[strongSwan] problem connecting to juniper ssg5

Jürgen Hoffmann hoffmann at ellumination.de
Sat Dec 18 12:33:10 CET 2010


Hi All,

 

I am trying to connect my strongswan 4.2.5 Ubuntu Installation to a new
Juniper SSG5 from a contractor. But I keep getting the following in the
logs.- What am I doing wrong?

 

Dec 18 12:18:04 gate2 pluto[6960]: Starting Pluto (strongSwan Version 4.2.5
THREADS VENDORID)

Dec 18 12:18:04 gate2 pluto[6960]:   including NAT-Traversal patch (Version
0.6c) [disabled]

Dec 18 12:18:04 gate2 pluto[6960]: | xauth module: using default
get_secret() function

Dec 18 12:18:04 gate2 pluto[6960]: | xauth module: using default
verify_secret() function

Dec 18 12:18:04 gate2 pluto[6960]: | inserting event EVENT_REINIT_SECRET,
timeout in 3600 seconds

Dec 18 12:18:04 gate2 pluto[6960]: ike_alg: Activating OAKLEY_AES_CBC
encryption: Ok

Dec 18 12:18:04 gate2 pluto[6960]: ike_alg: Activating OAKLEY_BLOWFISH_CBC
encryption: Ok

Dec 18 12:18:04 gate2 pluto[6960]: ike_alg: Activating OAKLEY_SERPENT_CBC
encryption: Ok

Dec 18 12:18:04 gate2 pluto[6960]: ike_alg: Activating OAKLEY_SHA2_256 hash:
Ok

Dec 18 12:18:04 gate2 pluto[6960]: ike_alg: Activating OAKLEY_SHA2_384 hash:
Ok

Dec 18 12:18:04 gate2 pluto[6960]: ike_alg: Activating OAKLEY_SHA2_512 hash:
Ok

Dec 18 12:18:04 gate2 pluto[6960]: ike_alg: Activating OAKLEY_TWOFISH_CBC
encryption: Ok

Dec 18 12:18:04 gate2 pluto[6960]: ike_alg: Activating
OAKLEY_TWOFISH_CBC_SSH encryption: Ok

Dec 18 12:18:04 gate2 pluto[6960]: Testing registered IKE encryption
algorithms:

Dec 18 12:18:04 gate2 pluto[6960]:   OAKLEY_BLOWFISH_CBC self-test not
available

Dec 18 12:18:04 gate2 pluto[6960]:   OAKLEY_3DES_CBC self-test not available

Dec 18 12:18:04 gate2 pluto[6960]:   OAKLEY_AES_CBC self-test not available

Dec 18 12:18:04 gate2 pluto[6960]:   OAKLEY_SERPENT_CBC self-test not
available

Dec 18 12:18:04 gate2 pluto[6960]:   OAKLEY_TWOFISH_CBC self-test not
available

Dec 18 12:18:04 gate2 pluto[6960]:   OAKLEY_TWOFISH_CBC_SSH self-test not
available

Dec 18 12:18:04 gate2 pluto[6960]: Testing registered IKE hash algorithms:

Dec 18 12:18:04 gate2 pluto[6960]:   OAKLEY_MD5 hash self-test passed

Dec 18 12:18:04 gate2 pluto[6960]:   OAKLEY_MD5 hmac self-test passed

Dec 18 12:18:04 gate2 pluto[6960]:   OAKLEY_SHA hash self-test passed

Dec 18 12:18:04 gate2 pluto[6960]:   OAKLEY_SHA hmac self-test passed

Dec 18 12:18:04 gate2 pluto[6960]:   OAKLEY_SHA2_256 hash self-test passed

Dec 18 12:18:05 gate2 pluto[6960]:   OAKLEY_SHA2_256 hmac self-test passed

Dec 18 12:18:05 gate2 pluto[6960]:   OAKLEY_SHA2_384 hash self-test passed

Dec 18 12:18:05 gate2 pluto[6960]:   OAKLEY_SHA2_384 hmac self-test passed

Dec 18 12:18:05 gate2 pluto[6960]:   OAKLEY_SHA2_512 hash self-test passed

Dec 18 12:18:05 gate2 pluto[6960]:   OAKLEY_SHA2_512 hmac self-test passed

Dec 18 12:18:05 gate2 pluto[6960]: All crypto self-tests passed

Dec 18 12:18:05 gate2 pluto[6960]: Using Linux 2.6 IPsec interface code

Dec 18 12:18:06 gate2 pluto[6960]: Changing to directory
'/usr/local/strongswan/etc/ipsec.d/cacerts'

Dec 18 12:18:06 gate2 pluto[6960]:   loaded CA cert file 'strongswanKey.pem'
(1743 bytes)

Dec 18 12:18:06 gate2 pluto[6960]:   no passphrase available

Dec 18 12:18:06 gate2 pluto[6960]:   loaded CA cert file
'strongswanCert.pem' (1919 bytes)

Dec 18 12:18:06 gate2 pluto[6960]: |   authcert inserted

Dec 18 12:18:06 gate2 pluto[6960]:   loaded CA cert file 'serial.old' (17
bytes)

Dec 18 12:18:06 gate2 pluto[6960]:   file coded in unknown format, discarded

Dec 18 12:18:06 gate2 pluto[6960]:   loaded CA cert file 'serial' (17 bytes)

Dec 18 12:18:06 gate2 pluto[6960]:   file coded in unknown format, discarded

Dec 18 12:18:06 gate2 pluto[6960]:   loaded CA cert file 'index.txt.old'
(191 bytes)

Dec 18 12:18:06 gate2 pluto[6960]:   file coded in unknown format, discarded

Dec 18 12:18:06 gate2 pluto[6960]:   loaded CA cert file
'index.txt.attr.old' (21 bytes)

Dec 18 12:18:06 gate2 pluto[6960]:   file coded in unknown format, discarded

Dec 18 12:18:06 gate2 pluto[6960]:   loaded CA cert file 'index.txt.attr'
(21 bytes)

Dec 18 12:18:06 gate2 pluto[6960]:   file coded in unknown format, discarded

Dec 18 12:18:06 gate2 pluto[6960]:   loaded CA cert file 'index.txt' (359
bytes)

Dec 18 12:18:06 gate2 pluto[6960]:   file coded in unknown format, discarded

Dec 18 12:18:06 gate2 pluto[6960]: Changing to directory
'/usr/local/strongswan/etc/ipsec.d/aacerts'

Dec 18 12:18:06 gate2 pluto[6960]: Changing to directory
'/usr/local/strongswan/etc/ipsec.d/ocspcerts'

Dec 18 12:18:06 gate2 pluto[6960]: Changing to directory
'/usr/local/strongswan/etc/ipsec.d/crls'

Dec 18 12:18:06 gate2 pluto[6960]: Changing to directory
'/usr/local/strongswan/etc/ipsec.d/acerts'

Dec 18 12:18:06 gate2 pluto[6960]: | inserting event EVENT_LOG_DAILY,
timeout in 42114 seconds

Dec 18 12:18:06 gate2 pluto[6960]: | next event EVENT_REINIT_SECRET in 3598
seconds

Dec 18 12:18:06 gate2 pluto[6960]: |

Dec 18 12:18:06 gate2 pluto[6960]: | *received whack message

Dec 18 12:18:06 gate2 pluto[6960]: listening for IKE messages

Dec 18 12:18:06 gate2 pluto[6960]: | found lo with address 127.0.0.1

Dec 18 12:18:06 gate2 pluto[6960]: | found eth1 with address 30.83.252.204

Dec 18 12:18:06 gate2 pluto[6960]: | found eth1:1 with address 30.83.252.231

Dec 18 12:18:06 gate2 pluto[6960]: | found eth1:2 with address 30.83.252.232

Dec 18 12:18:07 gate2 pluto[6960]: | found eth1:3 with address 30.83.252.206

Dec 18 12:18:07 gate2 pluto[6960]: | found eth1:4 with address 30.83.252.207

Dec 18 12:18:07 gate2 pluto[6960]: | found eth3 with address 172.20.50.1

Dec 18 12:18:07 gate2 pluto[6960]: | found vlan2 with address 172.20.40.254

Dec 18 12:18:07 gate2 pluto[6960]: | found vlan3 with address 172.20.20.254

Dec 18 12:18:07 gate2 pluto[6960]: | found vlan4 with address 172.20.10.254

Dec 18 12:18:07 gate2 pluto[6960]: | found vlan5 with address 172.20.30.254

Dec 18 12:18:07 gate2 pluto[6960]: | found vlan6 with address 192.168.2.254

Dec 18 12:18:07 gate2 pluto[6960]: | found ppp0 with address 10.0.2.1

Dec 18 12:18:07 gate2 pluto[6960]: adding interface ppp0/ppp0 10.0.2.1:500

Dec 18 12:18:07 gate2 pluto[6960]: adding interface vlan6/vlan6
192.168.2.254:500

Dec 18 12:18:07 gate2 pluto[6960]: adding interface vlan5/vlan5
172.20.30.254:500

Dec 18 12:18:07 gate2 pluto[6960]: adding interface vlan4/vlan4
172.20.10.254:500

Dec 18 12:18:07 gate2 pluto[6960]: adding interface vlan3/vlan3
172.20.20.254:500

Dec 18 12:18:07 gate2 pluto[6960]: adding interface vlan2/vlan2
172.20.40.254:500

Dec 18 12:18:07 gate2 pluto[6960]: adding interface eth3/eth3
172.20.50.1:500

Dec 18 12:18:07 gate2 pluto[6960]: adding interface eth1:4/eth1:4
30.83.252.207:500

Dec 18 12:18:07 gate2 pluto[6960]: adding interface eth1:3/eth1:3
30.83.252.206:500

Dec 18 12:18:07 gate2 pluto[6960]: adding interface eth1:2/eth1:2
30.83.252.232:500

Dec 18 12:18:07 gate2 pluto[6960]: adding interface eth1:1/eth1:1
30.83.252.231:500

Dec 18 12:18:07 gate2 pluto[6960]: adding interface eth1/eth1
30.83.252.204:500

Dec 18 12:18:07 gate2 pluto[6960]: adding interface lo/lo 127.0.0.1:500

Dec 18 12:18:07 gate2 pluto[6960]: | found lo with address
0000:0000:0000:0000:0000:0000:0000:0001

Dec 18 12:18:07 gate2 pluto[6960]: adding interface lo/lo ::1:500

Dec 18 12:18:07 gate2 pluto[6960]: loading secrets from
"/usr/local/strongswan/etc/ipsec.secrets"

Dec 18 12:18:07 gate2 pluto[6960]:   loaded shared key for @lw.xxx.de
@hq.xxx.de

Dec 18 12:18:07 gate2 pluto[6960]:   loaded shared key for @hq.xxx.de
@lw.xxx.de

Dec 18 12:18:07 gate2 pluto[6960]: | next event EVENT_REINIT_SECRET in 3597
seconds

Dec 18 12:18:07 gate2 pluto[6960]: |

Dec 18 12:18:07 gate2 pluto[6960]: | *received whack message

Dec 18 12:18:08 gate2 pluto[6960]: | from whack: got --esp=aes128-sha

Dec 18 12:18:08 gate2 pluto[6960]: | esp string values: 12_128-2,

Dec 18 12:18:08 gate2 pluto[6960]: | from whack: got
--ike=aes128-sha-modp1024

Dec 18 12:18:08 gate2 pluto[6960]: | ike string values: 7_128-2-2,

Dec 18 12:18:08 gate2 pluto[6960]: added connection description "net-net"

Dec 18 12:18:08 gate2 pluto[6960]: |
172.20.0.0/16===30.83.252.204[@lw.xxx.de]...2.195.78.10[@hq.xxx.de]===192.16
8.0.0/16

Dec 18 12:18:08 gate2 pluto[6960]: | ike_life: 3600s; ipsec_life: 1200s;
rekey_margin: 180s; rekey_fuzz: 100%; keyingtries: 1; policy:
PSK+ENCRYPT+TUNNEL+PFS

Dec 18 12:18:08 gate2 pluto[6960]: | next event EVENT_REINIT_SECRET in 3597
seconds

Dec 18 12:18:08 gate2 pluto[6960]: |

Dec 18 12:18:08 gate2 pluto[6960]: | *received 192 bytes from
2.195.78.10:500 on eth1

Dec 18 12:18:08 gate2 pluto[6960]: packet from 2.195.78.10:500: ignoring
Vendor ID payload [651ececd748d24be685a79d5f463722820f672df0000001300000614]

Dec 18 12:18:08 gate2 pluto[6960]: packet from 2.195.78.10:500: received
Vendor ID payload [Dead Peer Detection]

Dec 18 12:18:08 gate2 pluto[6960]: packet from 2.195.78.10:500: ignoring
Vendor ID payload [HeartBeat Notify 386b0100]

Dec 18 12:18:08 gate2 pluto[6960]: | preparse_isakmp_policy: peer requests
PSK authentication

Dec 18 12:18:08 gate2 pluto[6960]: | creating state object #1 at 0x8106fc0

Dec 18 12:18:08 gate2 pluto[6960]: | ICOOKIE:  b6 79 4d 82  4f 45 f4 93

Dec 18 12:18:08 gate2 pluto[6960]: | RCOOKIE:  40 0d af 34  06 a6 96 c8

Dec 18 12:18:08 gate2 pluto[6960]: | peer:  52 c3 4e 0a

Dec 18 12:18:08 gate2 pluto[6960]: | state hash entry 30

Dec 18 12:18:08 gate2 pluto[6960]: | inserting event EVENT_SO_DISCARD,
timeout in 0 seconds for #1

Dec 18 12:18:08 gate2 pluto[6960]: "net-net" #1: responding to Main Mode

Dec 18 12:18:08 gate2 pluto[6960]: | inserting event EVENT_RETRANSMIT,
timeout in 10 seconds for #1

Dec 18 12:18:08 gate2 pluto[6960]: | next event EVENT_RETRANSMIT in 10
seconds for #1

Dec 18 12:18:08 gate2 pluto[6960]: |

Dec 18 12:18:08 gate2 pluto[6960]: | *received 196 bytes from
2.195.78.10:500 on eth1

Dec 18 12:18:08 gate2 pluto[6960]: | ICOOKIE:  b6 79 4d 82  4f 45 f4 93

Dec 18 12:18:08 gate2 pluto[6960]: | RCOOKIE:  40 0d af 34  06 a6 96 c8

Dec 18 12:18:08 gate2 pluto[6960]: | peer:  52 c3 4e 0a

Dec 18 12:18:08 gate2 pluto[6960]: | state hash entry 30

Dec 18 12:18:08 gate2 pluto[6960]: | state object #1 found, in STATE_MAIN_R1

Dec 18 12:18:09 gate2 pluto[6960]: | inserting event EVENT_RETRANSMIT,
timeout in 10 seconds for #1

Dec 18 12:18:09 gate2 pluto[6960]: | next event EVENT_RETRANSMIT in 10
seconds for #1

Dec 18 12:18:09 gate2 pluto[6960]: |

Dec 18 12:18:09 gate2 pluto[6960]: | *received 68 bytes from 2.195.78.10:500
on eth1

Dec 18 12:18:09 gate2 pluto[6960]: | ICOOKIE:  b6 79 4d 82  4f 45 f4 93

Dec 18 12:18:09 gate2 pluto[6960]: | RCOOKIE:  40 0d af 34  06 a6 96 c8

Dec 18 12:18:09 gate2 pluto[6960]: | peer:  52 c3 4e 0a

Dec 18 12:18:09 gate2 pluto[6960]: | state hash entry 30

Dec 18 12:18:09 gate2 pluto[6960]: | state object #1 found, in STATE_MAIN_R2

Dec 18 12:18:09 gate2 pluto[6960]: "net-net" #1: byte 2 of ISAKMP
Identification Payload must be zero, but is not

Dec 18 12:18:09 gate2 pluto[6960]: "net-net" #1: probable authentication
failure (mismatch of preshared secrets?): malformed payload in packet

Dec 18 12:18:09 gate2 pluto[6960]: "net-net" #1: sending encrypted
notification PAYLOAD_MALFORMED to 2.195.78.10:500

Dec 18 12:18:09 gate2 pluto[6960]: | next event EVENT_RETRANSMIT in 9
seconds for #1

Dec 18 12:18:12 gate2 pluto[6960]: |

Dec 18 12:18:12 gate2 pluto[6960]: | *received 68 bytes from 2.195.78.10:500
on eth1

Dec 18 12:18:12 gate2 pluto[6960]: | ICOOKIE:  b6 79 4d 82  4f 45 f4 93

Dec 18 12:18:12 gate2 pluto[6960]: | RCOOKIE:  40 0d af 34  06 a6 96 c8

Dec 18 12:18:13 gate2 pluto[6960]: | peer:  52 c3 4e 0a

Dec 18 12:18:13 gate2 pluto[6960]: | state hash entry 30

Dec 18 12:18:13 gate2 pluto[6960]: | state object #1 found, in STATE_MAIN_R2

Dec 18 12:18:13 gate2 pluto[6960]: "net-net" #1: byte 2 of ISAKMP
Identification Payload must be zero, but is not

Dec 18 12:18:13 gate2 pluto[6960]: "net-net" #1: probable authentication
failure (mismatch of preshared secrets?): malformed payload in packet

Dec 18 12:18:13 gate2 pluto[6960]: "net-net" #1: sending encrypted
notification PAYLOAD_MALFORMED to 2.195.78.10:500

Dec 18 12:18:13 gate2 pluto[6960]: | next event EVENT_RETRANSMIT in 6
seconds for #1

Dec 18 12:18:16 gate2 pluto[6960]: |

Dec 18 12:18:16 gate2 pluto[6960]: | *received 68 bytes from 2.195.78.10:500
on eth1

Dec 18 12:18:16 gate2 pluto[6960]: | ICOOKIE:  b6 79 4d 82  4f 45 f4 93

Dec 18 12:18:17 gate2 pluto[6960]: | RCOOKIE:  40 0d af 34  06 a6 96 c8

Dec 18 12:18:17 gate2 pluto[6960]: | peer:  52 c3 4e 0a

Dec 18 12:18:17 gate2 pluto[6960]: | state hash entry 30

Dec 18 12:18:17 gate2 pluto[6960]: | state object #1 found, in STATE_MAIN_R2

Dec 18 12:18:17 gate2 pluto[6960]: "net-net" #1: byte 2 of ISAKMP
Identification Payload must be zero, but is not

Dec 18 12:18:17 gate2 pluto[6960]: "net-net" #1: probable authentication
failure (mismatch of preshared secrets?): malformed payload in packet

Dec 18 12:18:17 gate2 pluto[6960]: "net-net" #1: sending encrypted
notification PAYLOAD_MALFORMED to 2.195.78.10:500

Dec 18 12:18:17 gate2 pluto[6960]: | next event EVENT_RETRANSMIT in 2
seconds for #1

Dec 18 12:18:18 gate2 pluto[6960]: |

Dec 18 12:18:18 gate2 pluto[6960]: | *time to handle event

Dec 18 12:18:18 gate2 pluto[6960]: | event after this is EVENT_REINIT_SECRET
in 3586 seconds

Dec 18 12:18:19 gate2 pluto[6960]: | handling event EVENT_RETRANSMIT for
2.195.78.10 "net-net" #1

Dec 18 12:18:19 gate2 pluto[6960]: | inserting event EVENT_RETRANSMIT,
timeout in 20 seconds for #1

Dec 18 12:18:19 gate2 pluto[6960]: | next event EVENT_RETRANSMIT in 20
seconds for #1

 

Any help is highly appreciated 

 

Kind regards

 

Juergen Hoffmann

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.strongswan.org/pipermail/users/attachments/20101218/9ab2c4a6/attachment.html>


More information about the Users mailing list