[Openswan Users] Ipsec Server Configuration

Walter Hansen whansen at corporate-image.com
Fri Oct 30 19:31:14 EDT 2009


Once again we seem to be having troubles getting a secure tunnel going
between a Linux server and a Cisco 3000 router.
New Server: Fedora Core 8 Openswan 2.4.9-2.fc8
Old Server (working now): Fedora 2  Linux Openswan U2.2.0/K2.6.8-1.521smp
(native)
The server is giving me this:

# ipsec auto --verbose --up prod-sms
002 "prod-sms" #110: initiating Main Mode
104 "prod-sms" #110: STATE_MAIN_I1: initiate
003 "prod-sms" #110: ignoring Vendor ID payload [FRAGMENTATION c0000000]
002 "prod-sms" #110: transition from state STATE_MAIN_I1 to state
STATE_MAIN_I2
106 "prod-sms" #110: STATE_MAIN_I2: sent MI2, expecting MR2
003 "prod-sms" #110: received Vendor ID payload [Cisco-Unity]
003 "prod-sms" #110: received Vendor ID payload [XAUTH]
003 "prod-sms" #110: ignoring unknown Vendor ID payload
[c42ac15544515788520e18f30d368014]
003 "prod-sms" #110: ignoring Vendor ID payload [Cisco VPN 3000 Series]
002 "prod-sms" #110: I did not send a certificate because I do not have one.
002 "prod-sms" #110: transition from state STATE_MAIN_I2 to state
STATE_MAIN_I3
108 "prod-sms" #110: STATE_MAIN_I3: sent MI3, expecting MR3
003 "prod-sms" #110: received Vendor ID payload [Dead Peer Detection]
002 "prod-sms" #110: Main mode peer ID is ID_IPV4_ADDR: '216.160.25.121'
002 "prod-sms" #110: transition from state STATE_MAIN_I3 to state
STATE_MAIN_I4
004 "prod-sms" #110: STATE_MAIN_I4: ISAKMP SA established
{auth=OAKLEY_PRESHARED_KEY cipher=oakley_3des_cbc_192 prf=oakley_md5
group=modp1024}
002 "prod-sms" #111: initiating Quick Mode PSK+ENCRYPT+TUNNEL+UP {using
isakmp#110}
117 "prod-sms" #111: STATE_QUICK_I1: initiate
010 "prod-sms" #111: STATE_QUICK_I1: retransmission; will wait 20s for
response
010 "prod-sms" #111: STATE_QUICK_I1: retransmission; will wait 40s for
response
031 "prod-sms" #111: max number of retransmissions (2) reached
STATE_QUICK_I1.  No acceptable response to our first Quick Mode message:
perhaps peer likes no proposal
000 "prod-sms" #111: starting keying attempt 2 of an unlimited number, but
releasing whack


I copied the configuration over form our server at the same server farm and
changed the left side values. However it's a much later version of
Fedora(core 8) and I installed the current version of openswan (2.4.9-2.fc8)
using yum.

I got this info from the other end of the tunnel:

Yes we will drop connections that do not match the security associations as
we see in our logs. Not sure which SA but please review your
configs/encryption properties and make sure they match the document I sent
you. You said you copied configs from one server to another; I usually build
each tunnel individually, could this be the problem?

15302 10/27/2009 23:06:00.190 SEV=8 IKEDBG/96 RPT=10363 208.109.86.109
Received encrypted packet with no matching SA, dropping

I also see only IKE sessions hitting my firewall...I need to see ESP
packets...you need to send us interesting traffic to bring up the tunnel.
Other than live real time log monitor and traces not much I can do. Let me
know if you'd like to look at this tomorrow and we can arrange a time for a
call


 Here is the current ipsec.conf:

# cat ipsec.conf
# /etc/ipsec.conf - Openswan IPsec configuration file
# RCSID $Id: ipsec.conf.in,v 1.13 2004/03/24 04:14:39 ken Exp $

# This file:  /usr/local/share/doc/openswan/ipsec.conf-sample
#
# Manual:     ipsec.conf.5


version 2.0     # conforms to second version of ipsec.conf specification

# basic configuration
config setup
        # Debug-logging controls:  "none" for (almost) none, "all" for lots.
        # klipsdebug=none
        # plutodebug="control parsing"

# Add connections here


conn prod-sms
        left=208.109.86.109
        leftsubnet=208.109.86.0/24
        leftnexthop=208.109.86.254
        right=216.160.25.121
        rightid=216.160.25.121
        rightsubnet=206.220.212.0/24
        pfs=no
        xauth=no
        type=tunnel
        keyexchange=ike
        ike=3des-md5-modp1024
        authby=secret
        auto=start

conn test-sms-213
        left=208.109.86.109
        leftsubnet=208.109.86.0/24
        leftnexthop=208.109.86.254
        right=67.96.131.33
        rightid=67.96.131.33
        rightsubnet=206.220.213.0/24
        pfs=no
        xauth=no
        type=tunnel
        keyexchange=ike
        ike=3des-md5-modp1024
        authby=secret
        auto=start

conn test-sms-214
        left=208.109.86.109
        leftsubnet=208.109.86.0/24
        leftnexthop=208.109.86.254
        right=67.96.131.33
        rightid=67.96.131.33
        rightsubnet=206.220.214.0/24
        pfs=no
        xauth=no
        type=tunnel
        keyexchange=ike
        ike=3des-md5-modp1024
        authby=secret
        auto=start



#conn test
#       left=216.69.164.214
#       leftnexthop=%defaultroute
#       leftsubnet=216.69.164.214/32
#       right=64.142.21.254
#       rightsubnet=192.168.167.0/24
#       rightnexthop=%defaultroute
#       ike=3des-md5-modp1024
#        pfs=no
#       type=tunnel
#       dpddelay=30
#       dpdtimeout=120
#       dpdaction=clear
#       authby=secret
#       auto=start


#Disable Opportunistic Encryption
include /etc/ipsec.d/examples/no_oe.conf






More information about the Users mailing list