[Openswan Users] cannot respond to IPsec SA request because no connection is known for

Michael Sund sundlunchbox at gmail.com
Wed Sep 24 09:31:58 EDT 2008


Hello!

Ive been trying to set up a vpn server to connect my ipod touch with.
Im new to the linux vpn scene and please correct me if im totally wrong 
at any point.
The following setup is my small home network.

        Ipod with vpn > Internet < Dsl-modem > Opensuse 11.0 Gateway 
(with openswan) < Nated  Workstation
Ip's   85.224.X.X                                             eth0 
85.224.Y.Y        eth1 13.37.0.1/24       eth0 13.37.0.2/24

The goal is to be able to send all my traffic to my home gateway and be 
able to access the 13.37.0.0 network.
Ive read lots of threads and mailinglists about this and as far as ive 
understood i need a virtual network to assign the 85.224.X.X host to, 
like 192.168.10.1 or something similar, this is one of the things that 
im not very sure of how to  implement in the config.
The addresses and nets in general being assigned to left and right stuff 
is confusing , but left being local addresses and right beoing my 
gateway's ip towards the isp should be correct?

Ive gotten to the point where the connection is established and the 
passphrase accepted, but the routes seem to be messed up.

pluto[13910]: "L2TP-PSK-NAT"[1] 85.224.X.X #1: responding to Main Mode 
from unknown peer 85.224.X.X
pluto[13910]: "L2TP-PSK-NAT"[1] 85.224.X.X #1: transition from state 
STATE_MAIN_R0 to state STATE_MAIN_R1
pluto[13910]: "L2TP-PSK-NAT"[1] 85.224.X.X #1: STATE_MAIN_R1: sent MR1, 
expecting MI2
pluto[13910]: "L2TP-PSK-NAT"[1] 85.224.X.X #1: transition from state 
STATE_MAIN_R1 to state STATE_MAIN_R2
pluto[13910]: "L2TP-PSK-NAT"[1] 85.224.X.X #1: STATE_MAIN_R2: sent MR2, 
expecting MI3
pluto[13910]: "L2TP-PSK-NAT"[1] 85.224.X.X #1: Main mode peer ID is 
ID_IPV4_ADDR: '85.224.X.X'
pluto[13910]: "L2TP-PSK-NAT"[1] 85.224.X.X #1: request to delete a 
unrouted policy with netkey kernel --- experimental
pluto[13910]: "L2TP-PSK-NAT"[1] 85.224.X.X #1: transition from state 
STATE_MAIN_R2 to state STATE_MAIN_R3
pluto[13910]: "L2TP-PSK-NAT"[1] 85.224.X.X #1: STATE_MAIN_R3: sent MR3, 
ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY 
cipher=oakley_3des_cbc_192 prf=oakley_sha group=modp1024}
pluto[13910]: "L2TP-PSK-NAT"[1] 85.224.X.X #1: ignoring informational 
payload, type IPSEC_INITIAL_CONTACT msgid=00000000
pluto[13910]: "L2TP-PSK-NAT"[1] 85.224.X.X #1: received and ignored 
informational message
pluto[13910]: "L2TP-PSK-NAT"[1] 85.224.X.X #1: the peer proposed: 
85.224.Y.Y/32:17/1701 -> 85.224.X.X/32:17/0
pluto[13910]: "L2TP-PSK-NAT"[1] 85.224.X.X #1: cannot respond to IPsec 
SA request because no connection is known for 
85.224.Y.Y[+S=C]:17/1701...85.224.X.X[+S=C]:17/49236
pluto[13910]: "L2TP-PSK-NAT"[1] 85.224.X.X #1: sending encrypted 
notification INVALID_ID_INFORMATION to 85.224.X.X:500

Trying to translate the output, i would guess that the incoming 
connection is being accepted but the packets cant be routed longer than 
to my interface towards the isp, being 85.224.Y.Y, might be totally 
wrong but thats how ive translated it.

my current config listed below is a sampleconfig from 
/etc/ipsec.d/examples/l2tp-psk with some changes.

config setup
    protostack=netkey
    uniqueids=yes

conn L2TP-PSK-NAT
    rightsubnet=vhost:%priv
    also=L2TP-PSK-noNAT

conn L2TP-PSK-noNAT
    #
    # Configuration for one user with any type of IPsec/L2TP client
    # including the updated Windows 2000/XP (MS KB Q818043), but
    # excluding the non-updated Windows 2000/XP.
    #
    #
    # Use a Preshared Key. Disable Perfect Forward Secrecy.
    #
    # PreSharedSecret needs to be specified in /etc/ipsec.secrets as
    # YourIPAddress     %any: "sharedsecret"
    authby=secret
    pfs=no
    auto=add
    keyingtries=3
    # we cannot rekey for %any, let client rekey
    rekey=no
    # Set ikelifetime and keylife to same defaults windows has
    ikelifetime=8h
    keylife=1h
    # l2tp-over-ipsec is transport mode
    type=transport
    #
    left=%defaultroute
    #
    # For updated Windows 2000/XP clients,
    # to support old clients as well, use leftprotoport=17/%any
    leftprotoport=17/1701
    #
    # The remote user.
    #
    right=%any
    # Using the magic port of "0" means "any one single port". This is
    # a work around required for Apple OSX clients that use a randomly
    # high port, but propose "0" instead of their port.
    rightprotoport=17/0

# Normally, KLIPS drops all plaintext traffic from IP's it has a crypted
# connection with. With L2TP clients behind NAT, that's not really what
# you want. The connection below allows both l2tp/ipsec and plaintext
# connections from behind the same NAT router.
# The l2tpd use a leftprotoport, so they are more specific and will be used
# first. Then, packets for the host on different ports and protocols (eg 
ssh)
# will match this passthrough conn.
conn passthrough-for-non-l2tp
        type=passthrough
        left=85.224.Y.Y
        leftnexthop=%defaultroute
        right=0.0.0.0
        rightsubnet=0.0.0.0/0
        auto=route

conn ipod
     authby=secret
        pfs=no
        auto=add
        keyingtries=3
        rekey=no
        ikelifetime=8h
        keylife=1h
        type=transport
    rightsubnet=192.168.10.1/255.255.255.255

conn ipod-net
    leftsubnet=13.37.0.0/255.255.255.0
    rightsubnet=192.168.10.1/255.255.255.255

All tips and help is very appriciated!
Cheers!


More information about the Users mailing list