[Openswan Users] Open Swan and Fortigate.
Paul Wouters
paul at xelerance.com
Mon Aug 18 14:14:27 EDT 2008
On Mon, 18 Aug 2008, Hugues CHARBONNIER wrote:
Looks like pfs=no is missing to match the remote, though it is better
to have the remote enable pfs=yes
Paul
> Date: Mon, 18 Aug 2008 17:53:55 +0200
> From: Hugues CHARBONNIER <hcharbonnier at dotriver.eu>
> To: users at openswan.org
> Subject: [Openswan Users] Open Swan and Fortigate.
>
> Hi every body, i''m trying to connect a fortyGate bax with Openswan, but
> every thing goes bad...
>
> These are my conf. files , and the errors i have.
>
> Please, can anyone help me ?????!
>
> Fortigate (remote) conf:
> Phase 1:
> Main mode
> PSK
> Encryption/Authentication. 3Des-SHA1
> DH group 5
> Disable XAUTH
> Phase 2:
> Disable PFS
> DH group 5
>
> OpenSwan (local) conf :
>
> #/etc/ipsec.conf
> version 2
> config setup
> interfaces="ipsec0=eth0"
> klipsdebug=none
> plutodebug=none
> plutostderrlog=/var/log/ipsec_myconnec.log
> nat_traversal=yes
> include /etc/ipsec.d/*.conf
>
>
>
> #/etc/ipsec.d/myconnec.conf
> conn myconnec
> auto=add
> leftid=@home
> left=xx.xx.xx.xx
> leftsubnet=192.168.1.0/24
> right=xx.xx.xx.xx
> rightsubnet=ww.ww.ww.ww/24
> keyexchange=ike
> ike=3des-sha1
> auth=esp
> authby=secret
> #specify encryption FortiGate VPN uses
> esp=3des-sha1
>
>
> Screen errors: /usr/sbin/ipsec auto --up myconnec
> 104 "myconnec" #1: STATE_MAIN_I1: initiate
> 003 "myconnec" #1: received Vendor ID payload [Dead Peer Detection]
> 003 "myconnec" #1: ignoring unknown Vendor ID payload
> [afcad71368a1f1c96b8696fc77570100]
> 003 "myconnec" #1: ignoring unknown Vendor ID payload
> [1d6d178f6c2c0be284985465450fe9d4]
> 003 "myconnec" #1: received Vendor ID payload
> [draft-ietf-ipsec-nat-t-ike-03] method set to=108
> 106 "myconnec" #1: STATE_MAIN_I2: sent MI2, expecting MR2
> 003 "myconnec" #1: NAT-Traversal: Result using
> draft-ietf-ipsec-nat-t-ike-02/03: no NAT detected
> 108 "myconnec" #1: STATE_MAIN_I3: sent MI3, expecting MR3
> 004 "myconnec" #1: STATE_MAIN_I4: ISAKMP SA established
> {auth=OAKLEY_PRESHARED_KEY cipher=oakley_3des_cbc_192 prf=oakley_sha
> group=modp1536}
> 117 "myconnec" #2: STATE_QUICK_I1: initiate
> 010 "myconnec" #2: STATE_QUICK_I1: retransmission; will wait 20s for
> response
> 010 "myconnec" #2: STATE_QUICK_I1: retransmission; will wait 40s for
> response
> 031 "myconnec" #2: max number of retransmissions (2) reached
> STATE_QUICK_I1. No acceptable response to our first Quick Mode message:
> perhaps peer likes no proposal
> 000 "myconnec" #2: starting keying attempt 2 of an unlimited number, but
> releasing whack
>
> Screen errors: ipsec auto --status
> ....
> 000 stats db_ops.c: {curr_cnt, total_cnt, maxsz} :context={0,3,36}
> trans={0,3,480} attrs={0,3,320}
> 000
> 000 "myconnec":
> 192.168.1.0/24===xx.xx.xx.xx[@home]...xx.xx.xx.xx===xx.xx.xx.xx/24; unrouted;
> eroute owner: #0
> 000 "myconnec": srcip=unset; dstip=unset; srcup=ipsec _updown;
> dstup=ipsec _updown;
> 000 "myconnec": ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s;
> rekey_fuzz: 100%; keyingtries: 0
> 000 "myconnec": policy: PSK+ENCRYPT+COMPRESS+TUNNEL+PFS+UP; prio: 24,24;
> interface: eth0; encap: esp;
> 000 "myconnec": newest ISAKMP SA: #1; newest IPsec SA: #0;
> 000 "myconnec": IKE algorithms wanted:
> 3DES_CBC(5)_000-SHA1(2)-MODP1536(5), 3DES_CBC(5)_000-SHA1(2)-MODP1024(2);
> flags=strict
> 000 "myconnec": IKE algorithms found:
> 3DES_CBC(5)_192-SHA1(2)_160-MODP1536(5),
> 3DES_CBC(5)_192-SHA1(2)_160-MODP1024(2)
> 000 "myconnec": IKE algorithm newest: 3DES_CBC_192-SHA1-MODP1536
> 000 "myconnec": ESP algorithms wanted: 3DES(3)_000-SHA1(2); flags=strict
> 000 "myconnec": ESP algorithms loaded: 3DES(3)_000-SHA1(2); flags=strict
> 000
> 000 #3: "myconnec":500 STATE_QUICK_I1 (sent QI1, expecting QR1);
> EVENT_RETRANSMIT in 1s; lastdpd=-1s(seq in:0 out:0)
> 000 #1: "myconnec":500 STATE_MAIN_I4 (ISAKMP SA established);
> EVENT_SA_REPLACE in 2787s; newest ISAKMP; lastdpd=-1s(seq in:0 out:0)
> 000
>
> IPSec log file:
> loading secrets from "/etc/ipsec.secrets"
> "myconnec" #1: initiating Main Mode
> "myconnec" #1: received Vendor ID payload [Dead Peer Detection]
> "myconnec" #1: ignoring unknown Vendor ID payload
> [afca071368a1f1c96b8696fc77570100]
> "myconnec" #1: ignoring unknown Vendor ID payload
> [1d6e178f6c2c0be284985465450fe9d4]
> "myconnec" #1: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03]
> method set to=108
> "myconnec" #1: enabling possible NAT-traversal with method
> draft-ietf-ipsec-nat-t-ike-02/03
> "myconnec" #1: transition from state STATE_MAIN_I1 to state STATE_MAIN_I2
> "myconnec" #1: STATE_MAIN_I2: sent MI2, expecting MR2
> "myconnec" #1: I did not send a certificate because I do not have one.
> "myconnec" #1: NAT-Traversal: Result using
> draft-ietf-ipsec-nat-t-ike-02/03: no NAT detected
> "myconnec" #1: transition from state STATE_MAIN_I2 to state STATE_MAIN_I3
> "myconnec" #1: STATE_MAIN_I3: sent MI3, expecting MR3
> "myconnec" #1: Main mode peer ID is ID_IPV4_ADDR: 'xx.xx.xx.xx'
> "myconnec" #1: transition from state STATE_MAIN_I3 to state STATE_MAIN_I4
> "myconnec" #1: STATE_MAIN_I4: ISAKMP SA established
> {auth=OAKLEY_PRESHARED_KEY cipher=oakley_3des_cbc_192 prf=oakley_sha
> group=modp1536}
> "myconnec" #2: initiating Quick Mode PSK+ENCRYPT+COMPRESS+TUNNEL+PFS+UP
> {using isakmp#1}
> "myconnec" #1: ignoring informational payload, type INVALID_ID_INFORMATION
> "myconnec" #1: received and ignored informational message
> "myconnec" #2: max number of retransmissions (2) reached STATE_QUICK_I1.
> No acceptable response to our first Quick Mode message: perhaps peer likes no
> proposal
> "myconnec" #2: starting keying attempt 2 of an unlimited number, but
> releasing whack
> "myconnec" #3: initiating Quick Mode PSK+ENCRYPT+COMPRESS+TUNNEL+PFS+UP to
> replace #2 {using isakmp#1}
> "myconnec" #1: ignoring informational payload, type INVALID_ID_INFORMATION
> "myconnec" #1: received and ignored informational message
> "myconnec" #3: max number of retransmissions (2) reached STATE_QUICK_I1.
> No acceptable response to our first Quick Mode message: perhaps peer likes no
> proposal
> "myconnec" #3: starting keying attempt 3 of an unlimited number
> "myconnec" #4: initiating Quick Mode PSK+ENCRYPT+COMPRESS+TUNNEL+PFS+UP to
> replace #3 {using isakmp#1}
> "myconnec" #1: ignoring informational payload, type INVALID_ID_INFORMATION
> "myconnec" #1: received and ignored informational message
> "myconnec" #4: max number of retransmissions (2) reached STATE_QUICK_I1.
> No acceptable response to our first Quick Mode message: perhaps peer likes no
> proposal
> "myconnec" #4: starting keying attempt 4 of an unlimited number
> "myconnec" #5: initiating Quick Mode PSK+ENCRYPT+COMPRESS+TUNNEL+PFS+UP to
> replace #4 {using isakmp#1}
> "myconnec" #1: ignoring informational payload, type INVALID_ID_INFORMATION
> "myconnec" #1: received and ignored informational message
>
>
More information about the Users
mailing list