Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

IPsec mode not working with IPv6 overlays #3151

Closed
antoninbas opened this issue Dec 18, 2021 · 1 comment · Fixed by #3155
Closed

IPsec mode not working with IPv6 overlays #3151

antoninbas opened this issue Dec 18, 2021 · 1 comment · Fixed by #3155
Assignees
Labels
area/transit/encryption Issues or PRs related to transit encryption (IPSec, SSL). area/transit/ipv6 Issues or PRs related to IPv6. kind/bug Categorizes issue or PR as related to a bug. priority/important-longterm Important over the long term, but may not be staffed and/or may need multiple releases to complete.

Comments

@antoninbas
Copy link
Contributor

Describe the bug
In an IPv6-only cluster, trying to enable IPv6 doesn't work (so far I have tried with VXLAN tunnels only). There is no connectivity between Pods across different Nodes, and no IPsec Security Associations are being created.

To Reproduce
Apply the antrea-ipsec.yml manifest in an IPv6-only K8s cluster, check Pod connectivity.

Versions:
Antrea v1.4 and ToT

Additional context
I am trying to get some help from the strongSwan community: strongswan/strongswan#821

I actually did run some tests with GRE after tentatively adding support for the ip6gre OVS tunnel type (see #3150). However, because ovs-monitor-ipsec does not actually support ip6gre (https://github.com/openvswitch/ovs/blob/11441385c2f788320799ba29b344098b917d8827/ipsec/ovs-monitor-ipsec.in#L34-L80), no connection entries are generated in /etc/ipsec.conf. If we do manage to make UDP tunnels work, we should consider submitting a patch to OVS adding support for ip6gre.

If we cannot get help from the strongSwan community, it may be worth it to test with libreSwan to check if we run into the same issue.

@antoninbas antoninbas added area/transit/encryption Issues or PRs related to transit encryption (IPSec, SSL). kind/bug Categorizes issue or PR as related to a bug. priority/important-longterm Important over the long term, but may not be staffed and/or may need multiple releases to complete. area/transit/ipv6 Issues or PRs related to IPv6. labels Dec 18, 2021
@antoninbas
Copy link
Contributor Author

I submitted an OVS patch for this after getting some help from the strongSwan folks: https://mail.openvswitch.org/pipermail/ovs-dev/2021-December/390357.html

I think we can apply this patch manually in our build until it is merged upstream.

@antoninbas antoninbas self-assigned this Dec 21, 2021
antoninbas added a commit to antoninbas/antrea that referenced this issue Dec 21, 2021
When using IPv6, the IPsec configuration (ipsec.conf) generated by
ovs-monitor-ipsec for strongSwan is currently not correct. A patch has
been submitted upstream, but until it is accepted and merged, we apply a
temporary version of the patch.

This was tested for a VXLAN overlay in an IPv6-only cluster.

Fixes antrea-io#3151

Signed-off-by: Antonin Bas <abas@vmware.com>
antoninbas added a commit to antoninbas/antrea that referenced this issue Mar 17, 2022
When using IPv6, the IPsec configuration (ipsec.conf) generated by
ovs-monitor-ipsec for strongSwan is currently not correct. A patch has
been submitted upstream, but until it is accepted and merged, we apply a
temporary version of the patch.

This was tested for a VXLAN overlay in an IPv6-only cluster.

Fixes antrea-io#3151

Signed-off-by: Antonin Bas <abas@vmware.com>
antoninbas added a commit that referenced this issue Mar 18, 2022
When using IPv6, the IPsec configuration (ipsec.conf) generated by
ovs-monitor-ipsec for strongSwan is currently not correct. A patch has
been submitted upstream, but until it is accepted and merged, we apply a
temporary version of the patch.

This was tested for a VXLAN overlay in an IPv6-only cluster.

Fixes #3151

Signed-off-by: Antonin Bas <abas@vmware.com>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
area/transit/encryption Issues or PRs related to transit encryption (IPSec, SSL). area/transit/ipv6 Issues or PRs related to IPv6. kind/bug Categorizes issue or PR as related to a bug. priority/important-longterm Important over the long term, but may not be staffed and/or may need multiple releases to complete.
Projects
None yet
Development

Successfully merging a pull request may close this issue.

1 participant