[Openswan Users] Problems connecting to office LAN
Ted Kaczmarek
tedkaz at optonline.net
Tue Nov 23 21:00:43 CET 2004
On Tue, 2004-11-23 at 11:19 -0700, Cory S wrote:
> Hi all,
>
> I've been working with this for weeks trying to get it to work but
> I've finally given up and decided to ask the experts. Here is my
> layout:
>
> home DSL modem/gateway Symantec
> firewall work
> 192.168.1.2 -------- 192.168.1.1/xxx.xxx.xxx.xxx ======
> xxx.xxx.xxx.xxx ----------- 192.168.169.149
>
> I can connect just fine from Windows with the Symantec client but I
> would like to connect with Linux using openswan (installed v. 2.2.0).
> And yes, I got my settings from Andreas' mail post.
>
> Here is the config from Symantec's client:
>
> Tunnel Summary
> Security gateway: xxx.xxx.xxx.xxx
> Tunnel name:
> IP address: 192.168.169.0
> Network Mask: 255.255.255.0
> Tunnel state: Connected
> VPN policy: Custom
>
> Tunnel Settings
> IPSec protocol: ESP
> Data integrity: MD5
> Data privacy: DES
> Compression: Any
> Encapsulation: Tunnel
> Diffie-Hellman: None
> Data volume limit: 2100000
> Lifetime timeout: 480
> Inactivity timeout: 0
>
> My ipsec.secrets
> @#ID_IN_HEX <firewall address> : PSK "SECRET_IN_DECIMAL"
>
> My ipsec.conf
>
> version 2.0 # conforms to second version of ipsec.conf specification
>
> # basic configuration
> config setup
> # Debug-logging controls: "none" for (almost) none, "all" for lots.
> # klipsdebug=all
> # plutodebug=dns
> interfaces=%defaultroute
> klipsdebug=all
> plutodebug=all
> nat_traversal=yes
>
> # Equis connection
> conn conn1
> type= tunnel
> left= 192.168.1.2
> leftsubnet= 192.168.1.0/0
> leftnexthop= 192.168.1.1
> leftid=@#637363686d696474
> right= 204.246.137.26
> rightsubnet= 192.168.169.0/0
> keyexchange= ike
> authby= secret
> auth= esp
> auto= add
>
> #Disable Opportunistic Encryption
> include /etc/ipsec.d/examples/no_oe.conf
>
> I start things up with the following commands:
> ipsec pluto
> ipsec auto --add conn1
> ipsec auto --ready
> ipsec auto --up conn1
>
> And get this in auth.log:
>
> Nov 22 18:42:37 kashmir pluto[2939]: Starting Pluto (Openswan Version
> 2.2.0 X.509-1.5.
> 4 PLUTO_USES_KEYRR)
> Nov 22 18:42:37 kashmir pluto[2939]: including NAT-Traversal patch
> (Version 0.6c) [d
> isabled]
> Nov 22 18:42:37 kashmir pluto[2939]: ike_alg_register_enc():
> Activating OAKLEY_AES_CBC
> : Ok (ret=0)
> Nov 22 18:42:37 kashmir pluto[2939]: Using Linux 2.6 IPsec interface code
> Nov 22 18:42:37 kashmir pluto[2939]: Changing to directory
> '/etc/ipsec.d/cacerts'
> Nov 22 18:42:37 kashmir pluto[2939]: Could not change to directory
> '/etc/ipsec.d/aacer
> ts'
> Nov 22 18:42:37 kashmir pluto[2939]: Changing to directory
> '/etc/ipsec.d/ocspcerts'
> Nov 22 18:42:37 kashmir pluto[2939]: Changing to directory '/etc/ipsec.d/crls'
> Nov 22 18:42:37 kashmir pluto[2939]: Warning: empty directory
> Nov 22 18:42:50 kashmir pluto[2939]: added connection description "conn1"
> Nov 22 18:42:58 kashmir pluto[2939]: listening for IKE messages
> Nov 22 18:42:58 kashmir pluto[2939]: adding interface lo/lo 127.0.0.1
> Nov 22 18:42:58 kashmir pluto[2939]: adding interface eth0/eth0 192.168.1.2
> Nov 22 18:42:58 kashmir pluto[2939]: adding interface lo/lo ::1
> Nov 22 18:42:58 kashmir pluto[2939]: loading secrets from "/etc/ipsec.secrets"
> Nov 22 18:43:04 kashmir pluto[2939]: "conn1" #1: initiating Main Mode
> Nov 22 18:43:04 kashmir pluto[2939]: packet from xxx.xxx.xxx.xxx:500:
> ignoring informat
> ional payload, type PAYLOAD_MALFORMED
> Nov 22 18:43:04 kashmir pluto[2939]: packet from xxx.xxx.xxx.xxx:500:
> received and igno
> red informational message
>
> Can anyone help?
>
> Thanks!
Openswan does not support single des , as it should. Make sure the
symantec is doing 3des.
If you do a tcpdump do you see it getting to phase 2?
I don't see any policy in your symantec config to correlate to
your Openswan as well. How does the symantec know to match
192.168.1.0/24?
Have never defined leftid, does the symantec require that?
What do the logs on the symantec tell you?
What does ipsec barf on the openswan tell you?
I would ask the symantec admin to set you up with polices to match your
proposals.
Good Luck,
Ted
More information about the Users
mailing list