[Openswan Users] psk IPSec vpn

Jon James jonj at claimtools.ca
Fri Mar 27 14:16:09 EDT 2009


I have numerous Openswan IPSec tunnels all leading to a Fortigate
vpn/firewall/router.

All of the Openswan boxes are using the exact same ipsec.conf files except
for the leftsourceip

The tunnels always come up initially when brought up with auto=start or by
using whack.

The problem lies in the rekeying I have taken two machines for examples one
rekeys successfully while the other does not.

I have set the key lives to be very short for testing purposes.

The Fortigate is dictating the keylifes. It is set to phase1=160s and
phase2=120s

 

This is the ipsec.conf file

 

config setup

        nat_traversal=yes

        protostack=netkey

conn home

#CLIENT

 leftsourceip=1.80.0.19

 left=%defaultroute

#REMOTEHOST

 right=xxx.xxx.xxx.xxx

 rightsubnet=192.168.80.0/24

#GENERAL

 keyexchange=ike

 auth=esp

 auto=start

 authby=secret

 pfs=yes

 compress=no

 

 

One of the two test boxes works great and rekeys properly all the time, the
other is the problem

 

Here is the log of bringing up the tunnel by hand on the problematic box

 

002 "home" #40: initiating Quick Mode PSK+ENCRYPT+TUNNEL+PFS+UP+IKEv2ALLOW
{using isakmp#36 msgid:efcd033c proposal=defaults
pfsgroup=OAKLEY_GROUP_MODP1536}

117 "home" #40: STATE_QUICK_I1: initiate

002 "home" #42: initiating Main Mode

104 "home" #42: STATE_MAIN_I1: initiate

003 "home" #42: received Vendor ID payload [RFC 3947] method set to=109 

003 "home" #42: received Vendor ID payload [Dead Peer Detection]

002 "home" #42: enabling possible NAT-traversal with method 4

002 "home" #42: transition from state STATE_MAIN_I1 to state STATE_MAIN_I2

106 "home" #42: STATE_MAIN_I2: sent MI2, expecting MR2

003 "home" #42: NAT-Traversal: Result using RFC 3947 (NAT-Traversal): i am
NATed

002 "home" #42: transition from state STATE_MAIN_I2 to state STATE_MAIN_I3

108 "home" #42: STATE_MAIN_I3: sent MI3, expecting MR3

002 "home" #42: Main mode peer ID is ID_IPV4_ADDR: 'xxx.xxx.xxx.xxx'

002 "home" #42: transition from state STATE_MAIN_I3 to state STATE_MAIN_I4

004 "home" #42: STATE_MAIN_I4: ISAKMP SA established
{auth=OAKLEY_PRESHARED_KEY cipher=oakley_3des_cbc_192 prf=oakley_sha
group=modp1536}

002 "home" #43: initiating Quick Mode PSK+ENCRYPT+TUNNEL+PFS+UP+IKEv2ALLOW
{using isakmp#42 msgid:9d6ffe19 proposal=defaults
pfsgroup=OAKLEY_GROUP_MODP1536}

117 "home" #43: STATE_QUICK_I1: initiate

003 "home" #43: ignoring informational payload, type
IPSEC_RESPONDER_LIFETIME msgid=9d6ffe19

002 "home" #43: transition from state STATE_QUICK_I1 to state STATE_QUICK_I2

004 "home" #43: STATE_QUICK_I2: sent QI2, IPsec SA established tunnel mode
{ESP=>0x4db44103 <0xd1e49108 xfrm=AES_128-HMAC_MD5 NATOA=none NATD=none
DPD=none}

 

 

 

Here is the rekeying

 

Mar 27 11:44:55 claimtools pluto[2726]: "home" #44: IPsec SA expired
(LATEST!)

Mar 27 11:44:34 claimtools pluto[2726]: "home" #45: max number of
retransmissions (2) reached STATE_MAIN_R

Mar 27 11:43:24 claimtools pluto[2726]: "home" #45: STATE_MAIN_R2: sent MR2,
expecting MI3

Mar 27 11:43:24 claimtools pluto[2726]: "home" #45: transition from state
STATE_MAIN_R1 to state STATE_MAIN_R2

Mar 27 11:43:24 claimtools pluto[2726]: "home" #45: NAT-Traversal: Result
using RFC 3947 (NAT-Traversal): both are NATed

Mar 27 11:43:24 claimtools pluto[2726]: "home" #45: STATE_MAIN_R1: sent MR1,
expecting MI2

Mar 27 11:43:24 claimtools pluto[2726]: "home" #45: transition from state
STATE_MAIN_R0 to state STATE_MAIN_R1

Mar 27 11:43:24 claimtools pluto[2726]: "home" #45: responding to Main Mode

Mar 27 11:43:24 claimtools pluto[2726]: packet from 70.67.129.119:4500:
received Vendor ID payload [Dead Peer Detection]

Mar 27 11:43:24 claimtools pluto[2726]: packet from 70.67.129.119:4500:
received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-00]

Mar 27 11:43:24 claimtools pluto[2726]: packet from 70.67.129.119:4500:
ignoring unknown Vendor ID payload [16f6ca16e4a4066d83821a0f0aeaa862]

Mar 27 11:43:24 claimtools pluto[2726]: packet from 70.67.129.119:4500:
received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n] meth=106, but
already us

ing method 109

Mar 27 11:43:24 claimtools pluto[2726]: packet from 70.67.129.119:4500:
received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02] meth=107, but
already usin

g method 109

Mar 27 11:43:24 claimtools pluto[2726]: packet from 70.67.129.119:4500:
received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03] meth=108, but
already usin

g method 109

Mar 27 11:43:24 claimtools pluto[2726]: packet from xxx.xxx.xxx.xxx:4500:
ignoring unknown Vendor ID payload [9909b64eed937c6573de52ace952fa6b]

Mar 27 11:43:24 claimtools pluto[2726]: packet from xxx.xxx.xxx.xxx:4500:
ignoring unknown Vendor ID payload [80d0bb3def54565ee84645d4c85ce3ee]

Mar 27 11:43:24 claimtools pluto[2726]: packet from xxx.xxx.xxx.xxx:4500:
ignoring unknown Vendor ID payload [4d1e0e136deafa34c4f3ea9f02ec7285]

Mar 27 11:43:24 claimtools pluto[2726]: packet from xxx.xxx.xxx.xxx:4500:
ignoring unknown Vendor ID payload [439b59f8ba676c4c7737ae22eab8f582]

Mar 27 11:43:24 claimtools pluto[2726]: packet from xxx.xxx.xxx.xxx:4500:
ignoring unknown Vendor ID payload [8f8d83826d246b6fc7a8a6a428c11de8]

Mar 27 11:43:24 claimtools pluto[2726]: packet from xxx.xxx.xxx.xxx:4500:
received Vendor ID payload [RFC 3947] method set to=109 

Mar 27 11:43:04 claimtools pluto[2726]: "home" #42: received and ignored
informational message

Mar 27 11:43:04 claimtools pluto[2726]: "home" #42: received Delete
SA(0x4db44103) payload: deleting IPSEC State #43

Mar 27 11:42:55 claimtools pluto[2726]: "home" #44: STATE_QUICK_R2: IPsec SA
established tunnel mode {ESP=>0x4db44113 <0x12243d77 xfrm=3DES_0-HMAC_SHA1
NATOA

=none NATD=none DPD=none}

Mar 27 11:42:55 claimtools pluto[2726]: "home" #44: transition from state
STATE_QUICK_R1 to state STATE_QUICK_R2

Mar 27 11:42:55 claimtools pluto[2726]: "home" #44: STATE_QUICK_R1: sent
QR1, inbound IPsec SA installed, expecting QI2

Mar 27 11:42:55 claimtools pluto[2726]: "home" #44: transition from state
STATE_QUICK_R0 to state STATE_QUICK_R1

Mar 27 11:42:55 claimtools pluto[2726]: "home" #44: keeping
refhim=4294901761 during rekey

Mar 27 11:42:55 claimtools pluto[2726]: "home" #44:   them:
xxx.xxx.xxx.xxx<xxx.xxx.xxx.xxx>[+S=C]===192.168.80.0/24

Mar 27 11:42:55 claimtools pluto[2726]: "home" #44:     us:
1.80.0.19/32===192.168.27.16[+S=C]

Mar 27 11:42:55 claimtools pluto[2726]: "home" #44: responding to Quick Mode
proposal {msgid:e8e6b6dd}

Mar 27 11:42:55 claimtools pluto[2726]: "home" #42: the peer proposed:
1.80.0.19/32:0/0 -> 192.168.80.0/24:0/0

 

 

I am willing to provide any additional information to help solve this
problem

Thank you for your time

 

Jon James

ClaimTools Solutions

(250)713-8185

1-888-989-8388

 

-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://lists.openswan.org/pipermail/users/attachments/20090327/1ef02c9a/attachment-0001.html 


More information about the Users mailing list