I successfully created a site to site VPN connection (named SAVE) with StrongSwan and it appears working fine.
What bothers me is that the output of ipsec statusall in the Security Association section keeps displaying a CONNECTING entry and I don' tknow how to interpret that part.
See below for the ipsec statusall output and setup. From LOG i just see a flow of INFORMATIONAL requests and response (ENC group).
Is this normal or how should I interpret this?
Thank you!
Status of IKE charon daemon (strongSwan 5.3.5, Linux 4.4.0-184-generic, x86_64):
uptime: 3 minutes, since Jul 29 12:20:13 2020
malloc: sbrk 2568192, mmap 0, used 378432, free 2189760
worker threads: 11 of 16 idle, 5/0/0/0 working, job queue: 0/0/0/0, scheduled: 3
loaded plugins: charon test-vectors aes rc2 sha1 sha2 md4 md5 random nonce x509 revocation constraints pubkey pkcs1 pkcs7 pkcs8 pkcs12 pgp dnskey sshkey pem openssl fips-prf gmp agent xcbc hmac gcm attr kernel-netlink resolve socket-default connmark stroke updown
Listening IP addresses:
xx.xx.xx.xx
Connections:
SAVE: xx.xx.xx.xx...yy.yy.yy.yy IKEv2
SAVE: local: [xx.xx.xx.xx] uses pre-shared key authentication
SAVE: remote: [yy.yy.yy.yy] uses pre-shared key authentication
SAVE: child: zz.zz.zz.0/24 === ww.ww.ww.ww/32 TUNNEL
Security Associations (1 up, 1 connecting):
SAVE[2]: ESTABLISHED 2 minutes ago, xx.xx.xx.xx[xx.xx.xx.xx]...yy.yy.yy.yy[yy.yy.yy.yy]
SAVE[2]: IKEv2 SPIs: 1e7b35d1f9f1ea9d_i b375373958803f58_r*, pre-shared key reauthentication in 7 hours
SAVE[2]: IKE proposal: AES_CBC_128/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024
SAVE{2}: INSTALLED, TUNNEL, reqid 1, ESP SPIs: cf5c6f76_i 5b4506c5_o
SAVE{2}: AES_CBC_128/HMAC_SHA1_96, 0 bytes_i, 3660 bytes_o (53 pkts, 27s ago), rekeying in 45 minutes
SAVE{2}: zz.zz.zz.zz/24 === ww.ww.ww.ww/32
SAVE[1]: CONNECTING, xx.xx.xx.xx[xx.xx.xx.xx]...yy.yy.yy.yy[yy.yy.yy.yy]
SAVE[1]: IKEv2 SPIs: 9d44621f40d456cd_i* c7f3bb5a8753ee09_r
SAVE[1]: IKE proposal: AES_CBC_128/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024
SAVE[1]: Tasks active: IKE_CERT_PRE IKE_AUTH IKE_CERT_POST IKE_CONFIG CHILD_CREATE IKE_AUTH_LIFETIME IKE_MOBIKE
conn SAVE
compress=no
type=tunnel
keyingtries=10
authby=secret
ike=aes128-sha1-modp1024!
keyexchange=ikev2
esp=aes128-sha1
auto=start
leftid=xx.xx.xx.xx
left=xx.xx.xx.xx
leftsourceip=zz.zz.zz.1
leftsubnet=zz.zz.zz.0/24
leftfirewall=no
rightid=yy.yy.yy.yy
right=yy.yy.yy.yy
rightsubnet=ww.ww.ww.ww/32
keylife=3600s
ikelifetime=28800s