[strongSwan] no connection has been authorized with policy=PSK
Bonato, Stefano
stefano.bonato at hp.com
Sun Dec 22 19:47:22 CET 2013
Yu are right:
1. It was my fault : I forgot 3des. I used 3des-md5-modp1024 and IKEV2 ==> it works
2. With 3DES and IKEV1 it does'n works ( :( )
I'will try moving the requirement from IKEv1 to IKEv2
THANKS.
Steve
-----Original Message-----
From: Andreas Steffen [mailto:andreas.steffen at strongswan.org]
Sent: domenica 22 dicembre 2013 7:09
To: Bonato, Stefano; users at lists.strongswan.org
Subject: Re: [strongSwan] no connection has been authorized with policy=PSK
Arghhh! Are you sure that pluto supports single DES encryption
(at least without the exclamation mark)?
On 22.12.2013 17:57, Bonato, Stefano wrote:
> Thanks Andreas !
>
> I need to use ikev1 ... :-( ... it's a requirement at this moment ... )
>
>
>
> I use nat_traversal=yes ... but the answer has been practically the same ..
>
> Steve
>
>
>
> IPSEC.SECRETS
>
> %any : PSK "abcd"
>
> ________________________________________________________________
>
> IPSEC.CONF
>
> config setup
>
> # interfaces="ipsec0=eth0"
>
> plutodebug=none
>
> # plutodebug=all
>
> crlcheckinterval=180s
>
> strictcrlpolicy=no
>
> # cachecrls=yes
>
> nat_traversal=yes
>
> charonstart=no
>
> # charonstart=yes
>
> plutostart=yes
>
>
>
> conn %default
>
> type=tunnel
>
> ikelifetime=28800s
>
> keylife=86400s
>
> rekeymargin=3m
>
> keyingtries=%forever
>
> dpdaction=clear
>
> dpddelay=30s
>
> # keyexchange=ikev1
>
> # ike=3des-md5-modp1024
>
> # esp=3des-md5-modp1024
>
> # pfs=no
>
> # compress=no
>
> # authby=psk
>
> # authby=secret
>
> # auth=esp
>
>
>
> conn steve
>
> authby=psk
>
> type=tunnel
>
> ikelifetime=28800s
>
> keylife=86400s
>
> rekeymargin=3m
>
> keyingtries=%forever
>
> keyexchange=ikev1
>
> ike=des-md5-modp1024
>
> esp=des-md5-modp1024
>
> pfs=no
>
> compress=no
>
> auth=esp
>
> leftid=192.168.13.3
>
> left=192.168.13.3
>
> leftsubnet=192.168.13.0/24
>
> leftsourceip=192.168.13.3
>
> leftfirewall=no
>
> rightid=2.40.85.224
>
> right=2.40.85.224
>
> rightsubnet=192.168.0.0/24
>
> rightfirewall=no
>
> rightsourceip=2.40.85.224
>
> dpdaction=hold
>
> dpddelay=60
>
> dpdtimeout=500
>
> auto=add
>
>
>
> ________________________________________________________________
>
>
>
>
>
>
>
> Starting strongSwan 4.5.2 IPsec [starter]...
>
> Dec 22 16:49:08 vpn-steve-gw sudo: pam_unix(sudo:session): session
> closed for user root
>
> Dec 22 16:49:08 vpn-steve-gw pluto[7597]: Starting IKEv1 pluto daemon
> (strongSwan 4.5.2) THREADS SMARTCARD VENDORID
>
> Dec 22 16:49:08 vpn-steve-gw pluto[7597]: listening on interfaces:
>
> Dec 22 16:49:08 vpn-steve-gw pluto[7597]: eth0
>
> Dec 22 16:49:08 vpn-steve-gw pluto[7597]: 192.168.13.3
>
> Dec 22 16:49:08 vpn-steve-gw pluto[7597]: fe80::f816:3eff:fe3a:9677
>
> Dec 22 16:49:08 vpn-steve-gw pluto[7597]: loaded plugins: test-vectors
> curl ldap aes des sha1 sha2 md5 random x509 pkcs1 pgp dnskey pem openssl
> gmp hmac xauth attr kernel-netlink resolve
>
> Dec 22 16:49:08 vpn-steve-gw pluto[7597]: including NAT-Traversal
> patch (Version 0.6c)
>
> Dec 22 16:49:08 vpn-steve-gw ipsec_starter[7596]: pluto (7597) started
> after 20 ms
>
> Dec 22 16:49:08 vpn-steve-gw pluto[7597]: no token present in slot
> 18446744073709551615
>
> Dec 22 16:49:08 vpn-steve-gw pluto[7597]: loading ca certificates from
> '/etc/ipsec.d/cacerts'
>
> Dec 22 16:49:08 vpn-steve-gw pluto[7597]: loading aa certificates from
> '/etc/ipsec.d/aacerts'
>
> Dec 22 16:49:08 vpn-steve-gw pluto[7597]: loading ocsp certificates from
> '/etc/ipsec.d/ocspcerts'
>
> Dec 22 16:49:08 vpn-steve-gw pluto[7597]: Changing to directory
> '/etc/ipsec.d/crls'
>
> Dec 22 16:49:08 vpn-steve-gw pluto[7597]: loading attribute certificates
> from '/etc/ipsec.d/acerts'
>
> Dec 22 16:49:08 vpn-steve-gw pluto[7597]: spawning 4 worker threads
>
> Dec 22 16:49:08 vpn-steve-gw pluto[7597]: listening for IKE messages
>
> Dec 22 16:49:08 vpn-steve-gw pluto[7597]: adding interface eth0/eth0
> 192.168.13.3:500
>
> Dec 22 16:49:08 vpn-steve-gw pluto[7597]: adding interface eth0/eth0
> 192.168.13.3:4500
>
> Dec 22 16:49:08 vpn-steve-gw pluto[7597]: adding interface lo/lo
> 127.0.0.1:500
>
> Dec 22 16:49:08 vpn-steve-gw pluto[7597]: adding interface lo/lo
> 127.0.0.1:4500
>
> Dec 22 16:49:08 vpn-steve-gw pluto[7597]: adding interface lo/lo ::1:500
>
> Dec 22 16:49:08 vpn-steve-gw pluto[7597]: loading secrets from
> "/etc/ipsec.secrets"
>
> Dec 22 16:49:08 vpn-steve-gw pluto[7597]: loaded PSK secret for %any
>
> Dec 22 16:49:08 vpn-steve-gw pluto[7597]: added connection description
> "steve"
>
> Dec 22 16:49:17 vpn-steve-gw pluto[7597]: packet from 2.40.85.224:12033:
> received Vendor ID payload [strongSwan]
>
> Dec 22 16:49:17 vpn-steve-gw pluto[7597]: packet from 2.40.85.224:12033:
> received Vendor ID payload [XAUTH]
>
> Dec 22 16:49:17 vpn-steve-gw pluto[7597]: packet from 2.40.85.224:12033:
> received Vendor ID payload [Dead Peer Detection]
>
> Dec 22 16:49:17 vpn-steve-gw pluto[7597]: packet from 2.40.85.224:12033:
> received Vendor ID payload [RFC 3947]
>
> Dec 22 16:49:17 vpn-steve-gw pluto[7597]: packet from 2.40.85.224:12033:
> ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03]
>
> Dec 22 16:49:17 vpn-steve-gw pluto[7597]: packet from 2.40.85.224:12033:
> ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02]
>
> Dec 22 16:49:17 vpn-steve-gw pluto[7597]: packet from 2.40.85.224:12033:
> ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n]
>
> Dec 22 16:49:17 vpn-steve-gw pluto[7597]: packet from 2.40.85.224:12033:
> ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-00]
>
> Dec 22 16:49:17 vpn-steve-gw pluto[7597]: packet from 2.40.85.224:12033:
> *initial Main Mode message received on 192.168.13.3:500 but no
> connection has been authorized with policy=PSK*
>
>
>
> __________________________________________________
>
>
>
> -----Original Message-----
> From: Andreas Steffen [mailto:andreas.steffen at strongswan.org]
> Sent: domenica 22 dicembre 2013 5:04
> To: Bonato, Stefano; users at lists.strongswan.org
> Subject: Re: [strongSwan] no connection has been authorized with policy=PSK
>
>
>
> Hi Stefano,
>
>
>
> I see that your peer is behind a NAT router
>
>
>
> packet from 2.40.85.224:7076
>
>
>
> so that the IKE source port got translated from UDP 500
>
> to 7076 but you defined
>
>
>
> nat_traversal=no
>
>
>
> which does not allow your source port to float.
>
>
>
> Thus please enable
>
>
>
> nat_traversal=yes
>
>
>
> and if you want to set up a strongSwan-strongSwan connection
>
> rather use IKEv2, not this obsolete and ugly grandma IKEv1 protocol.
>
>
>
> Regards
>
>
>
> Andreas
>
>
>
>
>
>
>
--
======================================================================
Andreas Steffen andreas.steffen at strongswan.org
strongSwan - the Open Source VPN Solution! www.strongswan.org
Institute for Internet Technologies and Applications
University of Applied Sciences Rapperswil
CH-8640 Rapperswil (Switzerland)
===========================================================[ITA-HSR]==
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.strongswan.org/pipermail/users/attachments/20131222/28f3c5ca/attachment.html>
More information about the Users
mailing list