[Openswan Users] help again ( sory about flood)

Sergio Bazilio sbazilio at gmail.com
Wed Apr 19 16:01:10 CEST 2006


so guys, now i can start tunnel, the tunnel is UP.


i can see the ping , and the reply in my interface
14:57:32.259182 IP acobr190.acotelbr.com.br > chattv01.m4u.com.br: ICMP echo
request, id 33104, seq 832, length 64
14:57:32.259194 IP chattv01.m4u.com.br > acobr190.acotelbr.com.br: ICMP echo
reply, id 33104, seq 832, length 64
14:57:33.203657 IP acobr190.acotelbr.com.br > chattv01.m4u.com.br: ICMP echo
request, id 33104, seq 833, length 64
14:57:33.203668 IP chattv01.m4u.com.br > acobr190.acotelbr.com.br: ICMP echo
reply, id 33104, seq 833, length 64


but, in shell i dont see the ping and in /var/log/messages, i get a flood of



Apr 19 15:01:01 chattv01 pluto[5087]: "acotel-m4u" #8: initiating Main Mode
Apr 19 15:01:01 chattv01 pluto[5087]: "acotel-m4u" #8: transition from state
STATE_MAIN_I1 to state STATE_MAIN_I2
Apr 19 15:01:01 chattv01 pluto[5087]: "acotel-m4u" #8: STATE_MAIN_I2: sent
MI2, expecting MR2
Apr 19 15:01:01 chattv01 pluto[5087]: "acotel-m4u" #8: received Vendor ID
payload [Cisco-Unity]
Apr 19 15:01:01 chattv01 pluto[5087]: "acotel-m4u" #8: received Vendor ID
payload [Dead Peer Detection]
Apr 19 15:01:01 chattv01 pluto[5087]: "acotel-m4u" #8: ignoring unknown
Vendor ID payload [4bf4d2809c90ddc44ad8ebca2c03a199]
Apr 19 15:01:01 chattv01 pluto[5087]: "acotel-m4u" #8: I did not send a
certificate because I do not have one.
Apr 19 15:01:01 chattv01 pluto[5087]: "acotel-m4u" #8: transition from state
STATE_MAIN_I2 to state STATE_MAIN_I3
Apr 19 15:01:01 chattv01 pluto[5087]: "acotel-m4u" #8: STATE_MAIN_I3: sent
MI3, expecting MR3
Apr 19 15:01:01 chattv01 pluto[5087]: "acotel-m4u" #8: Main mode peer ID is
ID_IPV4_ADDR: '200.184.147.253'
Apr 19 15:01:01 chattv01 pluto[5087]: "acotel-m4u" #8: transition from state
STATE_MAIN_I3 to state STATE_MAIN_I4
Apr 19 15:01:01 chattv01 pluto[5087]: "acotel-m4u" #8: STATE_MAIN_I4: ISAKMP
SA established {auth=OAKLEY_PRESHARED_KEY cipher=oakley_3des_cbc_192
prf=oakley_md5 group=modp1024}
Apr 19 15:01:01 chattv01 pluto[5087]: "acotel-m4u" #9: initiating Quick Mode
PSK+ENCRYPT+TUNNEL+UP {using isakmp#8}
Apr 19 15:01:01 chattv01 pluto[5087]: "acotel-m4u" #8: ignoring
informational payload, type IPSEC_INITIAL_CONTACT
Apr 19 15:01:01 chattv01 pluto[5087]: "acotel-m4u" #8: received and ignored
informational message
Apr 19 15:01:01 chattv01 pluto[5087]: "acotel-m4u" #9: ignoring
informational payload, type IPSEC_RESPONDER_LIFETIME
Apr 19 15:01:01 chattv01 pluto[5087]: "acotel-m4u" #9: transition from state
STATE_QUICK_I1 to state STATE_QUICK_I2
Apr 19 15:01:01 chattv01 pluto[5087]: "acotel-m4u" #9: STATE_QUICK_I2: sent
QI2, IPsec SA established {ESP=>0xd1dde979 <0x7ff638d3 xfrm=3DES_0-HMAC_MD5
NATD=none DPD=none}
Apr 19 15:01:05 chattv01 pluto[5087]: "acotel-m4u" #8: cannot respond to
IPsec SA request because no connection is known for
200.150.149.0/24===200.150.149.196...200.184.147.253===200.184.147.0/24
Apr 19 15:01:05 chattv01 pluto[5087]: "acotel-m4u" #8: sending encrypted
notification INVALID_ID_INFORMATION to 200.184.147.253:500
Apr 19 15:01:08 chattv01 pluto[5087]: "acotel-m4u" #8: cannot respond to
IPsec SA request because no connection is known for
200.150.149.0/24===200.150.149.196...200.184.147.253===200.184.147.190/32
Apr 19 15:01:08 chattv01 pluto[5087]: "acotel-m4u" #8: sending encrypted
notification INVALID_ID_INFORMATION to 200.184.147.253:500

Apr 19 15:01:20 chattv01 pluto[5087]: "acotel-m4u" #8: Quick Mode I1 message
is unacceptable because it uses a previously used Message ID 0xb0c315e2
(perhaps this is a duplicated packet)
Apr 19 15:01:20 chattv01 pluto[5087]: "acotel-m4u" #8: sending encrypted
notification INVALID_MESSAGE_ID to 200.184.147.253:500
Apr 19 15:01:23 chattv01 pluto[5087]: "acotel-m4u" #8: Quick Mode I1 message
is unacceptable because it uses a previously used Message ID 0xb857cbff
(perhaps this is a duplicated packet)
Apr 19 15:01:23 chattv01 pluto[5087]: "acotel-m4u" #8: sending encrypted
notification INVALID_MESSAGE_ID to 200.184.147.253:500


Any hint??


my ipsec.conf is:


# /etc/ipsec.conf - OpenSWAN IPSec configuration file

#The version information is needed for OpenSWAN

version 2.0

# basic configuration
config setup
        interfaces=%defaultroute
        klipsdebug=none
        plutodebug=none

# Add connections here


conn %default
        esp=3des-md5-96
        authby=secret



conn acotel-m4u
        type=tunnel
        left=200.184.147.253
        leftnexthop=200.184.147.254
        leftsubnet=200.184.147.22/32
        ikelifetime=86400
        right=200.150.149.196
        rightnexthop=200.150.149.193
        rightsubnet=200.150.149.196/32
        keyexchange=ike
        pfs=no
        auto=start




# Disable Opportunistic Encryption
include /etc/ipsec.d/examples/no_oe.conf




--
Sergio Bazilio
 Analista de Operações
-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://lists.openswan.org/pipermail/users/attachments/20060419/43faf300/attachment-0001.htm


More information about the Users mailing list