[Openswan Users] Not passing the "STATE_QUICK_I1: initiate"

Oliver Schulze L. oliver at samera.com.py
Tue Nov 8 12:30:10 CET 2005


Many thanks Andy and Paul for answering,
I think I'n getting closer and closer

Looking in the logs, I get this:
$ ipsec barf
...
Nov  5 01:16:01 server01 pluto[7045]: "ipsec01" #1588: initiating Quick 
Mode PSK+ENCRYPT+TUNNEL+UP {using isakmp#1587}
Nov  5 01:16:01 server01 pluto[7045]: "ipsec01" #1587: ignoring 
informational payload, type NO_PROPOSAL_CHOSEN
Nov  5 01:16:01 server01 pluto[7045]: "ipsec01" #1587: received and 
ignored informational message
Nov  5 01:16:38 server01 pluto[7045]: "ipsec01": terminating SAs using 
this connection
Nov  5 01:16:38 server01 pluto[7045]: "ipsec01" #1588: deleting state 
(STATE_QUICK_I1)
Nov  5 01:16:38 server01 pluto[7045]: "ipsec01" #1587: deleting state 
(STATE_MAIN_I4)

$ ipsec auto --verbose --up ipsec01
...
 031 "ipsec01" #1604: max number of retransmissions (2) reached 
STATE_QUICK_I1.  No acceptable response to our first Quick Mode message: 
perhaps peer likes no proposal
000 "ipsec01" #1604: starting keying attempt 2 of an unlimited number, 
but releasing whack

I think I have a problem with: "NO_PROPOSAL_CHOSEN" or "peer likes no 
proposal"

I will talk to the Cisco guy if he knows something about this.
If I can get this ipsec to start, will write a mini-howto to the wiki ;)

Thanks
Oliver


Paul Wouters wrote:

>On Mon, 7 Nov 2005, Oliver Schulze L. wrote:
>
>  
>
>>{auth=OAKLEY_PRESHARED_KEY cipher=oakley_3des_cbc_192 prf=oakley_sha
>>group=modp1536}
>>002 "ipsec01" #1588: initiating Quick Mode PSK+ENCRYPT+TUNNEL+UP {using
>>isakmp#1587}
>>117 "ipsec01" #1588: STATE_QUICK_I1: initiate
>>010 "ipsec01" #1588: STATE_QUICK_I1: retransmission; will wait 20s for
>>response
>>
>>1. You have set 3DES/MD5 at one end and 3DES/SHA1 at the other, or some
>>similar misconfiguration.
>>    
>>
>
>Can can explicitely set:
>	ike=3des-md5
>	esp=3des-md5
>
>or exchange md5 for sha1 in the above lines
>
>  
>
>>2. Your access lists are set up wrong on the PIX. For example, access-list
>>FREESWAN-VPN permit ip 10.7.3.0 255.255.255.0 10.69.1.0 255.255.255.0 will
>>work, where access-list FREESWAN-VPN permit ip 10.7.3.0 255.255.255.0 host
>>202.0.45.170 while it appears to do to the same thing, will cause problems at
>>this point when the ?
>><http://wiki.openswan.org/index.php/ISAKMP?action=create>_ISAKMP_ phase has
>>finished, and the actual establishing of the tunnel begins.
>>    
>>
>
>For this you will need the logs on the other end. As suggested by Andy, you
>can also try pfs=no.
>
>Paul
>  
>

-- 
Oliver Schulze L.
<oliver at samera.com.py>



More information about the Users mailing list