Having trouble brining up a tunnel.
I have followed these instructions
http://mirror.huxley.org.ar/ipsec/isakmpd.htm
and used the included script to gen my certs.
This seems to complete phase 1 see snip1
Though never seems to move on to phase 2 see snip 2
the licesnsees line gives me some pause as that is not the common can of the
cert, though that is what prints in the debug. The name in the subject field
on the cert is loanerxppc2.xxx.gov
configs are included after snips
client is an XP box running ipsec.exe from e.bootis behind a nat on a Openbsd
fw. This works with preshared keys through the fw
isakmpd -dDA=50
--------snip 1 --------
173611.209764 Exch 40 exchange_run: exchange 0x893c00 finished step 5,
advancing...
173611.210067 Mesg 10 virtual_send_message: enabling NAT-T encapsulation for
this exchange
173611.210410 Exch 10 exchange_finalize: 0x893c00 xpws Default-main-mode policy
responder phase 1 doi 1 exchange 2 step 6
173611.210685 Exch 10 exchange_finalize: icookie 90d893da9f1f4816 rcookie
83c51437d4efd48e
173611.210921 Exch 10 exchange_finalize: msgid 00000000
173611.212348 Exch 10 exchange_finalize: phase 1 done: initiator id
/C=US/ST=California/L=Martinez/O=ccchsd/OU=IS/CN=loanerxppc2.xxxx.gov,
responder id [EMAIL PROTECTED], src: 172.16.5.241 dst: 172.16.4.230
17361
----------snip 2 ---------
5555ghri_fw:root:/etc/isakmpd #isakmpd -dD9=99
173331.863667 Default log_debug_cmd: log level changed from 0 to 99 for class 9
[priv]
173332.317663 Plcy 30 policy_init: initializing
173332.321123 Default x509_read_from_dir: PEM_read_X509 failed for ca.srl
173338.331292 Plcy 90 x509_generate_kn: generating KeyNote policy for
certificate 0x88da00
173338.332119 Plcy 60 x509_generate_kn: added credential
173338.332481 Plcy 80 x509_generate_kn: added credential:
Authorizer:
"DN:/C=US/ST=California/L=Martinez/O=ccchsd/OU=IS/CN=555ghrifw.xxxx.gov"
Licensees: "DN:/C=US/ST=California/L=Martinez/O=ccchsd/OU=IS/CN=loanerxppc2.
173338.335104 Plcy 30 keynote_cert_obtain: failed to open
"/etc/isakmpd/keynote//[EMAIL PROTECTED]/credentials"
5555ghri_fw:root:/etc/isakmpd #cat isakmpd.conf
[General]
Retransmits= 5
Exchange-max-time= 120
Listen-on= 172.16.5.241
# X.509 certificate locations
[X509-certificates]
Accept-self-signed= 1
CA-directory= /etc/isakmpd/ca/
Cert-directory= /etc/isakmpd/certs/
Private-key= /etc/isakmpd/private/[EMAIL PROTECTED]
[Phase 1]
172.16.4.230= xpws
[xpws]
Phase= 1
Transport= udp
Local-address= 172.16.5.241
Address= 0.0.0.0
Configuration= Default-main-mode
ID= My-ID
[My-ID]
ID-type= USER_FQDN
# this is the certificate for this gateway
Name= [EMAIL PROTECTED]
[Phase 2]
Connections= winxp
[winxp]
Phase= 2
ISAKMP-peer= xpws
Configuration= Default-quick-mode
Local-ID= dmz
Remote-ID= Unknown-address
[loanerxp]
ID-type= IPV4_ADDR
Address= 192.168.10.15
[dmz]
ID-type= IPV4_ADDR_SUBNET
Network= 192.168.12.0
Netmask= 255.255.255.0
[Unknown-address]
ID-Type= IPV4_ADDR
Address= 0.0.0.0
[Default-quick-mode]
DOI= IPSEC
EXCHANGE_TYPE= QUICK_MODE
Suites= QM-ESP-3DES-SHA-SUITE
[Default-main-mode]
DOI= IPSEC
EXCHANGE_TYPE= ID_PROT
Transforms= 3DES-SHA-RSA_SIG
# Encryption/Authentication suite definitions
[3DES-SHA-RSA_SIG]
ENCRYPTION_ALGORITHM= 3DES_CBC
HASH_ALGORITHM= SHA
AUTHENTICATION_METHOD= RSA_SIG
ENCAPSULATION_MODE= TUNNEL
AUTHENTICATION_ALGORITHM= HMAC_SHA
5555ghri_fw:root:/etc/isakmpd #cat isakmpd.policy
KeyNote-Version: 2
Comment: This policy accepts ESP SAs from a remote that uses the right password
$OpenBSD: policy,v 1.6 2001/06/20 16:36:19 angelos Exp $
$EOM: policy,v 1.6 2000/10/09 22:08:30 angelos Exp $
Authorizer: "POLICY"
Licensees:
"DN:/C=US/ST=California/L=Martinez/O=ccchsd/OU=IS/CN=555ghrifw.ccchsd.gov" ||
"passphrase:1234" || "passphrase:0291ff014dccdd03874d9e8e4cdf3e6"
Conditions: app_domain == "IPsec policy" &&
esp_present == "yes" &&
esp_enc_alg != "null" -> "true";
# --- [EMAIL PROTECTED] ---
authorizer: "[EMAIL PROTECTED]"
licensees:"DN:"
conditions: remote_id_type =="ASN1 DN" &&
remote_id =="" -> "true";
# --- [EMAIL PROTECTED] ---
authorizer: "[EMAIL PROTECTED]"
licensees:"DN:"
conditions: remote_id_type =="ASN1 DN" &&
remote_id =="" -> "true";