[Openswan Users] [NEWBIE] Help needed - Openswan 2.2 - Sarge 2.4.27 <-> Cisco Pix

Mathieu Chappuis mathieu.chappuis.lists at gmail.com
Fri Nov 24 03:44:13 EST 2006


Dears,

Would you help me ? I can't have a working tunnel using openswan 2.2
talking to a Cisco Pix.

The pix works with other setup/routers, i.e. Zyxel Prestige, for other
tunnels. (I dont substitue openswan to a working Zyxel)

My openswan router run a Debian Sarge 2.4.27, Openswan IPsec
U2.2.0/K2.4.27-1-386.

Route is as follow :

Lan (192.138.27.0/24)-- Debian Openswan(213.1.2.3) ..... (81.4.5.6
Pix) -- (172.16.15.2 Http Server)

I poke around with various changes in my ipsec.conf, no way with this error :

packet from 81.4.5.6:500: ignoring informational payload, type
NO_PROPOSAL_CHOSEN

That's my first openswan setup, I know there's now billion of
misconfig possible, any advise appreciated.

If you don't want read and diag the configs files bellow, I've some
background questions.

My linux is on DSL, and the %default route is detected as the P-t-P in
the ifconfig output.

ppp0      Link encap:Point-to-Point Protocol
          inet addr:213.1.2.3  P-t-P:62.4.16.248  Mask:255.255.255.255
          UP POINTOPOINT RUNNING NOARP MULTICAST  MTU:1492  Metric:1

Is this address (62.4.16.248) to be used as the leftnexthop ? I've
tried for my side, without result.
But what about the other side 81.4.5.6. Is the provider router IP to
be indicated as rightnexthop ?
For now I use this remote address as direct.

For define the remote lan, on a previous setup with Zyxel i've used
SINGLE ADDRESS, not range.
If I remember right that was not working with a /32. I got an error
with openswan if I use à single address rightsubnet=172.16.15.2


Here's some of my setup files :

IPSEC.CONF Values commented have been also tried
--------------------------------------------------
version	2.0

config setup
       interfaces=%defaultroute
       klipsdebug=all
       plutodebug=none
       myid=213.1.2.3

conn vpn
       type=tunnel
       left=213.1.2.3
       leftsubnet=192.168.27.0/24   # Defined as DONALD on pix side.
       right=81.4.5.6
       rightsubnet=172.16.15.2/32
       esp=3des-sha1-1024    #Also tried with 3des-sha1
       keyexchange=ike
       # keylife=1d
       authby=secret
       pfs=no #yes
       auto=add
       # spi=0x0

IPSEC.SECRETS
---------------
213.1.2.3  81.4.5.6: PSK "foobar"

PIX SETUP with only concerned options
--------------------------------------
PIX Version 6.2(2)
name 172.16.15.2 MyHTTPSERVER
name 192.168.27.0 DONALD
access-list inside_access_in permit tcp host MyHTTPSERVER gt 1023
DONALD 255.255.255.0 object-group standard-tcp
access-list inside_access_in permit udp host MyHTTPSERVER gt 1023
DONALD 255.255.255.0 object-group standard-udp
access-list inside_access_in permit ip 172.16.15.0 255.255.255.0
DONALD 255.255.255.0
access-list inside_nat0_outbound permit ip host MyHTTPSERVER DONALD
255.255.255.0
access-list outside_cryptomap_25 permit ip host MyHTTPSERVER DONALD
255.255.255.0
ip address outside 81.4.5.6 255.255.255.248
ip address inside 172.16.15.248 255.255.255.0
pdm location MyHTTPSERVER 255.255.255.255 inside
pdm location DONALD 255.255.255.0 outside
crypto ipsec transform-set ESP-DES-SHA esp-des esp-sha-hmac
crypto ipsec transform-set ESP-DES-MD5 esp-des esp-md5-hmac
crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac
crypto dynamic-map outside_dyn_map 20 match address outside_cryptomap_dyn_20
crypto dynamic-map outside_dyn_map 20 set transform-set ESP-DES-SHA
crypto dynamic-map outside_dyn_map 40 match address outside_cryptomap_dyn_40
crypto dynamic-map outside_dyn_map 40 set transform-set ESP-DES-SHA
crypto map outside_map 25 ipsec-isakmp
crypto map outside_map 25 match address outside_cryptomap_25
crypto map outside_map 25 set peer 213.1.2.3
crypto map outside_map 25 set transform-set ESP-3DES-SHA
crypto map outside_map 65535 ipsec-isakmp dynamic outside_dyn_map
crypto map outside_map interface outside
isakmp enable outside
isakmp key ******** address 213.1.2.3 netmask 255.255.255.255 no-xauth
no-config-mode
isakmp identity address
isakmp policy 20 authentication pre-share
isakmp policy 20 encryption des
isakmp policy 20 hash sha
isakmp policy 20 group 2
isakmp policy 20 lifetime 86400

NETFILTER I'm using shorewall
-----------------------------
-A fw2net -d 81.4.5.6 -p esp -j ACCEPT
-A fw2net -d 81.4.5.6 -p ah -j ACCEPT
-A fw2net -d 81.4.5.6 -p udp -m udp --dport 500 -m state --state NEW -j ACCEPT
-A net2fw -s 81.4.5.6 -p esp -j ACCEPT
-A net2fw -s 81.4.5.6 -p ah -j ACCEPT
-A net2fw -s 81.4.5.6 -p udp -m udp --dport 500 -m state --state NEW -j ACCEPT

Many thanks for your help.

Ciao'


More information about the Users mailing list