[Openswan Users] Error sending data out tunnel: No route to host
Hernan Freschi
hjf at hjf.com.ar
Mon Jan 25 09:37:23 EST 2010
Hello, I've been using openswan + l2tpns for a while now. Recently the
server was
rootkited so I had to make a clean install. I copied the configuration
files and all, and after that I've been getting the errors at the end
of this message.
Sometimes it fixes itself after several minutes, sometimes it won't. I
try killing l2tpns but it refuses to die, unless I do it with a signal
9. Restarting it solves the problem (during this time I can't even
access the l2tpns CLI).
I've also noticed that restarting openswan also fixes the problem. Now I'm
starting to suspect that openswan is to blame.
Here's debian's auth.log while the server is failing
Jan 25 11:25:34 acceso pluto[10976]: packet from 10.5.1.74:500: ignoring
Vendor ID payload [MS NT5 ISAKMPOAKLEY 00000004]
Jan 25 11:25:34 acceso pluto[10976]: packet from 10.5.1.74:500: ignoring
Vendor ID payload [FRAGMENTATION]
Jan 25 11:25:34 acceso pluto[10976]: packet from 10.5.1.74:500: received
Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n] method set
to=106
Jan 25 11:25:34 acceso pluto[10976]: packet from 10.5.1.74:500: ignoring
Vendor ID payload [Vid-Initial-Contact]
Jan 25 11:25:34 acceso pluto[10976]: "zpreshared"[136] 10.5.1.74 #2116:
responding to Main Mode from unknown peer 10.5.1.74
Jan 25 11:25:34 acceso pluto[10976]: "zpreshared"[136] 10.5.1.74 #2116:
transition from state STATE_MAIN_R0 to state STATE_MAIN_R1
Jan 25 11:25:34 acceso pluto[10976]: "zpreshared"[136] 10.5.1.74 #2116:
STATE_MAIN_R1: sent MR1, expecting MI2
Jan 25 11:25:34 acceso pluto[10976]: "zpreshared"[136] 10.5.1.74 #2116:
NAT-Traversal: Result using draft-ietf-ipsec-nat-t-ike-02/03: no
NAT detected
Jan 25 11:25:34 acceso pluto[10976]: "zpreshared"[136] 10.5.1.74 #2116:
transition from state STATE_MAIN_R1 to state STATE_MAIN_R2
Jan 25 11:25:34 acceso pluto[10976]: "zpreshared"[136] 10.5.1.74 #2116:
STATE_MAIN_R2: sent MR2, expecting MI3
Jan 25 11:25:34 acceso pluto[10976]: "zpreshared"[136] 10.5.1.74 #2116: Main
mode peer ID is ID_IPV4_ADDR: '10.5.1.74'
Jan 25 11:25:34 acceso pluto[10976]: "zpreshared"[136] 10.5.1.74 #2116: I
did not send a certificate because I do not have one.
Jan 25 11:25:34 acceso pluto[10976]: "zpreshared"[136] 10.5.1.74 #2116:
transition from state STATE_MAIN_R2 to state STATE_MAIN_R3
Jan 25 11:25:34 acceso pluto[10976]: "zpreshared"[136] 10.5.1.74 #2116:
STATE_MAIN_R3: sent MR3, ISAKMP SA established {auth=OAKLEY_PRES
HARED_KEY cipher=oakley_3des_cbc_192 prf=oakley_sha group=modp2048}
Jan 25 11:25:34 acceso pluto[10976]: "zpreshared"[136] 10.5.1.74 #2117:
responding to Quick Mode {msgid:35e9f288}
Jan 25 11:25:34 acceso pluto[10976]: "zpreshared"[136] 10.5.1.74 #2117:
transition from state STATE_QUICK_R0 to state STATE_QUICK_R1
Jan 25 11:25:34 acceso pluto[10976]: "zpreshared"[136] 10.5.1.74 #2117:
STATE_QUICK_R1: sent QR1, inbound IPsec SA installed, expecting
QI2
Jan 25 11:25:34 acceso pluto[10976]: "zpreshared"[136] 10.5.1.74 #2117:
transition from state STATE_QUICK_R1 to state STATE_QUICK_R2
Jan 25 11:25:34 acceso pluto[10976]: "zpreshared"[136] 10.5.1.74 #2117:
STATE_QUICK_R2: IPsec SA established {ESP=>0xc47b9ec2 <0x8913fef
3 xfrm=3DES_0-HMAC_MD5 NATD=none DPD=none}
Jan 25 11:25:34 acceso pluto[10976]: "zpreshared"[132] 10.5.1.246 #2106:
received Delete SA(0x07024e97) payload: deleting IPSEC State #2
107
Jan 25 11:25:34 acceso pluto[10976]: "zpreshared"[132] 10.5.1.246 #2106:
received and ignored informational message
Jan 25 11:25:34 acceso pluto[10976]: "zpreshared"[132] 10.5.1.246 #2106:
received Delete SA payload: deleting ISAKMP State #2106
Jan 25 11:25:34 acceso pluto[10976]: "zpreshared"[132] 10.5.1.246: deleting
connection "zpreshared" instance with peer 10.5.1.246 {isakm
p=#0/ipsec=#0}
Jan 25 11:25:34 acceso pluto[10976]: packet from 10.5.1.246:500: received
and ignored informational message
Jan 25 11:25:37 acceso pluto[10976]: "zpreshared"[51] 10.5.1.186 #2108:
received Delete SA(0xe1abd805) payload: deleting IPSEC State #21
09
Jan 25 11:25:37 acceso pluto[10976]: "zpreshared"[51] 10.5.1.186 #2108:
received and ignored informational message
Jan 25 11:25:37 acceso pluto[10976]: "zpreshared"[51] 10.5.1.186 #2108:
received Delete SA payload: deleting ISAKMP State #2108
Jan 25 11:25:37 acceso pluto[10976]: packet from 10.5.1.186:500: received
and ignored informational message
Any suggestions? Here's l2tpns logfile at the moment it's failing:
2010-01-19 17:13:15 00/00 Sending v5 heartbeat #91343, change #594
with 0 changes (18 x-sess, 18 x-tunnels, 18 highsess, 18 hightun, size
3388)
2010-01-19 17:13:15 00/00 Sending v5 heartbeat #91344, change #594
with 0 changes (18 x-sess, 18 x-tunnels, 18 highsess, 18 hightun, size
3388)
2010-01-19 17:13:16 00/00 Sending v5 heartbeat #91345, change #594
with 0 changes (18 x-sess, 18 x-tunnels, 18 highsess, 18 hightun, size
3389)
2010-01-19 17:13:16 03/03 Kill session 3 (xxxxxxxxx): Expired
2010-01-19 17:13:16 00/00 Reached multi_read_count (10); processed 10
udp, 10 tun and 0 cluster packets
2010-01-19 18:06:56 00/00 Sending v5 heartbeat #91346, change #595
with 1 changes (18 x-sess, 18 x-tunnels, 18 highsess, 18 hightun, size
3323)
2010-01-19 18:06:56 06/00 Sending HELLO message
2010-01-19 18:06:56 07/00 Sending HELLO message
2010-01-19 18:06:56 08/00 Sending HELLO message
2010-01-19 18:06:56 09/00 Sending HELLO message
2010-01-19 18:06:56 10/00 Sending HELLO message
2010-01-19 18:06:56 11/00 Sending HELLO message
2010-01-19 18:06:56 12/00 Sending HELLO message
2010-01-19 18:06:56 13/00 Sending HELLO message
2010-01-19 18:06:56 14/00 Sending HELLO message
2010-01-19 18:06:56 15/00 Sending HELLO message
2010-01-19 18:06:56 16/00 Error sending data out tunnel: No route to
host (udpfd=9, buf=0xa0bcfe6, len=20, dest=10.5.2.26)
2010-01-19 18:06:56 16/00 Sending HELLO message
2010-01-19 18:06:56 17/00 Sending HELLO message
2010-01-19 18:06:56 18/00 Sending HELLO message
2010-01-19 18:06:56 01/00 Sending HELLO message
2010-01-19 18:06:56 02/00 Sending HELLO message
2010-01-19 18:06:56 03/00 Kill tunnel 3: Expired
2010-01-19 18:06:56 04/00 Error sending data out tunnel: No route to
host (udpfd=9, buf=0xa0ba43e, len=20, dest=10.5.1.26)
2010-01-19 18:06:56 04/00 Sending HELLO message
2010-01-19 18:06:56 05/00 Sending HELLO message
2010-01-19 18:06:56 10/04 Shutting down session 4: No response to LCP
ECHO requests.
2010-01-19 18:06:56 10/04 Allocated radius 112
2010-01-19 18:06:56 05/05 Shutting down session 5: No response to LCP
ECHO requests.
2010-01-19 18:06:56 05/05 Allocated radius 113
2010-01-19 18:06:56 06/06 Shutting down session 6: No response to LCP
ECHO requests.
2010-01-19 18:06:56 06/06 Allocated radius 114
2010-01-19 18:06:56 07/07 Shutting down session 7: No response to LCP
ECHO requests.
2010-01-19 18:06:56 07/07 Allocated radius 115
2010-01-19 18:06:56 04/08 Shutting down session 8: No response to LCP
ECHO requests.
2010-01-19 18:06:56 04/08 Allocated radius 116
2010-01-19 18:06:56 11/09 Shutting down session 9: No response to LCP
ECHO requests.
ipsec.conf
version 2.0 # conforms to second version of ipsec.conf specification
# basic configuration
config setup
interfaces="ipsec0=eth3"
# plutodebug / klipsdebug = "all", "none" or a combation from below:
# "raw crypt parsing emitting control klips pfkey natt x509 private"
# eg:
# plutodebug="control parsing"
#
# Only enable klipsdebug=all if you are a developer
#
# NAT-TRAVERSAL support, see README.NAT-Traversal
# nat_traversal=yes
# virtual_private=%v4:10.0.0.0/8,%v4:192.168.0.0/16,%4:172.16.0.0/12
# plutodebug="all"
nat_traversal=yes
virtual_private=%v4:10.0.0.0/8,%v4:172.16.0.0/12,%v4:192.168.0.0/16
#Disable Opportunistic Encryption
include /etc/ipsec.d/examples/no_oe.conf
conn zpreshared
authby=secret
pfs=no
left=10.1.1.10
leftprotoport=17/0
right=%any
rightprotoport=17/1701
auto=add
keyingtries=3
conn cliente-internet
leftsubnet=0.0.0.0/0
also=cliente
conn cliente
left=10.5.255.254
leftcert=server.pem
right=%any
rightsubnet=vhost:%no,%priv
auto=add
pfs=yes
disablearrivalcheck=no
authby=rsasig
leftrsasigkey=%cert
rightrsasigkey=%cert
keyingtries=1
compress=yes
conn block
auto=ignore
conn private
auto=ignore
conn private-or-clear
auto=ignore
conn clear-or-private
auto=ignore
conn clear
auto=ignore
conn packetdefault
auto=ignore
Thanks,
Hernan
-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://lists.openswan.org/pipermail/users/attachments/20100125/07a61b38/attachment.html
More information about the Users
mailing list