[strongSwan] No answer to first packet (IKE Phase 1)
Martin Werthmöller
mw at lw-systems.de
Tue Dec 18 11:43:16 CET 2012
Am Sa, 15 Dez 2012 um 09:43 GMT +0100 schrieb Andreas Steffen:
> Hi Martin,
>
> it might be that the gateway does not like strongSwan's authentication
> or crypto proposals. Pluto 4.x e.g. does not support IKEv1 Aggressive
> Mode.
>
Mmh. I compared the proposals of the strongSwan client with the
windows client based on the network dump (tcpdump -v -v -v). It seems
nearly identical.
** Windows Client
$CLIENT_ADDRESS.10952 > $GW_ADDRESS.500: [udp sum ok] isakmp 1.0
msgid 00000000 cookie d986fa3e946e1f12->0000000000000000: phase 1 Iident:
(sa: doi=ipsec situation=identity
(p: #1 protoid=isakmp transform=1
(p: #1 protoid=isakmp transform=1
(t: #1 id=ike
(type=enc value=aes)
(type=hash value=md5)
(type=auth value=rsa sig)
(type=group desc value=modp1024)
(type=lifetype value=sec)
(type=lifeduration value=7080)
(type=keylen value=0080))))
(vid: len=8)
(vid: len=16)
(vid: len=16)
(vid: len=16)
(vid: len=16)
(vid: len=16)
(vid: len=16)
(vid: len=16)
(vid: len=16)
(vid: len=20)
** strongSwan
$CLIENT_ADDRESS.500 > $GW_ADDRESS.500: [udp sum ok] isakmp 1.0
msgid 00000000 cookie 11c0ecba8587f030->0000000000000000: phase 1 I ident:
(sa: doi=ipsec situation=identity
(p: #0 protoid=isakmp transform=1
(t: #0 id=ike
(type=lifetype value=sec)
(type=lifeduration value=7080)
(type=enc value=aes)
(type=hash value=md5)
(type=keylen value=0080)
(type=auth value=rsa sig)
(type=group desc value=modp1024))))
(vid: len=16 882fe56d6fd20dbc2251613b2ebe5beb)
(vid: len=8 09002689dfd6b712)
(vid: len=16 afcad71368a1f1c96b8696fc77570100)
(vid: len=16 4a131c81070358455c5728f20e95452f)
(vid: len=16 7d9419a65310ca6f2c179d9215529d56)
(vid: len=16 cd60464335df21f87cfdb2fc68b6a448)
(vid: len=16 90cb80913ebb696e086381b5ec427b1f)
(vid: len=16 4485152d18b6bbcd0be8a8469579ddcc)
With iptables, I try to move the source port of the strongSwan client
to 10952. Same result.
The only difference I see, is the order of the parameters in the
packet or - more deeply - the XAUTH parameter
>
> On 12/14/2012 02:38 PM, Martin Werthmöller wrote:
> > Hi Strongswan users,
> >
> > we like to setup a IPSec connection to a Telco Tec LiSS VPN Gateway.
> > We test the VPN connection with a windows client (NCP). Here, the
> > connection will be established immediately.
> >
> > As we run our strongSwan client, the connection establishment runs
> > into a timeout.
> >
> > 010 "liss" #3: STATE_MAIN_I1: retransmission; will wait 20s for response
> >
> > The pluto debug log shows no more information about this.
> > The Windows Client and the strongSwan client uses the same certificate
> > an connection settings (configfile beneath).
> >
> > We also capture the traffic of both connections establishments via
> > tcpdump. With our strongSwan client, the VPN gateway will no answer to
> > the first UDP packet from pluto. We examined the first packets of both
> > clients.
> >
> > Here we saw a difference at the Payload (Vendor ID (13) of both
> > packets.
> >
> > ** NCP client
> >
> > Type Payload: Vendor ID (13) : Unknown Vendor ID
> > Type Payload: Vendor ID (13) : draft-ietf-ipsec-nat-t-ike-03
> > Type Payload: Vendor ID (13) : draft-ietf-ipsec-nat-t-ike-02\n
> > Type Payload: Vendor ID (13) : draft-ietf-ipsec-nat-t-ike-00
> > Type Payload: Vendor ID (13) : RFC 3947 Negotiation of NAT-Traversal in the IKE
> > Type Payload: Vendor ID (13) : RFC 3706 DPD (Dead Peer Detection)
> > Type Payload: Vendor ID (13) : Unknown Vendor ID
> > Type Payload: Vendor ID (13) : Unknown Vendor ID
> > Type Payload: Vendor ID (13) : Unknown Vendor ID
> > Type Payload: Vendor ID (13) : Microsoft L2TP/IPSec VPN Client
> >
> >
> > ** stronSwan client
> >
> > Type Payload: Vendor ID (13) : strongSwan
> > Type Payload: Vendor ID (13) : XAUTH
> > Type Payload: Vendor ID (13) : RFC 3706 DPD (Dead Peer Detection)
> > Type Payload: Vendor ID (13) : RFC 3947 Negotiation of Traversal in the IKE
> > Type Payload: Vendor ID (13) : draft-ietf-ipsec-nat-t-ike-03
> > Type Payload: Vendor ID (13) : draft-ietf-ipsec-nat-t-ike-02
> > Type Payload: Vendor ID (13) : draft-ietf-ipsec-nat-t-ike-02\n
> > Type Payload: Vendor ID (13) : draft-ietf-ipsec-nat-t-ike-00
> >
> >
> > Beside the differences in "Unknown Vendor ID" and the "L2TP Client"
> > the strongSwan packet conatains the XAUTH "Flag".
> >
> > May this be the problem of the gateway timeouts?
> >
> > How could we disable the XAUT at the first packet?
> >
> >
> > Best regards,
> > Martin Werthmoeller
> >
>
>
> --
> ======================================================================
> Andreas Steffen andreas.steffen at strongswan.org
> strongSwan - the Linux VPN Solution! www.strongswan.org
> Institute for Internet Technologies and Applications
> University of Applied Sciences Rapperswil
> CH-8640 Rapperswil (Switzerland)
> ===========================================================[ITA-HSR]==
>
--
LWsystems - IT-Service and Consulting
mw at lw-systems.de * http://www.lw-systems.de
More information about the Users
mailing list