[Openswan Users] Roadwarriors allow only one user a time

Leto letoams at gmail.com
Fri Sep 20 15:01:36 UTC 2013


openswan does not support xauth for pools of road warriors. use libreswan or strongswan for that.

you can try workarounds like uniqueids=no but in the end you really need a dhcp pool for your ipsec server which openswan does not have

sent from a tiny device 

On 2013-09-20, at 9:27, Renzo <reda at logobject.ch> wrote:

> Hi,
> no there are no overlapping and is a pure ipsec connection.
> I've tested with 3 different computers all of them are able to connect correctly but not in parallel, as soon as the new one is connected the old one is 
> 
> Thanks
> Renzo
> 
> 
> On 20.09.2013 00:20, Paul Young wrote:
>> Hi,
>> 
>> Are there overlapping IP assignments from behind different and the same NAT routers?
>> 
>> As Netkey does not support that in the same way that KLIPS does.
>> 
>> Also is this pure ipsec connection or is l2tp\ppp involved at all?
>> 
>> Sorry that does not directly answer your question.
>> 
>> I am pretty new to all of this myself
>> 
>> 
>> On 19 September 2013 22:24, Renzo <reda at logobject.ch> wrote:
>>> Hi,
>>> We are trying to configure a roadwarriors  vpn, here the configuration we have:
>>> 
>>> 
>>> 
>>> 
>>> version 2.0     # conforms to second version of ipsec.conf specification
>>> config setup
>>>         nat_traversal=yes
>>> virtual_private=%v4:10.0.0.0/8,%v4:!10.11.0.0/16,%v4:192.168.0.0/16,%v4:172.16.0.0/12,%v4:25.0.0.0/8,%v6:fd00::/8,%v6:fe80::/10
>>>         oe=off
>>>         protostack=netkey
>>>         uniqueids=no
>>> # roadwarrior
>>> conn roadwarriors
>>>      authby=secret
>>>      left=%defaultroute
>>>      leftid=ourExternaIp
>>>      leftsubnet=0.0.0.0/0
>>>      leftxauthserver=yes
>>>      right=%any
>>>      rightid=%any
>>>      rightsubnet=10.11.4.0/24
>>>      rightxauthclient=yes
>>>      dpddelay=30
>>>      dpdtimeout=120
>>>      dpdaction=clear
>>>      rekey=no
>>>      ikelifetime=3h
>>>      salifetime=3h
>>>      aggrmode=no
>>>      ike=3des-sha1;modp1024
>>>      type=tunnel
>>>      phase2=esp
>>>      phase2alg=3des-sha1;modp1024
>>>      modecfgdns1=10.11.1.1
>>>      auto=add
>>> 
>>> It works really fine until only one remote pc is connected.
>>> As soon as another user try to connect, the server close the old tunnel and create the new one.
>>> I.e. only one user a time can connect through the vpn.
>>> Any suggestion?
>>> 
>>> 
>>> # uname -a
>>> Linux alixg 3.8.2 #3 Mon Mar 4 09:32:22 CET 2013 i586 Geode(TM) Integrated Processor by AMD PCS AuthenticAMD GNU/Linux
>>> 
>>> # ipsec --version
>>> Linux Openswan U2.6.38/K3.8.2 (netkey)
>>> 
>>> 
>>> Thanks for your time
>>> Renzo
>>> 
>>> 
>>> _______________________________________________
>>> Users at lists.openswan.org
>>> https://lists.openswan.org/mailman/listinfo/users
>>> Micropayments: https://flattr.com/thing/38387/IPsec-for-Linux-made-easy
>>> Building and Integrating Virtual Private Networks with Openswan:
>>> http://www.amazon.com/gp/product/1904811256/104-3099591-2946327?n=283155
> 
> _______________________________________________
> Users at lists.openswan.org
> https://lists.openswan.org/mailman/listinfo/users
> Micropayments: https://flattr.com/thing/38387/IPsec-for-Linux-made-easy
> Building and Integrating Virtual Private Networks with Openswan:
> http://www.amazon.com/gp/product/1904811256/104-3099591-2946327?n=283155
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.openswan.org/pipermail/users/attachments/20130920/b9931f58/attachment.html>


More information about the Users mailing list