[Openswan Users] Openswan 2.6.32 / xl2tpd not working with Windows XP

Jai Dhar jdhar at fps-tech.net
Thu Jan 6 10:32:28 EST 2011


...some more information... I was able to get it to work by targeting
the internal IP of the VPN server, as opposed to the external router.
The internal IP is 192.168.1.200, and the External IP of the router is
24.6.221.176. If I set it to 192.186.1.200 it works. I believe I have
the right ports opened, and as I mentioned it works with iPad (ports
1701, 500 and 4500).

 Here is the log when it works from XP:


Jan  6 07:29:12 viammc pluto[18392]: packet from 192.168.1.201:500:
ignoring Vendor ID payload [MS NT5 ISAKMPOAKLEY 00000004]
Jan  6 07:29:12 viammc pluto[18392]: packet from 192.168.1.201:500:
ignoring Vendor ID payload [FRAGMENTATION]
Jan  6 07:29:12 viammc pluto[18392]: packet from 192.168.1.201:500:
received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n] method
set to=106
Jan  6 07:29:12 viammc pluto[18392]: packet from 192.168.1.201:500:
ignoring Vendor ID payload [Vid-Initial-Contact]
Jan  6 07:29:12 viammc pluto[18392]: "L2TP-PSK-NAT"[1] 192.168.1.201
#1: responding to Main Mode from unknown peer 192.168.1.201
Jan  6 07:29:12 viammc pluto[18392]: "L2TP-PSK-NAT"[1] 192.168.1.201
#1: transition from state STATE_MAIN_R0 to state STATE_MAIN_R1
Jan  6 07:29:12 viammc pluto[18392]: "L2TP-PSK-NAT"[1] 192.168.1.201
#1: STATE_MAIN_R1: sent MR1, expecting MI2
Jan  6 07:29:12 viammc pluto[18392]: "L2TP-PSK-NAT"[1] 192.168.1.201
#1: NAT-Traversal: Result using draft-ietf-ipsec-nat-t-ike-02/03: no
NAT detected
Jan  6 07:29:12 viammc pluto[18392]: "L2TP-PSK-NAT"[1] 192.168.1.201
#1: transition from state STATE_MAIN_R1 to state STATE_MAIN_R2
Jan  6 07:29:12 viammc pluto[18392]: "L2TP-PSK-NAT"[1] 192.168.1.201
#1: STATE_MAIN_R2: sent MR2, expecting MI3
Jan  6 07:29:12 viammc pluto[18392]: "L2TP-PSK-NAT"[1] 192.168.1.201
#1: Main mode peer ID is ID_IPV4_ADDR: '192.168.1.201'
Jan  6 07:29:12 viammc pluto[18392]: "L2TP-PSK-NAT"[1] 192.168.1.201
#1: transition from state STATE_MAIN_R2 to state STATE_MAIN_R3
Jan  6 07:29:12 viammc pluto[18392]: "L2TP-PSK-NAT"[1] 192.168.1.201
#1: STATE_MAIN_R3: sent MR3, ISAKMP SA established
{auth=OAKLEY_PRESHARED_KEY cipher=oakley_3des_cbc_192 prf=oakley_sha
group=modp2048}
Jan  6 07:29:12 viammc pluto[18392]: "L2TP-PSK-NAT"[1] 192.168.1.201
#1: the peer proposed: 192.168.1.200/32:17/1701 ->
192.168.1.201/32:17/0
Jan  6 07:29:12 viammc pluto[18392]: "L2TP-PSK-NAT"[1] 192.168.1.201
#2: responding to Quick Mode proposal {msgid:c513f0af}
Jan  6 07:29:12 viammc pluto[18392]: "L2TP-PSK-NAT"[1] 192.168.1.201
#2:     us: 192.168.1.200<192.168.1.200>[+S=C]:17/1701
Jan  6 07:29:12 viammc pluto[18392]: "L2TP-PSK-NAT"[1] 192.168.1.201
#2:   them: 192.168.1.201[+S=C]:17/1701
Jan  6 07:29:12 viammc pluto[18392]: "L2TP-PSK-NAT"[1] 192.168.1.201
#2: transition from state STATE_QUICK_R0 to state STATE_QUICK_R1
Jan  6 07:29:12 viammc pluto[18392]: "L2TP-PSK-NAT"[1] 192.168.1.201
#2: STATE_QUICK_R1: sent QR1, inbound IPsec SA installed, expecting
QI2
Jan  6 07:29:12 viammc pluto[18392]: "L2TP-PSK-NAT"[1] 192.168.1.201
#2: transition from state STATE_QUICK_R1 to state STATE_QUICK_R2
Jan  6 07:29:12 viammc pluto[18392]: "L2TP-PSK-NAT"[1] 192.168.1.201
#2: STATE_QUICK_R2: IPsec SA established transport mode
{ESP=>0xcfcae264 <0x8776790e xfrm=3DES_0-HMAC_MD5 NATOA=none NATD=none
DPD=none}

One thing I notice different from the non-working log is the following line:

netlink_raw_eroute: WARNING: that_client port 0 and that_host port
1701 don't match. Using that_client port.

Any ideas?

J
On Wed, Jan 5, 2011 at 11:41 PM, Jai Dhar <jdhar at fps-tech.net> wrote:
> I have my setup working with iPad/iPhone, but not XP. Here is the
> working output from ipsec for the working session:
>
> Jan  5 23:17:34 viammc pluto[3598]: packet from 192.168.1.1:500:
> received Vendor ID payload [RFC 3947] method set to=109
> Jan  5 23:17:34 viammc pluto[3598]: packet from 192.168.1.1:500:
> received Vendor ID payload [draft-ietf-ipsec-nat-t-ike] method set
> to=110
> Jan  5 23:17:34 viammc pluto[3598]: packet from 192.168.1.1:500:
> ignoring unknown Vendor ID payload [8f8d83826d246b6fc7a8a6a428c11de8]
> Jan  5 23:17:34 viammc pluto[3598]: packet from 192.168.1.1:500:
> ignoring unknown Vendor ID payload [439b59f8ba676c4c7737ae22eab8f582]
> Jan  5 23:17:34 viammc pluto[3598]: packet from 192.168.1.1:500:
> ignoring unknown Vendor ID payload [4d1e0e136deafa34c4f3ea9f02ec7285]
> Jan  5 23:17:34 viammc pluto[3598]: packet from 192.168.1.1:500:
> ignoring unknown Vendor ID payload [80d0bb3def54565ee84645d4c85ce3ee]
> Jan  5 23:17:34 viammc pluto[3598]: packet from 192.168.1.1:500:
> ignoring unknown Vendor ID payload [9909b64eed937c6573de52ace952fa6b]
> Jan  5 23:17:34 viammc pluto[3598]: packet from 192.168.1.1:500:
> received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03] meth=108,
> but already using method 110
> Jan  5 23:17:34 viammc pluto[3598]: packet from 192.168.1.1:500:
> received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02] meth=107,
> but already using method 110
> Jan  5 23:17:34 viammc pluto[3598]: packet from 192.168.1.1:500:
> received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n] meth=106,
> but already using method 110
> Jan  5 23:17:34 viammc pluto[3598]: packet from 192.168.1.1:500:
> received Vendor ID payload [Dead Peer Detection]
> Jan  5 23:17:34 viammc pluto[3598]: "L2TP-PSK-NAT"[1] 192.168.1.1 #1:
> responding to Main Mode from unknown peer 192.168.1.1
> Jan  5 23:17:34 viammc pluto[3598]: "L2TP-PSK-NAT"[1] 192.168.1.1 #1:
> transition from state STATE_MAIN_R0 to state STATE_MAIN_R1
> Jan  5 23:17:34 viammc pluto[3598]: "L2TP-PSK-NAT"[1] 192.168.1.1 #1:
> STATE_MAIN_R1: sent MR1, expecting MI2
> Jan  5 23:17:35 viammc pluto[3598]: "L2TP-PSK-NAT"[1] 192.168.1.1 #1:
> NAT-Traversal: Result using draft-ietf-ipsec-nat-t-ike (MacOS X): both
> are NATed
> Jan  5 23:17:35 viammc pluto[3598]: "L2TP-PSK-NAT"[1] 192.168.1.1 #1:
> transition from state STATE_MAIN_R1 to state STATE_MAIN_R2
> Jan  5 23:17:35 viammc pluto[3598]: "L2TP-PSK-NAT"[1] 192.168.1.1 #1:
> STATE_MAIN_R2: sent MR2, expecting MI3
> Jan  5 23:17:35 viammc pluto[3598]: "L2TP-PSK-NAT"[1] 192.168.1.1 #1:
> ignoring informational payload, type IPSEC_INITIAL_CONTACT
> msgid=00000000
> Jan  5 23:17:35 viammc pluto[3598]: "L2TP-PSK-NAT"[1] 192.168.1.1 #1:
> Main mode peer ID is ID_IPV4_ADDR: '192.168.1.109'
> Jan  5 23:17:35 viammc pluto[3598]: "L2TP-PSK-NAT"[1] 192.168.1.1 #1:
> switched from "L2TP-PSK-NAT" to "L2TP-PSK-NAT"
> Jan  5 23:17:35 viammc pluto[3598]: "L2TP-PSK-NAT"[2] 192.168.1.1 #1:
> deleting connection "L2TP-PSK-NAT" instance with peer 192.168.1.1
> {isakmp=#0/ipsec=#0}
> Jan  5 23:17:35 viammc pluto[3598]: "L2TP-PSK-NAT"[2] 192.168.1.1 #1:
> transition from state STATE_MAIN_R2 to state STATE_MAIN_R3
> Jan  5 23:17:35 viammc pluto[3598]: "L2TP-PSK-NAT"[2] 192.168.1.1 #1:
> new NAT mapping for #1, was 192.168.1.1:500, now 192.168.1.1:1024
> Jan  5 23:17:35 viammc pluto[3598]: "L2TP-PSK-NAT"[2] 192.168.1.1 #1:
> STATE_MAIN_R3: sent MR3, ISAKMP SA established
> {auth=OAKLEY_PRESHARED_KEY cipher=aes_256 prf=oakley_sha
> group=modp1024}
> Jan  5 23:17:36 viammc pluto[3598]: "L2TP-PSK-NAT"[2] 192.168.1.1 #1:
> the peer proposed: 24.6.221.176/32:17/1701 -> 192.168.1.109/32:17/0
> Jan  5 23:17:36 viammc pluto[3598]: "L2TP-PSK-NAT"[2] 192.168.1.1 #2:
> responding to Quick Mode proposal {msgid:a2d658cd}
> Jan  5 23:17:36 viammc pluto[3598]: "L2TP-PSK-NAT"[2] 192.168.1.1 #2:
>   us: 192.168.1.200<192.168.1.200>[+S=C]:17/1701
> Jan  5 23:17:36 viammc pluto[3598]: "L2TP-PSK-NAT"[2] 192.168.1.1 #2:
>  them: 192.168.1.1[192.168.1.109,+S=C]:17/52181===192.168.1.109/32
> Jan  5 23:17:36 viammc pluto[3598]: "L2TP-PSK-NAT"[2] 192.168.1.1 #2:
> transition from state STATE_QUICK_R0 to state STATE_QUICK_R1
> Jan  5 23:17:36 viammc pluto[3598]: "L2TP-PSK-NAT"[2] 192.168.1.1 #2:
> STATE_QUICK_R1: sent QR1, inbound IPsec SA installed, expecting QI2
> Jan  5 23:17:36 viammc pluto[3598]: "L2TP-PSK-NAT"[2] 192.168.1.1 #2:
> transition from state STATE_QUICK_R1 to state STATE_QUICK_R2
> Jan  5 23:17:36 viammc pluto[3598]: "L2TP-PSK-NAT"[2] 192.168.1.1 #2:
> STATE_QUICK_R2: IPsec SA established transport mode {ESP=>0x01b6135a
> <0xaebdad31 xfrm=AES_256-HMAC_SHA1 NATOA=none NATD=192.168.1.1:1024
> DPD=none}
>
> ----------
>
> Here is the non-working XP client:
> Jan  5 22:40:05 viammc pluto[31255]: packet from 192.168.1.1:500:
> ignoring Vendor ID payload [MS NT5 ISAKMPOAKLEY 00000004]
> Jan  5 22:40:05 viammc pluto[31255]: packet from 192.168.1.1:500:
> ignoring Vendor ID payload [FRAGMENTATION]
> Jan  5 22:40:05 viammc pluto[31255]: packet from 192.168.1.1:500:
> received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n] method
> set to=106
> Jan  5 22:40:05 viammc pluto[31255]: packet from 192.168.1.1:500:
> ignoring Vendor ID payload [Vid-Initial-Contact]
> Jan  5 22:40:05 viammc pluto[31255]: "L2TP-PSK-NAT"[1] 192.168.1.1 #1:
> responding to Main Mode from unknown peer 192.168.1.1
> Jan  5 22:40:05 viammc pluto[31255]: "L2TP-PSK-NAT"[1] 192.168.1.1 #1:
> transition from state STATE_MAIN_R0 to state STATE_MAIN_R1
> Jan  5 22:40:05 viammc pluto[31255]: "L2TP-PSK-NAT"[1] 192.168.1.1 #1:
> STATE_MAIN_R1: sent MR1, expecting MI2
> Jan  5 22:40:06 viammc pluto[31255]: "L2TP-PSK-NAT"[1] 192.168.1.1 #1:
> NAT-Traversal: Result using draft-ietf-ipsec-nat-t-ike-02/03: both are
> NATed
> Jan  5 22:40:06 viammc pluto[31255]: "L2TP-PSK-NAT"[1] 192.168.1.1 #1:
> transition from state STATE_MAIN_R1 to state STATE_MAIN_R2
> Jan  5 22:40:06 viammc pluto[31255]: "L2TP-PSK-NAT"[1] 192.168.1.1 #1:
> STATE_MAIN_R2: sent MR2, expecting MI3
> Jan  5 22:40:06 viammc pluto[31255]: "L2TP-PSK-NAT"[1] 192.168.1.1 #1:
> Main mode peer ID is ID_FQDN: '@vialaptop'
> Jan  5 22:40:06 viammc pluto[31255]: "L2TP-PSK-NAT"[1] 192.168.1.1 #1:
> switched from "L2TP-PSK-NAT" to "L2TP-PSK-NAT"
> Jan  5 22:40:06 viammc pluto[31255]: "L2TP-PSK-NAT"[2] 192.168.1.1 #1:
> deleting connection "L2TP-PSK-NAT" instance with peer 192.168.1.1
> {isakmp=#0/ipsec=#0}
> Jan  5 22:40:06 viammc pluto[31255]: "L2TP-PSK-NAT"[2] 192.168.1.1 #1:
> transition from state STATE_MAIN_R2 to state STATE_MAIN_R3
> Jan  5 22:40:06 viammc pluto[31255]: "L2TP-PSK-NAT"[2] 192.168.1.1 #1:
> new NAT mapping for #1, was 192.168.1.1:500, now 192.168.1.1:4500
> Jan  5 22:40:06 viammc pluto[31255]: "L2TP-PSK-NAT"[2] 192.168.1.1 #1:
> STATE_MAIN_R3: sent MR3, ISAKMP SA established
> {auth=OAKLEY_PRESHARED_KEY cipher=oakley_3des_cbc_192 prf=oakley_sha
> group=modp2048}
> Jan  5 22:40:06 viammc pluto[31255]: "L2TP-PSK-NAT"[2] 192.168.1.1 #1:
> peer client type is FQDN
> Jan  5 22:40:06 viammc pluto[31255]: "L2TP-PSK-NAT"[2] 192.168.1.1 #1:
> Applying workaround for MS-818043 NAT-T bug
> Jan  5 22:40:06 viammc pluto[31255]: "L2TP-PSK-NAT"[2] 192.168.1.1 #1:
> IDci was FQDN: \030\006\335\260, using NAT_OA=192.168.1.108/32 0 as
> IDci
> Jan  5 22:40:06 viammc pluto[31255]: "L2TP-PSK-NAT"[2] 192.168.1.1 #1:
> the peer proposed: 24.6.221.176/32:17/1701 -> 192.168.1.108/32:17/0
> Jan  5 22:40:06 viammc pluto[31255]: "L2TP-PSK-NAT"[2] 192.168.1.1 #2:
> responding to Quick Mode proposal {msgid:6e496c91}
> Jan  5 22:40:06 viammc pluto[31255]: "L2TP-PSK-NAT"[2] 192.168.1.1 #2:
>    us: 192.168.1.200<192.168.1.200>[+S=C]:17/1701
> Jan  5 22:40:06 viammc pluto[31255]: "L2TP-PSK-NAT"[2] 192.168.1.1 #2:
>  them: 192.168.1.1[@vialaptop,+S=C]:17/1701===192.168.1.108/32
> Jan  5 22:40:06 viammc pluto[31255]: "L2TP-PSK-NAT"[2] 192.168.1.1 #2:
> transition from state STATE_QUICK_R0 to state STATE_QUICK_R1
> Jan  5 22:40:06 viammc pluto[31255]: "L2TP-PSK-NAT"[2] 192.168.1.1 #2:
> STATE_QUICK_R1: sent QR1, inbound IPsec SA installed, expecting QI2
> Jan  5 22:40:06 viammc pluto[31255]: "L2TP-PSK-NAT"[2] 192.168.1.1 #2:
> netlink_raw_eroute: WARNING: that_client port 0 and that_host port
> 1701 don't match. Using that_client port.
> Jan  5 22:40:06 viammc pluto[31255]: "L2TP-PSK-NAT"[2] 192.168.1.1 #2:
> transition from state STATE_QUICK_R1 to state STATE_QUICK_R2
> Jan  5 22:40:06 viammc pluto[31255]: "L2TP-PSK-NAT"[2] 192.168.1.1 #2:
> STATE_QUICK_R2: IPsec SA established transport mode {ESP=>0x96a05f3a
> <0x59e7df1b xfrm=3DES_0-HMAC_MD5 NATOA=192.168.1.108
> NATD=192.168.1.1:4500 DPD=none}
>
>
> In XP, I have set it to IPSEC L2TP and MSCHAP-v2.
>
> Lastly, when I run xl2tpd in non-daemon mode with xl2tpd -D, there is
> no output shown for the non-working XP case. For the iPad, I see the
> connection established and PPPD started, but nothing happens with XP.
>
> This is done on a double-NAT setup, with both the server and client on
> the same subnet behind the same router for testing.
>
> --
> Jai Dhar
> FPS-Tech, Santa Clara, CA
> Web: http://www.fps-tech.net
> Phone: 408-982-7407
>



-- 
Jai Dhar
FPS-Tech, Santa Clara, CA
Web: http://www.fps-tech.net
Phone: 408-982-7407


More information about the Users mailing list