[Openswan Users] l2tp/ipsec - ipsec ok, but no connection
Adam Zientek
adam.zientek at hot.pl
Sat Aug 12 06:14:31 EDT 2006
Hello!
I try to do l2tp/ipsecc connection between my home WinXP SP2pc and work
network.
81.168.163.SS ---> 81.168.163.CC ---> 192.168.1.100
192.168.0.0/24 192.168.115.0/24 192.168.1.0/24
I have installed openswan 2.4.4 on my work router (81.168.163.SS)
I try co connect from my home (192.168.1.100). At home i have simple
wireless router (192.168.1.100>NAT>192.168.115.25) then is my campus
router (192.168.115.25>NAT>81.168.163.CC). OK, i configure
openswan,l2tpd, import certificate on home pc and try to connect.
Windows get 678 error and on server i get:
---
pluto[16782]: adding interface eth2/eth2 192.168.0.2:500
pluto[16782]: adding interface eth2/eth2 192.168.0.2:4500
pluto[16782]: adding interface eth0/eth0 81.168.163.SS:500
pluto[16782]: adding interface eth0/eth0 81.168.163.SS:4500
pluto[16782]: adding interface lo/lo 127.0.0.1:500
pluto[16782]: adding interface lo/lo 127.0.0.1:4500
pluto[16782]: loading secrets from "/etc/ipsec.secrets"
pluto[16782]: loaded private key file
'/etc/ipsec.d/private/ipsecgw.key' (963 bytes)
pluto[16782]: packet from 81.168.163.CC:64463: ignoring Vendor ID
payload [MS NT5 ISAKMPOAKLEY 00000004]
pluto[16782]: packet from 81.168.163.CC:64463: ignoring Vendor ID
payload [FRAGMENTATION]
pluto[16782]: packet from 81.168.163.CC:64463: received Vendor ID
payload [draft-ietf-ipsec-nat-t-ike-02_n] method set to=106
pluto[16782]: packet from 81.168.163.CC:64463: ignoring Vendor ID
payload [Vid-Initial-Contact]
pluto[16782]: "l2tp-x509"[1] 81.168.163.CC #1: responding to Main Mode
from unknown peer 81.168.163.CC
pluto[16782]: "l2tp-x509"[1] 81.168.163.CC #1: transition from state
STATE_MAIN_R0 to state STATE_MAIN_R1
pluto[16782]: "l2tp-x509"[1] 81.168.163.CC #1: STATE_MAIN_R1: sent MR1,
expecting MI2
pluto[16782]: "l2tp-x509"[1] 81.168.163.CC #1: NAT-Traversal: Result
using draft-ietf-ipsec-nat-t-ike-02/03: peer is NATed
pluto[16782]: "l2tp-x509"[1] 81.168.163.CC #1: transition from state
STATE_MAIN_R1 to state STATE_MAIN_R2
pluto[16782]: "l2tp-x509"[1] 81.168.163.CC #1: STATE_MAIN_R2: sent MR2,
expecting MI3
pluto[16782]: "l2tp-x509"[1] 81.168.163.CC #1: Main mode peer ID is
ID_DER_ASN1_DN: 'here_is_DN_of_ClientCert'
pluto[16782]: "l2tp-x509"[1] 81.168.163.CC #1: no crl from issuer
"here_is_my_CA_DN" found (strict=no)
pluto[16782]: "l2tp-x509"[2] 81.168.163.CC #1: deleting connection
"l2tp-x509" instance with peer 81.168.163.CC {isakmp=#0/ipsec=#0}
pluto[16782]: "l2tp-x509"[2] 81.168.163.CC #1: I am sending my cert
pluto[16782]: "l2tp-x509"[2] 81.168.163.CC #1: transition from state
STATE_MAIN_R2 to state STATE_MAIN_R3
pluto[16782]: | NAT-T: new mapping 81.168.163.CC:64463/61799)
pluto[16782]: "l2tp-x509"[2] 81.168.163.CC #1: STATE_MAIN_R3: sent MR3,
ISAKMP SA established {auth=OAKLEY_RSA_SIG cipher=oakley_3des_cbc_192
prf=oakley_sha group=modp2048}
pluto[16782]: "l2tp-x509"[2] 81.168.163.CC #2: responding to Quick Mode
{msgid:1af6e771}
pluto[16782]: "l2tp-x509"[2] 81.168.163.CC #2: transition from state
STATE_QUICK_R0 to state STATE_QUICK_R1
pluto[16782]: "l2tp-x509"[2] 81.168.163.CC #2: STATE_QUICK_R1: sent QR1,
inbound IPsec SA installed, expecting QI2
pluto[16782]: "l2tp-x509"[2] 81.168.163.CC #2: transition from state
STATE_QUICK_R1 to state STATE_QUICK_R2
pluto[16782]: "l2tp-x509"[2] 81.168.163.CC #2: STATE_QUICK_R2: IPsec SA
established {ESP=>0xfc3666ec <0xa82d6562 xfrm=3DES_0-HMAC_MD5
NATD=81.168.163.CC:61799 DPD=none}
pluto[16782]: packet from 81.168.163.CC:64463: ignoring Vendor ID
payload [MS NT5 ISAKMPOAKLEY 00000004]
pluto[16782]: packet from 81.168.163.CC:64463: ignoring Vendor ID
payload [FRAGMENTATION]
pluto[16782]: packet from 81.168.163.CC:64463: received Vendor ID
payload [draft-ietf-ipsec-nat-t-ike-02_n] method set to=106
pluto[16782]: packet from 81.168.163.CC:64463: ignoring Vendor ID
payload [Vid-Initial-Contact]
pluto[16782]: "l2tp-x509"[2] 81.168.163.CC #3: responding to Main Mode
from unknown peer 81.168.163.CC
pluto[16782]: "l2tp-x509"[2] 81.168.163.CC #3: transition from state
STATE_MAIN_R0 to state STATE_MAIN_R1
pluto[16782]: "l2tp-x509"[2] 81.168.163.CC #3: STATE_MAIN_R1: sent MR1,
expecting MI2
pluto[16782]: "l2tp-x509"[2] 81.168.163.CC #3: NAT-Traversal: Result
using draft-ietf-ipsec-nat-t-ike-02/03: peer is NATed
pluto[16782]: "l2tp-x509"[2] 81.168.163.CC #3: transition from state
STATE_MAIN_R1 to state STATE_MAIN_R2
pluto[16782]: "l2tp-x509"[2] 81.168.163.CC #3: STATE_MAIN_R2: sent MR2,
expecting MI3
pluto[16782]: "l2tp-x509"[2] 81.168.163.CC #3: Main mode peer ID is
ID_DER_ASN1_DN: 'here_is_DN_of_ClientCert'
pluto[16782]: "l2tp-x509"[2] 81.168.163.CC #3: no crl from issuer
"here_is_my_CA_DN" found (strict=no)
pluto[16782]: "l2tp-x509"[2] 81.168.163.CC #3: I am sending my cert
pluto[16782]: "l2tp-x509"[2] 81.168.163.CC #3: transition from state
STATE_MAIN_R2 to state STATE_MAIN_R3
pluto[16782]: | NAT-T: new mapping 81.168.163.CC:64463/61799)
pluto[16782]: "l2tp-x509"[2] 81.168.163.CC #3: STATE_MAIN_R3: sent MR3,
ISAKMP SA established {auth=OAKLEY_RSA_SIG cipher=oakley_3des_cbc_192
prf=oakley_sha group=modp2048}
pluto[16782]: "l2tp-x509"[2] 81.168.163.CC #4: responding to Quick Mode
{msgid:1c7163bd}
pluto[16782]: "l2tp-x509"[2] 81.168.163.CC #4: transition from state
STATE_QUICK_R0 to state STATE_QUICK_R1
pluto[16782]: "l2tp-x509"[2] 81.168.163.CC #4: STATE_QUICK_R1: sent QR1,
inbound IPsec SA installed, expecting QI2
pluto[16782]: "l2tp-x509"[2] 81.168.163.CC #4: transition from state
STATE_QUICK_R1 to state STATE_QUICK_R2
pluto[16782]: "l2tp-x509"[2] 81.168.163.CC #4: STATE_QUICK_R2: IPsec SA
established {ESP=>0x3e80b6b5 <0x017f8ec8 xfrm=3DES_0-HMAC_MD5
NATD=81.168.163.CC:61799 DPD=none}
---
This part:
ignoring Vendor ID payload [MS NT5 ISAKMPOAKLEY 00000004]
[...]
STATE_QUICK_R2: IPsec SA established
repeats until WinXP terminate connection with 678 error. There is no
messages form l2tpd.
My system is Fedora Core 5, kernel 2.4.17, openswan 2.4.4, l2tpd 0.69
ipsec.conf:
version 2.0
config setup
# klipsdebug=none
# plutodebug="control parsing"
nat_traversal=yes
virtual_private=%v4:!192.168.0.0/24,%v4:192.168.1.0/24,%v4:192.168.117.0/24
include /etc/ipsec.d/no_oe.conf
conn l2tp-x509
left=81.168.163.SS
leftnexthop=81.168.163.1
leftprotoport=17/1701
leftrsasigkey=%cert
leftcert=/etc/ipsec.d/certs/ipsecgwCert.pem
rightprotoport=17/%any
rightsubnet=vhost:%priv,%no
right=%any
rightrsasigkey=%cert
auto=add
authby=rsasig
pfs=no
#rekey=no
#type=transport
#keyingtries=1
# rightca=%same
81.168.163.1 <-- this is my ISP gateway
Please tell me why i get "IPsec SA established", but connection is not
establshed?
--
Pozdrawiam
Adam Zientek
More information about the Users
mailing list