[strongSwan] L2TP help
Troy Telford
ttelford.groups at gmail.com
Wed Sep 22 20:20:44 CEST 2010
I've got a working Openswan setup (backed up, of course). I decided to give
strongSwan a try, and choose whichever I liked better...
It also gives me confidence the certificates, etc. working properly. (Though
logfiles help that too...)
For the moment, my clients are mainly L2TP clients - having the built-in
client for Windows, OS X, and iOS devices helps... So getting that working
properly is the highest priority (and since that's in the IKEv1 realm,
Openswan fits the need nicely already...) I'm also a bit curious about which
handles the L2TP connections better with regards to clients behind NAT, etc...
With strongSwan, however, I'm having trouble getting connected.
I've used 'plutodebug="control controlmore" to get more debugging info, and
here's the bits I think are interesting: (I can send more if needed,
though...)
All the certs and CA validate:
Sep 22 11:40:13 pilot pluto[8140]: | certificate is valid
Sep 22 11:40:13 pilot pluto[8140]: | issuer cacert found
Sep 22 11:40:13 pilot pluto[8140]: | certificate signature is valid
Sep 22 11:40:13 pilot pluto[8140]: | crl signature is valid
Sep 22 11:40:13 pilot pluto[8140]: | crl is valid: until Oct 06 13:04:05 2010
Sep 22 11:40:13 pilot pluto[8140]: | certificate is good
Phase I seems to complete:
Sep 22 11:40:13 pilot pluto[8140]: "roadwarrior"[2] 72.254.127.191:4500 #3:
sent MR3, ISAKMP SA established
And next, the part that I think is the problem:
Sep 22 11:40:13 pilot pluto[8140]: "roadwarrior-l2tp"[2] 72.254.127.191:4500
#4: NAT-Traversal: Transport mode disabled due to security concerns
Sep 22 11:40:13 pilot pluto[8140]: "roadwarrior-l2tp"[2] 72.254.127.191:4500
#4: sending encrypted notification BAD_PROPOSAL_SYNTAX to 72.254.127.191:4500
The "BAD_PROPOSAL_SYNTAX" and Transport mode error happens with both the
certificate-based 'roadwarrior-l2tp' connection, and with the PSK-based
'roadwarrior-l2tp-psk' connections.
(Note, some coments are not in the actual file, but are there for your
benefit...)
I'm using packages from Debian (sid), kernel 2.6.32, and strongSwan 4.4.1.
My config:
config setup
# plutodebug=all
# plutodebug="control controlmore"
crlcheckinterval="30"
strictcrlpolicy=yes
cachecrls=yes
nat_traversal=yes
virtual_private=%v4:10.0.0.0/8,%v4:192.168.0.0/16,%v4:172.16.0.0/12,%v4:!
192.168.1.0/26,%v4:!192.168.2.0/24,%v4:!192.168.3.0/24
interfaces=%defaultroute
charonstart=yes
plutostart=yes
conn %default
keyingtries=1
type=tunnel
ike=aes128-sha1-modp1536,aes192-sha1-modp1536,aes256-sha1-modp1536
esp=aes128-sha1-modp1536,aes192-sha1-modp1536,aes256-sha1-modp1536
compress=yes
left=%defaultroute
leftsubnet=my_hostname.net/32 # This is dyndns assigned, so it's not
# static :(
right=%any
dpddelay=30
dpdtimeout=120
dpdaction=clear
pfs=yes
conn roadwarrior-l2tp
type=transport
leftprotoport=17/1701
rightprotoport=17/%any
rightsubnet=vhost:%no,%priv
pfs=no
also=roadwarrior
conn roadwarrior
authby=rsasig
leftrsasigkey=%cert
rightrsasigkey=%cert
leftcert=pilotCert.pem
leftid=@my_hostname
rightid="C=CO, ST=State, O=My Organization, OU=My OrgUnit, CN=*, E=*"
rightca=%same
auto=add
# for iOS VPNs...
conn roadwarrior-l2tp-psk
type=transport
authby=secret
leftprotoport=17/1701
rightprotoport=17/%any
rightsubnet=vhost:%no,%priv
pfs=no
auto=add
More information about the Users
mailing list