[strongSwan] Simple Setup between Strongswan V4.6.4 and Strongswan V5.3.3 in IKEV1-Mode does not work

Michael Niehren michael at niehren.de
Thu Oct 1 16:50:52 CEST 2015


Hi together,

i am very familiar with Strongswan V4 since year's and now i want
to upgrade to Strongswan V5.
First i tried to setup an Tunnel with X509-Certificates without any
success, so i tried to setup a simple PSK-Tunnel, also with no success.
The partners are one with Stronswan V4.6.4, the other with V5.3.3.

I hope someone could show me my fault.

First, the config of the V4.6.4
--------
config setup
         plutodebug=none
         uniqueids=yes
         nat_traversal=yes
         interfaces="%defaultroute"

conn %default
         keyexchange=ikev1
         keyingtries=1

conn testvpn
   auto=add
   authby=secret
   left=192.168.62.20
   leftsubnet=192.168.93.0/24
   right=%any
   rightsubnet=192.168.92.0/24
------

Second, the config of V5.3.3
---------
config setup
   charondebug="dmn 2, mgr 2, ike 2, chd 2, job 2, cfg 2, knl 2, net 2, enc 2, li
b 2"

conn %default
   keyingtries=1
   keyexchange=ikev1

conn testvpn
   auto=start
   authby=secret
   leftsubnet=192.168.92.0/24
   right=79.232.231.58
   rightsubnet=192.168.93.0/24
-------

As you can see, it is a very simple setup. I balanced the 2 ipsec.secret files, so the connection 
can start, but it don't.
Here is the Log on the V4.6.4 machine:
Oct  1 16:40:03 pluto[2575]: added connection description "testvpn"
Oct  1 16:40:15 pluto[2575]: packet from 79.232.238.176:61017: received Vendor ID payload [XAUTH]
Oct  1 16:40:15 pluto[2575]: packet from 79.232.238.176:61017: received Vendor ID payload [Dead Peer 
Detection]
Oct  1 16:40:15 pluto[2575]: packet from 79.232.238.176:61017: received Vendor ID payload [RFC 3947]
Oct  1 16:40:15 pluto[2575]: packet from 79.232.238.176:61017: ignoring Vendor ID payload 
[draft-ietf-ipsec-nat-t-ike-02_n]
Oct  1 16:40:15 pluto[2575]: "testvpn"[1] 79.232.238.176:61017 #1: responding to Main Mode from 
unknown peer 79.232.238.176:61017
Oct  1 16:40:15 pluto[2575]: "testvpn"[1] 79.232.238.176:61017 #1: NAT-Traversal: Result using RFC 
3947: both are NATed
Oct  1 16:40:15 pluto[2575]: "testvpn"[1] 79.232.238.176:61017 #1: Informational Exchange message 
must be encrypted

that's all.
Charondebug on the V5.3.3 machine does not seem to work, i only got the following Log:
Oct  1 16:40:15 ipsec_starter[4317]: Starting strongSwan 5.3.3 IPsec [starter]...
Oct  1 16:40:15 ipsec_starter[4335]: charon (4336) started after 20 ms
Oct  1 16:40:15 charon: 09[IKE] initiating Main Mode IKE_SA testvpn[1] to 79.232.231.58

after starting the connection with
robo@/etc/ipsec.d/connections# ipsec start
Starting strongSwan 5.3.3 IPsec [starter]...

Hope for you help, best regards
   Michael

-- 
Michael Niehren              __   _       powered by
                             / /  (_)__  __ ____  __
                            / /__/ / _ \/ // /\ \/ /
                           /____/_/_//_/\_,_/ /_/\_\



More information about the Users mailing list