Bugzilla will be upgraded to version 5.0. The upgrade date is tentatively scheduled for 2 December 2018, pending final testing and feedback.
Bug 959568 - Allow disabling of NAT-T keepalive packets
Allow disabling of NAT-T keepalive packets
Status: CLOSED ERRATA
Product: Red Hat Enterprise Linux 6
Classification: Red Hat
Component: openswan (Show other bugs)
6.5
Unspecified Unspecified
unspecified Severity unspecified
: rc
: ---
Assigned To: Paul Wouters
Aleš Mareček
:
Depends On:
Blocks:
  Show dependency treegraph
 
Reported: 2013-05-03 15:56 EDT by Paul Wouters
Modified: 2013-11-21 18:45 EST (History)
5 users (show)

See Also:
Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Environment:
Last Closed: 2013-11-21 18:45:17 EST
Type: Bug
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)


External Trackers
Tracker ID Priority Status Summary Last Updated
Red Hat Product Errata RHBA-2013:1718 normal SHIPPED_LIVE openswan bug fix and enhancement update 2013-11-20 16:51:39 EST

  None (edit)
Description Paul Wouters 2013-05-03 15:56:48 EDT
Description of problem:
Customer request to allow disabling NAT-T keepalive packet sending. This used to be a global option. This patch turns this into a per-conn option. The default is to send NAT-T keepalives.

This is a backport from libreswan
Comment 4 Paul Wouters 2013-07-18 00:25:12 EDT
QA: to test, add plutodebug=natt to ipsec.conf's "config setup"

Setup an ipsec tunnel. This should either be from a client behind NAT, or the client should fake NAT using forceencaps=yes.

For the connection, add nat_keepalive=no

ipsec auto --status will show "nat_keepalive: no"

Bring the connection up. It will log:

"Suppressing sending of NAT-T KEEP-ALIVE by per-conn configuration (nat_keepalive=no)"

With the option set to "yes", it will log:

"Sending of NAT-T KEEP-ALIVE enabled by per-conn configuration (nat_keepalive=yes)"

Without the option, it will log:

"Sending of NAT-T KEEP-ALIVE forced by global configuration (force_keepalive=yes)"

When either keepalive option is enabled, the logs should show at regular 20 second intervals:

"sending NAT-T Keep Alive"

The logs also show:

| inserting event EVENT_NAT_T_KEEPALIVE, timeout in 20 seconds

| next event EVENT_NAT_T_KEEPALIVE in 20 seconds

When nat_keepalive=no, obviously those log entries should not be happening
Comment 9 errata-xmlrpc 2013-11-21 18:45:17 EST
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.

For information on the advisory, and where to find the updated
files, follow the link below.

If the solution does not work for you, open a new bug report.

http://rhn.redhat.com/errata/RHBA-2013-1718.html

Note You need to log in before you can comment on or make changes to this bug.