[Openswan Users] Connecting to a VPN through Ubuntu

Rogelio Alejandro Ortiz Sevilla rogelio.sevilla1 at gmail.com
Fri Sep 9 14:03:11 EDT 2011


Good day everyone, this is my first post, sorry if my question is too basic.

I'm trying to connect to a VPN through my Ubuntu desktop machine. The other
windows users on my office are using the Sonic Wall Global VPN Client so I
decided to go with openswan since i'm using ubuntu.

The problem is that, when i try to connect, i just get an #500 error and
everything stops. I'm sorry, networks are honestly not my strong point.

When i checked the var/log/auth.log file, this is the content i found:





Sep  9 12:49:25 rogeliosevilla1-laptop ipsec__plutorun: Starting Pluto
subsystem...
Sep  9 12:49:25 rogeliosevilla1-laptop pluto[10899]: Starting Pluto
(Openswan Version 2.6.23; Vendor ID OEm at kgSFEH@\177) pid:10899
Sep  9 12:49:25 rogeliosevilla1-laptop pluto[10899]: Setting NAT-Traversal
port-4500 floating to on
Sep  9 12:49:25 rogeliosevilla1-laptop pluto[10899]:    port floating
activation criteria nat_t=1/port_float=1
Sep  9 12:49:25 rogeliosevilla1-laptop pluto[10899]:    including
NAT-Traversal patch (Version 0.6c)
Sep  9 12:49:25 rogeliosevilla1-laptop pluto[10899]: using /dev/urandom as
source of random entropy
Sep  9 12:49:25 rogeliosevilla1-laptop pluto[10899]: ike_alg_register_enc():
Activating OAKLEY_TWOFISH_CBC_SSH: Ok (ret=0)
Sep  9 12:49:25 rogeliosevilla1-laptop pluto[10899]: ike_alg_register_enc():
Activating OAKLEY_TWOFISH_CBC: Ok (ret=0)
Sep  9 12:49:25 rogeliosevilla1-laptop pluto[10899]: ike_alg_register_enc():
Activating OAKLEY_SERPENT_CBC: Ok (ret=0)
Sep  9 12:49:25 rogeliosevilla1-laptop pluto[10899]: ike_alg_register_enc():
Activating OAKLEY_AES_CBC: Ok (ret=0)
Sep  9 12:49:25 rogeliosevilla1-laptop pluto[10899]: ike_alg_register_enc():
Activating OAKLEY_BLOWFISH_CBC: Ok (ret=0)
Sep  9 12:49:25 rogeliosevilla1-laptop pluto[10899]:
ike_alg_register_hash(): Activating OAKLEY_SHA2_512: Ok (ret=0)
Sep  9 12:49:25 rogeliosevilla1-laptop pluto[10899]:
ike_alg_register_hash(): Activating OAKLEY_SHA2_256: Ok (ret=0)
Sep  9 12:49:25 rogeliosevilla1-laptop pluto[10899]: starting up 7
cryptographic helpers
Sep  9 12:49:25 rogeliosevilla1-laptop pluto[10899]: started helper
pid=10902 (fd:7)
Sep  9 12:49:25 rogeliosevilla1-laptop pluto[10899]: started helper
pid=10903 (fd:8)
Sep  9 12:49:25 rogeliosevilla1-laptop pluto[10902]: using /dev/urandom as
source of random entropy
Sep  9 12:49:25 rogeliosevilla1-laptop pluto[10899]: started helper
pid=10904 (fd:9)
Sep  9 12:49:25 rogeliosevilla1-laptop pluto[10899]: started helper
pid=10905 (fd:10)
Sep  9 12:49:25 rogeliosevilla1-laptop pluto[10903]: using /dev/urandom as
source of random entropy
Sep  9 12:49:25 rogeliosevilla1-laptop pluto[10899]: started helper
pid=10906 (fd:11)
Sep  9 12:49:25 rogeliosevilla1-laptop pluto[10899]: started helper
pid=10907 (fd:12)
Sep  9 12:49:25 rogeliosevilla1-laptop pluto[10904]: using /dev/urandom as
source of random entropy
Sep  9 12:49:25 rogeliosevilla1-laptop pluto[10899]: started helper
pid=10908 (fd:13)
Sep  9 12:49:25 rogeliosevilla1-laptop pluto[10899]: Using Linux 2.6 IPsec
interface code on 2.6.32-33-generic-pae (experimental code)
Sep  9 12:49:25 rogeliosevilla1-laptop pluto[10907]: using /dev/urandom as
source of random entropy
Sep  9 12:49:25 rogeliosevilla1-laptop pluto[10908]: using /dev/urandom as
source of random entropy
Sep  9 12:49:25 rogeliosevilla1-laptop pluto[10906]: using /dev/urandom as
source of random entropy
Sep  9 12:49:25 rogeliosevilla1-laptop pluto[10905]: using /dev/urandom as
source of random entropy
Sep  9 12:49:25 rogeliosevilla1-laptop pluto[10899]: ike_alg_register_enc():
WARNING: enc alg=0 not found in constants.c:oakley_enc_names
Sep  9 12:49:25 rogeliosevilla1-laptop pluto[10899]: ike_alg_register_enc():
Activating <NULL>: Ok (ret=0)
Sep  9 12:49:25 rogeliosevilla1-laptop pluto[10899]: ike_alg_register_enc():
WARNING: enc alg=0 not found in constants.c:oakley_enc_names
Sep  9 12:49:25 rogeliosevilla1-laptop pluto[10899]: ike_alg_add(): ERROR:
Algorithm already exists
Sep  9 12:49:25 rogeliosevilla1-laptop pluto[10899]: ike_alg_register_enc():
Activating <NULL>: FAILED (ret=-17)
Sep  9 12:49:25 rogeliosevilla1-laptop pluto[10899]: ike_alg_register_enc():
WARNING: enc alg=0 not found in constants.c:oakley_enc_names
Sep  9 12:49:25 rogeliosevilla1-laptop pluto[10899]: ike_alg_add(): ERROR:
Algorithm already exists
Sep  9 12:49:25 rogeliosevilla1-laptop pluto[10899]: ike_alg_register_enc():
Activating <NULL>: FAILED (ret=-17)
Sep  9 12:49:25 rogeliosevilla1-laptop pluto[10899]: ike_alg_register_enc():
WARNING: enc alg=0 not found in constants.c:oakley_enc_names
Sep  9 12:49:25 rogeliosevilla1-laptop pluto[10899]: ike_alg_add(): ERROR:
Algorithm already exists
Sep  9 12:49:25 rogeliosevilla1-laptop pluto[10899]: ike_alg_register_enc():
Activating <NULL>: FAILED (ret=-17)
Sep  9 12:49:25 rogeliosevilla1-laptop pluto[10899]: ike_alg_register_enc():
WARNING: enc alg=0 not found in constants.c:oakley_enc_names
Sep  9 12:49:25 rogeliosevilla1-laptop pluto[10899]: ike_alg_add(): ERROR:
Algorithm already exists
Sep  9 12:49:25 rogeliosevilla1-laptop pluto[10899]: ike_alg_register_enc():
Activating <NULL>: FAILED (ret=-17)
Sep  9 12:49:25 rogeliosevilla1-laptop pluto[10899]: ike_alg_register_enc():
WARNING: enc alg=0 not found in constants.c:oakley_enc_names
Sep  9 12:49:25 rogeliosevilla1-laptop pluto[10899]: ike_alg_add(): ERROR:
Algorithm already exists
Sep  9 12:49:25 rogeliosevilla1-laptop pluto[10899]: ike_alg_register_enc():
Activating <NULL>: FAILED (ret=-17)
Sep  9 12:49:25 rogeliosevilla1-laptop pluto[10899]: Changed path to
directory '/etc/ipsec.d/cacerts'
Sep  9 12:49:25 rogeliosevilla1-laptop pluto[10899]: Changed path to
directory '/etc/ipsec.d/aacerts'
Sep  9 12:49:25 rogeliosevilla1-laptop pluto[10899]: Changed path to
directory '/etc/ipsec.d/ocspcerts'
Sep  9 12:49:25 rogeliosevilla1-laptop pluto[10899]: Changing to directory
'/etc/ipsec.d/crls'
Sep  9 12:49:25 rogeliosevilla1-laptop pluto[10899]:   Warning: empty
directory
Sep  9 12:49:25 rogeliosevilla1-laptop pluto[10899]: added connection
description "MyCompany_VPN"
Sep  9 12:49:25 rogeliosevilla1-laptop pluto[10899]: listening for IKE
messages
Sep  9 12:49:25 rogeliosevilla1-laptop pluto[10899]: NAT-Traversal: Trying
new style NAT-T
Sep  9 12:49:25 rogeliosevilla1-laptop pluto[10899]: NAT-Traversal:
ESPINUDP(1) setup failed for new style NAT-T family IPv4 (errno=19)
Sep  9 12:49:25 rogeliosevilla1-laptop pluto[10899]: NAT-Traversal: Trying
old style NAT-T
Sep  9 12:49:25 rogeliosevilla1-laptop pluto[10899]: adding interface
eth0/eth0 10.0.0.2:500
Sep  9 12:49:25 rogeliosevilla1-laptop pluto[10899]: adding interface
eth0/eth0 10.0.0.2:4500
Sep  9 12:49:25 rogeliosevilla1-laptop pluto[10899]: adding interface lo/lo
127.0.0.1:500
Sep  9 12:49:25 rogeliosevilla1-laptop pluto[10899]: adding interface lo/lo
127.0.0.1:4500
Sep  9 12:49:25 rogeliosevilla1-laptop pluto[10899]: adding interface lo/lo
::1:500
Sep  9 12:49:25 rogeliosevilla1-laptop pluto[10899]: loading secrets from
"/etc/ipsec.secrets"
Sep  9 12:49:25 rogeliosevilla1-laptop pluto[10899]: "MyCompany_VPN" #1:
initiating Main Mode
Sep  9 12:49:25 rogeliosevilla1-laptop pluto[10899]: "MyCompany_VPN" #1:
ignoring unknown Vendor ID payload [5b362bc820f60007]
Sep  9 12:49:25 rogeliosevilla1-laptop pluto[10899]: "MyCompany_VPN" #1:
received Vendor ID payload [RFC 3947] method set to=109
Sep  9 12:49:25 rogeliosevilla1-laptop pluto[10899]: "MyCompany_VPN" #1:
enabling possible NAT-traversal with method 4
Sep  9 12:49:25 rogeliosevilla1-laptop pluto[10899]: "MyCompany_VPN" #1:
transition from state STATE_MAIN_I1 to state STATE_MAIN_I2
Sep  9 12:49:25 rogeliosevilla1-laptop pluto[10899]: "MyCompany_VPN" #1:
STATE_MAIN_I2: sent MI2, expecting MR2
Sep  9 12:49:25 rogeliosevilla1-laptop pluto[10899]: "MyCompany_VPN" #1:
ignoring Vendor ID payload [Sonicwall 1 (TZ 170 Standard?)]
Sep  9 12:49:25 rogeliosevilla1-laptop pluto[10899]: "MyCompany_VPN" #1:
received Vendor ID payload [XAUTH]
Sep  9 12:49:25 rogeliosevilla1-laptop pluto[10899]: "MyCompany_VPN" #1:
received Vendor ID payload [Dead Peer Detection]
Sep  9 12:49:25 rogeliosevilla1-laptop pluto[10899]: "MyCompany_VPN" #1:
NAT-Traversal: Result using RFC 3947 (NAT-Traversal): i am NATed
Sep  9 12:49:25 rogeliosevilla1-laptop pluto[10899]: "MyCompany_VPN" #1:
transition from state STATE_MAIN_I2 to state STATE_MAIN_I3
Sep  9 12:49:25 rogeliosevilla1-laptop pluto[10899]: "MyCompany_VPN" #1:
STATE_MAIN_I3: sent MI3, expecting MR3
Sep  9 12:49:25 rogeliosevilla1-laptop pluto[10899]: "MyCompany_VPN" #1:
ignoring informational payload, type IPSEC_INITIAL_CONTACT msgid=00000000
Sep  9 12:49:25 rogeliosevilla1-laptop pluto[10899]: "MyCompany_VPN" #1:
Main mode peer ID is ID_IPV4_ADDR: 'myRemoteIp'
Sep  9 12:49:25 rogeliosevilla1-laptop pluto[10899]: "MyCompany_VPN" #1:
transition from state STATE_MAIN_I3 to state STATE_MAIN_I4
Sep  9 12:49:25 rogeliosevilla1-laptop pluto[10899]: "MyCompany_VPN" #1:
STATE_MAIN_I4: ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY
cipher=aes_128 prf=oakley_sha group=modp1024}
Sep  9 12:49:25 rogeliosevilla1-laptop pluto[10899]: "MyCompany_VPN" #2:
initiating Quick Mode PSK+ENCRYPT+UP+IKEv2ALLOW {using isakmp#1
msgid:970b965f proposal=defaults pfsgroup=no-pfs}
Sep  9 12:49:25 rogeliosevilla1-laptop pluto[10899]: "MyCompany_VPN" #1:
ignoring informational payload, type NO_PROPOSAL_CHOSEN msgid=00000000
Sep  9 12:49:25 rogeliosevilla1-laptop pluto[10899]: "MyCompany_VPN" #1:
received and ignored informational message
Sep  9 12:49:35 rogeliosevilla1-laptop pluto[10899]: "MyCompany_VPN" #1:
ignoring informational payload, type NO_PROPOSAL_CHOSEN msgid=00000000
Sep  9 12:49:35 rogeliosevilla1-laptop pluto[10899]: "MyCompany_VPN" #1:
received and ignored informational message
Sep  9 12:49:55 rogeliosevilla1-laptop pluto[10899]: "MyCompany_VPN" #1:
ignoring informational payload, type NO_PROPOSAL_CHOSEN msgid=00000000
Sep  9 12:49:55 rogeliosevilla1-laptop pluto[10899]: "MyCompany_VPN" #1:
received and ignored informational message
Sep  9 12:50:05 rogeliosevilla1-laptop pluto[10899]: shutting down
Sep  9 12:50:05 rogeliosevilla1-laptop pluto[10899]: forgetting secrets
Sep  9 12:50:05 rogeliosevilla1-laptop pluto[10899]: "MyCompany_VPN":
deleting connection
Sep  9 12:50:05 rogeliosevilla1-laptop pluto[10899]: "MyCompany_VPN" #2:
deleting state (STATE_QUICK_I1)
Sep  9 12:50:05 rogeliosevilla1-laptop pluto[10899]: "MyCompany_VPN" #1:
deleting state (STATE_MAIN_I4)
Sep  9 12:50:05 rogeliosevilla1-laptop pluto[10899]: shutting down interface
lo/lo ::1:500
Sep  9 12:50:05 rogeliosevilla1-laptop pluto[10899]: shutting down interface
lo/lo 127.0.0.1:4500
Sep  9 12:50:05 rogeliosevilla1-laptop pluto[10899]: shutting down interface
lo/lo 127.0.0.1:500
Sep  9 12:50:05 rogeliosevilla1-laptop pluto[10899]: shutting down interface
eth0/eth0 10.0.0.2:4500
Sep  9 12:50:05 rogeliosevilla1-laptop pluto[10899]: shutting down interface
eth0/eth0 10.0.0.2:500
Sep  9 12:50:05 rogeliosevilla1-laptop pluto[10904]: pluto_crypto_helper:
helper (2) is  normal exiting
Sep  9 12:50:05 rogeliosevilla1-laptop pluto[10905]: pluto_crypto_helper:
helper (3) is  normal exiting
Sep  9 12:50:05 rogeliosevilla1-laptop pluto[10903]: pluto_crypto_helper:
helper (1) is  normal exiting
Sep  9 12:50:05 rogeliosevilla1-laptop pluto[10902]: pluto_crypto_helper:
helper (0) is  normal exiting
Sep  9 12:50:05 rogeliosevilla1-laptop pluto[10907]: pluto_crypto_helper:
helper (5) is  normal exiting
Sep  9 12:50:05 rogeliosevilla1-laptop pluto[10908]: pluto_crypto_helper:
helper (6) is  normal exiting
Sep  9 12:50:05 rogeliosevilla1-laptop pluto[10906]: pluto_crypto_helper:
helper (4) is  normal exiting





This is the content of my ipsec.conf  file



# /etc/ipsec.conf - Openswan IPsec configuration file
# $Id$

# Manual: ipsec.conf(5)

# Created: Fri Sep 9 12:43:30 2011
#      by: The L2TP IPsec VPN Manager application version 1.0.1
#
# WARNING! All changes made in this file will be lost!

version    2.0    # conforms to second version of ipsec.conf specification

config setup
    # plutodebug="parsing emitting control private"
    plutodebug=none
    strictcrlpolicy=no
    nat_traversal=yes
    interfaces=%defaultroute
    oe=off
    # which IPsec stack to use. netkey,klips,mast,auto or none
    protostack=netkey

conn %default
    keyingtries=3
    pfs=no
    rekey=yes
    type=transport
    left=%defaultroute
    leftprotoport=17/1701
    rightprotoport=17/1701

# Add connections here.


conn MyCompany_VPN
   authby=secret

    right=myCompanyIp
    rightid=""
    auto=add





And finally, my ipsec.secrets looks something like this


# /etc/ipsec.secrets - secrets for IKE/IPsec authentication
# $Id$

# Manual: ipsec.secrets(5)

# Created: Fri Sep 9 12:43:30 2011
#      by: The L2TP IPsec VPN Manager application version 1.0.1
#
# WARNING! All changes made in this file will be lost!
#
#
# This file holds shared secrets or RSA private keys for inter-Pluto
# authentication.  See ipsec_pluto(8) manpage, and HTML documentation.

# RSA private key for this host, authenticating it to any other host
# which knows the public part.  Suitable public keys, for ipsec.conf, DNS,
# or configuration of other implementations, can be extracted conveniently
# with "ipsec showhostkey".
#
%any myCompanyIp: PSK "MyPreSharedKey"




Any Help would be REALLY appreciated.

Thanks a lot in advance for your time.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://lists.openswan.org/pipermail/users/attachments/20110909/ba4ee372/attachment-0001.html 


More information about the Users mailing list