After downloading and installing all the strongswan* packages from Entware, I run "ipsec start" and see the following errors:
# ipsec start
Starting strongSwan 5.0.4 IPsec [starter]...
insmod: 'af_key.ko': module not found
no netkey IPsec stack detected
insmod: 'ipsec.ko': module not found
no KLIPS IPsec stack detected
no known IPsec stack detected, ignoring!
So I was asking myself, Is it possible to get these two module files 'af_key.ko' and 'ipsec.ko', put them in a directory, then do a "insmod af_key.ko; insmod ipsec.ko" to load them into the Kernel, then have it work?
At this link which is for tomato firmware:
http://tomato.groov.pl/download/K26RT-N/build5x-112-EN/
there is a file called 'extras-mips2.tar.gz' which is for K26 routers like the RT-N16 I am using. So I downloaded that and extracted its contents.
It has af_key.ko in the ipsec/ directory but not ipsec.ko.
But trying to load af_key.ko has an error anyway:
admin@RT-N16:/tmp/mnt/Entware/ipsec# insmod af_key
insmod: can't insert 'af_key.ko': unknown symbol in module, or unknown parameter
Doing a dmesg shows the unknown symbols:
af_key: Unknown symbol __xfrm_policy_destroy
af_key: Unknown symbol xfrm_count_enc_supported
af_key: Unknown symbol xfrm_state_alloc
af_key: Unknown symbol xfrm_find_acq
af_key: Unknown symbol xfrm_policy_byid
af_key: Unknown symbol xfrm_state_lookup
af_key: Unknown symbol xfrm_state_add
af_key: Unknown symbol xfrm_policy_alloc
af_key: Unknown symbol xfrm_calg_get_byid
af_key: Unknown symbol xfrm_policy_bysel_ctx
af_key: Unknown symbol xfrm_count_auth_supported
af_key: Unknown symbol __xfrm_state_destroy
af_key: Unknown symbol xfrm_ealg_get_byname
af_key: Unknown symbol xfrm_unregister_km
af_key: Unknown symbol xfrm_state_flush
af_key: Unknown symbol xfrm_alloc_spi
af_key: Unknown symbol xfrm_aalg_get_byname
af_key: Unknown symbol xfrm_register_km
af_key: Unknown symbol km_state_notify
af_key: Unknown symbol xfrm_aalg_get_byid
af_key: Unknown symbol km_waitq
af_key: Unknown symbol xfrm_ealg_get_byid
af_key: Unknown symbol xfrm_policy_flush
af_key: Unknown symbol xfrm_ealg_get_byidx
af_key: Unknown symbol xfrm_cfg_mutex
af_key: Unknown symbol xfrm_policy_walk
af_key: Unknown symbol km_policy_notify
af_key: Unknown symbol xfrm_state_update
af_key: Unknown symbol xfrm_policy_insert
af_key: Unknown symbol xfrm_init_state
af_key: Unknown symbol xfrm_calg_get_byname
af_key: Unknown symbol xfrm_find_acq_byseq
af_key: Unknown symbol xfrm_probe_algs
af_key: Unknown symbol xfrm_state_delete
af_key: Unknown symbol xfrm_state_walk
af_key: Unknown symbol xfrm_aalg_get_byidx
And the other file ipsec.ko doesn't exist in the tar.gz file either.
# ipsec start
Starting strongSwan 5.0.4 IPsec [starter]...
insmod: 'af_key.ko': module not found
no netkey IPsec stack detected
insmod: 'ipsec.ko': module not found
no KLIPS IPsec stack detected
no known IPsec stack detected, ignoring!
So I was asking myself, Is it possible to get these two module files 'af_key.ko' and 'ipsec.ko', put them in a directory, then do a "insmod af_key.ko; insmod ipsec.ko" to load them into the Kernel, then have it work?
At this link which is for tomato firmware:
http://tomato.groov.pl/download/K26RT-N/build5x-112-EN/
there is a file called 'extras-mips2.tar.gz' which is for K26 routers like the RT-N16 I am using. So I downloaded that and extracted its contents.
It has af_key.ko in the ipsec/ directory but not ipsec.ko.
But trying to load af_key.ko has an error anyway:
admin@RT-N16:/tmp/mnt/Entware/ipsec# insmod af_key
insmod: can't insert 'af_key.ko': unknown symbol in module, or unknown parameter
Doing a dmesg shows the unknown symbols:
af_key: Unknown symbol __xfrm_policy_destroy
af_key: Unknown symbol xfrm_count_enc_supported
af_key: Unknown symbol xfrm_state_alloc
af_key: Unknown symbol xfrm_find_acq
af_key: Unknown symbol xfrm_policy_byid
af_key: Unknown symbol xfrm_state_lookup
af_key: Unknown symbol xfrm_state_add
af_key: Unknown symbol xfrm_policy_alloc
af_key: Unknown symbol xfrm_calg_get_byid
af_key: Unknown symbol xfrm_policy_bysel_ctx
af_key: Unknown symbol xfrm_count_auth_supported
af_key: Unknown symbol __xfrm_state_destroy
af_key: Unknown symbol xfrm_ealg_get_byname
af_key: Unknown symbol xfrm_unregister_km
af_key: Unknown symbol xfrm_state_flush
af_key: Unknown symbol xfrm_alloc_spi
af_key: Unknown symbol xfrm_aalg_get_byname
af_key: Unknown symbol xfrm_register_km
af_key: Unknown symbol km_state_notify
af_key: Unknown symbol xfrm_aalg_get_byid
af_key: Unknown symbol km_waitq
af_key: Unknown symbol xfrm_ealg_get_byid
af_key: Unknown symbol xfrm_policy_flush
af_key: Unknown symbol xfrm_ealg_get_byidx
af_key: Unknown symbol xfrm_cfg_mutex
af_key: Unknown symbol xfrm_policy_walk
af_key: Unknown symbol km_policy_notify
af_key: Unknown symbol xfrm_state_update
af_key: Unknown symbol xfrm_policy_insert
af_key: Unknown symbol xfrm_init_state
af_key: Unknown symbol xfrm_calg_get_byname
af_key: Unknown symbol xfrm_find_acq_byseq
af_key: Unknown symbol xfrm_probe_algs
af_key: Unknown symbol xfrm_state_delete
af_key: Unknown symbol xfrm_state_walk
af_key: Unknown symbol xfrm_aalg_get_byidx
And the other file ipsec.ko doesn't exist in the tar.gz file either.