<html xmlns:v="urn:schemas-microsoft-com:vml" xmlns:o="urn:schemas-microsoft-com:office:office" xmlns:w="urn:schemas-microsoft-com:office:word" xmlns:m="http://schemas.microsoft.com/office/2004/12/omml" xmlns="http://www.w3.org/TR/REC-html40">
<head>
<meta http-equiv=Content-Type content="text/html; charset=us-ascii">
<meta name=Generator content="Microsoft Word 12 (filtered medium)">
<style>
<!--
/* Font Definitions */
@font-face
{font-family:"Cambria Math";
panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
{font-family:Calibri;
panose-1:2 15 5 2 2 2 4 3 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
{margin:0in;
margin-bottom:.0001pt;
font-size:11.0pt;
font-family:"Calibri","sans-serif";}
a:link, span.MsoHyperlink
{mso-style-priority:99;
color:blue;
text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
{mso-style-priority:99;
color:purple;
text-decoration:underline;}
span.E-mailStijl17
{mso-style-type:personal-compose;
font-family:"Calibri","sans-serif";
color:windowtext;}
.MsoChpDefault
{mso-style-type:export-only;}
@page Section1
{size:8.5in 11.0in;
margin:1.0in 1.0in 1.0in 1.0in;}
div.Section1
{page:Section1;}
-->
</style>
<!--[if gte mso 9]><xml>
<o:shapedefaults v:ext="edit" spidmax="1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext="edit">
<o:idmap v:ext="edit" data="1" />
</o:shapelayout></xml><![endif]-->
</head>
<body lang=EN-US link=blue vlink=purple>
<div class=Section1>
<p class=MsoNormal>Hi all,<o:p></o:p></p>
<p class=MsoNormal><o:p> </o:p></p>
<p class=MsoNormal>I am having issues when I want to connect two of my Windows
7 clients which are behind the same public IP (NAT) to an OpenSwan VPN server.<o:p></o:p></p>
<p class=MsoNormal>Only one may connect, successfully, the others who follow
cannot connect.<o:p></o:p></p>
<p class=MsoNormal>The logging displays the following: cannot install eroute --
it is in use for "L2TP-PSK-noNAT"[2] 62.45.xxx.xxx #2<o:p></o:p></p>
<p class=MsoNormal><o:p> </o:p></p>
<p class=MsoNormal>Below is my config and logging. <o:p></o:p></p>
<p class=MsoNormal>So the problem is very clear, but the root-cause is not, at least
not to me.<o:p></o:p></p>
<p class=MsoNormal>I have searched the internet for days and days, and I
noticed that more people have the same issue, however, I never found a solution
or some clear documentation for what is causing this.<o:p></o:p></p>
<p class=MsoNormal>I have pasted the relevant config files (i.m.o.) but if
someone needs more info I will be more than happy to supply this info.<o:p></o:p></p>
<p class=MsoNormal>Which parameters are responsible for allowing multiple VPN
connections from the same IP?<o:p></o:p></p>
<p class=MsoNormal>I am really hoping someone can help me with this one.<o:p></o:p></p>
<p class=MsoNormal><o:p> </o:p></p>
<p class=MsoNormal>ipsec.conf:<o:p></o:p></p>
<p class=MsoNormal>config setup<o:p></o:p></p>
<p class=MsoNormal>
dumpdir=/var/run/pluto/<o:p></o:p></p>
<p class=MsoNormal> #in what
directory should things started by setup (notably the Pluto daemon) be allowed
to dump core?<o:p></o:p></p>
<p class=MsoNormal> nat_traversal=yes<o:p></o:p></p>
<p class=MsoNormal> #whether to
accept/offer to support NAT (NAPT, also known as "IP Masqurade")workaround
for IPsec<o:p></o:p></p>
<p class=MsoNormal>
virtual_private=%v4:10.0.0.0/8<o:p></o:p></p>
<p class=MsoNormal> #contains the
networks that are allowed as subnet= for the remote client. In other words, the
address ranges that may live behind a NAT router through which a client
connects.<o:p></o:p></p>
<p class=MsoNormal> protostack=netkey<o:p></o:p></p>
<p class=MsoNormal> #decide which
protocol stack is going to be used.<o:p></o:p></p>
<p class=MsoNormal>
force_keepalive=yes<o:p></o:p></p>
<p class=MsoNormal> keep_alive=60<o:p></o:p></p>
<p class=MsoNormal> # Send a
keep-alive packet every 60 seconds.<o:p></o:p></p>
<p class=MsoNormal><o:p> </o:p></p>
<p class=MsoNormal>conn L2TP-PSK-noNAT<o:p></o:p></p>
<p class=MsoNormal> authby=secret<o:p></o:p></p>
<p class=MsoNormal> #shared secret.
Use rsasig for certificates.<o:p></o:p></p>
<p class=MsoNormal> pfs=no<o:p></o:p></p>
<p class=MsoNormal> #Disable pfs<o:p></o:p></p>
<p class=MsoNormal> auto=add<o:p></o:p></p>
<p class=MsoNormal> #the ipsec tunnel
should be started and routes created when the ipsec daemon itself starts.<o:p></o:p></p>
<p class=MsoNormal> keyingtries=3<o:p></o:p></p>
<p class=MsoNormal> #Only negotiate a
conn. 3 times.<o:p></o:p></p>
<p class=MsoNormal> ikelifetime=8h<o:p></o:p></p>
<p class=MsoNormal> keylife=1h<o:p></o:p></p>
<p class=MsoNormal>
ike=aes256-sha1,aes128-sha1,3des-sha1<o:p></o:p></p>
<p class=MsoNormal>
phase2alg=aes256-sha1,aes128-sha1,3des-sha1<o:p></o:p></p>
<p class=MsoNormal> #
https://lists.openswan.org/pipermail/users/2014-April/022947.html<o:p></o:p></p>
<p class=MsoNormal> type=transport #
also tried this in tunnel mode, doesn't change anything<o:p></o:p></p>
<p class=MsoNormal> #because we use
l2tp as tunnel protocol<o:p></o:p></p>
<p class=MsoNormal>
left=141.138.xxx.xxx<o:p></o:p></p>
<p class=MsoNormal> #fill in server
IP above<o:p></o:p></p>
<p class=MsoNormal>
leftprotoport=17/%any<o:p></o:p></p>
<p class=MsoNormal> right=%any<o:p></o:p></p>
<p class=MsoNormal>
rightprotoport=17/%any<o:p></o:p></p>
<p class=MsoNormal> #dpddelay=10<o:p></o:p></p>
<p class=MsoNormal> # Dead Peer
Dectection (RFC 3706) keepalives delay<o:p></o:p></p>
<p class=MsoNormal> #dpdtimeout=20<o:p></o:p></p>
<p class=MsoNormal> # length of time
(in seconds) we will idle without hearing either an R_U_THERE poll from our
peer, or an R_U_THERE_ACK reply.<o:p></o:p></p>
<p class=MsoNormal> #dpdaction=clear<o:p></o:p></p>
<p class=MsoNormal> # When a DPD
enabled peer is declared dead, what action should be taken. clear means the
eroute and SA with both be cleared.<o:p></o:p></p>
<p class=MsoNormal> #aggrmode=yes<o:p></o:p></p>
<p class=MsoNormal> ikev2=propose<o:p></o:p></p>
<p class=MsoNormal><o:p> </o:p></p>
<p class=MsoNormal>Logging:<o:p></o:p></p>
<p class=MsoNormal>Oct 05 15:49:04 vpn1 pluto[13486]:
"L2TP-PSK-noNAT"[2] 62.45.xxx.xxx #3: enabling possible NAT-traversal
with method RFC 3947 (NAT-Traversal)<o:p></o:p></p>
<p class=MsoNormal>Oct 05 15:49:04 vpn1 pluto[13486]:
"L2TP-PSK-noNAT"[2] 62.45.xxx.xxx #3: responding to Main Mode from
unknown peer 62.45.xxx.xxx<o:p></o:p></p>
<p class=MsoNormal>Oct 05 15:49:04 vpn1 pluto[13486]:
"L2TP-PSK-noNAT"[2] 62.45.xxx.xxx #3: OAKLEY_GROUP 20 not
supported. Attribute OAKLEY_GROUP_DESCRIPTION<o:p></o:p></p>
<p class=MsoNormal>Oct 05 15:49:04 vpn1 pluto[13486]:
"L2TP-PSK-noNAT"[2] 62.45.xxx.xxx #3: OAKLEY_GROUP 19 not
supported. Attribute OAKLEY_GROUP_DESCRIPTION<o:p></o:p></p>
<p class=MsoNormal>Oct 05 15:49:04 vpn1 pluto[13486]:
"L2TP-PSK-noNAT"[2] 62.45.xxx.xxx #3: transition from state STATE_MAIN_R0
to state STATE_MAIN_R1<o:p></o:p></p>
<p class=MsoNormal>Oct 05 15:49:04 vpn1 pluto[13486]:
"L2TP-PSK-noNAT"[2] 62.45.xxx.xxx #3: STATE_MAIN_R1: sent MR1,
expecting MI2<o:p></o:p></p>
<p class=MsoNormal>Oct 05 15:49:04 vpn1 pluto[13486]:
"L2TP-PSK-noNAT"[2] 62.45.xxx.xxx #3: NAT-Traversal: Result using RFC
3947 (NAT-Traversal) sender port 3: peer behind NAT<o:p></o:p></p>
<p class=MsoNormal>Oct 05 15:49:04 vpn1 pluto[13486]:
"L2TP-PSK-noNAT"[2] 62.45.xxx.xxx #3: transition from state
STATE_MAIN_R1 to state STATE_MAIN_R2<o:p></o:p></p>
<p class=MsoNormal>Oct 05 15:49:04 vpn1 pluto[13486]:
"L2TP-PSK-noNAT"[2] 62.45.xxx.xxx #3: STATE_MAIN_R2: sent MR2,
expecting MI3<o:p></o:p></p>
<p class=MsoNormal>Oct 05 15:49:04 vpn1 pluto[13486]:
"L2TP-PSK-noNAT"[2] 62.45.xxx.xxx #3: Main mode peer ID is
ID_IPV4_ADDR: '192.168.0.105'<o:p></o:p></p>
<p class=MsoNormal>Oct 05 15:49:04 vpn1 pluto[13486]:
"L2TP-PSK-noNAT"[2] 62.45.xxx.xxx #3: switched from
"L2TP-PSK-noNAT" to "L2TP-PSK-noNAT"<o:p></o:p></p>
<p class=MsoNormal>Oct 05 15:49:04 vpn1 pluto[13486]:
"L2TP-PSK-noNAT"[3] 62.45.xxx.xxx #3: transition from state
STATE_MAIN_R2 to state STATE_MAIN_R3<o:p></o:p></p>
<p class=MsoNormal>Oct 05 15:49:04 vpn1 pluto[13486]:
"L2TP-PSK-noNAT"[3] 62.45.xxx.xxx #3: new NAT mapping for #3, was 62.45.xxx.xxx:3,
now 62.45.xxx.xxx:1071<o:p></o:p></p>
<p class=MsoNormal>Oct 05 15:49:04 vpn1 pluto[13486]:
"L2TP-PSK-noNAT"[3] 62.45.xxx.xxx #3: STATE_MAIN_R3: sent MR3, ISAKMP
SA established {auth=PRESHARED_KEY cipher=aes_256 integ=sha group=MODP2048}<o:p></o:p></p>
<p class=MsoNormal>Oct 05 15:49:04 vpn1 pluto[13486]: "L2TP-PSK-noNAT"[3]
62.45.xxx.xxx #3: the peer proposed: 141.138.xxx.xxx/32:17/0 ->
192.168.0.105/32:17/0<o:p></o:p></p>
<p class=MsoNormal>Oct 05 15:49:04 vpn1 pluto[13486]:
"L2TP-PSK-noNAT"[3] 62.45.xxx.xxx #3: NAT-Traversal: received 2
NAT-OA. Using first, ignoring others<o:p></o:p></p>
<p class=MsoNormal>Oct 05 15:49:04 vpn1 pluto[13486]:
"L2TP-PSK-noNAT"[3] 62.45.xxx.xxx #4: responding to Quick Mode
proposal {msgid:01000000}<o:p></o:p></p>
<p class=MsoNormal>Oct 05 15:49:04 vpn1 pluto[13486]:
"L2TP-PSK-noNAT"[3] 62.45.xxx.xxx #4: us:
141.xxx.xxx.37<141.xxx.xxx.37>:17/%any<o:p></o:p></p>
<p class=MsoNormal>Oct 05 15:49:04 vpn1 pluto[13486]:
"L2TP-PSK-noNAT"[3] 62.45.xxx.xxx #4: them:
62.45.xxx.xxx[192.168.0.105]:17/1701<o:p></o:p></p>
<p class=MsoNormal>Oct 05 15:49:04 vpn1 pluto[13486]:
"L2TP-PSK-noNAT"[3] 62.45.xxx.xxx #4: cannot install eroute -- it is
in use for "L2TP-PSK-noNAT"[2] 62.45.xxx.xxx #2<o:p></o:p></p>
<p class=MsoNormal><o:p> </o:p></p>
<p class=MsoNormal>Thanks in advance!<o:p></o:p></p>
<p class=MsoNormal><o:p> </o:p></p>
<p class=MsoNormal>Best regards,<o:p></o:p></p>
<p class=MsoNormal><o:p> </o:p></p>
<p class=MsoNormal>Dominic<o:p></o:p></p>
</div>
</body>
</html>