[strongSwan] received retransmit of response with ID 0, but next request already sent

Axel Zöllich a.zoellich at kirsch.zoellich.de
Wed Oct 22 14:19:56 CEST 2014


Am Mittwoch, 22. Oktober 2014, 13:48:05 schrieb Thomas Egerer:

> Any chance you can provide the log information of the peer?
No :(


> Judging from your config, you are using public key
> authentication. Do you see the certificates being transmitted?
Yes, i do:

No.     Time           Source                Destination           Protocol 
Length Info
      3 0.052498000    80.152.262.292        217.86.257.203        ISAKMP   
416    Identity Protection (Main Mode)

Frame 3: 416 bytes on wire (3328 bits), 416 bytes captured (3328 bits) on 
interface 0
Linux cooked capture
Internet Protocol Version 4, Src: 80.152.262.292 (80.152.262.292), Dst: 
217.86.257.203 (217.86.257.203)
User Datagram Protocol, Src Port: isakmp (500), Dst Port: isakmp (500)
Internet Security Association and Key Management Protocol
    Initiator cookie: 9d06bd6bae9ad45c
    Responder cookie: 73695db401fe7cea
    Next payload: Key Exchange (4)
    Version: 1.0
    Exchange type: Identity Protection (Main Mode) (2)
    Flags: 0x00
    Message ID: 0x00000000
    Length: 372
    Type Payload: Key Exchange (4)
        Next payload: Nonce (10)
        Payload length: 260
        Key Exchange Data: d3d522b856aa1ee569d25bf02328f02d6ccb5283969ffaaa...
    Type Payload: Nonce (10)
        Next payload: NAT-D (RFC 3947) (20)
        Payload length: 36
        Nonce DATA: 3bc91716609986b745d0ce01df3932ba8e4f10c3ce10fa0b...
    Type Payload: NAT-D (RFC 3947) (20)
        Next payload: NAT-D (RFC 3947) (20)
        Payload length: 24
        HASH of the address and port: 0cbcd7180e0f5f6e3ae2e13eb5d2c86d30056834
    Type Payload: NAT-D (RFC 3947) (20)
        Next payload: NONE / No Next Payload  (0)
        Payload length: 24
        HASH of the address and port: a064a1d3fdb21b35cb188ba9deb6bde71771f635

        
No.     Time           Source                Destination           Protocol 
Length Info
      4 0.302433000    217.86.257.203        80.152.262.292        ISAKMP   
400    Identity Protection (Main Mode)

Frame 4: 400 bytes on wire (3200 bits), 400 bytes captured (3200 bits) on 
interface 0
Linux cooked capture
Internet Protocol Version 4, Src: 217.86.257.203 (217.86.257.203), Dst: 
80.152.262.292 (80.152.262.292)
User Datagram Protocol, Src Port: isakmp (500), Dst Port: isakmp (500)
Internet Security Association and Key Management Protocol
    Initiator cookie: 9d06bd6bae9ad45c
    Responder cookie: 73695db401fe7cea
    Next payload: Key Exchange (4)
    Version: 1.0
    Exchange type: Identity Protection (Main Mode) (2)
    Flags: 0x00
    Message ID: 0x00000000
    Length: 356
    Type Payload: Key Exchange (4)
        Next payload: Nonce (10)
        Payload length: 260
        Key Exchange Data: d48d1078cea3354ff836d0d1d9c3cac8312102dfd0534399...
    Type Payload: Nonce (10)
        Next payload: NAT-D (RFC 3947) (20)
        Payload length: 20
        Nonce DATA: e24e05e1cfc7c34282a2b3bc4104e657
    Type Payload: NAT-D (RFC 3947) (20)
        Next payload: NAT-D (RFC 3947) (20)
        Payload length: 24
        HASH of the address and port: a064a1d3fdb21b35cb188ba9deb6bde71771f635
    Type Payload: NAT-D (RFC 3947) (20)
        Next payload: NONE / No Next Payload  (0)
        Payload length: 24
        HASH of the address and port: 0cbcd7180e0f5f6e3ae2e13eb5d2c86d30056834

       
No.     Time           Source                Destination           Protocol 
Length Info
      5 0.313490000    80.152.262.292        217.86.157.103        ISAKMP   
112    Identity Protection (Main Mode)

Frame 5: 112 bytes on wire (896 bits), 112 bytes captured (896 bits) on 
interface 0
Linux cooked capture
Internet Protocol Version 4, Src: 80.152.262.292 (80.152.262.292), Dst: 
217.86.157.103 (217.86.157.103)
User Datagram Protocol, Src Port: isakmp (500), Dst Port: isakmp (500)
Internet Security Association and Key Management Protocol
    Initiator cookie: 9d06bd6bae9ad45c
    Responder cookie: 73695db401fe7cea
    Next payload: Identification (5)
    Version: 1.0
    Exchange type: Identity Protection (Main Mode) (2)
    Flags: 0x01
    Message ID: 0x00000000
    Length: 68
    Encrypted Data (40 bytes)
    

No.     Time           Source                Destination           Protocol 
Length Info
      8 3.351721000    217.86.257.203        80.152.262.292        ISAKMP   
400    Identity Protection (Main Mode)

Frame 8: 400 bytes on wire (3200 bits), 400 bytes captured (3200 bits) on 
interface 0
Linux cooked capture
Internet Protocol Version 4, Src: 217.86.157.103 (217.86.157.103), Dst: 
80.152.262.292 (80.152.262.292)
User Datagram Protocol, Src Port: isakmp (500), Dst Port: isakmp (500)
Internet Security Association and Key Management Protocol
    Initiator cookie: 9d06bd6bae9ad45c
    Responder cookie: 73695db401fe7cea
    Next payload: Key Exchange (4)
    Version: 1.0
    Exchange type: Identity Protection (Main Mode) (2)
    Flags: 0x00
    Message ID: 0x00000000
    Length: 356
    Type Payload: Key Exchange (4)
        Next payload: Nonce (10)
        Payload length: 260
        Key Exchange Data: d48d1078cea3354ff836d0d1d9c3cac8312102dfd0534399...
    Type Payload: Nonce (10)
        Next payload: NAT-D (RFC 3947) (20)
        Payload length: 20
        Nonce DATA: e24e05e1cfc7c34282a2b3bc4104e657
    Type Payload: NAT-D (RFC 3947) (20)
        Next payload: NAT-D (RFC 3947) (20)
        Payload length: 24
        HASH of the address and port: a064a1d3fdb21b35cb188ba9deb6bde71771f635
    Type Payload: NAT-D (RFC 3947) (20)
        Next payload: NONE / No Next Payload  (0)
        Payload length: 24
        HASH of the address and port: 0cbcd7180e0f5f6e3ae2e13eb5d2c86d30056834

> Because this looks very much like an authentication gone wrong.
> I've seen similar behavior before, the peer was an IKEv2 node
> however.

It looks like 217.86.257.203 doesn't answer No. 5 but resends No. 4 after 3 
seconds.




More information about the Users mailing list