[Openswan Users] Openswan AND fortigate 60b Vs Iptables

Willie Gillespie wgillespie+openswan at es2eng.com
Thu Jul 8 23:17:47 EDT 2010


I haven't been following your entire thread, but I'll try and explain 
the error below and maybe you can figure out why it's occurring.

See my responses below.

Ing. Rodrigo Fernandez wrote:
> When I got disconnection I got the weird message of  “no connection has 
> been authorized by polici = PSK “ but I have discovere that if I restart 
> the daemon itself the tunnel goes up again, or maybe we can see why the 
> tunnel doesn’t goes up? By the way im running IPsec U2.6.27/K2.6.20.21
> 
> Ill sending my log :
> Jul  8 21:32:41 excalibur-netcafe pluto[12362]: packet from 
> 189.136.*.206:500: received Vendor ID payload [RFC 3947] method set to=109

<snip>

> Jul  8 21:32:41 excalibur-netcafe pluto[12362]: | nat-t detected, 
> sending nat-t VID
> 
> Jul  8 21:32:41 excalibur-netcafe pluto[12362]: | find_host_connection2 
> called from main_inI1_outR1, me=189.233.*.51:500 him=189.136.*.206:500 
> policy=none
> 
> Jul  8 21:32:41 excalibur-netcafe pluto[12362]: | find_host_pair: 
> comparing to 189.233.*.51:500 187.145.*.141:500
> 
> Jul  8 21:32:41 excalibur-netcafe pluto[12362]: | find_host_pair_conn 
> (find_host_connection2): 189.233.*.51:500 189.136.*.206:500 -> hp:none
> 
> Jul  8 21:32:41 excalibur-netcafe pluto[12362]: | find_host_connection2 
> returns empty

So you have an incoming connection from 189.136.*.206, but when Openswan 
compares it to your configuration files, it only sees the left/right 
combination of 189.233.*.51/187.145.*.141.

It uses the policy line you see later to further limit the connections. 
  It is looking for a connection that uses authby=secret (pre-shared 
keys) in this case.

Willie


More information about the Users mailing list