[Openswan Users] can't get connected :-(
Ian Zimmerman
nobrowser at gmail.com
Tue Jun 20 00:33:23 CEST 2006
Hi,
I have been struggling to make use of my employer's VPN.
They gave me instructions assuming I'd use SSH Sentinel on Windows.
The instructions:
The remote public IP (1.2.3.4)
The local private address (192.168.254.102/32)
The remote private subnet (10.0.0.0/8)
The local ID (addy at asid.com)
The PSK "notreallythis"
tunnel mode, ESP, aggressive mode on, cipher AES-256.
here's my ipsec.secrets:
# RCSID $Id: ipsec.secrets.proto,v 1.3.6.1 2005/09/28 13:59:14 paul Exp $
# This file holds shared secrets or RSA private keys for inter-Pluto
# authentication. See ipsec_pluto(8) manpage, and HTML documentation.
# RSA private key for this host, authenticating it to any other host
# which knows the public part. Suitable public keys, for ipsec.conf, DNS,
# or configuration of other implementations, can be extracted conveniently
# with "ipsec showhostkey".
%any 1.2.3.4: PSK "notreallythis"
here's my ipsec.conf:
# /etc/ipsec.conf - Openswan IPsec configuration file
# RCSID $Id: ipsec.conf.in,v 1.15.2.2 2005/11/14 20:10:27 paul Exp $
# This file: /usr/share/doc/openswan/ipsec.conf-sample
#
# Manual: ipsec.conf.5
version 2.0 # conforms to second version of ipsec.conf specification
# basic configuration
config setup
# plutodebug / klipsdebug = "all", "none" or a combation from below:
# "raw crypt parsing emitting control klips pfkey natt x509 private"
# eg:
# plutodebug="control parsing"
#
# Only enable klipsdebug=all if you are a developer
#
# NAT-TRAVERSAL support, see README.NAT-Traversal
# nat_traversal=yes
# virtual_private=%v4:10.0.0.0/8,%v4:192.168.0.0/16,%4:172.16.0.0/12
rp_filter=%unchanged
plutodebug=all
plutowait=yes
# Add connections here
# sample VPN connection
#conn sample
# # Left security gateway, subnet behind it, nexthop toward right.
# left=10.0.0.1
# leftsubnet=172.16.0.0/24
# leftnexthop=10.22.33.44
# # Right security gateway, subnet behind it, nexthop toward left.
# right=10.12.12.1
# rightsubnet=192.168.0.0/24
# rightnexthop=10.101.102.103
# # To authorize this connection, but not actually start it,
# # at startup, uncomment this.
# #auto=start
conn myfailedconn
left=%defaultroute
leftsubnet=192.168.254.102/32
right=1.2.3.4
rightsubnet=10.0.0.0/8
auto=start
authby=secret
leftid=addy at asid.com
aggrmode=yes
ike=aes-256
#Disable Opportunistic Encryption
include /etc/ipsec.d/examples/no_oe.conf
now assume my local public interface's address is 5.6.7.8
here's the log output when I start ipsec / pluto:
Jun 20 01:54:24 dellgw ipsec__plutorun: 000 "myfailedconn" #1: algorithm ESP auth attr: id=5, name=AUTH_ALGORITHM_HMAC_SHA2_256, keysizemin=256, keysizemax=256
Jun 20 01:54:24 dellgw ipsec__plutorun: 000 "myfailedconn" #1: algorithm ESP auth attr: id=251, name=(null), keysizemin=0, keysizemax=0
Jun 20 01:54:24 dellgw ipsec__plutorun: 000 "myfailedconn" #1:
Jun 20 01:54:24 dellgw ipsec__plutorun: 000 "myfailedconn" #1: algorithm IKE encrypt: id=5, name=OAKLEY_3DES_CBC, blocksize=8, keydeflen=192
Jun 20 01:54:24 dellgw ipsec__plutorun: 000 "myfailedconn" #1: algorithm IKE encrypt: id=7, name=OAKLEY_AES_CBC, blocksize=16, keydeflen=128
Jun 20 01:54:24 dellgw ipsec__plutorun: 000 "myfailedconn" #1: algorithm IKE hash: id=1, name=OAKLEY_MD5, hashsize=16
Jun 20 01:54:24 dellgw ipsec__plutorun: 000 "myfailedconn" #1: algorithm IKE hash: id=2, name=OAKLEY_SHA1, hashsize=20
Jun 20 01:54:24 dellgw ipsec__plutorun: 000 "myfailedconn" #1: algorithm IKE dh group: id=2, name=OAKLEY_GROUP_MODP1024, bits=1024
Jun 20 01:54:24 dellgw ipsec__plutorun: 000 "myfailedconn" #1: algorithm IKE dh group: id=5, name=OAKLEY_GROUP_MODP1536, bits=1536
Jun 20 01:54:24 dellgw ipsec__plutorun: 000 "myfailedconn" #1: algorithm IKE dh group: id=14, name=OAKLEY_GROUP_MODP2048, bits=2048
Jun 20 01:54:24 dellgw ipsec__plutorun: 000 "myfailedconn" #1: algorithm IKE dh group: id=15, name=OAKLEY_GROUP_MODP3072, bits=3072
Jun 20 01:54:24 dellgw ipsec__plutorun: 000 "myfailedconn" #1: algorithm IKE dh group: id=16, name=OAKLEY_GROUP_MODP4096, bits=4096
Jun 20 01:54:24 dellgw ipsec__plutorun: 000 "myfailedconn" #1: algorithm IKE dh group: id=17, name=OAKLEY_GROUP_MODP6144, bits=6144
Jun 20 01:54:24 dellgw ipsec__plutorun: 000 "myfailedconn" #1: algorithm IKE dh group: id=18, name=OAKLEY_GROUP_MODP8192, bits=8192
Jun 20 01:54:24 dellgw ipsec__plutorun: 000 "myfailedconn" #1:
Jun 20 01:54:24 dellgw ipsec__plutorun: 000 "myfailedconn" #1: stats db_ops.c: {curr_cnt, total_cnt, maxsz} :context={0,0,0} trans={0,0,0} attrs={0,0,0}
Jun 20 01:54:24 dellgw ipsec__plutorun: 000 "myfailedconn" #1:
Jun 20 01:54:24 dellgw ipsec__plutorun: 000 "myfailedconn" #1: "myfailedconn": 192.168.254.102/32===5.6.7.8[addy at asid.com]...1.2.3.4===10.0.0.0/8; prospective erouted; eroute owner: #0
Jun 20 01:54:24 dellgw ipsec__plutorun: 000 "myfailedconn" #1: "myfailedconn": srcip=unset; dstip=unset; srcup=ipsec _updown; dstup=ipsec _updown;
Jun 20 01:54:24 dellgw ipsec__plutorun: 000 "myfailedconn" #1: "myfailedconn": ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0
Jun 20 01:54:24 dellgw ipsec__plutorun: 000 "myfailedconn" #1: "myfailedconn": policy: PSK+ENCRYPT+TUNNEL+PFS+UP+AGGRESSIVE; prio: 32,8; interface: eth0;
Jun 20 01:54:24 dellgw ipsec__plutorun: 000 "myfailedconn" #1: "myfailedconn": newest ISAKMP SA: #0; newest IPsec SA: #0;
Jun 20 01:54:24 dellgw ipsec__plutorun: 000 "myfailedconn" #1: "myfailedconn": IKE algorithms wanted: 7_256-1-5, 7_256-2-5, 7_256-1-2, 7_256-2-2, flags=strict
Jun 20 01:54:24 dellgw ipsec__plutorun: 000 "myfailedconn" #1: "myfailedconn": IKE algorithms found: 7_256-1_128-5, 7_256-2_160-5, 7_256-1_128-2, 7_256-2_160-2,
Jun 20 01:54:24 dellgw ipsec__plutorun: 000 "myfailedconn" #1:
Jun 20 01:54:24 dellgw ipsec__plutorun: 000 "myfailedconn" #1: #1: "myfailedconn":500 STATE_AGGR_I1 (sent AI1, expecting AR1); EVENT_SO_DISCARD in -1s; nodpd
Jun 20 01:54:24 dellgw ipsec__plutorun: 000 "myfailedconn" #1:
Jun 20 01:54:24 dellgw ipsec__plutorun: ...could not start conn "myfailedconn"
Jun 20 01:54:24 dellgw ipsec__plutorun: !pluto failure!: exited with error status 134 (signal 6)
Jun 20 01:54:24 dellgw ipsec__plutorun: restarting IPsec after pause...
can you read anything from this? It seems the algorithms don't match at
the end, but then the names don't bear any relation to aes-256 (for me,
I'm no an encryption guru).
BTW, the ike= parameter in ipsec.conf is not documented in the manpage,
I had to guess about it after getting an earlier error message.
--
A true pessimist won't be discouraged by a little success.
More information about the Users
mailing list