[Openswan Users] OPENSWAN VPN is up but traffic does not go through

Badi kenji kelnji at yahoo.com
Wed Mar 19 11:02:31 EDT 2014


Hi All,

I am trying to implement a new tunnel to an already existing openswan setup 
with 3 working tunnels. The tunnel comes up, however when I trace the remote 
local IP, my traffic seems not to be going through the tunnel and goes 
through the default route to the internet. 

I have gone through so many documents online and I have also done some 
debugging however, I am not able to see the problem here. kindly assist.

These are my configurations


conn MM-AIR-VPN
        type=tunnel
#IKE policy
        authby=secret
        pfs=no
        ike=3des-sha1
        ikelifetime=24h
        keyexchange=ike
#IPSEC POLICY
        phase2alg=3des-sha1
        phase2=esp
        keylife=8h
        ikev2=permit
        aggrmode=no
#LOCAL AN REMOTE GATEWAY
        left=172.18.123.139
        leftid=197.24.xxx.xxx
        leftsubnet=172.18.123.140/32
        leftnexthop=%defaultroute
        right=41.223.xxx.xxx
        rightsubnet=10.10.254.114/32
        auto=start

<========debug logs========>

"MM-AIR-VPN" #1: extra debugging enabled for connection: 
raw+crypt+parsing+emitting+control+lifecycle+klips+dns+oppo+controlmore+pfke
y+nattraversal+x509+dpd+oppoinfo
| processing connection MM-AIR-VPN
| last Phase 1 IV:  11 f3 08 89  eb 30 69 23
| current Phase 1 IV:  11 f3 08 89  eb 30 69 23
| computed Phase 2 IV:
|   c9 57 fc 75  68 e5 4c 8d  b0 f4 18 a8  72 e9 69 9f
|   03 dd a1 23
| received encrypted packet from 41.223.xxx.xxx:4500
| decrypting 56 bytes using algorithm OAKLEY_3DES_CBC
| NSS: do_3des init start
| NSS: do_3des init end
| decrypted:
|   0b 00 00 18  59 05 9a 4a  c8 09 56 5c  e7 01 22 5a
|   7b 18 13 9e  ff ff 67 54  00 00 00 20  00 00 00 01
|   01 10 8d 28  45 31 da d4  45 5b 6b 4a  b9 01 19 69
|   18 03 2f ee  46 ee c8 13
| next IV:  8c 2e e3 a7  92 9d e5 b6
| got payload 0x100(ISAKMP_NEXT_HASH) needed: 0x100 opt: 0x0
| ***parse ISAKMP Hash Payload:
|    next payload type: ISAKMP_NEXT_N
|    length: 24
| got payload 0x800(ISAKMP_NEXT_N) needed: 0x0 opt: 0x0
| ***parse ISAKMP Notification Payload:
|    next payload type: ISAKMP_NEXT_NONE
|    length: 32
|    DOI: ISAKMP_DOI_IPSEC
|    protocol ID: 1
|    SPI size: 16
|    Notify Message Type: R_U_THERE
| info:  45 31 da d4  45 5b 6b 4a  b9 01 19 69  18 03 2f ee
| info:  46 ee c8 13
| processing informational R_U_THERE (36136)
| DPD: received R_U_THERE seq:1190053907 time:1395241246 (state=#1 name="MM-
AIR-VPN")
| **emit ISAKMP Message:
|    initiator cookie:
|   45 31 da d4  45 5b 6b 4a
|    responder cookie:
|   b9 01 19 69  18 03 2f ee
|    next payload type: ISAKMP_NEXT_HASH
|    ISAKMP version: ISAKMP Version 1.0 (rfc2407)
|    exchange type: ISAKMP_XCHG_INFO
|    flags: ISAKMP_FLAG_ENCRYPTION
|    message ID:  fc 12 18 53
| ***emit ISAKMP Hash Payload:
|    next payload type: ISAKMP_NEXT_N
| emitting 20 zero bytes of HASH into ISAKMP Hash Payload
| emitting length of ISAKMP Hash Payload: 24
| ***emit ISAKMP Notification Payload:
|    next payload type: ISAKMP_NEXT_NONE
|    DOI: ISAKMP_DOI_IPSEC
|    protocol ID: 1
|    SPI size: 16
|    Notify Message Type: R_U_THERE_ACK
| emitting 8 raw bytes of notify icookie into ISAKMP Notification Payload
| notify icookie  45 31 da d4  45 5b 6b 4a
| emitting 8 raw bytes of notify rcookie into ISAKMP Notification Payload
| notify rcookie  b9 01 19 69  18 03 2f ee
| emitting 4 raw bytes of notify data into ISAKMP Notification Payload
| notify data  46 ee c8 13
| emitting length of ISAKMP Notification Payload: 32
| HASH computed:
|   50 c9 a8 e0  1a c5 bf 93  9b 90 8f aa  5c a8 f1 1c
|   e5 99 bc 68
| last Phase 1 IV:  11 f3 08 89  eb 30 69 23
| current Phase 1 IV:  11 f3 08 89  eb 30 69 23
| computed Phase 2 IV:
|   b9 e0 e9 6f  69 f9 bb f1  f3 0a d3 29  c9 59 7c 36
|   28 7b 39 d2
| encrypting:
|   0b 00 00 18  50 c9 a8 e0  1a c5 bf 93  9b 90 8f aa
|   5c a8 f1 1c  e5 99 bc 68  00 00 00 20  00 00 00 01
|   01 10 8d 29  45 31 da d4  45 5b 6b 4a  b9 01 19 69
|   18 03 2f ee  46 ee c8 13
| IV:
|   b9 e0 e9 6f  69 f9 bb f1  f3 0a d3 29  c9 59 7c 36
|   28 7b 39 d2
| unpadded size is: 56
| encrypting 56 using OAKLEY_3DES_CBC
| NSS: do_3des init start
| NSS: do_3des init end
| next IV:  b1 cd f6 23  b1 b2 64 e3
| emitting length of ISAKMP Message: 84
| sending 84 bytes for ISAKMP notify through eth0:4500 to 41.223.59.226:4500 
(using #1)
|   00 00 00 00  45 31 da d4  45 5b 6b 4a  b9 01 19 69
|   18 03 2f ee  08 10 05 01  fc 12 18 53  00 00 00 54
|   cf a5 8d 0a  e7 eb b1 27  ca 01 44 3a  d1 50 5a 22
|   cc c5 ff c3  ae 44 e5 50  a9 81 51 c6  95 a4 99 e5
|   18 6e 99 09  67 d7 a7 08  a4 55 09 a1  1d de 1f 4b
|   b1 cd f6 23  b1 b2 64 e3
| complete state transition with STF_IGNORE

<=====debug logs======>







More information about the Users mailing list