With this in ipsec.conf:

version 2.0     # conforms to second version of ipsec.conf specification

config setup
        interfaces="%defaultroute"

conn onera
    left=%defaultroute
    leftrsasigkey=%cert
    leftcert=mykerinos.cer
    leftsendcert=always
    right=144.204.128.1
    rightsubnet=125.1.0.0/16
    rightid="[EMAIL PROTECTED], C=FR, ST=Ile de France, L=CHATILLON, O=ONERA, 
OU=DRIS, CN=144.204.48.1"
    rightxauthserver=yes
    rightmodecfgserver=yes
    auto=start
    keyexchange=ike
    ike=aes256-md5
    esp=aes256-md5

#Disable Opportunistic Encryption
include /etc/ipsec.d/examples/no_oe.conf



I get this in logs:

May 11 09:22:10 mykerinos pluto[21853]: added connection description "onera"
May 11 09:22:10 mykerinos pluto[21853]: listening for IKE messages
May 11 09:22:10 mykerinos pluto[21853]: adding interface tun0/tun0 10.0.0.2:500
May 11 09:22:10 mykerinos pluto[21853]: adding interface weth_i/weth_i 
144.204.48.104:500
May 11 09:22:10 mykerinos pluto[21853]: adding interface lo/lo 127.0.0.1:500
May 11 09:22:10 mykerinos pluto[21853]: adding interface lo/lo ::1:500
May 11 09:22:10 mykerinos pluto[21853]: loading secrets from 
"/etc/ipsec.secrets"
May 11 09:22:10 mykerinos pluto[21853]:   loaded private key file 
'/etc/ipsec.d/private/cc-mykerinosKey.pem' (1675 bytes)
May 11 09:22:10 mykerinos pluto[21853]:   loaded private key file 
'/etc/ipsec.d/private/mykerinosKey.pem' (1675 bytes)
May 11 09:22:10 mykerinos pluto[21853]: "onera" #1: initiating Main Mode
May 11 09:22:10 mykerinos pluto[21853]: "onera" #1: received Vendor ID payload 
[Dead Peer Detection]
May 11 09:22:10 mykerinos pluto[21853]: "onera" #1: ignoring unknown Vendor ID 
payload [afca071368a1f1c96b8696fc77570100]
May 11 09:22:10 mykerinos pluto[21853]: "onera" #1: ignoring unknown Vendor ID 
payload [1d6e178f6c2c0be284985465450fe9d4]
May 11 09:22:10 mykerinos pluto[21853]: "onera" #1: transition from state 
STATE_MAIN_I1 to state STATE_MAIN_I2
May 11 09:22:10 mykerinos pluto[21853]: "onera" #1: STATE_MAIN_I2: sent MI2, 
expecting MR2
May 11 09:22:10 mykerinos pluto[21853]: "onera" #1: I am sending my cert
May 11 09:22:10 mykerinos pluto[21853]: "onera" #1: I am sending a certificate 
request
May 11 09:22:10 mykerinos pluto[21853]: "onera" #1: transition from state 
STATE_MAIN_I2 to state STATE_MAIN_I3
May 11 09:22:10 mykerinos pluto[21853]: "onera" #1: STATE_MAIN_I3: sent MI3, 
expecting MR3
May 11 09:22:10 mykerinos pluto[21853]: "onera" #1: Main mode peer ID is 
ID_DER_ASN1_DN: '[EMAIL PROTECTED], C=FR, ST=Ile de France, L=CHATILLON, 
O=ONERA, OU=DRIS, CN=144.204.48.1'
May 11 09:22:10 mykerinos pluto[21853]: "onera" #1: no crl from issuer "C=FR, 
ST=92, L=CHATILLON, O=onera, CN=lip6" found (strict=no)
May 11 09:22:10 mykerinos pluto[21853]: "onera" #1: transition from state 
STATE_MAIN_I3 to state STATE_MAIN_I4
May 11 09:22:10 mykerinos pluto[21853]: "onera" #1: STATE_MAIN_I4: ISAKMP SA 
established {auth=OAKLEY_RSA_SIG cipher=aes_256 prf=oakley_md5 group=modp1024}
May 11 09:22:10 mykerinos pluto[21853]: "onera" #2: initiating Quick Mode 
RSASIG+ENCRYPT+TUNNEL+PFS+UP {using isakmp#1}
May 11 09:22:10 mykerinos pluto[21853]: "onera" #1: received MODECFG message 
when in state STATE_MAIN_I4, and we aren't xauth client
May 11 09:22:52 mykerinos last message repeated 3 times


...which seems to clearly say that I should be an xauth client..:-)

Then I change the connection to:

conn onera
    left=%defaultroute
    leftrsasigkey=%cert
    leftcert=mykerinos.cer
    leftsendcert=always
    leftxauthclient=yes
    right=144.204.128.1
    rightsubnet=125.1.0.0/16
    rightid="[EMAIL PROTECTED], C=FR, ST=Ile de France, L=CHATILLON, O=ONERA, 
OU=DRIS, CN=144.204.48.1"
    rightxauthserver=yes
    rightmodecfgserver=yes
    auto=start
    keyexchange=ike
    ike=aes256-md5
    esp=aes256-md5

(notice the only change: add "leftxauthclient")

Which leads to:

May 11 09:28:00 mykerinos pluto[22166]: added connection description "onera"
May 11 09:28:00 mykerinos pluto[22166]: listening for IKE messages
May 11 09:28:01 mykerinos pluto[22166]: adding interface tun0/tun0 10.0.0.2:500
May 11 09:28:01 mykerinos pluto[22166]: adding interface weth_i/weth_i 
144.204.48.104:500
May 11 09:28:01 mykerinos pluto[22166]: adding interface lo/lo 127.0.0.1:500
May 11 09:28:01 mykerinos pluto[22166]: adding interface lo/lo ::1:500
May 11 09:28:01 mykerinos pluto[22166]: loading secrets from 
"/etc/ipsec.secrets"
May 11 09:28:01 mykerinos pluto[22166]:   loaded private key file 
'/etc/ipsec.d/private/cc-mykerinosKey.pem' (1675 bytes)
May 11 09:28:01 mykerinos pluto[22166]:   loaded private key file 
'/etc/ipsec.d/private/mykerinosKey.pem' (1675 bytes)
May 11 09:28:01 mykerinos pluto[22166]: initiate on demand from 
144.204.48.104:0 to 125.1.7.23:0 proto=0 state: fos_start because: acquire
May 11 09:28:01 mykerinos pluto[22166]: "onera" #1: initiating Main Mode
May 11 09:28:01 mykerinos pluto[22166]: packet from 144.204.128.1:500: ignoring 
informational payload, type NO_PROPOSAL_CHOSEN
May 11 09:28:01 mykerinos pluto[22166]: packet from 144.204.128.1:500: received 
and ignored informational message


....which is exactly what I get when I don't add "ike=..." lines.

So, as far as my understading goes, there's still a problem somewhere
(which can be a problem of my understanding of openswan which is not
that big).


Attachment: signature.asc
Description: Digital signature

Reply via email to