[Openswan Users] Problems using openswan and KLIPS on alias interface

Diogo V. kersting k at brlix.com
Wed Apr 27 13:49:04 EDT 2011


Thanks for your answer. That did not solve the problem:
Here is what I used:

# ipsec --version
Linux Openswan 2.6.33 (klips)

# uname -r
2.6.38-xeon

# ifconfig eth0
eth0       Encapsulamento do Link: Ethernet  Endereço de HW 00:16:3E:71:03:03
          inet end.: 192.168.10.230  Bcast:192.168.10.255  Masc:255.255.255.0

# ifconfig eth0:4
eth0:4     Encapsulamento do Link: Ethernet  Endereço de HW 00:16:3E:71:03:03
          inet end.: 192.168.15.1  Bcast:192.168.15.255  Masc:255.255.255.0

###ipsec.conf###

version 2.0

config setup
        interfaces="ipsec0=eth0 ipsec1=eth0:4"
        protostack=klips

conn vpn1
   authby=secret
   auto=add
   type=tunnel
   left=192.168.10.230
   right=192.168.10.70

conn vpn2
   authby=secret
   auto=add
   type=tunnel
   left=192.168.15.1
   right=192.168.15.70

###end ipsec.conf###

# ipsec auto --up vpn1
104 "vpn1" #1: STATE_MAIN_I1: initiate
003 "vpn1" #1: received Vendor ID payload [Openswan (this version) 2.6.33 ]
003 "vpn1" #1: received Vendor ID payload [Dead Peer Detection]
106 "vpn1" #1: STATE_MAIN_I2: sent MI2, expecting MR2
108 "vpn1" #1: STATE_MAIN_I3: sent MI3, expecting MR3
003 "vpn1" #1: received Vendor ID payload [CAN-IKEv2]
004 "vpn1" #1: STATE_MAIN_I4: ISAKMP SA established
{auth=OAKLEY_PRESHARED_KEY cipher=aes_128 prf=oakley_sha
group=modp2048}
117 "vpn1" #2: STATE_QUICK_I1: initiate
004 "vpn1" #2: STATE_QUICK_I2: sent QI2, IPsec SA established tunnel
mode {ESP=>0xdcbbb294 <0x0ee2a930 xfrm=AES_128-HMAC_SHA1 NATOA=none
NATD=none DPD=none}

// vpn1 works!

root at desenv1:/usr/local/ipsec/etc# $IPSEC auto --down vpn1
root at desenv1:/usr/local/ipsec/etc# $IPSEC auto --up vpn2
022 "vpn2": We cannot identify ourselves with either end of this connection.

// vpn2 doesn't.


Any suggestions?
--
Diogo V. Kersting - Epidemus LTDA


More information about the Users mailing list