[Openswan Users] PAYLOAD_MALFORMED upon attempted tunnel
restablishment
Johannes Graumann
graumann at caltech.edu
Wed Dec 15 20:52:43 CET 2004
Sorry for being a pest, but I still didn't get this working and I really
would like to ... is this too dumb a question or am I asking the wrong
folks? If the second case applies: which NG might be more appropriate?
Cheers, Joh
On Sat, 4 Dec 2004 18:44:09 -0800
Johannes Graumann <graumann at caltech.edu> wrote:
> Hello,
>
> I have the following setup:
>
> IPSECed wireless
> x509 DSL
> Laptop <------------------> Server <-----> www
> palantir morannon
> 192.168.1.6 192.168.1.1
> Openswan U2.2.0/K2.6.9 Openswan U2.2.0/K2.6.9
>
> My startup script for the laptops wireless connection includes:
> ipsec auto --verbose --up wireless
> Which works beautifully initiating the tunnel to the server/router,
> BUT: if I shut down the connection on the laptop using
> ipsec auto --verbose --down wireless
> (which seems to work), I'm unable to restart that connection. When I
> try I get
> 003 "wireless" #3: malformed payload in packet
> 002 "wireless" #3: sending encrypted notification
> PAYLOAD_MALFORMED to 192.168.1.1:500
>
> This is only fixable doing a
> ipsec auto --verbose --delete wireless-palantir
> ipsec auto --verbose --add wireless-palantir
> (which implies a '--remove' as well) on the server, after which my
> startup script works again.
>
> This newbie is helpless and confused and would appreciate any nudge
> into the direction of cleaning up his follies ... configuration
> attached below.
>
> Thanks, Joh
>
>
> The ipsec.conf of the laptop looks as follows:
> version 2.
>
> # basic configuration
> config setup
> interfaces="ipsec0=eth1"
> nat_traversal=no
>
> # Add connections here.
> conn %default
> keyingtries=1
> compress=yes
> authby=rsasig
> leftrsasigkey=%cert
> rightrsasigkey=%cert
>
> conn wireless
> left=192.168.1.6
> leftcert=palantir.homenetwork.pem
> right=192.168.1.1
> rightcert=morannon.homenetwork.pem
> rightsubnet=0.0.0.0/0
> auto=add
> pfs=yes
> #Disable Opportunistic Encryption
> include /etc/ipsec.d/examples/no_oe.conf
>
> The ipsec.conf on the server looks like this:
> version 2.0
> config setup
> interfaces="ipsec0=eth1"
> nat_traversal=yes
> virtual_private=%v4:192.168.1.0/24
>
> conn %default
> keyingtries=1
> compress=yes
> disablearrivalcheck=no
> authby=rsasig
> leftrsasigkey=%cert
> rightrsasigkey=%cert
>
> conn wireless-palantir
> left=192.168.1.6
> leftcert=palantir.homenetwork.pem
> right=192.168.1.1
> rightcert=morannon.homenetwork.pem
> rightsubnet=0.0.0.0/0
> auto=add
> pfs=yes
>
> #Disable Opportunistic Encryption
> include /etc/ipsec.d/examples/no_oe.conf
More information about the Users
mailing list