[Openswan Users] Disconnect after Verifying username and password

Nabin Limbu nlimbu at healthnet.org.np
Sun Aug 26 03:27:49 EDT 2007


Hi,

While trying to connect via winxp client, I see "Verifying username and
password" and then get "Disconnected" message. In /var/log/secure of vpn
server, I get below messages while trying to connect. I'm using
openswan-2.4.4-1.1.2.1 and l2tpd-0.69-0.4.20051030.fc5 in FC 5.

Config files are appended after the below error message.

/var/log/secure
---------------
Aug 26 13:21:28 dell pluto[4414]: packet from 202.70.88.88:500: ignoring
Vendor ID payload [MS NT5 ISAKMPOAKLEY 00000004]
Aug 26 13:21:28 dell pluto[4414]: packet from 202.70.88.88:500: ignoring
Vendor ID payload [FRAGMENTATION]
Aug 26 13:21:28 dell pluto[4414]: packet from 202.70.88.88:500: received
Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n] method set to=106
Aug 26 13:21:28 dell pluto[4414]: packet from 202.70.88.88:500: ignoring
Vendor ID payload [Vid-Initial-Contact]
Aug 26 13:21:28 dell pluto[4414]: "roadwarrior-l2tp"[1] 202.70.88.88 #1:
responding to Main Mode from unknown peer 202.70.88.88
Aug 26 13:21:28 dell pluto[4414]: "roadwarrior-l2tp"[1] 202.70.88.88 #1:
transition from state STATE_MAIN_R0 to state STATE_MAIN_R1
Aug 26 13:21:28 dell pluto[4414]: "roadwarrior-l2tp"[1] 202.70.88.88 #1:
STATE_MAIN_R1: sent MR1, expecting MI2
Aug 26 13:21:29 dell pluto[4414]: "roadwarrior-l2tp"[1] 202.70.88.88 #1:
NAT-Traversal: Result using draft-ietf-ipsec-nat-t-ike-02/03: no NAT
detected
Aug 26 13:21:29 dell pluto[4414]: "roadwarrior-l2tp"[1] 202.70.88.88 #1:
transition from state STATE_MAIN_R1 to state STATE_MAIN_R2
Aug 26 13:21:29 dell pluto[4414]: "roadwarrior-l2tp"[1] 202.70.88.88 #1:
STATE_MAIN_R2: sent MR2, expecting MI3
Aug 26 13:21:29 dell pluto[4414]: "roadwarrior-l2tp"[1] 202.70.88.88 #1:
Main mode peer ID is ID_IPV4_ADDR: '202.70.88.88'
Aug 26 13:21:29 dell pluto[4414]: "roadwarrior-l2tp"[1] 202.70.88.88 #1: I
did not send a certificate because I do not have one.
Aug 26 13:21:29 dell pluto[4414]: "roadwarrior-l2tp"[1] 202.70.88.88 #1:
transition from state STATE_MAIN_R2 to state STATE_MAIN_R3
Aug 26 13:21:29 dell pluto[4414]: "roadwarrior-l2tp"[1] 202.70.88.88 #1:
STATE_MAIN_R3: sent MR3, ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY
cipher=oakley_3des_cbc_192 prf=oakley_sha group=modp2048}
Aug 26 13:21:30 dell pluto[4414]: "roadwarrior-l2tp"[1] 202.70.88.88 #2:
responding to Quick Mode {msgid:ace64e54}
Aug 26 13:21:30 dell pluto[4414]: "roadwarrior-l2tp"[1] 202.70.88.88 #2:
transition from state STATE_QUICK_R0 to state STATE_QUICK_R1
Aug 26 13:21:30 dell pluto[4414]: "roadwarrior-l2tp"[1] 202.70.88.88 #2:
STATE_QUICK_R1: sent QR1, inbound IPsec SA installed, expecting QI2
Aug 26 13:21:30 dell pluto[4414]: "roadwarrior-l2tp"[1] 202.70.88.88 #2:
transition from state STATE_QUICK_R1 to state STATE_QUICK_R2
Aug 26 13:21:30 dell pluto[4414]: "roadwarrior-l2tp"[1] 202.70.88.88 #2:
STATE_QUICK_R2: IPsec SA established {ESP=>0x7f991e46 <0xb249d002
xfrm=3DES_0-HMAC_MD5 NATD=202.70.88.88:500 DPD=none}
Aug 26 13:21:35 dell pluto[4414]: "roadwarrior-l2tp"[1] 202.70.88.88 #1:
received Delete SA payload: deleting ISAKMP State #1
Aug 26 13:21:35 dell pluto[4414]: packet from 202.70.88.88:500: received
and ignored informational message
Aug 26 13:21:35 dell pluto[4414]: packet from 202.70.88.88:500:
Informational Exchange is for an unknown (expired?) SA


/etc/ipsec.conf
---------------

version 2.0

config setup
        interfaces=%defaultroute
        klipsdebug=none
        plutodebug=none
        overridemtu=1410
        nat_traversal=yes
        virtual_private=%v4:10.0.0.0/8,%v4:172.16.0.0/12,%v4:192.168.0.0/16,%v4:!192.168.1.0/24
        dumpdir=/tmp

conn %default
        keyingtries=3
        compress=yes
        disablearrivalcheck=no
        authby=secret
        type=tunnel
        keyexchange=ike
        ikelifetime=240m
        keylife=60m

conn roadwarrior-net
        leftsubnet=192.168.0.0/16
        also=roadwarrior

conn roadwarrior-all
        leftsubnet=0.0.0.0/0
        also=roadwarrior

conn roadwarrior-l2tp
        leftprotoport=17/0
        rightprotoport=17/1701
        also=roadwarrior

conn roadwarrior-l2tp-updatedwin
        leftprotoport=17/1701
        rightprotoport=17/1701
        also=roadwarrior

conn roadwarrior
        pfs=no
        left=69.88.8.14
        leftnexthop=69.88.8.7
        right=%any
        rightsubnet=vhost:%no,%priv
        auto=add

include /etc/ipsec.d/examples/no_oe.conf

/etc/l2tpd/l2tpd.conf
---------------------
[global]
listen-addr = 69.88.8.14
port = 1701

[lns default]
ip range = 192.168.1.101-192.168.1.254
local ip = 192.168.1.100
require chap = yes
refuse pap = yes
require authentication = yes
name = LinuxVPNserver
ppp debug = yes
pppoptfile = /etc/ppp/options.l2tpd
length bit = yes


/etc/l2tpd/l2tp-secrets
-----------------------
user1    *        secpass     192.168.1.0/24
*        user1    secpass     192.168.1.0/24

Hopoing for your kind support.

With regards
Nabin Limbu











> On Sat, 25 Aug 2007, Nabin Limbu wrote:
>
>> Checking your system to see if IPsec got installed and started
>> correctly: Version check and ipsec on-path
>>     [OK] Linux Openswan U2.4.4/K2.6.15-1.2054_FC5 (netkey)
>> Checking for IPsec support in kernel                            [OK]
>> Checking for RSA private key (/etc/ipsec.secrets)
>> [FAILED]
>
> That's fine since you are not using it. You are using psk or X.509 with
> l2tp.
>
>> Checking for 'setkey' command for NETKEY IPsec stack support
>> [FAILED] which: no setkey in
>
> if "ip xfrm state list" does not give a usage error, you can ignore it.
> Otherwise install the iproute2 package.
>
> Paul





More information about the Users mailing list