[Openswan Users] no preshared key found error
matt.bazan at comcast.net
matt.bazan at comcast.net
Thu Oct 7 11:59:28 EDT 2010
hi all - getting following error on my site-to-site VPN tunnel:
Oct 7 09:33:05 ubuntuFW pluto[23546]: packet from 173.xx.xx.xx:500: ignoring unknown Vendor ID payload [4f456d406b6753464548407f]
Oct 7 09:33:05 ubuntuFW pluto[23546]: packet from 173.xx.xx.xx:500: received Vendor ID payload [Dead Peer Detection]
Oct 7 09:33:05 ubuntuFW pluto[23546]: packet from 173.xx.xx.xx:500: received Vendor ID payload [RFC 3947] method set to=109
Oct 7 09:33:05 ubuntuFW pluto[23546]: packet from 173.xx.xx.xx:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03] meth=108, but already using method 109
Oct 7 09:33:05 ubuntuFW pluto[23546]: packet from 173.xx.xx.xx:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n] meth=106, but already using method 109
Oct 7 09:33:05 ubuntuFW pluto[23546]: packet from 173.xx.xx.xx:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02] meth=107, but already using method 109
Oct 7 09:33:05 ubuntuFW pluto[23546]: packet from 173.xx.xx.xx:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-00]
Oct 7 09:33:05 ubuntuFW pluto[23546]: "SF-To-Trenton" #27: responding to Main Mode
Oct 7 09:33:05 ubuntuFW pluto[23546]: "SF-To-Trenton" #27: Can't authenticate: no preshared key found for `@sf.xx.com' and `@trenton.xx.com'. Attribute OAKLEY_AUTHENTICATION_METHOD
Oct 7 09:33:05 ubuntuFW pluto[23546]: last message repeated 11 times
Oct 7 09:33:05 ubuntuFW pluto[23546]: "SF-To-Trenton" #27: no acceptable Oakley Transform
Oct 7 09:33:05 ubuntuFW pluto[23546]: "SF-To-Trenton" #27: sending notification NO_PROPOSAL_CHOSEN to 173.xx.xx.xx:500
Oct 7 09:33:31 ubuntuFW pluto[23546]: "SF-To-Trenton" #1: ignoring informational payload, type NO_PROPOSAL_CHOSEN msgid=00000000
Oct 7 09:33:31 ubuntuFW pluto[23546]: "SF-To-Trenton" #1: received and ignored informational message
not sure what the deal is this is a very basic setup. two ubuntu 10.4 servers w/ public IPs. here's ipsec.conf:
@ubuntuFW:/etc$ sudo vi ipsec.conf
#
# NAT-TRAVERSAL support, see README.NAT-Traversal
nat_traversal=yes
# exclude networks used on server side by adding %v4:!a.b.c.0/24
virtual_private=%v4:10.0.0.0/8,%v4:192.168.0.0/16,%v4:172.16.0.0/12
# OE is now off by default. Uncomment and change to on, to enable.
oe=off
# which IPsec stack to use. netkey,klips,mast,auto or none
protostack=netkey
# Add connections here
conn SF-To-Trenton
authby=secret
left=69.xx.xx.xx
leftsubnet=192.168.0.0/24
leftid=@sf.xx.com
leftnexthop=%defaultroute
right=173.xx.xx.xx
rightsubnet=192.168.10.0/24
rightid=@trenton.xx.com
auto=start
# sample VPN connection
# for more examples, see /etc/ipsec.d/examples/
#conn sample
# # Left security gateway, subnet behind it, nexthop toward right.
# left=10.0.0.1
# leftsubnet=172.16.0.0/24
# leftnexthop=10.22.33.44
# # Right security gateway, subnet behind it, nexthop toward left.
# right=10.12.12.1
# rightsubnet=192.168.0.0/24
# rightnexthop=10.101.102.103
# # To authorize this connection, but not actually start it,
# # at startup, uncomment this.
# #auto=start
..and here's ipsec.secrets file:
# RCSID $Id: ipsec.secrets.proto,v 1.3.6.1 2005/09/28 13:59:14 paul Exp $
# This file holds shared secrets or RSA private keys for inter-Pluto
# authentication. See ipsec_pluto(8) manpage, and HTML documentation.
# RSA private key for this host, authenticating it to any other host
# which knows the public part. Suitable public keys, for ipsec.conf, DNS,
# or configuration of other implementations, can be extracted conveniently
# with "ipsec showhostkey".
69.xx.xx.xx 173.xx.xx.xx : "mysecret"
More information about the Users
mailing list