[Openswan Users] Not passing the "STATE_QUICK_I1: initiate"
Oliver Schulze L.
oliver at samera.com.py
Tue Nov 8 18:32:53 CET 2005
Hi Andy and Paul,
it worked, ipsec0 is up!
May problem was indeed a policy mismatch, as Andy noted.
I had to setup like this:
left=172.xx.219.14
leftnexthop=172.xx.219.13
leftsubnet=192.168.150.1/32
right=10.xx.200.2
rightnexthop=10.xx.200.1
rightsubnet=10.1.254.63/32
ipsec started like this:
# /usr/sbin/ipsec auto --up ipsec01
104 "ipsec01" #1: STATE_MAIN_I1: initiate
106 "ipsec01" #1: STATE_MAIN_I2: sent MI2, expecting MR2
003 "ipsec01" #1: received Vendor ID payload [Cisco-Unity]
003 "ipsec01" #1: received Vendor ID payload [Dead Peer Detection]
003 "ipsec01" #1: ignoring unknown Vendor ID payload
[56e1df6547da1ce2e04d274cda4f3d6f]
003 "ipsec01" #1: received Vendor ID payload [XAUTH]
108 "ipsec01" #1: STATE_MAIN_I3: sent MI3, expecting MR3
004 "ipsec01" #1: STATE_MAIN_I4: ISAKMP SA established
{auth=OAKLEY_PRESHARED_KEY cipher=oakley_3des_cbc_192 prf=oakley_sha
group=modp1536}
117 "ipsec01" #2: STATE_QUICK_I1: initiate
003 "ipsec01" #2: ignoring informational payload, type
IPSEC_RESPONDER_LIFETIME
004 "ipsec01" #2: STATE_QUICK_I2: sent QI2, IPsec SA established
{ESP=>0x22287613 <0x44cf8c33 xfrm=3DES_0-HMAC_SHA1 NATD=none DPD=none}
All this is OK, but, I still have no ping.
My setup is rather obscure, I think.
Left:
Linux RH9, eth0 (Internet IP), eth0:1(private VLAN IP), eth1(local
intranet with no hosts connected)
Right:
Cisco, acting as a VPN router to a intranet in 10.xx.254.63
The problem is that both routers, RH9 and Cisco, can only send packets.
They don't
receive any response. I think it may be a problem with the firewall or
route.
With ifconfig I saw this:
ipsec0 Link encap:Ethernet HWaddr
inet addr:172.xx.219.14 Mask:255.255.255.252
UP RUNNING NOARP MTU:16260 Metric:1
RX packets:0 errors:0 dropped:0 overruns:0 frame:0
TX packets:1193 errors:0 dropped:43 overruns:0 carrier:0
collisions:0 txqueuelen:10
RX bytes:0 (0.0 b) TX bytes:178950 (174.7 Kb)
Every time I ping, the TX dropped counter increases.
$ route -n
Kernel IP routing table
Destination Gateway Genmask Flags Metric Ref Use
Iface
10.200.200.2 172.xx.219.13 255.255.255.255 UGH 0 0 0 eth0
172.xx.219.12 0.0.0.0 255.255.255.252 U 0 0 0 eth0
172.xx.219.12 0.0.0.0 255.255.255.252 U 0 0 0
ipsec0
200.xx.36.xx 0.0.0.0 255.255.255.252 U 0 0
0 eth0
192.168.150.0 0.0.0.0 255.255.255.0 U 0 0 0 eth1
10.xx.254.0 0.0.0.0 255.255.255.0 U 0 0 0
ipsec0
169.254.0.0 0.0.0.0 255.255.0.0 U 0 0 0 eth1
127.0.0.0 0.0.0.0 255.0.0.0 U 0 0 0 lo
0.0.0.0 200.xx.xx.xx 0.0.0.0 UG 0 0 0 eth0
I don't know how a route -n in a working RH9 with openswan should
looks like.
When I found the solution, will post it here. Any help is welcome.
Thanks
Oliver
Andy wrote:
>On Tue, 2005-11-08 at 12:45 -0300, Oliver Schulze L. wrote:
>
>
>>Hi,
>>I think there can be a problem this this config.
>>
>>The Cisco Guy(tm) is telling me that he only allows me to go to 1
>>internal host
>>and not to the whole internal network. In the Cisco, only host
>>10.1.254.63/32
>>is "published" in the ipsec
>>
>>I, in ipsec.conf, configure his internal network as:
>>rightsubnet=10.1.254.0/24
>>
>>
>Your policy and his must match exactly. If his access list specifies
>10.1.254.63/32, that's what you need to set for your rightsubnet.
>Likewise for the internal network your side (leftsubnet).
>
>
>
>>Another thing, don't know if this matters, but ipsec verify returns:
>>Checking your system to see if IPsec got installed and started correctly:
>>Version check and ipsec on-path [OK]
>>Linux Openswan Ucvs2002Mar11_19:19:03/K2.1.2rc3 (klips)
>>Checking for IPsec support in kernel [OK]
>>Checking for RSA private key (/etc/ipsec.secrets) [FAILED]
>>ipsec showhostkey: no default key in "/etc/ipsec.secrets"
>>Checking that pluto is running [OK]
>>Two or more interfaces found, checking IP forwarding [OK]
>>Checking NAT and MASQUERADEing [OK]
>>Checking for 'ip' command [OK]
>>Checking for 'iptables' command [OK]
>>Opportunistic Encryption Support [DISABLED]
>>
>>I'm not using RSA, just a PreSharedSecret, and
>> authby=secret
>>in ipsec.conf
>>
>>
>You don't need an RSA then.
>
>
>
>>Will post more info in a few hours.
>>
>>Many thanks
>>Oliver
>>
>>Andy wrote:
>>
>>
>>
>>>To debug it further, you'll need some help from the Cisco end - get the
>>>Cisco config and post it here, along with your config, we may be able to
>>>help. Also, try to enable debug for ipsec on the Cisco and see what that
>>>tells us.
>>>
>>>
>>>
>>>
--
Oliver Schulze L.
<oliver at samera.com.py>
More information about the Users
mailing list