[Openswan Users] Openswan Road Warrior Mode and JuniperNetscreen IPSec firewall/vpn

Eric Langheinrich openswan at eric.unspam.com
Wed Jun 13 21:36:03 EDT 2007


 
Nico Wrote:

> This used to work for me, I have no current connections with a Netscreen
though.


> conn me-remote
>       auto=start
>       authby=secret
>       pfs=yes
>       keylife=3600
>       left=<My Public IP>
>       leftnexthop=<My Gateway>
>       leftsourceip=192.168.x.1
>       leftsubnet=192.168.x.0/24
>       #leftid=@adencfw.adencnet.ipsec
>       leftrsasigkey=<An RSA Key>
>       right=<remote address>
>       rightsubnet=<remote Net   e.g. 10.10.0.0/16>
>       rightrsasigkey=<Other RSA KEY>


> Left & leftnexthop depend on my netwerksetup to my provider, just havinbg 
> left=%default should suffice.


Nico, Thank you for the reply. I'll try it this way tomorrow and see if I
can get anywhere.

I just spent the last several hours on the Phone with Netscreen attempting
to get this to work with Xauth and PSK. The good news is that I got about
half way there, the bad news is, that Xauth was never able to fully
negotiate, so I never got to Phase2. 

Even after setting leftauthclient=no rightauthserver=no and xauth=no,
Openswan was still attempting to do Xauth at some level. From the searches
I've done it looks like other people have had this same problem, but the
threads do not seem to go anywhere or have an answer.

If anyone has any ideas, I would love to hear them.

My configuration looks like:

conn my_conn
    type=tunnel
    left=%defaultroute
    leftid=user at domain.com
    leftxauthclient=yes
    right=(netscreen IP)
    rightsubnet= (privatenetwork)
    rightxauthserver=yes
    pfs=yes
    aggrmode=yes
    auto=add
    auth=esp
    authby=secret
    xauth=yes
    keyexchange=ike
    ike=3des-sha1-modp1024 
    esp=3des-sha1


When I attempt to connect, I see the following logs:

<snip>
002 "my_conn" #1: transition from state STATE_AGGR_I1 to state STATE_AGGR_I2
004 "my_conn" #1: STATE_AGGR_I2: sent AI2, ISAKMP SA established
{auth=OAKLEY_PRESHARED_KEY cipher=oakley_3des_cbc_192 prf=oakley_sha
group=modp1024} 
041 "my_conn" #1: my_conn prompt for Username:
Name enter:   user
040 "my_conn" #1: my_conn prompt for Password:
Enter secret: 
002 "my_conn" #1: XAUTH: Answering XAUTH challenge with user='user' 
002 "my_conn" #1: transition from state STATE_XAUTH_I0 to state
STATE_XAUTH_I1
004 "my_conn" #1: STATE_XAUTH_I1: XAUTH client - awaiting CFG_set
228 "my_conn" #1: STATE_XAUTH_I1: CERTIFICATE_UNAVAILABLE 
002 "my_conn" #1: sending encrypted notification CERTIFICATE_UNAVAILABLE to
(netscreen IP):500
003 "my_conn" #1: next payload type of ISAKMP Hash Payload has an unknown
value: 89 
003 "my_conn" #1: malformed payload in packet
002 "my_conn" #1: sending notification PAYLOAD_MALFORMED to (netscreen
IP):500
003 "my_conn" #1: next payload type of ISAKMP Hash Payload has an unknown
value: 89 
003 "my_conn" #1: malformed payload in packet
002 "my_conn" #1: sending notification PAYLOAD_MALFORMED to (netscreen
IP):500

On the Netscreen side I see:

Rejected an IKE packet on ethernet3 from (my IP):500 to (netscreen IP):500
with cookies 6c58809750757d0d and 882a6dcb46910c01 because a Phase 2 packet
arrived while XAuth was still pending.

Then Immediately:

Rejected an IKE packet on ethernet3 from (my IP):500 to (netscreen IP):500
with cookies 6c58809750757d0d and 882a6dcb46910c01 because an unencrypted
packet unexpectedly arrived.

I'm happy to test pretty much anything...

Thank you,

Eric



More information about the Users mailing list