[strongSwan] no connection has been authorized with policy=PSK
Bonato, Stefano
stefano.bonato at hp.com
Sun Dec 22 17:57:11 CET 2013
Thanks Andreas !
I need to use ikev1 ... :-( ... it's a requirement at this moment ... )
I use nat_traversal=yes ... but the answer has been practically the same ..
Steve
IPSEC.SECRETS
%any : PSK "abcd"
________________________________________________________________
IPSEC.CONF
config setup
# interfaces="ipsec0=eth0"
plutodebug=none
# plutodebug=all
crlcheckinterval=180s
strictcrlpolicy=no
# cachecrls=yes
nat_traversal=yes
charonstart=no
# charonstart=yes
plutostart=yes
conn %default
type=tunnel
ikelifetime=28800s
keylife=86400s
rekeymargin=3m
keyingtries=%forever
dpdaction=clear
dpddelay=30s
# keyexchange=ikev1
# ike=3des-md5-modp1024
# esp=3des-md5-modp1024
# pfs=no
# compress=no
# authby=psk
# authby=secret
# auth=esp
conn steve
authby=psk
type=tunnel
ikelifetime=28800s
keylife=86400s
rekeymargin=3m
keyingtries=%forever
keyexchange=ikev1
ike=des-md5-modp1024
esp=des-md5-modp1024
pfs=no
compress=no
auth=esp
leftid=192.168.13.3
left=192.168.13.3
leftsubnet=192.168.13.0/24
leftsourceip=192.168.13.3
leftfirewall=no
rightid=2.40.85.224
right=2.40.85.224
rightsubnet=192.168.0.0/24
rightfirewall=no
rightsourceip=2.40.85.224
dpdaction=hold
dpddelay=60
dpdtimeout=500
auto=add
________________________________________________________________
Starting strongSwan 4.5.2 IPsec [starter]...
Dec 22 16:49:08 vpn-steve-gw sudo: pam_unix(sudo:session): session closed for user root
Dec 22 16:49:08 vpn-steve-gw pluto[7597]: Starting IKEv1 pluto daemon (strongSwan 4.5.2) THREADS SMARTCARD VENDORID
Dec 22 16:49:08 vpn-steve-gw pluto[7597]: listening on interfaces:
Dec 22 16:49:08 vpn-steve-gw pluto[7597]: eth0
Dec 22 16:49:08 vpn-steve-gw pluto[7597]: 192.168.13.3
Dec 22 16:49:08 vpn-steve-gw pluto[7597]: fe80::f816:3eff:fe3a:9677
Dec 22 16:49:08 vpn-steve-gw pluto[7597]: loaded plugins: test-vectors curl ldap aes des sha1 sha2 md5 random x509 pkcs1 pgp dnskey pem openssl gmp hmac xauth attr kernel-netlink resolve
Dec 22 16:49:08 vpn-steve-gw pluto[7597]: including NAT-Traversal patch (Version 0.6c)
Dec 22 16:49:08 vpn-steve-gw ipsec_starter[7596]: pluto (7597) started after 20 ms
Dec 22 16:49:08 vpn-steve-gw pluto[7597]: no token present in slot 18446744073709551615
Dec 22 16:49:08 vpn-steve-gw pluto[7597]: loading ca certificates from '/etc/ipsec.d/cacerts'
Dec 22 16:49:08 vpn-steve-gw pluto[7597]: loading aa certificates from '/etc/ipsec.d/aacerts'
Dec 22 16:49:08 vpn-steve-gw pluto[7597]: loading ocsp certificates from '/etc/ipsec.d/ocspcerts'
Dec 22 16:49:08 vpn-steve-gw pluto[7597]: Changing to directory '/etc/ipsec.d/crls'
Dec 22 16:49:08 vpn-steve-gw pluto[7597]: loading attribute certificates from '/etc/ipsec.d/acerts'
Dec 22 16:49:08 vpn-steve-gw pluto[7597]: spawning 4 worker threads
Dec 22 16:49:08 vpn-steve-gw pluto[7597]: listening for IKE messages
Dec 22 16:49:08 vpn-steve-gw pluto[7597]: adding interface eth0/eth0 192.168.13.3:500
Dec 22 16:49:08 vpn-steve-gw pluto[7597]: adding interface eth0/eth0 192.168.13.3:4500
Dec 22 16:49:08 vpn-steve-gw pluto[7597]: adding interface lo/lo 127.0.0.1:500
Dec 22 16:49:08 vpn-steve-gw pluto[7597]: adding interface lo/lo 127.0.0.1:4500
Dec 22 16:49:08 vpn-steve-gw pluto[7597]: adding interface lo/lo ::1:500
Dec 22 16:49:08 vpn-steve-gw pluto[7597]: loading secrets from "/etc/ipsec.secrets"
Dec 22 16:49:08 vpn-steve-gw pluto[7597]: loaded PSK secret for %any
Dec 22 16:49:08 vpn-steve-gw pluto[7597]: added connection description "steve"
Dec 22 16:49:17 vpn-steve-gw pluto[7597]: packet from 2.40.85.224:12033: received Vendor ID payload [strongSwan]
Dec 22 16:49:17 vpn-steve-gw pluto[7597]: packet from 2.40.85.224:12033: received Vendor ID payload [XAUTH]
Dec 22 16:49:17 vpn-steve-gw pluto[7597]: packet from 2.40.85.224:12033: received Vendor ID payload [Dead Peer Detection]
Dec 22 16:49:17 vpn-steve-gw pluto[7597]: packet from 2.40.85.224:12033: received Vendor ID payload [RFC 3947]
Dec 22 16:49:17 vpn-steve-gw pluto[7597]: packet from 2.40.85.224:12033: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03]
Dec 22 16:49:17 vpn-steve-gw pluto[7597]: packet from 2.40.85.224:12033: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02]
Dec 22 16:49:17 vpn-steve-gw pluto[7597]: packet from 2.40.85.224:12033: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n]
Dec 22 16:49:17 vpn-steve-gw pluto[7597]: packet from 2.40.85.224:12033: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-00]
Dec 22 16:49:17 vpn-steve-gw pluto[7597]: packet from 2.40.85.224:12033: initial Main Mode message received on 192.168.13.3:500 but no connection has been authorized with policy=PSK
__________________________________________________
-----Original Message-----
From: Andreas Steffen [mailto:andreas.steffen at strongswan.org]
Sent: domenica 22 dicembre 2013 5:04
To: Bonato, Stefano; users at lists.strongswan.org
Subject: Re: [strongSwan] no connection has been authorized with policy=PSK
Hi Stefano,
I see that your peer is behind a NAT router
packet from 2.40.85.224:7076
so that the IKE source port got translated from UDP 500
to 7076 but you defined
nat_traversal=no
which does not allow your source port to float.
Thus please enable
nat_traversal=yes
and if you want to set up a strongSwan-strongSwan connection
rather use IKEv2, not this obsolete and ugly grandma IKEv1 protocol.
Regards
Andreas
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.strongswan.org/pipermail/users/attachments/20131222/b562e509/attachment.html>
More information about the Users
mailing list