[Openswan Users] VPN client IP addressing configuration issues

Rolando J. Zappacosta zappacor at yahoo.com.ar
Fri Sep 5 14:13:15 EDT 2008


Hi all,



    I sniffed again what a Windows client does when connecting to the SGW I 
want to connect to by means of OSW:

No. Time Source Destination Protocol Info

7 17.177861 192.168.1.236 AAA.SGW.SGW.SGW ISAKMP Aggressive

8 17.269798 AAA.SGW.SGW.SGW 192.168.1.236 ISAKMP Aggressive

9 17.273487 192.168.1.236 AAA.SGW.SGW.SGW ISAKMP Aggressive

10 17.368693 AAA.SGW.SGW.SGW 192.168.1.236 ISAKMP Informational

11 17.368956 192.168.1.236 AAA.SGW.SGW.SGW ISAKMP Informational

13 20.669004 AAA.SGW.SGW.SGW 192.168.1.236 ISAKMP Informational

15 20.682181 192.168.1.236 AAA.SGW.SGW.SGW ISAKMP Quick Mode

16 20.873717 AAA.SGW.SGW.SGW 192.168.1.236 ISAKMP Quick Mode

17 20.874288 192.168.1.236 AAA.SGW.SGW.SGW ISAKMP Quick Mode

18 20.975815 AAA.SGW.SGW.SGW 192.168.1.236 ISAKMP Informational

21 21.535865 Intel_b1:d7:95 Broadcast ARP Gratuitous ARP for AAA.PC.PC.PC 
(Request)

28 22.420799 Intel_b1:d7:95 Broadcast ARP Gratuitous ARP for AAA.PC.PC.PC 
(Request)

31 23.420795 Intel_b1:d7:95 Broadcast ARP Gratuitous ARP for AAA.PC.PC.PC 
(Request)

37 27.431043 Intel_b1:d7:95 Broadcast ARP Who has AAA.SRV.SRV.SRV? Tell 
192.168.1.236

38 27.431083 Comtrend_f6:b7:3d Intel_b1:d7:95 ARP AAA.SRV.SRV.SRV is at 
00:30:da:f6:b7:3d

39 27.431095 AAA.PC.PC.PC AAA.SRV.SRV.SRV ICMP Echo (ping) request

42 27.939265 AAA.SRV.SRV.SRV AAA.PC.PC.PC ICMP Echo (ping) reply

43 28.436479 AAA.PC.PC.PC AAA.SRV.SRV.SRV ICMP Echo (ping) request

44 28.860815 AAA.SRV.SRV.SRV AAA.PC.PC.PC ICMP Echo (ping) reply

Note I send a ping from my PC (AAA.PC.PC.PC) to a server on the Intranet I 
connect to (AAA.SRV.SRV.SRV).

And as per the Windows client log, it's:

09/05/08 19:28:58 IKE/IKE Started Enable Secure Access to TEP: 
MyIntranetConnection (AAA.SGW.SGW.SGW) for user <MyUser>

19:28:59 IKE/IKE Source IP Address, Port for IKE : 192.168.1.236, 1659

19:28:59 IKE/IKE Contacted VPN gateway (AAA.SGW.SGW.SGW)

19:29:02 IKE/IKE User Authentication Successful.

19:29:02 IKE/IKE Tunnel Parameters received from gateway are:

Encryption : TRIPLE DES Authentication : SHA1

Tunnel transport method: UDP-Encapsulated on Port 501

Authentication Timeout: 1440 Minutes

Heartbeat Interval: 60 Seconds

Internal IP for local presence :AAA.PC.PC.PC

Pri. DNS :<DNS 1 IP addr> Sec. DNS :<DNS 2 IP addr>

Pri. WINS :<WINS 1 IP addr> Sec. WINS :<WINS 2 IP addr>

HostList: *

Tunnel administrator does not allow you to save password

Orig Pri. WINS :0.0.0.0 Orig Sec. WINS :0.0.0.0

Firewall Policy: Block All Clear Text Traffic

09/05/08 19:29:03 IKE/IKE IPSec SA SPIs: Inbound: 0x 91bd, Outbound: 0x 
2fd7e2ff

09/05/08 19:29:03 IKE/IKE Successfully established VPN Tunnel to TEP 
AAA.SGW.SGW.SGW for User zappacos



Does it give any hint on what can I be missing on OSW config below?



----- Original Message ----- 
From: "Paul Wouters" <paul at xelerance.com>
To: "Rolando Zappacosta" <zappacor at yahoo.com.ar>
Cc: <users at openswan.org>
Sent: Thursday, September 04, 2008 3:56 PM
Subject: Re: [Openswan Users] VPN client IP addressing configuration issues


> On Thu, 4 Sep 2008, Rolando Zappacosta wrote:
>
>> LAPTOP <-> DSL ROUTER OR 3G USB DEVICE <=> INTERNET CLOUD <=> IPSEC VPN 
>> SERVER <-> INTRANET
>
>>  In a first stage I'd like to have all the laptop's outgoing traffic sent 
>> out through the IPSec tunnel but once it's up I can see the ICMP packets 
>> destinated to an IP address within the intranet sent unencapsulated (not 
>> through the tunnel).
>
> since you use NETKEY, you cannot see the encrypted traffic with tcpdump on 
> the client.
>
>> How can I debug this or trace the packets flows?
>
> That's not needed at this point, but there is one debug option in 
> ipsec.cond (plutodebug)
>
>> How can I handle the fact that the DSL router and the USB stick public IP 
>> addresses are different and change (each time I connect for the later)?
>
> left=%defaultroute will pick the IP from your dynamic assignment.
>
> To tunnel all traffic (if the remote allows that), then you should
> configure rightsubnet=0.0.0.0/0
>
>> conn Intranet
>>        ike=3des-sha1-modp1024
>>        esp=3des-sha1
>>        aggrmode=yes
>>        xauth=yes
>>        keyexchange=ike
>>        keylife=24h
>>        ikelifetime=24h
>>        auth=esp
>>        type=tunnel
>>        authby=secret
>>        # *********** This is for the PC (local):
>>        left=<The 3G stick public IP address it gets each time>
>>        leftxauthclient=yes
>>        leftid="!@#$%"
>>        # *********** This is for the GW (remote):
>>        right=<The IPsec server public IP address>
>>        rightxauthserver=yes
>>        rightmodecfgserver=yes
>>        pfs=no
>>        #compress=no
>>        auto=add
>
> I'll assume this is not openswan, since xauth is being used?
>
> Paul 




More information about the Users mailing list