[strongSwan] strongswan to lancom. No ip via ike-configmode
Andre
maillist at 5gbit.de
Wed Jul 27 15:07:36 CEST 2011
Hi,
I'm trying to get a stronswan based vpn running. My linuxbased
strongswan
client is configured to act as roadwarrior to connect to a lancom vpn
router.
Authentication is done with certs and most of the stuff is also
running.
But my strongswan client isn't able to get an ip via ike-configmode.
log on my strongswan client:
Jul 27 14:47:45 box1 pluto[7087]: "VPN" #3: initiating Main Mode
Jul 27 14:47:46 box1 pluto[7087]: "VPN" #3: received Vendor ID payload
[draft-ietf-ipsec-nat-t-ike-02_n]
Jul 27 14:47:46 box1 pluto[7087]: "VPN" #3: received Vendor ID payload
[draft-ietf-ipsec-nat-t-ike-03]
Jul 27 14:47:46 box1 pluto[7087]: "VPN" #3: received Vendor ID payload
[RFC3947]
Jul 27 14:47:46 box1 pluto[7087]: "VPN" #3: ignoring Vendor ID payload
[eeefa37809e32ad4de4f6b010c26a640]
Jul 27 14:47:46 box1 pluto[7087]: "VPN" #3: received Vendor ID payload
[XAUTH]
Jul 27 14:47:46 box1 pluto[7087]: "VPN" #3: received Vendor ID payload
[Dead Peer Detection]
Jul 27 14:47:46 box1 pluto[7087]: "VPN" #3: enabling possible
NAT-traversal with method 3
Jul 27 14:47:46 box1 pluto[7087]: "VPN" #3: NAT-Traversal: Result using
RFC 3947: both are NATed
Jul 27 14:47:46 box1 pluto[7087]: "VPN" #3: we have a cert and are
sending it upon request
Jul 27 14:47:47 box1 pluto[7087]: "VPN" #3: Peer ID is ID_DER_ASN1_DN:
'C=DE, ST=N, L=O, O=N, OU=T, CN=GW, E=me at 5gbit.de'
Jul 27 14:47:47 box1 pluto[7087]: "VPN" #3: crl not found
Jul 27 14:47:47 box1 pluto[7087]: "VPN" #3: certificate status unknown
Jul 27 14:47:47 box1 pluto[7087]: "VPN" #3: ISAKMP SA established
Jul 27 14:47:47 box1 pluto[7087]: "VPN" #3: sending ModeCfg request
Jul 27 14:47:47 box1 pluto[7087]: "VPN" #3: parsing ModeCfg reply
Jul 27 14:47:47 box1 pluto[7087]: "VPN" #3: received ModeCfg reply,
established
log on lancom vpn server:
root at GW:/
>
[VPN-Status] 2011/07/27 14:47:49,420
IKE info: The remote server 109.44.202.224:4500 (UDP) peer
def-main-peer id supports draft-ietf-ipsec-isakmp-xauth
IKE info: The remote server 109.44.202.224:4500 (UDP) peer
def-main-peer id negotiated rfc-3706-dead-peer-detection
IKE info: The remote server 109.44.202.224:4500 (UDP) peer
def-main-peer id supports NAT-T in mode rfc
IKE info: The remote server 109.44.202.224:4500 (UDP) peer
def-main-peer id supports NAT-T in mode rfc
IKE info: The remote server 109.44.202.224:4500 (UDP) peer
def-main-peer id supports NAT-T in mode rfc
IKE info: The remote server 109.44.202.224:4500 (UDP) peer
def-main-peer id supports NAT-T in mode rfc
IKE info: The remote server 109.44.202.224:4500 (UDP) peer
def-main-peer id supports NAT-T in mode rfc
[VPN-Status] 2011/07/27 14:47:49,420
IKE info: phase-1 proposal failed: remote No 1 authentication method =
rsa signature local No 1 authentication method = PRE_SHARED
IKE info: Phase-1 remote proposal 1 for peer def-main-peer matched with
local proposal 2
[VPN-Status] 2011/07/27 14:47:49,940
IKE info: Set local ID to </C=DE/ST=N/L=O/O=N/OU=T/CN=GW/E=me at 5gbit.de>
[VPN-Status] 2011/07/27 14:47:50,170
IKE info: Phase-1 [responder] for peer def-main-peer between initiator
id E=me at 5gbit.de,CN=Box1,OU=T,O=N,L=O,ST=N,C=DE, responder id
E=me at 5gbit.de,CN=GW,OU=T,O=N,L=O,ST=N,C=DE done
IKE info: NAT-T enabled in mode rfc, we are behind a nat, the remote
side is behind a nat
IKE info: SA ISAKMP for peer def-main-peer encryption aes-cbc
authentication md5
IKE info: life time ( 3600 sec/ 0 kb)
[VPN-Status] 2011/07/27 14:47:50,170
IKE info: Phase-1 SA Rekeying Timeout (Soft-Event) for peer
def-main-peer set to 3240 seconds (Responder)
[VPN-Status] 2011/07/27 14:47:50,170
IKE info: Phase-1 SA Timeout (Hard-Event) for peer def-main-peer set to
3600 seconds (Responder)
[VPN-Status] 2011/07/27 14:47:50,420
IKE info: IKE-CFG: Received REQUEST message with id 0 from peer
def-main-peer
IKE info: IKE-CFG: Attribute INTERNAL_IP4_ADDRESS len 0 value (none)
received
IKE info: IKE-CFG: Attribute INTERNAL_IP4_NETMASK len 4 value
255.255.255.255 received
[VPN-Status] 2011/07/27 14:47:50,420
IKE info: IKE-CFG: Creating REPLY message with id 0 for peer
def-main-peer
IKE info: IKE-CFG: Attribute INTERNAL_IP4_NETMASK len 0 skipped
IKE info: IKE-CFG: Attribute INTERNAL_IP4_ADDRESS len 0 skipped
IKE info: IKE-CFG: Sending message
ipsec statusall:
000 Status of IKEv1 pluto daemon (strongSwan 4.3.2):
000 interface lo/lo ::1:500
000 interface lo/lo 127.0.0.1:4500
000 interface lo/lo 127.0.0.1:500
000 interface eth0/eth0 10.2.4.1:4500
000 interface eth0/eth0 10.2.4.1:500
000 interface eth1/eth1 192.168.200.109:4500
000 interface eth1/eth1 192.168.200.109:500
000 interface wlan0/wlan0 10.2.3.100:4500
000 interface wlan0/wlan0 10.2.3.100:500
000 %myid = (none)
000 loaded plugins: curl ldap random pubkey openssl hmac gmp
000 debug options: none
000
000 "VPN": %modecfg===10.2.3.100:4500[C=DE, ST=N, L=O, O=N, OU=T,
CN=Box1, E=me at 5gbit.de]---10.2.3.1...85.17.130.131:4500[C=DE, ST=N, L=O,
O=N, OU=T, CN=GW, E=me at 5gbit.de]===192.168.1.0/24; unrouted; eroute
owner: #0
000 "VPN": CAs: 'C=DE, ST=N, L=O, O=N, OU=T, CN=LinuxVPNCA,
E=me at 5gbit.de'...'%any'
000 "VPN": ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s;
rekey_fuzz: 100%; keyingtries: 0
000 "VPN": policy: PUBKEY+ENCRYPT+TUNNEL+PFS+UP; prio: 24,32;
interface: wlan0;
000 "VPN": newest ISAKMP SA: #3; newest IPsec SA: #0;
000 "VPN": IKE proposal: AES_CBC_128/HMAC_MD5/MODP_1024
000
000 #3: "VPN" STATE_MODE_CFG_I2 (received ModeCfg reply, established);
EVENT_SA_REPLACE in 3225s; newest ISAKMP
000 #3: pending Phase 2 for "VPN" replacing #0
000
In the logfiles, I can see, that my roadwarrior tries to get an ip, but
why does my vpn route don't give him one?
Anyone tried to get such a combination running?
rest regards
Andre
More information about the Users
mailing list