[Openswan Users] VPN connection problems Dialup to ADSL
Rowland Mosbergen
rowlandm at paragontechnology.com.au
Sun Oct 3 14:18:13 CEST 2004
Hi there,
I have successfully setup a VPN Server with Openswan IPsec
U2.1.3/K2.4.26-1-686 on an ADSL connection, using a roadwarrior
configuration.
I can successfully connect to the VPN server and beyond using either
Windows 2000 or Windows XP using Marcus Mueller's VPN Client only if the
internet connection is ADSL.
Our main issue is trying to get the GPRS to work with ADSL for a
client. But if I try using GPRS or even traditional dial-up connections
(with the appropriate configuration changes) it does not connect.
If we get the VPN server to go on dial-up, after we make the appropriate
changes the dial-up and the GPRS can connect but the ADSL cannot.
This is using nat traversal which works successfully on both the GPRS to
Dialup and ADSL to ADSL connections.
We have tried to change the MTU settings on the VPN server and on the
clients to drop the MTU down to 576, 1400 and other ranges, but with no
success.
My question is:
Has this problem (dial-up/GPRS roadwarrior connecting to ADSL VPN
openswan) been found before? I would assume so.
What was the underlying problem?
What are the options or procedures to resolve the issue?
Would using another VPN client solve our issue?
In summary:
Roadwarrior to VPN
ADSL to ADSL = Success
GPRS to ADSL = Failure
Dialup to ADSL = Failure
Dialup to Dialup = Success
GPRS to Dialup = Success
ADSL to Dialup = Failure
The GPRS is really slow as well, which doesn't help matters. But it
connects up reliably when the VPN server is on dialup.
Any help would be much appreciated.
Some supporting information::
Debian auth.log
Oct 3 06:53:11 compassGW pluto[758]: packet from XX.XX.XX.XX:850:
ignoring Ven
dor ID payload [MS NT5 ISAKMPOAKLEY 00000004]
Oct 3 06:53:11 compassGW pluto[758]: packet from XX.XX.XX.XX:850:
ignoring Ven
dor ID payload [FRAGMENTATION]
Oct 3 06:53:11 compassGW pluto[758]: packet from XX.XX.XX.XX:850:
received Ven
dor ID payload [draft-ietf-ipsec-nat-t-ike-02_n]
Oct 3 06:53:11 compassGW pluto[758]: packet from XX.XX.XX.XX:850:
ignoring Ven
dor ID payload [26244d38eddb61b3...]
Oct 3 06:53:11 compassGW pluto[758]: "roadwarrior"[14] XX.XX.XX.XX:850
#17: re
sponding to Main Mode from unknown peer XX.XX.XX.XX:850
Oct 3 06:53:11 compassGW pluto[758]: "roadwarrior"[14] XX.XX.XX.XX:850
#17: tr
ansition from state (null) to state STATE_MAIN_R1
Oct 3 06:53:12 compassGW pluto[758]: "roadwarrior"[14] XX.XX.XX.XX:850
#17: NA
T-Traversal: Result using draft-ietf-ipsec-nat-t-ike-02/03: peer is NATed
Oct 3 06:53:12 compassGW pluto[758]: "roadwarrior"[14] XX.XX.XX.XX:850
#17: tr
ansition from state STATE_MAIN_R1 to state STATE_MAIN_R2
Oct 3 06:54:16 compassGW pluto[758]: "roadwarrior"[14] XX.XX.XX.XX:850
#17: en
crypted Informational Exchange message is invalid because it is for
incomplete I
SAKMP SA
Oct 3 06:54:22 compassGW pluto[758]: "roadwarrior"[14] XX.XX.XX.XX:850
#17: ma
x number of retransmissions (2) reached STATE_MAIN_R2
Oct 3 06:54:22 compassGW pluto[758]: "roadwarrior"[14] XX.XX.XX.XX:850:
deleti
ng connection "roadwarrior" instance with peer XX.XX.XX.XX
{isakmp=#0/ipsec=#0}
Oakley log error :: received an unencrypted packed when crypto active.
This is for the GPRS link in terms of pinging the VPN server and google
trying to find best MTU
Ping www.google.com.au OK
Ping 61.9.212.209 OK
Ping -l 1473 -f www.google.com.au Packet needs to be fragmenteed but DF set
Ping -l 1472 -f www.google.com.au Request timed out
Ping -l 1472 -f XX.XX.XX.XX Request timed out
Ping -l 576 -f XX.XX.XX.XX Request timed out
Ping -l 176 -f XX.XX.XX.XX Request timed out
Ping -l 76 -f XX.XX.XX.XX Request timed out
Ping -l 65 -f XX.XX.XX.XX Request timed out
Ping -l 64 -f XX.XX.XX.XX OK
Roadwarrior ipsec.conf
-----------------------------
conn roadwarrior
left=%any
leftnexthop=%defaultroute
right=XX.XX.XX.XX
rightca="C=AU,YYYYYYYYY"
network=auto
auto=start
pfs=yes
conn roadwarrior-net
left=%any
leftnexthop=%defaultroute
right=XX.XX.XX.XX
rightsubnet=192.168.0.0/255.255.255.0
rightca="C=AU,YYYYYYYYY"
network=auto
auto=start
pfs=yes
VPN server ipsec.conf (have hardcoded the rightsubnetwithin to be
10.0.0.0/8 as this is OK for both the GPRS and ADSL subnets we are
testing on)
-----------------------------
# /etc/ipsec.conf - FreeS/WAN IPsec configuration file
version 2.0 # conforms to second version of ipsec.conf specification
# basic configuration
config setup
#interfaces = %defaultroute
interfaces = "ipsec0=ppp0"
klipsdebug=all
nat_traversal=yes
conn %default
keyingtries=1
compress=yes
disablearrivalcheck=no
authby=rsasig
leftrsasigkey=%cert
rightrsasigkey=%cert
conn roadwarrior-net
#Internal local subnet
leftsubnet=192.168.0.0/255.255.255.0
rightsubnetwithin=10.0.0.0/8
also=roadwarrior
conn roadwarrior
right=%any
left=XX.XX.XX.XX
leftcert=cert.pem
auto=add
pfs=yes
#Following disables opportunistic encryption
conn block
auto=ignore
conn private
auto=ignore
conn private-or-clear
auto=ignore
conn clear-or-private
auto=ignore
conn clear
auto=ignore
conn packetdefault
auto=ignore
More information about the Users
mailing list