[Openswan Users] xl2tpd timeouts over openswan ipsec

Rob Emanuele rje at crystalfontz.com
Thu Aug 21 16:24:02 EDT 2008


his tcp dump is with the firewall turned off.

In the NAT-T case it looks like the l2tp packets are going back out
the interface unencapsulated.

Is there a routing issue I need to address?

--Rob

On Thu, Aug 21, 2008 at 10:09 AM, Rob Emanuele <rje at crystalfontz.com> wrote:
> Still time outs while connecting to xl2tpd.
>
> This is even after turning compress=no and binding xl2tpd to the same
> interface as the ipsec connection.
>
> Any other thoughts?  People have emailed me directly after seeing my
> post to say they have the same problem.
>
> My tcpdump of the connection from a Windows XP SP2 box looks like this:
>
> 09:58:57.194953 IP 99-99-99-99-smc-wa.hfc.comcastbusiness.net.isakmp >
> vpn.safety.net.isakmp: isakmp: phase 1 I ident
> 09:58:57.196932 IP vpn.safety.net.isakmp >
> 99-99-99-99-smc-wa.hfc.comcastbusiness.net.isakmp: isakmp: phase 1 R
> ident
> 09:58:57.626851 IP 99-99-99-99-smc-wa.hfc.comcastbusiness.net.isakmp >
> vpn.safety.net.isakmp: isakmp: phase 1 I ident
> 09:58:57.638462 IP vpn.safety.net.isakmp >
> 99-99-99-99-smc-wa.hfc.comcastbusiness.net.isakmp: isakmp: phase 1 R
> ident
> 09:58:57.753991 IP
> 99-99-99-99-smc-wa.hfc.comcastbusiness.net.ipsec-nat-t >
> vpn.safety.net.ipsec-nat-t: NONESP-encap: isakmp: phase 1 I ident[E]
> 09:58:57.754345 IP vpn.safety.net.ipsec-nat-t >
> 99-99-99-99-smc-wa.hfc.comcastbusiness.net.ipsec-nat-t: NONESP-encap:
> isakmp: phase 1 R ident[E]
> 09:58:57.782994 IP
> 99-99-99-99-smc-wa.hfc.comcastbusiness.net.ipsec-nat-t >
> vpn.safety.net.ipsec-nat-t: NONESP-encap: isakmp: phase 2/others I
> oakley-quick[E]
> 09:58:57.785574 IP vpn.safety.net.ipsec-nat-t >
> 99-99-99-99-smc-wa.hfc.comcastbusiness.net.ipsec-nat-t: NONESP-encap:
> isakmp: phase 2/others R oakley-quick[E]
> 09:58:57.811298 IP
> 99-99-99-99-smc-wa.hfc.comcastbusiness.net.ipsec-nat-t >
> vpn.safety.net.ipsec-nat-t: NONESP-encap: isakmp: phase 2/others I
> oakley-quick[E]
> 09:58:57.816199 IP
> 99-99-99-99-smc-wa.hfc.comcastbusiness.net.ipsec-nat-t >
> vpn.safety.net.ipsec-nat-t: UDP-encap: ESP(spi=0xc6301078,seq=0x1),
> length 140
> 09:58:58.809784 IP
> 99-99-99-99-smc-wa.hfc.comcastbusiness.net.ipsec-nat-t >
> vpn.safety.net.ipsec-nat-t: UDP-encap: ESP(spi=0xc6301078,seq=0x2),
> length 140
> 09:58:59.816510 IP vpn.safety.net.l2tp >
> 99-99-99-99-smc-wa.hfc.comcastbusiness.net.l2tp:
> l2tp:[TLS](7/0)Ns=0,Nr=1 *MSGTYPE(SCCRP) *PROTO_VER(1.0)
> *FRAMING_CAP(AS) *BEARER_CAP() |...
> 09:58:59.816749 IP vpn.safety.net.l2tp >
> 99-99-99-99-smc-wa.hfc.comcastbusiness.net.l2tp:
> l2tp:[TLS](7/0)Ns=0,Nr=1 ZLB
> 09:59:00.813893 IP
> 99-99-99-99-smc-wa.hfc.comcastbusiness.net.ipsec-nat-t >
> vpn.safety.net.ipsec-nat-t: UDP-encap: ESP(spi=0xc6301078,seq=0x3),
> length 140
> 09:59:00.814432 IP vpn.safety.net.l2tp >
> 99-99-99-99-smc-wa.hfc.comcastbusiness.net.l2tp:
> l2tp:[TLS](7/0)Ns=0,Nr=1 ZLB
> 09:59:00.816521 IP vpn.safety.net.l2tp >
> 99-99-99-99-smc-wa.hfc.comcastbusiness.net.l2tp:
> l2tp:[TLS](7/0)Ns=0,Nr=1 *MSGTYPE(SCCRP) *PROTO_VER(1.0)
> *FRAMING_CAP(AS) *BEARER_CAP() |...
> 09:59:01.816543 IP vpn.safety.net.l2tp >
> 99-99-99-99-smc-wa.hfc.comcastbusiness.net.l2tp:
> l2tp:[TLS](7/0)Ns=0,Nr=1 *MSGTYPE(SCCRP) *PROTO_VER(1.0)
> *FRAMING_CAP(AS) *BEARER_CAP() |...
> 09:59:02.816569 IP vpn.safety.net.l2tp >
> 99-99-99-99-smc-wa.hfc.comcastbusiness.net.l2tp:
> l2tp:[TLS](7/0)Ns=0,Nr=1 *MSGTYPE(SCCRP) *PROTO_VER(1.0)
> *FRAMING_CAP(AS) *BEARER_CAP() |...
> 09:59:03.816594 IP vpn.safety.net.l2tp >
> 99-99-99-99-smc-wa.hfc.comcastbusiness.net.l2tp:
> l2tp:[TLS](7/0)Ns=0,Nr=1 *MSGTYPE(SCCRP) *PROTO_VER(1.0)
> *FRAMING_CAP(AS) *BEARER_CAP() |...
> 09:59:04.816718 IP vpn.safety.net.l2tp >
> 99-99-99-99-smc-wa.hfc.comcastbusiness.net.l2tp:
> l2tp:[TLS](7/0)Ns=1,Nr=1 *MSGTYPE(StopCCN) *ASSND_TUN_ID(34297)
> *RESULT_CODE(1/0 Timeout)
> 09:59:04.819472 IP
> 99-99-99-99-smc-wa.hfc.comcastbusiness.net.ipsec-nat-t >
> vpn.safety.net.ipsec-nat-t: UDP-encap: ESP(spi=0xc6301078,seq=0x4),
> length 140
> 09:59:04.819994 IP vpn.safety.net.l2tp >
> 99-99-99-99-smc-wa.hfc.comcastbusiness.net.l2tp:
> l2tp:[TLS](7/0)Ns=0,Nr=1 ZLB
> 09:59:05.816749 IP vpn.safety.net.l2tp >
> 99-99-99-99-smc-wa.hfc.comcastbusiness.net.l2tp:
> l2tp:[TLS](7/0)Ns=1,Nr=1 *MSGTYPE(StopCCN) *ASSND_TUN_ID(34297)
> *RESULT_CODE(1/0 Timeout)
> 09:59:06.816776 IP vpn.safety.net.l2tp >
> 99-99-99-99-smc-wa.hfc.comcastbusiness.net.l2tp:
> l2tp:[TLS](7/0)Ns=1,Nr=1 *MSGTYPE(StopCCN) *ASSND_TUN_ID(34297)
> *RESULT_CODE(1/0 Timeout)
> 09:59:07.816804 IP vpn.safety.net.l2tp >
> 99-99-99-99-smc-wa.hfc.comcastbusiness.net.l2tp:
> l2tp:[TLS](7/0)Ns=1,Nr=1 *MSGTYPE(StopCCN) *ASSND_TUN_ID(34297)
> *RESULT_CODE(1/0 Timeout)
> 09:59:08.816826 IP vpn.safety.net.l2tp >
> 99-99-99-99-smc-wa.hfc.comcastbusiness.net.l2tp:
> l2tp:[TLS](7/0)Ns=1,Nr=1 *MSGTYPE(StopCCN) *ASSND_TUN_ID(34297)
> *RESULT_CODE(1/0 Timeout)
>
>
> On Wed, Aug 20, 2008 at 11:33 PM, Tuomo Soini <tis at foobar.fi> wrote:
>> -----BEGIN PGP SIGNED MESSAGE-----
>> Hash: SHA1
>>
>> Rob Emanuele wrote:
>> | Greetings,
>> |
>> | I'm running Fedora 9 with openswan and xl2tpd as a VPN server.  My
>> | ipsec transport comes up fine but xt2tpd timesout.
>> |
>> | I see some questions about this online but no firm solutions.  The
>> | only solution I've seen talks about setting leftnexthop which errors
>> | out if set to %defaultroute.
>>
>> if you are using openswan from fedora 9 that's normal because fedora has
>> patch which totally removes support for %defaultroute with netkey. But I
>> can see some other problems with your config.
>>
>> | config setup
>> |         # Debug-logging controls:  "none" for (almost) none, "all" for
>> | lots.
>> |         # klipsdebug=none
>> |         #plutodebug="control parsing"
>> |         # For Red Hat Enterprise Linux and Fedora, leave
>> | protostack=netkey
>> |         protostack=netkey
>> |         nat_traversal=yes
>> |
>> virtual_private=%v4:10.0.0.0/8,%v4:192.168.0.0/16,%v4:172.16.0.0/12
>> |         uniqueids=yes
>> |
>> | conn %default
>> |      keyingtries=1
>> |      compress=yes
>> |      disablearrivalcheck=no
>> |      authby=secret
>> |      pfs=no
>> |
>>
>> compress=yes doesn't work with windows... That makes it impossible to
>> communicate with road warriors. Default setting, compress=no is only
>> valid option here.
>>
>> | conn roadwarrior-l2tp
>> |      pfs=no
>> |      leftprotoport=17/0
>> |      rightprotoport=17/1701
>> |      also=roadwarrior
>> |
>> | conn macintosh-l2tp
>> |      pfs=no
>> |      leftprotoport=17/1701
>> |      rightprotoport=17/%any
>> |      also=roadwarrior
>>
>> I think this must be rightprotoport=17/0
>>
>> | conn roadwarrior
>> |      left=66.66.66.66
>> |      right=%any
>> |      rightsubnet=vhost:%priv,%no
>> |      auto=add
>> |      type=transport
>>
>> vhost:%priv,%no doesn't seem to work for me. It's a bug, work-around is:
>>
>> conn roadwarriornat
>>        left=66.66.66.66
>>        right=%any
>>        rightsubnet=vhost:%priv
>>        auto=add
>>        type=transport
>>
>> conn roadwarrior
>>        left=66.66.66.66
>>        right=%any
>>        rightsubnet=vhost:%no
>>        auto=add
>>        type=transport
>>
>> | ===============xl2tpd=========
>> |
>> | [global]
>> | debug tunnel = yes
>> | debug network = yes
>>
>> listen-addr = 66.66.66.66 <- This might help if xl2tpd is using wrong ip
>> ~ for answer.
>>
>> | [lns default]
>> | ip range = 192.168.113.150-192.168.201.175
>> | local ip = 192.168.113.253
>> | require chap = yes
>> | refuse pap = yes
>> | require authentication = yes
>> | name = LinuxVPNserver
>> | ppp debug = yes
>> | pppoptfile = /etc/ppp/options.xl2tpd
>> | length bit = yes
>> | _______________________________________________
>> | Users at openswan.org
>> | http://lists.openswan.org/mailman/listinfo/users
>> | Building and Integrating Virtual Private Networks with Openswan:
>> | http://www.amazon.com/gp/product/1904811256/104-3099591-2946327?n=283155
>>
>>
>> - --
>> Tuomo Soini <tis at foobar.fi>
>> Foobar Linux services
>> +358 40 5240030
>> Foobar Oy <http://foobar.fi/>
>> -----BEGIN PGP SIGNATURE-----
>> Version: GnuPG v1.4.5 (GNU/Linux)
>>
>> iD8DBQFIrQxETlrZKzwul1ERAs4KAJ4/4ZCbISMpxM8cZkLafsCOHpsEtACgmPM7
>> ZZaQ4W1b/6O3zAda7GCXMN8=
>> =OtMm
>> -----END PGP SIGNATURE-----
>>
>


More information about the Users mailing list