[Openswan Users] Windows Xp client to openswan

Can Akalin canakalin77 at gmail.com
Fri Mar 17 16:42:40 CET 2006


Hi Paul,

I have restarted the ipsec services in both Windows and linux with

#ipsec setup restart
and on windows C:/>net stop policyagent and C:/>net start policyagent

commands.

And then I tried to make connection again. Unfortunatelly it did not work.
All the log files are the same. so there is no need to post the log files
again.

But as you can see below, the  linux log file at /var/log/messages gave some
errors. It seems that there is something wrong with the line 21 and 25 of
the /etc/ipsec.secrets file. I copied the ipsec.secrets file below. In case
it helps, I also posted the /etc/ipsec.conf as well.

Could you please take a look at it and tell me what is wrong?

One other question that I have is according to windows event viever,


IKE security association established.

 Mode:

Key Exchange Mode (Main Mode)



AND



KE security association established.

 Mode:

Data Protection Mode (Quick Mode)



How come then there is no connection yet?

I was also wondering if it is possible for someone to post  log files for a
running openswan VPN connection between a linux box and a windows client
based on x509 certificates. It might help to learn the steps that are taken
with a successful connection.


I really appreciate for all the help I am getting from Paul and possible
future responders.


Thank you

Can Akalin



>>>>>>>>>>>>>>>LOG FILE FROM LINUX MACHINE
/var/log/messages<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<
...
Mar 17 15:41:08 linuxserver pluto[6715]: loading secrets from
"/etc/ipsec.secrets"

Mar 17 15:41:08 linuxserver pluto[6715]: "/etc/ipsec.secrets" line 21:
malformed end of RSA private key -- indented '}' required

Mar 17 15:41:08 linuxserver pluto[6715]: ERROR "/etc/ipsec.secrets" line 21:
index "}" illegal (non-DNS-name) character in name

Mar 17 15:41:08 linuxserver pluto[6715]: "/etc/ipsec.secrets" line 25:
unexpected end of id list

Mar 17 15:41:08 linuxserver pluto[6715]:   loaded private key file
'/etc/ipsec.d/private/host.example.com.key' (1728 bytes)

Mar 17 15:41:08 linuxserver ipsec__plutorun: 003 "/etc/ipsec.secrets" line
21: malformed end of RSA private key -- indented '}' required

Mar 17 15:41:08 linuxserver ipsec__plutorun: 003 ERROR "/etc/ipsec.secrets"
line 21: index "}" illegal (non-DNS-name) character in name

Mar 17 15:41:08 linuxserver ipsec__plutorun: 003 "/etc/ipsec.secrets" line
25: unexpected end of id list
Mar 17 16:01:36 linuxserver pluto[6715]: packet from 192.168.1.76:500:
ignoring
...




>>>>>>>>>>>>>/etc/ipsec.secrets<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<



# This file holds shared secrets or RSA private keys for inter-Pluto
# authentication.  See ipsec_pluto(8) manpage, and HTML documentation.
#
# RSA private key for this host, authenticating it to any other host
# which knows the public part.  Suitable public keys, for ipsec.conf, DNS,
# or configuration of other implementations, can be extracted conveniently
# with "ipsec showhostkey".
: RSA {
 # RSA 2048 bits   linuxserver   Mon Mar 13 10:54:17 2006
 # for signatures only, UNSAFE FOR ENCRYPTION
 #pubkey=0sAQO1BQlk3q4J5+6gd/17HH3Osm9oOs6YPUiFTPfnHwBmI/O0/dAHruDB6ZQwvN0CIBXXavCFlOaO4nCabM0czn9J+COhYG0DDUn43ERPUN+bKWM6c5OpsIo0KfXNQlILetSLPRlzqYxz8Cu337mL/i8W8sazEVkl04g3dB3ORx6/CaQHfVtRvC02hMo06tT8QEU3osdnbRtWQWjcUDC/4SAeb1VjCbzDPvnvmLONRfPSePrxJdKm1upRnNVGbJNWeqpW56EbuYeFKlTYj7/pOSAFrJtKHeL02JS1hbqKxsyKQ2Hch5S7m2YErRmgZGPciXUGna/9s6tt4oI+m5eQl2+1
 Modulus:
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
 PublicExponent: 0x03
 # everything after this point is secret
 PrivateExponent:
0x1e2b8190cfc7ac51527013ff9484bfa27312915f226eb4e16b8cd3fbda801105fdf37fa2abf27acafc435d74cf805aae4e91d2c0ee266d25bd6f12222f77bfe1a95b4590122b2ce1a97a0b628d7a99dc3b3468989c481708b1a8f78b0dac9478c1df843df19768a807494ff441ffb283d3211dd839864dec093e04f7b6851fd6a8d200582e20d30fe844190baa83b3c9fdb8bd70e074568e7b539d9bb6a691799c6b05589345d4c57cfdadb6d82343da477e3c6e545ee149c3e4266b43b66e424e30c9dbc050b014afac259db7b91804432d12a4716f98759d15215d12486bd686a865c4871cb27f14ef69e6c23715fc3893843768dab201f61ff080e5d89e2b
 Prime1:
0xe29d68594c89a3ffd246a569d0f0636fc538ec281faa0dab9694008f3b6555feb97ce3e66e8195016b5128460c54aa00d4002bd82e17f2016f6631d794ec755fbea2ff8fc38a1b214d87f811cdd3f37de82c96d00a444d48bb922950f1e36f3b291d85a90638ba6a4869d6170c991bdf7cfe35df93985b823a8289e91ffcde41
 Prime2:
0xcc7e12f0f06d96d740eaf93b04f5a61980156a9a0ab7413eee529dfb3c9461460b565f0fda9ead57965578fe28cb915a79fb8f647e85b09596162e1168236fbcc31fe6657419498ce947b5fbcd0e9c6e316043733012f88a4b74c90b6736940110cc9f508ab67c9fe7134ee4c9f8e9ac362a60d1aaf2e65482fc6ea90d86dc75
 Exponent1:
0x97139ae633066d5536d9c39be0a0424a837b481abfc6b3c7b9b8005f7cee39547ba897eef4566356478b702eb2e31c008d5572901ebaa1564a44213a63484e3fd46caa5fd7b1676b8905500bde8d4cfe9ac8648ab182de307d0c1b8b4becf4d21b6903c60425d19c30468eba08661294fdfece950d103d017c57069b6aa8942b
 Exponent2:
0x88540ca0a0490f3a2b4750d2034e6ebbaab8f1bc0724d629f43713fcd30d962eb23994b53c69c8e50ee3a5fec5dd0b91a6a7b4eda9ae75b90eb9740b9ac24a7dd76a9998f810dbb3462fcea7de09bd9ecb95824ccab7505c324ddb5cef79b800b5ddbf8b0724531544b789eddbfb4672cec6eb3671f744385752f470b3af3da3
 Coefficient:
0x2d291976cf82e845bf708e8c4b0ac5fcaa8f954c47be1410e6c8ea6fb2ed5651df0d054b97d2ad83bfa87383c8ffd607b3072266bbceaaea9647a1bb55499b2a17b7d34ff76e92210fffba811cca9988d43c9b8448376e5d97ca47714247250d093edf726ce8aa9dc1a5b7b3b66d0e938669d4ca935f40af8c4b9b441c148661
}

# do not change the indenting of that "}"

: RSA host.example.com.key "123ABC"

>>>>>>>>>>>>>>>>>>>>>>>/etc/ipsec.conf<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<

# /etc/ipsec.conf - Openswan IPsec configuration file
# RCSID $Id: ipsec.conf.in,v 1.15.2.1 2005/07/26 12:28:39 ken Exp $

# This file:  /usr/share/doc/packages/openswan/ipsec.conf-sample
#
# Manual:     ipsec.conf.5


version 2.0 # conforms to second version of ipsec.conf specification

# basic configuration
config setup
 # plutodebug / klipsdebug = "all", "none" or a combation from below:
 # "raw crypt parsing emitting control klips pfkey natt x509 private"
 # eg:
 # plutodebug="control parsing"
 #
 # Only enable klipsdebug=all if you are a developer
 #
 # NAT-TRAVERSAL support, see README.NAT-Traversal
 # nat_traversal=yes
 # virtual_private=%v4:10.0.0.0/8,%v4:192.168.0.0/16,%4:172.16.0.0/12
 #
 # Certificate Revocation List handling:
 #crlcheckinterval=600
 #strictcrlpolicy=yes
 #
 # Change rp_filter setting? (default is 0, disabled)
 # See also setting in the /etc/sysctl.conf file!
 #rp_filter=%unchanged
 #
 # Workaround to setup all tunnels immediately, since the new default
 # of "plutowait=no" causes "Resource temporarily unavailable" errors
 # for the first connect attempt over each tunnel, that is delayed to
 # be established later / on demand.
 #
 plutowait=yes
 interfaces=%defaultroute
 nat_traversal=yes
 virtual_private=%v4:10.0.0.0/8,%v4:172.16.0.0/12,%v4:192.168.0.0/16

# default settings for connections
conn %default
 # keyingtries default to %forever
 keyingtries=1
 compress=yes
 disablearrivalcheck=no
 authby=rsasig
 # Sig keys (default: %dnsondemand)
 leftrsasigkey=%cert
 rightrsasigkey=%cert
 # Lifetimes, defaults are 1h/8hrs
 #ikelifetime=20m
 #keylife=1h
 #rekeymargin=8m

conn roadwarrior-net
 leftsubnet=10.10.10.0/24
 also=roadwarrior

conn roadwarrior
 left=%defaultroute
 leftcert=host.example.com.pem
 right=%any
 rightsubnet=vhost:%no,%priv
 auto=add
 pfs=yes

conn block
 auto=ignore

conn private
 auto=ignore

conn private-or-clear
 auto=ignore

conn clear
 auto=ignore

conn packetdefault
 auto=ignore

#Disable Opportunistic Encryption
include /etc/ipsec.d/examples/no_oe.conf

# Add connections here

# sample VPN connection
# conn sample
#  # Left security gateway, subnet behind it, nexthop toward right.
#  left=10.0.0.1
#  leftsubnet=172.16.0.0/24
#  leftnexthop=10.22.33.44
#  # Right security gateway, subnet behind it, nexthop toward left.
#  right=10.12.12.1
#  rightsubnet=192.168.0.0/24
#  rightnexthop=10.101.102.103
#  # To authorize this connection, but not actually start it,
#  # at startup, uncomment this.
#  #auto=start

 ______________________________________________________________________________________________________________
-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://lists.openswan.org/pipermail/users/attachments/20060317/aff1e99b/attachment-0001.htm


More information about the Users mailing list