[Openswan Users]
OpenSWAN fails to negotiate NAT-T draft 2 with Netscreen
sean at obstacle9.com
sean at obstacle9.com
Sun Dec 4 23:15:18 CET 2005
It looks like OpenSWAN isn't recognizing draft-ietf-ipsec-nat-t-ike-02
Vendor ID/payload sent by the Netscreen and/or vice versa. I've confirmed
this is the case with the latest version of OpenSWAN.
linux:~ # ipsec auto --up dmz
104 "dmz" #1: STATE_MAIN_I1: initiate
003 "dmz" #1: ignoring unknown Vendor ID payload
[166f932d55eb64d8e4df4fd37e2313f0d0fd84510000000000000000]
003 "dmz" #1: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-00]
003 "dmz" #1: received Vendor ID payload [Dead Peer Detection]
003 "dmz" #1: ignoring Vendor ID payload [HeartBeat Notify 386b0100]
106 "dmz" #1: STATE_MAIN_I2: sent MI2, expecting MR2
003 "dmz" #1: NAT-Traversal: Result using
draft-ietf-ipsec-nat-t-ike-00/01: i am NATed
108 "dmz" #1: STATE_MAIN_I3: sent MI3, expecting MR3
004 "dmz" #1: STATE_MAIN_I4: ISAKMP SA established
117 "dmz" #2: STATE_QUICK_I1: initiate
003 "dmz" #2: ignoring informational payload, type
IPSEC_RESPONDER_LIFETIME
004 "dmz" #2: STATE_QUICK_I2: sent QI2, IPsec SA established
{ESP=>0x24d1f2a3 <0x71a6a403 NATOA=0.0.0.0}
While researching the same problem with VPN Tracker clients to a
Netscreen, Juniper said this was the problem:
"Some vendors use the MD5 hash value in the draft, while others use the
vendor id string, and do the hash in the code....From the IETF interop
meetings, it was specified that the vendor ID string in draft 02 was
wrong for the hash value. Implementers should use the MD5 hash hex value,
not the string to interoperate with other implementations.
Because VPNTracker is using the vendor id string, instead of the MD5 hash,
ScreenOS is not recognizing this is a draft-02 NAT-T implementation."
What format is OpenSwan sending draft-ietf-ipsec-nat-t-ike-02 to peers?
thanks,
Sean
More information about the Users
mailing list