iked process when it
> reach it's 3 hours usage and/or the 500 Mb data exchange to restart a
> new process?
> 
> Isn't it possible to kill the old one then that is not use anymore and
> stop having some routing problem that may be cause by it.
> 
> I collect a HUGE amount of old process that appear to finally get clean
> after a while, but I wonder if it actually need to have a process
> restart instead of just the key change on that same process, or if it
> needs to be a new process, then make sure they old one is killed?

Here is a small example of multiple process as a results of pushing data
in a short amount of time and then sooner or later, communication will
die and the only way to get it going again is to do:

# /etc/rc.d/iked stop
iked(ok)
# /etc/rc.d/iked start
iked(ok)

That may be the cause if the attempt to switch to NAT-T may be.

I got it to NOT see it anymore in the logs by blocking in pf any attempt
to send a NAT-T request.

Anyway, here is a small samples of ghost iked process that will
eventually get cleaned up in a few hours possibly as long as it doesn't
stop working before that and required a hard reset.


# ipsecctl -sa
FLOWS:
flow esp in from 66.63.5.250 to 108.56.142.37 peer 66.63.5.250 srcid
FQDN/gateway.ouellet.us dstid FQDN/tunnel.realconnect.com type use
flow esp out from 108.56.142.37 to 66.63.5.250 peer 66.63.5.250 srcid
FQDN/gateway.ouellet.us dstid FQDN/tunnel.realconnect.com type require
flow esp in from 0.0.0.0/0 to 66.63.50.16/28 peer 66.63.5.250 srcid
FQDN/gateway.ouellet.us dstid FQDN/tunnel.realconnect.com type use
flow esp out from 66.63.50.16/28 to 0.0.0.0/0 peer 66.63.5.250 srcid
FQDN/gateway.ouellet.us dstid FQDN/tunnel.realconnect.com type require
flow esp out from ::/0 to ::/0 type deny

SAD:
esp tunnel from 66.63.5.250 to 108.56.142.37 spi 0x02906639 auth
hmac-sha2-256 enc aes-256
esp tunnel from 66.63.5.250 to 108.56.142.37 spi 0x10698233 auth
hmac-sha2-256 enc aes-256
esp tunnel from 66.63.5.250 to 108.56.142.37 spi 0x18206a04 auth
hmac-sha2-256 enc aes-256
esp tunnel from 108.56.142.37 to 66.63.5.250 spi 0x1a9ee935 auth
hmac-sha2-256 enc aes-256
esp tunnel from 66.63.5.250 to 108.56.142.37 spi 0x2837aa87 auth
hmac-sha2-256 enc aes-256
esp tunnel from 66.63.5.250 to 108.56.142.37 spi 0x3342c878 auth
hmac-sha2-256 enc aes-256
esp tunnel from 108.56.142.37 to 66.63.5.250 spi 0x34af43b9 auth
hmac-sha2-256 enc aes-256
esp tunnel from 66.63.5.250 to 108.56.142.37 spi 0x4b4ae41a auth
hmac-sha2-256 enc aes-256
esp tunnel from 108.56.142.37 to 66.63.5.250 spi 0x85374b48 auth
hmac-sha2-256 enc aes-256
esp tunnel from 108.56.142.37 to 66.63.5.250 spi 0x85878a30 auth
hmac-sha2-256 enc aes-256
esp tunnel from 108.56.142.37 to 66.63.5.250 spi 0x8dece24b auth
hmac-sha2-256 enc aes-256
esp tunnel from 108.56.142.37 to 66.63.5.250 spi 0x9cd96410 auth
hmac-sha2-256 enc aes-256
esp tunnel from 108.56.142.37 to 66.63.5.250 spi 0xa89c1906 auth
hmac-sha2-256 enc aes-256
esp tunnel from 66.63.5.250 to 108.56.142.37 spi 0xbd5f2a88 auth
hmac-sha2-256 enc aes-256
esp tunnel from 108.56.142.37 to 66.63.5.250 spi 0xc396219c auth
hmac-sha2-256 enc aes-256
esp tunnel from 66.63.5.250 to 108.56.142.37 spi 0xc5992599 auth
hmac-sha2-256 enc aes-256
esp tunnel from 108.56.142.37 to 66.63.5.250 spi 0xccfd0be9 auth
hmac-sha2-256 enc aes-256
esp tunnel from 66.63.5.250 to 108.56.142.37 spi 0xd2d1f032 auth
hmac-sha2-256 enc aes-256
esp tunnel from 108.56.142.37 to 66.63.5.250 spi 0xee1fc9bc auth
hmac-sha2-256 enc aes-256
esp tunnel from 66.63.5.250 to 108.56.142.37 spi 0xf9e400a7 auth
hmac-sha2-256 enc aes-256

Reply via email to