Guest User!

You are not Sophos Staff.

This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

SGX l2tp problems, next problem

Hi,

after some testing I got the ip-sec part to connect but now I recive a error in l2tp.

"<l2t-1|94> received netlink error: Invalid argument (22)", I did some searching and it might be related to hw acceleration. But I don't know how to disable that in a SGX box or if it's actually the correct thing to do.

Whole log file

2023-03-24 12:48:35Z 20[NET] <94> received packet: from <client IP>[500] to <firewall IP>[500] (408 bytes)
2023-03-24 12:48:35Z 20[ENC] <94> parsed ID_PROT request 0 [ SA V V V V V V V V ]
2023-03-24 12:48:35Z 20[ENC] <94> received unknown vendor ID: 01:52:8b:bb:c0:06:96:12:18:49:ab:9a:1c:5b:2a:51:00:00:00:01
2023-03-24 12:48:35Z 20[IKE] <94> received MS NT5 ISAKMPOAKLEY vendor ID
2023-03-24 12:48:35Z 20[IKE] <94> received NAT-T (RFC 3947) vendor ID
2023-03-24 12:48:35Z 20[IKE] <94> received draft-ietf-ipsec-nat-t-ike-02\n vendor ID
2023-03-24 12:48:35Z 20[IKE] <94> received FRAGMENTATION vendor ID
2023-03-24 12:48:35Z 20[ENC] <94> received unknown vendor ID: fb:1d:e3:cd:f3:41:b7:ea:16:b7:e5:be:08:55:f1:20
2023-03-24 12:48:35Z 20[ENC] <94> received unknown vendor ID: 26:24:4d:38:ed:db:61:b3:17:2a:36:e3:d0:cf:b8:19
2023-03-24 12:48:35Z 20[ENC] <94> received unknown vendor ID: e3:a5:96:6a:76:37:9f:e7:07:22:82:31:e5:ce:86:52
2023-03-24 12:48:35Z 20[IKE] <94> <client IP> is initiating a Main Mode IKE_SA
2023-03-24 12:48:35Z 20[ENC] <94> generating ID_PROT response 0 [ SA V V V V V ]
2023-03-24 12:48:35Z 20[NET] <94> sending packet: from <firewall IP>[500] to <client IP>[500] (180 bytes)
2023-03-24 12:48:35Z 22[NET] <94> received packet: from <client IP>[500] to <firewall IP>[500] (196 bytes)
2023-03-24 12:48:35Z 22[ENC] <94> parsed ID_PROT request 0 [ KE No NAT-D NAT-D ]
2023-03-24 12:48:35Z 22[IKE] <94> remote host is behind NAT
2023-03-24 12:48:35Z 22[ENC] <94> generating ID_PROT response 0 [ KE No NAT-D NAT-D ]
2023-03-24 12:48:35Z 22[NET] <94> sending packet: from <firewall IP>[500] to <client IP>[500] (180 bytes)
2023-03-24 12:48:35Z 25[NET] <94> received packet: from <client IP>[4500] to <firewall IP>[4500] (76 bytes)
2023-03-24 12:48:35Z 25[ENC] <94> parsed ID_PROT request 0 [ ID HASH ]
2023-03-24 12:48:35Z 25[CFG] <94> looking for pre-shared key peer configs matching <firewall IP>...<client IP>[192.168.200.50]
2023-03-24 12:48:35Z 25[CFG] <94> selected peer config "l2t-1"
2023-03-24 12:48:35Z 25[IKE] <l2t-1|94> IKE_SA l2t-1[94] established between <firewall IP>[<firewall IP>]<client IP>[192.168.200.50]
2023-03-24 12:48:35Z 25[IKE] <l2t-1|94> scheduling reauthentication in 28324s
2023-03-24 12:48:35Z 25[IKE] <l2t-1|94> maximum IKE_SA lifetime 28684s
2023-03-24 12:48:35Z 25[ENC] <l2t-1|94> generating ID_PROT response 0 [ ID HASH ]
2023-03-24 12:48:35Z 25[NET] <l2t-1|94> sending packet: from <firewall IP>[4500] to <client IP>[4500] (76 bytes)
2023-03-24 12:48:35Z 19[NET] <l2t-1|94> received packet: from <client IP>[4500] to <firewall IP>[4500] (444bytes)
2023-03-24 12:48:35Z 19[ENC] <l2t-1|94> parsed QUICK_MODE request 1 [ HASH SA No ID ID NAT-OA NAT-OA ]
2023-03-24 12:48:36Z 19[IKE] <l2t-1|94> ### process_request invoking quick_mode_create
2023-03-24 12:48:36Z 19[IKE] <l2t-1|94> ### quick_mode_create: 0x2346ec0 config (nil)
2023-03-24 12:48:36Z 19[IKE] <l2t-1|94> ### process_r: 0x2346ec0 QM_INIT
2023-03-24 12:48:36Z 19[IKE] <l2t-1|94> expected IPComp proposal but peer did not send one, IPComp disabled
2023-03-24 12:48:36Z 19[IKE] <l2t-1|94> received 250000000 lifebytes, configured 0
2023-03-24 12:48:36Z 19[IKE] <l2t-1|94> ### build_r: 0x2346ec0 QM_INIT
2023-03-24 12:48:36Z 19[ENC] <l2t-1|94> generating QUICK_MODE response 1 [ HASH SA No ID ID NAT-OA NAT-OA ]
2023-03-24 12:48:36Z 19[NET] <l2t-1|94> sending packet: from <firewall IP>[4500] to <client IP>[4500] (204 bytes)
2023-03-24 12:48:36Z 16[NET] <l2t-1|94> received packet: from <client IP>[4500] to <firewall IP>[4500] (60 bytes)
2023-03-24 12:48:36Z 16[ENC] <l2t-1|94> parsed QUICK_MODE request 1 [ HASH ]
2023-03-24 12:48:36Z 16[IKE] <l2t-1|94> ### process_r: 0x2346ec0 QM_NEGOTIATED
2023-03-24 12:48:36Z 16[KNL] <l2t-1|94> ipsec_offload enabled
2023-03-24 12:48:36Z 16[KNL] <l2t-1|94> ipsec_offload interface Port2
2023-03-24 12:48:36Z 16[KNL] <l2t-1|94> received netlink error: Invalid argument (22)
2023-03-24 12:48:36Z 16[KNL] <l2t-1|94> unable to add SAD entry with SPI c5c3d3ff (FAILED)
2023-03-24 12:48:36Z 16[KNL] <l2t-1|94> ipsec_offload enabled
2023-03-24 12:48:36Z 16[KNL] <l2t-1|94> ipsec_offload interface Port2
2023-03-24 12:48:36Z 16[KNL] <l2t-1|94> received netlink error: Invalid argument (22)
2023-03-24 12:48:36Z 16[KNL] <l2t-1|94> unable to add SAD entry with SPI 4bec54be (FAILED)
2023-03-24 12:48:36Z 16[IKE] <l2t-1|94> unable to install inbound and outbound IPsec SA (SAD) in kernel
2023-03-24 12:48:36Z 16[IKE] <l2t-1|94> ### destroy: 0x2346ec0
2023-03-24 12:48:36Z 16[KNL] <l2t-1|94> deleting policy <firewall IP>/32[udp/1701] === <client IP>/32[udp/1701] out failed, not found
2023-03-24 12:48:36Z 16[KNL] <l2t-1|94> deleting policy <client IP>/32[udp/1701] === <firewall IP>/32[udp/1701] in failed, not found
2023-03-24 12:48:36Z 16[KNL] <l2t-1|94> deleting policy <firewall IP>/32[udp/1701] === <client IP>/32[udp/1701] out failed, not found
2023-03-24 12:48:36Z 16[IKE] <l2t-1|94> sending DELETE for ESP CHILD_SA with SPI 4bec54be
2023-03-24 12:48:36Z 16[ENC] <l2t-1|94> generating INFORMATIONAL_V1 request 382459208 [ HASH D ]
2023-03-24 12:48:36Z 16[NET] <l2t-1|94> sending packet: from <firewall IP>[4500] to <client IP>[4500] (76 bytes)
2023-03-24 12:49:11Z 06[NET] <l2t-1|94> received packet: from <client IP>[4500] to <firewall IP>[4500] (76 ytes)
2023-03-24 12:49:11Z 06[ENC] <l2t-1|94> parsed INFORMATIONAL_V1 request 3628773983 [ HASH D ]
2023-03-24 12:49:11Z 06[IKE] <l2t-1|94> received DELETE for ESP CHILD_SA with SPI 4bec54be
2023-03-24 12:49:11Z 06[IKE] <l2t-1|94> CHILD_SA not found, ignored
2023-03-24 12:49:11Z 28[NET] <l2t-1|94> received packet: from <client IP>[4500] to <firewall IP>[4500] (92 bytes)
2023-03-24 12:49:11Z 28[ENC] <l2t-1|94> parsed INFORMATIONAL_V1 request 4180688749 [ HASH D ]
2023-03-24 12:49:11Z 28[IKE] <l2t-1|94> received DELETE for IKE_SA l2t-1[94]
2023-03-24 12:49:11Z 28[IKE] <l2t-1|94> deleting IKE_SA l2t-1[94] between <firewall IP>[<firewall IP>]...<client IP>[192.168.200.50]

Thanks

Lennart



This thread was automatically locked due to age.
Parents
  • Hello there,

    Thank you for contacting the Sophos Community.

    To clarify you are running SFOS on an SG device?

    You can see if the IPsec Acceleration module is there by running the following command:

    console> system ipsec-acceleration show

    Regards,

  • Hi,

    console> system ipsec-acceleration show
    IPsec acceleration status: turned on

    /Lennart

  • Hi,   What is the current SF OS Firmware version you are running with? As this kind of reported issue is fixed in V19.0.2 MR-2. 

    Please try disabling "system ipsec-acceleration disable" If you are not running with a firmware version that contains a fix for this issue. Post firmware upgrade you may enable it.

    If your active firmware version is the latest one and contains a fix for this issue but you are still observing this issue then I would also suggest opening a support case to investigate it further.

    Note: disabling system ipsec-acceleration is only a temporary solution to manage the situation.

Reply
  • Hi,   What is the current SF OS Firmware version you are running with? As this kind of reported issue is fixed in V19.0.2 MR-2. 

    Please try disabling "system ipsec-acceleration disable" If you are not running with a firmware version that contains a fix for this issue. Post firmware upgrade you may enable it.

    If your active firmware version is the latest one and contains a fix for this issue but you are still observing this issue then I would also suggest opening a support case to investigate it further.

    Note: disabling system ipsec-acceleration is only a temporary solution to manage the situation.

Children