[Openswan Users] Shaky VPN connections
wangxx at jmu.edu
wangxx at jmu.edu
Wed Apr 12 01:46:50 CEST 2006
Hi all,
I have a VPN server running Linux Openswan U2.3.0/K2.6.9-
5.ELsmp (netkey). This server has a direct Internet
connection and is _not_ behind a NAT.
>From a MS Windows 2000/XP client, we can connect to the VPN
server using IPsec/L2TP combination. It works no matter the
client box is behind a NAT or not.
Our problem is that the VPN connections are pretty shaky and
are dropped from time to time. When there is
large amount of traffic from the VPN client to an internal
host (behind the VPN server), the VPN connection is dropped
faster.
I checked the /var/log/messages and got the following
---------- /var/log/messages BEGINS ---------
Apr 11 19:47:27 localhost pppd[4144]: LCP terminated by peer
(g5 ^]^@<M-Mt^@^@^@^@)
Apr 11 19:47:27 localhost kernel: device ppp0 left
promiscuous mode
Apr 11 19:47:30 localhost pppd[4144]: Connection terminated.
Apr 11 19:47:30 localhost pppd[4144]: Connect time 24.1
minutes.
Apr 11 19:47:30 localhost pppd[4144]: Sent 2729378 bytes,
received 3226369 bytes.
Apr 11 19:47:31 localhost pppd[4144]: Connect time 24.1
minutes.
---------- /var/log/messages BEGINS ---------
Also, in /var/log/secure, we found the following items:
---------- /var/log/secure BEGINS ---------
Apr 11 19:47:27 localhost pluto[2900]: "roadwarrior-l2tp"[3]
134.126.34.71 #4: received Delete SA(0x32cd04f2) payload:
deleting IPSEC State #5
Apr 11 19:47:27 localhost pluto [2900]: "roadwarrior-l2tp"[3]
134.126.34.71 #4: received and ignored informational message
Apr 11 19:47:27 localhost pluto [2900]: "roadwarrior-l2tp"[3]
134.126.34.71 #4: received Delete SA payload: deleting
ISAKMP State #4
Apr 11 19:47:27 localhost pluto[2900]: "roadwarrior-l2tp"[3]
134.126.34.71: deleting connection "roadwarrior-l2tp"
instance with peer 134.126.34.71 {isakmp=#0/ipsec=#0}
Apr 11 19:47:27 localhost pluto[2900]: packet from
134.126.34.71:500: received and ignored informational message
---------- /var/log/secure ENDS ---------
Attached is what "ipsec barf" produces on the server.
Does anyone have the same experience? Any clue how to improve
it?
Thanks,
Steve
-------------- next part --------------
crypto
Fri Apr 7 09:14:07 EDT 2006
+ _________________________ version
+ ipsec --version
Linux Openswan U2.3.0/K2.6.9-5.ELsmp (netkey)
See `ipsec --copyright' for copyright information.
+ _________________________ /proc/version
+ cat /proc/version
Linux version 2.6.9-5.ELsmp (bhcompile at decompose.build.redhat.com) (gcc version 3.4.3 20041212 (Red Hat 3.4.3-9.EL4)) #1 SMP Wed Jan 5 19:30:39 EST 2005
+ _________________________ /proc/net/ipsec_eroute
+ test -r /proc/net/ipsec_eroute
+ _________________________ netstat-rn
+ netstat -nr
+ head -100
Kernel IP routing table
Destination Gateway Genmask Flags MSS Window irtt Iface
69.251.186.224 134.126.20.1 255.255.255.255 UGH 0 0 0 eth0
192.168.100.128 0.0.0.0 255.255.255.255 UH 0 0 0 ppp0
192.168.100.0 0.0.0.0 255.255.255.0 U 0 0 0 wlan0
134.126.20.0 0.0.0.0 255.255.255.0 U 0 0 0 eth0
169.254.0.0 0.0.0.0 255.255.0.0 U 0 0 0 eth0
0.0.0.0 134.126.20.1 0.0.0.0 UG 0 0 0 eth0
+ _________________________ /proc/net/ipsec_spi
+ test -r /proc/net/ipsec_spi
+ _________________________ /proc/net/ipsec_spigrp
+ test -r /proc/net/ipsec_spigrp
+ _________________________ /proc/net/ipsec_tncfg
+ test -r /proc/net/ipsec_tncfg
+ _________________________ /proc/net/pfkey
+ test -r /proc/net/pfkey
+ cat /proc/net/pfkey
sk RefCnt Rmem Wmem User Inode
+ _________________________ setkey-D
+ setkey -D
69.251.186.224[33700] 134.126.20.79[4500]
esp-udp mode=transport spi=1206237635(0x47e5b9c3) reqid=16401(0x00004011)
E: 3des-cbc 071cb754 292a29ed 616b52f0 81496725 bb117ef1 571b1a82
A: hmac-md5 4b5b380f 310cb36f 89649e4c 537c01ee
seq=0x00000000 replay=64 flags=0x00000000 state=mature
created: Apr 7 09:04:03 2006 current: Apr 7 09:14:07 2006
diff: 604(s) hard: 0(s) soft: 0(s)
last: Apr 7 09:04:03 2006 hard: 0(s) soft: 0(s)
current: 156990(bytes) hard: 0(bytes) soft: 0(bytes)
allocated: 1090 hard: 0 soft: 0
sadb_seq=1 pid=4011 refcnt=0
134.126.20.79[4500] 69.251.186.224[33700]
esp-udp mode=transport spi=767876595(0x2dc4ddf3) reqid=16401(0x00004011)
E: 3des-cbc 43ea60e1 fe4d1348 8d72ce3d 8188e7ff 939e1d9a 06681ead
A: hmac-md5 44c64760 10bd6d29 5d09a3eb cb7eba0a
seq=0x00000000 replay=64 flags=0x00000000 state=mature
created: Apr 7 09:04:03 2006 current: Apr 7 09:14:07 2006
diff: 604(s) hard: 0(s) soft: 0(s)
last: Apr 7 09:04:03 2006 hard: 0(s) soft: 0(s)
current: 1017512(bytes) hard: 0(bytes) soft: 0(bytes)
allocated: 1230 hard: 0 soft: 0
sadb_seq=0 pid=4011 refcnt=0
+ _________________________ setkey-D-P
+ setkey -D -P
69.251.186.224[1701] 134.126.20.79[any] udp
in ipsec
esp/transport//unique#16401
created: Apr 7 09:04:03 2006 lastused: Apr 7 09:14:04 2006
lifetime: 0(s) validtime: 0(s)
spid=80 seq=11 pid=4012
refcnt=2
134.126.20.79[any] 69.251.186.224[1701] udp
out ipsec
esp/transport//unique#16401
created: Apr 7 09:04:03 2006 lastused: Apr 7 09:14:03 2006
lifetime: 0(s) validtime: 0(s)
spid=89 seq=10 pid=4012
refcnt=2
::/0[any] ::/0[any] any
in none
created: Apr 7 09:01:22 2006 lastused:
lifetime: 0(s) validtime: 0(s)
spid=67 seq=9 pid=4012
refcnt=1
0.0.0.0/0[any] 0.0.0.0/0[any] any
in none
created: Apr 7 09:01:22 2006 lastused:
lifetime: 0(s) validtime: 0(s)
spid=51 seq=8 pid=4012
refcnt=1
0.0.0.0/0[any] 0.0.0.0/0[any] any
in none
created: Apr 7 09:01:22 2006 lastused:
lifetime: 0(s) validtime: 0(s)
spid=35 seq=7 pid=4012
refcnt=1
0.0.0.0/0[any] 0.0.0.0/0[any] any
in none
created: Apr 7 09:01:22 2006 lastused: Apr 7 09:14:04 2006
lifetime: 0(s) validtime: 0(s)
spid=19 seq=6 pid=4012
refcnt=1
0.0.0.0/0[any] 0.0.0.0/0[any] any
in none
created: Apr 7 09:01:22 2006 lastused: Apr 7 09:04:02 2006
lifetime: 0(s) validtime: 0(s)
spid=3 seq=5 pid=4012
refcnt=1
::/0[any] ::/0[any] any
out none
created: Apr 7 09:01:22 2006 lastused:
lifetime: 0(s) validtime: 0(s)
spid=76 seq=4 pid=4012
refcnt=1
0.0.0.0/0[any] 0.0.0.0/0[any] any
out none
created: Apr 7 09:01:22 2006 lastused:
lifetime: 0(s) validtime: 0(s)
spid=60 seq=3 pid=4012
refcnt=1
0.0.0.0/0[any] 0.0.0.0/0[any] any
out none
created: Apr 7 09:01:22 2006 lastused:
lifetime: 0(s) validtime: 0(s)
spid=44 seq=2 pid=4012
refcnt=1
0.0.0.0/0[any] 0.0.0.0/0[any] any
out none
created: Apr 7 09:01:22 2006 lastused: Apr 7 09:04:03 2006
lifetime: 0(s) validtime: 0(s)
spid=28 seq=1 pid=4012
refcnt=1
0.0.0.0/0[any] 0.0.0.0/0[any] any
out none
created: Apr 7 09:01:22 2006 lastused: Apr 7 09:04:02 2006
lifetime: 0(s) validtime: 0(s)
spid=12 seq=0 pid=4012
refcnt=1
+ _________________________ /proc/sys/net/ipsec-star
+ test -d /proc/sys/net/ipsec
+ _________________________ ipsec/status
+ ipsec auto --status
000 interface lo/lo ::1
000 interface lo/lo 127.0.0.1
000 interface lo/lo 127.0.0.1
000 interface eth0/eth0 134.126.20.79
000 interface eth0/eth0 134.126.20.79
000 %myid = (none)
000 debug none
000
000 algorithm ESP encrypt: id=2, name=ESP_DES, ivlen=8, keysizemin=64, keysizemax=64
000 algorithm ESP encrypt: id=3, name=ESP_3DES, ivlen=8, keysizemin=192, keysizemax=192
000 algorithm ESP encrypt: id=7, name=ESP_BLOWFISH, ivlen=8, keysizemin=40, keysizemax=448
000 algorithm ESP encrypt: id=11, name=ESP_NULL, ivlen=0, keysizemin=0, keysizemax=0
000 algorithm ESP encrypt: id=12, name=ESP_AES, ivlen=8, keysizemin=128, keysizemax=256
000 algorithm ESP encrypt: id=252, name=ESP_SERPENT, ivlen=8, keysizemin=128, keysizemax=256
000 algorithm ESP encrypt: id=253, name=ESP_TWOFISH, ivlen=8, keysizemin=128, keysizemax=256
000 algorithm ESP auth attr: id=1, name=AUTH_ALGORITHM_HMAC_MD5, keysizemin=128, keysizemax=128
000 algorithm ESP auth attr: id=2, name=AUTH_ALGORITHM_HMAC_SHA1, keysizemin=160, keysizemax=160
000 algorithm ESP auth attr: id=5, name=AUTH_ALGORITHM_HMAC_SHA2_256, keysizemin=256, keysizemax=256
000 algorithm ESP auth attr: id=251, name=(null), keysizemin=0, keysizemax=0
000
000 algorithm IKE encrypt: id=7, name=OAKLEY_AES_CBC, blocksize=16, keydeflen=128
000 algorithm IKE encrypt: id=5, name=OAKLEY_3DES_CBC, blocksize=8, keydeflen=192
000 algorithm IKE hash: id=2, name=OAKLEY_SHA1, hashsize=20
000 algorithm IKE hash: id=1, name=OAKLEY_MD5, hashsize=16
000 algorithm IKE dh group: id=2, name=OAKLEY_GROUP_MODP1024, bits=1024
000 algorithm IKE dh group: id=5, name=OAKLEY_GROUP_MODP1536, bits=1536
000 algorithm IKE dh group: id=14, name=OAKLEY_GROUP_MODP2048, bits=2048
000 algorithm IKE dh group: id=15, name=OAKLEY_GROUP_MODP3072, bits=3072
000 algorithm IKE dh group: id=16, name=OAKLEY_GROUP_MODP4096, bits=4096
000 algorithm IKE dh group: id=17, name=OAKLEY_GROUP_MODP6144, bits=6144
000 algorithm IKE dh group: id=18, name=OAKLEY_GROUP_MODP8192, bits=8192
000
000 stats db_ops.c: {curr_cnt, total_cnt, maxsz} :context={0,0,0} trans={0,0,0} attrs={0,0,0}
000
000 "roadwarrior": 134.126.20.79[C=US, ST=Virginia, L=Harrisonburg, O=JMU, OU=CS, CN=192.168.2.1]---134.126.20.1...%virtual===?; unrouted; eroute owner: #0
000 "roadwarrior": srcip=unset; dstip=unset
000 "roadwarrior": CAs: 'C=US, ST=Virginia, L=Harrisonburg, O=JMU, OU=CS, CN=Crypto CA'...'%any'
000 "roadwarrior": ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 1
000 "roadwarrior": policy: RSASIG+ENCRYPT+COMPRESS+TUNNEL; prio: 32,32; interface: eth0;
000 "roadwarrior": newest ISAKMP SA: #0; newest IPsec SA: #0;
000 "roadwarrior-l2tp": 134.126.20.79[C=US, ST=Virginia, L=Harrisonburg, O=JMU, OU=CS, CN=192.168.2.1]:17/0---134.126.20.1...%virtual:17/1701===?; unrouted; eroute owner: #0
000 "roadwarrior-l2tp": srcip=unset; dstip=unset
000 "roadwarrior-l2tp": CAs: 'C=US, ST=Virginia, L=Harrisonburg, O=JMU, OU=CS, CN=Crypto CA'...'%any'
000 "roadwarrior-l2tp": ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 1
000 "roadwarrior-l2tp": policy: RSASIG+ENCRYPT+COMPRESS+TUNNEL; prio: 32,32; interface: eth0;
000 "roadwarrior-l2tp": newest ISAKMP SA: #0; newest IPsec SA: #0;
000 "roadwarrior-l2tp"[2]: 134.126.20.79:4500[C=US, ST=Virginia, L=Harrisonburg, O=JMU, OU=CS, CN=192.168.2.1]:17/0---134.126.20.1...69.251.186.224:33700[C=US, ST=Virginia, L=Harrisonburg, O=JMU, OU=CS, CN=192.168.2.200]:17/1701; erouted; eroute owner: #2
000 "roadwarrior-l2tp"[2]: srcip=unset; dstip=unset
000 "roadwarrior-l2tp"[2]: CAs: 'C=US, ST=Virginia, L=Harrisonburg, O=JMU, OU=CS, CN=Crypto CA'...'%any'
000 "roadwarrior-l2tp"[2]: ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 1
000 "roadwarrior-l2tp"[2]: policy: RSASIG+ENCRYPT+COMPRESS+TUNNEL; prio: 32,32; interface: eth0;
000 "roadwarrior-l2tp"[2]: newest ISAKMP SA: #1; newest IPsec SA: #2;
000 "roadwarrior-l2tp"[2]: IKE algorithm newest: 3DES_CBC_192-SHA1-MODP2048
000 "roadwarrior-l2tp-updatedwin": 134.126.20.79[C=US, ST=Virginia, L=Harrisonburg, O=JMU, OU=CS, CN=192.168.2.1]:17/1701---134.126.20.1...%virtual:17/1701===?; unrouted; eroute owner: #0
000 "roadwarrior-l2tp-updatedwin": srcip=unset; dstip=unset
000 "roadwarrior-l2tp-updatedwin": CAs: 'C=US, ST=Virginia, L=Harrisonburg, O=JMU, OU=CS, CN=Crypto CA'...'%any'
000 "roadwarrior-l2tp-updatedwin": ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 1
000 "roadwarrior-l2tp-updatedwin": policy: RSASIG+ENCRYPT+COMPRESS+TUNNEL; prio: 32,32; interface: eth0;
000 "roadwarrior-l2tp-updatedwin": newest ISAKMP SA: #0; newest IPsec SA: #0;
000
000 #2: "roadwarrior-l2tp"[2] 69.251.186.224:33700 STATE_QUICK_R2 (IPsec SA established); EVENT_SA_REPLACE in 2726s; newest IPSEC; eroute owner
000 #2: "roadwarrior-l2tp"[2] 69.251.186.224:33700 esp.2dc4ddf3 at 69.251.186.224 esp.47e5b9c3 at 134.126.20.79
000 #1: "roadwarrior-l2tp"[2] 69.251.186.224:33700 STATE_MAIN_R3 (sent MR3, ISAKMP SA established); EVENT_SA_REPLACE in 2726s; newest ISAKMP; nodpd
000
+ _________________________ ifconfig-a
+ ifconfig -a
eth0 Link encap:Ethernet HWaddr 00:12:3F:83:19:70
inet addr:134.126.20.79 Bcast:134.126.20.255 Mask:255.255.255.0
inet6 addr: fe80::212:3fff:fe83:1970/64 Scope:Link
UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1
RX packets:15394 errors:0 dropped:0 overruns:0 frame:0
TX packets:2465 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:1000
RX bytes:3026612 (2.8 MiB) TX bytes:1233726 (1.1 MiB)
Interrupt:169
lo Link encap:Local Loopback
inet addr:127.0.0.1 Mask:255.0.0.0
inet6 addr: ::1/128 Scope:Host
UP LOOPBACK RUNNING MTU:16436 Metric:1
RX packets:1890 errors:0 dropped:0 overruns:0 frame:0
TX packets:1890 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:0
RX bytes:2396720 (2.2 MiB) TX bytes:2396720 (2.2 MiB)
ppp0 Link encap:Point-to-Point Protocol
inet addr:192.168.100.99 P-t-P:192.168.100.128 Mask:255.255.255.255
UP POINTOPOINT RUNNING NOARP MULTICAST MTU:1410 Metric:1
RX packets:1056 errors:0 dropped:0 overruns:0 frame:0
TX packets:1196 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:3
RX bytes:137882 (134.6 KiB) TX bytes:921386 (899.7 KiB)
sit0 Link encap:IPv6-in-IPv4
NOARP MTU:1480 Metric:1
RX packets:0 errors:0 dropped:0 overruns:0 frame:0
TX packets:0 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:0
RX bytes:0 (0.0 b) TX bytes:0 (0.0 b)
wlan0 Link encap:Ethernet HWaddr 00:90:4B:FF:B8:2D
inet addr:192.168.100.103 Bcast:192.168.100.255 Mask:255.255.255.0
inet6 addr: fe80::290:4bff:feff:b82d/64 Scope:Link
UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1
RX packets:396 errors:0 dropped:0 overruns:0 frame:0
TX packets:12 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:1000
RX bytes:98612 (96.3 KiB) TX bytes:1100 (1.0 KiB)
+ _________________________ ip-addr-list
+ ip addr list
1: lo: <LOOPBACK,UP> mtu 16436 qdisc noqueue
link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
inet 127.0.0.1/8 scope host lo
inet6 ::1/128 scope host
valid_lft forever preferred_lft forever
2: eth0: <BROADCAST,MULTICAST,UP> mtu 1500 qdisc pfifo_fast qlen 1000
link/ether 00:12:3f:83:19:70 brd ff:ff:ff:ff:ff:ff
inet 134.126.20.79/24 brd 134.126.20.255 scope global eth0
inet6 fe80::212:3fff:fe83:1970/64 scope link
valid_lft forever preferred_lft forever
3: sit0: <NOARP> mtu 1480 qdisc noop
link/sit 0.0.0.0 brd 0.0.0.0
4: wlan0: <BROADCAST,MULTICAST,UP> mtu 1500 qdisc pfifo_fast qlen 1000
link/ether 00:90:4b:ff:b8:2d brd ff:ff:ff:ff:ff:ff
inet 192.168.100.103/24 brd 192.168.100.255 scope global wlan0
inet6 fe80::290:4bff:feff:b82d/64 scope link
valid_lft forever preferred_lft forever
5: ppp0: <POINTOPOINT,MULTICAST,NOARP,UP> mtu 1410 qdisc pfifo_fast qlen 3
link/ppp
inet 192.168.100.99 peer 192.168.100.128/32 scope global ppp0
+ _________________________ ip-route-list
+ ip route list
69.251.186.224 via 134.126.20.1 dev eth0
192.168.100.128 dev ppp0 proto kernel scope link src 192.168.100.99
192.168.100.0/24 dev wlan0 proto kernel scope link src 192.168.100.103
134.126.20.0/24 dev eth0 proto kernel scope link src 134.126.20.79
169.254.0.0/16 dev eth0 scope link
default via 134.126.20.1 dev eth0
+ _________________________ ip-rule-list
+ ip rule list
0: from all lookup local
32766: from all lookup main
32767: from all lookup default
+ _________________________ ipsec_verify
+ ipsec verify --nocolour
Checking your system to see if IPsec got installed and started correctly:
Version check and ipsec on-path [OK]
Linux Openswan U2.3.0/K2.6.9-5.ELsmp (netkey)
Checking for IPsec support in kernel [OK]
Checking for RSA private key (/etc/ipsec.secrets) [FAILED]
ipsec showhostkey: no default key in "/etc/ipsec.secrets"
Checking that pluto is running [OK]
Two or more interfaces found, checking IP forwarding [OK]
Checking NAT and MASQUERADEing
Checking for 'ip' command [OK]
Checking for 'iptables' command [OK]
Checking for 'setkey' command for NETKEY IPsec stack support [OK]
Opportunistic Encryption DNS checks:
Looking for TXT in forward dns zone: crypto [MISSING]
Does the machine have at least one non-private address? [OK]
Looking for TXT in reverse dns zone: 79.20.126.134.in-addr.arpa. [MISSING]
+ _________________________ mii-tool
+ '[' -x /sbin/mii-tool ']'
+ /sbin/mii-tool -v
eth0: negotiated 100baseTx-FD, link ok
product info: vendor 00:08:18, model 24 rev 0
basic mode: autonegotiation enabled
basic status: autonegotiation complete, link ok
capabilities: 100baseTx-FD 100baseTx-HD 10baseT-FD 10baseT-HD
advertising: 100baseTx-FD 100baseTx-HD 10baseT-FD 10baseT-HD flow-control
link partner: 100baseTx-FD 100baseTx-HD 10baseT-FD 10baseT-HD
+ _________________________ ipsec/directory
+ ipsec --directory
/usr/lib/ipsec
+ _________________________ hostname/fqdn
+ hostname --fqdn
localhost.localdomain
+ _________________________ hostname/ipaddress
+ hostname --ip-address
127.0.0.1
+ _________________________ uptime
+ uptime
09:14:08 up 13 min, 0 users, load average: 0.00, 0.02, 0.02
+ _________________________ ps
+ ps alxwf
+ egrep -i 'ppid|pluto|ipsec|klips'
F UID PID PPID PRI NI VSZ RSS WCHAN STAT TTY TIME COMMAND
0 0 3991 3895 19 0 5724 1056 wait S+ pts/1 0:00 \_ /bin/sh /usr/libexec/ipsec/barf
0 0 4076 3991 19 0 2280 460 pipe_w S+ pts/1 0:00 \_ egrep -i ppid|pluto|ipsec|klips
1 0 2901 1 19 0 2628 1088 wait S ? 0:00 /bin/sh /usr/lib/ipsec/_plutorun --debug --uniqueids yes --nocrsend --strictcrlpolicy --nat_traversal yes --keep_alive --force_keepalive --disable_port_floating --virtual_private %v4:10.0.0.0/8,%v4:172.16.0.0/12,%v4:192.168.0.0/16 --crlcheckinterval 0 --ocspuri --nhelpers --dump --opts --stderrlog --wait no --pre --post --log daemon.error --pid /var/run/pluto.pid
5 0 2902 2901 19 0 2628 1096 wait S ? 0:00 \_ /bin/sh /usr/lib/ipsec/_plutorun --debug --uniqueids yes --nocrsend --strictcrlpolicy --nat_traversal yes --keep_alive --force_keepalive --disable_port_floating --virtual_private %v4:10.0.0.0/8,%v4:172.16.0.0/12,%v4:192.168.0.0/16 --crlcheckinterval 0 --ocspuri --nhelpers --dump --opts --stderrlog --wait no --pre --post --log daemon.error --pid /var/run/pluto.pid
4 0 2903 2902 15 0 3276 1288 - S ? 0:00 | \_ /usr/libexec/ipsec/pluto --nofork --secretsfile /etc/ipsec.secrets --ipsecdir /etc/ipsec.d --uniqueids --nat_traversal --virtual_private %v4:10.0.0.0/8,%v4:172.16.0.0/12,%v4:192.168.0.0/16
1 0 3002 2903 25 10 3220 836 - SN ? 0:00 | \_ pluto helper # 0
0 0 3044 2903 16 0 1716 200 - S ? 0:00 | \_ _pluto_adns
0 0 2904 2901 17 0 2908 1068 pipe_w S ? 0:00 \_ /bin/sh /usr/lib/ipsec/_plutoload --wait no --post
0 0 2905 1 19 0 2804 348 pipe_w S ? 0:00 logger -s -p daemon.error -t ipsec__plutorun
+ _________________________ ipsec/showdefaults
+ ipsec showdefaults
routephys=eth0
routevirt=ipsec0
routeaddr=134.126.20.79
routenexthop=134.126.20.1
+ _________________________ ipsec/conf
+ ipsec _include /etc/ipsec.conf
+ ipsec _keycensor
#< /etc/ipsec.conf 1
version 2.0
## plutodebug="control controlmore"
config setup
interfaces=%defaultroute
nat_traversal=yes
virtual_private=%v4:10.0.0.0/8,%v4:172.16.0.0/12,%v4:192.168.0.0/16
conn %default
keyingtries=1
compress=yes
disablearrivalcheck=no
authby=rsasig
leftrsasigkey=%cert
rightrsasigkey=%cert
conn roadwarrior-l2tp
leftprotoport=17/0
rightprotoport=17/1701
also=roadwarrior
conn roadwarrior-l2tp-updatedwin
leftprotoport=17/1701
rightprotoport=17/1701
also=roadwarrior
##left=192.168.1.100 % defaultroute
##leftsubnet=134.126.14.22/32
conn roadwarrior
left=%defaultroute
leftcert=ipsec-server.crt
right=%any
rightsubnet=vhost:%no,%priv
pfs=no
auto=add
#< /etc/ipsec.d/examples/no_oe.conf 1
# 'include' this file to disable Opportunistic Encryption.
# See /usr/share/doc/openswan/policygroups.html for details.
#
# RCSID $Id: no_oe.conf.in,v 1.2 2004/10/03 19:33:10 paul Exp $
conn block
auto=ignore
conn private
auto=ignore
conn private-or-clear
auto=ignore
conn clear-or-private
auto=ignore
conn clear
auto=ignore
conn packetdefault
auto=ignore
#> /etc/ipsec.conf 38
+ _________________________ ipsec/secrets
+ ipsec _secretcensor
+ ipsec _include /etc/ipsec.secrets
#< /etc/ipsec.secrets 1
: RSA /etc/ipsec.d/private/ipsec-server-encrypted.key "[sums to 77a3...]"
+ _________________________ ipsec/listall
+ ipsec auto --listall
000
000 List of Public Keys:
000
000 Apr 07 09:04:03 2006, 1024 RSA Key AwEAAbYYg, until Jul 12 15:03:24 2006 ok
000 ID_DER_ASN1_DN 'C=US, ST=Virginia, L=Harrisonburg, O=JMU, OU=CS, CN=192.168.2.200'
000 Issuer 'C=US, ST=Virginia, L=Harrisonburg, O=JMU, OU=CS, CN=Crypto CA'
000 Apr 07 09:01:22 2006, 1024 RSA Key AwEAAbbRJ, until Jul 12 15:49:51 2006 ok
000 ID_DER_ASN1_DN 'C=US, ST=Virginia, L=Harrisonburg, O=JMU, OU=CS, CN=192.168.2.1'
000 Issuer 'C=US, ST=Virginia, L=Harrisonburg, O=JMU, OU=CS, CN=Crypto CA'
000
000 List of X.509 End Certificates:
000
000 Apr 07 09:01:22 2006, count: 4
000 subject: 'C=US, ST=Virginia, L=Harrisonburg, O=JMU, OU=CS, CN=192.168.2.1'
000 issuer: 'C=US, ST=Virginia, L=Harrisonburg, O=JMU, OU=CS, CN=Crypto CA'
000 serial: 02
000 pubkey: 1024 RSA Key AwEAAbbRJ, has private key
000 validity: not before Jul 12 15:49:51 2005 ok
000 not after Jul 12 15:49:51 2006 ok
000 subjkey: 84:9b:0f:1b:be:22:93:48:38:ab:68:63:15:05:86:33:d3:f3:c2:4d
000 authkey: 86:b4:60:78:9c:1f:ca:68:92:5e:93:85:6a:20:37:f3:1e:4a:03:9f
000 aserial: 00
000
000 List of X.509 CA Certificates:
000
000 Apr 07 09:01:22 2006, count: 1
000 subject: 'C=US, ST=Virginia, L=Harrisonburg, O=JMU, OU=CS, CN=Crypto CA'
000 issuer: 'C=US, ST=Virginia, L=Harrisonburg, O=JMU, OU=CS, CN=Crypto CA'
000 serial: 00
000 pubkey: 1024 RSA Key AwEAAcQaQ
000 validity: not before Jul 12 15:03:24 2005 ok
000 not after Jul 12 15:03:24 2006 ok
000 subjkey: 86:b4:60:78:9c:1f:ca:68:92:5e:93:85:6a:20:37:f3:1e:4a:03:9f
000 authkey: 86:b4:60:78:9c:1f:ca:68:92:5e:93:85:6a:20:37:f3:1e:4a:03:9f
000 aserial: 00
000
000 List of X.509 CRLs:
000
000 Apr 07 09:01:22 2006, revoked certs: 0
000 issuer: 'C=US, ST=Virginia, L=Harrisonburg, O=JMU, OU=CS, CN=Crypto CA'
000 updates: this Dec 09 15:33:06 2005
000 next Jan 08 15:33:06 2006 warning (expired)
+ '[' /etc/ipsec.d/policies ']'
+ for policy in '$POLICIES/*'
++ basename /etc/ipsec.d/policies/block
+ base=block
+ _________________________ ipsec/policies/block
+ cat /etc/ipsec.d/policies/block
# This file defines the set of CIDRs (network/mask-length) to which
# communication should never be allowed.
#
# See /usr/share/doc/openswan/policygroups.html for details.
#
# $Id: block.in,v 1.4 2003/02/17 02:22:15 mcr Exp $
#
+ for policy in '$POLICIES/*'
++ basename /etc/ipsec.d/policies/clear
+ base=clear
+ _________________________ ipsec/policies/clear
+ cat /etc/ipsec.d/policies/clear
# This file defines the set of CIDRs (network/mask-length) to which
# communication should always be in the clear.
#
# See /usr/share/doc/openswan/policygroups.html for details.
#
# $Id: clear.in,v 1.4 2003/02/17 02:22:15 mcr Exp $
#
+ for policy in '$POLICIES/*'
++ basename /etc/ipsec.d/policies/clear-or-private
+ base=clear-or-private
+ _________________________ ipsec/policies/clear-or-private
+ cat /etc/ipsec.d/policies/clear-or-private
# This file defines the set of CIDRs (network/mask-length) to which
# we will communicate in the clear, or, if the other side initiates IPSEC,
# using encryption. This behaviour is also called "Opportunistic Responder".
#
# See /usr/share/doc/openswan/policygroups.html for details.
#
# $Id: clear-or-private.in,v 1.4 2003/02/17 02:22:15 mcr Exp $
#
+ for policy in '$POLICIES/*'
++ basename /etc/ipsec.d/policies/private
+ base=private
+ _________________________ ipsec/policies/private
+ cat /etc/ipsec.d/policies/private
# This file defines the set of CIDRs (network/mask-length) to which
# communication should always be private (i.e. encrypted).
# See /usr/share/doc/openswan/policygroups.html for details.
#
# $Id: private.in,v 1.4 2003/02/17 02:22:15 mcr Exp $
#
+ for policy in '$POLICIES/*'
++ basename /etc/ipsec.d/policies/private-or-clear
+ base=private-or-clear
+ _________________________ ipsec/policies/private-or-clear
+ cat /etc/ipsec.d/policies/private-or-clear
# This file defines the set of CIDRs (network/mask-length) to which
# communication should be private, if possible, but in the clear otherwise.
#
# If the target has a TXT (later IPSECKEY) record that specifies
# authentication material, we will require private (i.e. encrypted)
# communications. If no such record is found, communications will be
# in the clear.
#
# See /usr/share/doc/openswan/policygroups.html for details.
#
# $Id: private-or-clear.in,v 1.5 2003/02/17 02:22:15 mcr Exp $
#
0.0.0.0/0
+ _________________________ ipsec/ls-libdir
+ ls -l /usr/lib/ipsec
total 156
-rwxr-xr-x 1 root root 15468 Jan 11 2005 _confread
-rwxr-xr-x 1 root root 14807 Jan 11 2005 _copyright
-rwxr-xr-x 1 root root 2379 Jan 11 2005 _include
-rwxr-xr-x 1 root root 1475 Jan 11 2005 _keycensor
-rwxr-xr-x 1 root root 3586 Jan 11 2005 _plutoload
-rwxr-xr-x 1 root root 7295 Jan 11 2005 _plutorun
-rwxr-xr-x 1 root root 11409 Jan 11 2005 _realsetup
-rwxr-xr-x 1 root root 1975 Jan 11 2005 _secretcensor
-rwxr-xr-x 1 root root 9385 Jan 11 2005 _startklips
-rwxr-xr-x 1 root root 12329 Jan 11 2005 _updown
-rwxr-xr-x 1 root root 7572 Jan 11 2005 _updown_x509
-rwxr-xr-x 1 root root 1942 Jan 11 2005 ipsec_pr.template
+ _________________________ ipsec/ls-execdir
+ ls -l /usr/libexec/ipsec
total 2612
-rwxr-xr-x 1 root root 25973 Jan 11 2005 _pluto_adns
-rwxr-xr-x 1 root root 18840 Jan 11 2005 auto
-rwxr-xr-x 1 root root 10585 Jan 11 2005 barf
-rwxr-xr-x 1 root root 816 Jan 11 2005 calcgoo
-rwxr-xr-x 1 root root 159538 Jan 11 2005 eroute
-rwxr-xr-x 1 root root 48689 Jan 11 2005 ikeping
-rwxr-xr-x 1 root root 107598 Jan 11 2005 klipsdebug
-rwxr-xr-x 1 root root 1664 Jan 11 2005 livetest
-rwxr-xr-x 1 root root 2461 Jan 11 2005 look
-rwxr-xr-x 1 root root 7124 Jan 11 2005 mailkey
-rwxr-xr-x 1 root root 15931 Jan 11 2005 manual
-rwxr-xr-x 1 root root 1874 Jan 11 2005 newhostkey
-rwxr-xr-x 1 root root 94473 Jan 11 2005 pf_key
-rwxr-xr-x 1 root root 1370185 Jan 11 2005 pluto
-rwxr-xr-x 1 root root 23567 Jan 11 2005 ranbits
-rwxr-xr-x 1 root root 40585 Jan 11 2005 rsasigkey
-rwxr-xr-x 1 root root 766 Jan 11 2005 secrets
-rwxr-xr-x 1 root root 17578 Jan 11 2005 send-pr
lrwxrwxrwx 1 root root 22 Aug 8 2005 setup -> /etc/rc.d/init.d/ipsec
-rwxr-xr-x 1 root root 1048 Jan 11 2005 showdefaults
-rwxr-xr-x 1 root root 4748 Jan 11 2005 showhostkey
-rwxr-xr-x 1 root root 256635 Jan 11 2005 spi
-rwxr-xr-x 1 root root 131394 Jan 11 2005 spigrp
-rwxr-xr-x 1 root root 22757 Jan 11 2005 tncfg
-rwxr-xr-x 1 root root 10195 Jan 11 2005 verify
-rwxr-xr-x 1 root root 111476 Jan 11 2005 whack
+ _________________________ ipsec/updowns
++ ls /usr/libexec/ipsec
++ egrep updown
+ _________________________ /proc/net/dev
+ cat /proc/net/dev
Inter-| Receive | Transmit
face |bytes packets errs drop fifo frame compressed multicast|bytes packets errs drop fifo colls carrier compressed
lo: 2396720 1890 0 0 0 0 0 0 2396720 1890 0 0 0 0 0 0
eth0: 3027466 15402 0 0 0 0 0 3420 1233956 2468 0 0 0 0 0 0
sit0: 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0
wlan0: 98612 396 0 0 0 0 0 0 1100 12 0 0 0 0 0 0
ppp0: 137882 1056 0 0 0 0 0 0 921386 1196 0 0 0 0 0 0
+ _________________________ /proc/net/route
+ cat /proc/net/route
Iface Destination Gateway Flags RefCnt Use Metric Mask MTU Window IRTT
eth0 E0BAFB45 01147E86 0007 0 0 0 FFFFFFFF 0 0 0
ppp0 8064A8C0 00000000 0005 0 0 0 FFFFFFFF 0 0 0
wlan0 0064A8C0 00000000 0001 0 0 0 00FFFFFF 0 0 0
eth0 00147E86 00000000 0001 0 0 0 00FFFFFF 0 0 0
eth0 0000FEA9 00000000 0001 0 0 0 0000FFFF 0 0 0
eth0 00000000 01147E86 0003 0 0 0 00000000 0 0 0
+ _________________________ /proc/sys/net/ipv4/ip_forward
+ cat /proc/sys/net/ipv4/ip_forward
1
+ _________________________ /proc/sys/net/ipv4/conf/star-rp_filter
+ cd /proc/sys/net/ipv4/conf
+ egrep '^' all/rp_filter default/rp_filter eth0/rp_filter lo/rp_filter ppp0/rp_filter wlan0/rp_filter
all/rp_filter:0
default/rp_filter:1
eth0/rp_filter:1
lo/rp_filter:0
ppp0/rp_filter:1
wlan0/rp_filter:1
+ _________________________ uname-a
+ uname -a
Linux crypto 2.6.9-5.ELsmp #1 SMP Wed Jan 5 19:30:39 EST 2005 i686 i686 i386 GNU/Linux
+ _________________________ config-built-with
+ test -r /proc/config_built_with
+ _________________________ redhat-release
+ test -r /etc/redhat-release
+ cat /etc/redhat-release
Red Hat Enterprise Linux AS release 4 (Nahant Update 3)
+ _________________________ /proc/net/ipsec_version
+ test -r /proc/net/ipsec_version
+ test -r /proc/net/pfkey
++ uname -r
+ echo 'NETKEY (2.6.9-5.ELsmp) support detected '
NETKEY (2.6.9-5.ELsmp) support detected
+ _________________________ ipfwadm
+ test -r /sbin/ipfwadm
+ 'no old-style linux 1.x/2.0 ipfwadm firewall support'
/usr/libexec/ipsec/barf: line 297: no old-style linux 1.x/2.0 ipfwadm firewall support: No such file or directory
+ _________________________ ipchains
+ test -r /sbin/ipchains
+ echo 'no old-style linux 2.0 ipchains firewall support'
no old-style linux 2.0 ipchains firewall support
+ _________________________ iptables
+ test -r /sbin/iptables
+ iptables -L -v -n
Chain INPUT (policy ACCEPT 0 packets, 0 bytes)
pkts bytes target prot opt in out source destination
3605 2146K RH-Firewall-1-INPUT all -- * * 0.0.0.0/0 0.0.0.0/0
Chain FORWARD (policy ACCEPT 0 packets, 0 bytes)
pkts bytes target prot opt in out source destination
2240 1059K RH-Firewall-1-INPUT all -- * * 0.0.0.0/0 0.0.0.0/0
Chain OUTPUT (policy ACCEPT 2694 packets, 2765K bytes)
pkts bytes target prot opt in out source destination
Chain RH-Firewall-1-INPUT (2 references)
pkts bytes target prot opt in out source destination
1290 1768K ACCEPT all -- lo * 0.0.0.0/0 0.0.0.0/0
0 0 ACCEPT esp -- eth0 * 0.0.0.0/0 0.0.0.0/0
0 0 ACCEPT ah -- eth0 * 0.0.0.0/0 0.0.0.0/0
1050 138K ACCEPT all -- ppp0 * 0.0.0.0/0 0.0.0.0/0
0 0 ACCEPT all -- ppp1 * 0.0.0.0/0 0.0.0.0/0
0 0 ACCEPT all -- ppp2 * 0.0.0.0/0 0.0.0.0/0
0 0 ACCEPT all -- ppp3 * 0.0.0.0/0 0.0.0.0/0
0 0 ACCEPT all -- ppp4 * 0.0.0.0/0 0.0.0.0/0
0 0 ACCEPT all -- ppp5 * 0.0.0.0/0 0.0.0.0/0
0 0 ACCEPT all -- ppp6 * 0.0.0.0/0 0.0.0.0/0
0 0 ACCEPT all -- ppp7 * 0.0.0.0/0 0.0.0.0/0
0 0 ACCEPT all -- ppp8 * 0.0.0.0/0 0.0.0.0/0
0 0 ACCEPT all -- ppp9 * 0.0.0.0/0 0.0.0.0/0
0 0 ACCEPT all -- ppp10 * 0.0.0.0/0 0.0.0.0/0
0 0 ACCEPT all -- ppp11 * 0.0.0.0/0 0.0.0.0/0
0 0 ACCEPT all -- ppp12 * 0.0.0.0/0 0.0.0.0/0
0 0 ACCEPT all -- ppp13 * 0.0.0.0/0 0.0.0.0/0
0 0 ACCEPT all -- ppp14 * 0.0.0.0/0 0.0.0.0/0
0 0 ACCEPT all -- ppp15 * 0.0.0.0/0 0.0.0.0/0
0 0 ACCEPT all -- ppp16 * 0.0.0.0/0 0.0.0.0/0
0 0 ACCEPT all -- ppp17 * 0.0.0.0/0 0.0.0.0/0
0 0 ACCEPT all -- ppp18 * 0.0.0.0/0 0.0.0.0/0
0 0 ACCEPT all -- ppp19 * 0.0.0.0/0 0.0.0.0/0
0 0 ACCEPT all -- ppp20 * 0.0.0.0/0 0.0.0.0/0
0 0 ACCEPT all -- ppp21 * 0.0.0.0/0 0.0.0.0/0
0 0 ACCEPT all -- ppp+ * 0.0.0.0/0 0.0.0.0/0
11 984 ACCEPT all -- wlan0 * 0.0.0.0/0 0.0.0.0/0
0 0 ACCEPT icmp -- * * 0.0.0.0/0 0.0.0.0/0 icmp type 255
0 0 ACCEPT esp -- * * 0.0.0.0/0 0.0.0.0/0
0 0 ACCEPT ah -- * * 0.0.0.0/0 0.0.0.0/0
0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:500
2 708 ACCEPT udp -- * * 0.0.0.0/0 0.0.0.0/0 udp dpt:500
0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:4500
1781 320K ACCEPT udp -- * * 0.0.0.0/0 0.0.0.0/0 udp dpt:4500
0 0 ACCEPT udp -- * * 0.0.0.0/0 224.0.0.251 udp dpt:5353
0 0 ACCEPT udp -- * * 0.0.0.0/0 0.0.0.0/0 udp dpt:631
1366 942K ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0 state RELATED,ESTABLISHED
1 48 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 state NEW tcp dpt:22
0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 state NEW tcp dpt:80
0 0 ACCEPT udp -- * * 0.0.0.0/0 0.0.0.0/0 udp dpt:53
0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:53
0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:443
0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:993
0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp spt:993
0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:25
0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp spt:25
0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:135
0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp spt:135
0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:1188
0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp spt:1188
0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:1025
0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp spt:1025
0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:1042
0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp spt:1042
0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:1033
0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp spt:1033
0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:1164
0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp spt:1164
344 36154 REJECT all -- * * 0.0.0.0/0 0.0.0.0/0 reject-with icmp-host-prohibited
+ _________________________ iptables-nat
+ iptables -t nat -L -v -n
Chain PREROUTING (policy ACCEPT 1697 packets, 333K bytes)
pkts bytes target prot opt in out source destination
Chain POSTROUTING (policy ACCEPT 7 packets, 1152 bytes)
pkts bytes target prot opt in out source destination
102 5885 MASQUERADE all -- * eth0 0.0.0.0/0 0.0.0.0/0
Chain OUTPUT (policy ACCEPT 12 packets, 1514 bytes)
pkts bytes target prot opt in out source destination
+ _________________________ iptables-mangle
+ iptables -t mangle -L -v -n
Chain PREROUTING (policy ACCEPT 0 packets, 0 bytes)
pkts bytes target prot opt in out source destination
Chain INPUT (policy ACCEPT 0 packets, 0 bytes)
pkts bytes target prot opt in out source destination
Chain FORWARD (policy ACCEPT 0 packets, 0 bytes)
pkts bytes target prot opt in out source destination
Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes)
pkts bytes target prot opt in out source destination
Chain POSTROUTING (policy ACCEPT 0 packets, 0 bytes)
pkts bytes target prot opt in out source destination
+ _________________________ /proc/modules
+ test -f /proc/modules
+ cat /proc/modules
iptable_mangle 6721 0 - Live 0xf88c1000
ppp_async 15809 1 - Live 0xf8dc3000
crc_ccitt 6081 1 ppp_async, Live 0xf8a33000
ppp_generic 32085 5 ppp_async, Live 0xf8de9000
slhc 11073 1 ppp_generic, Live 0xf8dbf000
n_hdlc 13253 1 - Live 0xf8a97000
i915 81669 2 - Live 0xf8dc9000
deflate 7489 0 - Live 0xf8ccb000
zlib_deflate 24665 1 deflate, Live 0xf8d53000
twofish 40897 0 - Live 0xf8d48000
serpent 17217 0 - Live 0xf8d33000
blowfish 14145 0 - Live 0xf8d2e000
sha256 13249 0 - Live 0xf8d29000
crypto_null 6209 0 - Live 0xf8cce000
ndiswrapper 147452 0 - Live 0xf8ea4000
aes_i586 42421 0 - Live 0xf8d1d000
des 15681 2 - Live 0xf8d11000
xfrm4_tunnel 7877 0 - Live 0xf8d0e000
ipcomp 12489 0 - Live 0xf8d09000
esp4 11713 2 - Live 0xf8cc3000
ah4 10177 0 - Live 0xf8cc7000
af_key 34257 0 - Live 0xf8cff000
parport_pc 27905 1 - Live 0xf8cab000
lp 15405 0 - Live 0xf8aa4000
parport 37641 2 parport_pc,lp, Live 0xf8cf4000
autofs4 22085 0 - Live 0xf8cbc000
i2c_dev 14273 0 - Live 0xf8abd000
i2c_core 25921 1 i2c_dev, Live 0xf8cb4000
sunrpc 137637 1 - Live 0xf8cd1000
ipt_MASQUERADE 7873 1 - Live 0xf8ad5000
iptable_nat 27237 2 ipt_MASQUERADE, Live 0xf8c82000
ipt_REJECT 10561 1 - Live 0xf8c75000
ipt_state 5825 3 - Live 0xf8ab1000
ip_conntrack 45957 3 ipt_MASQUERADE,iptable_nat,ipt_state, Live 0xf8c68000
iptable_filter 6721 1 - Live 0xf8aae000
ip_tables 21441 6 iptable_mangle,ipt_MASQUERADE,iptable_nat,ipt_REJECT,ipt_state,iptable_filter, Live 0xf8ab6000
button 10449 0 - Live 0xf8a9c000
battery 12869 0 - Live 0xf8aa9000
ac 8773 0 - Live 0xf8aa0000
md5 8001 3 - Live 0xf8a1f000
ipv6 238817 14 - Live 0xf8ad8000
joydev 14209 0 - Live 0xf8a8c000
uhci_hcd 32729 0 - Live 0xf8a79000
ehci_hcd 31813 0 - Live 0xf8a83000
hw_random 9557 0 - Live 0xf8a17000
snd_intel8x0 34793 0 - Live 0xf8a6f000
snd_ac97_codec 65297 1 snd_intel8x0, Live 0xf8a22000
snd_pcm_oss 52345 0 - Live 0xf89cc000
snd_mixer_oss 21825 1 snd_pcm_oss, Live 0xf8a06000
snd_pcm 92101 2 snd_intel8x0,snd_pcm_oss, Live 0xf8a57000
snd_timer 27973 1 snd_pcm, Live 0xf89fe000
snd_page_alloc 13641 2 snd_intel8x0,snd_pcm, Live 0xf89c3000
snd_mpu401_uart 11329 1 snd_intel8x0, Live 0xf89c8000
snd_rawmidi 27749 1 snd_mpu401_uart, Live 0xf88c7000
snd_seq_device 11849 1 snd_rawmidi, Live 0xf88fc000
snd 56485 9 snd_intel8x0,snd_ac97_codec,snd_pcm_oss,snd_mixer_oss,snd_pcm,snd_timer,snd_mpu401_uart,snd_rawmidi,snd_seq_device, Live 0xf89ef000
soundcore 12961 1 snd, Live 0xf88f7000
tg3 79173 0 - Live 0xf89da000
floppy 58065 0 - Live 0xf89b3000
dm_snapshot 20837 0 - Live 0xf88cf000
dm_zero 6337 0 - Live 0xf88c4000
dm_mirror 24989 2 - Live 0xf881f000
ext3 118473 2 - Live 0xf8981000
jbd 59481 1 ext3, Live 0xf886e000
dm_mod 57157 6 dm_snapshot,dm_zero,dm_mirror, Live 0xf8833000
ata_piix 12357 2 - Live 0xf882e000
libata 44229 1 ata_piix, Live 0xf8862000
sd_mod 20545 3 - Live 0xf8827000
scsi_mod 116557 2 libata,sd_mod, Live 0xf8844000
+ _________________________ /proc/meminfo
+ cat /proc/meminfo
MemTotal: 1025112 kB
MemFree: 772280 kB
Buffers: 13932 kB
Cached: 127508 kB
SwapCached: 0 kB
Active: 67236 kB
Inactive: 98368 kB
HighTotal: 121368 kB
HighFree: 252 kB
LowTotal: 903744 kB
LowFree: 772028 kB
SwapTotal: 2031608 kB
SwapFree: 2031608 kB
Dirty: 152 kB
Writeback: 0 kB
Mapped: 37792 kB
Slab: 18476 kB
Committed_AS: 96872 kB
PageTables: 1928 kB
VmallocTotal: 106488 kB
VmallocUsed: 6816 kB
VmallocChunk: 99188 kB
HugePages_Total: 0
HugePages_Free: 0
Hugepagesize: 2048 kB
+ _________________________ /proc/net/ipsec-ls
+ test -f /proc/net/ipsec_version
+ _________________________ usr/src/linux/.config
+ test -f /proc/config.gz
++ uname -r
+ test -f /lib/modules/2.6.9-5.ELsmp/build/.config
++ uname -r
+ cat /lib/modules/2.6.9-5.ELsmp/build/.config
+ egrep 'CONFIG_IPSEC|CONFIG_KLIPS|CONFIG_NET_KEY|CONFIG_INET|CONFIG_IP'
CONFIG_NET_KEY=m
CONFIG_INET=y
CONFIG_IP_MULTICAST=y
CONFIG_IP_ADVANCED_ROUTER=y
CONFIG_IP_MULTIPLE_TABLES=y
CONFIG_IP_ROUTE_FWMARK=y
CONFIG_IP_ROUTE_MULTIPATH=y
CONFIG_IP_ROUTE_VERBOSE=y
# CONFIG_IP_PNP is not set
CONFIG_IP_MROUTE=y
CONFIG_IP_PIMSM_V1=y
CONFIG_IP_PIMSM_V2=y
CONFIG_INET_AH=m
CONFIG_INET_ESP=m
CONFIG_INET_IPCOMP=m
CONFIG_INET_TUNNEL=m
CONFIG_IP_VS=m
# CONFIG_IP_VS_DEBUG is not set
CONFIG_IP_VS_TAB_BITS=12
CONFIG_IP_VS_PROTO_TCP=y
CONFIG_IP_VS_PROTO_UDP=y
CONFIG_IP_VS_PROTO_ESP=y
CONFIG_IP_VS_PROTO_AH=y
CONFIG_IP_VS_RR=m
CONFIG_IP_VS_WRR=m
CONFIG_IP_VS_LC=m
CONFIG_IP_VS_WLC=m
CONFIG_IP_VS_LBLC=m
CONFIG_IP_VS_LBLCR=m
CONFIG_IP_VS_DH=m
CONFIG_IP_VS_SH=m
CONFIG_IP_VS_SED=m
CONFIG_IP_VS_NQ=m
CONFIG_IP_VS_FTP=m
CONFIG_IPV6=m
CONFIG_IPV6_PRIVACY=y
CONFIG_INET6_AH=m
CONFIG_INET6_ESP=m
CONFIG_INET6_IPCOMP=m
CONFIG_INET6_TUNNEL=m
CONFIG_IPV6_TUNNEL=m
CONFIG_IP_NF_CONNTRACK=m
CONFIG_IP_NF_CT_ACCT=y
CONFIG_IP_NF_CT_PROTO_SCTP=m
CONFIG_IP_NF_FTP=m
CONFIG_IP_NF_IRC=m
CONFIG_IP_NF_TFTP=m
CONFIG_IP_NF_AMANDA=m
CONFIG_IP_NF_QUEUE=m
CONFIG_IP_NF_IPTABLES=m
CONFIG_IP_NF_MATCH_LIMIT=m
CONFIG_IP_NF_MATCH_IPRANGE=m
CONFIG_IP_NF_MATCH_MAC=m
CONFIG_IP_NF_MATCH_PKTTYPE=m
CONFIG_IP_NF_MATCH_MARK=m
CONFIG_IP_NF_MATCH_MULTIPORT=m
CONFIG_IP_NF_MATCH_TOS=m
CONFIG_IP_NF_MATCH_RECENT=m
CONFIG_IP_NF_MATCH_ECN=m
CONFIG_IP_NF_MATCH_DSCP=m
CONFIG_IP_NF_MATCH_AH_ESP=m
CONFIG_IP_NF_MATCH_LENGTH=m
CONFIG_IP_NF_MATCH_TTL=m
CONFIG_IP_NF_MATCH_TCPMSS=m
CONFIG_IP_NF_MATCH_HELPER=m
CONFIG_IP_NF_MATCH_STATE=m
CONFIG_IP_NF_MATCH_CONNTRACK=m
CONFIG_IP_NF_MATCH_OWNER=m
CONFIG_IP_NF_MATCH_PHYSDEV=m
CONFIG_IP_NF_MATCH_ADDRTYPE=m
CONFIG_IP_NF_MATCH_REALM=m
CONFIG_IP_NF_MATCH_SCTP=m
CONFIG_IP_NF_MATCH_COMMENT=m
CONFIG_IP_NF_FILTER=m
CONFIG_IP_NF_TARGET_REJECT=m
CONFIG_IP_NF_TARGET_LOG=m
CONFIG_IP_NF_TARGET_ULOG=m
CONFIG_IP_NF_TARGET_TCPMSS=m
CONFIG_IP_NF_NAT=m
CONFIG_IP_NF_NAT_NEEDED=y
CONFIG_IP_NF_TARGET_MASQUERADE=m
CONFIG_IP_NF_TARGET_REDIRECT=m
CONFIG_IP_NF_TARGET_NETMAP=m
CONFIG_IP_NF_TARGET_SAME=m
CONFIG_IP_NF_NAT_LOCAL=y
CONFIG_IP_NF_NAT_SNMP_BASIC=m
CONFIG_IP_NF_NAT_IRC=m
CONFIG_IP_NF_NAT_FTP=m
CONFIG_IP_NF_NAT_TFTP=m
CONFIG_IP_NF_NAT_AMANDA=m
CONFIG_IP_NF_MANGLE=m
CONFIG_IP_NF_TARGET_TOS=m
CONFIG_IP_NF_TARGET_ECN=m
CONFIG_IP_NF_TARGET_DSCP=m
CONFIG_IP_NF_TARGET_MARK=m
CONFIG_IP_NF_TARGET_CLASSIFY=m
CONFIG_IP_NF_RAW=m
CONFIG_IP_NF_TARGET_NOTRACK=m
CONFIG_IP_NF_ARPTABLES=m
CONFIG_IP_NF_ARPFILTER=m
CONFIG_IP_NF_ARP_MANGLE=m
# CONFIG_IP_NF_COMPAT_IPCHAINS is not set
# CONFIG_IP_NF_COMPAT_IPFWADM is not set
# CONFIG_IP6_NF_QUEUE is not set
CONFIG_IP6_NF_IPTABLES=m
CONFIG_IP6_NF_MATCH_LIMIT=m
CONFIG_IP6_NF_MATCH_MAC=m
CONFIG_IP6_NF_MATCH_RT=m
CONFIG_IP6_NF_MATCH_OPTS=m
CONFIG_IP6_NF_MATCH_FRAG=m
CONFIG_IP6_NF_MATCH_HL=m
CONFIG_IP6_NF_MATCH_MULTIPORT=m
CONFIG_IP6_NF_MATCH_OWNER=m
CONFIG_IP6_NF_MATCH_MARK=m
CONFIG_IP6_NF_MATCH_IPV6HEADER=m
CONFIG_IP6_NF_MATCH_AHESP=m
CONFIG_IP6_NF_MATCH_LENGTH=m
CONFIG_IP6_NF_MATCH_EUI64=m
CONFIG_IP6_NF_MATCH_PHYSDEV=m
CONFIG_IP6_NF_FILTER=m
CONFIG_IP6_NF_TARGET_LOG=m
CONFIG_IP6_NF_MANGLE=m
CONFIG_IP6_NF_TARGET_MARK=m
CONFIG_IP6_NF_RAW=m
CONFIG_IP_SCTP=m
# CONFIG_IPX is not set
CONFIG_IPW2100=m
# CONFIG_IPW_DEBUG is not set
CONFIG_IPW2100_PROMISC=y
# CONFIG_IPW2100_LEGACY_FW_LOAD is not set
CONFIG_IPW2200=m
CONFIG_IPPP_FILTER=y
CONFIG_IPMI_HANDLER=m
# CONFIG_IPMI_PANIC_EVENT is not set
CONFIG_IPMI_DEVICE_INTERFACE=m
CONFIG_IPMI_SI=m
CONFIG_IPMI_WATCHDOG=m
CONFIG_IPMI_POWEROFF=m
+ _________________________ etc/syslog.conf
+ cat /etc/syslog.conf
# Log all kernel messages to the console.
# Logging much else clutters up the screen.
#kern.* /dev/console
# Log anything (except mail) of level info or higher.
# Don't log private authentication messages!
*.info;mail.none;authpriv.none;cron.none /var/log/messages
# The authpriv file has restricted access.
authpriv.* /var/log/secure
# Log all the mail messages in one place.
mail.* -/var/log/maillog
# Log cron stuff
cron.* /var/log/cron
# Everybody gets emergency messages
*.emerg *
# Save news errors of level crit and higher in a special file.
uucp,news.crit /var/log/spooler
# Save boot messages also to boot.log
local7.* /var/log/boot.log
+ _________________________ etc/resolv.conf
+ cat /etc/resolv.conf
; generated by /sbin/dhclient-script
nameserver 134.126.64.11
nameserver 134.126.13.11
+ _________________________ lib/modules-ls
+ ls -ltr /lib/modules
total 40
drwxr-xr-x 2 root root 4096 Jan 5 2005 kabi-4.0-0
drwxr-xr-x 2 root root 4096 Jan 5 2005 kabi-4.0-0smp
drwxr-xr-x 3 root root 4096 Jul 7 2005 2.6.9-5.EL
drwxr-xr-x 2 root root 4096 Jul 7 2005 2.6.9-5.ELhugemem
drwxr-xr-x 4 root root 4096 Jul 7 2005 2.6.9-5.ELsmp
+ _________________________ /proc/ksyms-netif_rx
+ test -r /proc/ksyms
+ test -r /proc/kallsyms
+ egrep netif_rx /proc/kallsyms
c027319e T netif_rx
c027319e U netif_rx [ppp_generic]
c027319e U netif_rx [ndiswrapper]
c027319e U netif_rx [ipv6]
+ _________________________ lib/modules-netif_rx
+ modulegoo kernel/net/ipv4/ipip.o netif_rx
+ set +x
2.6.9-5.EL:
2.6.9-5.ELhugemem:
2.6.9-5.ELsmp:
kabi-4.0-0:
kabi-4.0-0smp:
+ _________________________ kern.debug
+ test -f /var/log/kern.debug
+ _________________________ klog
+ sed -n '3131,$p' /var/log/messages
+ egrep -i 'ipsec|klips|pluto'
+ case "$1" in
+ cat
Apr 7 09:01:19 localhost ipsec_setup: Starting Openswan IPsec 2.3.0...
Apr 7 09:01:19 localhost ipsec_setup: insmod /lib/modules/2.6.9-5.ELsmp/kernel/net/key/af_key.ko
Apr 7 09:01:19 localhost ipsec_setup: insmod /lib/modules/2.6.9-5.ELsmp/kernel/net/ipv4/ah4.ko
Apr 7 09:01:19 localhost ipsec_setup: insmod /lib/modules/2.6.9-5.ELsmp/kernel/net/ipv4/esp4.ko
Apr 7 09:01:19 localhost ipsec_setup: insmod /lib/modules/2.6.9-5.ELsmp/kernel/net/ipv4/ipcomp.ko
Apr 7 09:01:19 localhost ipsec_setup: insmod /lib/modules/2.6.9-5.ELsmp/kernel/net/ipv4/xfrm4_tunnel.ko
Apr 7 09:01:19 localhost ipsec_setup: insmod /lib/modules/2.6.9-5.ELsmp/kernel/crypto/des.ko
Apr 7 09:01:19 localhost ipsec_setup: insmod /lib/modules/2.6.9-5.ELsmp/kernel/arch/i386/crypto/aes-i586.ko
+ _________________________ plog
+ sed -n '32407,$p' /var/log/secure
+ egrep -i pluto
+ case "$1" in
+ cat
Apr 7 09:01:19 localhost ipsec__plutorun: Starting Pluto subsystem...
Apr 7 09:01:20 localhost pluto[2903]: Starting Pluto (Openswan Version 2.3.0 X.509-1.5.4 PLUTO_USES_KEYRR)
Apr 7 09:01:21 localhost pluto[2903]: Setting port floating to on
Apr 7 09:01:21 localhost pluto[2903]: port floating activate 1/1
Apr 7 09:01:21 localhost pluto[2903]: including NAT-Traversal patch (Version 0.6c)
Apr 7 09:01:21 localhost pluto[2903]: ike_alg_register_enc(): Activating OAKLEY_AES_CBC: Ok (ret=0)
Apr 7 09:01:21 localhost pluto[2903]: starting up 1 cryptographic helpers
Apr 7 09:01:21 localhost pluto[2903]: started helper pid=3002 (fd:6)
Apr 7 09:01:21 localhost pluto[2903]: Using Linux 2.6 IPsec interface code
Apr 7 09:01:21 localhost pluto[2903]: Changing to directory '/etc/ipsec.d/cacerts'
Apr 7 09:01:22 localhost pluto[2903]: loaded CA cert file 'cacert.pem' (1111 bytes)
Apr 7 09:01:22 localhost pluto[2903]: Could not change to directory '/etc/ipsec.d/aacerts'
Apr 7 09:01:22 localhost pluto[2903]: Could not change to directory '/etc/ipsec.d/ocspcerts'
Apr 7 09:01:22 localhost pluto[2903]: Changing to directory '/etc/ipsec.d/crls'
Apr 7 09:01:22 localhost pluto[2903]: loaded crl file 'old-crl.pem' (459 bytes)
Apr 7 09:01:22 localhost pluto[2903]: loaded crl file 'crl.pem' (459 bytes)
Apr 7 09:01:22 localhost pluto[2903]: loaded host cert file '/etc/ipsec.d/certs/ipsec-server.crt' (3350 bytes)
Apr 7 09:01:22 localhost pluto[2903]: added connection description "roadwarrior-l2tp"
Apr 7 09:01:22 localhost pluto[2903]: loaded host cert file '/etc/ipsec.d/certs/ipsec-server.crt' (3350 bytes)
Apr 7 09:01:22 localhost pluto[2903]: added connection description "roadwarrior"
Apr 7 09:01:22 localhost pluto[2903]: loaded host cert file '/etc/ipsec.d/certs/ipsec-server.crt' (3350 bytes)
Apr 7 09:01:22 localhost pluto[2903]: added connection description "roadwarrior-l2tp-updatedwin"
Apr 7 09:01:22 localhost pluto[2903]: listening for IKE messages
Apr 7 09:01:22 localhost pluto[2903]: adding interface eth0/eth0 134.126.20.79
Apr 7 09:01:22 localhost pluto[2903]: adding interface eth0/eth0 134.126.20.79:4500
Apr 7 09:01:22 localhost pluto[2903]: adding interface lo/lo 127.0.0.1
Apr 7 09:01:22 localhost pluto[2903]: adding interface lo/lo 127.0.0.1:4500
Apr 7 09:01:22 localhost pluto[2903]: adding interface lo/lo ::1
Apr 7 09:01:22 localhost pluto[2903]: loading secrets from "/etc/ipsec.secrets"
Apr 7 09:01:22 localhost pluto[2903]: loaded private key file '/etc/ipsec.d/private/ipsec-server-encrypted.key' (963 bytes)
Apr 7 09:02:03 localhost pluto[2903]: packet from 69.168.0.106:4500: Informational Exchange is for an unknown (expired?) SA
Apr 7 09:02:03 localhost pluto[2903]: packet from 69.168.0.106:4500: Informational Exchange is for an unknown (expired?) SA
Apr 7 09:04:02 localhost pluto[2903]: packet from 69.251.186.224:500: ignoring Vendor ID payload [MS NT5 ISAKMPOAKLEY 00000002]
Apr 7 09:04:02 localhost pluto[2903]: packet from 69.251.186.224:500: ignoring Vendor ID payload [FRAGMENTATION]
Apr 7 09:04:02 localhost pluto[2903]: packet from 69.251.186.224:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n] method set to=106
Apr 7 09:04:02 localhost pluto[2903]: "roadwarrior-l2tp"[1] 69.251.186.224 #1: responding to Main Mode from unknown peer 69.251.186.224
Apr 7 09:04:02 localhost pluto[2903]: "roadwarrior-l2tp"[1] 69.251.186.224 #1: transition from state STATE_MAIN_R0 to state STATE_MAIN_R1
Apr 7 09:04:02 localhost pluto[2903]: "roadwarrior-l2tp"[1] 69.251.186.224 #1: NAT-Traversal: Result using draft-ietf-ipsec-nat-t-ike-02/03: peer is NATed
Apr 7 09:04:02 localhost pluto[2903]: "roadwarrior-l2tp"[1] 69.251.186.224 #1: transition from state STATE_MAIN_R1 to state STATE_MAIN_R2
Apr 7 09:04:03 localhost pluto[2903]: "roadwarrior-l2tp"[1] 69.251.186.224 #1: Main mode peer ID is ID_DER_ASN1_DN: 'C=US, ST=Virginia, L=Harrisonburg, O=JMU, OU=CS, CN=192.168.2.200'
Apr 7 09:04:03 localhost pluto[2903]: "roadwarrior-l2tp"[1] 69.251.186.224 #1: crl update for "C=US, ST=Virginia, L=Harrisonburg, O=JMU, OU=CS, CN=Crypto CA" is overdue since Jan 08 20:33:06 UTC 2006
Apr 7 09:04:03 localhost pluto[2903]: "roadwarrior-l2tp"[2] 69.251.186.224 #1: deleting connection "roadwarrior-l2tp" instance with peer 69.251.186.224 {isakmp=#0/ipsec=#0}
Apr 7 09:04:03 localhost pluto[2903]: "roadwarrior-l2tp"[2] 69.251.186.224 #1: I am sending my cert
Apr 7 09:04:03 localhost pluto[2903]: "roadwarrior-l2tp"[2] 69.251.186.224 #1: transition from state STATE_MAIN_R2 to state STATE_MAIN_R3
Apr 7 09:04:03 localhost pluto[2903]: | NAT-T: new mapping 69.251.186.224:500/33700)
Apr 7 09:04:03 localhost pluto[2903]: "roadwarrior-l2tp"[2] 69.251.186.224:33700 #1: sent MR3, ISAKMP SA established
Apr 7 09:04:03 localhost pluto[2903]: "roadwarrior-l2tp"[2] 69.251.186.224:33700 #2: responding to Quick Mode
Apr 7 09:04:03 localhost pluto[2903]: "roadwarrior-l2tp"[2] 69.251.186.224:33700 #2: transition from state STATE_QUICK_R0 to state STATE_QUICK_R1
Apr 7 09:04:03 localhost pluto[2903]: "roadwarrior-l2tp"[2] 69.251.186.224:33700 #2: transition from state STATE_QUICK_R1 to state STATE_QUICK_R2
Apr 7 09:04:03 localhost pluto[2903]: "roadwarrior-l2tp"[2] 69.251.186.224:33700 #2: IPsec SA established {ESP/NAT=>0x2dc4ddf3 <0x47e5b9c3 NATOA=192.168.0.7}
+ _________________________ date
+ date
Fri Apr 7 09:14:09 EDT 2006
More information about the Users
mailing list