[Openswan Users] Aggressive mode, NAT-T, destination behind NAT
Brian Candler
B.Candler at pobox.com
Mon Apr 10 17:15:19 CEST 2006
Here's a different scenario which fails with 2.4.5 (it failed with 2.4.4
too)
I'm using aggressive mode to attempt to set up a connection to a PIX. This
PIX is behind a static NAT router/firewall. Ultimately this connection will
be authenticated using XAUTH, but it doesn't get that far.
[Why am I doing this? It's our normal office VPN for roaming users. I must
use aggressive mode because the userbase is divided into named groups, each
with their own pre-shared key, and aggressive mode is the only way this
works]
So it looks like this:
X.X.X.24 X.X.X.65 10.11.2.13
openswan ------------------------ FW ----------------- PIX
<---->
static NAT
Here's what happens:
root at OpenWrt:~# ipsec auto --verbose --up office
002 "office" #1: initiating Aggressive Mode #1, connection "office"
112 "office" #1: STATE_AGGR_I1: initiate
003 "office" #1: received Vendor ID payload [Cisco-Unity]
003 "office" #1: received Vendor ID payload [XAUTH]
003 "office" #1: received Vendor ID payload [Dead Peer Detection]
003 "office" #1: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03] method set to=108
003 "office" #1: ignoring unknown Vendor ID payload [4048b7d56ebce88525e7de7f00d6c2d3c0000000]
003 "office" #1: ignoring unknown Vendor ID payload [0638090dd106127d208deea97fa5210a]
003 "office" #1: ignoring Vendor ID payload [Cisco VPN 3000 Series]
003 "office" #1: protocol/port in Phase 1 ID Payload must be 0/0 or 17/500 but are 17/0
002 "office" #1: Aggressive mode peer ID is ID_IPV4_ADDR: '10.11.2.13'
003 "office" #1: no suitable connection for peer '10.11.2.13'
003 "office" #1: initial Aggressive Mode packet claiming to be from X.X.X.65 on X.X.X.65 but no connection has been authorized
218 "office" #1: STATE_AGGR_I1: INVALID_ID_INFORMATION
002 "office" #1: sending notification INVALID_ID_INFORMATION to X.X.X.65:500
Configs:
[/etc/ipsec.conf]
version 2.0
config setup
nat_traversal=yes
plutodebug="natt control"
conn office
ike=3des-md5-modp1024
aggrmode=yes
authby=secret
left=%defaultroute
leftid=@mygroup
leftxauthclient=yes
leftmodecfgclient=yes
right=X.X.X.65
rightxauthserver=yes
rightmodecfgserver=yes
pfs=no
auto=add
#Disable Opportunistic Encryption
include /etc/ipsec.d/examples/no_oe.conf
[/etc/ipsec.secrets]
@mygroup X.X.X.65 : PSK "..."
This works using the Cisco client for Linux, and vpnc under FreeBSD, but not
with Openswan 2.4.5.
Openswan logs don't show any NAT-T decision-making, even though natt logging
is on. I think it's simply not getting that far.
Any suggestions?
Regards,
Brian.
More information about the Users
mailing list