Here is my ipsec verify.<br><br>[root@lt85 ~]# ipsec verify<br>Checking your system to see if IPsec got installed and started correctly:<br>Version check and ipsec on-path [OK]<br>Linux Openswan
U2.4.7/K2.6.18-1.2798.fc6 (netkey)<br>Checking for IPsec support in kernel [OK]<br>Testing against enforced SElinux mode [OK]<br>Hardware RNG detected, testing if used properly [FAILED]
<br><br> Hardware RNG is present but 'rngd' is not running.<br> No harware random used!<br><br>NETKEY detected, testing for disabled ICMP send_redirects [OK]<br>NETKEY detected, testing for disabled ICMP accept_redirects [OK]
<br>Checking for RSA private key (/etc/ipsec.secrets) [OK]<br>Checking that pluto is running [OK]<br>Two or more interfaces found, checking IP forwarding [OK]<br>Checking NAT and MASQUERADEing [OK]
<br>Checking for 'ip' command [OK]<br>Checking for 'iptables' command [OK]<br><br>Opportunistic Encryption DNS checks:<br> Looking for TXT in forward dns zone:
lt85.xxxxxx.xxx [MISSING]<br> Does the machine have at least one non-private address? [FAILED]<br><br><br><br><br><div><span class="gmail_quote">On 12/7/06, <b class="gmail_sendername">Paul Wouters</b> <<a href="mailto:paul@xelerance.com">
paul@xelerance.com</a>> wrote:</span><blockquote class="gmail_quote" style="border-left: 1px solid rgb(204, 204, 204); margin: 0pt 0pt 0pt 0.8ex; padding-left: 1ex;">On Thu, 7 Dec 2006, Didine wrote:<br><br>> I try to set up a connexion between openswan (Linux Openswan
U2.4.7/K2.6.18-<br>> 1.2798.fc6 (netkey)) and a Juniper ns208.<br><br>> 004 "lt85_to_centre" #12: STATE_QUICK_I2: sent QI2, IPsec SA established<br>> {ESP=>0x7593622b <0x6859dbc5 xfrm=AES_128-HMAC_SHA1 NATD=none DPD=none}
<br><br>So the tunnel is established.<br><br>> A tcpdump shows the following (no ESP msg):<br>><br>> =====================================================================<br>> [root@lt85 ~]# tcpdump host 194.250.x.x
<br>> 19:48:37.441373 IP lt85.xxx.xxx > 194.250.x.x : ICMP echo request, id 1024,<br>> seq 55960, length 24<br><br>that's normal for netkey. The packets get encrypted after tcpdump can see<br>them. It's annoying.
<br><br>Run ipsec verify. See if you have bogus redirects, rp_filter or ip_forwarding<br>misconfigured. Checkfirewall dfor NAT rules (dont NAT ipsec packets).<br><br>Paul<br></blockquote></div><br><br clear="all"><br>-- <br>
Didine