[Openswan Users] Trying to use linux as VPN client

Sebastiaan van Erk sebster at sebster.com
Thu Nov 20 15:38:45 EST 2008


Hi,

Thanks for the answers! I think you're right that I don't want L2TP. 
I've been reading the man page and trying stuff, but I'm still stuck 
though I feel I'm making some progress now. I've taken your suggestion 
and modified my connection file to:

conn relate
         authby=secret
         pfs=yes
         rekey=yes
         keyingtries=3
         type=tunnel
         aggrmode=yes
         left=%defaultroute
         leftid="sebster at sebster.com"
         right=111.111.111.111
         rightsubnet=10.31.5/24
         ike=aes192-sha1-modp1024
         phase2alg=aes192-sha1
         auto=add

Things I'm not sure about are the leftid (should it be prefixed with 
E=?). Also I don't know how to specify my IP address on the VPN subnet 
(10.31.13.5). Which I also find kind of strange considering it's not 
even on the rightsubnet (I copied these settings from GTA mobile client, 
and there it really says "address type: subnet, 10.31.5.0/255.255.255.0" 
with VPN client address 10.31.13.5). The GTA client settings were 
provided to me by the sysadmin of the VPN server.

Another thing that I don't understand is the phase2alg: guessing from 
the GTA mobile client config and the man page it should be:

	phase2alg=aes192-sha1-modp1024

[The format for ESP is ENC-AUTH followed by an optional PFSgroup. For 
instance, "3des-md5" or "aes256-sha1-modp2048". --- the man page]

However when I try this pluto starts to complain:

Nov 20 21:23:28 blauwoor pluto[29887]: esp string error: Non initial 
digit found for auth keylen, just after "aes192-sha1-" (old_state=ST_AA_END)

It then kills the "relate" connection, and I can't even attempt to 
connect. On the other hand, when I don't add the modp1024 then I get 
this in the log:

Nov 20 21:25:27 blauwoor pluto[30146]: "relate" #1: STATE_AGGR_I2: sent 
AI2, ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY cipher=aes_192 
prf=oakley_sha group=modp1024}
Nov 20 21:25:27 blauwoor pluto[30146]: "relate" #2: initiating Quick 
Mode PSK+ENCRYPT+TUNNEL+PFS+UP+AGGRESSIVE+IKEv2ALLOW {using isakmp#1 
msgid:c60f69e7 proposal=AES(12)_192-SHA1(2)_160 
pfsgroup=OAKLEY_GROUP_MODP1024}
Nov 20 21:26:36 blauwoor pluto[30146]: "relate" #2: max number of 
retransmissions (2) reached STATE_QUICK_I1.  No acceptable response to 
our first Quick Mode message: perhaps peer likes no proposal

It actually looks ok from what I can see: aes192, sha1, and PFS group 
DH1024.

I have the feeling I'm getting close but I'm still missing something. 
I'm pretty sure that I need to do something with my VPN client IP and 
I'm wondering about the format for the email id.

Regards,
Sebastiaan


Peter McGill wrote:
> Sebastiaan,
> 
> Nothing here indicates that your using l2tp.
> You should only have left/rightprotoport lines with l2tp.
> And yes, type/mode should be tunnel, unless using l2tp.
> 
> Peter McGill
> IT Systems Analyst
> Gra Ham Energy Limited 
> 
>> -----Original Message-----
>> From: users-bounces at openswan.org 
>> [mailto:users-bounces at openswan.org] On Behalf Of Sebastiaan van Erk
>> Sent: November 20, 2008 1:34 PM
>> To: users at openswan.org
>> Subject: Re: [Openswan Users] Trying to use linux as VPN client
>>
>> Hi,
>>
>> Thanks for the answer, and I figured as much, however I don't 
>> know what
>> part of the proposal the other end does not like... Also, I'm 
>> a bit of a
>> newbie, so I don't know what the STATE_QUICK_I1 means; does 
>> it mean that
>>    something succeeded (the STATE_AGGR_I2 stuff)? It already took me a
>> couple hours to actually get it that far, at first that was 
>> failing too...
>>
>> In GTA client I have the following settings under "Phase 1
>> (Authentication) (other than my preshared key and remote gateway):
>>
>> IKE:
>> Encryption AES192, Authentication: SHA, Key Group: DH1024.
>>
>> Under "Advanced" it has:
>> Aggressive mode enabled, NAT-T: Automatic (vs Disabled)
>> Local id: Type: email, value: sebster at sebster.com
>> Remote id: Type IP, value: the ipsec gateway
>>
>> In GTA client I have the following settings under "Phase 2 (IPSec
>> Configuration):
>>
>> ESP
>> Encryption: AES192, Authentication: SHA, Mode: Tunnel (oops, in my
>> config file I had mode transport, so I guess that's wrong, 
>> fixed it now
>> and put it on mode tunnel, but it still gives the same output).
>>
>> PFS is checked, Group DH1024
>>
>> Those are all the options available.
>>
>> Is there a good way to debug this? I guess it's part of the security
>> that the other hand just plain says nothing instead of saying 
>> what's wrong.
>>
>> Regards,
>> Sebastiaan
>>
>>
>>
>>
>> Paul Wouters wrote:
>>> On Thu, 20 Nov 2008, Sebastiaan van Erk wrote:
>>>
>>>> $ ipsec auto --up relate
>>>> 112 "relate" #1: STATE_AGGR_I1: initiate
>>>> 003 "relate" #1: received Vendor ID payload [Dead Peer Detection]
>>>> 004 "relate" #1: STATE_AGGR_I2: sent AI2, ISAKMP SA established
>>>> {auth=OAKLEY_PRESHARED_KEY cipher=aes_192 prf=oakley_sha 
>> group=modp1024}
>>>> 117 "relate" #2: STATE_QUICK_I1: initiate
>>>> 010 "relate" #2: STATE_QUICK_I1: retransmission; will wait 
>> 20s for response
>>>> 010 "relate" #2: STATE_QUICK_I1: retransmission; will wait 
>> 40s for response
>>> The other end does not like your proposal. You need to 
>> figure out what it is
>>> expecting from you.
>>>
>>> Paul
> 
-------------- next part --------------
A non-text attachment was scrubbed...
Name: smime.p7s
Type: application/x-pkcs7-signature
Size: 3315 bytes
Desc: S/MIME Cryptographic Signature
Url : http://lists.openswan.org/pipermail/users/attachments/20081120/e81563d5/attachment.bin 


More information about the Users mailing list