<div dir="ltr"><div class="gmail_default" style="font-family:verdana,sans-serif;font-size:small;color:rgb(51,0,153)">Hi Andreas,<br><br></div><div class="gmail_default" style="font-family:verdana,sans-serif;font-size:small;color:rgb(51,0,153)">You mean other end secrets file should contain as below ? I tried this also but the result is same.<br>10.147.46.112 10.147.46.103 : PSK "123456789"<br>
<br></div><div class="gmail_default" style="font-family:verdana,sans-serif;font-size:small;color:rgb(51,0,153)">Thanks,<br></div><div class="gmail_default" style="font-family:verdana,sans-serif;font-size:small;color:rgb(51,0,153)">Jayapal<br><br></div><div class="gmail_extra"><br><div class="gmail_quote">On Thu, Jun 16, 2016 at 4:35 PM, Andreas Steffen <span dir="ltr"><<a href="mailto:andreas.steffen@strongswan.org" target="_blank">andreas.steffen@strongswan.org</a>></span> wrote:<br><blockquote class="gmail_quote" style="margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex">It looks as if the PSK is not the same on the other endpoint.<br>
<br>
Regards<br>
<br>
Andreas<br>
<div><div class="h5"><br>
On 16.06.2016 12:29, Jayapal Reddy wrote:<br>
> Hi,<br>
><br>
> I am trying strongswan 5.2.1 for the site to site vpn.<br>
> I have followed the config from the link[1] for the configuration. In my<br>
> setup the connection is failed to come up.<br>
><br>
> [1] <a href="https://www.strongswan.org/testing/testresults/ikev1/net2net-psk/" rel="noreferrer" target="_blank">https://www.strongswan.org/testing/testresults/ikev1/net2net-psk/</a><br>
><br>
> Can some one please suggest what is going wrong. Below are the logs.<br>
><br>
> # ipsec --version<br>
> Linux strongSwan U5.2.1/K3.2.0-4-amd64<br>
> Institute for Internet Technologies and Applications<br>
> University of Applied Sciences Rapperswil, Switzerland<br>
> See 'ipsec --copyright' for copyright information.<br>
><br>
><br>
><br>
><br>
> R1 config:<br>
> #auto=addpsec.conf - strongSwan IPsec configuration file<br>
><br>
> config setup<br>
><br>
> conn %default<br>
> ikelifetime=60m<br>
> keylife=20m<br>
> rekeymargin=3m<br>
> keyingtries=1<br>
> keyexchange=ikev1<br>
> #authby=secret<br>
> authby=psk<br>
><br>
> conn net-net<br>
> left=10.147.46.103<br>
</div></div>> leftsubnet=<a href="http://10.10.0.0/16" rel="noreferrer" target="_blank">10.10.0.0/16</a> <<a href="http://10.10.0.0/16" rel="noreferrer" target="_blank">http://10.10.0.0/16</a>><br>
> leftfirewall=yes<br>
> right=10.147.46.112<br>
> rightsubnet=<a href="http://10.20.0.0/16" rel="noreferrer" target="_blank">10.20.0.0/16</a> <<a href="http://10.20.0.0/16" rel="noreferrer" target="_blank">http://10.20.0.0/16</a>><br>
<span class="">> auto=add<br>
><br>
> # cat ipsec.secrets<br>
> 10.147.46.112 10.147.46.103 : PSK "123456789"<br>
><br>
> R2 config:<br>
><br>
> # cat ipsec.conf<br>
><br>
> conn %default<br>
> ikelifetime=60m<br>
> keylife=20m<br>
> rekeymargin=3m<br>
> keyingtries=1<br>
> keyexchange=ikev1<br>
> authby=secret<br>
><br>
> conn net-net<br>
> left=10.147.46.112<br>
</span>> leftsubnet=<a href="http://10.20.0.0/16" rel="noreferrer" target="_blank">10.20.0.0/16</a> <<a href="http://10.20.0.0/16" rel="noreferrer" target="_blank">http://10.20.0.0/16</a>><br>
> leftfirewall=yes<br>
> right=10.147.46.103<br>
> rightsubnet=<a href="http://10.10.0.0/16" rel="noreferrer" target="_blank">10.10.0.0/16</a> <<a href="http://10.10.0.0/16" rel="noreferrer" target="_blank">http://10.10.0.0/16</a>><br>
<div><div class="h5">> auto=add<br>
> # cat ipsec.secrets<br>
> 10.147.46.103 10.147.46.112 : PSK "123456789"<br>
><br>
><br>
> # ipsec up net-net<br>
> initiating Main Mode IKE_SA net-net[3] to 10.147.46.112<br>
> generating ID_PROT request 0 [ SA V V V V ]<br>
> sending packet: from 10.147.46.103[500] to 10.147.46.112[500] (248 bytes)<br>
> received packet: from 10.147.46.112[500] to 10.147.46.103[500] (136 bytes)<br>
> parsed ID_PROT response 0 [ SA V V V ]<br>
> received XAuth vendor ID<br>
> received DPD vendor ID<br>
> received NAT-T (RFC 3947) vendor ID<br>
> generating ID_PROT request 0 [ KE No NAT-D NAT-D ]<br>
> sending packet: from 10.147.46.103[500] to 10.147.46.112[500] (372 bytes)<br>
> received packet: from 10.147.46.112[500] to 10.147.46.103[500] (372 bytes)<br>
> parsed ID_PROT response 0 [ KE No NAT-D NAT-D ]<br>
> generating ID_PROT request 0 [ ID HASH ]<br>
> sending packet: from 10.147.46.103[500] to 10.147.46.112[500] (92 bytes)<br>
> received packet: from 10.147.46.112[500] to 10.147.46.103[500] (76 bytes)<br>
> invalid HASH_V1 payload length, decryption failed?<br>
> could not decrypt payloads<br>
> message parsing failed<br>
> ignore malformed INFORMATIONAL request<br>
> INFORMATIONAL_V1 request with message ID 867435333 processing failed<br>
><br>
><br>
> Thanks,<br>
> Jayapal<br>
><br>
><br>
</div></div>> _______________________________________________<br>
> Users mailing list<br>
> <a href="mailto:Users@lists.strongswan.org">Users@lists.strongswan.org</a><br>
> <a href="https://lists.strongswan.org/mailman/listinfo/users" rel="noreferrer" target="_blank">https://lists.strongswan.org/mailman/listinfo/users</a><br>
><br>
<br>
--<br>
======================================================================<br>
Andreas Steffen <a href="mailto:andreas.steffen@strongswan.org">andreas.steffen@strongswan.org</a><br>
strongSwan - the Open Source VPN Solution! <a href="http://www.strongswan.org" rel="noreferrer" target="_blank">www.strongswan.org</a><br>
<span class="">Institute for Internet Technologies and Applications<br>
University of Applied Sciences Rapperswil<br>
</span>CH-8640 Rapperswil (Switzerland)<br>
===========================================================[ITA-HSR]==<br>
<br>
</blockquote></div><br></div></div>