[Openswan Users] Vendor ID payload [Vid-Initial-Contact]
Xunhua Wang
wangxx at jmu.edu
Wed Oct 18 08:44:42 EDT 2006
Hi all,
We are running a VPN server with Linux Openswan U2.4.5/K2.6.9-5.ELsmp
(netkey), whose configuration file can be found at the end of this message.
We could connect to it from XP or Windows 2K clients with L2TP/IPsec.
However, recently we added some new Windows XP users and two of them have
difficulties to connect to the same Linux VPN server. Both of these two
users are behind NAT and from /var/log/secure we noticed that both of them
sent out the "Vendor ID payload [Vid-Initial-Contact]"
It looks like that these are new types of Windows IPsec clients. Has anybody
experienced with this before?
--- EXAMPLE entries /var/log/secure ------
Oct 18 00:53:11 localhost pluto[3227]: packet from 216.64.10.22:500:
ignoring Vendor ID payload [MS NT5 ISAKMPOAKLEY 00000004]
Oct 18 00:53:11 localhost pluto[3227]: packet from 216.64.10.22:500:
ignoring Vendor ID payload [FRAGMENTATION]
Oct 18 00:53:11 localhost pluto[3227]: packet from 216.64.10.22:500:
received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n] method set
to=106
Oct 18 00:53:11 localhost pluto[3227]: packet from 216.64.10.22:500:
ignoring Vendor ID payload [Vid-Initial-Contact]
Oct 18 00:53:11 localhost pluto[3227]: "roadwarrior"[316] 216.64.10.22 #426:
responding to Main Mode from unknown peer 216.64.10.22
Oct 18 00:53:11 localhost pluto[3227]: "roadwarrior"[316] 216.64.10.22 #426:
transition from state STATE_MAIN_R0 to state STATE_MAIN_R1
Oct 18 00:53:12 localhost pluto[3227]: "roadwarrior"[316] 216.64.10.22 #426:
NAT-Traversal: Result using draft-ietf-ipsec-nat-t-ike-02/03: peer is NATed
Oct 18 00:53:12 localhost pluto[3227]: "roadwarrior"[316] 216.64.10.22 #426:
transition from state STATE_MAIN_R1 to state STATE_MAIN_R2
Oct 18 00:54:22 localhost pluto[3227]: "roadwarrior"[316] 216.64.10.22 #426:
max number of retransmissions (2) reached STATE_MAIN_R2
Oct 18 00:54:22 localhost pluto[3227]: "roadwarrior"[316] 216.64.10.22:
deleting connection "roadwarrior" instance with peer 216.64.10.22
{isakmp=#0/ipsec=#0}
Oct 18 01:01:56 localhost pluto[3227]: packet from 216.64.10.22:500:
ignoring Vendor ID payload [MS NT5 ISAKMPOAKLEY 00000004]
Oct 18 01:01:56 localhost pluto[3227]: packet from 216.64.10.22:500:
ignoring Vendor ID payload [FRAGMENTATION]
Oct 18 01:01:56 localhost pluto[3227]: packet from 216.64.10.22:500:
received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n] method set
to=106
Oct 18 01:01:56 localhost pluto[3227]: packet from 216.64.10.22:500:
ignoring Vendor ID payload [Vid-Initial-Contact]
Oct 18 01:01:56 localhost pluto[3227]: "roadwarrior"[317] 216.64.10.22 #427:
responding to Main Mode from unknown peer 216.64.10.22
Oct 18 01:01:56 localhost pluto[3227]: "roadwarrior"[317] 216.64.10.22 #427:
transition from state STATE_MAIN_R0 to state STATE_MAIN_R1
Oct 18 01:01:57 localhost pluto[3227]: "roadwarrior"[317] 216.64.10.22 #427:
NAT-Traversal: Result using draft-ietf-ipsec-nat-t-ike-02/03: peer is NATed
Oct 18 01:01:57 localhost pluto[3227]: "roadwarrior"[317] 216.64.10.22 #427:
transition from state STATE_MAIN_R1 to state STATE_MAIN_R2
Oct 18 01:03:07 localhost pluto[3227]: "roadwarrior"[317] 216.64.10.22 #427:
max number of retransmissions (2) reached STATE_MAIN_R2
Oct 18 01:03:07 localhost pluto[3227]: "roadwarrior"[317] 216.64.10.22:
deleting connection "roadwarrior" instance with peer 216.64.10.22
{isakmp=#0/ipsec=#0}
---------- EXAMPLE entries /var/log/secure ENDS ------
Thanks,
Steve
---------- SERVER-SIDE /etc/ipsec.conf BEGINS ---------- version 2.0
## plutodebug="control controlmore"
## virtual_private=%v4:10.0.0.0/8,%v4:172.16.0.0/12,%v4:192.168.0.0/16
config setup
interfaces=%defaultroute
nat_traversal=yes
virtual_private=%v4:10.0.0.0/8,%v4:172.16.0.0/12,%v4:192.168.0.0/16,%v4:!192
.168.100.0/24
conn %default
keyingtries=5
compress=yes
disablearrivalcheck=no
authby=rsasig
leftrsasigkey=%cert
rightrsasigkey=%cert
# conn roadwarrior-l2tp
# leftprotoport=17/0
# rightprotoport=17/1701
# also=roadwarrior
conn roadwarrior-l2tp-updatedwin
leftprotoport=17/1701
rightprotoport=17/1701
also=roadwarrior
## rightca=%same
conn roadwarrior
left=%defaultroute
leftrsasigkey=%cert
leftcert=ipsec-server.crt
right=%any
rightrsasigkey=%cert
rightsubnet=vhost:%no,%priv
pfs=no
rekey=no
rightca=%same
auto=add
include /etc/ipsec.d/examples/no_oe.conf
---------- SERVER-SIDE /etc/ipsec.conf ENDS ----------
More information about the Users
mailing list