[Openswan Users] Openswan 2.6.32 / xl2tpd not working with Windows XP

Wolfgang Nothdurft wolfgang at linogate.de
Wed Jan 12 11:08:11 EST 2011


Am 08.01.2011 01:02, schrieb Jai Dhar:
> Paul,
> 
>> I dont try. Try a system update? :)
>>
> 
> Looks like up I'm up to date.
> 
>>
>> I am not sure what "internal IP" case is. You showed:
>>
>>>> STATE_QUICK_R2: IPsec SA established transport mode {ESP=>0x96a05f3a
>>>> <0x59e7df1b xfrm=3DES_0-HMAC_MD5 NATOA=192.168.1.108
>>>> NATD=192.168.1.1:4500 DPD=none}
>>
>> Since NATD and NATOA is not "none", this means UDP encapsulation is
>> negoatiated
>> and expected.
>>
> 
> The internal case is when I point my XP machine to the VPN servers
> address internally, as opposed to forcing to leave the local network
> by providing the external address (the routers address essentially).
> This is the log excerpt from the internal case:
> 
> Jan  6 07:29:12 viammc pluto[18392]: "L2TP-PSK-NAT"[1] 192.168.1.201
> #2: transition from state STATE_QUICK_R1 to state STATE_QUICK_R2
> Jan  6 07:29:12 viammc pluto[18392]: "L2TP-PSK-NAT"[1] 192.168.1.201
> #2: STATE_QUICK_R2: IPsec SA established transport mode
> {ESP=>0xcfcae264 <0x8776790e xfrm=3DES_0-HMAC_MD5 NATOA=none NATD=none
> DPD=none}
> 
> I guess both NATOA and NATD are none, meaning it is not encapsulating
> in UDP for this case, which makes sense...
> 
>> New connections should replace the older ones, so I am not sure why you see
>> this.
>>
> 
> It was the same thing the other user in the thread I pointed to saw,
> but that's minor compared to this...
> 
> Is there anything you else you can think of that will help me diagnose
> this? I'm not ready to write this off just yet, but not being able to
> XP in will kind of kill the whole Openswan route. Could it be anything
> configuration related? I'll post my config again:
> 
> # basic configuration
> config setup
>         # Do not set debug options to debug configuration issues!
>         # plutodebug / klipsdebug = "all", "none" or a combation from below:
>         # "raw crypt parsing emitting control klips pfkey natt x509 dpd private"
>         # eg:
>         # plutodebug="control parsing"
>         #
>         # enable to get logs per-peer
>         # plutoopts="--perpeerlog"
>         #
>         # Again: only enable plutodebug or klipsdebug when asked by a developer
>         #
>         # NAT-TRAVERSAL support, see README.NAT-Traversal
>         nat_traversal=yes
>         # exclude networks used on server side by adding %v4:!a.b.c.0/24
>         virtual_private=%v4:10.0.0.0/8,%v4:192.168.0.0/16,%v4:172.16.0.0/12
>         # OE is now off by default. Uncomment and change to on, to enable.
>         oe=off
>         # which IPsec stack to use. auto will try netkey, then klips then mast
>         protostack=auto
>         #plutostderrlog=/var/log/ipsec.log
>         plutodebug=none
>         syslog=daemon.err
> 
> 
> # Add connections here
> conn L2TP-PSK-NAT
>     rightsubnet=vhost:%priv,%no
>     also=L2TP-PSK-noNAT
> 
> conn L2TP-PSK-noNAT
>     authby=secret
>     pfs=no
>     auto=add
>     keyingtries=3
>     rekey=no
>     ikelifetime=8h
>     keylife=1h
>     type=transport
>     left=192.168.1.200
>     leftprotoport=17/1701
>     right=%any
>     rightprotoport=17/%any
>     #Windows
>     #rightsubnet=vhost:%priv,%no
> 
> Thanks,
> 
> J
>> Paul
>>
> 
> 
> 

Hi,

have a look at https://gsoc.xelerance.com/issues/601 , may be you have a
problem with bad UDP checksums and therefore the l2tp packets were
dropped from the kernel.

Regards
Wolfgang


More information about the Users mailing list