[Openswan Users] OT IPSec -- L2TPD/Xauth

Erich Titl erich.titl at think.ch
Tue Oct 16 06:14:56 EDT 2012


Hi Folks

this is the actual situation of an attempt to connect to my gateway from
an Android device using the on board ipsec-l2tp method.

....
Oct 16 10:04:20 sentinel pluto[21312]: "mega-rw"[1] 195.141.2.242 #1:
NAT-Traversal: Result using RFC 3947 (NAT-Traversal): peer is NATed
Oct 16 10:04:20 sentinel pluto[21312]: "mega-rw"[1] 195.141.2.242 #1:
transition from state STATE_MAIN_R1 to state STATE_MAIN_R2
Oct 16 10:04:20 sentinel pluto[21312]: "mega-rw"[1] 195.141.2.242 #1:
STATE_MAIN_R2: sent MR2, expecting MI3
Oct 16 10:04:20 sentinel pluto[21312]: "mega-rw"[1] 195.141.2.242 #1:
Main mode peer ID is ID_DER_ASN1_DN: 'C=CH, L=Schlieren, O=Ruf Group,
CN=Erich Titl, E=erich.titl at ruf.ch'
Oct 16 10:04:20 sentinel pluto[21312]: "mega-rw"[1] 195.141.2.242 #1: I
am sending my cert
Oct 16 10:04:20 sentinel pluto[21312]: "mega-rw"[1] 195.141.2.242 #1:
transition from state STATE_MAIN_R2 to state STATE_MAIN_R3
Oct 16 10:04:20 sentinel pluto[21312]: "mega-rw"[1] 195.141.2.242 #1:
new NAT mapping for #1, was 195.141.2.242:500, now 195.141.2.242:4500
Oct 16 10:04:20 sentinel pluto[21312]: "mega-rw"[1] 195.141.2.242 #1:
STATE_MAIN_R3: sent MR3, ISAKMP SA established {auth=OAKLEY_RSA_SIG
cipher=aes_256 prf=oakley_sha group=modp1024}
Oct 16 10:04:20 sentinel pluto[21312]: "mega-rw"[1] 195.141.2.242 #1:
ignoring informational payload, type IPSEC_INITIAL_CONTACT msgid=00000000
Oct 16 10:04:20 sentinel pluto[21312]: "mega-rw"[1] 195.141.2.242 #1:
received and ignored informational message
Oct 16 10:04:21 sentinel pluto[21312]: "mega-rw"[1] 195.141.2.242 #1:
byte 7 of ISAKMP NAT-OA Payload must be zero, but is not
Oct 16 10:04:21 sentinel pluto[21312]: "mega-rw"[1] 195.141.2.242 #1:
malformed payload in packet
Oct 16 10:04:21 sentinel pluto[21312]: | payload malformed after IV
Oct 16 10:04:21 sentinel pluto[21312]: |   60 c0 2b c9  71 9d 72 86  00
f9 8c 38  c2 7c 63 ba
Oct 16 10:04:21 sentinel pluto[21312]: "mega-rw"[1] 195.141.2.242 #1:
sending notification PAYLOAD_MALFORMED to 195.141.2.242:4500
Oct 16 10:04:24 sentinel pluto[21312]: "mega-rw"[1] 195.141.2.242 #1:
byte 7 of ISAKMP NAT-OA Payload must be zero, but is not
Oct 16 10:04:24 sentinel pluto[21312]: "mega-rw"[1] 195.141.2.242 #1:
malformed payload in packet
Oct 16 10:04:24 sentinel pluto[21312]: | payload malformed after IV
Oct 16 10:04:24 sentinel pluto[21312]: |   60 c0 2b c9  71 9d 72 86  00
f9 8c 38  c2 7c 63 ba
Oct 16 10:04:24 sentinel pluto[21312]: "mega-rw"[1] 195.141.2.242 #1:
sending notification PAYLOAD_MALFORMED to 195.141.2.242:4500

Maybe the malformed PAYLOAD results from a missing patch.

Thanks

Erich

-------------- next part --------------
A non-text attachment was scrubbed...
Name: smime.p7s
Type: application/pkcs7-signature
Size: 1877 bytes
Desc: S/MIME Kryptografische Unterschrift
URL: <http://lists.openswan.org/pipermail/users/attachments/20121016/45fd4dc0/attachment-0001.p7s>


More information about the Users mailing list