[Openswan Users]
checkpoint->openS/WAN tries to initiate /32 IPsec SA for every NEW
connection
Albert Siersema
appie at friendly.net
Thu Jun 23 10:16:29 CEST 2005
Hello all,
To clear up and eleborate on my previous post, I discovered that the
checkpoint firewall tries to setup seperate IPsec SAs for every single
host (/32) that initiates a new connection (NEW from a stateful firewall
state machine perspective, e.g. ICMP ping echo request, TCP with SYN, etc.)
Connections from openswan to checkpoint and corresponding reply traffic
are tunneled without any problems.
I know this probably is a checkpoint issue, but since I couldn't get
any answers from checkpoint knowhowwies (or googling or interop docs)
and there's after all an IPsec crowd on this list i was hoping that someone
can point me
Albert Siersema wrote:
> Hello peoples,
>
> I'm trying to set up a network<->network (tunnel mode) tunnel with a
> nokia checkpoint firewall. No problems with freeswan but after upgrading to
> openswan we're in trouble.
>
> The network<->network tunnel (ISAKMP+IPsec SA) seems to be up&running
> with this config:
>
> auth=esp
> authby=secret
> pfs=yes
> leftsendcert=no
> left=a.b.c.d
> leftsubnet=10.0.0.0/255.255.0.0
> right=e.f.g.h
> rightsubnet=10.1.0.0/255.255.0.0
> ikelifetime=480m
> keylife=28800
> type=tunnel
>
> (yes i know, tunnel is the default type anyway and 480m == 28800 :-).
> At least, the log file states "IPsec SA established" (along with ISAKMP
> SA of course) and i'm able to ping a host in the 10.1 network.
>
> However, the log files keep mentioning:
>
> cannot respond to IPsec SA request because no connection is known for
> 10.0.0.12/32===a.b.c.d[S-C]...e.f.g.h===10.1.9.100/32
>
> sending encrypted notification INVALID_MESSAGE_ID to e.f.g.h:500
> Quick Mode I1 message is unacceptable because it uses a previously used
> Message ID 0xaaaaaaaaa (perhaps this is a duplicated packet)
>
> I was told the remote firewall is configured with NAT-T disabled and
> matching configuration (otherwise the one IPsec SA wouldn't be
> established in the first place).
>
> Could anyone point me in the right direction where to look ?
> What does the [S-C] in the logs mean by the way ?
> See below for ipsec status
>
> TIA,
> Albert
>
> --------------
>
> 000 interface ipsec0/eth1 a.b.c.d
> 000 %myid = (none)
> 000 debug none
> 000
> 000 algorithm ESP encrypt: id=3, name=ESP_3DES, ivlen=64,
> keysizemin=168, keysizemax=168
> 000 algorithm ESP encrypt: id=12, name=ESP_AES, ivlen=128,
> keysizemin=128, keysizemax=256
> 000 algorithm ESP auth attr: id=1, name=AUTH_ALGORITHM_HMAC_MD5,
> keysizemin=128, keysizemax=128
> 000 algorithm ESP auth attr: id=2, name=AUTH_ALGORITHM_HMAC_SHA1,
> keysizemin=160, keysizemax=160
> 000
> 000 algorithm IKE encrypt: id=7, name=OAKLEY_AES_CBC, blocksize=16,
> keydeflen=128
> 000 algorithm IKE encrypt: id=5, name=OAKLEY_3DES_CBC, blocksize=8,
> keydeflen=192
> 000 algorithm IKE hash: id=2, name=OAKLEY_SHA, hashsize=20
> 000 algorithm IKE hash: id=1, name=OAKLEY_MD5, hashsize=16
> 000 algorithm IKE dh group: id=2, name=OAKLEY_GROUP_MODP1024, bits=1024
> 000 algorithm IKE dh group: id=5, name=OAKLEY_GROUP_MODP1536, bits=1536
> 000 algorithm IKE dh group: id=14, name=OAKLEY_GROUP_MODP2048, bits=2048
> 000 algorithm IKE dh group: id=15, name=OAKLEY_GROUP_MODP3072, bits=3072
> 000 algorithm IKE dh group: id=16, name=OAKLEY_GROUP_MODP4096, bits=4096
> 000 algorithm IKE dh group: id=17, name=OAKLEY_GROUP_MODP6144, bits=6144
> 000 algorithm IKE dh group: id=18, name=OAKLEY_GROUP_MODP8192, bits=8192
> 000
> 000 stats db_ops.c: {curr_cnt, total_cnt, maxsz} :context={0,6,36}
> trans={0,6,96} attrs={0,6,160}
> 000
> 000 "ME-THEM": 10.0.0.0/16===a.b.c.d[S-C]...e.f.g.h===10.1.0.0/16;
> erouted; eroute owner: #14
> 000 "ME-THEM": ike_life: 28800s; ipsec_life: 28800s; rekey_margin:
> 540s; rekey_fuzz: 100%; keyingtries: 0
> 000 "ME-THEM": policy: PSK+ENCRYPT+TUNNEL+PFS+UP; prio: 16,16;
> interface: eth1;
> 000 "ME-THEM": newest ISAKMP SA: #17; newest IPsec SA: #14;
> 000 "ME-THEM": IKE algorithms wanted: 5_000-1-5, 5_000-1-2, 5_000-2-5,
> 5_000-2-2, flags=-strict
> 000 "ME-THEM": IKE algorithms found: 5_192-1_128-5, 5_192-1_128-2,
> 5_192-2_160-5, 5_192-2_160-2,
> 000 "ME-THEM": IKE algorithm newest: 3DES_CBC_192-MD5-MODP1024
> 000 "ME-THEM": ESP algorithms wanted: 3_000-1, 3_000-2, flags=-strict
> 000 "ME-THEM": ESP algorithms loaded: 3_000-1, 3_000-2, flags=-strict
> 000 "ME-THEM": ESP algorithm newest: 3DES_0-HMAC_MD5; pfsgroup=<Phase1>
> 000
> 000 #16: "ME-THEM" STATE_MAIN_R3 (sent MR3, ISAKMP SA established);
> EVENT_SA_REPLACE in 28055s
> 000 #15: "ME-THEM" STATE_MAIN_R3 (sent MR3, ISAKMP SA established);
> EVENT_SA_REPLACE in 27743s
> 000 #14: "ME-THEM" STATE_QUICK_I2 (sent QI2, IPsec SA established);
> EVENT_SA_REPLACE in 26714s; newest IPSEC; eroute owner
> 000 #14: "ME-THEM" esp.cce2061d at e.f.g.h esp.76e85b42 at a.b.c.d
> tun.1004 at e.f.g.h tun.1003 at a.b.c.d
> 000 #13: "ME-THEM" STATE_MAIN_I4 (ISAKMP SA established);
> EVENT_SA_REPLACE in 26715s
> 000 #17: "ME-THEM" STATE_MAIN_R3 (sent MR3, ISAKMP SA established);
> EVENT_SA_REPLACE in 28367s; newest ISAKMP
>
> _______________________________________________
> Users mailing list
> Users at openswan.org
> http://lists.openswan.org/mailman/listinfo/users
More information about the Users
mailing list