[Openswan Users] Connection Stuck on STATE_MAIN_I3
Carlos Prieto
prieto.carlos at gmail.com
Mon Jan 30 14:42:39 CET 2006
Hi !
I'm trying to get a connection with NATed clients using either
Linux/Openswan and Windows 2000/XP.
I've followed the instructions from
http://www.natecarlson.com/linux/ipsec-x509.php.
I have to mention that we had SuSE linux 9.0 with FreeSwan 1.99 +
X.509Patch, and it was running smoothly for over a year with NATed and
non-NATed
clients. Now, we upgraded to Fedora Core 4 running Openswan 2.4.4 and the
VPNs connections are not working. Only works if the client is not NATed.
I'm using X.509 certificates (the same certificates used with SuSE and
FreeSWAN). Here is my configuration:
version 2.0
config setup
interfaces=%defaultroute
nat_traversal=yes
virtual_private=%v4:10.0.0.0/8,%v4:172.16.0.0/12,%v4:192.168.0.0/16
conn %default
keyingtries=1
compress=yes
disablearrivalcheck=no
authby=rsasig
leftrsasigkey=%cert
rightrsasigkey=%cert
conn block
auto=ignore
conn private
auto=ignore
conn private-or-clear
auto=ignore
conn clear-or-private
auto=ignore
conn clear
auto=ignore
conn packetdefault
auto=ignore
conn roadwarrior-net
leftsubnet=(local ip net)/(local subnet)
also=roadwarrior
conn roadwarrior
left=%defaultroute
leftcert=(vpn gateway x.509 certificate file)
right=%any
rightsubnet=vhost:%no,%priv
auto=add
pfs=yes
So, when i try to initiate a manual connection from a Linux NATed client,
here are the steps:
ipsec auto --verbose --up roadwarrior
002 "roadwarrior" #1: initiating Main Mode
104 "roadwarrior" #1: STATE_MAIN_I1: initiate
003 "roadwarrior" #1: ignoring unknown Vendor ID payload
[4f45647c6b5d646e6a744347]
003 "roadwarrior" #1: received Vendor ID payload [Dead Peer Detection]
003 "roadwarrior" #1: received Vendor ID payload [RFC 3947] method set
to=109
002 "roadwarrior" #1: enabling possible NAT-traversal with method 3
002 "roadwarrior" #1: transition from state STATE_MAIN_I1 to state
STATE_MAIN_I2106 "roadwarrior" #1: STATE_MAIN_I2: sent MI2, expecting MR2
003 "roadwarrior" #1: NAT-Traversal: Result using 3: i am NATed
002 "roadwarrior" #1: I am sending my cert
002 "roadwarrior" #1: I am sending a certificate request
002 "roadwarrior" #1: transition from state STATE_MAIN_I2 to state
STATE_MAIN_I3108 "roadwarrior" #1: STATE_MAIN_I3: sent MI3, expecting MR3
003 "roadwarrior" #1: discarding duplicate packet; already STATE_MAIN_I3
010 "roadwarrior" #1: STATE_MAIN_I3: retransmission; will wait 20s for
response
003 "roadwarrior" #1: discarding duplicate packet; already STATE_MAIN_I3
010 "roadwarrior" #1: STATE_MAIN_I3: retransmission; will wait 40s for
response
031 "roadwarrior" #1: max number of retransmissions (2) reached
STATE_MAIN_I3. Possible authentication failure: no acceptable response to
our first encrypted message
And, on the gateway side (which it's not NATed) here is the log:
Jan 30 14:30:33 zeus pluto[8239]: packet from x.y.z.w:500: ignoring unknown
Vendor ID payload [4f457a7d4646466667725f65]
Jan 30 14:30:33 zeus pluto[8239]: packet from x.y.z.w:500: received Vendor
ID payload [Dead Peer Detection]
Jan 30 14:30:33 zeus pluto[8239]: packet from x.y.z.w:500: received Vendor
ID payload [RFC 3947] method set to=109
Jan 30 14:30:33 zeus pluto[8239]: packet from x.y.z.w:500: received Vendor
ID payload [draft-ietf-ipsec-nat-t-ike-03] meth=108, but already using
method 109
Jan 30 14:30:33 zeus pluto[8239]: packet from x.y.z.w:500: received Vendor
ID payload [draft-ietf-ipsec-nat-t-ike-02] meth=107, but already using
method 109
Jan 30 14:30:33 zeus pluto[8239]: packet from x.y.z.w:500: received Vendor
ID payload [draft-ietf-ipsec-nat-t-ike-00]
Jan 30 14:30:33 zeus pluto[8239]: "roadwarrior"[1] x.y.z.w #1: responding to
Main Mode from unknown peer 201.240.76.12
Jan 30 14:30:33 zeus pluto[8239]: "roadwarrior"[1] x.y.z.w #1: transition
from state STATE_MAIN_R0 to state STATE_MAIN_R1
Jan 30 14:30:33 zeus pluto[8239]: "roadwarrior"[1] x.y.z.w #1:
STATE_MAIN_R1: sent MR1, expecting MI2
Jan 30 14:30:34 zeus pluto[8239]: "roadwarrior"[1] x.y.z.w #1:
NAT-Traversal: Result using 3: peer is NATed
Jan 30 14:30:34 zeus pluto[8239]: "roadwarrior"[1] x.y.z.w #1: transition
from state STATE_MAIN_R1 to state STATE_MAIN_R2
Jan 30 14:30:34 zeus pluto[8239]: "roadwarrior"[1] x.y.z.w #1:
STATE_MAIN_R2: sent MR2, expecting MI3
Jan 30 14:31:44 zeus pluto[8239]: "roadwarrior"[1] x.y.z.w #1: max number of
retransmissions (2) reached STATE_MAIN_R2
Jan 30 14:31:44 zeus pluto[8239]: "roadwarrior"[1] x.y.z.w: deleting
connection "roadwarrior" instance with peer x.y.z.w {isakmp=#0/ipsec=#0}
So, it seems the Main Initiator Phase 3 from the client, does not reach the
VPN gateway, the Client says it sent it, but the Gateway claims it'is
missing.
NATed IPsec
Client Gateway
MI1 ---------->
<---------- MR1
MI2 ---------->
<---------- MR2
MI3 ----------> ( LOST ! )
<---------- MR3 ( NEVER COMES ! )
However, if i move this client, to a non-NATed connection, the
connection success.
I've been playing around for 3 or 4 days, and i really can't sleep. I would
appreciate any help you could give me.
Thanks in advance.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://lists.openswan.org/pipermail/users/attachments/20060130/07faf448/attachment-0001.htm
More information about the Users
mailing list