[Openswan Users] Roadwarrior Help
Kyle Hultman
khultman at sch-farmville.org
Fri Aug 6 10:13:16 CEST 2004
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
I'm having trouble getting a road warrior vpn setup correctly. Here is
the topology that we're trying to implement.
~ DHCP Assigned
~ Private IP
+--------------+ +-----------+ +--------+ +---+ +-----+
|128.1.0.0/16 |<->|Firewall | |internet| |DSL|<->|Host |
|Private subnet| |207.27.3.58|<->+--------+<->|RTR| |XP PC|
+--------------+ +-----------+ +---+ +-----+
~ DHCP Assigned
~ Public IP
What I'm seeing in the logs, are unknown peer messages, and duplicate
packet messages. I cant get the XP machine to connect to the firewall in
anyway/shape/form using any combination of configs.
I've got several other connections terminating into the firewall,
including a pix, firebox, sonicwall, and several zywalls. None using a
road-warrior type setup, these are all remote offices. They work with no
problems, and one is set up much like the topology above, where the
remote end is behind a nated interface. Any advice would be helpful,
I'll keep trying different configs, and post a fix if I come across it.
Logs and configs below:
<Firewall Log>
<snip>
Aug 6 08:21:18 forculus pluto[30381]: packet from 65.41.104.3:500:
ignoring Vendor ID payload [MS NT5 ISAKMPOAKLEY 00000003]
Aug 6 08:21:18 forculus pluto[30381]: "roadwarrior"[3] 65.41.104.3
#231: responding to Main Mode from unknown peer 65.41.104.3
Aug 6 08:21:18 forculus pluto[30381]: "roadwarrior"[3] 65.41.104.3
#231: transition from state (null) to state STATE_MAIN_R1
Aug 6 08:21:18 forculus pluto[30381]: "roadwarrior"[3] 65.41.104.3
#231: transition from state STATE_MAIN_R1 to state STATE_MAIN_R2
Aug 6 08:21:19 forculus pluto[30381]: "roadwarrior"[3] 65.41.104.3
#231: Peer ID is ID_IPV4_ADDR: '10.0.0.99'
Aug 6 08:21:19 forculus pluto[30381]: "roadwarrior"[4] 65.41.104.3
#231: deleting connection "roadwarrior" instance with peer 65.41.104.3
{isakmp=#0/ipsec=#0}
Aug 6 08:21:19 forculus pluto[30381]: "roadwarrior"[4] 65.41.104.3
#231: transition from state STATE_MAIN_R2 to state STATE_MAIN_R3
Aug 6 08:21:19 forculus pluto[30381]: "roadwarrior"[4] 65.41.104.3
#231: sent MR3, ISAKMP SA established
Aug 6 08:21:19 forculus pluto[30381]: "roadwarrior"[4] 65.41.104.3
#231: cannot respond to IPsec SA request because no connection is known
for
128.1.0.0/16===208.27.3.58[S=C]...65.41.104.3[10.0.0.99,S=C]===10.0.0.99/32
Aug 6 08:21:20 forculus pluto[30381]: "roadwarrior"[4] 65.41.104.3
#231: Quick Mode I1 message is unacceptable because it uses a previously
used Message ID 0x8ee43163 (perhaps this is a duplicated packet)
Aug 6 08:21:22 forculus pluto[30381]: "roadwarrior"[4] 65.41.104.3
#231: Quick Mode I1 message is unacceptable because it uses a previously
used Message ID 0x8ee43163 (perhaps this is a duplicated packet)
Aug 6 08:21:26 forculus pluto[30381]: "roadwarrior"[4] 65.41.104.3
#231: Quick Mode I1 message is unacceptable because it uses a previously
used Message ID 0x8ee43163 (perhaps this is a duplicated packet)
Aug 6 08:21:34 forculus pluto[30381]: "roadwarrior"[4] 65.41.104.3
#231: Quick Mode I1 message is unacceptable because it uses a previously
used Message ID 0x8ee43163 (perhaps this is a duplicated packet)
<Firewall ipsec.conf>
<snip>
conn roadwarrior
~ type=tunnel
~ auth=esp
~ esp=3des-md5-96
~ authby=secret
~ keyexchange=ike
~ keyingtries=0
~ keylife=9600s
~ left=208.27.3.58
~ leftsubnet=128.1.0.0/16
~ leftnexthop=208.27.3.57
~ right=%any
~ auto=start
~ pfs=yes
<Firewall ipsec.secrets>
<snip>
208.27.3.58 0.0.0.0 : PSK "***hidden***"
208.27.3.58 %any : PSK "***hidden***"
<IP Sec Status>
<snip>
000 "roadwarrior":
128.1.0.0/16===208.27.3.58[S=C]---208.27.3.57...%any[S=C]; unrouted;
eroute owner: #0
000 "roadwarrior": ike_life: 3600s; ipsec_life: 9600s; rekey_margin:
540s; rekey_fuzz: 100%; keyingtries: 0
000 "roadwarrior": policy: PSK+ENCRYPT+TUNNEL+PFS; prio: 16,32;
interface: eth0;
000 "roadwarrior": newest ISAKMP SA: #0; newest IPsec SA: #0;
000 "roadwarrior"[2]:
128.1.0.0/16===208.27.3.58[S=C]---208.27.3.57...65.41.104.3[10.0.0.99,S=C];
unrouted; eroute owner: #0
000 "roadwarrior"[2]: ike_life: 3600s; ipsec_life: 9600s;
rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0
000 "roadwarrior"[2]: policy: PSK+ENCRYPT+TUNNEL+PFS; prio: 16,32;
interface: eth0;
000 "roadwarrior"[2]: newest ISAKMP SA: #237; newest IPsec SA: #0;
<Client ipsec.conf>
conn sch
type=tunnel
left=%any
right=208.27.3.58
rightsubnet=128.1.0.0/16
auth=esp
esp=3des-md5-96
authby=secret
keyexchange=ike
keyringtries=0
keylife=9600s
auto=start
pfs=yes
presharedkey=***hidden***
- --
Kyle Hultman
Security Analyst
Southside Community Hospital
Farmville Virginia
(434) 315 - 2656
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.4 (MingW32)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org
iD8DBQFBE4PiWom6UCHIugIRAkejAKCS7lFqVjXwA2ofA185104uphLTPQCgj0NK
597pWAEu7jbxkNYig2GB2l8=
=B3IR
-----END PGP SIGNATURE-----
More information about the Users
mailing list