[Openswan Users] no quick mode - received MODECFG message when in state STATE_MAIN_R3, and we aren't xauth client

gerhard reuter gerhard.reuter at bayer.com
Wed Nov 19 02:29:20 EST 2014


Hello world,
I tried to setup a VPN for my customers to an AWS Cloud. I decided to use
openswan (Ubuntu) in the Cloud and VPN Access Manager for the Win7 Clients.
Furthermore I wanted authentication against /etc/passwd. 
I see this in /var/log/auth.log: 
Nov 19 07:02:31 ip-172-31-14-254 pluto[2691]: "RWConn"[1] 212.64.xxx.xxx #1:
responding to Main Mode from unknown peer 212.64.xxx.xxx
Nov 19 07:02:31 ip-172-31-14-254 pluto[2691]: "RWConn"[1] 212.64.xxx.xxx #1:
transition from state STATE_MAIN_R0 to state STATE_MAIN_R1
Nov 19 07:02:31 ip-172-31-14-254 pluto[2691]: "RWConn"[1] 212.64.xxx.xxx #1:
STATE_MAIN_R1: sent MR1, expecting MI2
Nov 19 07:02:31 ip-172-31-14-254 pluto[2691]: "RWConn"[1] 212.64.xxx.xxx #1:
NAT-Traversal: Result using draft-ietf-ipsec-nat-t-ike (MacOS X): both are NATed
Nov 19 07:02:31 ip-172-31-14-254 pluto[2691]: "RWConn"[1] 212.64.xxx.xxx #1:
transition from state STATE_MAIN_R1 to state STATE_MAIN_R2
Nov 19 07:02:31 ip-172-31-14-254 pluto[2691]: "RWConn"[1] 212.64.xxx.xxx #1:
STATE_MAIN_R2: sent MR2, expecting MI3
Nov 19 07:02:32 ip-172-31-14-254 pluto[2691]: "RWConn"[1] 212.64.xxx.xxx #1:
Main mode peer ID is ID_FQDN: '@'
Nov 19 07:02:32 ip-172-31-14-254 pluto[2691]: "RWConn"[1] 212.64.xxx.xxx #1:
switched from "RWConn" to "RWConn"
Nov 19 07:02:32 ip-172-31-14-254 pluto[2691]: "RWConn"[2] 212.64.xxx.xxx #1:
deleting connection "RWConn" instance with peer 212.64.xxx.xxx
{isakmp=#0/ipsec=#0}
Nov 19 07:02:32 ip-172-31-14-254 pluto[2691]: "RWConn"[2] 212.64.xxx.xxx #1:
transition from state STATE_MAIN_R2 to state STATE_MAIN_R3
Nov 19 07:02:32 ip-172-31-14-254 pluto[2691]: "RWConn"[2] 212.64.xxx.xxx #1:
new NAT mapping for #1, was 212.64.xxx.xxx:45551, now 212.64.xxx.xxx:45552
Nov 19 07:02:32 ip-172-31-14-254 pluto[2691]: "RWConn"[2] 212.64.xxx.xxx #1:
STATE_MAIN_R3: sent MR3, ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY
cipher=aes_256 prf=oakley_md5 group=modp2048}
Nov 19 07:02:32 ip-172-31-14-254 pluto[2691]: "RWConn"[2] 212.64.xxx.xxx #1:
XAUTH: Sending XAUTH Login/Password Request
Nov 19 07:02:32 ip-172-31-14-254 pluto[2691]: "RWConn"[2] 212.64.xxx.xxx #1:
XAUTH: Sending Username/Password request (XAUTH_R0)
Nov 19 07:02:32 ip-172-31-14-254 pluto[2691]: "RWConn"[2] 212.64.xxx.xxx #1:
ignoring informational payload, type IPSEC_INITIAL_CONTACT msgid=00000000
Nov 19 07:02:32 ip-172-31-14-254 pluto[2691]: "RWConn"[2] 212.64.xxx.xxx #1:
received and ignored informational message
Nov 19 07:02:32 ip-172-31-14-254 pluto[2691]: "RWConn"[2] 212.64.xxx.xxx #1:
XAUTH:  Unsupported XAUTH parameter XAUTH-TYPE received.
Nov 19 07:02:32 ip-172-31-14-254 pluto[2691]: XAUTH: User Hamsterxy:
Attempting to login
Nov 19 07:02:32 ip-172-31-14-254 pluto[2691]: XAUTH: pam authentication
being called to authenticate user Hamsterxy
Nov 19 07:02:32 ip-172-31-14-254 pluto[2691]: XAUTH: User Hamsterxyz:
Authentication Successful
Nov 19 07:02:32 ip-172-31-14-254 pluto[2691]: "RWConn"[2] 212.64.xxx.xxx #1:
XAUTH: xauth_inR1(STF_OK)
Nov 19 07:02:32 ip-172-31-14-254 pluto[2691]: "RWConn"[2] 212.64.xxx.xxx #1:
transition from state STATE_XAUTH_R1 to state STATE_MAIN_R3
Nov 19 07:02:32 ip-172-31-14-254 pluto[2691]: "RWConn"[2] 212.64.xxx.xxx #1:
STATE_MAIN_R3: sent MR3, ISAKMP SA established
Nov 19 07:02:32 ip-172-31-14-254 pluto[2691]: "RWConn"[2] 212.64.xxx.xxx #1:
received MODECFG message when in state STATE_MAIN_R3, and we aren't xauth client
Nov 19 07:02:32 ip-172-31-14-254 pluto[2691]: "RWConn"[2] 212.64.xxx.xxx #1:
sending encrypted notification UNSUPPORTED_EXCHANGE_TYPE to 212.64.xxx.xxx:45552
Nov 19 07:02:37 ip-172-31-14-254 pluto[2691]: "RWConn"[2] 212.64.xxx.xxx #1:
received MODECFG message when in state STATE_MAIN_R3, and we aren't xauth client
Nov 19 07:02:37 ip-172-31-14-254 pluto[2691]: "RWConn"[2] 212.64.xxx.xxx #1:
sending encrypted notification UNSUPPORTED_EXCHANGE_TYPE to 212.64.xxx.xxx:45552
root at ip-172-31-14-254:~#

- there seems to be an ISAKMP SA for Main Mode
- the user seems to be authenticated 
- but there is no Quickmode - 

my ipsec.conf:
version    2.0
config setup
   protostack=netkey
   interfaces=%defaultroute
   nat_traversal=yes
   force_keepalive=yes
   keep_alive=60
   virtual_private=%v4:172.24.0.0/16
   oe=no
   nhelpers=0
conn RWConn 
   rightsubnet=vhost:%priv
   type=transport
   authby=secret
   pfs=no
   rekey=no
   ikelifetime=8h
   keylife=1h
   leftprotoport=17/1701
   left=172.31.14.254
   leftsubnet=172.31.15.0/24
   leftid=@172.31.14.254
   leftxauthserver=yes
   rightprotoport=17/0
   right=%any
   rightxauthclient=yes
   auto=ignore

AWS Openswan has the internal IP: 172.31.14.254
Wanted to make 172.31.15.0/24 available to my customers.

Any idea what I'm missing ? Banging my head now for 3 days on my desk. will
need a new head and desk soon. 

Thanks a lot in advance
-Jerry




More information about the Users mailing list