[Openswan Users] Trying to get openswan working with android

Robert Laverick robert+vpn at scabserver.com
Fri May 18 07:44:19 EDT 2012


Paul Wouters <pwouters <at> redhat.com> writes:

> 
> On Fri, 24 Feb 2012, Patrick Lists wrote:
> 
> > I just tried it on a Nexus S with Android 2.3.6 and it connected 
> 
> Okay, so there are no problems with openswan, once we release 2.6.38. If
> someone is in a hurry, look for the "OSX" git commits from last week.
> 

Actually the problem from the originally linked bug report appears to have only 
been introduced with Android 4.0.x and above when they moved to ipsec-tools 
0.8.0 so a test from 2.3.6 doesn't actually test if this is resolved

http://code.google.com/p/android/issues/detail?id=23124

I've attempted to connect to the test VPN you mentioned from my Android 4.0.4 
device and I get timeout failures which mirror the ones I get using 
openswan-2.6.37-1.fc16.x86_64 on my own server.

I'm more than happy to help test this, but I'm a beginner at this VPN stuff, all 
I know is that I've got it configured to that my Windows 7 laptop can connect to 
the VPN just fine.

Here's an example of what I see in the logs from when I was trying to get this 
working last night on my own fedora 16 box from Android 4.0.4 on my Nexus S:

May 17 00:13:27 gozer pluto[5124]: "home-ipsec"[7] 149.254.180.87 #6: responding 
to Main Mode from unknown peer 149.254.180.87
May 17 00:13:27 gozer pluto[5124]: "home-ipsec"[7] 149.254.180.87 #6: transition 
from state STATE_MAIN_R0 to state STATE_MAIN_R1
May 17 00:13:27 gozer pluto[5124]: "home-ipsec"[7] 149.254.180.87 #6: 
STATE_MAIN_R1: sent MR1, expecting MI2
May 17 00:13:28 gozer pluto[5124]: "home-ipsec"[7] 149.254.180.87 #6: NAT-
Traversal: Result using RFC 3947 (NAT-Traversal): peer is NATed
May 17 00:13:28 gozer pluto[5124]: "home-ipsec"[7] 149.254.180.87 #6: transition 
from state STATE_MAIN_R1 to state STATE_MAIN_R2
May 17 00:13:28 gozer pluto[5124]: "home-ipsec"[7] 149.254.180.87 #6: 
STATE_MAIN_R2: sent MR2, expecting MI3
May 17 00:13:28 gozer pluto[5124]: "home-ipsec"[7] 149.254.180.87 #6: Main mode 
peer ID is ID_IPV4_ADDR: '10.151.149.108'
May 17 00:13:28 gozer pluto[5124]: "home-ipsec"[7] 149.254.180.87 #6: switched 
from "home-ipsec" to "home-ipsec"
May 17 00:13:28 gozer pluto[5124]: "home-ipsec"[8] 149.254.180.87 #6: deleting 
connection "home-ipsec" instance with peer 149.254.180.87 {isakmp=#0/ipsec=#0}
May 17 00:13:28 gozer pluto[5124]: "home-ipsec"[8] 149.254.180.87 #6: transition 
from state STATE_MAIN_R2 to state STATE_MAIN_R3
May 17 00:13:28 gozer pluto[5124]: "home-ipsec"[8] 149.254.180.87 #6: new NAT 
mapping for #6, was 149.254.180.87:33678, now 149.254.180.87:33614
May 17 00:13:28 gozer pluto[5124]: "home-ipsec"[8] 149.254.180.87 #6: 
STATE_MAIN_R3: sent MR3, ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY 
cipher=aes_256 prf=oakley_sha group=modp1024}
May 17 00:13:28 gozer pluto[5124]: "home-ipsec"[8] 149.254.180.87 #6: ignoring 
informational payload, type IPSEC_INITIAL_CONTACT msgid=00000000
May 17 00:13:28 gozer pluto[5124]: "home-ipsec"[8] 149.254.180.87 #6: received 
and ignored informational message
May 17 00:13:28 gozer pluto[5124]: "home-ipsec"[8] 149.254.180.87 #6: byte 7 of 
ISAKMP NAT-OA Payload must be zero, but is not
May 17 00:13:28 gozer pluto[5124]: "home-ipsec"[8] 149.254.180.87 #6: malformed 
payload in packet
May 17 00:13:28 gozer pluto[5124]: | payload malformed after IV
May 17 00:13:28 gozer pluto[5124]: |   c9 16 b7 aa  79 9c e4 84  45 8a bf 9d  7e 
84 67 e2
May 17 00:13:28 gozer pluto[5124]: "home-ipsec"[8] 149.254.180.87 #6: sending 
notification PAYLOAD_MALFORMED to 149.254.180.87:33614
May 17 00:13:31 gozer pluto[5124]: "home-ipsec"[8] 149.254.180.87 #6: byte 7 of 
ISAKMP NAT-OA Payload must be zero, but is not
May 17 00:13:31 gozer pluto[5124]: "home-ipsec"[8] 149.254.180.87 #6: malformed 
payload in packet
May 17 00:13:31 gozer pluto[5124]: | payload malformed after IV
May 17 00:13:31 gozer pluto[5124]: |   c9 16 b7 aa  79 9c e4 84  45 8a bf 9d  7e 
84 67 e2
May 17 00:13:31 gozer pluto[5124]: "home-ipsec"[8] 149.254.180.87 #6: sending 
notification PAYLOAD_MALFORMED to 149.254.180.87:33614




More information about the Users mailing list