[Openswan Users] Error using PSK

ubi_maior at infinito.it ubi_maior at infinito.it
Mon Nov 16 17:43:44 EST 2009


Hi all,
I would like to create a tunnel between these two sites:

Site A:
DrayTek router
WAN IP: A.B.C.D dynamic registrered by dyndns as mysite1.dydns.org
LAN Network IP: 10.9.10.0/24

Site B:
Linux box
WAN IP: a.b.c.d static registered as mysite2.mydomain.org

Site A should open the tunnel
Site B hosts openswan

========================================================

cat /etc/ipsec.conf 
# /etc/ipsec.conf - Openswan IPsec configuration file
#
# Manual:     ipsec.conf.5
#
# Please place your own config files in /etc/ipsec.d/ ending in .conf

version 2.0     # conforms to second version of ipsec.conf specification

# basic configuration
config setup
        # Debug-logging controls:  "none" for (almost) none, "all" for lots.
        #klipsdebug=none
        #plutodebug="control parsing"
        # For Red Hat Enterprise Linux and Fedora, leave protostack=netkey
        protostack=netkey
        nat_traversal=yes
        virtual_private=%v4:10.9.10.0/24
        oe=off
        # Enable this if you see "failed to find any available worker"
        nhelpers=0
        interfaces="%defaultroute"
        uniqueids=yes

#You may put your configuration (.conf) file in the "/etc/ipsec.d/" and
uncomment this.
#include /etc/ipsec.d/*.conf

================================================================

cat /etc/ipsec.d/ToHome.conf 
conn ToHome
        left=66.249.23.229
        leftid=@green.soylent.info
        right=%any
        rightid=@mauog.dyndns.org
        rightsubnet=10.9.10.0/24
        authby=secret
        auto=add
=================================================================

cat /etc/ipsec.d/ipsec.secrets 
a.b.c.d %any: PSK "myPSKkey"
=================================================================

Looking at /var/log/secure i got this error:

Nov 16 21:58:59 green pluto[11263]: packet from A.B.C:D:500: received Vendor
ID payload [Dead Peer Detection]
Nov 16 21:58:59 green pluto[11263]: packet from A.B.C:D:500: received Vendor
ID payload [RFC 3947] method set to=109 
Nov 16 21:58:59 green pluto[11263]: packet from A.B.C:D:500: received Vendor
ID payload [draft-ietf-ipsec-nat-t-ike-03] meth=108, but already using
method 109
Nov 16 21:58:59 green pluto[11263]: packet from A.B.C:D:500: received Vendor
ID payload [draft-ietf-ipsec-nat-t-ike-02_n] meth=106, but already using
method 109
Nov 16 21:58:59 green pluto[11263]: packet from A.B.C:D:500: received Vendor
ID payload [draft-ietf-ipsec-nat-t-ike-02] meth=107, but already using
method 109
Nov 16 21:58:59 green pluto[11263]: packet from A.B.C:D:500: received Vendor
ID payload [draft-ietf-ipsec-nat-t-ike-00]
Nov 16 21:58:59 green pluto[11263]: packet from A.B.C:D:500: initial Main
Mode message received on a.b.c.d:500 but no connection has been authorized
with policy=PSK

***Could you help me to solve it?

I've also notice that pluto starting up listen to all network interfaces:

Nov 16 20:47:56 green pluto[6298]: listening for IKE messages
Nov 16 20:47:56 green pluto[6298]: adding interface eth0/eth0 a.b.c.d:500
Nov 16 20:47:56 green pluto[6298]: adding interface eth0/eth0 a.b.c.d:4500
Nov 16 20:47:56 green pluto[6298]: adding interface lo/lo 127.0.0.1:500
Nov 16 20:47:56 green pluto[6298]: adding interface lo/lo 127.0.0.1:4500
Nov 16 20:47:56 green pluto[6298]: adding interface lo/lo ::1:500

***Would it possible tell Pluto to forget lopback interface?


Thank You

Regards

Mauro




More information about the Users mailing list