[Openswan Users] Openswan / SSH Sentinel problems

Philip Pemberton philpem at dsl.pipex.com
Fri Nov 25 23:51:13 CET 2005


Hi,
  I've got an Openswan VPN set up between my firewall/router and a laptop
(via a wireless access point). For some reason, though, if I run SSH
Sentinel's diagnostics, I get this in /var/log/secure:

----------8<----------
root at polaris:~# tail /var/log/secure
Nov 25 23:13:52 polaris pluto[4265]: "roadwarrior"[1] 10.1.0.16 #1: transition from state STATE_MAIN_R1 to state STATE_MAIN_R2
Nov 25 23:13:52 polaris pluto[4265]: "roadwarrior"[1] 10.1.0.16 #1: STATE_MAIN_R2: sent MR2, expecting MI3
Nov 25 23:13:53 polaris pluto[4265]: "roadwarrior"[1] 10.1.0.16 #1: ignoring informational payload, type IPSEC_INITIAL_CONTACT
Nov 25 23:13:53 polaris pluto[4265]: "roadwarrior"[1] 10.1.0.16 #1: Main mode peer ID is ID_DER_ASN1_DN: 'C=GB, ST=West Yorkshire, L=Leeds, O=Philpem VPN, CN=Philip Pemberton, E=philpem at dsl.pipex.com'
Nov 25 23:13:53 polaris pluto[4265]: "roadwarrior"[2] 10.1.0.16 #1: deleting connection "roadwarrior" instance with peer 10.1.0.16 {isakmp=#0/ipsec=#0}
Nov 25 23:13:53 polaris pluto[4265]: "roadwarrior"[2] 10.1.0.16 #1: I am sending my cert
Nov 25 23:13:53 polaris pluto[4265]: "roadwarrior"[2] 10.1.0.16 #1: transition from state STATE_MAIN_R2 to state STATE_MAIN_R3
Nov 25 23:13:53 polaris pluto[4265]: "roadwarrior"[2] 10.1.0.16 #1: STATE_MAIN_R3: sent MR3, ISAKMP SA established {auth=OAKLEY_RSA_SIG cipher=aes_128 prf=oakley_md5 group=modp1024}
Nov 25 23:13:54 polaris pluto[4265]: "roadwarrior"[2] 10.1.0.16 #1: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===10.1.0.1[C=GB, ST=West Yorkshire, L=Leeds, O=Philpem VPN, CN=Polaris VPN server, E=vpn at philpem.me.uk]...10.1.0.16[C=GB, ST=West Yorkshire, L=Leeds, O=Philpem VPN, CN=Philip Pemberton, E=philpem at dsl.pipex.com]===127.0.0.1/32
Nov 25 23:13:54 polaris pluto[4265]: "roadwarrior"[2] 10.1.0.16 #1: sending encrypted notification INVALID_ID_INFORMATION to 10.1.0.16:500
----------8<----------

.. and the diagnostic fails with the error "IKE Phase-2 / Exchanging IPSec
Proposals FAILED". If I connect normally (using "Select VPN"), I get this in
/var/log/secure:

----------8<----------
Nov 25 23:47:47 polaris pluto[3482]: "roadwarrior"[2] 10.1.0.16 #3: ignoring informational payload, type IPSEC_INITIAL_CONTACT
Nov 25 23:47:47 polaris pluto[3482]: "roadwarrior"[2] 10.1.0.16 #3: Main mode peer ID is ID_DER_ASN1_DN: 'C=GB, ST=West Yorkshire, L=Leeds, O=Philpem VPN, CN=Philip Pemberton, E=philpem at dsl.pipex.com'
Nov 25 23:47:47 polaris pluto[3482]: "roadwarrior"[2] 10.1.0.16 #3: I am sending my cert
Nov 25 23:47:47 polaris pluto[3482]: "roadwarrior"[2] 10.1.0.16 #3: transition from state STATE_MAIN_R2 to state STATE_MAIN_R3
Nov 25 23:47:47 polaris pluto[3482]: "roadwarrior"[2] 10.1.0.16 #3: STATE_MAIN_R3: sent MR3, ISAKMP SA established {auth=OAKLEY_RSA_SIG cipher=oakley_3des_cbc_192 prf=oakley_md5 group=modp1024}
Nov 25 23:47:47 polaris pluto[3482]: "roadwarrior-all"[1] 10.1.0.16 #4: responding to Quick Mode {msgid:db287de1}
Nov 25 23:47:47 polaris pluto[3482]: "roadwarrior-all"[1] 10.1.0.16 #4: transition from state STATE_QUICK_R0 to state STATE_QUICK_R1
Nov 25 23:47:47 polaris pluto[3482]: "roadwarrior-all"[1] 10.1.0.16 #4: STATE_QUICK_R1: sent QR1, inbound IPsec SA installed, expecting QI2
Nov 25 23:47:48 polaris pluto[3482]: "roadwarrior-all"[1] 10.1.0.16 #4: transition from state STATE_QUICK_R1 to state STATE_QUICK_R2
Nov 25 23:47:48 polaris pluto[3482]: "roadwarrior-all"[1] 10.1.0.16 #4: STATE_QUICK_R2: IPsec SA established {ESP=>0x52b10880 <0x566c1cb2 xfrm=3DES_0-HMAC_MD5 NATD=none DPD=none}
----------8<----------

.. and the connection succeeds (?!).

Here's my ipsec.conf:

----------8<----------
## based on http://www.natecarlson.com/linux/ipsec-x509.php

version 2.0     # conforms to second version of ipsec.conf specification

# basic configuration
config setup
        interfaces="ipsec0=eth1"
        nat_traversal=yes
        virtual_private=%v4:10.0.0.0/8,%v4:172.16.0.0/12,%v4:192.168.0.0/16

conn %default
        keyingtries=1
        compress=yes
        disablearrivalcheck=no
        authby=rsasig
        leftrsasigkey=%cert
        rightrsasigkey=%cert

conn roadwarrior-net
        leftsubnet=10.1.0.0/16
        also=roadwarrior

conn roadwarrior-all
        leftsubnet=0.0.0.0/0
        also=roadwarrior

conn roadwarrior-l2tp
        pfs=no
        leftprotoport=17/0
        rightprotoport=17/1701
        also=roadwarrior

conn roadwarrior-l2tp-updatedwin
        pfs=no
        leftprotoport=17/1701
        rightprotoport=17/1701
        also=roadwarrior

conn roadwarrior
        left=10.1.0.1
        leftcert=host.polaris.pem
        right=%any
        rightsubnet=vhost:%no,%priv
        auto=add
        pfs=yes

#Disable Opportunistic Encryption
include /etc/ipsec.d/examples/no_oe.conf
----------8<----------

Does anyone have any idea what might be going on?

Thanks.
-- 
Phil.                              | Acorn RiscPC600 SA220 64MB+6GB 100baseT
philpem at philpem.me.uk              | Athlon64 3200+ A8VDeluxe R2 512MB+100GB
http://www.philpem.me.uk/          | Panasonic CF-25 Mk.2 Toughbook
... Outlaw junk mail, and save the trees!


More information about the Users mailing list