[Openswan Users] WLAN IPsec implementation
Zach
zach at zerobit.net
Thu May 12 20:04:11 CEST 2005
Hello everyone, I'm having a difficult time setting up a VPN connection
between my XP2/SP2 notebook and Ubuntu box running Openswan 2.3.1 (My
problem seg faults 2.3.0). Here's the log of what's happening.
May 12 18:30:03 localhost pluto[10804]: "wireless"[2] 192.168.2.2 #1:
transition from state STATE_MAIN_R2 to state STATE_MAIN_R3
May 12 18:30:03 localhost pluto[10804]: | sending reply packet to
192.168.2.2:500 (from port=500)
May 12 18:30:03 localhost pluto[10804]: | sending 1212 bytes for
STATE_MAIN_R2 through eth1:500 to 192.168.2.2:500:
<1212 bytes follow>
May 12 18:30:04 localhost pluto[10804]: | inserting event EVENT_SA_EXPIRE,
timeout in 28800 seconds for #1
May 12 18:30:04 localhost pluto[10804]: "wireless"[2] 192.168.2.2 #1: sent
MR3, ISAKMP SA established
May 12 18:30:04 localhost pluto[10804]: | modecfg pull: noquirk policy:push
not-client
May 12 18:30:04 localhost pluto[10804]: | phase 1 is done, looking for phase
1 to unpend
May 12 18:30:04 localhost pluto[10804]: | next event EVENT_NAT_T_KEEPALIVE
in 10 seconds
May 12 18:30:04 localhost pluto[10804]: |
May 12 18:30:04 localhost pluto[10804]: | *received 1332 bytes from
192.168.2.2:500 on eth1 (port=500)
<1332 bytes follow>
May 12 18:30:05 localhost pluto[10804]: | **parse ISAKMP Message:
May 12 18:30:05 localhost pluto[10804]: | initiator cookie:
May 12 18:30:05 localhost pluto[10804]: | e5 c4 e4 fb 70 bd f9 bf
May 12 18:30:05 localhost pluto[10804]: | responder cookie:
May 12 18:30:05 localhost pluto[10804]: | 75 1e 16 f8 27 4b 9a 19
May 12 18:30:05 localhost pluto[10804]: | next payload type:
ISAKMP_NEXT_ID
May 12 18:30:05 localhost pluto[10804]: | ISAKMP version: ISAKMP Version
1.0
May 12 18:30:05 localhost pluto[10804]: | exchange type:
ISAKMP_XCHG_IDPROT
May 12 18:30:05 localhost pluto[10804]: | flags: ISAKMP_FLAG_ENCRYPTION
May 12 18:30:05 localhost pluto[10804]: | message ID: 00 00 00 00
May 12 18:30:05 localhost pluto[10804]: | length: 1332
May 12 18:30:05 localhost pluto[10804]: | ICOOKIE: e5 c4 e4 fb 70 bd f9 bf
May 12 18:30:05 localhost pluto[10804]: | RCOOKIE: 75 1e 16 f8 27 4b 9a 19
May 12 18:30:05 localhost pluto[10804]: | peer: c0 a8 02 02
May 12 18:30:05 localhost pluto[10804]: | state hash entry 27
May 12 18:30:05 localhost pluto[10804]: | peer and cookies match on #1,
provided msgid 00000000 vs 00000000
May 12 18:30:05 localhost pluto[10804]: | state object #1 found, in
STATE_MAIN_R3
May 12 18:30:05 localhost pluto[10804]: | processing connection wireless[2]
192.168.2.2
May 12 18:30:05 localhost pluto[10804]: "wireless"[2] 192.168.2.2 #1:
retransmitting in response to duplicate packet; already STATE_MAIN_R3
May 12 18:30:05 localhost pluto[10804]: | sending 1212 bytes for retransmit
in response to duplicate through eth1:500 to 192.168.2.2:500:
<1212 bytes follow>
Does that a couple times and fails on the windows side. Here's my
ipsec.conf:
# /etc/ipsec.conf - Openswan IPsec configuration file
# RCSID $Id: ipsec.conf.in,v 1.13 2004/03/24 04:14:39 ken Exp $
# This file: /usr/share/doc/openswan/ipsec.conf-sample
#
# Manual: ipsec.conf.5
version 2.0 # conforms to second version of ipsec.conf specification
# basic configuration
config setup
# Debug-logging controls: "none" for (almost) none, "all" for lots.
klipsdebug=none
plutodebug=all
virtual_private=%v4:10.0.0.0/8,%v4:172.16.0.0/12,%v4:192.168.0.0/16
nat_traversal=yes < - does the same if off
# Add connections here
# Left security gateway, subnet behind it, next hop toward right.
conn %default
left=192.168.2.1
leftsubnet=192.168.2.1/32
leftrsasigkey=%cert
rightrsasigkey=%cert
leftcert=host.cert.pem
pfs=yes
conn wireless
leftprotoport=17/1701
rightprotoport=17/1701
pfs=no
rekey=no
right=%any
rightsubnet=vhost:%no,%priv
auto=add
conn conntointernet
leftsubnet=0.0.0.0/0
also=wireless
#Disable Opportunistic Encryption
include /etc/ipsec.d/examples/no_oe.conf
Anyone know what might be going on there? Any help would be greatly
appreciated.
Regards, Zach
------------------------------------------------
PGP public key:
http://www.zerobit.net/zach.asc
KeyID:
0x98DEBD82
-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://lists.openswan.org/pipermail/users/attachments/20050512/0e59ef1d/attachment-0001.htm
More information about the Users
mailing list