[GRLUG] IPSec & CentOS

Godwin godwin at grandrapids-lug.org
Fri Jan 30 15:49:32 EST 2009


Adam,

Do you have pfs=yes on openswan (does it look like my sample) and are
you initiating from there or is it the responder?  Googling "openswan
cisco pfs" I found a guy with similar problem.  He said changing the
Cisco to use DH group 2 solved it.  What are you using?

This is the dumb approach, but often times when initially configuring
a connection, I bounce openswan and dominoes mysteriously fall in
place.  ;-)

G-

http://lists.openswan.org/pipermail/users/2007-September/013176.html

On Fri, Jan 30, 2009 at 3:11 PM, Adam Tauno Williams
<awilliam at whitemice.org> wrote:
> On Fri, 2009-01-30 at 14:33 -0500, Godwin wrote:
>> Ah.  Just for comparison, these are the meaningful settings I have
>> connecting openswan to a cisco pix.  Disclaimer: I don't manage the
>> cisco side.
>
> :) Apparently nobody does.  There is *very* little information
> concerning an IOS setup, and much of it contradictory.
>
>> Once the SA is established with:  ipsec auto --up swan-to-cisco
>> you can check it with:  ipsec eroute  (if you have klips and  the
>> ipsec0 interface)
>
> I don't see an ipsec0 interface.  This will be created when phase 2
> completes? Or does it need to be created initially.
>
> updgate#show crypto isakmp sa
> dst             src             state          conn-id slot
> 216.120.174.238 216.120.174.237 QM_IDLE              1    0
>
> So phase 1 seems to complete.
>
> First problem seems to be in phase 2:
>
> [root at vpn log]# ipsec auto --up UsedPartsDepot
> 104 "UsedPartsDepot" #1: STATE_MAIN_I1: initiate
> 106 "UsedPartsDepot" #1: STATE_MAIN_I2: sent MI2, expecting MR2
> 003 "UsedPartsDepot" #1: received Vendor ID payload [Cisco-Unity]
> 003 "UsedPartsDepot" #1: received Vendor ID payload [Dead Peer
> Detection]
> 003 "UsedPartsDepot" #1: ignoring unknown Vendor ID payload
> [106b596919cac1753642b7ba8d9afc8c]
> 003 "UsedPartsDepot" #1: received Vendor ID payload [XAUTH]
> 108 "UsedPartsDepot" #1: STATE_MAIN_I3: sent MI3, expecting MR3
> 004 "UsedPartsDepot" #1: STATE_MAIN_I4: ISAKMP SA established
> {auth=OAKLEY_PRESHARED_KEY cipher=oakley_3des_cbc_192 prf=oakley_md5
> group=modp1024}
> 117 "UsedPartsDepot" #2: STATE_QUICK_I1: initiate
> 010 "UsedPartsDepot" #2: STATE_QUICK_I1: retransmission; will wait 20s
> for response
> 010 "UsedPartsDepot" #2: STATE_QUICK_I1: retransmission; will wait 40s
> for response
> 031 "UsedPartsDepot" #2: max number of retransmissions (2) reached
> STATE_QUICK_I1.  No acceptable response to our first Quick Mode message:
> perhaps peer likes no proposal
> 000 "UsedPartsDepot" #2: starting keying attempt 2 of at most 3, but
> releasing whack
>
> .. on the Cisco side...
>
> 06:12:24: ISAKMP (0:1): atts are acceptable.
> 06:12:24: ISAKMP (0:1): IPSec policy invalidated proposal
> 06:12:24: ISAKMP (0:1): phase 2 SA policy not acceptable! (local LOCALIP
> remote REMOTEIP)
> 06:12:24: ISAKMP: set new node -1802271793 to QM_IDLE
>
>>   Is your SA staying up?  I remember the other side's admin having
>> trouble with that.  The kernel should establish a route automatically
>> on the CentOS side...
>> What does your "ifconfig -a" and "route -n" look like?
>
> [root at vpn log]# ifconfig -a
> eth0      Link encap:Ethernet  HWaddr 00:50:56:A8:58:16
>          inet addr:X.X.X.X   Mask:255.255.255.224
>          UP BROADCAST RUNNING MULTICAST  MTU:1500  Metric:1
>          RX packets:89060 errors:0 dropped:0 overruns:0 frame:0
>          TX packets:91118 errors:0 dropped:0 overruns:0 carrier:0
>          collisions:0 txqueuelen:1000
>          RX bytes:13340132 (12.7 MiB)  TX bytes:14527014 (13.8 MiB)
>          Interrupt:177 Base address:0x1400
>
> eth1      Link encap:Ethernet  HWaddr 00:50:56:A8:7D:21
>          inet addr:192.168.1.72  Mask:255.255.255.0
>          UP BROADCAST RUNNING MULTICAST  MTU:1500  Metric:1
>          RX packets:785094 errors:0 dropped:0 overruns:0 frame:0
>          TX packets:767027 errors:0 dropped:0 overruns:0 carrier:0
>          collisions:0 txqueuelen:1000
>          RX bytes:127061481 (121.1 MiB)  TX bytes:329838257 (314.5 MiB)
>          Interrupt:185 Base address:0x1480
>
> lo        Link encap:Local Loopback
>          inet addr:127.0.0.1  Mask:255.0.0.0
>          inet6 addr: ::1/128 Scope:Host
>          UP LOOPBACK RUNNING  MTU:16436  Metric:1
>          RX packets:27 errors:0 dropped:0 overruns:0 frame:0
>          TX packets:27 errors:0 dropped:0 overruns:0 carrier:0
>          collisions:0 txqueuelen:0
>          RX bytes:10900 (10.6 KiB)  TX bytes:10900 (10.6 KiB)
>
> [root at vpn log]# ip route
> X.X.X.224/27 dev eth0  proto kernel  scope link  src X.X.X.X
> 192.168.1.0/24 dev eth1  proto kernel  scope link  src 192.168.1.72
> 169.254.0.0/16 dev eth1  scope link
> default via X.X.X.225 dev eth0
>
> _______________________________________________
> grlug mailing list
> grlug at grlug.org
> http://shinobu.grlug.org/cgi-bin/mailman/listinfo/grlug



-- 

Ubber::Geek
http://grlug.org/


More information about the grlug mailing list