[Openswan Users] vpnc-0.5.1 failed to connect to openswan-2.4.11
zhengfish
zhengfish at gmail.com
Sun Dec 30 10:43:37 EST 2007
I just try to test vpnc(Client) connecting openswan(Server), the topo as
following:
[vpnc/centos-4.5] +---------------+ [openswan/centos-4.5]
| |
192.168.1.10 192.168.1.3
--------------------------------client.vpnc.config.file-------------------------------------------
# cat vpnc.conf
IPSec gateway 192.168.1.3
IPSec ID @rw.vpnc
IPSec secret ipsec123
Xauth username linux
Xauth password linux123
--------------------------------server.openswan.config.files-------------------------------------------
# cat /etc/ipsec.conf
version 2.0
config setup
interfaces=%defaultroute
nat_traversal=yes
nhelpers=0
conn %defaults
left=%defaultroute
leftid=@gw.centos
auto=add
authby=secret
keyingtries=0
conn conn-vpnc
#right=%any
right=192.168.1.10
rightsubnet=192.168.5.1/24
rightid=@rw.vpnc
rightnexthop=%defaultroute
keyexchange=ike
esp=3des-sha1
ike=3des-sha1
auto=add
auth=esp
authby=secret
pfs=no
aggrmode=yes
xauth=yes
leftxauthserver=yes
rightxauthclient=yes
include /etc/ipsec.d/examples/no_oe.conf
# cat /etc/ipsec.secrets
......
192.168.1.3 %any : PSK "ipsec123"
-------------------------------server.log-------------------------------------------------------
# tail -f /var/log/secure
Dec 30 23:27:42 zheng pluto[6840]: packet from 192.168.1.10:500:
received Vendor ID payload [XAUTH]
Dec 30 23:27:42 zheng pluto[6840]: packet from 192.168.1.10:500:
received Vendor ID payload [Cisco-Unity]
Dec 30 23:27:42 zheng pluto[6840]: packet from 192.168.1.10:500:
received Vendor ID payload [RFC 3947] method set to=109
Dec 30 23:27:42 zheng pluto[6840]: packet from 192.168.1.10:500:
received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n] meth=106,
but already using method 109
Dec 30 23:27:42 zheng pluto[6840]: packet from 192.168.1.10:500:
received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02] meth=107, but
already using method 109
Dec 30 23:27:42 zheng pluto[6840]: packet from 192.168.1.10:500:
ignoring unknown Vendor ID payload [16f6ca16e4a4066d83821a0f0aeaa862]
Dec 30 23:27:42 zheng pluto[6840]: packet from 192.168.1.10:500:
received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-00]
Dec 30 23:27:42 zheng pluto[6840]: packet from 192.168.1.10:500:
received Vendor ID payload [Dead Peer Detection]
Dec 30 23:27:42 zheng pluto[6840]: packet from 192.168.1.10:500: initial
Aggressive Mode message from 192.168.1.10 but no (wildcard) connection
has been configured
Dec 30 23:27:45 zheng pluto[6840]: packet from 192.168.1.10:500:
received Vendor ID payload [XAUTH]
Dec 30 23:27:45 zheng pluto[6840]: packet from 192.168.1.10:500:
received Vendor ID payload [Cisco-Unity]
Dec 30 23:27:45 zheng pluto[6840]: packet from 192.168.1.10:500:
received Vendor ID payload [RFC 3947] method set to=109
Dec 30 23:27:45 zheng pluto[6840]: packet from 192.168.1.10:500:
received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n] meth=106,
but already using method 109
Dec 30 23:27:45 zheng pluto[6840]: packet from 192.168.1.10:500:
received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02] meth=107, but
already using method 109
Dec 30 23:27:45 zheng pluto[6840]: packet from 192.168.1.10:500:
ignoring unknown Vendor ID payload [16f6ca16e4a4066d83821a0f0aeaa862]
Dec 30 23:27:45 zheng pluto[6840]: packet from 192.168.1.10:500:
received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-00]
Dec 30 23:27:45 zheng pluto[6840]: packet from 192.168.1.10:500:
received Vendor ID payload [Dead Peer Detection]
Dec 30 23:27:45 zheng pluto[6840]: packet from 192.168.1.10:500: initial
Aggressive Mode message from 192.168.1.10 but no (wildcard) connection
has been configured
Dec 30 23:27:52 zheng pluto[6840]: packet from 192.168.1.10:500:
received Vendor ID payload [XAUTH]
Dec 30 23:27:52 zheng pluto[6840]: packet from 192.168.1.10:500:
received Vendor ID payload [Cisco-Unity]
Dec 30 23:27:52 zheng pluto[6840]: packet from 192.168.1.10:500:
received Vendor ID payload [RFC 3947] method set to=109
Dec 30 23:27:52 zheng pluto[6840]: packet from 192.168.1.10:500:
received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n] meth=106,
but already using method 109
Dec 30 23:27:52 zheng pluto[6840]: packet from 192.168.1.10:500:
received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02] meth=107, but
already using method 109
Dec 30 23:27:52 zheng pluto[6840]: packet from 192.168.1.10:500:
ignoring unknown Vendor ID payload [16f6ca16e4a4066d83821a0f0aeaa862]
Dec 30 23:27:52 zheng pluto[6840]: packet from 192.168.1.10:500:
received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-00]
Dec 30 23:27:52 zheng pluto[6840]: packet from 192.168.1.10:500:
received Vendor ID payload [Dead Peer Detection]
Dec 30 23:27:52 zheng pluto[6840]: packet from 192.168.1.10:500: initial
Aggressive Mode message from 192.168.1.10 but no (wildcard) connection
has been configured
More information about the Users
mailing list