Common problems
Problem | Symptom | Cause/response |
---|---|---|
Cannot send or receive packets on UDP ports 500 or 4500 | Message EZD1065I
was issued. When filter logging is active, message EZD0815I is issued, showing packets to UDP port 500 or UDP port 4500 that were denied. |
The IKE daemon communicates using UDP ports
500 and 4500 for IPv4. The IKE daemon communicates using UDP port
500 for IPv6. See Steps for verifying IP routing to a destination when not using policy-based routing to verify
that the IKE daemon is running and bound to ports 500 and 4500. A filter rule must be configured to permit inbound UDP traffic from any source port to destination ports 500 and 4500. A filter rule must be configured to permit outbound UDP traffic from source ports 500 and 4500 to any destination port. Use the ipsec -f display command to confirm there is a filter rule installed in the stack that permits receiving traffic from any source UDP port to destination UDP ports 500 and 4500. Also confirm that there is a filter rule that permits receiving traffic from source UDP ports 500 and 4500 to any destination port. Activate filter logging for these rules so that you can observe packets sent on source ports 500 and 4500 and received on destination ports 500 and 4500 in the syslog. For information about the ipsec command, see z/OS Communications Server: IP System Administrator's Commands. See z/OS Communications Server: IP Configuration Guide for general information about configuring IP filters. |
Pre-shared key mismatch | Message EZD0965I was issued. | If IKE is using pre-shared key mode authentication
and it cannot interpret a decrypted message that it has received,
then message EZD0965I is issued, indicating a likely pre-shared key
mismatch. In main mode, the responder gets the message upon receipt
of message 5. In aggressive mode, the initiator gets the message upon
receipt of message 2. EZD0965I can also be issued if IKE receives
a corrupted message even though the pre-shared keys match. If the
remote peer cannot decrypt the message that was sent by IKE because
of a pre-shared key mismatch, the local symptom is that IKE retransmits
the first encrypted message of the exchange. Review the pre-shared
key configuration on the local and remote system and ensure that the
keys match. Tip: The keys might be represented differently
(for example, ASCII or EBCDIC) on the local and remote system.
|
Failure accessing local certificate repository | One of the following messages was issued:
|
For the IKE daemon to support RSA signature mode authentication using a local certificate repository, the daemon must be able to access certificates on the SAF key ring. IKE issues message EZD0990I to indicate that RSA signature mode is supported or EZD1030I if RSA signature mode is not supported for a given stack using the key ring. See the messages to determine the appropriate response. The key ring is specified on the KeyRing parameter in the IkeConfig statement. When configuring with the IBM® Configuration Assistant for z/OS® Communications Server GUI, the key ring is specified on the key ring database field on the IPSec: IKE Daemon Settings panel. |
Failure accessing the network security services (NSS) server | One of the following messages was issued:
|
For the IKE daemon to support digital signature
mode authentication using IPsec certificate services, it must be able
to connect to a network security server. IKE issues the following
messages:
For the IKE daemon to support digital signature mode authentication for IKEv2 security association activation, IPSec certificate services must be provided by a z/OS V1R12 or later NSS server. If the IKE daemon is not connected to an NSS server, or it is not configured for certificate services, or the NSS is not V1R12 or later, EZD1905 is issued for each IKEv2 SA activation attempt that requires digital signature mode authentication. The network security services server is specified on the NetworkSecurityServer and NetworkSecurityServerBackup parameters on the IkeConfig statement. When configuring with the IBM Configuration Assistant for z/OS Communications Server GUI, the network security server is specified on the server setting in the NSS perspective. |
RSA signature authentication failure - missing certificate in the local certificate repository | Message EZD1037I was issued. | Check the syslog to determine whether message
EZD1037I was issued. If the IKE daemon cannot locate a certificate
that is needed for RSA signature mode authentication, message EZD1037I
is issued.
|
RSA signature authentication failure because of identity mismatch | One of the following messages was issued:
|
Check the syslog to determine whether message EZD0981I or EZD1075I was issued. If the identity that is contained within a received certificate does not match the identity that is configured on the RemoteSecurityEndPoint statement, message EZD0981I is issued. If the peer detects such a mismatch, it might send an "Invalid ID information" notification. If IKE receives such a notification, message EZD1075I is issued. See the messages to determine the appropriate response. |
RSA signature authentication failure because of a local certificate verification or authentication failure | One of the following messages was issued:
|
Check the syslog to determine whether message
EZD0902I or EZD0903I was issued. If the certificate that is received
from a peer cannot be verified, message EZD0902I is issued. If the
certificate that is received from the peer cannot be authenticated,
message EZD0903I is issued. See the messages to determine the appropriate response. Activate IkeSyslogLevel 64 to get additional diagnostic information that relates to RSA signature mode authentication. The IKE daemon syslog level is set in the IkeSyslogLevel parameter in the IkeConfig statement. When configuring with the IBM Configuration Assistant for z/OS Communications Server GUI, the IKE Daemon Syslog settings are accessed from the IPSec: IKE Daemon Settings panel. IKE maintains a separate cache for Certificate Authority (CA) certificates and security endpoint certificates. When IkeSyslogLevel 64 is active, the contents of the certificate caches are displayed when they are built or rebuilt. See z/OS Communications Server: IP Configuration Reference for information about setting the IkeSyslogLevel, or see the online help in the IBM Configuration Assistant for z/OS Communications Server. Tip: The name of the key
ring is case-sensitive.
|
RSA signature authentication failure - IPsec certificate services failure | Message EZD1139I was issued. | Check the syslog to determine whether message
EZD1139I was issued. The EZD1139I message will be issued if the network security server failed to locate a certificate, could not verify a digital signature, or could not create a digital signature for RSA signature mode authentication. See the messages to determine the appropriate response. |
Failure to locate phase 1 policy | Message EZD0917I was issued. | In order for IKE to establish a phase 1
SA, it must first locate an applicable phase 1 policy. KeyExchangeRules encapsulate phase 1 policy for IKE. KeyExchangeRules are classified according to a 4-tuple that is comprised of LocalSecurityEndpoint Location, LocalSecurityEndpoint Identity, RemoteSecurityEndpoint Location, and RemoteSecurityEndpoint Identity. When IKE needs to locate a KeyExchangeRule statement, it performs a search of the configured KeyExchangeRules statements, supplying specific values or Any for each parameter of the classification 4-tuple. When configuring
with the IBM Configuration Assistant
for z/OS Communications Server
the following are configured in each Connectivity Rule:
If IKE fails to locate an applicable KeyExchangeRule statement, message EZD0917I is issued that lists the classification 4-tuple. Use the pasearch -v k -r command to review the configured KeyExchangeRules statement. If there is no KeyExchangeRule statement that corresponds to the classification 4-tuple that is given on the EZD0917I message, configure a new KeyExchangeRule statement as needed. See the messages for EZD0917I for more information. |
IKE version mismatch | Message EZD1753I was issued. | The IKE daemon sent an IKEv2 initiation request to an IKEv1 peer, and it responded with an IKEv1 message, probably a rejection of the request. The local policy must have HowToInitiate IKEv2, but the peer does not support IKEv2. Change the value on HowToInitiate to Main or Aggressive, to cause the IKE daemon to use IKEv1 flows for tunnel initiation. Alternatively, have the peer IKE node initiate the tunnel. z/OS IKED accepts either IKEv1 or IKEv2 initiation requests, as long as the other attributes being negotiated are properly configured. |
Phase 1 policy mismatch | Message EZD1093I or EZD1075I was issued. | The ISAKMP initiator and responder must
agree on phase 1 policy to successfully complete negotiation of a
phase 1 security association. If the IKE daemon rejects the phase
1 policy that is proposed by an ISAKMP peer, it issues message EZD1021I,
which indicates the KeyExchangeRule and KeyExchangeAction statements
that were in effect when the mismatch occurred. Message EZD1093I
is issued, which indicates why the mismatch occurred. When configuring with the IBM Configuration Assistant for z/OS Communications Server, the Key Exchange Settings are set in each Connectivity Rule. If the IKE daemon proposes phase 1 policy that the ISAKMP peer rejects, the ISAKMP peer should send a notification message to the IKE daemon. If the IKE daemon receives such a notification, it issues message EZD1075I. For more information, see the EZD1075I message documentation in z/OS Communications Server: IP Messages Volume 2 (EZB, EZD). If the peer is a z/OS IKE daemon, it issues the EZD1021I and EZD1093I messages as described above. If the peer is not a z/OS IKE daemon, consult the documentation for the ISAKMP peer product to determine why it rejected the proposal. In the case of a mismatch, a No proposal chosen notification is expected from the peer. |
Failure to locate phase 2 policy | Message EZD1795I was issued | In order for IKE to establish a phase 2
SA, it must first locate an applicable phase 2 policy. Phase 2 policy
for the IKE daemon is comprised of IpFilterRule and IpDynVpnAction
statements. The first step in locating a phase 2 policy for the IKE
daemon is to locate an IpFilterRule statement that matches the traffic
to be protected and includes a reference to an IpDynVpnAction statement.
If IKE cannot find an applicable IpFilterRule statement, message
EZD1795I is issued, which indicates the traffic that was to be protected.
When configuring with the IBM Configuration Assistant for z/OS Communications Server, the Connectivity Rules are used to locate the phase 2 policies. The Connectivity Rules contain the local and remote data end points, and which type of traffic is protected by Security Levels implementing dynamic tunnels. See the messages to determine the appropriate response. See Steps for verifying IP security and defensive filter operation, supplying the IP traffic characteristics identified on the EZD1795I message. |
Phase 2 policy mismatch | Message EZD1022I, EZD1093I, or EZD1075I was issued. | The ISAKMP initiator and responder must
agree on phase 2 policy to successfully complete negotiation of a
phase 2 security association. If the IKE daemon rejects the phase
2 policy that is proposed by an ISAKMP peer, it issues message EZD1022I,
which indicates the IpFilterRule and IpDynVpnAction statements that
were applied. When configuring with the IBM Configuration Assistant for z/OS Communications Server, the Connectivity Rules are used
to locate the phase 2 policies. The Connectivity Rules contain the
local and remote data end points, and which type of traffic is protected
by Security Levels implementing dynamic tunnels. Message EZD1093I
is issued indicating why the mismatch occurred. Check the syslog to determine whether message EZD1075I was issued. If the IKE daemon proposes a phase 2 policy that the ISAKMP peer rejects, the ISAKMP peer should send a notification message to the IKE daemon. If the IKE daemon receives such a notification, it issues message EZD1075I. Review the diagnostic data at the ISAKMP peer to determine why the peer rejected the proposal. See the EZD1075I message documentation for more information. In the case of a mismatch, a No proposal chosen notification is expected from the peer. |
AES encryption/decryption failure | Message EZD0918 or EZD1109 was issued. | If IKE is using AES for phase1 or phase2
encryption and decryption, it calls Integrated Cryptographic Service
Facility (ICSF) to do the actual cryptography. If ICSF has not been
started the cryptography cannot be performed, and IKE cannot encrypt
or decrypt messages using AES. This can happen any time during an
informational exchange, any time during a phase 2 exchange, in message
5 of main mode if acting as the initiator, or in message 6 of main
mode if acting as the responder. The return and reason codes for an ICSF failure are output in message EZD0918 (encryption) or message EZD1109 (decryption). If the return code is C(12) and the reason code is 0, this normally means that ICSF has not been started and therefore cannot perform the necessary cryptography. Ensure that ICSF is started so that the IKE daemon can perform AES cryptography. If the return code is C(12) and the reason code is 8, this normally means that the installed version of ICSF does not support AES. The Security Level Feature of ICSF is required (FMID HCR7706 or higher) for AES support. |