[Openswan Users] Interoperability between openswan and HPUX-IPSEC.

Chakravarthy, Chintagunta Murali Mohan (HPUX-Network Security) murali-mohan.chakravarthy at hp.com
Tue Aug 23 09:49:26 EDT 2011


Hi,

I'm a newbie to Openswan, I'm trying see if Openswan and HPUX can interoperate with each other.

Though I'm successful until some extent but not completely.

Here is the issue I'm facing.

I'm able to form a IKEV1 SA successfully but not able to form a IPSEC SA. The IPSEC SA is formed in larval state but doesn't  get established.

The intension is to secure telnet between the two machines.

Can someone help?? If you need more information I would be happy to provide.

Here is the info.


[root at rtrbl2 ~]# setkey -D
192.168.0.197 10.1.0.171
        esp mode=transport spi=2787419998(0xa624a75e) reqid=16389(0x00004005)
        seq=0x00000000 replay=0 flags=0x00000000 state=larval
        created: Aug 23 18:47:47 2011   current: Aug 23 18:48:16 2011
        diff: 29(s)     hard: 30(s)     soft: 0(s)
        last:                           hard: 0(s)      soft: 0(s)
        current: 0(bytes)       hard: 0(bytes)  soft: 0(bytes)
        allocated: 0    hard: 0 soft: 0
        sadb_seq=0 pid=5961 refcnt=0



Here is my /etc/ipsec.conf file

# /etc/ipsec.conf - Openswan IPsec configuration file

# This file:  /usr/local/share/doc/openswan/ipsec.conf-sample
#
# Manual:     ipsec.conf.5


version 2.0     # conforms to second version of ipsec.conf specification

# basic configuration
config setup
        # Do not set debug options to debug configuration issues!
        # plutodebug / klipsdebug = "all", "none" or a combation from below:
        # "raw crypt parsing emitting control klips pfkey natt x509 dpd private"
        # eg:
        # plutodebug="control parsing"
        # Again: only enable plutodebug or klipsdebug when asked by a developer
        #
        # enable to get logs per-peer
        # plutoopts="--perpeerlog"
        #
        # Enable core dumps (might require system changes, like ulimit -C)
        # This is required for abrtd to work properly
        # Note: incorrect SElinux policies might prevent pluto writing the core
        dumpdir=/var/run/pluto/
        #
        # NAT-TRAVERSAL support, see README.NAT-Traversal
#       nat_traversal=yes
        # exclude networks used on server side by adding %v4:!a.b.c.0/24
        # It seems that T-Mobile in the US and Rogers/Fido in Canada are
        # using %v4:25/8 as "private" address space on their 3G network.
        # This range has not been announced via BGP (at least upto 2010-12-21)
#       virtual_private=%v4:10.0.0.0/8,%v4:192.168.0.0/16,%v4:172.16.0.0/12,%v4:25/8
        # OE is now off by default. Uncomment and change to on, to enable.
        oe=off
        # which IPsec stack to use. auto will try netkey, then klips then mast
#       protostack=auto
        protostack=netkey

# Add connections here

# sample VPN connection
# for more examples, see /etc/ipsec.d/examples/
#conn sample
#               # Left security gateway, subnet behind it, nexthop toward right.
#               left=10.0.0.1
#               leftsubnet=172.16.0.0/24
#               leftnexthop=10.22.33.44
#               # Right security gateway, subnet behind it, nexthop toward left.
#               right=10.12.12.1
#               rightsubnet=192.168.0.0/24
#               rightnexthop=10.101.102.103
#               # To authorize this connection, but not actually start it,
#               # at startup, uncomment this.
#               #auto=add


conn hpux
        type=transport
        authby=secret
        keyexchange=ike
        left=10.1.0.171
        leftprotoport=tcp/telnet
        leftnexthop=%defaultroute
        right=192.168.0.197
        rightprotoport=tcp/telnet
        rightnexthop=%defaultroute
#        ikev2=insist
        pfs=yes
#       ike=aes128-sha1;dh24
        ike=3des-md5-modp1024
        phase2=esp
        phase2alg=3des-md5


Following is my configuration on HPUX


ms10# ipsec_config show all
             startup
           -autoboot  OFF
           -auditlvl  ERROR
           -auditdir  /var/adm/ipsec
            -maxsize  100
            -spi_min  0x12c
            -spi_max  0x2625a0
           -spd_soft  25
           -spd_hard  50
 -icmp_error_process  OFF

                auth  RHEL
            -remote   10.1.0.171/32
           -exchange  MM
           -priority  30
              -rtype  IPV4
                -rid  10.1.0.171/32
                -kmp  ikev1
       -local_method  PSK
      -remote_method  PSK
          -preshared  ipsec1234

               ikev1  default
              -group  2
               -hash  MD5
         -encryption  3DES
               -life  28800
                -pfs  OFF

               ikev2  default
              -group  2
               -hash  HMAC-SHA1
         -encryption  3DES
                -prf  HMAC-SHA1
               -life  28800
                -pfs  OFF

                host  TO_RHEL
             -source  192.168.0.197  /32/0-65535
        -destination  10.1.0.171/32/23
           -protocol  6
           -priority  40
             -action  ESP_3DES_HMAC_SHA1/28800/0
              -flags  NONE

                host  FROM_RHEL
             -source  192.168.0.197  /32/23
        -destination  10.1.0.171/32/0-65535
           -protocol  6
           -priority  50
             -action  ESP_3DES_HMAC_SHA1/28800/0
              -flags  NONE

                host  default
             -action  PASS


Thanks,
Murali
-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://lists.openswan.org/pipermail/users/attachments/20110823/e456a403/attachment.html 


More information about the Users mailing list