[Openswan Users] xauth
Jon James
jonj at claimtools.ca
Tue Jun 23 17:00:17 EDT 2009
Could anyone tell me if automated rekeying with Xauth actually works?
I initiate the tunnel by hand using whack and all goes well.
The ike (phase2) rekeying works however when it comes time to rekey the
phase1 with xauth the tunnel fails
I have also attached a full ipsec barf
Thank you
Jon
Openswan Ipsec.conf
config setup
nat_traversal=yes
conn home
leftxauthclient=yes
leftxauthusername=test
rightxauthserver=yes
left=%defaultroute
leftsourceip=x.x.x.x
right=x.x.x.x
rightsubnet=192.168.80.0/24
keyexchange=ike
auth=esp
authby=secret
esp=3des
compress=no
pfs=yes
auto=add
rekey=yes
Openswan ipsec.secrets
: PSK "xxxxxxx"
@test : XAUTH "test"
Fortigate Config phase1
Mode=main
P1 proposal= 3des-sha1
DH group=5
Keylife=300seconds(shortlife for testing purposes)
NAT transversal=enabled
DPD=enabled
Fortigate Config phase2
Encryption=3des-sha1
Pfs=yes
DH group=5
Keylife=120seconds(short life for testing purposes)
Auto keep alive=enabled
Log on Openswan end during phase1 rekey
Jun 23 13:32:36 claimtools pluto[15665]: packet from x.x.x.x:4500: received
and ignored informational message
Jun 23 13:32:36 claimtools pluto[15665]: "home" #1: received Delete SA
payload: deleting ISAKMP State #1
Jun 23 13:32:30 claimtools pluto[15665]: "home" #8: sending notification
NO_PROPOSAL_CHOSEN to x.x.x.x:4500
Jun 23 13:32:30 claimtools pluto[15665]: "home" #8: no acceptable Oakley
Transform
Jun 23 13:32:30 claimtools pluto[15665]: "home" #8: policy mandates Extended
Authentication (XAUTH) with PSK of responder (we are responder). Attribute
OAKL
EY_AUTHENTICATION_METHOD
Jun 23 13:32:30 claimtools pluto[15665]: "home" #8: responding to Main Mode
Jun 23 13:32:30 claimtools pluto[15665]: packet from x.x.x.x:4500: received
Vendor ID payload [Dead Peer Detection]
Jun 23 13:32:30 claimtools pluto[15665]: packet from x.x.x.x:4500: received
Vendor ID payload [draft-ietf-ipsec-nat-t-ike-00]
Jun 23 13:32:30 claimtools pluto[15665]: packet from x.x.x.x:4500: ignoring
unknown Vendor ID payload [16f6ca16e4a4066d83821a0f0aeaa862]
Jun 23 13:32:30 claimtools pluto[15665]: packet from x.x.x.x:4500: received
Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n] meth=106, but already u
sing method 109
Jun 23 13:32:30 claimtools pluto[15665]: packet from x.x.x.x:4500: received
Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02] meth=107, but already usi
ng method 109
Jun 23 13:32:30 claimtools pluto[15665]: packet from x.x.x.x:4500: received
Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03] meth=108, but already usi
ng method 109
Jun 23 13:32:30 claimtools pluto[15665]: packet from x.x.x.x:4500: ignoring
unknown Vendor ID payload [9909b64eed937c6573de52ace952fa6b]
Jun 23 13:32:30 claimtools pluto[15665]: packet from x.x.x.x:4500: ignoring
unknown Vendor ID payload [80d0bb3def54565ee84645d4c85ce3ee]
Jun 23 13:32:30 claimtools pluto[15665]: packet from x.x.x.x:4500: ignoring
unknown Vendor ID payload [4d1e0e136deafa34c4f3ea9f02ec7285]
Jun 23 13:32:30 claimtools pluto[15665]: packet from x.x.x.x:4500: ignoring
unknown Vendor ID payload [439b59f8ba676c4c7737ae22eab8f582]
Jun 23 13:32:30 claimtools pluto[15665]: packet from x.x.x.x:4500: ignoring
unknown Vendor ID payload [8f8d83826d246b6fc7a8a6a428c11de8]
Jun 23 13:32:30 claimtools pluto[15665]: packet from x.x.x.x:4500: received
Vendor ID payload [RFC 3947] method set to=109
Jun 23 13:32:22 claimtools pluto[15665]: "home" #7: sending notification
NO_PROPOSAL_CHOSEN to x.x.x.x:4500
Jun 23 13:32:22 claimtools pluto[15665]: "home" #7: no acceptable Oakley
Transform
Jun 23 13:32:22 claimtools pluto[15665]: "home" #7: policy mandates Extended
Authentication (XAUTH) with PSK of responder (we are responder). Attribute
OAKL
EY_AUTHENTICATION_METHOD
Jun 23 13:32:22 claimtools pluto[15665]: "home" #7: responding to Main Mode
Jun 23 13:32:22 claimtools pluto[15665]: packet from x.x.x.x:4500: received
Vendor ID payload [Dead Peer Detection]
Jun 23 13:32:22 claimtools pluto[15665]: packet from x.x.x.x:4500: received
Vendor ID payload [draft-ietf-ipsec-nat-t-ike-00]
Jun 23 13:32:22 claimtools pluto[15665]: packet from x.x.x.x:4500: ignoring
unknown Vendor ID payload [16f6ca16e4a4066d83821a0f0aeaa862]
Jun 23 13:32:22 claimtools pluto[15665]: packet from x.x.x.x:4500: received
Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n] meth=106, but already u
sing method 109
Jun 23 13:32:22 claimtools pluto[15665]: packet from x.x.x.x:4500: received
Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02] meth=107, but already usi
ng method 109
Jun 23 13:32:22 claimtools pluto[15665]: packet from x.x.x.x:4500: received
Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03] meth=108, but already usi
ng method 109
Jun 23 13:32:22 claimtools pluto[15665]: packet from x.x.x.x:4500: ignoring
unknown Vendor ID payload [9909b64eed937c6573de52ace952fa6b]
Jun 23 13:32:22 claimtools pluto[15665]: packet from x.x.x.x:4500: ignoring
unknown Vendor ID payload [80d0bb3def54565ee84645d4c85ce3ee]
Jun 23 13:32:22 claimtools pluto[15665]: packet from x.x.x.x:4500: ignoring
unknown Vendor ID payload [4d1e0e136deafa34c4f3ea9f02ec7285]
Jun 23 13:32:22 claimtools pluto[15665]: packet from x.x.x.x:4500: ignoring
unknown Vendor ID payload [439b59f8ba676c4c7737ae22eab8f582]
Jun 23 13:32:22 claimtools pluto[15665]: packet from x.x.x.x:4500: ignoring
unknown Vendor ID payload [8f8d83826d246b6fc7a8a6a428c11de8]
Jun 23 13:32:22 claimtools pluto[15665]: packet from x.x.x.x:4500: received
Vendor ID payload [RFC 3947] method set to=109
Jun 23 13:32:18 claimtools pluto[15665]: "home" #6: sending notification
NO_PROPOSAL_CHOSEN to x.x.x.x:4500
Jun 23 13:32:18 claimtools pluto[15665]: "home" #6: no acceptable Oakley
Transform
Jun 23 13:32:18 claimtools pluto[15665]: "home" #6: policy mandates Extended
Authentication (XAUTH) with PSK of responder (we are responder). Attribute
OAKL
EY_AUTHENTICATION_METHOD
Jun 23 13:32:18 claimtools pluto[15665]: "home" #6: responding to Main Mode
Jun 23 13:32:18 claimtools pluto[15665]: packet from x.x.x.x:4500: received
Vendor ID payload [Dead Peer Detection]
Jun 23 13:32:18 claimtools pluto[15665]: packet from x.x.x.x:4500: received
Vendor ID payload [draft-ietf-ipsec-nat-t-ike-00]
Jun 23 13:32:18 claimtools pluto[15665]: packet from x.x.x.x:4500: ignoring
unknown Vendor ID payload [16f6ca16e4a4066d83821a0f0aeaa862]
Jun 23 13:32:18 claimtools pluto[15665]: packet from x.x.x.x:4500: received
Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n] meth=106, but already u
sing method 109
-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://lists.openswan.org/pipermail/users/attachments/20090623/b378f0a7/attachment-0001.html
-------------- next part --------------
A non-text attachment was scrubbed...
Name: barf
Type: application/octet-stream
Size: 70073 bytes
Desc: not available
Url : http://lists.openswan.org/pipermail/users/attachments/20090623/b378f0a7/attachment-0001.obj
More information about the Users
mailing list