[Openswan Users] Installation/setup issues...

Mark Williams mwp at mwp.id.au
Fri Mar 7 04:44:01 EST 2008


> your IPsec session is not established thats why .

Ok... any idea why that is?

>  On Fri, Mar 7, 2008 at 1:27 PM, Mark Williams <mwp at mwp.id.au> wrote:
>  > >  [root at linux sbin]# ./ipsec auto --up cf
>  >  >  104 "cf" #1: STATE_MAIN_I1: initiate
>  >  >  003 "cf" #1: ignoring unknown Vendor ID payload [4f457a7d4646466667725f65]
>  >  >  003 "cf" #1: received Vendor ID payload [Dead Peer Detection]
>  >  >  003 "cf" #1: received Vendor ID payload [RFC 3947] method set to=109
>  >  >  106 "cf" #1: STATE_MAIN_I2: sent MI2, expecting MR2
>  >  >  003 "cf" #1: NAT-Traversal: Result using RFC 3947 (NAT-Traversal): i am NATed
>  >  >  108 "cf" #1: STATE_MAIN_I3: sent MI3, expecting MR3
>  >  >  004 "cf" #1: STATE_MAIN_I4: ISAKMP SA established
>  >  >  {auth=OAKLEY_PRESHARED_KEY cipher=oakley_3des_cbc_192 prf=oakley_md5
>  >  >
>  >  > group=modp1536}
>  >  >  117 "cf" #2: STATE_QUICK_I1: initiate
>  >  >  010 "cf" #2: STATE_QUICK_I1: retransmission; will wait 20s for response
>  >  >  010 "cf" #2: STATE_QUICK_I1: retransmission; will wait 40s for response
>  >  >  031 "cf" #2: max number of retransmissions (2) reached STATE_QUICK_I1.
>  >  >
>  >  >  No acceptable response to our first Quick Mode message: perhaps peer
>  >  >  likes no proposal
>  >  >  000 "cf" #2: starting keying attempt 2 of at most 10, but releasing whack
>  >  >
>  >  >  Oh, ill add too that ipsec/l2tp connection from a windows XP box to
>  >  >  the VPN server from the same NAT'ed LAN as the linux box im trying to
>  >  >  setup the openswan client from, works perfectly.
>  >
>  >  and to continue this...
>  >  This is the what the openswan VPN server logs are saying when i try to connect:
>  >
>  >  Mar  6 23:00:53 vpn pluto[3379]: packet from 150.101.102.xxx:500:
>  >  ignoring unknown Vendor ID payload [4f454b427a64597b774d5d40]
>  >  Mar  6 23:00:53 vpn pluto[3379]: packet from 150.101.102.xxx:500:
>  >  received Vendor ID payload [Dead Peer Detection]
>  >  Mar  6 23:00:53 vpn pluto[3379]: packet from 150.101.102.xxx:500:
>  >  received Vendor ID payload [RFC 3947] method set to=109
>  >  Mar  6 23:00:53 vpn pluto[3379]: packet from 150.101.102.xxx:500:
>  >  received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03] meth=108,
>  >  but already using method 109
>  >  Mar  6 23:00:53 vpn pluto[3379]: packet from 150.101.102.xxx:500:
>  >  received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02] meth=107,
>  >  but already using method 109
>  >  Mar  6 23:00:53 vpn pluto[3379]: packet from 150.101.102.xxx:500:
>  >  received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n] meth=106,
>  >  but already using method 109
>  >  Mar  6 23:00:53 vpn pluto[3379]: packet from 150.101.102.xxx:500:
>  >  received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-00]
>  >  Mar  6 23:00:53 vpn pluto[3379]: "L2TP-PSK-orgWIN2KXP"[31]
>  >  150.101.102.xxx #557: responding to Main Mode from unknown peer
>  >  150.101.102.xxx
>  >  Mar  6 23:00:53 vpn pluto[3379]: "L2TP-PSK-orgWIN2KXP"[31]
>  >  150.101.102.xxx #557: transition from state STATE_MAIN_R0 to state
>  >  STATE_MAIN_R1
>  >  Mar  6 23:00:53 vpn pluto[3379]: "L2TP-PSK-orgWIN2KXP"[31]
>  >  150.101.102.xxx #557: STATE_MAIN_R1: sent MR1, expecting MI2
>  >  Mar  6 23:00:53 vpn pluto[3379]: "L2TP-PSK-orgWIN2KXP"[31]
>  >  150.101.102.xxx #557: NAT-Traversal: Result using 3: peer is NATed
>  >  Mar  6 23:00:53 vpn pluto[3379]: "L2TP-PSK-orgWIN2KXP"[31]
>  >  150.101.102.xxx #557: transition from state STATE_MAIN_R1 to state
>  >  STATE_MAIN_R2
>  >  Mar  6 23:00:53 vpn pluto[3379]: "L2TP-PSK-orgWIN2KXP"[31]
>  >  150.101.102.xxx #557: STATE_MAIN_R2: sent MR2, expecting MI3
>  >  Mar  6 23:00:53 vpn pluto[3379]: "L2TP-PSK-orgWIN2KXP"[31]
>  >  150.101.102.xxx #557: Main mode peer ID is ID_IPV4_ADDR: '192.168.0.1'
>  >  Mar  6 23:00:53 vpn pluto[3379]: "L2TP-PSK-orgWIN2KXP"[33]
>  >  150.101.102.xxx #557: I did not send a certificate because I do not
>  >  have one.
>  >  Mar  6 23:00:53 vpn pluto[3379]: "L2TP-PSK-orgWIN2KXP"[33]
>  >  150.101.102.xxx #557: transition from state STATE_MAIN_R2 to state
>  >  STATE_MAIN_R3
>  >  Mar  6 23:00:53 vpn pluto[3379]: | NAT-T: new mapping 150.101.102.xxx:500/4500)
>  >  Mar  6 23:00:53 vpn pluto[3379]: "L2TP-PSK-orgWIN2KXP"[33]
>  >  150.101.102.xxx #557: STATE_MAIN_R3: sent MR3, ISAKMP SA established
>  >  {auth=OAKLEY_PRESHARED_KEY cipher=oakley_3des_cbc_192 prf=oakley_md5
>  >  group=modp1536}
>  >  Mar  6 23:00:53 vpn pluto[3379]: "L2TP-PSK-orgWIN2KXP"[33]
>  >  150.101.102.xxx #557: cannot respond to IPsec SA request because no
>  >  connection is known for
>  >  66.45.165.xx:17/1701...150.101.102.xxx[192.168.0.1]:17/%any===192.168.0.1/32
>  >  Mar  6 23:00:53 vpn pluto[3379]: "L2TP-PSK-orgWIN2KXP"[33]
>  >  150.101.102.xxx #557: sending encrypted notification
>  >  INVALID_ID_INFORMATION to 150.101.102.xxx:4500
>
>
> >  _______________________________________________
>  >  Users at openswan.org
>  >  http://lists.openswan.org/mailman/listinfo/users
>  >  Building and Integrating Virtual Private Networks with Openswan:
>  >  http://www.amazon.com/gp/product/1904811256/104-3099591-2946327?n=283155
>  >
>


More information about the Users mailing list