[Openswan Users] l2tpd problem

Francesco Defilippo francesco.defilippo at sys-net.it
Thu Sep 9 17:23:08 CEST 2004


Hi, I'm try from a pocket pc 2003.

Stephan Scholz wrote:

> Hi Francesco,
>
> have you installed the NAT-Traversal patch for the Windows 2000 client?
> See: http://www.jacco2.dds.nl/networking/win2000xp-freeswan.html#NAT-T
>
> Stephan
>
>> Hello, I'v a vpn with the following configuration:
>>
>> gprs -> natgw -> vpngw -> lan
>> 10.x -> 194.x -> 213.z -> 192.168.x
>>
>> when the l2tp/ipsec client connect I'v:
>>
>> Sep  9 15:36:17 vpngw pluto[5516]: packet from 194.185.97.57:14532: 
>> ignoring Vendor ID payload [MS NT5 ISAKMPOAKLEY 00000004]
>> Sep  9 15:36:17 vpngw pluto[5516]: packet from 194.185.97.57:14532: 
>> ignoring Vendor ID payload [FRAGMENTATION]
>> Sep  9 15:36:17 vpngw pluto[5516]: packet from 194.185.97.57:14532: 
>> received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n]
>> Sep  9 15:36:17 vpngw pluto[5516]: packet from 194.185.97.57:14532: 
>> ignoring Vendor ID payload [26244d38eddb61b3172a36e3d0cfb819]
>> Sep  9 15:36:17 vpngw pluto[5516]: "roadwarrior"[3] 
>> 194.185.97.57:14532 #3: responding to Main Mode from unknown peer 
>> 194.185.97.57:14532
>> Sep  9 15:36:19 vpngw pluto[5516]: "roadwarrior"[3] 
>> 194.185.97.57:14532 #3: NAT-Traversal: Result using 
>> draft-ietf-ipsec-nat-t-ike-02/03: peer is NATed
>> Sep  9 15:36:21 vpngw pluto[5516]: "roadwarrior"[3] 
>> 194.185.97.57:14532 #3: Peer ID is ID_DER_ASN1_DN: 'C=IT, ST=Italia, 
>> L=test, O=test, OU=test1, CN=pda, E=pda at test.lan'
>> Sep  9 15:36:21 vpngw pluto[5516]: "roadwarrior"[4] 
>> 194.185.97.57:14532 #3: deleting connection "roadwarrior" instance 
>> with peer 194.185.97.57 {isakmp=#0/ipsec=#0}
>> Sep  9 15:36:22 vpngw pluto[5516]: | NAT-T: new mapping 
>> 194.185.97.57:14532/14578)
>> Sep  9 15:36:22 vpngw pluto[5516]: "roadwarrior"[4] 
>> 194.185.97.57:14578 #3: sent MR3, ISAKMP SA established
>> Sep  9 15:36:23 vpngw pluto[5516]: "roadwarrior"[4] 
>> 194.185.97.57:14578 #3: retransmitting in response to duplicate 
>> packet; already STATE_MAIN_R3
>> Sep  9 15:36:24 vpngw pluto[5516]: "roadwarrior"[4] 
>> 194.185.97.57:14578 #3: retransmitting in response to duplicate 
>> packet; already STATE_MAIN_R3
>> Sep  9 15:36:25 vpngw pluto[5516]: "roadwarrior"[4] 
>> 194.185.97.57:14578 #4: responding to Quick Mode
>> Sep  9 15:36:25 vpngw pluto[5516]: "roadwarrior"[4] 
>> 194.185.97.57:14578 #4: discarding duplicate packet; already 
>> STATE_QUICK_R1
>> Sep  9 15:36:26 vpngw pluto[5516]: "roadwarrior"[4] 
>> 194.185.97.57:14578 #4: IPsec SA established {ESP=>0x008ad7e0 
>> <0x953509f9 NATOA=10.216.149.19}
>>
>> after the l2tpd daemon say:
>>
>> Sep  9 15:31:58 vpngw l2tpd[3289]: ourtid = 33436, entropy_buf = 829c
>> Sep  9 15:31:58 vpngw l2tpd[3289]: ourcid = 12570, entropy_buf = 311a
>> Sep  9 15:31:58 vpngw l2tpd[3289]: check_control: control, cid = 0, 
>> Ns = 0, Nr = 0
>> Sep  9 15:31:58 vpngw l2tpd[3289]: handle_avps: handling avp's for 
>> tunnel 33436, call 12570
>> Sep  9 15:31:58 vpngw l2tpd[3289]: message_type_avp: message type 1 
>> (Start-Control-Connection-Request)
>> Sep  9 15:31:58 vpngw l2tpd[3289]: protocol_version_avp: peer is 
>> using version 1, revision 0.
>> Sep  9 15:31:58 vpngw l2tpd[3289]: framing_caps_avp: supported peer 
>> frames: sync
>> Sep  9 15:31:58 vpngw l2tpd[3289]: bearer_caps_avp: supported peer 
>> bearers:
>> Sep  9 15:31:58 vpngw l2tpd[3289]: firmware_rev_avp: peer reports 
>> firmware version 1026 (0x0402)
>> Sep  9 15:31:58 vpngw l2tpd[3289]: hostname_avp: peer reports 
>> hostname 'Pocket_PC_1'
>> Sep  9 15:31:58 vpngw l2tpd[3289]: vendor_avp: peer reports vendor 
>> 'Microsoft\200^H'
>> Sep  9 15:31:58 vpngw l2tpd[3289]: assigned_tunnel_avp: using peer's 
>> tunnel 44
>> Sep  9 15:31:58 vpngw l2tpd[3289]: receive_window_size_avp: peer 
>> wants RWS of 8.  Will use flow control.
>> Sep  9 15:32:03 vpngw l2tpd[3289]: control_xmit: Maximum retries 
>> exceeded for tunnel 33436.  Closing.
>> Sep  9 15:32:03 vpngw l2tpd[3289]: call_close : Connection 44 closed 
>> to 194.185.97.57, port 1701 (Timeout)
>> Sep  9 15:32:08 vpngw l2tpd[3289]: control_xmit: Unable to deliver 
>> closing message for tunnel 33436. Destroying anyway.
>> Sep  9 15:35:42 vpngw l2tpd[3289]: death_handler: Fatal signal 15 
>> received
>>
>> any hint?
>>
>> ipsec.conf:
>>
>> version 2.0
>>
>> config setup
>>        #interfaces="ipsec0=eth0"
>>        interfaces=%defaultroute
>>        nat_traversal=yes
>>        klipsdebug=none
>>        dumpdir=/tmp
>>        overridemtu=1410
>>        virtual_private=%v4:10.0.0.0/8,%v4:172.16.0.0/12
>>        hidetos=yes
>>        uniqueids=yes
>>
>> conn %default
>>        compress=yes
>>        disablearrivalcheck=no
>>        authby=rsasig
>>        leftrsasigkey=%cert
>>        rightrsasigkey=%cert
>>        left=%defaultroute
>>        leftcert=vpngw-cert.pem
>>        pfs=no
>>
>> conn roadwarrior
>>        leftprotoport=17/1701
>>        right=%any
>>        rightprotoport=17/%any
>>        rightsubnet=vhost:%no,%priv
>>        auto=add
>>        esp="3des-md5,3des-sha1"
>>        keyingtries=3
>>
>>
>>
>>    SysNet - via Dossi,8 27100 Pavia Tel: +390382573859 Fax: 
>> +390382476497
>>
>> _______________________________________________
>> Users mailing list
>> Users at openswan.org
>> http://lists.openswan.org/mailman/listinfo/users
>
>
>


    SysNet - via Dossi,8 27100 Pavia Tel: +390382573859 Fax: +390382476497



More information about the Users mailing list