[strongSwan] Getting reply from the wrong ip?!
Peter Andersson
peter at turbin.se
Thu Jan 2 17:18:20 CET 2020
Hi!
I'm having trouble getting the strongSwan server to work. I'm trying to
connect to a remote VPN server and I get replies from an entirely
different server from a different company.
The log looks like this:
Jan 2 16:59:21 Server charon: 08[NET] sending packet: from
46.246.XXX.XXX[500] to 62.181.XXX.XXX[500] (1036 bytes)
Jan 2 16:59:25 Server charon: 09[IKE] retransmit 1 of request with
message ID 0
Jan 2 16:37:43 Server charon: 09[NET] sending packet: from
46.246.XXX.XXX[500] to 62.181.XXX.XXX[500] (1036 bytes)
Jan 2 16:37:46 Server charon: 10[NET] received packet: from
80.72.XXX.XXX[500] to 46.246.XXX.XXX[500] (284 bytes)
Our ISP only delivers internet connections, no firewalls, vpn services
or something similar.
And all our firewall does is to allow connections on UDP port 500 from
62.181.XXX.XXX. It has no port forwarding or anything special.
I'm at a total loss here as we have never had any contact with the
company with the 80.72.XXX.XXX address.
We did have a hardware firewall (Sonicwall) that was working just fine
with the same settings.
I would be extremely grateful if any of you experts could help me find a
solution or point me in the right direction.
Thanks!
/Peter
This is my config:
config setup
charondebug="cfg 2"
strictcrlpolicy=no
conn VPN
authby=secret
left=46.246.XXX.XXX
leftsubnet=1.1.1.0/24
leftfirewall=yes
right=62.181.XXX.XXX
rightsubnet=1.1.10.200/32
ike=aes128-sha1-modp1024
esp=aes128-sha1
keyexchange=ike
keyingtries=0
ikelifetime=12h
lifetime=6h
dpddelay=30
dpdtimeout=120
dpdaction=restart
auto=start
type=tunnel
ipsec.secrets;
46.246.XXX.XXX 62.181.XXX.XXX : PSK 'ABCDEFGH'
strongswan.conf:
charon {
load_modular = yes
plugins {
include strongswan.d/charon/*.conf
}
}
include strongswan.d/*.conf
And the log:
Jan 2 17:11:07 Server charon: 00[DMN] Starting IKE charon daemon
(strongSwan 5.7.2, Linux 5.3.0-24-generic, x86_64)
Jan 2 17:11:07 Server charon: 00[CFG] loading ca certificates from
'/etc/ipsec.d/cacerts'
Jan 2 17:11:07 Server charon: 00[CFG] loading aa certificates from
'/etc/ipsec.d/aacerts'
Jan 2 17:11:07 Server charon: 00[CFG] loading ocsp signer certificates
from '/etc/ipsec.d/ocspcerts'
Jan 2 17:11:07 Server charon: 00[CFG] loading attribute certificates
from '/etc/ipsec.d/acerts'
Jan 2 17:11:07 Server charon: 00[CFG] loading crls from '/etc/ipsec.d/crls'
Jan 2 17:11:07 Server charon: 00[CFG] loading secrets from
'/etc/ipsec.secrets'
Jan 2 17:11:07 Server charon: 00[CFG] loaded IKE secret for
46.246.XXX.XXX 62.181.XXX.XXX
Jan 2 17:11:07 Server charon: 00[LIB] loaded plugins: charon aesni aes
rc2 sha2 sha1 md4 md5 mgf1 random nonce x509 revocation constraints
pubkey pkcs1 pkcs7 pkcs8 pkcs12 pgp dnskey sshkey pem openssl fips-prf
gmp agent xcbc hmac gcm attr kernel-netlink resolve socket-default
connmark stroke updown eap-mschapv2 xauth-generic counters
Jan 2 17:11:07 Server charon: 00[LIB] dropped capabilities, running as
uid 0, gid 0
Jan 2 17:11:07 Server charon: 00[JOB] spawning 16 worker threads
Jan 2 17:11:07 Server charon: 05[CFG] received stroke: add connection 'VPN'
Jan 2 17:11:07 Server charon: 05[CFG] conn VPN
Jan 2 17:11:07 Server charon: 05[CFG] left=46.246.XXX.XXX
Jan 2 17:11:07 Server charon: 05[CFG] leftsubnet=1.1.1.0/24
Jan 2 17:11:07 Server charon: 05[CFG] leftauth=psk
Jan 2 17:11:07 Server charon: 05[CFG] leftupdown=ipsec _updown iptables
Jan 2 17:11:07 Server charon: 05[CFG] right=62.181.XXX.XXX
Jan 2 17:11:07 Server charon: 05[CFG] rightsubnet=1.1.10.200/32
Jan 2 17:11:07 Server charon: 05[CFG] rightauth=psk
Jan 2 17:11:07 Server charon: 05[CFG] ike=aes128-sha1-modp1024
Jan 2 17:11:07 Server charon: 05[CFG] esp=aes128-sha1
Jan 2 17:11:07 Server charon: 05[CFG] dpddelay=30
Jan 2 17:11:07 Server charon: 05[CFG] dpdtimeout=120
Jan 2 17:11:07 Server charon: 05[CFG] dpdaction=3
Jan 2 17:11:07 Server charon: 05[CFG] sha256_96=no
Jan 2 17:11:07 Server charon: 05[CFG] mediation=no
Jan 2 17:11:07 Server charon: 05[CFG] added configuration 'VPN'
Jan 2 17:11:07 Server charon: 08[CFG] received stroke: initiate 'VPN'
Jan 2 17:11:07 Server charon: 08[IKE] initiating IKE_SA VPN[1] to
62.181.XXX.XXX
Jan 2 17:11:07 Server charon: 08[CFG] configured proposals:
IKE:AES_CBC_128/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024,
IKE:AES_CBC_128/AES_CBC_192/AES_CBC_256/AES_CTR_128/AES_CTR_192/AES_CTR_256/CAMELLIA_CBC_128/CAMELLIA_CBC_192/CAMELLIA_CBC_256/3DES_CBC/HMAC_SHA2_256_128/HMAC_SHA2_384_192/HMAC_SHA2_512_256/AES_XCBC_96/AES_CMAC_96/HMAC_SHA1_96/PRF_AES128_XCBC/PRF_AES128_CMAC/PRF_HMAC_SHA2_256/PRF_HMAC_SHA2_384/PRF_HMAC_SHA2_512/PRF_HMAC_SHA1/ECP_256/ECP_384/ECP_521/ECP_256_BP/ECP_384_BP/ECP_512_BP/CURVE_25519/CURVE_448/MODP_3072/MODP_4096/MODP_6144/MODP_8192/MODP_2048,
IKE:AES_CCM_16_128/AES_CCM_16_192/AES_CCM_16_256/AES_GCM_16_128/AES_GCM_16_192/AES_GCM_16_256/AES_CCM_8_128/AES_CCM_8_192/AES_CCM_8_256/AES_CCM_12_128/AES_CCM_12_192/AES_CCM_12_256/AES_GCM_8_128/AES_GCM_8_192/AES_GCM_8_256/AES_GCM_12_128/AES_GCM_12_192/AES_GCM_12_256/PRF_AES128_XCBC/PRF_AES128_CMAC/PRF_HMAC_SHA2_256/PRF_HMAC_SHA2_384/PRF_HMAC_SHA2_512/PRF_HMAC_SHA1/ECP_256/ECP_384/ECP_521/ECP_256_BP/ECP_384_BP/ECP_512_BP/CURVE_25519/CURVE_448/MODP_3072/MODP_4096/MODP_6144/MODP_8192/MODP_2048
Jan 2 17:11:07 Server charon: 08[CFG] sending supported signature hash
algorithms: sha256 sha384 sha512 identity
Jan 2 17:11:07 Server charon: 08[ENC] generating IKE_SA_INIT request 0
[ SA KE No N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) N(HASH_ALG) N(REDIR_SUP) ]
Jan 2 17:11:07 Server charon: 08[NET] sending packet: from
46.246.XXX.XXX[500] to 62.181.XXX.XXX[500] (1036 bytes)
Jan 2 17:11:09 Server charon: 09[NET] received packet: from
80.72.XXX.XXX[500] to 46.246.XXX.XXX[500] (284 bytes)
Jan 2 17:11:09 Server charon: 09[ENC] parsed ID_PROT request 0 [ SA V V
V V V V V V V V ]
Jan 2 17:11:09 Server charon: 09[CFG] looking for an IKEv1 config for
46.246.XXX.XXX...80.72.XXX.XXX
Jan 2 17:11:09 Server charon: 09[IKE] no IKE config found for
46.246.XXX.XXX...80.72.XXX.XXX, sending NO_PROPOSAL_CHOSEN
Jan 2 17:11:09 Server charon: 09[ENC] generating INFORMATIONAL_V1
request 2752600603 [ N(NO_PROP) ]
Jan 2 17:11:09 Server charon: 09[NET] sending packet: from
46.246.XXX.XXX[500] to 80.72.XXX.XXX[500] (40 bytes)
Jan 2 17:11:11 Server charon: 10[IKE] retransmit 1 of request with
message ID 0
Jan 2 17:11:11 Server charon: 10[NET] sending packet: from
46.246.XXX.XXX[500] to 62.181.XXX.XXX[500] (1036 bytes)
Jan 2 17:11:18 Server charon: 12[IKE] retransmit 2 of request with
message ID 0
Jan 2 17:11:18 Server charon: 12[NET] sending packet: from
46.246.XXX.XXX[500] to 62.181.XXX.XXX[500] (1036 bytes)
Jan 2 17:11:21 Server charon: 11[NET] received packet: from
80.72.XXX.XXX[500] to 46.246.XXX.XXX[500] (284 bytes)
Jan 2 17:11:21 Server charon: 11[ENC] parsed ID_PROT request 0 [ SA V V
V V V V V V V V ]
Jan 2 17:11:21 Server charon: 11[CFG] looking for an IKEv1 config for
46.246.XXX.XXX...80.72.XXX.XXX
Jan 2 17:11:21 Server charon: 11[IKE] no IKE config found for
46.246.XXX.XXX...80.72.XXX.XXX, sending NO_PROPOSAL_CHOSEN
Jan 2 17:11:21 Server charon: 11[ENC] generating INFORMATIONAL_V1
request 2913320541 [ N(NO_PROP) ]
Jan 2 17:11:21 Server charon: 11[NET] sending packet: from
46.246.XXX.XXX[500] to 80.72.XXX.XXX[500] (40 bytes)
Jan 2 17:11:31 Server charon: 13[IKE] retransmit 3 of request with
message ID 0
Jan 2 17:11:31 Server charon: 13[NET] sending packet: from
46.246.XXX.XXX[500] to 62.181.XXX.XXX[500] (1036 bytes)
Jan 2 17:11:32 Server charon: 00[DMN] signal of type SIGINT received.
Shutting down
More information about the Users
mailing list