[Openswan Users] L2TP over IPsec over WLAN for OS-X Panther and others ...

Beat Zahnd beat.zahnd at phim.unibe.ch
Wed Jul 20 15:14:54 CEST 2005


Hello everyone,

I tried to secure a wireless LAN with a VPN. I use Debian sarge which 
provides Openswan Version 2.2.0 X.509-1.5.4. I have to support Mac OS X 
Panther which supports L2TP over IPSec using shared secrets.

I tried to use the informations from two sources:

http://www.jacco2.dds.nl/networking/freeswan-l2tp.html
http://www.freeswan.org/freeswan_trees/freeswan-2.06/doc/HowTo.html#wireless.config

But, so far I failed to get a working solution. :-(


Client           air         AP         air       VPN Gateway
192.168.1.129 ~~~~~~~~~ 192.168.1.254 ~~~~~~      Debian sarge
OS X                                         \
                                               ~ eth1 192.168.1.13
                                               - eth0 192.168.0.3
                                              /
     internet ----------- other wired stuff -


As far as I know the AP is acting as switch and is not of relevance.


Here my current ipsec.conf

config setup
	uniqueids=no

include /etc/ipsec.d/examples/no_oe.conf

conn wireless_vpn
	authby=secret
	pfs=no
	#
	left=192.168.1.13
	leftsubnet=0.0.0.0/0
	leftprotoport=udp/l2tp
	#
	right=%any
	rightprotoport=udp/%any
	#
	auto=add

I think this is what the two pages propose.
Here what happens after startup:

ipsec__plutorun: Starting Pluto subsystem...
pluto[10335]: Starting Pluto (Openswan Version 2.2.0 X.509-1.5.4 
PLUTO_USES_KEYRR)
pluto[10335]:   including NAT-Traversal patch (Version 0.6c) [disabled]
pluto[10335]: ike_alg_register_enc(): Activating OAKLEY_AES_CBC: Ok (ret=0)
pluto[10335]: Using Linux 2.6 IPsec interface code
pluto[10335]: Changing to directory '/etc/ipsec.d/cacerts'
pluto[10335]: Could not change to directory '/etc/ipsec.d/aacerts'
pluto[10335]: Changing to directory '/etc/ipsec.d/ocspcerts'
pluto[10335]: Changing to directory '/etc/ipsec.d/crls'
pluto[10335]:   Warning: empty directory
pluto[10335]: added connection description "wireless_vpn"
pluto[10335]: listening for IKE messages
pluto[10335]: adding interface eth1/eth1 192.168.1.13
pluto[10335]: adding interface lo/lo 127.0.0.1
pluto[10335]: adding interface lo/lo ::1
pluto[10335]: loading secrets from "/etc/ipsec.secrets"

I think this is OK. Then the Mac tries to connect:

pluto[10335]: packet from 192.168.1.2:500: ignoring Vendor ID payload 
[4df37928e9fc4fd1b3262170d515c662]
pluto[10335]: "wireless_vpn"[1] 192.168.1.129 #1: responding to Main 
Mode from unknown peer 192.168.1.129
pluto[10335]: "wireless_vpn"[1] 192.168.1.129 #1: transition from state 
(null) to state STATE_MAIN_R1
pluto[10335]: "wireless_vpn"[1] 192.168.1.129 #1: ignoring Vendor ID 
payload [KAME/racoon]
pluto[10335]: "wireless_vpn"[1] 192.168.1.129 #1: transition from state 
STATE_MAIN_R1 to state STATE_MAIN_R2
pluto[10335]: "wireless_vpn"[1] 192.168.1.129 #1: Peer ID is 
ID_IPV4_ADDR: '192.168.1.129'
pluto[10335]: "wireless_vpn"[1] 192.168.1.129 #1: I did not send a 
certificate because I do not have one.
pluto[10335]: "wireless_vpn"[1] 192.168.1.129 #1: transition from state 
STATE_MAIN_R2 to state STATE_MAIN_R3
pluto[10335]: "wireless_vpn"[1] 192.168.1.129 #1: sent MR3, ISAKMP SA 
established
pluto[10335]: "wireless_vpn"[1] 192.168.1.129 #1: cannot respond to 
IPsec SA request because no connection is known for 
192.168.1.13:17/1701...192.168.1.129:17/%any
pluto[10335]: "wireless_vpn"[1] 192.168.1.129 #1: sending encrypted 
notification INVALID_ID_INFORMATION to 192.168.1.129:500
pluto[10335]: "wireless_vpn"[1] 192.168.1.129 #1: Quick Mode I1 message 
is unacceptable because it uses a previously used Message ID 0xe09d5e0f 
(perhaps this is a duplicated packet)

I seems that the rightprotoport=udp/%any is the problem.


Regards, Beat

-- 
Beat ZAHND
Physics Institute
University of Bern                   phone  +41 31 631 3466
Sidlerstrasse 5                      fax    +41 31 631 4405
CH-3012 Bern (Switzerland)  mailto:beat.zahnd at phim.unibe.ch


More information about the Users mailing list