[Openswan Users] saref patch

Giovani Moda giovani at mrinformatica.com.br
Fri Nov 27 07:12:15 EST 2009


> I've applied it to FC7 kernel 2.6.23.17 and was finally
> able to get mast up, so it's going on the right way. 

Sorry for the inconvenience Paul, but after analyzing the results a
little further, I have a couple of doubts.

How does the mastX interface behaves? Do I have to set a interface for
it to bind to, as I did to ipsecX? I'm asking because I noticed that it
stays up even with openswan stopped, and it's IP is the one from my
internal interface. I tried setting 'interfaces="mast0=eth0"' but it
didn't make a difference.

Also, is openswan's native crypto required for saref? I was testing with
cryptoapi, and I don't get a kernel panic, but I have this error
instead, both with protostack=klips and protostack=mast:

Nov 27 10:03:11 inet pluto[4075]: packet from 192.168.1.5:500: ignoring
Vendor ID payload [MS NT5 ISAKMPOAKLEY 00000006]
Nov 27 10:03:11 inet pluto[4075]: packet from 192.168.1.5:500: received
Vendor ID payload [RFC 3947] method set to=109
Nov 27 10:03:11 inet pluto[4075]: packet from 192.168.1.5:500: received
Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n] meth=106, but
already using method 109
Nov 27 10:03:11 inet pluto[4075]: packet from 192.168.1.5:500: ignoring
Vendor ID payload [FRAGMENTATION]
Nov 27 10:03:11 inet pluto[4075]: packet from 192.168.1.5:500: ignoring
Vendor ID payload [MS-Negotiation Discovery Capable]
Nov 27 10:03:11 inet pluto[4075]: packet from 192.168.1.5:500: ignoring
Vendor ID payload [Vid-Initial-Contact]
Nov 27 10:03:11 inet pluto[4075]: packet from 192.168.1.5:500: ignoring
Vendor ID payload [IKE CGA version 1]
Nov 27 10:03:11 inet pluto[4075]: "MR-MR"[1] 192.168.1.5 #1: responding
to Main Mode from unknown peer 192.168.1.5
Nov 27 10:03:11 inet pluto[4075]: "MR-MR"[1] 192.168.1.5 #1:
OAKLEY_GROUP 20 not supported.  Attribute OAKLEY_GROUP_DESCRIPTION
Nov 27 10:03:11 inet pluto[4075]: "MR-MR"[1] 192.168.1.5 #1:
OAKLEY_GROUP 19 not supported.  Attribute OAKLEY_GROUP_DESCRIPTION
Nov 27 10:03:11 inet pluto[4075]: "MR-MR"[1] 192.168.1.5 #1: transition
from state STATE_MAIN_R0 to state STATE_MAIN_R1
Nov 27 10:03:11 inet pluto[4075]: "MR-MR"[1] 192.168.1.5 #1:
STATE_MAIN_R1: sent MR1, expecting MI2
Nov 27 10:03:11 inet pluto[4075]: "MR-MR"[1] 192.168.1.5 #1:
NAT-Traversal: Result using RFC 3947 (NAT-Traversal): peer is NATed
Nov 27 10:03:11 inet pluto[4075]: "MR-MR"[1] 192.168.1.5 #1: transition
from state STATE_MAIN_R1 to state STATE_MAIN_R2
Nov 27 10:03:11 inet pluto[4075]: "MR-MR"[1] 192.168.1.5 #1:
STATE_MAIN_R2: sent MR2, expecting MI3
Nov 27 10:03:11 inet pluto[4075]: "MR-MR"[1] 192.168.1.5 #1: Main mode
peer ID is ID_DER_ASN1_DN: 'C=BR, ST=Sao Paulo, L=Piracicaba, O=Teste
MR, CN=mr.testmr.com.br'
Nov 27 10:03:11 inet pluto[4075]: "MR-MR"[1] 192.168.1.5 #1: I am
sending my cert
Nov 27 10:03:11 inet pluto[4075]: "MR-MR"[1] 192.168.1.5 #1: transition
from state STATE_MAIN_R2 to state STATE_MAIN_R3
Nov 27 10:03:11 inet pluto[4075]: "MR-MR"[1] 192.168.1.5 #1: new NAT
mapping for #1, was 192.168.1.5:500, now 192.168.1.5:4500
Nov 27 10:03:11 inet pluto[4075]: "MR-MR"[1] 192.168.1.5 #1:
STATE_MAIN_R3: sent MR3, ISAKMP SA established {auth=OAKLEY_RSA_SIG
cipher=oakley_3des_cbc_192 prf=oakley_sha group=modp2048}
Nov 27 10:03:11 inet pluto[4075]: "MR-MR"[1] 192.168.1.5 #1: the peer
proposed: 192.168.1.37/32:17/1701 -> 192.168.2.10/32:17/0
Nov 27 10:03:11 inet pluto[4075]: "MR-MR"[1] 192.168.1.5 #1:
NAT-Traversal: received 2 NAT-OA. using first, ignoring others
Nov 27 10:03:11 inet pluto[4075]: "MR-MR"[1] 192.168.1.5 #2: responding
to Quick Mode proposal {msgid:01000000}
Nov 27 10:03:11 inet pluto[4075]: "MR-MR"[1] 192.168.1.5 #2:     us:
192.168.1.37<192.168.1.37>[+S=C]:17/1701
Nov 27 10:03:11 inet pluto[4075]: "MR-MR"[1] 192.168.1.5 #2:   them:
192.168.1.5[C=BR, ST=Sao Paulo, L=Piracicaba, O=Teste MR,
CN=mr.testmr.com.br,+S=C]:17/1701===192.168.2.10/32
Nov 27 10:03:11 inet pluto[4075]: | NAT-OA: 32 tunnel: 0
Nov 27 10:03:11 inet pluto[4075]: ERROR: "MR-MR"[1] 192.168.1.5 #2:
pfkey write() of K_SADB_ADD message 5 for Add SA
esp.5a5b2b82 at 192.168.1.5 failed. Errno 71: Protocol error
Nov 27 10:03:11 inet pluto[4075]: |   02 03 00 03  18 00 00 00  05 00 00
00  eb 0f 00 00
Nov 27 10:03:11 inet pluto[4075]: |   03 00 01 00  5a 5b 2b 82  40 01 03
0c  00 00 00 00
Nov 27 10:03:11 inet pluto[4075]: |   00 00 00 00  00 00 00 00  03 00 05
00  00 00 00 00
Nov 27 10:03:11 inet pluto[4075]: |   02 00 06 a5  c0 a8 01 25  00 00 00
00  00 00 00 00
Nov 27 10:03:11 inet pluto[4075]: |   03 00 06 00  00 00 00 00  02 00 06
a5  c0 a8 01 05
Nov 27 10:03:11 inet pluto[4075]: |   00 00 00 00  00 00 00 00  04 00 08
00  a0 00 00 00
Nov 27 10:03:11 inet pluto[4075]: |   19 3d da b5  34 a3 03 fe  e2 21 94
b2  b5 03 d2 e5
Nov 27 10:03:11 inet pluto[4075]: |   37 40 ef bd  00 00 00 00  03 00 09
00  80 00 00 00
Nov 27 10:03:11 inet pluto[4075]: |   2e 75 a1 ed  f5 7c 99 75  36 f2 77
0f  71 21 66 a9
Nov 27 10:03:11 inet pluto[4075]: |   01 00 1b 00  02 00 00 00  01 00 1c
00  94 11 00 00
Nov 27 10:03:11 inet pluto[4075]: |   01 00 1d 00  94 11 00 00  03 00 1e
00  00 00 00 00
Nov 27 10:03:11 inet pluto[4075]: |   02 00 00 00  c0 a8 02 0a  00 00 00
00  00 00 00 00
Nov 27 10:03:11 inet pluto[4075]: | failed to install outgoing SA: 0
Nov 27 10:03:13 inet pluto[4075]: "MR-MR"[1] 192.168.1.5 #2: discarding
duplicate packet; already STATE_QUICK_R0

I'll try with the "regular" klips patch to see if I can reproduce this
behavior. 

Giovani
 

__________ Information from ESET NOD32 Antivirus, version of virus
signature database 4641 (20091127) __________

The message was checked by ESET NOD32 Antivirus.

http://www.eset.com
 


More information about the Users mailing list