[Openswan Users] URGENT! need help in openswan for uBuntu 10.10
Cady Wongso
cady at holidaypalace.com
Fri Nov 12 13:04:49 EST 2010
Dear All,
i'm having problem dialing in from my iphone to my VPN server
below is my config file
config setup
# Do not set debug options to debug configuration issues!
# plutodebug / klipsdebug = "all", "none" or a combation from below:
# "raw crypt parsing emitting control klips pfkey natt x509 dpd private"
# eg:
#plutodebug="control parsing"
#
# enable to get logs per-peer
#plutoopts="--perpeerlog"
#
# Again: only enable plutodebug or klipsdebug when asked by a developer
#
# NAT-TRAVERSAL support, see README.NAT-Traversal
nat_traversal=yes
# exclude networks used on server side by adding %v4:!a.b.c.0/24
virtual_private=%v4:10.0.0.0/8,%v4:192.168.0.0/16,%v4:172.16.0.0/12
# OE is now off by default. Uncomment and change to on, to enable.
oe=off
# which IPsec stack to use. auto will try netkey, then klips then mast
protostack=netkey
conn %default
left=x.x.x.x
right=%any
rightprotoport=17/%any
keyingtries=0
disablearrivalcheck=no
conn abc
pfs=no
left=x.x.x.x
leftnexthop=%defaultroute
leftprotoport=17/1701
right=%any
type=transport
#rightprotoport=17/%any
#rightnexthop=%defaultroute
dpddelay=30
dpdtimeout=120
dpdaction=hold
authby=secret
auto=start
ikelifetime=8h
keylife=1h
and this is from the log files when my iphone try to connect
Nov 13 02:08:59 ipsec pluto[1257]: packet from 1.47.105.60:500: received Vendor ID payload [RFC 3947] method set to=109
Nov 13 02:08:59 ipsec pluto[1257]: packet from 1.47.105.60:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike] method set to=110
Nov 13 02:08:59 ipsec pluto[1257]: packet from 1.47.105.60:500: ignoring unknown Vendor ID payload [8f8d83826d246b6fc7a8a6a428c11de8]
Nov 13 02:08:59 ipsec pluto[1257]: packet from 1.47.105.60:500: ignoring unknown Vendor ID payload [439b59f8ba676c4c7737ae22eab8f582]
Nov 13 02:08:59 ipsec pluto[1257]: packet from 1.47.105.60:500: ignoring unknown Vendor ID payload [4d1e0e136deafa34c4f3ea9f02ec7285]
Nov 13 02:08:59 ipsec pluto[1257]: packet from 1.47.105.60:500: ignoring unknown Vendor ID payload [80d0bb3def54565ee84645d4c85ce3ee]
Nov 13 02:08:59 ipsec pluto[1257]: packet from 1.47.105.60:500: ignoring unknown Vendor ID payload [9909b64eed937c6573de52ace952fa6b]
Nov 13 02:08:59 ipsec pluto[1257]: packet from 1.47.105.60:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03] meth=108, but already using method 110
Nov 13 02:08:59 ipsec pluto[1257]: packet from 1.47.105.60:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02] meth=107, but already using method 110
Nov 13 02:08:59 ipsec pluto[1257]: packet from 1.47.105.60:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n] meth=106, but already using method 110
Nov 13 02:08:59 ipsec pluto[1257]: packet from 1.47.105.60:500: received Vendor ID payload [Dead Peer Detection]
Nov 13 02:08:59 ipsec pluto[1257]: "abc"[22] 1.47.105.60 #59: responding to Main Mode from unknown peer 1.47.105.60
Nov 13 02:08:59 ipsec pluto[1257]: "abc"[22] 1.47.105.60 #59: transition from state STATE_MAIN_R0 to state STATE_MAIN_R1
Nov 13 02:08:59 ipsec pluto[1257]: "abc"[22] 1.47.105.60 #59: STATE_MAIN_R1: sent MR1, expecting MI2
Nov 13 02:09:00 ipsec pluto[1257]: "abc"[22] 1.47.105.60 #59: NAT-Traversal: Result using draft-ietf-ipsec-nat-t-ike (MacOS X): no NAT detected
Nov 13 02:09:00 ipsec pluto[1257]: "abc"[22] 1.47.105.60 #59: transition from state STATE_MAIN_R1 to state STATE_MAIN_R2
Nov 13 02:09:00 ipsec pluto[1257]: "abc"[22] 1.47.105.60 #59: STATE_MAIN_R2: sent MR2, expecting MI3
Nov 13 02:09:00 ipsec pluto[1257]: "abc"[22] 1.47.105.60 #59: ignoring informational payload, type IPSEC_INITIAL_CONTACT msgid=00000000
Nov 13 02:09:00 ipsec pluto[1257]: "abc"[22] 1.47.105.60 #59: Main mode peer ID is ID_IPV4_ADDR: '1.47.105.60'
Nov 13 02:09:00 ipsec pluto[1257]: "abc"[22] 1.47.105.60 #59: transition from state STATE_MAIN_R2 to state STATE_MAIN_R3
Nov 13 02:09:00 ipsec pluto[1257]: "abc"[22] 1.47.105.60 #59: new NAT mapping for #59, was 1.47.105.60:500, now 1.47.105.60:4500
Nov 13 02:09:00 ipsec pluto[1257]: "abc"[22] 1.47.105.60 #59: STATE_MAIN_R3: sent MR3, ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY cipher=aes_256 prf=oakley_sha group=modp1024}
Nov 13 02:09:00 ipsec pluto[1257]: "abc"[22] 1.47.105.60 #59: Dead Peer Detection (RFC 3706): enabled
Nov 13 02:09:02 ipsec pluto[1257]: "abc"[22] 1.47.105.60 #59: the peer proposed: 110.74.223.120/32:17/1701 -> 1.47.105.60/32:17/0
Nov 13 02:09:02 ipsec pluto[1257]: "abc"[22] 1.47.105.60 #60: ENCAPSULATION_MODE_UDP_TRANSPORT_RFC must only be used if NAT-Traversal is detected
Nov 13 02:09:02 ipsec pluto[1257]: "abc"[22] 1.47.105.60 #60: sending encrypted notification BAD_PROPOSAL_SYNTAX to 1.47.105.60:4500
Nov 13 02:09:05 ipsec pluto[1257]: "abc"[22] 1.47.105.60 #59: the peer proposed: 110.74.223.120/32:17/1701 -> 1.47.105.60/32:17/55958
Nov 13 02:09:05 ipsec pluto[1257]: "abc"[22] 1.47.105.60 #61: ENCAPSULATION_MODE_UDP_TRANSPORT_RFC must only be used if NAT-Traversal is detected
Nov 13 02:09:05 ipsec pluto[1257]: "abc"[22] 1.47.105.60 #61: sending encrypted notification BAD_PROPOSAL_SYNTAX to 1.47.105.60:4500
Nov 13 02:09:08 ipsec pluto[1257]: "abc"[22] 1.47.105.60 #59: the peer proposed: 110.74.223.120/32:17/1701 -> 1.47.105.60/32:17/55958
Nov 13 02:09:08 ipsec pluto[1257]: "abc"[22] 1.47.105.60 #62: ENCAPSULATION_MODE_UDP_TRANSPORT_RFC must only be used if NAT-Traversal is detected
Nov 13 02:09:08 ipsec pluto[1257]: "abc"[22] 1.47.105.60 #62: sending encrypted notification BAD_PROPOSAL_SYNTAX to 1.47.105.60:4500
Nov 13 02:09:11 ipsec pluto[1257]: "abc"[22] 1.47.105.60 #59: the peer proposed: 110.74.223.120/32:17/1701 -> 1.47.105.60/32:17/55958
Nov 13 02:09:11 ipsec pluto[1257]: "abc"[22] 1.47.105.60 #63: ENCAPSULATION_MODE_UDP_TRANSPORT_RFC must only be used if NAT-Traversal is detected
Nov 13 02:09:11 ipsec pluto[1257]: "abc"[22] 1.47.105.60 #63: sending encrypted notification BAD_PROPOSAL_SYNTAX to 1.47.105.60:4500
Nov 13 02:09:14 ipsec pluto[1257]: "abc"[22] 1.47.105.60 #59: the peer proposed: 110.74.223.120/32:17/1701 -> 1.47.105.60/32:17/55958
Nov 13 02:09:14 ipsec pluto[1257]: "abc"[22] 1.47.105.60 #64: ENCAPSULATION_MODE_UDP_TRANSPORT_RFC must only be used if NAT-Traversal is detected
Nov 13 02:09:14 ipsec pluto[1257]: "abc"[22] 1.47.105.60 #64: sending encrypted notification BAD_PROPOSAL_SYNTAX to 1.47.105.60:4500
Nov 13 02:09:17 ipsec pluto[1257]: "abc"[22] 1.47.105.60 #59: the peer proposed: 110.74.223.120/32:17/1701 -> 1.47.105.60/32:17/55958
Nov 13 02:09:17 ipsec pluto[1257]: "abc"[22] 1.47.105.60 #65: ENCAPSULATION_MODE_UDP_TRANSPORT_RFC must only be used if NAT-Traversal is detected
Nov 13 02:09:17 ipsec pluto[1257]: "abc"[22] 1.47.105.60 #65: sending encrypted notification BAD_PROPOSAL_SYNTAX to 1.47.105.60:4500
the weirdest thing was my terminal at my home both os x and win 7 can connect to my VPN server both NAT and not NAT
please help
Thank you
More information about the Users
mailing list