[strongSwan] No proposal chosen / No IKE config found
Andreas Steffen
andreas.steffen at strongswan.org
Fri Dec 30 10:14:56 CET 2016
Hi,
could you increase the debug level in ipsec.conf:
config setup
charondebug="cfg 2"
and rerun the scenario?
Regards
Andreas
On 30.12.2016 09:12, tskals at gmail.com wrote:
> Can someone look at my debugs and config and tell me why Strongswan is
> sending a no proposal chosen notify message based on the configs for my
> strongswan and asa below? I tried changing the leftid and rightid to the
> private outside address of ASA, natted address, not sure what Strongswan
> doesn’t like, everything looks like it matches..
>
>
>
> Configuring Strongswan with an ASA, ASA is behind firewall, NATing
> occurs upstream , 500, 4500 are portforwarded back to ASA
>
>
>
>
>
> Strongawan syslog output:
>
>
>
> Dec 30 02:46:29 lagunesrevengeII charon: 07[ENC] generating
> INFORMATIONAL_V1 request 469970900 [ N(NO_PROP) ]
>
> Dec 30 02:46:29 lagunesrevengeII charon: 07[NET] sending packet: from
> 104.x.x.x[500] to 98.x.x.x[500] (40 bytes)
>
> Dec 30 02:46:37 lagunesrevengeII charon: 08[NET] received packet: from
> 98.x.x.x[500] to 104.x.x.x[500] (112 bytes)
>
> Dec 30 02:46:37 lagunesrevengeII charon: 08[ENC] parsed ID_PROT request
> 0 [ SA V ]
>
> Dec 30 02:46:37 lagunesrevengeII charon: 08[IKE] no IKE config found for
> 104.x.x.x...98.x.x.x, sending NO_PROPOSAL_CHOSEN
>
>
>
> ASA debug output
>
>
>
> ec 30 01:38:24 [IKEv1]IP = 104.x.x.x., IKE_DECODE RECEIVED Message
> (msgid=954138f9) with payloads : HDR + NOTIFY (1
>
> 1) + NONE (0) total length : 40
>
> Dec 30 01:38:24 [IKEv1]IP = 104.x.x.x, IKE_DECODE RECEIVED Message
> (msgid=954138f9) with payloads : HDR + NOTIFY (1
>
> 1) + NONE (0) total length : 40
>
> Dec 30 01:38:24 [IKEv1]IP = 104.x.x.x, Received an un-encrypted
> NO_PROPOSAL_CHOSEN notify message, dropping
>
> Dec 30 01:38:24 [IKEv1]IP = 104.x.x.x, Information Exchange processing
> failed
>
>
>
>
>
> IPsec.conf
>
>
>
> # ipsec.conf - strongSwan IPsec configuration file
>
>
>
> # basic configuration
>
>
>
> config setup
>
> # strictcrlpolicy=yes
>
> # uniqueids = no
>
>
>
> # Add connections here.
>
>
>
> # Sample VPN connections
>
> conn %default
>
> ikelifetime=1440m
>
> keylife=60m
>
> rekeymargin=3m
>
> keyingtries=1
>
> keyexchange=ikev1
>
> authby=secret
>
>
>
> conn toflakjacket
>
> left=104.x.x.x
>
> leftsubnet=10.0.0.0/24
>
> leftfirewall=yes
>
> right=98.x.x.x
>
> rightsubnet=192.168.7.0/24
>
> auto=route
>
> ike=aes128-sha1-modp1536
>
> esp=aes128-sha1
>
>
>
>
>
> IPsec.secrets
>
>
>
> 104.x.x.x 98.x.x.x : PSK mypassword
>
>
>
>
>
>
>
> ASA config
>
>
>
> interface Vlan1
>
> nameif inside
>
> security-level 100
>
> ip address 192.168.7.1 255.255.255.0
>
>
>
>
>
> interface Vlan2
>
> nameif outside
>
> security-level 0
>
> ip address 192.168.1.250 255.255.255.0
>
>
>
>
>
> object-group network localinteresting
>
> network-object 192.168.7.0 255.255.255.0
>
> object-group network remoteinteresting
>
> network-object 10.0.0.0 255.255.255.0
>
>
>
> access-list interestingtraffic extended permit ip object-group
> localinteresting object-group remoteinteresting
>
>
>
> crypto ipsec ikev1 transform-set myVPN esp-aes esp-sha-hmac
>
> crypto ipsec security-association lifetime seconds 3600
>
>
>
> crypto map revengemap 1 match address interestingtraffic
>
> crypto map revengemap 1 set peer 104.x.x.x
>
> crypto map revengemap 1 set ikev1 transform-set myVPN
>
> crypto map revengemap interface outside
>
>
>
> crypto ikev1 enable outside
>
> crypto ikev1 policy 1
>
> authentication pre-share
>
> encryption aes
>
> hash sha
>
> group 5
>
> lifetime 86400
>
>
>
>
>
> tunnel-group 104.x.x.x type ipsec-l2l
>
> tunnel-group 104.x.x.x ipsec-attributes
>
> ikev1 pre-shared-key mypassword
======================================================================
Andreas Steffen andreas.steffen at strongswan.org
strongSwan - the Open Source VPN Solution! www.strongswan.org
Institute for Internet Technologies and Applications
University of Applied Sciences Rapperswil
CH-8640 Rapperswil (Switzerland)
===========================================================[ITA-HSR]==
-------------- next part --------------
A non-text attachment was scrubbed...
Name: smime.p7s
Type: application/pkcs7-signature
Size: 3859 bytes
Desc: S/MIME Cryptographic Signature
URL: <http://lists.strongswan.org/pipermail/users/attachments/20161230/631db40c/attachment.bin>
More information about the Users
mailing list