[Openswan Users] Problem with ShrewSoft VPN Client in DHCP over IPSec Configuration

Martin Krellmann martin2002 at web.de
Mon Jun 15 11:11:19 EDT 2009


Hi.

 

When I try to establish a connection with the ShrewSoft Client it fails.

DHCP over IPSec, no NAT on both sides: "roadwarrior-dhcp"[1] 89.246.161.100
#3: NAT-Traversal: Result using RFC 3947 (NAT-Traversal): no NAT detected

 

Openswan succeeds the IKE Phase:

"roadwarrior-dhcp"[2] 89.246.161.100 #4: STATE_MAIN_R3: sent MR3, ISAKMP SA
established {auth=OAKLEY_RSA_SIG cipher=aes_256 prf=oakley_md5
group=modp3072}

 

But cannot match the connection description afterwards: 

 

Jun 15 16:07:37 gateway pluto[23447]: | peer client is 89.246.161.100

Jun 15 16:07:37 gateway pluto[23447]: | peer client protocol/port is 17/68

Jun 15 16:07:37 gateway pluto[23447]: | our client is 91.67.231.19

Jun 15 16:07:37 gateway pluto[23447]: | our client protocol/port is 17/67

Jun 15 16:07:37 gateway pluto[23447]: "roadwarrior-dhcp"[2] 89.246.161.100
#4: the peer proposed: xxx.xxx.xxx.xxx/32:17/67 -> 89.246.161.100/32:17/68

Jun 15 16:07:37 gateway pluto[23447]: "roadwarrior-dhcp"[2] 89.246.161.100
#4: cannot respond to IPsec SA request because no connection is known for
xxx.xxx.xxx.xxx[C=DE, ST=Brandenburg, L=Potsdam, O=Krellmann, OU=Servers,
CN=vpngate,
E=root at vpngate.potsdam.krellmann.net,+S=C]:17/67...89.246.161.100[C=DE,
O=krellmann, OU=roadwarrior, CN=potsdam.krellmann.net,
E=martin at krellmann.net,+S=C]:17/68

Jun 15 16:07:37 gateway pluto[23447]: | complete state transition with
(null)

Jun 15 16:07:37 gateway pluto[23447]: "roadwarrior-dhcp"[2] 89.246.161.100
#4: sending encrypted notification INVALID_ID_INFORMATION to
89.246.161.100:500

 

The ShrewSoft Client does not notice the above response and resumes with
sending DHCP Discover packages.

Any idea why this happens?

 

The configuration:

Ipsec.conf:

 

config setup

       klipsdebug=none

       nat_traversal=yes

       nhelpers=5

       plutodebug=control,crypt,klips

       protostack=klips

       uniqueids=yes

 
virtual_private=%v4:10.0.1.0/24,%v4:10.0.2.0/24,%v4:!192.168.10.0/24,%v4:!19
2.168.178.0/24

 

conn %default

       type=tunnel

       authby=rsasig

       pfs=no

       rekey=no

       keylife=1h

       ikelifetime=3h

       keyingtries=3

       left=%defaultroute

       leftrsasigkey=%cert

       rightca=%same

       rightrsasigkey=%cert

 

conn roadwarrior-dhcp

       keylife=60s

       rekeymargin=30s

       rekey=no

       leftcert=g1.krellmann.net.pem

       leftprotoport=udp/bootps

       #this allows DHCP discovery broadcast:

       leftsubnet=0.0.0.0/0

       right=%any

       rightcert=roadwarrior.potsdam.krellmann.net.pem

       rightprotoport=udp/bootpc

       auto=add

 

conn roadwarrior

       leftcert=g1.krellmann.net.pem

       leftsubnet=192.168.10.0/24

       right=%any   

       rightcert=roadwarrior.potsdam.krellmann.net.pem

       rightsubnet=vnet:%v4:10.0.1.0/24

       auto=add

 

The client configuration is mostly "auto". Auth mode ist "mutual-rsa",
Certificates are set up (same as on server side + private key for the
client)

 

Greets,

Martin.

-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://lists.openswan.org/pipermail/users/attachments/20090615/a385463a/attachment-0001.html 


More information about the Users mailing list