[Openswan Users] OpenSwan 2.3.1 - Problems with "IKE="

Cassio Bobsin Machado cassiobm at gmail.com
Thu Jul 14 18:07:52 CEST 2005


Hi there.

I've got a RH9 with openswan-2.3.1 configured.

I'm configuring a new VPN connection with a Cisco PIX. In fact, I
already have a VPN running with another Cisco PIX, using 3des-sha1. It
works fine for a few months, so I think that this problem is only with
the IPSEC.CONF.

I've got firewall rules adjusted for port 500 and protocolos 50/51 for
the IPs of this new VPN I'm working on.

The problem is, this new connection requires usage of AES256, SHA1 and
MODP1024 but, when I try to insert ANYTHING with ike= in this new
connection, it simply doens't parse correctly. Another problem is, I
can't get any log that shows what the problem is.

I've search tons of documentation, each suggesting a possible IKE= for
this configuration.

My IPSEC.CONF for this new connection is...

conn tim
        auto=start
        type=tunnel
        #LEFT:Human
        left=200.192.***.***
        leftnexthop=%defaultroute
        leftsubnet=200.192.***.***/32
        #RIGHT:Tim
        right=200.179.***.***
        rightsubnet=200.179.***.***/24
        authby=secret
        keyexchange=ike
        pfs=no
        auth=esp
        esp=aes256-sha1-modp1024
        compress=no

When I try any of the following lines, I get nothing on IPSEC AUTO
-STATUS for this connection...
ike=aes
ike=aes128
ike=aes128-sha
ike=aes128-sha-modp1024
ike=aes128-sha1
ike=aes256
ike=aes256-sha
ike=aes256-sha1
ike=aes256-sha-modp1024
ike=aes256-sha1-modp1024
ike=aes128-sha-modp1024
ike=3des
ike=3des-sha
ike=3des-sha1
ike=3des-md5

When I remove this line containing "ike=*anything*", I get this on
IPSEC AUTO -STATUS...
000 "tim": 200.192.***.***/32===200.192.***.***---200.192.***.***...200.179.***.***===200.179.***.***/32;
prospective erouted; eroute owner: #0
000 "tim":   ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s;
rekey_fuzz: 100%; keyingtries: 0
000 "tim":   policy: PSK+ENCRYPT+PFS+UP; prio: 32,32; interface: eth0;
000 "tim":   newest ISAKMP SA: #0; newest IPsec SA: #0;
000 #1: "tim" STATE_MAIN_I1 (sent MI1, expecting MR1); EVENT_RETRANSMIT in 8s
000 #1: pending Phase 2 for "tim" replacing #0


At the Cisco PIX, log shows...

Reject Reason:             IKE failure
Source:                        ip_200.192.***.*** (200.192.***.***)
Destination:                  rjosun801 (10.112.***.***)
Encryption Scheme:      IKE
VPN Peer Gateway:      ip_200.192.***.*** (200.192.***.***)
IKE Initiator Cookie:       9ced1ab8389b0627
Information:                   IKE: Main Mode Failed to match
proposal: 3DES, MD5, Pre-shared secret, Group 5 (1536 bit)

--------------

Remember that they are waiting for a IKE request with AES256, SHA1 and
Group 2 (1024bit).

---------------
Only for ilustrational purposes, my other connection that works fine
is this one...
conn claro
        auto=start
        type=tunnel
        #LEFT:Human
        left=200.192.***.***
        leftnexthop=%defaultroute
        leftsubnet=200.192.***.***/32
        #RIGHT:Claro
        right=200.211.***.***
        rightnexthop=200.211.***.***
        rightsubnet=200.211.***.***/32
        authby=secret
        keyexchange=ike
        pfs=no
        auth=esp
        esp=3des-sha1
        compress=no
-----------------

Oh, and I've added the PSK in IPSEC.SECRETS, but I think this doesn't
have anything related to this problem.


Finally, my questions are...
Does IKE= still works in this version I'm using?
Is it possible to change IKE configuration? How?
Have I tried only inexistant string for this parameter?
Am I forgetting anything at all?


I thank in advance for any help...


Best regards,

Cassio Bobsin Machado


More information about the Users mailing list