[Openswan Users] Cannot ping from net to net configuration
(solved)
Daniele Melosi
Mailing2004 at melosi.it
Wed Apr 26 11:19:26 CEST 2006
Solved!!!
It was *only* a firewall problem. My ACL blocked proto 50 packets. :-(
Daniele Melosi wrote:
> Good Afternoon,
>
> I've this strange problem (i'm unable to ping from net to net) with an
> ipsec net2net configuration; the config file is:
>
> -- start conf file ---
> config setup
> #interfaces=%defaultroute
> #forwardcontrol=yes
> klipsdebug=all
> plutodebug=all
>
> conn firenzemilano
> left=xxx.yyy.97.30
> leftsubnet=192.168.70.0/24
> # RSA 2048 bits ipsec2mi Thu Apr 20 18:49:38 2006
> leftrsasigkey=0sAQOSN9lKw9Op8wqDjCbhPkiSVS[cut]
> leftid=@ipsec2mi.xxxx.it
> #leftnexthop=%defaultroute
> right=xxx.yyy.127.25
> rightsubnet=zzz.yyyy.122.208/29
> # RSA 2048 bits ipsec2fi Tue Oct 25 06:28:37 2005
> rightrsasigkey=0sAQNplGefFpF4jygV[cut]
> rightid=@ipsec2fi.xxxx.it
> auto=add
> #auto=start
>
> #Disable Opportunistic Encryption
> include /etc/ipsec/ipsec.d/examples/no_oe.conf
> -- end conf file --
>
> when I started the connection I received the following output:
> ipsec2fi ~ # ipsec auto --up firenzemilano
> 104 "firenzemilano" #19: STATE_MAIN_I1: initiate
> 003 "firenzemilano" #19: received Vendor ID payload [Openswan (this
> version) 2.4.4 X.509-1.5.4 PLUTO_SENDS_VENDORID PLUTO_USES_KEYRR]
> 003 "firenzemilano" #19: received Vendor ID payload [Dead Peer Detection]
> 106 "firenzemilano" #19: STATE_MAIN_I2: sent MI2, expecting MR2
> 108 "firenzemilano" #19: STATE_MAIN_I3: sent MI3, expecting MR3
> 004 "firenzemilano" #19: STATE_MAIN_I4: ISAKMP SA established
> {auth=OAKLEY_RSA_SIG cipher=oakley_3des_cbc_192 prf=oakley_md5
> group=modp1536}
> 117 "firenzemilano" #20: STATE_QUICK_I1: initiate
> 004 "firenzemilano" #20: STATE_QUICK_I2: sent QI2, IPsec SA established
> {ESP=>0xd88f34a2 <0xf12f0b18 xfrm=AES_0-HMAC_SHA1 NATD=none DPD=none}
>
> with tcpdump (on ipsec2f18:01:32.670821 IP (tos 0x0, ttl 64, id 0,
> offset 0, flags [DF], proto: UDP (17), length: 240) xxx.yyy.127.25.500 >
> xxx.yyy.97.30.500: isakmp 1.0 msgid : phase 1 I ident: [|sa]
> 18:01:32.712631 IP (tos 0x0, ttl 53, id 0, offset 0, flags [DF], proto:
> UDP (17), length: 144) xxx.yyy.97.30.500 > xxx.yyy.127.25.500: isakmp
> 1.0 msgid : phase 1 R ident: [|sa]
> 18:01:32.723233 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto:
> UDP (17), length: 272) xxx.yyy.127.25.500 > xxx.yyy.97.30.500: isakmp
> 1.0 msgid : phase 1 I ident: [|ke]
> 18:01:32.789140 IP (tos 0x0, ttl 53, id 0, offset 0, flags [DF], proto:
> UDP (17), length: 272) xxx.yyy.97.30.500 > xxx.yyy.127.25.500: isakmp
> 1.0 msgid : phase 1 R ident: [|ke]
> 18:01:32.817444 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto:
> UDP (17), length: 344) xxx.yyy.127.25.500 > xxx.yyy.97.30.500: isakmp
> 1.0 msgid : phase 1 I ident[E]: [encrypted id]
> 18:01:32.899139 IP (tos 0x0, ttl 53, id 0, offset 0, flags [DF], proto:
> UDP (17), length: 344) xxx.yyy.97.30.500 > xxx.yyy.127.25.500: isakmp
> 1.0 msgid : phase 1 R ident[E]: [encrypted id]
> 18:01:32.914608 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto:
> UDP (17), length: 464) xxx.yyy.127.25.500 > xxx.yyy.97.30.500: isakmp
> 1.0 msgid : phase 2/others I oakley-quick[E]: [encrypted hash]
> 18:01:32.993829 IP (tos 0x0, ttl 53, id 0, offset 0, flags [DF], proto:
> UDP (17), length: 376) xxx.yyy.97.30.500 > xxx.yyy.127.25.500: isakmp
> 1.0 msgid : phase 2/others R oakley-quick[E]: [encrypted hash]
> 18:01:33.032381 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto:
> UDP (17), length: 80) xxx.yyy.127.25.500 > xxx.yyy.97.30.500: isakmp 1.0
> msgid : phase 2/others I oakley-quick[E]: [encrypted hash]
>
> ipsec verify returns:
> ipsec2fi ~ # ipsec verify
> Checking your system to see if IPsec got installed and started correctly:
> Version check and ipsec on-path [OK]
> Linux Openswan U2.4.4/K2.6.16.9-dada01dada (netkey)
> Checking for IPsec support in kernel [OK]
> Checking for RSA private key (/etc/ipsec/ipsec.secrets) [OK]
> Checking that pluto is running [OK]
> Two or more interfaces found, checking IP forwarding [OK]
> Checking NAT and MASQUERADEing [OK]
> Checking for 'ip' command [OK]
> Checking for 'iptables' command [OK]
> Checking for 'setkey' command for NETKEY IPsec stack support [OK]
> Opportunistic Encryption Support [DISABLED]
>
> ip_forward is enable on both gateway
>
> In this situation I'm unable to ping any host behind the first gw
> (ipsec2mi) from any host behind the second gw (ipsec2fi).
>
> Please give me some troubleshooting tips.
>
> Thanks in advance.
> Daniele
More information about the Users
mailing list