FAQ: Difference between revisions

From Libreswan
Jump to navigation Jump to search
(Created page with " ( we will sort this in categories once we have more ) == Module unloading error on shutdown or restart: Module esp4 is in use == A common error to see is: <pre> ERROR:...")
 
No edit summary
Line 3: Line 3:




== Which IKE Exchange modes does libreswan support? ==


The [https://www.iana.org/assignments/ipsec-registry/ipsec-registry.xhtml#ipsec-registry-8 IANA Registry] lists all official Exchange Modes. There are a few IKEv1 Modes that are very common despite never gotten past the draft stage.
Libreswan supports:
- [https://tools.ietf.org/html/rfc5996#section-1.2 IKEv2 (PSK, raw RSA, X509)]
- [https://tools.ietf.org/html/rfc2409#section-5 IKEv1 Main Mode (PSK, raw RSA, X509)]
- [https://tools.ietf.org/html/rfc2409#section-5 IKEv1 Aggressive Mode (PSK, raw RSA, X509)]
- [https://tools.ietf.org/html/draft-ietf-ipsec-isakmp-xauth-06 IKEv1 XAUTH/RSA and XAUTH/PSK with ModeConfig (aka "Cisco IPsec mode")]
Not supported:
- [https://tools.ietf.org/html/rfc5996#section-3.15 IKEv2 CP mode]  (planned, not yet implemented)
- [https://tools.ietf.org/html/rfc2409#section-5.3 IKEv1 Revised Mode]
- [https://tools.ietf.org/html/draft-ietf-ipsec-isakmp-hybrid-auth-05 IKEv1 Hybrid Mode (aka "Mutual Group Authentication")] although there is some [https://github.com/libreswan/libreswan/tree/master/contrib/checkpoint-hybrid unmaintained contributed code]


== Module unloading error on shutdown or restart: Module esp4 is in use  ==
== Module unloading error on shutdown or restart: Module esp4 is in use  ==

Revision as of 19:03, 28 March 2014

( we will sort this in categories once we have more )


Which IKE Exchange modes does libreswan support?

The IANA Registry lists all official Exchange Modes. There are a few IKEv1 Modes that are very common despite never gotten past the draft stage. Libreswan supports:

- IKEv2 (PSK, raw RSA, X509) - IKEv1 Main Mode (PSK, raw RSA, X509) - IKEv1 Aggressive Mode (PSK, raw RSA, X509) - IKEv1 XAUTH/RSA and XAUTH/PSK with ModeConfig (aka "Cisco IPsec mode")

Not supported: - IKEv2 CP mode (planned, not yet implemented) - IKEv1 Revised Mode - IKEv1 Hybrid Mode (aka "Mutual Group Authentication") although there is some unmaintained contributed code

Module unloading error on shutdown or restart: Module esp4 is in use

A common error to see is:

ERROR: Module xfrm4_mode_tunnel is in use
ERROR: Module esp4 is in use
FAILURE to unload NETKEY esp4/esp6 module

This happens when libreswan is stopped or restarted. Libreswan supports the alternative KLIPS IPsec stack. This can be configured using protostack=netkey or protostack=klips. See man ipsec.conf for details

The error happens when sockets in the kernel are still holding deleted IPsec SA's. There is no way to "force delete" these. Processes might be holding open sockets that have pinned down those deleted SA's. Although our IKE daemon (pluto) process has ended, these might still be lingering on the system.

The kernel people's answer is don't delete the modules, which is not an option for us because we want to support switching IPsec stacks. An alternative is to use rmmod -w which will cause us to wait, but we have no idea how long that might be.

Regardless, the deleted IPsec SA's are not interfering with the operation of the the XFRM/NETKEY and this error can be ignored as long as you are not switching stacks.