[Openswan Users] Problem with a simple connection.

adstar at genis-x.com adstar at genis-x.com
Wed Dec 5 22:03:18 EST 2012


Hi all,

I'm having an issue setting up a tunnel that I need some help with.

I have included the relevant files below


My first issue is when I start ipsec I get the following error:

 

Dec  6 13:51:30 firewall ipsec__plutorun: 023 address family inconsistency
in this connection=2 host=2/nexthop=0

Dec  6 13:51:30 firewall ipsec__plutorun: 037 attempt to load incomplete
connection

Dec  6 13:51:30 firewall ipsec__plutorun: 023 address family inconsistency
in this connection=2 host=2/nexthop=0

Dec  6 13:51:30 firewall ipsec__plutorun: 037 attempt to load incomplete
connection

 

My second issue is the right side can't connect.

packet from 119.225.115.131:500: ignoring unknown Vendor ID payload
[f4ed19e0c114eb516faaac0ee37daf2807b4381f000000010000138d50c009ee...]

packet from 119.225.115.131:500: initial Main Mode message received on
103.29.172.40:500 but no connection has been authorized with policy=PSK

packet from 119.225.115.131:500: ignoring unknown Vendor ID payload
[f4ed19e0c114eb516faaac0ee37daf2807b4381f000000010000138d50c009ee...]

packet from 119.225.115.131:500: initial Main Mode message received on
103.29.172.40:500 but no connection has been authorized with policy=PSK

 

Can anyone help me on where to go from here?

Cheers
Adam

 

firewall# ipsec --version

Linux Openswan 2.6.37 (klips)


firewall# cat ipsec.conf

# /etc/ipsec.conf - Openswan IPsec configuration file

version 2.0     # conforms to second version of ipsec.conf specification

# basic configuration

config setup

        #plutodebug = "all"

        #klipsdebug = "all"

        plutoopts="--perpeerlog"

        dumpdir=/var/run/pluto/

        nat_traversal=yes

 
virtual_private=%v4:10.0.0.0/8,%v4:192.168.0.0/16,%v4:172.16.0.0/12,%v4:25.0
.0.0/8,%v6:fd00::/8,%v6:fe80::/10

        oe=off

        protostack=klips

        plutostderrlog=/var/log/pluto.log

        interfaces="ipsec0=eth0"

        listen=103.29.172.40

# Add connections here

 

conn multi-conn1

rightsubnets={144.55.124.122/32,144.55.123.187/32,144.55.122.67/32,144.55.12
3.63/32,172.27.130.1/32,172.27.130.2/32,192.168.11.51/32,144.55.124.206/32}

leftsubnets={103.29.173.70/32,103.29.173.71/32,103.29.173.72/32,103.29.173.7
3/32,103.29.173.74/32,103.29.173.75/32,103.29.173.76/32,103.29.173.80/32,103
.29.173.81/32,103.29.173.82/32,103.29.173.83/32,103.29.173.84/32,103.29.173.
85/32,103.29.173.86/32,103.29.173.60/32,103.29.173.61/32,103.29.173.64/32,10
3.29.173.65/32}

also=conn1

 

conn conn1

        type = tunnel

        authby = secret

        left = 103.29.172.40

        leftnexthop = %defaultroute

        right = 119.225.115.131

        rightnexthop = %defaultroute

        ike = aes256-sha1-modp1536

        esp = aes256-sha1

        keyexchange = ike

        pfs = no

        auto = add

firewall# cat ipsec.secrets

# This file holds shared secrets or RSA private keys for inter-Pluto

# authentication.  See ipsec_pluto(8) manpage, and HTML documentation.

103.29.172.40 119.225.115.131: PSK "BLANK-BLANK-BLANK"

firewall# ip addr

1: lo: <LOOPBACK,UP,LOWER_UP> mtu 16436 qdisc noqueue state UNKNOWN

    link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00

    inet 127.0.0.1/8 scope host lo

    inet6 ::1/128 scope host

       valid_lft forever preferred_lft forever

2: eth0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc pfifo_fast state
UP qlen 1000

    link/ether 00:25:90:35:35:9e brd ff:ff:ff:ff:ff:ff

    inet 103.29.172.1/24 brd 103.29.172.255 scope global eth0

    inet 103.29.173.1/24 brd 103.29.173.255 scope global eth0:0

    inet 103.29.174.1/24 brd 103.29.174.255 scope global eth0:1

    inet 103.29.175.1/24 brd 103.29.175.255 scope global eth0:2

    inet 172.16.0.100/24 brd 172.16.0.255 scope global eth0:4

    inet 103.29.172.40/24 scope global secondary eth0

    inet6 fe80::225:90ff:fe35:359e/64 scope link

       valid_lft forever preferred_lft forever

3: eth1: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc pfifo_fast state
UP qlen 1000

    link/ether 00:25:90:35:35:9f brd ff:ff:ff:ff:ff:ff

    inet 202.45.103.162/30 brd 202.45.103.163 scope global eth1

    inet6 fe80::225:90ff:fe35:359f/64 scope link

       valid_lft forever preferred_lft forever

82: ipsec0: <NOARP,UP,LOWER_UP> mtu 1500 qdisc pfifo_fast state UNKNOWN qlen
10

    link/ether 00:25:90:35:35:9e brd ff:ff:ff:ff:ff:ff

    inet 103.29.172.1/32 scope global ipsec0

    inet 103.29.173.1/32 scope global ipsec0

    inet 103.29.174.1/32 scope global ipsec0

    inet 103.29.175.1/32 scope global ipsec0

    inet 172.16.0.100/32 scope global ipsec0

    inet 103.29.172.40/32 scope global ipsec0

    inet6 fe80::225:90ff:fe35:359e/128 scope link

       valid_lft forever preferred_lft forever

83: ipsec1: <NOARP> mtu 0 qdisc noop state DOWN qlen 10

    link/void

 

firewall# cat daemon.log

Dec  6 13:51:29 firewall ipsec_setup: Starting Openswan IPsec 2.6.37...

Dec  6 13:51:29 firewall ipsec_setup: Using KLIPS/legacy stack

Dec  6 13:51:30 firewall ipsec_setup: KLIPS debug `none'

Dec  6 13:51:30 firewall ipsec_setup: KLIPS ipsec0 on eth0 103.29.172.1/24
broadcast  mtu 1500

Dec  6 13:51:30 firewall ipsec_setup: ipsec0 -> NULL mtu=0(0) -> 0

Dec  6 13:51:30 firewall ipsec_setup: ...Openswan IPsec started

Dec  6 13:51:30 firewall ipsec__plutorun: 023 address family inconsistency
in this connection=2 host=2/nexthop=0

Dec  6 13:51:30 firewall ipsec__plutorun: 037 attempt to load incomplete
connection

Dec  6 13:51:30 firewall ipsec__plutorun: 023 address family inconsistency
in this connection=2 host=2/nexthop=0

Dec  6 13:51:30 firewall ipsec__plutorun: 037 attempt to load incomplete
connection

 

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.openswan.org/pipermail/users/attachments/20121206/fa8dad04/attachment-0001.html>


More information about the Users mailing list