[Openswan Users] One-Way SA Failure

Zachary Kotlarek zach at kotlarek.com
Thu Jun 26 06:08:31 EDT 2008


I've got two OpenSwan systems that will form an SA in one direction  
but not the other. I get to STATE_QUICK_I1 on both sides without a  
problem. One side then quickly establishes an SA and starts the tunnel  
(or at least claims to), while the other side sits around  
retransmitting.

I've got a very similar configuration (different subnet and  
certificate, otherwise identical) between Leeloo and another host that  
works fine, and for the life of me I can't figure out what's wrong  
with this one. I'd appreciate any suggestions.

I'm getting this error on the Pancho end, but I'm not sure if it's the  
root cause or just a symptom, and either way google offered little  
help in diagnosing it:

"panchoInetLeeloo" #70: responding to Quick Mode proposal {msgid: 
38d61ccc}
"panchoInetLeeloo" #70: ERROR: netlink response for Add SA comp.93d at 66.43.220.65 
  included errno 22: Invalid argument

Later I get things like this, but I'm pretty sure these are secondary  
to the netlink error above (or whatever caused that error):

| got payload 0x100(ISAKMP_NEXT_HASH) needed: 0x502 opt: 0x200030
"panchoInetLeeloo" #70: next payload type of ISAKMP Hash Payload has  
an unknown value: 203
"panchoInetLeeloo" #70: malformed payload in packet
"panchoInetLeeloo" #70: too many (-397256193) malformed payloads.  
Deleting state

Console logs from the tunnel-up command follow, and I'd be happy to  
provide any additional information that might be useful.

Thanks much,
	Zach

Things work fine from Pancho:

pancho ~ 0$ ipsec --version
Linux Openswan U2.6.14/K2.6.24.7 (netkey)
See `ipsec --copyright' for copyright information.

pancho ~ 0$ sudo ipsec auto --verbose --up panchoInetLeeloo
002 "panchoInetLeeloo" #32: initiating Main Mode
104 "panchoInetLeeloo" #32: STATE_MAIN_I1: initiate
003 "panchoInetLeeloo" #32: ignoring unknown Vendor ID payload  
[4f454b427a64597b774d5d40]
003 "panchoInetLeeloo" #32: received Vendor ID payload [Dead Peer  
Detection]
003 "panchoInetLeeloo" #32: received Vendor ID payload [RFC 3947]  
method set to=109
002 "panchoInetLeeloo" #32: enabling possible NAT-traversal with  
method 4
002 "panchoInetLeeloo" #32: transition from state STATE_MAIN_I1 to  
state STATE_MAIN_I2
106 "panchoInetLeeloo" #32: STATE_MAIN_I2: sent MI2, expecting MR2
003 "panchoInetLeeloo" #32: NAT-Traversal: Result using RFC 3947 (NAT- 
Traversal): no NAT detected
002 "panchoInetLeeloo" #32: I am sending my cert
002 "panchoInetLeeloo" #32: I am sending a certificate request
002 "panchoInetLeeloo" #32: transition from state STATE_MAIN_I2 to  
state STATE_MAIN_I3
108 "panchoInetLeeloo" #32: STATE_MAIN_I3: sent MI3, expecting MR3
002 "panchoInetLeeloo" #32: Main mode peer ID is ID_FQDN: '@leeloo.cynicbytrade.com 
'
002 "panchoInetLeeloo" #32: no crl from issuer "C=US, ST=Iowa, L=Ames,  
O=Cynic by Trade, LLC, OU=Secure Web Services, CN=cynicbytrade.com, E=ssl at cynicbytrade.com 
" found (strict=no)
002 "panchoInetLeeloo" #32: transition from state STATE_MAIN_I3 to  
state STATE_MAIN_I4
004 "panchoInetLeeloo" #32: STATE_MAIN_I4: ISAKMP SA established  
{auth=OAKLEY_RSA_SIG cipher=aes_128 prf=oakley_sha group=modp2048}
002 "panchoInetLeeloo" #32: alloc_bytes1() was mistakenly asked to  
malloc 0 bytes for st_skey_ar in duplicate_state, please report to dev at openswan.org
002 "panchoInetLeeloo" #32: alloc_bytes1() was mistakenly asked to  
malloc 0 bytes for st_skey_er in duplicate_state, please report to dev at openswan.org
002 "panchoInetLeeloo" #32: alloc_bytes1() was mistakenly asked to  
malloc 0 bytes for st_skey_pi in duplicate_state, please report to dev at openswan.org
002 "panchoInetLeeloo" #32: alloc_bytes1() was mistakenly asked to  
malloc 0 bytes for st_skey_pr in duplicate_state, please report to dev at openswan.org
002 "panchoInetLeeloo" #33: initiating Quick Mode RSASIG+ENCRYPT 
+COMPRESS+TUNNEL+PFS+UP+IKEv2ALLOW {using isakmp#32 msgid:a81e36f0  
proposal=defaults pfsgroup=OAKLEY_GROUP_MODP2048}
117 "panchoInetLeeloo" #33: STATE_QUICK_I1: initiate
002 "panchoInetLeeloo" #33: transition from state STATE_QUICK_I1 to  
state STATE_QUICK_I2
004 "panchoInetLeeloo" #33: STATE_QUICK_I2: sent QI2, IPsec SA  
established tunnel mode {ESP=>0xd74f4f4e <0x273818ca xfrm=AES_128- 
HMAC_SHA1 NATOA=none NATD=none DPD=none}

But not on the Leeloo end:

leeloo ~ 0$ ipsec --version
Linux Openswan U2.4.12/K2.6.23.17 (netkey)
See `ipsec --copyright' for copyright information.

leeloo ~ 31$ sudo ipsec auto --verbose --up panchoInetLeeloo
002 "panchoInetLeeloo" #34: initiating Quick Mode RSASIG+ENCRYPT 
+COMPRESS+TUNNEL+PFS+UP {using isakmp#28}
117 "panchoInetLeeloo" #34: STATE_QUICK_I1: initiate
010 "panchoInetLeeloo" #34: STATE_QUICK_I1: retransmission; will wait  
20s for response
010 "panchoInetLeeloo" #34: STATE_QUICK_I1: retransmission; will wait  
40s for response
031 "panchoInetLeeloo" #34: max number of retransmissions (2) reached  
STATE_QUICK_I1
000 "panchoInetLeeloo" #34: starting keying attempt 2 of an unlimited  
number, but releasing whack

-------------- next part --------------
A non-text attachment was scrubbed...
Name: smime.p7s
Type: application/pkcs7-signature
Size: 1682 bytes
Desc: not available
Url : http://lists.openswan.org/pipermail/users/attachments/20080626/ac4663f9/attachment.bin 


More information about the Users mailing list