[Openswan Users] the proposed IP did not match our list (virtual_private=)

Rob Emanuele rje at crystalfontz.com
Thu Aug 21 16:18:37 EDT 2008


if i change rightsubnet like so, it works
rightsubnet=vhost:%priv,%no,%v4:10.0.0.0/8,%v4:192.168.0.0/16,%4:172.16.0.0/12

weird.

On Thu, Aug 21, 2008 at 11:50 AM, Rob Emanuele <rje at crystalfontz.com> wrote:
> Hi,
>
> I've built openswan from scratch (both versions 2.6.14 and 2.6.16) and
> both exhibit this error.
>
> What would cause the peer proposal to be rejected when the network is
> clearly in the virtual_private list?
>
> Thanks,
>
> Rob
>
> Aug 21 11:40:09 vpn pluto[20616]: "roadwarrior-l2tp-updatedwin"[2]
> 70.89.140.6 #1: peer client type is FQDN
> Aug 21 11:40:09 vpn pluto[20616]: "roadwarrior-l2tp-updatedwin"[2]
> 70.89.140.6 #1: Applying workaround for MS-818043 NAT-T bug
> Aug 21 11:40:09 vpn pluto[20616]: "roadwarrior-l2tp-updatedwin"[2]
> 70.89.140.6 #1: IDci was FQDN: B-\245", using NAT_OA=10.1.10.132/32 as
> IDci
> Aug 21 11:40:09 vpn pluto[20616]: "roadwarrior-l2tp-updatedwin"[2]
> 70.89.140.6 #1: the peer proposed: 66.45.165.34/32:17/1701 ->
> 10.1.10.132/32:17/1701
> Aug 21 11:40:09 vpn pluto[20616]: "roadwarrior-l2tp-updatedwin"[2]
> 70.89.140.6 #1: peer proposal was reject in a virtual connection
> policy because:
> Aug 21 11:40:09 vpn pluto[20616]: "roadwarrior-l2tp-updatedwin"[2]
> 70.89.140.6 #1:   a private network virtual IP was required, but the
> proposed IP did not match our list (virtual_private=)
> Aug 21 11:40:09 vpn pluto[20616]: "roadwarrior-l2tp-updatedwin"[2]
> 70.89.140.6 #1: peer proposal was reject in a virtual connection
> policy because:
> Aug 21 11:40:09 vpn pluto[20616]: "roadwarrior-l2tp-updatedwin"[2]
> 70.89.140.6 #1:   a private network virtual IP was required, but the
> proposed IP did not match our list (virtual_private=)
> Aug 21 11:40:09 vpn pluto[20616]: "roadwarrior-l2tp-updatedwin"[2]
> 70.89.140.6 #1: cannot respond to IPsec SA request because no
> connection is known for
> 66.45.165.34<66.45.165.34>[+S=C]:17/1701...70.89.140.6[@cassini,+S=C]:17/1701===10.1.10.132/32
>
>
> ==== ipsec.conf=========
>
> version 2.0     # conforms to second version of ipsec.conf
> specification
>
> # basic configuration
> config setup
>        # plutodebug / klipsdebug = "all", "none" or a combation from
> below:
>        # "raw crypt parsing emitting control klips pfkey natt x509
> private"
>        # eg:
>        # plutodebug="control parsing"
>        #
>        # Only enable *debug=all if you are a developer
>        #
>        # NAT-TRAVERSAL support, see README.NAT-Traversal
>        nat_traversal=yes
>        # exclude networks used on server side by adding
> %v4:!a.b.c.0/24
>        virtual_private=%v4:10.0.0.0/8,%v4:192.168.0.0/16,%4:172.16.0.0/12
>        # OE is now off by default. Uncomment and change to on, to
> enable.
>        OE=off
>        # which IPsec stack to use. netkey,klips,mast,auto or none
>        protostack=netkey
>        uniqueids=yes
>
> conn %default
>     keyingtries=1
>     compress=no
>     disablearrivalcheck=no
>     authby=secret
>     pfs=no
>
> conn roadwarrior-l2tp-updatedwin
>     pfs=no
>     leftprotoport=17/1701
>     rightprotoport=17/1701
>     also=roadwarrior
>
> conn roadwarrior-l2tp
>     pfs=no
>     leftprotoport=17/0
>     rightprotoport=17/1701
>     also=roadwarrior
>
> conn macintosh-l2tp
>     pfs=no
>     leftprotoport=17/1701
>     rightprotoport=17/%any
>     also=roadwarrior
>
> conn roadwarrior
>     left=44.44.165.34
>     right=%any
>     rightsubnet=vhost:%priv,%no
>     auto=add
>     #forceencaps=yes
>     type=transport
>


More information about the Users mailing list