[Openswan Users] Net to Net VPN almost configured - but no tunnel established
Jorge Quirós
jorge.quiros at wanadoo.es
Fri Sep 26 04:59:04 EDT 2008
Hi Everyone,
Im experiencing problems to connect to networks using openswan on two
DEBIAN Servers both with two network interfaces, iptables firewall and NAT
rules.
VPN connection starts but Ive got the following message on Firewall B:
packet from 212.170.202.XXX:500: initial Main Mode message received on
192.168.3.2:500 but no connection has been authorized
Please, any suggestion?
Thanks in advance.
Jorge Quiros
Networks topology:
SUBNET A
192.168.0.0/24
|
FIREWALL A (NAT ENABLED)
192.168.0.5(eth3)|192.168.1.2(eth4)
|
ADSL ROUTER A (STATIC PUBLIC IP)
192.168.1.1 (212.170.202.XXX)
|
|
|
INTERNET
|
|
|
ADSL ROUTER B (STATIC PUBLIC IP)
192.168.3.1 (88.2.182.XXX)
|
FIREWALL B (NAT ENABLED)
192.168.3.2(eth0)|192.168.1.3(eth1)
|
SUBNET B
192.168.1.0/24
/etc/ipsec.conf:
# basic configuration
config setup
forwardcontrol=no
nat_traversal=yes
nhelpers=0
plutodebug=none
klipsdebug=all
syslog=auth.debug
# Add connections here
# sample VPN connections, see /etc/ipsec.d/examples/
#Disable Opportunistic Encryption
include /etc/ipsec.d/examples/no_oe.conf
conn A-B
left=192.168.2.2
leftsubnet=192.168.0.0/24
leftid=@a.conA-B.es
leftrsasigkey=0sAQOaU3oaT1wSGWCzD0yfmYE0QI1toL/baZfy1RGiIdnceM
.
leftnexthop=212.170.202.XXX
right=88.2.182.XXX
rightsubnet=192.168.1.0/24
rightid=@b.conA-B.es
rightrsasigkey=0sAQPBm59puhrn6MUGY3ZbNX8ovBWK4uNuwRyrTHIdk
rightnexthop=192.168.3.2
auto=add
Firewall A:
# Generated by iptables-save v1.3.6 on Fri May 9 19:24:55 2008
*nat
:PREROUTING ACCEPT [0:0]
:OUTPUT ACCEPT [0:0]
:POSTROUTING ACCEPT [0:0]
# Escritorio Remoto
-A PREROUTING -p tcp -m tcp -s YYY.YYY.YYY.YYY-i eth4 --dport 3389 -j DNAT
--to-destination 192.168.0.2
-A POSTROUTING -s 192.168.0.0/24 ! -d 192.168.1.0/24 -o eth3 -j MASQUERADE
-A POSTROUTING -s 192.168.0.0/24 ! -d 192.168.1.0/24 -o eth4 -j MASQUERADE
COMMIT
# Completed on Fri May 9 19:24:55 2008
# Generated by iptables-save v1.3.6 on Fri May 9 19:24:55 2008
*mangle
:PREROUTING ACCEPT [25:1951]
:INPUT ACCEPT [24:1911]
:FORWARD ACCEPT [0:0]
:OUTPUT ACCEPT [21:6351]
:POSTROUTING ACCEPT [21:6351]
COMMIT
# Completed on Fri May 9 19:24:55 2008
# Generated by iptables-save v1.3.6 on Fri May 9 19:24:55 2008
*filter
:FORWARD ACCEPT [0:0]
:INPUT DROP [0:0]
:OUTPUT ACCEPT [0:0]
:LOG_ACCEPT - [0:0]
-A INPUT -p icmp -j ACCEPT
-A INPUT -s 127.0.0.1/8 -j ACCEPT
-A INPUT -s 88.2.182.XXX -j ACCEPT
-A INPUT -s 192.168.0.0/24 -j ACCEPT
-A INPUT -s 192.168.1.0/24 -j ACCEPT
-A INPUT -s 192.168.3.0/24 -j ACCEPT
-A INPUT -p tcp -m tcp -i eth4 --dport 80 -j ACCEPT
-A INPUT -p esp -j ACCEPT
-A INPUT -p ah -j ACCEPT
-A INPUT -p udp -m udp -m multiport --ports 500 -j ACCEPT
-A INPUT -p udp -m udp -m multiport --ports 4500 -j ACCEPT
-A INPUT -m state --state ESTABLISHED,RELATED -j ACCEPT
-A LOG_ACCEPT -j LOG --log-prefix "LOG_ACCEPT " --log-level 4
--log-ip-options --log-tcp-options --log-tcp-sequence
-A LOG_ACCEPT -j ACCEPT
-A OUTPUT ! -p icmp -j ACCEPT
-A OUTPUT -p esp -j LOG_ACCEPT
-A OUTPUT -p ah -j LOG_ACCEPT
-A OUTPUT -p udp -m udp --sport 500 -j LOG_ACCEPT
-A OUTPUT -p udp -m udp --sport 4500 -j LOG_ACCEPT
COMMIT
# Completed on Fri May 9 19:24:55 2008
Firewall B:
# Generated by iptables-save v1.3.6 on Tue Aug 26 15:57:57 2008
*nat
:PREROUTING ACCEPT [0:0]
:OUTPUT ACCEPT [0:0]
:POSTROUTING ACCEPT [0:0]
-A POSTROUTING -s 192.168.1.0/24 ! -d 192.168.0.0/24 -o eth0 -j MASQUERADE
-A POSTROUTING -s 192.168.1.0/24 ! -d 192.168.0.0/24 -o eth1 -j MASQUERADE
COMMIT
# Completed on Tue Aug 26 15:57:57 2008
# Generated by iptables-save v1.3.6 on Tue Aug 26 15:57:57 2008
*mangle
:PREROUTING ACCEPT [11:1820]
:INPUT ACCEPT [11:1820]
:FORWARD ACCEPT [0:0]
:OUTPUT ACCEPT [10:3637]
:POSTROUTING ACCEPT [10:3637]
COMMIT
# Completed on Tue Aug 26 15:57:57 2008
# Generated by iptables-save v1.3.6 on Tue Aug 26 15:57:57 2008
*filter
:FORWARD ACCEPT [0:0]
:INPUT DROP [0:0]
:OUTPUT ACCEPT [0:0]
:LOG_ACCEPT - [0:0]
-A INPUT -p icmp -j ACCEPT
-A INPUT -s 127.0.0.1/18 -j ACCEPT
-A INPUT -s 212.170.202.150 -j LOG_ACCEPT
-A INPUT -s 192.168.2.0/24 -j LOG_ACCEPT
-A INPUT -s 192.168.0.0/24 -j LOG_ACCEPT
-A INPUT -p udp -m udp -m multiport -s 212.170.202.XXX --ports 500 -j ACCEPT
-A INPUT -p tcp -m tcp -i eth0 --dport 80 -j ACCEPT
-A INPUT -p esp -j ACCEPT
-A OUTPUT -p esp -j ACCEPT
-A OUTPUT -p ah -j ACCEPT
-A LOG_ACCEPT -j LOG --log-prefix "LOG_ACCEPT " --log-level 4
--log-ip-options --log-tcp-options --log-tcp-sequence
-A LOG_ACCEPT -j ACCEPT
-A INPUT -p ah -j ACCEPT
-A INPUT -p udp -m udp --dport 4500 -j LOG_ACCEPT
-A INPUT -m state --state ESTABLISHED,RELATED -j ACCEPT
COMMIT
# Completed on Tue Aug 26 15:57:57 2008
As auth.log:
Sep 26 10:14:52 bastion ipsec_setup: KLIPS ipsec0 on eth4
192.168.2.2/255.255.255.0 broadcast 192.168.2.255
Sep 26 10:14:52 bastion ipsec__plutorun: Starting Pluto subsystem...
Sep 26 10:14:52 bastion pluto[4554]: Starting Pluto (Openswan Version 2.4.6
X.509-1.5.4 LDAP_V3 PLUTO_SENDS_VENDORID PLUTO_USES_KEYRR; Vendor ID
OElLO]RdWNRD)
Sep 26 10:14:52 bastion pluto[4554]: Setting NAT-Traversal port-4500
floating to on
Sep 26 10:14:52 bastion pluto[4554]: port floating activation criteria
nat_t=1/port_fload=1
Sep 26 10:14:52 bastion pluto[4554]: including NAT-Traversal patch
(Version 0.6c)
Sep 26 10:14:52 bastion pluto[4554]: WARNING: Open of /dev/hw_random failed
in init_rnd_pool(), trying alternate sources of random
Sep 26 10:14:52 bastion pluto[4554]: WARNING: Using /dev/urandom as the
source of random
Sep 26 10:14:52 bastion pluto[4554]: ike_alg_register_enc(): Activating
OAKLEY_AES_CBC: Ok (ret=0)
Sep 26 10:14:52 bastion pluto[4554]: no helpers will be started, all
cryptographic operations will be done inline
Sep 26 10:14:52 bastion pluto[4554]: Using Linux 2.6 IPsec interface code on
2.6.18-6-686
Sep 26 10:14:52 bastion pluto[4554]: Changing to directory
'/etc/ipsec.d/cacerts'
Sep 26 10:14:52 bastion pluto[4554]: Changing to directory
'/etc/ipsec.d/aacerts'
Sep 26 10:14:52 bastion pluto[4554]: Changing to directory
'/etc/ipsec.d/ocspcerts'
Sep 26 10:14:52 bastion pluto[4554]: Changing to directory
'/etc/ipsec.d/crls'
Sep 26 10:14:52 bastion pluto[4554]: Warning: empty directory
Sep 26 10:14:52 bastion ipsec_setup: ...Openswan IPsec started
Sep 26 10:14:52 bastion ipsec_setup: Starting Openswan IPsec 2.4.6...
Sep 26 10:14:52 bastion ipsec_setup: insmod
/lib/modules/2.6.18-6-686/kernel/net/key/af_key.ko
Sep 26 10:14:52 bastion ipsec_setup: insmod
/lib/modules/2.6.18-6-686/kernel/net/ipv4/xfrm4_tunnel.ko
Sep 26 10:14:52 bastion ipsec_setup: insmod
/lib/modules/2.6.18-6-686/kernel/net/xfrm/xfrm_user.ko
Sep 26 10:14:52 bastion pluto[4554]: added connection description "A-B"
Sep 26 10:14:52 bastion pluto[4554]: listening for IKE messages
Sep 26 10:14:52 bastion pluto[4554]: adding interface eth3/eth3
192.168.0.5:500
Sep 26 10:14:52 bastion pluto[4554]: adding interface eth3/eth3
192.168.0.5:4500
Sep 26 10:14:52 bastion pluto[4554]: adding interface eth4/eth4
192.168.2.2:500
Sep 26 10:14:52 bastion pluto[4554]: adding interface eth4/eth4
192.168.2.2:4500
Sep 26 10:14:52 bastion pluto[4554]: adding interface lo/lo 127.0.0.1:500
Sep 26 10:14:52 bastion pluto[4554]: adding interface lo/lo 127.0.0.1:4500
Sep 26 10:14:52 bastion pluto[4554]: adding interface lo/lo ::1:500
Sep 26 10:14:52 bastion pluto[4554]: loading secrets from
"/etc/ipsec.secrets"
Bs auth.log:
Sep 26 10:14:04 bastion2 ipsec_setup: KLIPS ipsec0 on eth0
192.168.3.2/255.255.255.0 broadcast 192.168.3.255
Sep 26 10:14:04 bastion2 ipsec__plutorun: Starting Pluto subsystem...
Sep 26 10:14:04 bastion2 pluto[23887]: Starting Pluto (Openswan Version
2.4.6 X.509-1.5.4 LDAP_V3 PLUTO_SENDS_VENDORID PLUTO_USES_KEYRR; Vendor ID
OElLO]RdWNRD)
Sep 26 10:14:05 bastion2 pluto[23887]: Setting NAT-Traversal port-4500
floating to on
Sep 26 10:14:05 bastion2 pluto[23887]: port floating activation criteria
nat_t=1/port_fload=1
Sep 26 10:14:05 bastion2 pluto[23887]: including NAT-Traversal patch
(Version 0.6c)
Sep 26 10:14:05 bastion2 pluto[23887]: WARNING: Open of /dev/hw_random
failed in init_rnd_pool(), trying alternate sources of random
Sep 26 10:14:05 bastion2 pluto[23887]: WARNING: Using /dev/urandom as the
source of random
Sep 26 10:14:05 bastion2 pluto[23887]: ike_alg_register_enc(): Activating
OAKLEY_AES_CBC: Ok (ret=0)
Sep 26 10:14:05 bastion2 pluto[23887]: no helpers will be started, all
cryptographic operations will be done inline
Sep 26 10:14:05 bastion2 pluto[23887]: Using Linux 2.6 IPsec interface code
on 2.6.18-6-686
Sep 26 10:14:05 bastion2 ipsec_setup: ...Openswan IPsec started
Sep 26 10:14:05 bastion2 ipsec_setup: Starting Openswan IPsec 2.4.6...
Sep 26 10:14:05 bastion2 ipsec_setup: insmod
/lib/modules/2.6.18-6-686/kernel/net/key/af_key.ko
Sep 26 10:14:05 bastion2 ipsec_setup: insmod
/lib/modules/2.6.18-6-686/kernel/net/ipv4/xfrm4_tunnel.ko
Sep 26 10:14:05 bastion2 ipsec_setup: insmod
/lib/modules/2.6.18-6-686/kernel/net/xfrm/xfrm_user.ko
Sep 26 10:14:05 bastion2 pluto[23887]: Changing to directory
'/etc/ipsec.d/cacerts'
Sep 26 10:14:05 bastion2 pluto[23887]: Changing to directory
'/etc/ipsec.d/aacerts'
Sep 26 10:14:05 bastion2 pluto[23887]: Changing to directory
'/etc/ipsec.d/ocspcerts'
Sep 26 10:14:05 bastion2 pluto[23887]: Changing to directory
'/etc/ipsec.d/crls'
Sep 26 10:14:05 bastion2 pluto[23887]: Warning: empty directory
Sep 26 10:14:05 bastion2 pluto[23887]: added connection description "A-B"
Sep 26 10:14:05 bastion2 pluto[23887]: listening for IKE messages
Sep 26 10:14:05 bastion2 pluto[23887]: adding interface eth0/eth0
192.168.3.2:500
Sep 26 10:14:05 bastion2 pluto[23887]: adding interface eth0/eth0
192.168.3.2:4500
Sep 26 10:14:05 bastion2 pluto[23887]: adding interface eth1/eth1
192.168.1.3:500
Sep 26 10:14:05 bastion2 pluto[23887]: adding interface eth1/eth1
192.168.1.3:4500
Sep 26 10:14:05 bastion2 pluto[23887]: adding interface lo/lo 127.0.0.1:500
Sep 26 10:14:05 bastion2 pluto[23887]: adding interface lo/lo 127.0.0.1:4500
Sep 26 10:14:05 bastion2 pluto[23887]: adding interface lo/lo ::1:500
Sep 26 10:14:05 bastion2 pluto[23887]: loading secrets from
"/etc/ipsec.secrets"
Sep 26 10:15:17 bastion2 pluto[23887]: packet from 212.170.202.XXX:500:
received Vendor ID payload [Openswan (this version) 2.4.6 X.509-1.5.4
LDAP_V3 PLUTO_SENDS_VENDORID PLUTO_USES_KEYRR]
Sep 26 10:15:17 bastion2 pluto[23887]: packet from 212.170.202.XXX:500:
received Vendor ID payload [Dead Peer Detection]
Sep 26 10:15:17 bastion2 pluto[23887]: packet from 212.170.202.XXX:500:
received Vendor ID payload [RFC 3947] method set to=110
Sep 26 10:15:17 bastion2 pluto[23887]: packet from 212.170.202.XXX:500:
received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03] meth=108, but
already using method 110
Sep 26 10:15:17 bastion2 pluto[23887]: packet from 212.170.202.XXX:500:
received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02] meth=107, but
already using method 110
Sep 26 10:15:17 bastion2 pluto[23887]: packet from 212.170.202.XXX:500:
received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n] meth=106, but
already using method 110
Sep 26 10:15:17 bastion2 pluto[23887]: packet from 212.170.202.XXX:500:
received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-00]
Sep 26 10:15:17 bastion2 pluto[23887]: packet from 212.170.202.XXX:500:
initial Main Mode message received on 192.168.3.2:500 but no connection has
been authorized
Thats all
-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://lists.openswan.org/pipermail/users/attachments/20080926/11d72393/attachment-0001.html
More information about the Users
mailing list