[strongSwan] Strongswan 5.2.1 client problem - IKEv1 aggressive PSK+XAUTH with Virtual IP

MK grroch at gmail.com
Fri Dec 19 16:21:05 CET 2014


Hello all,

I'm struggling with the problem with Strongswan 5.2.1 client.
I have a High-end Juniper SRX as VPN gateway, which is working fine and was
tested with other VPN client.

I'm using IKEv1 aggressive mode, PSK+XAUTH.
IKE phase 1 is connecting properly. The problem is on phase2 with getting
virtual IP from the VPN gateway.

Here are logs I get:


































*initiating Aggressive Mode IKE_SA test[1] to 192.168.yy.yygenerating
AGGRESSIVE request 0 [ SA KE No ID V V V V ]sending packet: from
192.168.xx.xx[500] to 192.168.yy.yy[500] (350 bytes)received packet: from
192.168.yy.yy[500] to 192.168.xx.xx[500] (409 bytes)parsed AGGRESSIVE
response 0 [ SA KE No ID HASH V V V NAT-D NAT-D ]received DPD vendor
IDreceived NAT-T (RFC 3947) vendor IDreceived unknown vendor ID:
69:93:69:22:87:41:c6:d4:ca:09:4c:93:e2:42:c9:de:19:e7:b7:c6:00:00:00:05:00:00:05:00faking
NAT situation to enforce UDP encapsulationgenerating AGGRESSIVE request 0 [
NAT-D NAT-D HASH ]sending packet: from 192.168.xx.xx[4500] to
192.168.yy.yy[4500] (108 bytes)received packet: from 192.168.yy.yy[4500] to
192.168.xx.xx[4500] (76 bytes)parsed TRANSACTION request 4287602294 [ HASH
CPRQ(X_USER X_PWD) ]generating TRANSACTION response 4287602294 [ HASH
CPRP(X_USER X_PWD) ]sending packet: from 192.168.xx.xx[4500] to
192.168.yy.yy[4500] (92 bytes)received packet: from 192.168.yy.yy[4500] to
192.168.xx.xx[4500] (76 bytes)parsed TRANSACTION request 4124377813 [ HASH
CPS(X_STATUS) ]XAuth authentication of 'user' (myself) successfulIKE_SA
test[1] established between
192.168.xx.xx[HIDDED_ID1]...192.168.yy.yy[HIDDEN_ID2]scheduling
reauthentication in 86220smaximum IKE_SA lifetime 86400sgenerating
TRANSACTION response 4124377813 [ HASH CPA(X_STATUS) ]sending packet: from
192.168.xx.xx[4500] to 192.168.yy.yy[4500] (76 bytes)generating TRANSACTION
request 2379419226 [ HASH CPRQ(ADDR DNS) ]sending packet: from
192.168.xx.xx[4500] to 192.168.yy.yy[4500] (76 bytes)received packet: from
192.168.yy.yy[4500] to 192.168.xx.xx[4500] (92 bytes)queueing TRANSACTION
request as tasks still activereceived packet: from 192.168.yy.yy[4500] to
192.168.xx.xx[4500] (60 bytes)payload of type CONFIGURATION_V1 not occurred
1 times (0)message verification failedgenerating INFORMATIONAL_V1 request
1197204442 [ HASH N(PLD_MAL) ]sending packet: from 192.168.xx.xx[4500] to
192.168.yy.yy[4500] (76 bytes)TRANSACTION response with message ID
2379419226 processing failedconnection 'test' not established after 4000ms,
detaching*

Configuration of ipsec.conf file:





























*conn %default        keyingtries=%forever        mobike=no
ikelifetime=86400        keylife=86400        rekeymargin=180s
ike=aes128-sha1-modp1024!        esp=aes128-sha1-modp1024!
authby=xauthpsk        dpdaction=restart        dpddelay=10
dpdtimeout=30        rekeyfuzz=0%        auto=add
keyexchange=ikev1        rightid=HIDDEN_ID2        right=192.168.yy.yyconn
test        aggressive=yes        left=192.168.xx.xx
leftid=HIDDEN_ID1        leftauth=psk        leftauth2=xauth
leftsourceip=%config        leftsubnet=10.aa.aa.aa/32
rightsubnet=10.bb.bb.bb/32 <http://10.bb.bb.bb/32>
rightauth=psk        xauth=client        xauth_identity=user*


Did anybody have similar problem with IKEv1 aggressive PSK+XAUTH with
Virtual IP?
I'd be really grateful of some help or hint.

Best Regards,
Marcin Kieliszczyk
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.strongswan.org/pipermail/users/attachments/20141219/acf8d9ac/attachment-0001.html>


More information about the Users mailing list