[strongSwan] cannot respond to IPsec SA request because no connection is known

Micah Anderson micah at riseup.net
Fri Jul 15 15:33:55 CEST 2011


Daniel Mentz
<danielml+mailinglists.strongswan at sent.com> writes:

> On 07/09/2011 10:44 PM, Micah Anderson wrote:
>> For some reason that i do not understand, I'm getting:
>>
>> Jul  9 22:37:41 kestrel pluto[3901]: "l2tp-psk"[2] 208.54.45.249:58920 #1: cannot respond to IPsec SA request because no connection is known for 198.252.153.38:4500[198.252.153.38]:17/1701...208.54.45.249:58920[26.164.21.104]:17/%any==={26.164.21.104/32}
>
>>
>> conn l2tp-psk
>>    authby=secret
>>    pfs=no
>>    compress=no
>>    rekey=no
>>    keyexchange=ikev1
>>    keyingtries=3
>>    type=transport
>>    leftprotoport=17/1701
>>    right=%any
>>    rightprotoport=17/%any
>>    auto=add
>
> You specified transport mode in your config, right? 

Yes, type=transport above.

>However, it looks like your peer wants to setup a connection using
>tunnel mode: It says
>
> "208.54.45.249:58920[26.164.21.104]:17/%any==={26.164.21.104/32}"
>
> which means that your peer is 208.54.45.249, and this peer wants to 
> secure traffic for the subnet 26.164.21.104/32. This won't work in 
> transport mode because in this mode both peers only secure their own 
> traffic.

Hmm, ok... I assumed that this was how it worked because it was doing
nat traversal. I just tried to change the configuration to use
'type=tunnel' and I also upgraded to strongswan 4.5.2, but:

Jul 15 06:31:07 kestrel pluto[14750]: "l2tp-psk"[2] 208.54.45.177:17010 #1: cannot respond to IPsec SA request because no connection is known for 198.252.153.38:4500[198.252.153.38]:17/1701...208.54.45.177:17010[26.163.197.237]:17/%any===26.163.197.237/32
Jul 15 06:31:07 kestrel pluto[14750]: "l2tp-psk"[2] 208.54.45.177:17010 #1: sending encrypted notification INVALID_ID_INFORMATION to 208.54.45.177:17010
Jul 15 06:31:07 kestrel pluto[14750]: | state transition function for STATE_QUICK_R0 failed: INVALID_ID_INFORMATION
Jul 15 06:31:07 kestrel pluto[14750]: | next event EVENT_NAT_T_KEEPALIVE in 18 seconds
Jul 15 06:31:18 kestrel pluto[14750]: | 
Jul 15 06:31:18 kestrel pluto[14750]: | *received 284 bytes from 208.54.45.177:17010 on eth0
Jul 15 06:31:18 kestrel pluto[14750]: | ICOOKIE:  bc e0 1c 65  d5 e7 10 64
Jul 15 06:31:18 kestrel pluto[14750]: | RCOOKIE:  a7 a9 5e bf  b1 8e 2f e3
Jul 15 06:31:18 kestrel pluto[14750]: | peer:  d0 36 2d b1
Jul 15 06:31:18 kestrel pluto[14750]: | state hash entry 31
Jul 15 06:31:18 kestrel pluto[14750]: | state object not found
Jul 15 06:31:18 kestrel pluto[14750]: | ICOOKIE:  bc e0 1c 65  d5 e7 10 64
Jul 15 06:31:18 kestrel pluto[14750]: | RCOOKIE:  a7 a9 5e bf  b1 8e 2f e3
Jul 15 06:31:18 kestrel pluto[14750]: | peer:  d0 36 2d b1
Jul 15 06:31:18 kestrel pluto[14750]: | state hash entry 31
Jul 15 06:31:18 kestrel pluto[14750]: | state object #1 found, in STATE_MAIN_R3
Jul 15 06:31:18 kestrel pluto[14750]: "l2tp-psk"[2] 208.54.45.177:17010 #1: Quick Mode I1 message is unacceptable because it uses a previously used Message ID 0x2943adee (perhaps this is a duplicated packet)
Jul 15 06:31:18 kestrel pluto[14750]: "l2tp-psk"[2] 208.54.45.177:17010 #1: sending encrypted notification INVALID_MESSAGE_ID to 208.54.45.177:17010

It is interesting that statusall shows:

00 #1: "l2tp-psk"[2] 208.54.45.177:17010 STATE_MAIN_R3 (sent MR3, ISAKMP SA established); EVENT_SA_EXPIRE in 28656s; newest ISAKMP
000 

thanks again!
micah





More information about the Users mailing list