[Openswan Users] xl2tpd not responding - why?
Troy Telford
ttelford.groups at gmail.com
Mon Sep 6 17:00:13 EDT 2010
After doing some work with the firewall, I can get xl2tpd to respond to
a point...
xl2tpd[24492]: control_finish: Peer requested tunnel 57 twice, ignoring
second one.
xl2tpd[24492]: control_finish: Peer requested tunnel 57 twice, ignoring
second one.
xl2tpd[24492]: control_finish: Peer requested tunnel 57 twice, ignoring
second one.
xl2tpd[24492]: Maximum retries exceeded for tunnel 20342. Closing.
xl2tpd[24492]: control_finish: Peer requested tunnel 57 twice, ignoring
second one.
xl2tpd[24492]: Connection 57 closed to www.xxx.yyy.zzz, port 58541 (Timeout)
xl2tpd[24492]: Unable to deliver closing message for tunnel 20342.
Destroying anyway.
On my client side (an OS X 10.6 client), I'm seeing the following:
Sep 6 14:39:09 machost racoon[6271]: Connecting.
Sep 6 14:39:09 machost racoon[6271]: IKE Packet: transmit success.
(Initiator, Main-Mode message 1).
Sep 6 14:39:09 machost racoon[6271]: IKE Packet: receive success.
(Initiator, Main-Mode message 2).
Sep 6 14:39:09 machost racoon[6271]: IKE Packet: transmit success.
(Initiator, Main-Mode message 3).
Sep 6 14:39:09 machost racoon[6271]: IKE Packet: receive success.
(Initiator, Main-Mode message 4).
Sep 6 14:39:09 machost racoon[6271]: IKE Packet: transmit success.
(Initiator, Main-Mode message 5).
Sep 6 14:39:09 machost racoon[6271]: IKEv1 Phase1 AUTH: success.
(Initiator, Main-Mode Message 6).
Sep 6 14:39:09 machost racoon[6271]: IKE Packet: receive success.
(Initiator, Main-Mode message 6).
Sep 6 14:39:09 machost racoon[6271]: IKEv1 Phase1 Initiator: success.
(Initiator, Main-Mode).
Sep 6 14:39:09 machost racoon[6271]: IKE Packet: transmit success.
(Information message).
Sep 6 14:39:09 machost racoon[6271]: IKEv1 Information-Notice:
transmit success. (ISAKMP-SA).
Sep 6 14:39:10 machost racoon[6271]: IKE Packet: transmit success.
(Initiator, Quick-Mode message 1).
Sep 6 14:39:10 machost racoon[6271]: IKE Packet: receive success.
(Initiator, Quick-Mode message 2).
Sep 6 14:39:10 machost racoon[6271]: IKE Packet: transmit success.
(Initiator, Quick-Mode message 3).
Sep 6 14:39:10 machost racoon[6271]: IKEv1 Phase2 Initiator: success.
(Initiator, Quick-Mode).
Sep 6 14:39:10 machost racoon[6271]: Connected.
Sep 6 14:39:30 machost racoon[6271]: IKE Packet: transmit success.
(Information message).
Sep 6 14:39:30 machost racoon[6271]: IKEv1 Information-Notice:
transmit success. (Delete IPSEC-SA).
Sep 6 14:39:30 machost racoon[6271]: IKE Packet: transmit success.
(Information message).
Sep 6 14:39:30 machost racoon[6271]: IKEv1 Information-Notice:
transmit success. (Delete ISAKMP-SA).
Sep 6 14:39:31 machost racoon[6271]: Disconnecting. (Connection was up
for, 21.058049 seconds).
And from the ppp side (with debugging turned up)
Sep 6 14:43:22 machost pppd[6334]: pppd 2.4.2 (Apple version 412.3)
started by ttelford, uid 501
Sep 6 14:43:22 machost pppd[6334]: L2TP connecting to server
'pilot.pariahzero.net' (24.2.64.187)...
Sep 6 14:43:22 machost pppd[6334]: IPSec connection started
Sep 6 14:43:22 machost pppd[6334]: IPSec phase 1 client started
Sep 6 14:43:22 machost pppd[6334]: IPSec phase 1 server replied
Sep 6 14:43:23 machost pppd[6334]: IPSec phase 2 started
Sep 6 14:43:23 machost pppd[6334]: IPSec phase 2 established
Sep 6 14:43:23 machost pppd[6334]: IPSec connection established
Sep 6 14:43:23 machost pppd[6334]: L2TP sent SCCRQ
Sep 6 14:43:43 machost pppd[6334]: L2TP cannot connect to the server
Sep 6 14:43:43 machost pppd[6334]: host_gateway: write routing socket
failed, No such process
Sep 6 14:43:43 machost pppd[6334]: Exit.
I use Shorewall for my firewall; I've got logging turned up for it as
well - for now, I can see the following packet info:
Sep 6 14:47:36 gateway kernel: [229842.380038]
Shorewall:vpn2fw:ACCEPT:IN=eth0 OUT= MAC=<blah> SRC=<foo>
DST=<gateway's external IP> LEN=88 TOS=0x00 PREC=0x00 TTL=63 ID=52943
PROTO=UDP SPT=53790 DPT=1701 LEN=68
So it looks to me like the packets are getting through to xl2tpd... but
nothing is coming back out...
Similarly, there is no 'ppp' interface of any kind; I had gathered that
xl2tpd would create one; nothing's happening, so I'm confused there.
Then there's a bit of confusion on my part about netkey: From what I
gather, if eth1 is my 'external' interface and is connected to the
internet directly, then with netkey, any incoming IPsec is decrypted
and re-appears on eth1 again.
If I understand that correctly, then any existing firewall rules that
block incoming connections to eth1 would have to be re-written, or else
the decrypted IPsec traffic would be filtered by the firewall as
well... right? (or am I wrong...)
Any guidance would be appreciated...
--
Troy Telford
More information about the Users
mailing list