[Openswan Users] ASSERTION FAILED at state.c:316: st->st_suspended_md->st == st

Steve steve at wanalan.com
Thu Jul 21 14:05:37 CEST 2005


Hi Guys,

I am using 2.3.1.
When I select auth by secret but do not provide any psk to the local 
server (remote server does have psk):

ipsec auto --up Conn171
104 "Conn171" #2: STATE_MAIN_I1: initiate
003 "Conn171" #2: received Vendor ID payload [Dead Peer Detection]
003 "Conn171" #2: Can't authenticate: no preshared key found for 
`192.168.250.198' and `192.168.250.171'.  Attribute 
OAKLEY_AUTHENTICATION_METHOD
003 "Conn171" #2: no acceptable Oakley Transform
214 "Conn171" #2: STATE_MAIN_I1: NO_PROPOSAL_CHOSEN

After waiting for a while it stucked at this stage so i pressed CTRL-C. 
And I try again:

ipsec auto --up Conn171

This time again nothing coming out (which i think is correct because 
it's in hold stage). Now, i try to bring it down:

ipsec auto --down Conn171
003 "Conn171" #2: *ASSERTION FAILED at state.c:316: 
st->st_suspended_md->st == st***
000 "Conn171" #2: interface ipsec0/eth0 192.168.250.198
000 "Conn171" #2: %myid = (none)
000 "Conn171" #2: debug none
000 "Conn171" #2:
000 "Conn171" #2: algorithm ESP encrypt: id=3, name=ESP_3DES, ivlen=64, 
keysizemin=168, keysizemax=168
000 "Conn171" #2: algorithm ESP encrypt: id=12, name=ESP_AES, ivlen=128, 
keysizemin=128, keysizemax=256
000 "Conn171" #2: algorithm ESP auth attr: id=1, 
name=AUTH_ALGORITHM_HMAC_MD5, keysizemin=128, keysizemax=128
000 "Conn171" #2: algorithm ESP auth attr: id=2, 
name=AUTH_ALGORITHM_HMAC_SHA1, keysizemin=160, keysizemax=160
000 "Conn171" #2:
000 "Conn171" #2: algorithm IKE encrypt: id=7, name=OAKLEY_AES_CBC, 
blocksize=16, keydeflen=128
000 "Conn171" #2: algorithm IKE encrypt: id=5, name=OAKLEY_3DES_CBC, 
blocksize=8, keydeflen=192
000 "Conn171" #2: algorithm IKE hash: id=2, name=OAKLEY_SHA1, hashsize=20
000 "Conn171" #2: algorithm IKE hash: id=1, name=OAKLEY_MD5, hashsize=16
000 "Conn171" #2: algorithm IKE dh group: id=2, 
name=OAKLEY_GROUP_MODP1024, bits=1024
000 "Conn171" #2: algorithm IKE dh group: id=5, 
name=OAKLEY_GROUP_MODP1536, bits=1536
000 "Conn171" #2: algorithm IKE dh group: id=14, 
name=OAKLEY_GROUP_MODP2048, bits=2048
000 "Conn171" #2: algorithm IKE dh group: id=15, 
name=OAKLEY_GROUP_MODP3072, bits=3072
000 "Conn171" #2: algorithm IKE dh group: id=16, 
name=OAKLEY_GROUP_MODP4096, bits=4096
000 "Conn171" #2: algorithm IKE dh group: id=17, 
name=OAKLEY_GROUP_MODP6144, bits=6144
000 "Conn171" #2: algorithm IKE dh group: id=18, 
name=OAKLEY_GROUP_MODP8192, bits=8192
000 "Conn171" #2:
000 "Conn171" #2: stats db_ops.c: {curr_cnt, total_cnt, maxsz} 
:context={0,0,0} trans={0,0,0} attrs={0,0,0}
000 "Conn171" #2:
000 *"Conn171" #2: "Conn171":* 
192.168.8.0/24===192.168.250.198---192.168.250.254...192.168.250.254---192.168.250.171===192.168.7.0/24; 
unrouted; eroute owner: #0
000 *"Conn171" #2: "Conn171":*     srcip=unset; dstip=unset
000 *"Conn171" #2: "Conn171":*   ike_life: 3600s; ipsec_life: 28800s; 
rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 1
000 *"Conn171" #2: "Conn171":*   policy: PSK+ENCRYPT+TUNNEL+PFS; prio: 
24,24; interface: eth0;
000 *"Conn171" #2: "Conn171":*   dpd: action:hold; delay:30; timeout:120;
000 *"Conn171" #2: "Conn171":*   newest ISAKMP SA: #0; newest IPsec SA: #0;
000 *"Conn171" #2: "Conn171":*   ESP algorithms wanted: 3_000-1, 
flags=strict
000 *"Conn171" #2: "Conn171":*   ESP algorithms loaded: 3_000-1, 
flags=strict
000 *"Conn171" #2: "Conn191":* 
192.168.25.0/24===192.168.250.198---192.168.250.254...192.168.250.254---192.168.2.2[@geeee]===2.1.21.0/24; 
unrouted; eroute owner: #0
000 *"Conn171" #2: "Conn191":*     srcip=unset; dstip=unset
000 *"Conn**1" #2: "Conn191"**17:*   ike_life: 3600s; ipsec_life: 
28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 1
000 *"Conn171" #2: "Conn191":*   policy: PSK+ENCRYPT+TUNNEL+PFS; prio: 
24,24; interface: eth0;
000 *"Conn171" #2: "Conn191":*   newest ISAKMP SA: #0; newest IPsec SA: #0;
000 *"Conn171" #2: "Conn191":*   ESP algorithms wanted: 12_128-2, 
flags=-strict
000 *"Conn171" #2: "Conn191":*   ESP algorithms loaded: 12_128-2, 
flags=-strict
000 *"Conn171" #2: "Conn203":* 
1.1.0.0/23===192.168.250.198---192.168.250.254...192.168.250.254---12.22.2.2===22.12.12.0/24; 
unrouted; eroute owner: #0
000 *"Conn171" #2: "Conn203":*     srcip=unset; dstip=unset
000 *"Conn171" #2: "Conn203":*   ike_life: 3600s; ipsec_life: 28800s; 
rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 1
000 *"Conn171" #2: "Conn203":*   policy: PSK+ENCRYPT+TUNNEL+PFS; prio: 
23,24; interface: eth0;
000 *"Conn171" #2: "Conn203":*   newest ISAKMP SA: #0; newest IPsec SA: #0;
000 *"Conn171" #2: "Conn203":*   ESP algorithms wanted: 12_128-2, 
flags=-strict
000 *"Conn171" #2: "Conn203":*   ESP algorithms loaded: 12_128-2, 
flags=-strict
000 "Conn171" #2:
000 *"Conn171" #2: #2: "Conn171":500* STATE_MAIN_I1 (sent MI1, expecting 
MR1); none in -1s; lastdpd=-1s(seq in:0 out:0)
000 "Conn171" #2:

Any one having similar problems?

Thank you.

Regards,
Steve



More information about the Users mailing list