[Openswan Users] Don't ping to subnet.
André João Telöcken
andre at telocken.com.br
Sun Sep 21 21:09:38 EDT 2008
I configure a openswan VPN with Windows xp (SP 3) and had this situacion:
1) TOPOLOGY:
192.168.1.0/24 <--> Linux FC2 Kernel 2.6.8-1.521 with Openswan IPsec 2.6.16
<--> Internet <--> DSL Router (192.168.254.254/255.255.255.248) <-->
Windows XP SP3 ( 192.168.254.250/255.255.255.248)
2) Openswan ipsec.conf :
protostack=netkey
#Configuração http://www.natecarlson.com/linux/ipsec-x509.php#changelog
interfaces=%defaultroute
nat_traversal=yes
virtual_private=%v4:10.0.0.0/8,%v4:!192.168.0.0/16,%v4:!172.16.0.0/12
#klipsdebug=all
#plutoopts="--debug-all"
#plutodebug=controlmore
conn %default
keyingtries=1
compress=yes
disablearrivalcheck=no
authby=rsasig
leftrsasigkey=%cert
rightrsasigkey=%cert
#conn roadwarrior-all
# leftsubnet=0.0.0.0/0
# also=roadwarrior
conn roadwarrior
left=%defaultroute
leftcert=host.linuxcom.br.pem
right=%any
#rightsubnet=vhost:%no,%priv
rightsubnet=vhost:%priv,%no,%v4:192.168.0.0/16
auto=add
pfs=yes
conn roadwarrior-net
leftsubnet=192.168.1.0/24
also=roadwarrior
3) Windows XP IPSec : ipsec.conf:
conn roadwarrior
left=%any
right=200.xxx.xxx.xxx
rightca="C=BR, S=Santa Catarina, L=Chapeco, O=Transportes CoName Ltda,
OU=CoName, CN=srvName, E={email}"
network=auto
auto=start
pfs=yes
conn roadwarrior-net
left=%any
right=200.xxx.xxx.xxx
rightsubnet=192.168.1.0/24
rightca="C=BR, S=Santa Catarina, L=Chapeco, O=Transportes CoName Ltda,
OU=CoName, CN=srvName, E={email}"
network=auto
auto=start
pfs=yes
4) Messages on /var/log/secure on Linux:
Sep 21 20:39:11 srvName pluto[14022]: packet from 189.73.104.254:500:
ignoring Vendor ID payload [MS NT5 ISAKMPOAKLEY 00000004]
Sep 21 20:39:11 srvName pluto[14022]: packet from 189.73.104.254:500:
ignoring Vendor ID payload [FRAGMENTATION]
Sep 21 20:39:11 srvName pluto[14022]: packet from 189.73.104.254:500:
received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n] method set
to=106
Sep 21 20:39:11 srvName pluto[14022]: packet from 189.73.104.254:500:
ignoring Vendor ID payload [Vid-Initial-Contact]
Sep 21 20:39:11 srvName pluto[14022]: "roadwarrior"[1] 189.73.104.254 #1:
responding to Main Mode from unknown peer 189.73.104.254
Sep 21 20:39:11 srvName pluto[14022]: "roadwarrior"[1] 189.73.104.254 #1:
transition from state STATE_MAIN_R0 to state STATE_MAIN_R1
Sep 21 20:39:11 srvName pluto[14022]: "roadwarrior"[1] 189.73.104.254 #1:
STATE_MAIN_R1: sent MR1, expecting MI2
Sep 21 20:39:11 srvName pluto[14022]: "roadwarrior"[1] 189.73.104.254 #1:
NAT-Traversal: Result using draft-ietf-ipsec-nat-t-ike-02/03: peer is NATed
Sep 21 20:39:11 srvName pluto[14022]: "roadwarrior"[1] 189.73.104.254 #1:
transition from state STATE_MAIN_R1 to state STATE_MAIN_R2
Sep 21 20:39:11 srvName pluto[14022]: "roadwarrior"[1] 189.73.104.254 #1:
STATE_MAIN_R2: sent MR2, expecting MI3
Sep 21 20:39:11 srvName pluto[14022]: "roadwarrior"[1] 189.73.104.254 #1:
Main mode peer ID is ID_DER_ASN1_DN: 'C=BR, ST=Santa Catarina, L=Chapeco,
O=Transportes CoName Ltda, OU=cliName, CN=cliName, E={email}'
Sep 21 20:39:11 srvName pluto[14022]: "roadwarrior"[1] 189.73.104.254 #1:
switched from "roadwarrior" to "roadwarrior"
Sep 21 20:39:11 srvName pluto[14022]: "roadwarrior"[2] 189.73.104.254 #1:
deleting connection "roadwarrior" instance with peer 189.73.104.254
{isakmp=#0/ipsec=#0}
Sep 21 20:39:11 srvName pluto[14022]: "roadwarrior"[2] 189.73.104.254 #1: I
am sending my cert
Sep 21 20:39:11 srvName pluto[14022]: "roadwarrior"[2] 189.73.104.254 #1:
transition from state STATE_MAIN_R2 to state STATE_MAIN_R3
Sep 21 20:39:11 srvName pluto[14022]: "roadwarrior"[2] 189.73.104.254 #1:
new NAT mapping for #1, was 189.73.104.254:500, now 189.73.104.254:4500
Sep 21 20:39:11 srvName pluto[14022]: "roadwarrior"[2] 189.73.104.254 #1:
STATE_MAIN_R3: sent MR3, ISAKMP SA established {auth=OAKLEY_RSA_SIG
cipher=oakley_3des_cbc_192 prf=oakley_sha group=modp1024}
Sep 21 20:39:11 srvName pluto[14022]: "roadwarrior"[2] 189.73.104.254 #1:
the peer proposed: 200.xxx.xxx.xxx/32:0/0 -> 192.168.254.250/32:0/0
Sep 21 20:39:11 srvName pluto[14022]: "roadwarrior"[2] 189.73.104.254 #2:
responding to Quick Mode proposal {msgid:70515ab9}
Sep 21 20:39:11 srvName pluto[14022]: "roadwarrior"[2] 189.73.104.254 #2:
us: 200.xxx.xxx.xxx[C=BR, ST=Santa Catarina, L=Chapeco, O=Transportes CoName
Ltda, OU=CoName, CN=srvName, E={email},+S=C]
Sep 21 20:39:11 srvName pluto[14022]: "roadwarrior"[2] 189.73.104.254 #2:
them: 189.73.104.254[C=BR, ST=Santa Catarina, L=Chapeco, O=Transportes
CoName Ltda, OU=cliName, CN=cliName, E={email},+S=C]===192.168.254.250/32
Sep 21 20:39:12 srvName pluto[14022]: "roadwarrior"[2] 189.73.104.254 #2:
transition from state STATE_QUICK_R0 to state STATE_QUICK_R1
Sep 21 20:39:12 srvName pluto[14022]: "roadwarrior"[2] 189.73.104.254 #2:
STATE_QUICK_R1: sent QR1, inbound IPsec SA installed, expecting QI2
Sep 21 20:39:12 srvName pluto[14022]: "roadwarrior"[2] 189.73.104.254 #2:
byte 2 of ISAKMP Hash Payload must be zero, but is not
Sep 21 20:39:12 srvName pluto[14022]: "roadwarrior"[2] 189.73.104.254 #2:
malformed payload in packet
Sep 21 20:39:12 srvName pluto[14022]: | payload malformed after IV
Sep 21 20:39:12 srvName pluto[14022]: | 20 3a cd 09 23 5d 31 01
Sep 21 20:39:12 srvName pluto[14022]: "roadwarrior"[2] 189.73.104.254 #2:
sending notification PAYLOAD_MALFORMED to 189.73.104.254:4500
Sep 21 20:39:12 srvName pluto[14022]: "roadwarrior"[2] 189.73.104.254 #2:
transition from state STATE_QUICK_R1 to state STATE_QUICK_R2
Sep 21 20:39:12 srvName pluto[14022]: "roadwarrior"[2] 189.73.104.254 #2:
STATE_QUICK_R2: IPsec SA established tunnel mode {ESP=>0xfca13310
<0x2fe017a4 xfrm=3DES_0-HMAC_MD5 NATOA=none NATD=189.73.104.254:4500
DPD=none}
5) Ping to openswan server (200.xxx.xxx.xxx):
C:\Documentos\Desenvto\IPSec\IPSec>ping 200.xxx.xxx.xxx
Disparando contra 200.xxx.xxx.xxx com 32 bytes de dados:
Negociando segurança IP.
Negociando segurança IP.
Negociando segurança IP.
Negociando segurança IP.
Estatísticas do Ping para 200.xxx.xxx.xxx:
Pacotes: Enviados = 4, Recebidos = 0, Perdidos = 4 (100% de perda),
C:\Documentos\Desenvto\IPSec\IPSec>ping 200.xxx.xxx.xxx
Disparando contra 200.xxx.xxx.xxx com 32 bytes de dados:
Resposta de 200.xxx.xxx.xxx: bytes=32 tempo=60ms TTL=64
Resposta de 200.xxx.xxx.xxx: bytes=32 tempo=59ms TTL=64
Resposta de 200.xxx.xxx.xxx: bytes=32 tempo=62ms TTL=64
Resposta de 200.xxx.xxx.xxx: bytes=32 tempo=62ms TTL=64
Estatísticas do Ping para 200.xxx.xxx.xxx:
Pacotes: Enviados = 4, Recebidos = 4, Perdidos = 0 (0% de perda),
Aproximar um número redondo de vezes em milissegundos:
Mínimo = 59ms, Máximo = 62ms, Média = 60ms
C:\Documentos\Desenvto\IPSec\IPSec>
6) Ping to subnet on openswan Server (192.168.1.254):
C:\Documentos\Desenvto\IPSec\IPSec>ping 192.168.1.254
Disparando contra 192.168.1.254 com 32 bytes de dados:
Esgotado o tempo limite do pedido.
Esgotado o tempo limite do pedido.
Esgotado o tempo limite do pedido.
Esgotado o tempo limite do pedido.
Estatísticas do Ping para 192.168.1.254:
Pacotes: Enviados = 4, Recebidos = 0, Perdidos = 4 (100% de perda),
7) Whats happend?
Thank You!!
-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://lists.openswan.org/pipermail/users/attachments/20080921/3bac2f39/attachment-0001.html
More information about the Users
mailing list