[strongSwan] Strongswan to Sonicwall 5500, INVALID_SYNTAX error establishing CHILD_SA

Harvinder Rupra harvinder.rupra at appliedconsultants.co.uk
Mon Apr 14 16:40:03 CEST 2014


Hi We have a Strongswan 5.1.2 vpn to Sonicwall 5500.When we initiate the VPN from the Strongswan end we get a "received INVALID_SYNTAX notify error".However when we initiate it from the Sonicwall end all is well.Can anyone see why we are getting the INVALID_SYNTAX notify error.Details are provided below.

regards

HarvinderInitiate VPN from Strongswan end.ipsec up data-centerHere is the output from the charon.logApr 14 14:17:45 06[CFG] received stroke: initiate 'data-center'Apr 14 14:17:45 09[IKE] <data-center|6> initiating IKE_SA data-center[6] to xxx.xxx.xxx.34Apr 14 14:17:45 09[ENC] <data-center|6> generating IKE_SA_INIT request 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) ]Apr 14 14:17:45 09[NET] <data-center|6> sending packet: from xxx.xxx.xxx.156[500] to xxx.xxx.xxx.34[500] (536 bytes)Apr 14 14:17:45 08[NET] <data-center|6> received packet: from xxx.xxx.xxx.34[500] to xxx.xxx.xxx.156[500] (317 bytes)Apr 14 14:17:45 08[ENC] <data-center|6> parsed IKE_SA_INIT response 0 [ SA KE No CERTREQ N(NATD_S_IP) N(NATD_D_IP) V ]Apr 14 14:17:45 08[ENC] <data-center|6> received unknown vendor ID: 2a:67:75:d0:ad:2a:a7:88:7c:33:fe:1d:68:ba:f3:08:96:6f:00:01Apr 14 14:17:45 08[IKE] <data-center|6> authentication of 'xxx.xxx.xxx.156' (myself) with pre-shared keyApr 14 14:17:45 08[IKE] <data-center|6> establishing CHILD_SA data-centerApr 14 14:17:45 08[ENC] <data-center|6> generating IKE_AUTH request 1 [ IDi N(INIT_CONTACT) IDr AUTH CPRQ(ADDR DNS) SA TSi TSr N(EAP_ONLY) ]Apr 14 14:17:45 08[NET] <data-center|6> sending packet: from xxx.xxx.xxx.156[500] to xxx.xxx.xxx.34[500] (524 bytes)Apr 14 14:17:46 13[NET] <data-center|6> received packet: from xxx.xxx.xxx.34[500] to xxx.xxx.xxx.156[500] (68 bytes)Apr 14 14:17:46 13[ENC] <data-center|6> parsed IKE_AUTH response 1 [ N(INVAL_SYN) ]Apr 14 14:17:46 13[IKE] <data-center|6> received INVALID_SYNTAX notify errorHowever, If the Sonicwall initates the VPN all is well and we are able to use the tunnels created.The ouput from the charon.log is:Apr 14 15:10:40 15[NET] received packet: from xxx.xxx.xxx.34[500] to xxx.xxx.xxx.156[500] (312 bytes)Apr 14 15:10:40 15[ENC] parsed IKE_SA_INIT request 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) V ]Apr 14 15:10:40 15[ENC] received unknown vendor ID: 2a:67:75:d0:ad:2a:a7:88:7c:33:fe:1d:68:ba:f3:08:96:6f:00:01Apr 14 15:10:40 15[IKE] xxx.xxx.xxx.34 is initiating an IKE_SAApr 14 15:10:40 15[ENC] generating IKE_SA_INIT response 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) N(MULT_AUTH) ]Apr 14 15:10:40 15[NET] sending packet: from xxx.xxx.xxx.156[500] to xxx.xxx.xxx.34[500] (308 bytes)Apr 14 15:10:40 05[NET] received packet: from xxx.xxx.xxx.34[500] to xxx.xxx.xxx.156[500] (196 bytes)Apr 14 15:10:40 05[ENC] parsed IKE_AUTH request 1 [ IDi CERTREQ AUTH SA TSi TSr N(INIT_CONTACT) ]Apr 14 15:10:40 05[CFG] looking for peer configs matching xxx.xxx.xxx.156[%any]...xxx.xxx.xxx.34[xxx.xxx.xxx.34]Apr 14 15:10:40 05[CFG] selected peer config 'data-center'Apr 14 15:10:40 05[IKE] authentication of 'xxx.xxx.xxx.34' with pre-shared key successfulApr 14 15:10:40 05[IKE] authentication of 'xxx.xxx.xxx.156' (myself) with pre-shared keyApr 14 15:10:40 05[IKE] IKE_SA data-center[2] established between xxx.xxx.xxx.156[xxx.xxx.xxx.156]...xxx.xxx.xxx.34[xxx.xxx.xxx.34]Apr 14 15:10:40 05[IKE] scheduling reauthentication in 86209sApr 14 15:10:40 05[IKE] maximum IKE_SA lifetime 86389sOur config for this VPN is:strongswan.confcharon {        cisco_unity = yes        # number of worker threads in charon        threads = 16        # send strongswan vendor ID?        # send_vendor_id = yes        #install_routes = no        plugins {                sql {                        # loglevel to log into sql database                        loglevel = -1                        # URI to the database                        # database = sqlite:///path/to/file.db                        # database = mysql://user:password@localhost/database                }        }        # ...      filelog {            /var/log/charon.log {            # loggers to files also accept the append option to open files in            # append mode at startup (default is yes)            #append = no            # the default loglevel for all daemon subsystems (defaults to 1).            #default = 2            time_format = %b %e %T            ike_name = yes            flush_line = yes            }ipsec.conf# ipsec.conf - strongSwan IPsec configuration fileconfig setup        #cachecrls=yes        strictcrlpolicy=noconn %default        ikelifetime=60m        keylife=20m        rekeymargin=3m        keyingtries=1        keyexchange=ikev2        authby=secretinclude /etc/ipsec.d/conns/*.confdata-center.confconn data-center        left=xxx.xxx.xxx.156        leftsubnet=10.0.33.0/24        #leftfirewall=yes        #rightsendcert=no        lefthostaccess=yes        leftsourceip=10.0.33.17        right=xxx.xxx.xxx.34        rightsubnet=192.35.1.51/32,192.35.1.52/32,192.35.1.53/32,10.19.52.52/32,10.19.52.53/32,10.19.52.60/32        authby=secret        keyexchange=ikev2        keyingtries=%forever        ike=3des-md5-modp1024        esp=3des-md5-modp1024        ikelifetime=86400s        keylife=3600s        mobike=no        auto=add
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.strongswan.org/pipermail/users/attachments/20140414/515ab4db/attachment.html>


More information about the Users mailing list