[Openswan Users] Problems connecting to office LAN
Torgeir Natvig
togge at cklug.org
Thu Nov 25 09:32:20 CET 2004
I get that exact same error message.
Hope you find out anything usefull to make it work :)
Cheers
Togge
On Wed, 2004-11-24 at 06:40 -0700, Cory S wrote:
> Thanks for the help. I'll get with my admins.
>
>
> On Tue, 23 Nov 2004 21:00:43 -0500, Ted Kaczmarek <tedkaz at optonline.net> wrote:
> > On Tue, 2004-11-23 at 11:19 -0700, Cory S wrote:
> >
> >
> > > Hi all,
> > >
> > > I've been working with this for weeks trying to get it to work but
> > > I've finally given up and decided to ask the experts. Here is my
> > > layout:
> > >
> > > home DSL modem/gateway Symantec
> > > firewall work
> > > 192.168.1.2 -------- 192.168.1.1/xxx.xxx.xxx.xxx ======
> > > xxx.xxx.xxx.xxx ----------- 192.168.169.149
> > >
> > > I can connect just fine from Windows with the Symantec client but I
> > > would like to connect with Linux using openswan (installed v. 2.2.0).
> > > And yes, I got my settings from Andreas' mail post.
> > >
> > > Here is the config from Symantec's client:
> > >
> > > Tunnel Summary
> > > Security gateway: xxx.xxx.xxx.xxx
> > > Tunnel name:
> > > IP address: 192.168.169.0
> > > Network Mask: 255.255.255.0
> > > Tunnel state: Connected
> > > VPN policy: Custom
> > >
> > > Tunnel Settings
> > > IPSec protocol: ESP
> > > Data integrity: MD5
> > > Data privacy: DES
> > > Compression: Any
> > > Encapsulation: Tunnel
> > > Diffie-Hellman: None
> > > Data volume limit: 2100000
> > > Lifetime timeout: 480
> > > Inactivity timeout: 0
> > >
> > > My ipsec.secrets
> > > @#ID_IN_HEX <firewall address> : PSK "SECRET_IN_DECIMAL"
> > >
> > > My ipsec.conf
> > >
> > > version 2.0 # conforms to second version of ipsec.conf specification
> > >
> > > # basic configuration
> > > config setup
> > > # Debug-logging controls: "none" for (almost) none, "all" for lots.
> > > # klipsdebug=all
> > > # plutodebug=dns
> > > interfaces=%defaultroute
> > > klipsdebug=all
> > > plutodebug=all
> > > nat_traversal=yes
> > >
> > > # Equis connection
> > > conn conn1
> > > type= tunnel
> > > left= 192.168.1.2
> > > leftsubnet= 192.168.1.0/0
> > > leftnexthop= 192.168.1.1
> > > leftid=@#637363686d696474
> > > right= 204.246.137.26
> > > rightsubnet= 192.168.169.0/0
> > > keyexchange= ike
> > > authby= secret
> > > auth= esp
> > > auto= add
> > >
> > > #Disable Opportunistic Encryption
> > > include /etc/ipsec.d/examples/no_oe.conf
> > >
> > > I start things up with the following commands:
> > > ipsec pluto
> > > ipsec auto --add conn1
> > > ipsec auto --ready
> > > ipsec auto --up conn1
> > >
> > > And get this in auth.log:
> > >
> > > Nov 22 18:42:37 kashmir pluto[2939]: Starting Pluto (Openswan Version
> > > 2.2.0 X.509-1.5.
> > > 4 PLUTO_USES_KEYRR)
> > > Nov 22 18:42:37 kashmir pluto[2939]: including NAT-Traversal patch
> > > (Version 0.6c) [d
> > > isabled]
> > > Nov 22 18:42:37 kashmir pluto[2939]: ike_alg_register_enc():
> > > Activating OAKLEY_AES_CBC
> > > : Ok (ret=0)
> > > Nov 22 18:42:37 kashmir pluto[2939]: Using Linux 2.6 IPsec interface code
> > > Nov 22 18:42:37 kashmir pluto[2939]: Changing to directory
> > > '/etc/ipsec.d/cacerts'
> > > Nov 22 18:42:37 kashmir pluto[2939]: Could not change to directory
> > > '/etc/ipsec.d/aacer
> > > ts'
> > > Nov 22 18:42:37 kashmir pluto[2939]: Changing to directory
> > > '/etc/ipsec.d/ocspcerts'
> > > Nov 22 18:42:37 kashmir pluto[2939]: Changing to directory '/etc/ipsec.d/crls'
> > > Nov 22 18:42:37 kashmir pluto[2939]: Warning: empty directory
> > > Nov 22 18:42:50 kashmir pluto[2939]: added connection description "conn1"
> > > Nov 22 18:42:58 kashmir pluto[2939]: listening for IKE messages
> > > Nov 22 18:42:58 kashmir pluto[2939]: adding interface lo/lo 127.0.0.1
> > > Nov 22 18:42:58 kashmir pluto[2939]: adding interface eth0/eth0 192.168.1.2
> > > Nov 22 18:42:58 kashmir pluto[2939]: adding interface lo/lo ::1
> > > Nov 22 18:42:58 kashmir pluto[2939]: loading secrets from "/etc/ipsec.secrets"
> > > Nov 22 18:43:04 kashmir pluto[2939]: "conn1" #1: initiating Main Mode
> > > Nov 22 18:43:04 kashmir pluto[2939]: packet from xxx.xxx.xxx.xxx:500:
> > > ignoring informat
> > > ional payload, type PAYLOAD_MALFORMED
> > > Nov 22 18:43:04 kashmir pluto[2939]: packet from xxx.xxx.xxx.xxx:500:
> > > received and igno
> > > red informational message
> > >
> > > Can anyone help?
> > >
> > > Thanks!
> >
> > Openswan does not support single des , as it should. Make sure the
> > symantec is doing 3des.
> >
> > If you do a tcpdump do you see it getting to phase 2?
> >
> > I don't see any policy in your symantec config to correlate to
> > your Openswan as well. How does the symantec know to match
> > 192.168.1.0/24?
> >
> > Have never defined leftid, does the symantec require that?
> >
> > What do the logs on the symantec tell you?
> >
> > What does ipsec barf on the openswan tell you?
> >
> > I would ask the symantec admin to set you up with polices to match your
> > proposals.
> >
> > Good Luck,
> >
> > Ted
> >
> >
> _______________________________________________
> Users mailing list
> Users at openswan.org
> http://lists.openswan.org/mailman/listinfo/users
>
More information about the Users
mailing list