[strongSwan] no shared keys found error

Edvinas K edvinas.email at gmail.com
Wed Feb 21 18:12:48 CET 2018


email

Hello,

I'm trying to connect route-based IPSec VPN to Cisco device (ISR) and i'm
getting some errors. Configured everything as written in ROUTE-BASED-VPN
page. But i'm especially not sure about ipsec.conf configuration as it's
not included in that  page.

>From cisco side i see these errors:

Feb 21 16:15:09.292: %CRYPTO-6-IKMP_MODE_FAILURE: Processing of
Informational mode failed with peer at 39.107.111.111

the strongSwan (centos) box says this:

Feb 22 00:59:17 localhost charon: 14[NET] received packet: from
37.157.222.222[500] to 10.67.0.24[500] (164 bytes)
Feb 22 00:59:17 localhost charon: 14[ENC] parsed ID_PROT request 0 [ SA V V
V V ]
Feb 22 00:59:17 localhost charon: 14[IKE] received NAT-T (RFC 3947) vendor
ID
Feb 22 00:59:17 localhost charon: 14[IKE] received
draft-ietf-ipsec-nat-t-ike-07 vendor ID
Feb 22 00:59:17 localhost charon: 14[IKE] received
draft-ietf-ipsec-nat-t-ike-03 vendor ID
Feb 22 00:59:17 localhost charon: 14[IKE] received
draft-ietf-ipsec-nat-t-ike-02\n vendor ID
Feb 22 00:59:17 localhost charon: 14[IKE] 37.157.222.222 is initiating a
Main Mode IKE_SA
Feb 22 00:59:17 localhost charon: 14[ENC] generating ID_PROT response 0 [
SA V V V ]
Feb 22 00:59:17 localhost charon: 14[NET] sending packet: from
10.67.0.24[500] to 37.157.222.222[500] (136 bytes)
Feb 22 00:59:17 localhost charon: 09[NET] received packet: from
37.157.222.222[500] to 10.67.0.24[500] (284 bytes)
Feb 22 00:59:17 localhost charon: 09[ENC] parsed ID_PROT request 0 [ KE No
V V V NAT-D NAT-D ]
Feb 22 00:59:17 localhost charon: 09[IKE] received DPD vendor ID
Feb 22 00:59:17 localhost charon: 09[ENC] received unknown vendor ID:
2a:76:9d:f8:39:bf:5d:8a:06:25:60:0f:25:2c:99:36
Feb 22 00:59:17 localhost charon: 09[IKE] received XAuth vendor ID
Feb 22 00:59:17 localhost charon: 09[IKE] local host is behind NAT, sending
keep alives
Feb 22 00:59:17 localhost charon: 09[IKE] no shared key found for
'39.107.111.111'[10.67.0.24] - '37.157.222.222'[37.157.222.222]
Feb 22 00:59:17 localhost charon: 09[IKE] no shared key found for
10.67.0.24 - 37.157.222.222
Feb 22 00:59:17 localhost charon: 09[ENC] generating INFORMATIONAL_V1
request 3620154422 [ N(INVAL_KE) ]
Feb 22 00:59:17 localhost charon: 09[NET] sending packet: from
10.67.0.24[500] to 37.157.222.222[500] (56 bytes)

the configuration is as follows:

route based part:

1) ip tunnel add vti266 local 10.130.11.218 remote 10.130.11.217 mode vti
key 66
2) ip link set vti266 up
3) sysctl -w net.ipv4.conf.vti266.disable_policy=1
4) ip route add 10.0.0.0/8 dev vti266
5) /etc/strongswan/strongswan.d/charon.conf <> install_routes = no
6) /etc/strongswan/swanctl/swanctl.conf <> local_ts = 0.0.0.0/0  remote_ts
= 0.0.0.0/0
7) /etc/strongswan/swanctl/swanctl.conf <> mark_in = 66 mark_out = 66

ipsec part:

ipsec.conf:

conn %default
  ikelifetime=1800m
  rekeymargin=3m
  keyingtries=%forever
  keyexchange=ikev1
  authby=psk
  dpdaction=restart
  dpddelay=30

conn remote-site
  left=%defaultroute
  leftsubnet=10.0.0.0/8
  leftid=39.107.111.111
  leftfirewall=yes
  right=%any
  rightsubnet=0.0.0.0/0
  rightid=37.157.222.222
  auto=start
  ike=aes128-sha1-modp1536
  esp=aes128-sha1


[root at iZ2zegipf37wcfbz6wafz0Z ~]# cat /etc/strongswan/ipsec.secrets

# ipsec.secrets - strongSwan IPsec secrets file
39.107.111.111 37.157.222.222 : PSK "key_to_alibaba66!@"

Cisco part is here:


crypto isakmp policy 10
 encr aes
 authentication pre-share
 group 2
 lifetime 1800
crypto isakmp key key_to_alibaba66!@ address 39.107.111.111
 crypto isakmp keepalive 10 10

crypto ipsec security-association replay window-size 128


crypto ipsec transform-set ALIBABA_AES_SHA_TRANSFORM_SET esp-aes
esp-sha-hmac
 mode tunnel


$ crypto ipsec df-bit clear
!
crypto ipsec profile ALIBABA_AES_SHA_IPSEC_PROFILE
 set transform-set ALIBABA_AES_SHA_TRANSFORM_SET
 set pfs group2


 interface Tunnel266
 description ITXRTRO1-Alibaba_test
 ip address 10.130.11.217 255.255.255.252
 ip mtu 1400
 ip tcp adjust-mss 1360
 tunnel source ip 37.157.222.222
 tunnel destination 39.107.111.111
 tunnel path-mtu-discovery
 tunnel protection ipsec profile ALIBABA_AES_SHA_IPSEC_PROFILE


what could be wrong ? thank you for any input
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.strongswan.org/pipermail/users/attachments/20180221/6a8409a4/attachment-0001.html>


More information about the Users mailing list