[Openswan Users] openswan

Efstathios Kalyvas savilak at gmail.com
Mon Aug 6 02:56:00 EDT 2012


Hello,

I am trying from a linux box to setup an IPsec to a cisco ASA 5520. Cisco
is managed from a telco opeartor.

My ipsec.conf is (based on the telco specs file i attach):

# /etc/ipsec.conf - Openswan IPsec configuration file
#
# Manual:     ipsec.conf.5
#
# Please place your own config files in /etc/ipsec.d/ ending in .conf
version 2.0     # conforms to second version of ipsec.conf specification
# basic configuration
config setup
        # Debug-logging controls:  "none" for (almost) none, "all" for lots.
        # klipsdebug=none
        # plutodebug="control parsing"
        # For Red Hat Enterprise Linux and Fedora, leave protostack=netkey
        interfaces=%defaultroute
        klipsdebug=none
        plutodebug=none
        protostack=netkey
        nat_traversal=no
        #virtual_private=
        #oe=off
        # Enable this if you see "failed to find any available worker"
        # nhelpers=0

conn cyta
        type=tunnel
        #Define your IKEI policy
        authby=secret
        pfs=no
        ike=3des-sha1;modp1024
        ikelifetime="86400"
        #Define IPSec policy
        phase2=esp
        phase2alg=3des-sha1
        #ah=hmac-sha1
        keylife="3600"
        #ikev2=insist
        # Left security Linux, (Linux side)
        left= 198.101.222.60 #REAL IP LINUX SERVER
        leftsubnet= 198.101.222.0/24 #Net address assigned to the other side
        leftnexthop= 198.101.222.60 #Real IP Gateway
        # Right security gateway, (ASA SIDE)
        right= 212.31.96.133 # ASA IP
        rightsubnet= 212.31.96.0/24 # Net address assigned to the other side
        rightnexthop= 212.31.96.135 #Real IP Gateway
        # Type of cryptogrphy used on the VPN Tunnel
        #keyexchange= ike
        auto= start

#You may put your configuration (.conf) file in the "/etc/ipsec.d/" and
uncomment this.
#include /etc/ipsec.d/*.conf


The output I get is:

Aug  5 17:35:20 apllo-i1 pluto[21371]: adding interface eth1/eth1
10.178.111.55:500
Aug  5 17:35:20 apllo-i1 pluto[21371]: adding interface eth0/eth0
198.101.222.60:500
Aug  5 17:35:20 apllo-i1 pluto[21371]: adding interface lo/lo 127.0.0.1:500
Aug  5 17:35:20 apllo-i1 pluto[21371]: adding interface lo/lo ::1:500
Aug  5 17:35:20 apllo-i1 pluto[21371]: loading secrets from
"/etc/ipsec.secrets"
Aug  5 17:35:20 apllo-i1 pluto[21371]: "cyta" #1: initiating Main Mode
Aug  5 17:35:20 apllo-i1 pluto[21371]: "cyta" #1: ignoring Vendor ID
payload [FRAGMENTATION c0000000]
Aug  5 17:35:20 apllo-i1 pluto[21371]: "cyta" #1: transition from state
STATE_MAIN_I1 to state STATE_MAIN_I2
Aug  5 17:35:20 apllo-i1 pluto[21371]: "cyta" #1: STATE_MAIN_I2: sent MI2,
expecting MR2
Aug  5 17:35:20 apllo-i1 pluto[21371]: "cyta" #1: received Vendor ID
payload [Cisco-Unity]
Aug  5 17:35:20 apllo-i1 pluto[21371]: "cyta" #1: received Vendor ID
payload [XAUTH]
Aug  5 17:35:20 apllo-i1 pluto[21371]: "cyta" #1: ignoring unknown Vendor
ID payload [07d0985db9d41de43dc9b2c01cd3102f]
Aug  5 17:35:20 apllo-i1 pluto[21371]: "cyta" #1: ignoring Vendor ID
payload [Cisco VPN 3000 Series]
Aug  5 17:35:20 apllo-i1 pluto[21371]: "cyta" #1: transition from state
STATE_MAIN_I2 to state STATE_MAIN_I3
Aug  5 17:35:20 apllo-i1 pluto[21371]: "cyta" #1: STATE_MAIN_I3: sent MI3,
expecting MR3
Aug  5 17:35:20 apllo-i1 pluto[21371]: "cyta" #1: received Vendor ID
payload [Dead Peer Detection]
Aug  5 17:35:20 apllo-i1 pluto[21371]: "cyta" #1: Main mode peer ID is
ID_IPV4_ADDR: '212.31.96.133'
Aug  5 17:35:20 apllo-i1 pluto[21371]: "cyta" #1: transition from state
STATE_MAIN_I3 to state STATE_MAIN_I4
Aug  5 17:35:20 apllo-i1 pluto[21371]: "cyta" #1: STATE_MAIN_I4: ISAKMP SA
established {auth=OAKLEY_PRESHARED_KEY cipher=oakley_3des_cbc_192
prf=oakley_sha group=modp1024}
Aug  5 17:35:20 apllo-i1 pluto[21371]: "cyta" #2: initiating Quick Mode
PSK+ENCRYPT+TUNNEL+UP+IKEv2ALLOW+SAREFTRACK {using isakmp#1 msgid:29f85155
proposal=3DES(3)_192-SHA1(2)_160 pfsgroup=no-pfs}
Aug  5 17:35:20 apllo-i1 pluto[21371]: "cyta" #1: ignoring informational
payload, type INVALID_ID_INFORMATION msgid=00000000
Aug  5 17:35:20 apllo-i1 pluto[21371]: "cyta" #1: received and ignored
informational message
Aug  5 17:35:20 apllo-i1 pluto[21371]: "cyta" #1: received Delete SA
payload: deleting ISAKMP State #1
Aug  5 17:35:20 apllo-i1 pluto[21371]: packet from 212.31.96.133:500:
received and ignored informational message

Can you please verify that I've set the ipsec.conf file correctly? I
believe so.
Can this  "INVALID_ID_INFORMATION" error message be related to a bug issue?

I would much appreciate your input on this.

Regards
Savilak
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.openswan.org/pipermail/users/attachments/20120806/2138a853/attachment-0001.html>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: IPSec Specs.jpg
Type: image/jpeg
Size: 114717 bytes
Desc: not available
URL: <http://lists.openswan.org/pipermail/users/attachments/20120806/2138a853/attachment-0001.jpg>


More information about the Users mailing list