Im pretty new to openswan, running it on Ubuntu 9.10 the logs that I'm looking at dont appear to be nearly detailed enough, I must be missing something. Basically the IPSEC vpn i'm setting up and testing is failing and the logs im looking at aren't explicit enough, looking at syslogs, and auth.log (attached), IPSEC.conf included which looks fine to me. I did see a post about another set of logs under a directory called "secure" hoping to see loads of the IPSEC but cant find one Also looked in the folder called PLUTO, expecting a full log for that host address as per<br>
<br>plutodebug="all" &<br>plutoopts="--perpeerlog"<br><br> and nothing!<br><br>Anyway, HELP!<br><br>Cheers<br><br>Karl<br>London, Uk<br><br>CONFIG:<br><br># /etc/ipsec.conf - Openswan IPsec configuration file<br>
# RCSID $Id: <a href="http://ipsec.conf.in/" target="_blank">ipsec.conf.in</a>,v 1.16 2005/07/26 12:29:45 ken Exp $<br><br># This file: /usr/share/doc/openswan/ipsec.<div id=":5i" class="ii gt">conf-sample<br>
#<br># Manual: ipsec.conf.5<br><br><br>version 2.0 # conforms to second version of ipsec.conf specification<br><br># basic configuration<br>config setup<br> # Do not set debug options to debug configuration issues!<br>
interfaces="%defaultroute "<br> plutodebug="all"<br> klipsdebug="all" <br> # plutodebug / klipsdebug = "none", "none" or a combation from below:<br> # "raw crypt parsing emitting control klips pfkey natt x509 dpd private"<br>
# eg:<br> # plutodebug="control parsing"<br> #<br> # enable to get logs per-peer<br> plutoopts="--perpeerlog"<br> #<br> # Again: only enable plutodebug or klipsdebug when asked by a developer<br>
#<br> # NAT-TRAVERSAL support, see README.NAT-Traversal<br> nat_traversal=yes<br> # exclude networks used on server side by adding %v4:!a.b.c.0/24<br> virtual_private=%v4:<a href="http://10.0.0.0/8,%v4:172.16.0.0/12,%v4:192.168.0.0/16,%4%3A%21192.168.1.0/255.255.255.0" target="_blank">10.0.0.0/8,%v4:172.16.0.0/12,%v4:192.168.0.0/16,%4:!192.168.1.0/255.255.255.0</a><br>
# OE is now off by default. Uncomment and change to on, to enable.<br> oe=off<br> # which IPsec stack to use. netkey,klips,mast,auto or none<br> protostack=auto<br> uniqueids=yes<br> <br><br>conn %default<br>
keyingtries=0<br> disablearrivalcheck=no<br>
<br><br>conn secnet<br> left=192.168.15.120<br> leftnexthop=%defaultroute<br> leftsubnet=<a href="http://192.168.1.0/255.255.255.0" target="_blank">192.168.1.0/255.255.255.0</a><br> right=172.16.1.1<br> ike=aes256-md5-modp1024!<br>
esp=aes256-md5!<br> phase2=ESP <br> ikelifetime=1h<br> keylife=8h<br> aggrmode=yes<br> dpddelay=30<br> dpdtimeout=120<br> dpdaction=clear<br> pfs=yes<br> authby=secret<br> auto=add</div>
<br>auth.log attached<br>