[Openswan Users] Problems with 2nd phase IPsec between Openswan and pfSense racoon

beheer at topdesk.com beheer at topdesk.com
Tue Feb 3 05:40:52 EST 2009


Hi,

I'm trying to set a VPN tunnel between a Debian GNU/Linux machine with Openswan 2.4.6 and a box with pfSense 1.2.2. I'm using X.509 certificates and my configuration is:

linux:
conn pfsense2linux
        left=192.168.251.3
        leftnexthop=192.168.1.1
        leftid="@pfsense.foo.bar"
        leftsubnet=10.5.0.0/22
        right=192.168.250.2
        rightid="C=NL, L=Spook, O=Foo, CN=linux.foo.bar"
        rightcert=linux.crt
        rightsubnet=10.0.0.0/22
        rightnexthop=192.168.250.1
        type=tunnel
        ## Automatic keying
        keyexchange=ike
        rekey=yes
        keylife=12h
        auth=esp
        keyingtries=3
        ## RSA authentication
        authby=rsasig
        leftrsasigkey=%cert
        rightrsasigkey=%cert
        leftca=%same
        rightca=%same
        auto=start

pfsense:
MyIdentifier: Domain = pfsense.foo.bar
Authentication method: RSA signature
Certificate: pasted PEM pfsense.crt
Private key: pasted PEM pfsense.key

There is a machine in the middle, with networks 192.168.250.0/24 and 192.168.251.0/24 , acting as a WAN emulator. No packets are lost. I get a ISAKMP SA established, but the pfsense box don't answer the 2nd phase request:

104 "pfsense2linux" #31: STATE_MAIN_I1: initiate
003 "pfsense2linux" #31: received Vendor ID payload [Dead Peer Detection]
106 "pfsense2linux" #31: STATE_MAIN_I2: sent MI2, expecting MR2
108 "pfsense2linux" #31: STATE_MAIN_I3: sent MI3, expecting MR3
004 "pfsense2linux" #31: STATE_MAIN_I4: ISAKMP SA established {auth=OAKLEY_RSA_SIG cipher=oakley_3des_cbc_192 prf=oakley_sha group=modp1024}
117 "pfsense2linux" #32: STATE_QUICK_I1: initiate
010 "pfsense2linux" #32: STATE_QUICK_I1: retransmission; will wait 20s for response
010 "pfsense2linux" #32: STATE_QUICK_I1: retransmission; will wait 40s for response
031 "pfsense2linux" #32: max number of retransmissions (2) reached STATE_QUICK_I1.  No acceptable response to our first Quick Mode message: perhaps peer likes no proposal
000 "pfsense2linux" #32: starting keying attempt 2 of at most 3, but releasing whack

On the pfSense machine logs I've found:

Feb 3 10:53:04 	racoon: ERROR: failed to pre-process packet.
Feb 3 10:53:04 	racoon: ERROR: failed to get sainfo.
Feb 3 10:53:04 	racoon: ERROR: failed to get sainfo.
Feb 3 10:53:04 	racoon: [NL Spook]: INFO: respond new phase 2 negotiation: 192.168.251.3[0]<=>192.168.250.2[0]
Feb 3 10:53:04 	racoon: [NL Spook]: INFO: ISAKMP-SA established 192.168.251.3[500]-192.168.250.2[500] spi:82d506c13c91ba76:d13128841f0c0f60
Feb 3 10:53:04 	racoon: WARNING: unable to get certificate CRL(3) at depth:1 SubjectName:/DC=bar/DC=foo/CN=rootca.foo.bar
Feb 3 10:53:04 	racoon: WARNING: unable to get certificate CRL(3) at depth:0 SubjectName:/C=NL/L=Spook/O=Foo/CN=linux.foo.bar
Feb 3 10:53:04 	racoon: WARNING: No ID match.
Feb 3 10:53:04 	racoon: INFO: received Vendor ID: draft-ietf-ipsec-nat-t-ike-00
Feb 3 10:53:04 	racoon: INFO: received Vendor ID: draft-ietf-ipsec-nat-t-ike-02
Feb 3 10:53:04 	racoon: INFO: received Vendor ID: draft-ietf-ipsec-nat-t-ike-02
Feb 3 10:53:04 	racoon: INFO: received Vendor ID: draft-ietf-ipsec-nat-t-ike-03
Feb 3 10:53:04 	racoon: INFO: received Vendor ID: RFC 3947
Feb 3 10:53:04 	racoon: INFO: received Vendor ID: DPD
Feb 3 10:53:04 	racoon: INFO: begin Identity Protection mode.
Feb 3 10:53:04 	racoon: [NL Spook]: INFO: respond new phase 1 negotiation: 192.168.251.3[500]<=>192.168.250.2[500]

I've searched in several forums, but I didn't found a solution. Pfsense machine doesn't send any packet in response. How can I get more detailed logs from racoon? Any ideas?

Thank you very much!

Best regards,

--
Xesc Arbona





More information about the Users mailing list