[Openswan Users] Half-Open tunnel ?
O-Zone
liste at zerozone.it
Tue Oct 5 16:12:46 CEST 2004
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Hi all,
i've this strange problem:
[MyNET 10.0.0.0/24]----[GW]====(VPN)=====[GW]---[OtherNET 10.0.2.0/24]
If, from OtherNET, i ping a machine in MyNET all work well. If, from MyNet,
ping an host inside OtherNET, it don't work. Here's related ipsec.conf:
[MyNET's ipsec.conf]
conn tunnel
ikelifetime=3h
keylife=1h
# MyNET
leftsubnet=10.0.0.0/24
# OtherNET
right=GW Public IP
rightnexthop=Router
rightsubnet=10.0.2.0/24
# -
leftrsasigkey=[CUT]
rightrsasigkey=[CUT]
authby=rsasig
leftupdown=/usr/local/lib/ipsec/_updown.x509
auto=start
[OtherNET's ipsec.conf]
conn tunnel
# MyNET
left=GW
leftsubnet=10.0.0.0/24
leftnexthop=Router
# OtherNET
right=GW
rightsubnet=10.0.2.0/24
rightnexthop=Router
rightupdown=/usr/local/lib/ipsec/_updown.x509
# -
leftrsasigkey=
rightrsasigkey=
auto=start
Some tests with TCPDUMP, if i ping from 10.0.0.9 to 10.0.2.200 (both alive):
[On MyNET's GW]
root at bastion:~# tcpdump -i ipsec0 dst 10.0.2.200
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on ipsec0, link-type EN10MB (Ethernet), capture size 68 bytes
15:01:52.085904 IP GW > 10.0.2.200: icmp 64: echo request seq 838
15:01:53.085738 IP GW > 10.0.2.200: icmp 64: echo request seq 839
15:01:54.085595 IP GW > 10.0.2.200: icmp 64: echo request seq 840
[On OtherNET's GW]
...nothing...
Of course tunnel is open (as shown in ipsec whack --status):
...cut...
000
000 stats db_ops.c: {curr_cnt, total_cnt, maxsz} :context={0,662,36}
trans={0,662,96} attrs={0,662,160}
000
000 "tunnel": 10.0.0.0/24===GW---Router...Router---GW===10.0.2.0/24
000 "tunnel": CAs: '%any'...'%any'
000 "tunnel": ike_life: 10800s; ipsec_life: 3600s; rekey_margin: 540s;
rekey_fuzz: 100%; keyingtries: 0
000 "tunnel": policy: RSASIG+ENCRYPT+TUNNEL+PFS; interface: eth0; erouted
000 "tunnel": newest ISAKMP SA: #1331; newest IPsec SA: #1330; eroute owner:
#1330
000 "tunnel": IKE algorithms wanted: 5_000-1-5, 5_000-2-5, 5_000-1-2,
5_000-2-2, 5_000-1-1, 5_000-2-1, flags=-strict
000 "tunnel": IKE algorithms found: 5_192-1_128-5, 5_192-2_160-5,
5_192-1_128-2, 5_192-2_160-2, 5_192-1_128-1, 5_192-2_160-1,
000 "tunnel": IKE algorithm newest: 3DES_CBC_192-MD5-MODP1536
000 "tunnel": ESP algorithms wanted: 3_000-1, 3_000-2, flags=-strict
000 "tunnel": ESP algorithms loaded: 3_168-1_128, 3_168-2_160,
000 "tunnel": ESP algorithm newest: 3DES_0-HMAC_MD5; pfsgroup=<Phase1>
Here's IPTABLES dump on both GW:
[MyNET's GW]
Chain FORWARD (policy DROP)
target prot opt source destination
ACCEPT all -- 10.0.2.0/24 localnet/24
ACCEPT all -- localnet/24 10.0.2.0/24
Note:localnet=10.0.0.0
[OtherNET's GW]
Chain FORWARD (policy DROP)
target prot opt source destination
ACCEPT all -- 10.0.0.0/24 localnet/24
ACCEPT all -- localnet/24 10.0.0.0/24
Note: localnet=10.0.2.0
Some ideas ? Thanks ! Oz
- --
Fourth Law of Revision:
It is usually impractical to worry beforehand about
interferences -- if you have none, someone will make one for you.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.4 (GNU/Linux)
iD8DBQFBYp3RYuBSFbgkEysRAsQ7AKD2Cj0YGEITkec5gI6qn5krVq0g4ACgrht6
EcQXFV4gTgwe21hn1diODks=
=gw23
-----END PGP SIGNATURE-----
More information about the Users
mailing list