[Openswan Users] ipsec0 device

Vince John vince at zworg.com
Wed Mar 14 21:51:30 EDT 2007


Thanks for your replies! And so quickly...

Can't say I was aware of that, but I'll copy-paste some output I get:

 # ipsec --version
Linux Openswan U2.2.0/K2.6.20.1 (native)

 # /etc/init.d/ipsec restart
ipsec_setup: Stopping Openswan IPsec...
ipsec_setup: Starting Openswan IPsec U2.2.0/K2.6.20.1...

  # tail /var/log/syslog
Mar 15 09:12:19 ion ipsec_setup: ...Openswan IPsec stopped
Mar 15 09:12:19 ion ipsec_setup: Stopping Openswan IPsec...
Mar 15 09:12:19 ion ipsec_setup: KLIPS ipsec0 on eth0
xxx.xxx.xxx./255.255.255.0 broadcast xxx.xxx.xxx.255
Mar 15 09:12:19 ion ipsec_setup: ...Openswan IPsec started
Mar 15 09:12:19 ion ipsec_setup: Starting Openswan IPsec
U2.2.0/K2.6.20.1...

# ipsec auto --verbose --up road
002 "road" #5: initiating Main Mode
104 "road" #5: STATE_MAIN_I1: initiate
002 "road" #5: transition from state STATE_MAIN_I1 to state
STATE_MAIN_I2
106 "road" #5: STATE_MAIN_I2: sent MI2, expecting MR2
002 "road" #5: I did not send a certificate because I do not have one.
002 "road" #5: transition from state STATE_MAIN_I2 to state
STATE_MAIN_I3
108 "road" #5: STATE_MAIN_I3: sent MI3, expecting MR3
002 "road" #5: Peer ID is ID_FQDN: '@office'
002 "road" #5: transition from state STATE_MAIN_I3 to state
STATE_MAIN_I4
002 "road" #5: ISAKMP SA established
004 "road" #5: STATE_MAIN_I4: ISAKMP SA established
002 "road" #6: initiating Quick Mode RSASIG+ENCRYPT+TUNNEL+PFS+UP {using
isakmp#5}
112 "road" #6: STATE_QUICK_I1: initiate
002 "road" #6: transition from state STATE_QUICK_I1 to state
STATE_QUICK_I2
002 "road" #6: sent QI2, IPsec SA established {ESP=>0x54731897
<0xd9b9d1e9}
004 "road" #6: STATE_QUICK_I2: sent QI2, IPsec SA established
{ESP=>0x54731897 <0xd9b9d1e9}

# cat /proc/net/dev
Inter-|   Receive                                                | 
Transmit
 face |bytes    packets errs drop fifo frame compressed multicast|bytes 
  packets errs drop fifo colls carrier compressed
    lo:   47518     610    0    0    0     0          0         0   
47518     610    0    0    0     0       0          0
  eth0: 6892569   57958    0    0    0     0          0         0 
8375639   58873    0    0    0     0       0          0
  eth1: 1179954   11731    0    0    0     0          0         0  
545489    3553    0    0    0     0       0          0

 # ifconfig ipsec0
ipsec0: error fetching interface information: Device not found

Apologies for formatting and if I fumble with other mailing list
conventions, please let me know, this is the first time I am subscribed
to one. 

In the syslog I clearly see KLIPS ipsec0 ... . The link works. From the
VPN client I can ping hosts on the subnet 'behind' the VPN server. 
Or is ipsec0 visible in some whole other place? 

Thanks in advance, 

Vince


Paul Wouters <paul at xelerance.com> wrote: 
> 
> On Wed, 14 Mar 2007, Vince John wrote:
> 
> >
> > My connection comes up all the way, and works, even, but I never see an
> > ipsec* device appearing anywhere.
> > For firewalling and routing reasons I do need one.
> > I have tried both
> >          interfaces="ipsec0=eth0"
> > and
> >         interfaces=%defaultroute
> > but nothing. Not with ifconfig, not in /proc/net/dev.
> >
> > Any idea what I am overlooking/forgetting?
> 
> If using NETKEY, you do not get ipsecX devices. Only when using KLIPS.
> Use ipsec --version so see which you are using.
> 
> Paul
> -- 
> Building and integrating Virtual Private Networks with Openswan:
> http://www.amazon.com/gp/product/1904811256/104-3099591-2946327?n=283155
> 

--
Free e-mail accounts at http://zworg.com


More information about the Users mailing list