[Openswan Users] Can't ping peer after connection...

Paul Wouters paul at xelerance.com
Thu Jan 1 19:53:48 EST 2009


On Tue, 30 Dec 2008, Dan Brown wrote:

run ipsec barf on both ends and fix any potential warnings. check you're
not NAT'ing ipsec packets by accident.

Paul

> So yesterday we got our IPSec connection up for a little while after some
> troubleshooting.  A couple of hours later with no changes on either end the
> connection failed to renegotiate and could not properly reconnect.  During
> the period of a successful connection, I could ping the peer, but I couldn't
> connect to the server on the other side of the VPN gateway.  An nmap said
> the internal server was down (regardless of port).  
> 
> We were thinking the problem may have been with the firewalling on the
> internal server.  Now I am not so sure.  
> 
> If I start a ping, then bring up the connection, the responses stop.  I
> could never ping or see an open port on the internal server so perhaps two
> one-sided tunnels were actually created from the other side.
> 
> This is what ipsec whack --status shows for this connection:
> 
> 000 "g2c-p":
> 209.167.162.84/32===209.167.162.84...207.236.235.99===199.43.146.0/24;
> erouted; eroute owner: #3
> 000 "g2c-p":     srcip=unset; dstip=unset; srcup=ipsec _updown; dstup=ipsec
> _updown;
> 000 "g2c-p":   ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s;
> rekey_fuzz: 100%; keyingtries: 0
> 000 "g2c-p":   policy: PSK+ENCRYPT+TUNNEL+PFS+UP; prio: 32,24; interface:
> eth0; encap: esp;
> 000 "g2c-p":   newest ISAKMP SA: #1; newest IPsec SA: #3; 
> 000 "g2c-p":   IKE algorithms wanted: 3DES_CBC(5)_000-SHA1(2)-MODP1536(5),
> 3DES_CBC(5)_000-SHA1(2)-MODP1024(2); flags=strict
> 000 "g2c-p":   IKE algorithms found:
> 3DES_CBC(5)_192-SHA1(2)_002-MODP1536(5),
> 3DES_CBC(5)_192-SHA1(2)_002-MODP1024(2)
> 000 "g2c-p":   IKE algorithm newest: 3DES_CBC_192-SHA1-MODP1024
> 000 "g2c-p":   ESP algorithms wanted: AES(12)_128-SHA1(2),
> 3DES(3)_000-SHA1(2); flags=strict
> 000 "g2c-p":   ESP algorithms loaded: AES(12)_128-SHA1(2),
> 3DES(3)_000-SHA1(2); flags=strict
> 000 "g2c-p":   ESP algorithm newest: 3DES_0-HMAC_SHA1; pfsgroup=<Phase1>
> 000  
> 000 #3: "g2c-p":500 STATE_QUICK_I2 (sent QI2, IPsec SA established);
> EVENT_SA_REPLACE in 27211s; newest IPSEC; eroute owner
> 000 #3: "g2c-p" esp.79e8e525 at 207.236.235.99 esp.e6dcb67b at 209.167.162.84
> tun.0 at 207.236.235.99 tun.0 at 209.167.162.84
> 000 #2: "g2c-p":500 STATE_QUICK_I2 (sent QI2, IPsec SA established);
> EVENT_SA_REPLACE in 26516s
> 000 #2: "g2c-p" esp.8bbfd32c at 207.236.235.99 esp.f5f4af97 at 209.167.162.84
> tun.0 at 207.236.235.99 tun.0 at 209.167.162.84
> 000 #1: "g2c-p":500 STATE_MAIN_I4 (ISAKMP SA established); EVENT_SA_REPLACE
> in 1229s; newest ISAKMP; lastdpd=2s(seq in:0 out:0)
> 000  
> 
> 
> To me this looks like two one sided connections.  Should I be able to ping
> the peer after the tunnel starts?
> 
> ---------------
> Dan Brown
> danb at zu.com
> 
> 
> 
> _______________________________________________
> Users at openswan.org
> http://lists.openswan.org/mailman/listinfo/users
> Building and Integrating Virtual Private Networks with Openswan: 
> http://www.amazon.com/gp/product/1904811256/104-3099591-2946327?n=283155
> 


More information about the Users mailing list