[Openswan Users] ipsec tunneling + openswam + mac os x + ping

Paul Wouters paul at xelerance.com
Tue Apr 20 08:15:39 EDT 2010


On Mon, 19 Apr 2010, Stefan Miklosovic wrote:

> eth2      Link encap:Ethernet  HWaddr xx:xx:xx:xx:xx:xx
>         inet addr:12.34.56.78  Bcast:255.255.255.255  Mask:
> 255.255.255.0

That broadcast/mask seems wrong. Not sure if you errored it when
anonimizing it.

> # cat /etc/ipsec.secrets
> 10.0.0.1 %any: PSK "thiskeyisshit"

and public now :)

>       nat_traversal=yes
>       interfaces="ipsec0=eth2"
> #       virtual_private=
> %v4:10.0.0.0/8,%v4:172.16.0.0/12,%v4:192.168.0.0/16

Looks like you did not enable virtual_private, which you need for NAT-T

> conn roadwarrior-net
> conn roadwarrior-l2tp
> conn roadwarrior-l2tp-updatewin
> conn roadwarrior-all
> conn roadwarrior

Merge all of these into one, see the updated examples in /etc/ipsec.d/examples/l2tp*

>       left=12.34.56.78
>       leftnexthop=12.34.56.1
>       right=%any
>       rightsubnet=192.168.0.0/24
>       forceencaps=yes
>       ike=3des-md5;modp1024
>       phase2=esp
>       phase2alg=3des-md5;modp1024
>       auto=add

For l2tp use transport mode, and no subnets except a rightsubnet=vhost:%no,%priv
Use leftprotoport=17/1701 and rightprotoport=17/%any

> Apr 19 10:41:52 charon1 pluto[22429]: "roadwarrior-net"[1]
> 192.168.0.168 #1: STATE_MAIN_R3: sent MR3, ISAKMP SA established
> {auth=OAKLEY_PRESHARED_KEY cipher=oakley_3des_cbc_192 prf=oakley_md5
> group=modp1024}
>
> Apr 19 10:41:52 charon1 pluto[22429]: "roadwarrior-net"[1]
> 192.168.0.168 #1: ignoring informational payload, type
> IPSEC_INITIAL_CONTACT msgid=00000000
> Apr 19 10:41:52 charon1 pluto[22429]: "roadwarrior-net"[1]
> 192.168.0.168 #1: received and ignored informational message
> Apr 19 10:41:53 charon1 pluto[22429]: "roadwarrior-net"[1]
> 192.168.0.168 #1: the peer proposed: 10.0.0.2/32:0/0 ->
> 192.168.0.168/32:0/0
> Apr 19 10:41:53 charon1 pluto[22429]: "roadwarrior-net"[1]
> 192.168.0.168 #2: responding to Quick Mode proposal {msgid:4c56b781}
> Apr 19 10:41:53 charon1 pluto[22429]: "roadwarrior-net"[1]
> 192.168.0.168 #2:     us:
> 10.0.0.0/16===12.34.56.78<12.34.56.78>[+S=C]---12.34.56.1
> Apr 19 10:41:53 charon1 pluto[22429]: "roadwarrior-net"[1]
> 192.168.0.168 #2:   them: 192.168.0.168[+S=C]===192.168.0.0/24
> Apr 19 10:41:53 charon1 pluto[22429]: | NAT-OA: 32 tunnel: 0
> Apr 19 10:41:53 charon1 pluto[22429]: "roadwarrior-net"[1]
> 192.168.0.168 #2: transition from state STATE_QUICK_R0 to state
> STATE_QUICK_R1
> Apr 19 10:41:53 charon1 pluto[22429]: "roadwarrior-net"[1]
> 192.168.0.168 #2: STATE_QUICK_R1: sent QR1, inbound IPsec SA
> installed, expecting QI2
> Apr 19 10:41:53 charon1 pluto[22429]: "roadwarrior-net"[1]
> 192.168.0.168 #2: transition from state STATE_QUICK_R1 to state
> STATE_QUICK_R2
> Apr 19 10:41:53 charon1 pluto[22429]: "roadwarrior-net"[1]
> 192.168.0.168 #2: STATE_QUICK_R2: IPsec SA established tunnel mode
> {ESP/NAT=>0x0b6204fa <0xd6474be5 xfrm=3DES_0-HMAC_MD5 NATOA=none
> NATD=192.168.0.168:4500 DPD=none}
> Apr 19 11:37:22 charon1 pluto[22429]: "roadwarrior-net"[1]
> 192.168.0.168 #3: initiating Main Mode to replace #1
> Apr 19 11:38:32 charon1 pluto[22429]: "roadwarrior-net"[1]
> 192.168.0.168 #3: max number of retransmissions (2) reached
> STATE_MAIN_I1.  No response (or no acceptable response) to our first
> IKE message
> Apr 19 11:41:52 charon1 pluto[22429]: "roadwarrior-net"[1]
> 192.168.0.168 #1: ISAKMP SA expired (LATEST!)

Make sure to set rekey=no

With those changes, try again and let us know if you see more issues.

Paul



More information about the Users mailing list