Yes on the diagram, I should have noted that I just deleted the psk
rather than sending it out on email, pf.conf and npppd.conf follow
Thanks,
Robert Szasz
npppd.conf
-----
# $OpenBSD: npppd.conf,v 1.2 2014/03/22 04:32:39 yasuoka Exp $
# sample npppd configuration file. see npppd.conf(5)
authentication LOCAL type local {
users-file "/etc/npppd/npppd-users"
}
#authentication RADIUS type radius {
# authentication-server {
# address 192.168.0.1 secret "hogehoge"
# }
# accounting-server {
# address 192.168.0.1 secret "hogehoge"
# }
#}
tunnel L2TP protocol l2tp {
listen on 0.0.0.0
listen on ::
}
ipcp IPCP {
pool-address 10.216.196.150-10.216.196.200
dns-servers 10.216.194.254
}
# use pppx(4) interface. use an interface per a ppp session.
#interface pppx0 address 10.0.0.1 ipcp IPCP
#bind tunnel from L2TP authenticated by LOCAL to pppx0
# use tun(4) interface. multiple ppp sessions concentrate one interface.
interface tun0 address 10.0.0.1 ipcp IPCP
bind tunnel from L2TP authenticated by LOCAL to tun0
-------------------------------------------------------
pf.conf
---
# $OpenBSD: pf.conf,v 1.50 2011/04/28 00:19:42 mikeb Exp $
#
# See pf.conf(5) for syntax and examples.
# Remember to set net.inet.ip.forwarding=1 and/or net.inet6.ip6.forwarding=1
# in /etc/sysctl.conf if packets are to be forwarded between interfaces.
IntIF="em0"
ExtIF="em3"
CarpInt="carp0"
CarpExt="carp1"
icmp_types="echoreq"
udp_services="{isakmp, ipsec-nat-t}"
tcp_services="{ 22,500,4500,1701 }"
set skip on lo
set block-policy drop
block drop all
match out on $ExtIF inet from !($CarpExt:network) to any nat-to ($CarpExt)
# filter rules and anchor for ftp-proxy(8)
#anchor "ftp-proxy/*"
#pass in quick inet proto tcp to port ftp divert-to 127.0.0.1 port 8021
# anchor for relayd(8)
#anchor "relayd/*"
# By default, do not permit remote connections to X11
block in on ! lo0 proto tcp to port 6000:6010
#pass icmmp
pass in inet proto icmp all icmp-type $icmp_types
#pass IPSec
pass quick proto { esp, ah } from any to any
pass in on $ExtIF proto udp from any to any port {isakmp,ipsec-nat-t}
#pass CARP and pfsync
pass quick proto carp
pass quick proto pfsync
#pass services
pass in on $ExtIF proto udp from any to ($ExtIF) port {22, 500, 4500,
1701} keep state
pass out on $ExtIF proto {tcp,udp,icmp} from any to any flags S/SA keep
state
pass on $IntIF
pass on $IntIF inet proto tcp from any to ($CarpInt)
pass in on $ExtIF inet proto tcp from any to ($ExtIF) port $tcp_services
pass in on $ExtIF inet proto udp from any to ($ExtIF) port $udp_services
pass out on $ExtIF inet from any to $CarpExt keep state
pass on $ExtIF proto carp keep state (no-sync)
pass in on $ExtIF inet proto tcp from any to ($CarpExt) port $tcp_services
pass in on $ExtIF inet proto udp from any to ($CarpExt) port $udp_services
On 12/5/2016 6:16 PM, Damian McGuckin wrote:
Robert,
On Mon, 5 Dec 2016, Robert Szasz wrote:
I'm testing with the following setup
Win10 ->obsd5.9(firewall doing nat)->{}->obsd5.9(IPSEC)
Do you mean?
Win10 ->obsd5.9(firewall doing nat)->{INTERNET}->obsd5.9(IPSEC)
The connection process fails at stage 2 with the error message below
where X is the public IP of the box being connected to, and Y is the
ip of the firewall the win10 machine is behind 10...58 is the private
ip of the win10 machine.
I can try to help but as you probably read a week or so ago, am a bit
of a learner with L2TP myself.
error in the isakmpd log
010420.423317 Default responder_recv_HASH_SA_NONCE: peer proposed
invalid phase 2 IDs: initiator id 10.1.1.58, responder id x.x.x.x
010420.423325 Default dropped message from y.y.y.y port 58544 due to
notification type INVALID_ID_INFORMATION
ipsec.conf
ike passive esp transport \
proto udp from x.x.x.x to any port 1701 \
main auth hmac-sha1 enc "aes" group modp2048\
quick auth hmac-sha1 enc "aes" group modp2048\
psk ""
Why no pre-shared key?
Come versions of Windows 10 L2TP client, i.e. certain the one on my
Windows 10 HOME box, only use 3DES, i.e. replace "aes" by "3des"
above. Also, some only use modp1024 or maybe I am getting confused by
those Apples.
I wouled also need to look at a copy of 'pf.conf' because that can be
where the problem lies. That was where I made a mistake.
What about 'npppdf.conf'. Make sure that the sandbox network that it
uses, or what some documentation called the VPN network, is different
from the IPs of the 2 networks at each end of your link.
Regards - Damian
Pacific Engineering Systems International, 277-279 Broadway, Glebe NSW
2037
Ph:+61-2-8571-0847 .. Fx:+61-2-9692-9623 | unsolicited email not
wanted here
Views & opinions here are mine and not those of any past or present
employer