[Openswan Users] INVALID_ID_INFORMATION between OpenSwan and Checkpoint
dan.cave at me.com
Wed Jul 29 15:16:41 EDT 2015
Apologies. Annoying iCloud use.
> On 29 Jul 2015, at 20:14, Daniel Cave <dan.cave at icloud.com> wrote:
> Fwiw. This article below does. It cover the following gotchas and problems caused by a potential lack of understanding of how AWs ec2 instances and security policy
> 1. To allow traffic to pass through your VPN server you must disable check source address checking which can be done by right clicking the instance in the EC2 manager and going to security settings. This allows traffic from another network outside of that used by your vpc/classic instance so your end to end routing works
> 2. Disable iptables on linux
> 3. Create a security group for your cons networks and add the subnets into that from all the networks which are going INTO the vpn instance and apply that security group to the EC2 instance where applicable
> Hope that helps
> Sent from my iPhone
>> On 29 Jul 2015, at 16:31, Simon Deziel <simon at xelerance.com> wrote:
>> Hi Daniel,
>> You might find the following wiki page helpful:
>>> On 07/24/2015 02:51 AM, Daniel Carraro wrote:
>>> Hi All,
>>> I'm running OpenSwan on an Amazon Linux EC2 Instance (inside a VPC) and
>>> am trying to connect to a Checkpoint 4800 Series appliance (running R75.45).
>>> Phase 1 passes successfully, however I'm having issues with Phase 2.
>>> Specifically, INVALID_ID_INFORMATION gets sent from my EC2 instance back
>>> to the Client.
>>> I'll give a quick summary of the networks:
>>> - Our VPC is 10.200.0.0/16 <http://10.200.0.0/16>; the OpenSwan instance
>>> is 188.8.131.52 (10.200.0.171)
>>> - Their Network is 192.168.187.0/24 <http://192.168.187.0/24>; Their
>>> Public Endpoint is 184.108.40.206 (192.168.187.253)
>>> What's odd as well, I'm able to ping/telnet servers inside their network
>>> (192.168.187.0/24 <http://192.168.187.0/24>), but they're unable to
>>> ping/ssh inside my network (10.200.0.0/16 <http://10.200.0.0/16>)
>>> I've included relevant config/log files below, trying to condense when
>>> version 2.0 # conforms to second version of ipsec.conf specification
>>> # basic configuration
>>> config setup
>>> # Debug-logging controls: "none" for (almost) none, "all" for lots.
>>> plutodebug="control parsing"
>>> # For Red Hat Enterprise Linux and Fedora, leave protostack=netkey
>>> # Enable this if you see "failed to find any available worker"
>>> # nhelpers=0
>>> # custom config options
>>> #You may put your configuration (.conf) file in the "/etc/ipsec.d/" and
>>> uncomment this.
>>> include /etc/ipsec.d/*.conf
>>> conn wc-vpn
>>> leftsubnet=10.200.0.0/16 <http://10.200.0.0/16>
>>> rightid=220.127.116.11/32 <http://18.104.22.168/32>
>>> rightsubnet=192.168.187.0/24 <http://192.168.187.0/24>
>>> /etc/ipsec.d/wc-vpn.secrets (with actual PSK changed):
>>> 22.214.171.124 126.96.36.199 <http://188.8.131.52>: PSK "1234567890"
>>> Finally, a snippet from /var/log/secure:
>>> Jul 19 23:10:28 ip-10-200-0-171 pluto: "wc-vpn" #616: sending
>>> encrypted notification INVALID_ID_INFORMATION to 184.108.40.206:500
>>> Jul 19 23:10:32 ip-10-200-0-171 pluto: "wc-vpn" #616: the peer
>>> proposed: 10.200.0.0/16:0/0 <http://10.200.0.0/16:0/0> ->
>>> 220.127.116.11/32:0/0 <http://18.104.22.168/32:0/0>
>>> Jul 19 23:10:32 ip-10-200-0-171 pluto: "wc-vpn" #616: cannot
>>> respond to IPsec SA request because no connection is known for
>>> Any help would be greatly appreciated.
>>> Users at lists.openswan.org
>>> Micropayments: https://flattr.com/thing/38387/IPsec-for-Linux-made-easy
>>> Building and Integrating Virtual Private Networks with Openswan:
>> Users at lists.openswan.org
>> Micropayments: https://flattr.com/thing/38387/IPsec-for-Linux-made-easy
>> Building and Integrating Virtual Private Networks with Openswan:
More information about the Users