[Openswan Users] Still server crash

Dennis van der Meer dennisvandermeer at greenchem-adblue.com
Tue Apr 6 06:20:04 EDT 2010


I don't know if the error is because I have not applied the NAT-T patch
but if it is then there is
another problem since the patch cannot be applied to the kernel version
I am currently using (2.6.33).
Hopefully someone knows what is going on because I tried to google this
error and came up with nothing
relevant.

-----Original Message-----
From: users-bounces at openswan.org [mailto:users-bounces at openswan.org] On
Behalf Of Dennis van der Meer
Sent: maandag 5 april 2010 14:19
To: Paul Wouters
Cc: users at openswan.org
Subject: Re: [Openswan Users] Still server crash

Hi Paul,

The configuration will only be used on my VMWare test system. For
production I will use different
keys. I have made a little bit more progress but still it is not
working. Right now I also have
a L2TP server running (xl2tpd) so when I have ipsec running correctly I
could get started on the
next part.
Since I am now working from a different location the ip information
changed a little.
The server itself still has 10.0.15.1 as its internal address. The
external ip address has become
192.168.95.140. I have an XP client that connects from 192.168.95.104. 
I had to comment the last line in the config file otherwise I will get
the same error like I did
in my previous email. Here is my new config:

# /etc/ipsec.conf - Openswan IPsec configuration file
# RCSID $Id: ipsec.conf.in,v 1.16 2005/07/26 12:29:45 ken Exp $

# This file:  /usr/local/share/doc/openswan/ipsec.conf-sample
#
# Manual:     ipsec.conf.5

version	2.0	# conforms to second version of ipsec.conf specification

# basic configuration
config setup
	uniqueids=yes
	nat_traversal=no
	
virtual_private=%v4:10.0.0.0/16,%v4:172.16.0.0/12,%v4:192.168.0.0/16,%v4
:!192.168.2.0/24,%v4:!10.0.2.0/24,%v4:!10.0.7.0/24,%v4:!192.168.100.0/24
	protostack=klips
	plutodebug="none"
	klipsdebug="none"
conn %default
	keyingtries=0
	disablearrivalcheck=no
	authby=secret
	dpddelay=60
	dpdtimeout=120
	dpdaction=clear
conn RoadWarrior
	authby=secret
	pfs=no
	rekey=no
	keyingtries=3
	left=%defaultroute
	leftprotoport=17/1701
	right=%any
	rightprotoport=17/%any
	auto=add
	type=tunnel
#	keyexchange=ike

This is the output from /var/log/secure:

Apr  5 13:56:47 telemetry ipsec__plutorun: Starting Pluto subsystem...
Apr  5 13:56:47 telemetry pluto[2147]: Starting Pluto (Openswan Version
2.6.25; Vendor ID OEC`nT{wo^XH) pid:2147
Apr  5 13:56:47 telemetry pluto[2147]: Setting NAT-Traversal port-4500
floating to off
Apr  5 13:56:47 telemetry pluto[2147]:    port floating activation
criteria nat_t=0/port_float=1
Apr  5 13:56:47 telemetry pluto[2147]:    NAT-Traversal support
[disabled]
Apr  5 13:56:47 telemetry pluto[2147]: using /dev/urandom as source of
random entropy
Apr  5 13:56:47 telemetry pluto[2147]: ike_alg_register_enc():
Activating OAKLEY_TWOFISH_CBC_SSH: Ok (ret=0)
Apr  5 13:56:47 telemetry pluto[2147]: ike_alg_register_enc():
Activating OAKLEY_TWOFISH_CBC: Ok (ret=0)
Apr  5 13:56:47 telemetry pluto[2147]: ike_alg_register_enc():
Activating OAKLEY_SERPENT_CBC: Ok (ret=0)
Apr  5 13:56:47 telemetry pluto[2147]: ike_alg_register_enc():
Activating OAKLEY_AES_CBC: Ok (ret=0)
Apr  5 13:56:47 telemetry pluto[2147]: ike_alg_register_enc():
Activating OAKLEY_BLOWFISH_CBC: Ok (ret=0)
Apr  5 13:56:47 telemetry pluto[2147]: ike_alg_register_hash():
Activating OAKLEY_SHA2_512: Ok (ret=0)
Apr  5 13:56:47 telemetry pluto[2147]: ike_alg_register_hash():
Activating OAKLEY_SHA2_256: Ok (ret=0)
Apr  5 13:56:47 telemetry pluto[2147]: starting up 1 cryptographic
helpers
Apr  5 13:56:47 telemetry pluto[2147]: started helper pid=2149 (fd:7)
Apr  5 13:56:47 telemetry pluto[2147]: Using KLIPS IPsec interface code
on 2.6.33-smp
Apr  5 13:56:47 telemetry pluto[2147]: Changed path to directory
'/etc/ipsec.d/cacerts'
Apr  5 13:56:47 telemetry pluto[2147]: Changed path to directory
'/etc/ipsec.d/aacerts'
Apr  5 13:56:47 telemetry pluto[2147]: Changed path to directory
'/etc/ipsec.d/ocspcerts'
Apr  5 13:56:47 telemetry pluto[2147]: Changing to directory
'/etc/ipsec.d/crls'
Apr  5 13:56:47 telemetry pluto[2147]:   Warning: empty directory
Apr  5 13:56:47 telemetry pluto[2149]: using /dev/urandom as source of
random entropy
Apr  5 13:56:47 telemetry pluto[2147]: added connection description
"RoadWarrior"
Apr  5 13:56:47 telemetry pluto[2147]: listening for IKE messages
Apr  5 13:56:47 telemetry pluto[2147]: adding interface ipsec0/eth0
192.168.95.140:500
Apr  5 13:56:47 telemetry pluto[2147]: loading secrets from
"/etc/ipsec.secrets"
Apr  5 13:56:47 telemetry pluto[2147]: loaded private key for keyid:
PPK_RSA:AQOeDYPHf
Apr  5 13:56:56 telemetry pluto[2147]: packet from 192.168.95.104:500:
ignoring Vendor ID payload [MS NT5 ISAKMPOAKLEY 00000004]
Apr  5 13:56:56 telemetry pluto[2147]: packet from 192.168.95.104:500:
ignoring Vendor ID payload [FRAGMENTATION]
Apr  5 13:56:56 telemetry pluto[2147]: packet from 192.168.95.104:500:
received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n] meth=106,
but port floating is off
Apr  5 13:56:56 telemetry pluto[2147]: packet from 192.168.95.104:500:
ignoring Vendor ID payload [Vid-Initial-Contact]
Apr  5 13:56:56 telemetry pluto[2147]: "RoadWarrior"[1] 192.168.95.104
#1: responding to Main Mode from unknown peer 192.168.95.104
Apr  5 13:56:56 telemetry pluto[2147]: "RoadWarrior"[1] 192.168.95.104
#1: transition from state STATE_MAIN_R0 to state STATE_MAIN_R1
Apr  5 13:56:56 telemetry pluto[2147]: "RoadWarrior"[1] 192.168.95.104
#1: STATE_MAIN_R1: sent MR1, expecting MI2
Apr  5 13:56:56 telemetry pluto[2147]: "RoadWarrior"[1] 192.168.95.104
#1: transition from state STATE_MAIN_R1 to state STATE_MAIN_R2
Apr  5 13:56:56 telemetry pluto[2147]: "RoadWarrior"[1] 192.168.95.104
#1: STATE_MAIN_R2: sent MR2, expecting MI3
Apr  5 13:56:56 telemetry pluto[2147]: "RoadWarrior"[1] 192.168.95.104
#1: Main mode peer ID is ID_IPV4_ADDR: '192.168.95.104'
Apr  5 13:56:56 telemetry pluto[2147]: "RoadWarrior"[1] 192.168.95.104
#1: transition from state STATE_MAIN_R2 to state STATE_MAIN_R3
Apr  5 13:56:56 telemetry pluto[2147]: "RoadWarrior"[1] 192.168.95.104
#1: STATE_MAIN_R3: sent MR3, ISAKMP SA established
{auth=OAKLEY_PRESHARED_KEY cipher=oakley_3des_cbc_192 prf=oakley_sha
group=modp2048}
Apr  5 13:56:56 telemetry pluto[2147]: "RoadWarrior"[1] 192.168.95.104
#1: Dead Peer Detection (RFC 3706): not enabled because peer did not
advertise it
Apr  5 13:56:56 telemetry pluto[2147]: "RoadWarrior"[1] 192.168.95.104
#1: the peer proposed: 192.168.95.140/32:17/1701 ->
192.168.95.104/32:17/0
Apr  5 13:56:56 telemetry pluto[2147]: "RoadWarrior"[1] 192.168.95.104
#2: responding to Quick Mode proposal {msgid:0140e494}
Apr  5 13:56:56 telemetry pluto[2147]: "RoadWarrior"[1] 192.168.95.104
#2:     us: 192.168.95.140[+S=C]:17/1701
Apr  5 13:56:56 telemetry pluto[2147]: "RoadWarrior"[1] 192.168.95.104
#2:   them: 192.168.95.104[+S=C]:17/1701
Apr  5 13:56:56 telemetry pluto[2147]: | NAT-OA: 0 tunnel: 1  
Apr  5 13:56:56 telemetry pluto[2147]: ERROR: "RoadWarrior"[1]
192.168.95.104 #2: pfkey write() of K_SADB_ADD message 5 for Add SA
esp.b2b35fa4 at 192.168.95.104 failed. Errno 71: Protocol error
Apr  5 13:56:56 telemetry pluto[2147]: |   02 03 00 03  12 00 00 00  05
00 00 00  63 08 00 00
Apr  5 13:56:56 telemetry pluto[2147]: |   03 00 01 00  b2 b3 5f a4  40
01 02 03  00 00 00 00
Apr  5 13:56:56 telemetry pluto[2147]: |   00 00 00 00  00 00 00 00  03
00 05 00  00 00 00 00
Apr  5 13:56:56 telemetry pluto[2147]: |   02 00 06 a5  c0 a8 5f 8c  00
00 00 00  00 00 00 00
Apr  5 13:56:56 telemetry pluto[2147]: |   03 00 06 00  00 00 00 00  02
00 06 a5  c0 a8 5f 68
Apr  5 13:56:56 telemetry pluto[2147]: |   00 00 00 00  00 00 00 00  03
00 08 00  80 00 00 00
Apr  5 13:56:56 telemetry pluto[2147]: |   dd 6f c5 0d  9b 56 13 9c  12
f1 d4 3e  cf f0 67 e1
Apr  5 13:56:56 telemetry pluto[2147]: |   04 00 09 00  c0 00 00 00  ab
83 a9 3a  4a 64 44 fc
Apr  5 13:56:56 telemetry pluto[2147]: |   88 b5 93 d1  33 58 4e 96  dd
0a cb 66  0d 01 11 c3
Apr  5 13:56:56 telemetry pluto[2147]: | failed to install outgoing SA:
0
Apr  5 13:56:57 telemetry pluto[2147]: "RoadWarrior"[1] 192.168.95.104
#2: discarding duplicate packet; already STATE_QUICK_R0
Apr  5 13:57:27 telemetry last message repeated 4 times
Apr  5 13:57:42 telemetry pluto[2147]: "RoadWarrior"[1] 192.168.95.104
#1: received Delete SA payload: deleting ISAKMP State #1
Apr  5 13:57:42 telemetry pluto[2147]: packet from 192.168.95.104:500:
received and ignored informational message
Apr  5 14:01:56 telemetry pluto[2147]: "RoadWarrior"[1] 192.168.95.104:
deleting connection "RoadWarrior" instance with peer 192.168.95.104
{isakmp=#0/ipsec=#0}

-----Original Message-----
From: Paul Wouters [mailto:paul at xelerance.com] 
Sent: vrijdag 2 april 2010 23:57
To: Dennis van der Meer
Cc: David McCullough; users at openswan.org
Subject: Re: [Openswan Users] Still server crash

On Fri, 2 Apr 2010, Dennis van der Meer wrote:

> # basic configuration
> config setup
> 	uniqueids=yes
> 	nat_traversal=no
>
>
virtual_private=%v4:10.0.0.0/16,%v4:172.16.0.0/12,%v4:192.168.0.0/16,%v4
>
:!192.168.2.0/24,%v4:!10.0.2.0/24,%v4:!10.0.7.0/24,%v4:!192.168.100.0/24
> 	protostack=klips
> 	plutodebug="none"
> 	klipsdebug="none"

That blank line will cause trouble

> conn RoadWarrior
> 	auto=add
> 	left=192.168.2.63
> 	leftsourceip=10.0.15.1
> 	leftsubnet=10.0.15.0/24
> 	leftprotoport=17/1701
>
> 	right=%any
> 	rightprotoport=17/%any
> 	rightsubnet=vhost:%no,%priv
> 	pfs=no
> 	authby=secret
> 	type=tunnel
> 	keyingtries=5
> 	keyexchange=ike

And so will that blanc line.

>
> ipsec.secrets:
>
> %any %any : PSK
> "716ce954e871ce7eb193c78624387dbed03cb25c6430adc672cf072d79b1c66c"

You will have to change this secret in production

> Apr  2 16:28:24 telemetry pluto[3192]:    NAT-Traversal support
> [disabled]

This is due to the blanc line.

Paul
_______________________________________________
Users at openswan.org
http://lists.openswan.org/mailman/listinfo/users
Building and Integrating Virtual Private Networks with Openswan: 
http://www.amazon.com/gp/product/1904811256/104-3099591-2946327?n=283155


More information about the Users mailing list