[Openswan Users] Only one side of tunnel completing initiation?

Dan Brown danb at zu.com
Fri Dec 19 17:11:51 EST 2008


Whoops. Sorry Peter, you'll get this twice.  I meant to send it to the list
however instead of just you.

Peter McGill wrote: 
> Dan Brown wrote:
> > #1: received Delete SA payload: replace IPSEC State #2 in 10 seconds
> > #1: received and ignored informational message
> > #1: received Delete SA payload: deleting ISAKMP State #1
> > : packet from 207.236.235.99:500: received and ignored informational
> message
> > : packet from 207.236.235.99:500: ignoring unknown Vendor ID payload
> > [424e455300000009]
> > : packet from 207.236.235.99:500: received Vendor ID payload [Dead
> Peer
> > Detection]
> > #3: responding to Main Mode
> > ...
> 
> Why are you getting Delete requests from the Nortel?
> Timestamps may have explained the output better.

Oh I suspect I accidently included a few lines from the previous connection
attempt.  This would have been when the other side with the Nortel router
restarted the connection from his end.

> > #2: initiating Quick Mode PSK+ENCRYPT+TUNNEL+PFS+UP {using isakmp#1}
> > #2: transition from state STATE_QUICK_I1 to state STATE_QUICK_I2
> > #2: STATE_QUICK_I2: sent QI2, IPsec SA established {ESP=>0xfe516ebd
> > <0x169858db xfrm=3DES_0-HMAC_SHA1 NATD=none DPD=none}
> 
> You do appear to be connecting properly here.

I hadn't turned on debugging until this morning and discovered this is
really just the beginning of the Phase 2 connection.  The Phase 2 connection
never completes as OpenSwan doesn't appear to accept either the proposal or
the config.  Phase 1 is supposed to be 3des-sha1-modp1024, and phase 2
aes128-sha1-modp1024.  It appears to attempt to use 3DES in phase 2 of the
connection however.

This is that last message and the next with debugging (control parsing) on.

Dec 19 15:07:43 blackhawk pluto[18479]: "p2p" #2: STATE_QUICK_I2: sent QI2,
IPsec SA established {ESP=>0xed7ef1a6 <0xb09eb0b5 xfrm=3DES_0-HMAC_SHA1
NATD=none DPD=none}
Dec 19 15:07:43 blackhawk pluto[18479]: | modecfg pull: noquirk policy:push
not-client
Dec 19 15:07:43 blackhawk pluto[18479]: | phase 1 is done, looking for phase
1 to unpend
Dec 19 15:07:43 blackhawk pluto[18479]: | next event EVENT_PENDING_PHASE2 in
118 seconds

Does this mean however it's still trying to establish phase 2 as 3DES or
attempting to be the server (eg. the first two lines).


After 120 seconds it then sends this:

Dec 19 15:09:41 blackhawk pluto[18479]: |  
Dec 19 15:09:41 blackhawk pluto[18479]: | *time to handle event
Dec 19 15:09:41 blackhawk pluto[18479]: | handling event
EVENT_PENDING_PHASE2
Dec 19 15:09:41 blackhawk pluto[18479]: | event after this is
EVENT_REINIT_SECRET in 3480 seconds
Dec 19 15:09:41 blackhawk pluto[18479]: | inserting event
EVENT_PENDING_PHASE2, timeout in 120 seconds
Dec 19 15:09:41 blackhawk pluto[18479]: | pending review: connection "p2p"
checked
Dec 19 15:09:41 blackhawk pluto[18479]: | next event EVENT_PENDING_PHASE2 in
120 seconds
Dec 19 15:09:42 blackhawk pluto[18479]: |  
Dec 19 15:09:42 blackhawk pluto[18479]: | *received 84 bytes from
207.236.235.99:500 on eth0 (port=500)
Dec 19 15:09:42 blackhawk pluto[18479]: | **parse ISAKMP Message:
Dec 19 15:09:42 blackhawk pluto[18479]: |    initiator cookie:
Dec 19 15:09:42 blackhawk pluto[18479]: |   40 d1 31 e8  07 94 dc 2d
Dec 19 15:09:42 blackhawk pluto[18479]: |    responder cookie:
Dec 19 15:09:42 blackhawk pluto[18479]: |   64 4b 70 1b  e2 dd 8b 07
Dec 19 15:09:42 blackhawk pluto[18479]: |    next payload type:
ISAKMP_NEXT_HASH
Dec 19 15:09:42 blackhawk pluto[18479]: |    ISAKMP version: ISAKMP Version
1.0
Dec 19 15:09:42 blackhawk pluto[18479]: |    exchange type: ISAKMP_XCHG_INFO
Dec 19 15:09:42 blackhawk pluto[18479]: |    flags: ISAKMP_FLAG_ENCRYPTION
Dec 19 15:09:42 blackhawk pluto[18479]: |    message ID:  d2 ef a1 ca
Dec 19 15:09:42 blackhawk pluto[18479]: |    length: 84
Dec 19 15:09:42 blackhawk pluto[18479]: |  processing packet with exchange
type=ISAKMP_XCHG_INFO (5)
Dec 19 15:09:42 blackhawk pluto[18479]: | ICOOKIE:  40 d1 31 e8  07 94 dc 2d
Dec 19 15:09:42 blackhawk pluto[18479]: | RCOOKIE:  64 4b 70 1b  e2 dd 8b 07
Dec 19 15:09:42 blackhawk pluto[18479]: | peer:  cf ec eb 63
Dec 19 15:09:42 blackhawk pluto[18479]: | state hash entry 16
Dec 19 15:09:42 blackhawk pluto[18479]: | peer and cookies match on #2,
provided msgid 00000000 vs 57c98b9c/00000000
Dec 19 15:09:42 blackhawk pluto[18479]: | peer and cookies match on #1,
provided msgid 00000000 vs 00000000/00000000
Dec 19 15:09:42 blackhawk pluto[18479]: | p15 state object #1 found, in
STATE_MAIN_I4
Dec 19 15:09:42 blackhawk pluto[18479]: | processing connection gof2citi-psk
Dec 19 15:09:42 blackhawk pluto[18479]: | ***parse ISAKMP Hash Payload:
Dec 19 15:09:42 blackhawk pluto[18479]: |    next payload type:
ISAKMP_NEXT_N
Dec 19 15:09:42 blackhawk pluto[18479]: |    length: 24
Dec 19 15:09:42 blackhawk pluto[18479]: | ***parse ISAKMP Notification
Payload:
Dec 19 15:09:42 blackhawk pluto[18479]: |    next payload type:
ISAKMP_NEXT_NONE
Dec 19 15:09:42 blackhawk pluto[18479]: |    length: 32
Dec 19 15:09:42 blackhawk pluto[18479]: |    DOI: ISAKMP_DOI_IPSEC
Dec 19 15:09:42 blackhawk pluto[18479]: |    protocol ID: 1
Dec 19 15:09:42 blackhawk pluto[18479]: |    SPI size: 16
Dec 19 15:09:42 blackhawk pluto[18479]: |    Notify Message Type: R_U_THERE
Dec 19 15:09:42 blackhawk pluto[18479]: | info:  40 d1 31 e8  07 94 dc 2d
64 4b 70 1b  e2 dd 8b 07
Dec 19 15:09:42 blackhawk pluto[18479]: |   06 2a b8 e0
Dec 19 15:09:42 blackhawk pluto[18479]: | processing informational R_U_THERE
(36136)
Dec 19 15:09:42 blackhawk pluto[18479]: | sending 84 bytes for ISAKMP notify
through eth0:500 to 207.236.235.99:500:
Dec 19 15:09:42 blackhawk pluto[18479]: | complete state transition with
STF_IGNORE
Dec 19 15:09:42 blackhawk pluto[18479]: | next event EVENT_PENDING_PHASE2 in
119 seconds

So by the looks of it it never matches up.  I'm not sure if it has to  do
with the lines:
Dec 19 15:11:42 blackhawk pluto[18479]: | peer and cookies match on #2,
provided msgid 00000000 vs 57c98b9c/00000000
Dec 19 15:11:42 blackhawk pluto[18479]: | peer and cookies match on #1,
provided msgid 00000000 vs 00000000/00000000


So my config now looks like this (Openswan 2.6.19 using netkey):

My config for the connection has been changed a little to:

conn p2p
        # connection defs
        authby=secret
        pfs=yes
        auto=start
        compress=no
        type=tunnel
        keylife=8h
        # Phase 1
        keyexchange=ike
        keyingtries=3
        rekey=yes
        ike=3des-sha1-modp1024,aes128-sha1-modp1024
        ikelifetime=8h
        # Phase 2
        esp=aes128-sha1-1024
        # connection peers/networks
        left=209.167.162.84
        leftnexthop=209.167.162.81
        leftsubnet=209.167.162.80/28
        right=207.236.235.99
        rightsubnet=199.43.146.0/24


________________________________________________
Dan Brown
danb at zu.com





More information about the Users mailing list