Default ike version in AL2023 libreswan package #827
-
Hi All, We tried to replace our Amazon Linux 2 instance that is running Libreswan with Amazon Linux 2023. We deployed this but the tunnel failed to come up with a I am wondering what IKE version is the default for the libreswan package provided by AL2023? Our logs seem to suggest IKEv2 is in use by default (the responder side is configured to use IKEv1, so I believe this would indeed cause a failure)
The libreswan docs seem to suggest that IKEv1 is default if https://libreswan.org/man/ipsec.conf.5.html I found another link from Redhat suggesting they set ikve2 as the default https://access.redhat.com/solutions/5699991 So, I'm wondering if the AL2023 package is setting IKEv2 as the default? (we are on version 4.12-3.amzn2023.0.2) |
Beta Was this translation helpful? Give feedback.
Replies: 3 comments 2 replies
-
Our package is based on Fedora and doesn't contain the RHEL patch to disable IKEv1 by default. Anything interesting in the logs ? |
Beta Was this translation helpful? Give feedback.
-
The file
which could be the issue here. |
Beta Was this translation helpful? Give feedback.
-
Thanks for that, nothing particularly interesting (although I admit to not being a full time network admin, so I may be missing something) The first mention of ikev2 is
After that the tunnels begin being configured
This is then repeated 25 times for the various tunnels Then there is just this repeated for all the data tunnels waiting on the keying channel
and then the failures start
Thanks for that, the file is present, from the quick bit of reading I've done it needs to be set as include in /etc/ipsec.conf though? As per my config below, it's not set.
For reference, Setting |
Beta Was this translation helpful? Give feedback.
The file
/etc/crypto-policies/back-ends/libreswan.config
contains default connection settings for IPsecwhich could be the issue here.