[Openswan Users] Problem setting up tunnel between openswan 2.6.48 and cisco asa 5505

Wiegmann Sebastian S.Wiegmann at ads-tec.de
Tue Dec 5 06:42:14 EST 2017


Hi,
while im trying to set up a tunnel between my embedded router with openswan and a cisco asa.
I get the error that "we cannot identify ourselves with either end of this connection".

It would be kind if you can give me a hint.

Thanks Sebastian

ipsec_setup: Starting Openswan IPsec 2.6.48...
ipsec_setup: LAN (IPsec) -> NULL mtu=0(0) -> 0
pluto[9995]: ike_alg_register_enc(): Activating OAKLEY_TWOFISH_CBC_SSH: Ok (ret=0)
pluto[9995]: ike_alg_register_enc(): Activating OAKLEY_TWOFISH_CBC: Ok (ret=0)
pluto[9995]: ike_alg_register_enc(): Activating OAKLEY_SERPENT_CBC: Ok (ret=0)
pluto[9995]: ike_alg_register_enc(): Activating OAKLEY_AES_CBC: Ok (ret=0)
pluto[9995]: ike_alg_register_enc(): Activating OAKLEY_BLOWFISH_CBC: Ok (ret=0)
pluto[9995]: ike_alg_register_hash(): Activating OAKLEY_SHA2_512: Ok (ret=0)
pluto[9995]: ike_alg_register_hash(): Activating OAKLEY_SHA2_256: Ok (ret=0)
pluto[9995]: starting up 1 cryptographic helpers
pluto[9995]: adding connection: "technet-ciscoasa"
ipsec__plutorun: 002 adding connection: "technet-ciscoasa"
pluto[9995]: listening for IKE messages
pluto[9995]: adding interface LAN (IPsec)/LAN 192.168.2.110:500
pluto[9995]: loading secrets from "/etc/ipsec.secrets"
ipsec__plutorun: 002 listening for IKE messages
ipsec__plutorun: 002 adding interface LAN (IPsec)/LAN 192.168.2.110:500
ipsec__plutorun: 002 loading secrets from "/etc/ipsec.secrets"
ipsec__plutorun: 022 "technet-ciscoasa": we cannot identify ourselves with either end of this connection
ipsec__plutorun: ...could not route conn "technet-ciscoasa"
pluto[9995]: "technet-ciscoasa": We cannot identify ourselves with either end of this connection.
ipsec__plutorun: 022 "technet-ciscoasa": We cannot identify ourselves with either end of this connection.


ifconfig
------------
br0       Link encap:Ethernet  HWaddr 00:18:92:06:C5:8E
          inet addr:192.168.2.110  Bcast:192.168.2.255  Mask:255.255.255.0
          UP BROADCAST RUNNING MULTICAST  MTU:1500  Metric:1
          RX packets:27174 errors:0 dropped:0 overruns:0 frame:0
          TX packets:18128 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:0
          RX bytes:2304088 (2.1 MiB)  TX bytes:6952011 (6.6 MiB)

eth0      Link encap:Ethernet  HWaddr 00:18:92:06:C5:8E
          UP BROADCAST RUNNING MULTICAST  MTU:1500  Metric:1
          RX packets:30365 errors:0 dropped:0 overruns:0 frame:0
          TX packets:18126 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:1000
          RX bytes:3756178 (3.5 MiB)  TX bytes:6950956 (6.6 MiB)
          Base address:0x8000

eth1      Link encap:Ethernet  HWaddr 00:18:92:06:C5:8F
          inet addr:10.0.0.2  Bcast:10.0.0.255  Mask:255.255.255.0
          UP BROADCAST RUNNING MULTICAST  MTU:1500  Metric:1
          RX packets:883 errors:0 dropped:0 overruns:0 frame:0
          TX packets:4266 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:1000
          RX bytes:93032 (90.8 KiB)  TX bytes:437300 (427.0 KiB)

ipsec0    Link encap:Ethernet  HWaddr 00:18:92:06:C5:8E
          inet addr:192.168.2.110  Mask:255.255.255.255
          UP RUNNING NOARP  MTU:1500  Metric:1
          RX packets:0 errors:0 dropped:0 overruns:0 frame:0
          TX packets:0 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:10
          RX bytes:0 (0.0 B)  TX bytes:0 (0.0 B)

lo        Link encap:Local Loopback
          inet addr:127.0.0.1  Mask:255.0.0.0
          UP LOOPBACK RUNNING  MTU:16436  Metric:1
          RX packets:1297 errors:0 dropped:0 overruns:0 frame:0
          TX packets:1297 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:0
          RX bytes:429158 (419.0 KiB)  TX bytes:429158 (419.0 KiB)
###############

ipsec.conf
------------
version 2

config setup
  protostack=klips
  nat_traversal=yes
  plutodebug="crypt parsing emitting control klips"
  virtual_private=%v4:192.168.2.0/24,%v4:192.168.1.0/24

conn %default
  authby=secret
  esp=aes128-sha1
  ike=aes128-sha1;modp1024
  pfs=no
  aggrmode=no
  type=tunnel

conn technet-ciscoasa
  left=10.0.0.2
  leftid=10.0.0.2
  leftsubnet=192.168.2.0/24
  right=10.0.0.1
  rightid=10.0.0.1
  rightsubnet=192.168.1.0/24
  auto=start
#######################

ipsec.secrets
------------
10.0.0.2 10.0.0.1 : PSK 'technet'

#######################

~ # ipsec whack --status
------------
000 using kernel interface: klips
000 interface ipsec0/br0 192.168.2.110 (AF_INET)
000 %myid = (none)
000 debug none
000
000 virtual_private (%priv):
000 - allowed 0 subnets:
000 - disallowed 0 subnets:
000 WARNING: Either virtual_private= is not specified, or there is a syntax
000          error in that line. 'left/rightsubnet=vhost:%priv' will not work!
000 WARNING: Disallowed subnets in virtual_private= is empty. If you have
000          private address space in internal use, it should be excluded!
000
000 algorithm ESP encrypt: id=3, name=ESP_3DES, ivlen=64, keysizemin=192, keysizemax=192
000 algorithm ESP encrypt: id=12, name=ESP_AES, ivlen=128, keysizemin=128, keysizemax=256
000 algorithm ESP auth attr: id=1, name=AUTH_ALGORITHM_HMAC_MD5, keysizemin=128, keysizemax=128
000 algorithm ESP auth attr: id=2, name=AUTH_ALGORITHM_HMAC_SHA1, keysizemin=160, keysizemax=160
000
000 algorithm IKE encrypt: id=3, name=OAKLEY_BLOWFISH_CBC, blocksize=8, keydeflen=128
000 algorithm IKE encrypt: id=5, name=OAKLEY_3DES_CBC, blocksize=8, keydeflen=192
000 algorithm IKE encrypt: id=7, name=OAKLEY_AES_CBC, blocksize=16, keydeflen=128
000 algorithm IKE encrypt: id=65004, name=OAKLEY_SERPENT_CBC, blocksize=16, keydeflen=128
000 algorithm IKE encrypt: id=65005, name=OAKLEY_TWOFISH_CBC, blocksize=16, keydeflen=128
000 algorithm IKE encrypt: id=65289, name=OAKLEY_TWOFISH_CBC_SSH, blocksize=16, keydeflen=128
000 algorithm IKE hash: id=1, name=OAKLEY_MD5, hashsize=16
000 algorithm IKE hash: id=2, name=OAKLEY_SHA1, hashsize=20
000 algorithm IKE hash: id=4, name=OAKLEY_SHA2_256, hashsize=32
000 algorithm IKE hash: id=6, name=OAKLEY_SHA2_512, hashsize=64
000 algorithm IKE dh group: id=2, name=OAKLEY_GROUP_MODP1024, bits=1024
000 algorithm IKE dh group: id=5, name=OAKLEY_GROUP_MODP1536, bits=1536
000 algorithm IKE dh group: id=14, name=OAKLEY_GROUP_MODP2048, bits=2048
000 algorithm IKE dh group: id=15, name=OAKLEY_GROUP_MODP3072, bits=3072
000 algorithm IKE dh group: id=16, name=OAKLEY_GROUP_MODP4096, bits=4096
000 algorithm IKE dh group: id=17, name=OAKLEY_GROUP_MODP6144, bits=6144
000 algorithm IKE dh group: id=18, name=OAKLEY_GROUP_MODP8192, bits=8192
000 algorithm IKE dh group: id=22, name=OAKLEY_GROUP_DH22, bits=1024
000 algorithm IKE dh group: id=23, name=OAKLEY_GROUP_DH23, bits=2048
000 algorithm IKE dh group: id=24, name=OAKLEY_GROUP_DH24, bits=2048
000
000 stats db_ops: {curr_cnt, total_cnt, maxsz} :context={0,0,0} trans={0,0,0} attrs={0,0,0}
000
000 "technet-ciscoasa": 192.168.2.0/24===10.0.0.2...10.0.0.1===192.168.1.0/24; unrouted; eroute owner: #0
000 "technet-ciscoasa":     myip=unset; hisip=unset;
000 "technet-ciscoasa":   ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0
000 "technet-ciscoasa":   policy: PSK+ENCRYPT+TUNNEL+IKEv2ALLOW+SAREFTRACK+lKOD+rKOD; prio: 24,24; interface: ; kind=CK_PERMANENT
000 "technet-ciscoasa":   newest ISAKMP SA: #0; newest IPsec SA: #0; eroute owner: #0;
000 "technet-ciscoasa":   IKE algorithms wanted: AES_CBC(7)_128-SHA1(2)_000-MODP1024(2); flags=-strict
000 "technet-ciscoasa":   IKE algorithms found:  AES_CBC(7)_128-SHA1(2)_160-MODP1024(2)
000 "technet-ciscoasa":   ESP algorithms wanted: AES(12)_128-SHA1(2)_000; flags=-strict
000 "technet-ciscoasa":   ESP algorithms loaded: AES(12)_128-SHA1(2)_160
000
000

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.openswan.org/pipermail/users/attachments/20171205/724e394c/attachment-0002.html>
-------------- next part --------------
_______________________________________________
ads-tec GmbH
Sitz: 72622 NĂ¼rtingen
Registergericht Stuttgart HRB 224527

Geschaeftsfuehrer:
Dipl.-Ing. Thomas Speidel
_______________________________________________
Diese E-Mail enthaelt vertrauliche und/oder rechtlich
geschuetzte Informationen. Wenn Sie nicht der richtige
Adressat sind oder diese E-Mail irrtuemlich erhalten
haben, informieren Sie bitte sofort den Absender und 
vernichten Sie diese E-Mail. Das unerlaubte Kopieren,
jegliche anderweitige Verwendung sowie die unbefugte
Weitergabe dieser Mail sind nicht gestattet.
_______________________________________________

This e-mail may contain confidential and/or privileged
information. If you are not the intended recipient (or have
received this e-mail in error) please notify the sender
immediately and destroy this e-mail. Any unauthorized
copying, disclosure, distribution or other use of the
material or parts thereof are strictly forbidden.
_______________________________________________
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.openswan.org/pipermail/users/attachments/20171205/724e394c/attachment-0003.html>


More information about the Users mailing list