[Openswan Users] NAT-T detection and iPhone

Gerald Vogt vogt at spamcop.net
Tue Feb 22 03:09:12 EST 2011


Hi!

Before I continue searching forever: does anyone know whether the
iPhone (iOS 4.2.1) always want to use encapsulation mode for a
IPSec/L2TP connection? I am trying to get it connect to a server with
openswan 2.6.32 (and today with 2.6.33), public IP addresses on both
ends, i.e. without encapsulation. So far, the only way to get it
connected was to use "forceencaps=yes". But I would like to get rid of
that to have Windows connect without registry change...

Reading the logs makes me think whether the iPhone always wants
encapsulation regardless of it's IP address...

Thanks!

Cheers, Gerald

connection:

conn L2TP-PSK
        dpddelay=40
        dpdtimeout=130
        dpdaction=clear
        authby=secret
        pfs=no
        rekey=no
        keyingtries=3
        type=transport
        left=%defaultroute
        leftprotoport=17/1701
        right=%any
        rightprotoport=17/%any
#       rightsubnet=vhost:%priv,%no
#        forceencaps=yes
        auto=add

Log extract:

Feb 22 08:55:36 vpn pluto[5140]: "L2TP-PSK"[1] aaa.bbb.18.53 #1:
responding to Main Mode from unknown peer aaa.bbb.18.53
Feb 22 08:55:36 vpn pluto[5140]: "L2TP-PSK"[1] aaa.bbb.18.53 #1:
transition from state STATE_MAIN_R0 to state STATE_MAIN_R1
Feb 22 08:55:36 vpn pluto[5140]: "L2TP-PSK"[1] aaa.bbb.18.53 #1:
STATE_MAIN_R1: sent MR1, expecting MI2
Feb 22 08:55:36 vpn pluto[5140]: "L2TP-PSK"[1] aaa.bbb.18.53 #1:
NAT-Traversal: Result using draft-ietf-ipsec-nat-t-ike (MacOS X): no
NAT detected
Feb 22 08:55:36 vpn pluto[5140]: "L2TP-PSK"[1] aaa.bbb.18.53 #1:
transition from state STATE_MAIN_R1 to state STATE_MAIN_R2
Feb 22 08:55:36 vpn pluto[5140]: "L2TP-PSK"[1] aaa.bbb.18.53 #1:
STATE_MAIN_R2: sent MR2, expecting MI3
Feb 22 08:55:36 vpn pluto[5140]: "L2TP-PSK"[1] aaa.bbb.18.53 #1:
ignoring informational payload, type IPSEC_INITIAL_CONTACT
msgid=00000000
Feb 22 08:55:36 vpn pluto[5140]: "L2TP-PSK"[1] aaa.bbb.18.53 #1: Main
mode peer ID is ID_IPV4_ADDR: 'aaa.bbb.18.53'
Feb 22 08:55:36 vpn pluto[5140]: "L2TP-PSK"[1] aaa.bbb.18.53 #1:
transition from state STATE_MAIN_R2 to state STATE_MAIN_R3
Feb 22 08:55:36 vpn pluto[5140]: "L2TP-PSK"[1] aaa.bbb.18.53 #1: new
NAT mapping for #1, was aaa.bbb.18.53:500, now aaa.bbb.18.53:4500
Feb 22 08:55:36 vpn pluto[5140]: "L2TP-PSK"[1] aaa.bbb.18.53 #1:
STATE_MAIN_R3: sent MR3, ISAKMP SA established
{auth=OAKLEY_PRESHARED_KEY cipher=aes_256 prf=oakley_sha
group=modp1024}
Feb 22 08:55:36 vpn pluto[5140]: "L2TP-PSK"[1] aaa.bbb.18.53 #1: Dead
Peer Detection (RFC 3706): enabled
Feb 22 08:55:37 vpn pluto[5140]: "L2TP-PSK"[1] aaa.bbb.18.53 #1: the
peer proposed: aaa.bbb.30.106/32:17/1701 -> aaa.bbb.18.53/32:17/0
Feb 22 08:55:37 vpn pluto[5140]: "L2TP-PSK"[1] aaa.bbb.18.53 #2:
ENCAPSULATION_MODE_UDP_TRANSPORT_RFC must only be used if
NAT-Traversal is detected
Feb 22 08:55:37 vpn pluto[5140]: "L2TP-PSK"[1] aaa.bbb.18.53 #2:
sending encrypted notification BAD_PROPOSAL_SYNTAX to
aaa.bbb.18.53:4500


More information about the Users mailing list