I played a bit with an ikev2 to connection to Azure.  It wouldn't connect
until I changed the childsa to aes-256-gcm.  Here is a iked.conf config
that will connect.  It didn't pass traffic and I stopped playing with it,
so this may not be that useful.

ikev2 passive esp \
from 10.0.0.0/24 to 192.168.1.0/24 \
peer 1.2.3.4 local 5.6.7.8 \
ikesa enc aes-256 auth hmac-sha1 group modp1024 \
childsa enc aes-256-gcm \
srcid 5.6.7.8 \
dstid 1.2.3.4 \
psk "terriblepassword"


On Thu, Feb 16, 2017 at 5:59 AM, Stuart Henderson <s...@spacehopper.org>
wrote:

> On 2017-02-16, oBSD Nub <obsd...@gmail.com> wrote:
> > I am struggling to setup an ipsec vpn to azure.
> > Following the azure IPSec parameters in the doc below:
> > https://docs.microsoft.com/en-us/azure/vpn-gateway/vpn-
> gateway-about-vpn-devices
> >
> > Getting the below errors in isakmpd, and am stumped where to look next:
> > Default exchange_run: exchange_validate failed
> > Default dropped message from 2.2.2.2 port 500 due to notification type
> > PAYLOAD_MALFORMED
> >
> > Can anyone point me in the right direction, as my google-fu isn't
> > feeling strong.
>
> Adding -D7=90 -D2=70 to your isakmpd command line might give a better clue.
>
> > Thanks!
> >
> > OpenBSD6.0/AMD64 MP vm on esxi 6.5
> >
> > # cat /etc/ipsec.conf
> > WAN1            = "carp901001" #Interface address 1.1.1.1
> > localNets       = "{10.10.0.0/24}"
> > remoteGW        = "2.2.2.2" #AzureGateway
> > remoteNets      = "{10.20.2.0/24}" #remote azure networks
> >
> > ike esp from $localNets to $remoteNets \
> >         peer $remoteGW \
> >         main auth hmac-sha1 enc aes-256 group modp1024 lifetime 28800 \
> >         quick auth hmac-sha1 enc aes-256 group none lifetime 3600 \
> >         psk somekey
> >
> > # isakmpd -dvvvK
> > 073538.301968 Default isakmpd: starting [priv]
> > 073548.958802 Default isakmpd: phase 1 done: initiator id 1.1.1.1,
> > responder id 2.2.2.2, src: 1.1.1.1 dst: 2.2.2.2
> > 073548.993564 Default isakmpd: quick mode done: src: 1.1.1.1 dst: 2.2.2.2
> > 073549.027410 Default exchange_run: exchange_validate failed
> > 073549.027425 Default dropped message from 2.2.2.2 port 500 due to
> > notification type PAYLOAD_MALFORMED
> > ^C073612.581088 Default isakmpd: shutting down...
> > # 073612.581509 Default isakmpd: exit
> >
> > # ipsecctl -s all
> > FLOWS:
> > flow esp in from 10.20.2.0/24 to 10.10.0.0/24 peer 2.2.2.2 srcid
> > 1.1.1.1/32 dstid 2.2.2.2/32 type use
> > flow esp out from 10.10.0.0/24 to 10.20.2.0/24 peer 2.2.2.2 srcid
> > 1.1.1.1/32 dstid 2.2.2.2/32 type require
> >
> > SAD:
> > esp tunnel from 2.2.2.2 to 1.1.1.1 spi 0x44461664 auth hmac-sha1 enc
> aes-256
> > esp tunnel from 1.1.1.1 to 2.2.2.2 spi 0x55f07894 auth hmac-sha1 enc
> aes-256
> >
> > 07:29:44.949102 0.0.0.0.isakmp > 2.2.2.2.isakmp: [udp sum ok] isakmp
> > v1.0 exchange ID_PROT
> >         cookie: e3ee87821c134d03->0000000000000000 msgid: 00000000 len:
> 184
> >         payload: SA len: 56 DOI: 1(IPSEC) situation: IDENTITY_ONLY
> >             payload: PROPOSAL len: 44 proposal: 1 proto: ISAKMP spisz:
> > 0 xforms: 1
> >                 payload: TRANSFORM len: 36
> >                     transform: 0 ID: ISAKMP
> >                         attribute ENCRYPTION_ALGORITHM = AES_CBC
> >                         attribute HASH_ALGORITHM = SHA
> >                         attribute AUTHENTICATION_METHOD = PRE_SHARED
> >                         attribute GROUP_DESCRIPTION = MODP_1024
> >                         attribute LIFE_TYPE = SECONDS
> >                         attribute LIFE_DURATION = 28800
> >                         attribute KEY_LENGTH = 256
> >         payload: VENDOR len: 20
> >         payload: VENDOR len: 20 (supports v2 NAT-T,
> > draft-ietf-ipsec-nat-t-ike-02)
> >         payload: VENDOR len: 20 (supports v3 NAT-T,
> > draft-ietf-ipsec-nat-t-ike-03)
> >         payload: VENDOR len: 20 (supports NAT-T, RFC 3947)
> >         payload: VENDOR len: 20 (supports DPD v1.0) [ttl 0] (id 1, len
> 212)
> > 07:29:44.992169 2.2.2.2.isakmp > 1.1.1.1.isakmp: [udp sum ok] isakmp
> > v1.0 exchange ID_PROT
> >         cookie: e3ee87821c134d03->5e09a5d35142c2d9 msgid: 00000000 len:
> 212
> >         payload: SA len: 60 DOI: 1(IPSEC) situation: IDENTITY_ONLY
> >             payload: PROPOSAL len: 48 proposal: 1 proto: ISAKMP spisz:
> > 0 xforms: 1
> >                 payload: TRANSFORM len: 40
> >                     transform: 0 ID: ISAKMP
> >                         attribute ENCRYPTION_ALGORITHM = AES_CBC
> >                         attribute KEY_LENGTH = 256
> >                         attribute HASH_ALGORITHM = SHA
> >                         attribute GROUP_DESCRIPTION = MODP_1024
> >                         attribute AUTHENTICATION_METHOD = PRE_SHARED
> >                         attribute LIFE_TYPE = SECONDS
> >                         attribute LIFE_DURATION = 00007080
> >         payload: VENDOR len: 24
> >         payload: VENDOR len: 20 (supports NAT-T, RFC 3947)
> >         payload: VENDOR len: 20 (supports v2 NAT-T,
> > draft-ietf-ipsec-nat-t-ike-02)
> >         payload: VENDOR len: 20
> >         payload: VENDOR len: 20
> >         payload: VENDOR len: 20 [ttl 0] (id 1, len 240)
> > 07:29:44.993067 1.1.1.1.isakmp > 2.2.2.2.isakmp: [udp sum ok] isakmp
> > v1.0 exchange ID_PROT
> >         cookie: e3ee87821c134d03->5e09a5d35142c2d9 msgid: 00000000 len:
> 228
> >         payload: KEY_EXCH len: 132
> >         payload: NONCE len: 20
> >         payload: NAT-D len: 24
> >         payload: NAT-D len: 24 [ttl 0] (id 1, len 256)
> > 07:29:45.036032 2.2.2.2.isakmp > 1.1.1.1.isakmp: [udp sum ok] isakmp
> > v1.0 exchange ID_PROT
> >         cookie: e3ee87821c134d03->5e09a5d35142c2d9 msgid: 00000000 len:
> 260
> >         payload: KEY_EXCH len: 132
> >         payload: NONCE len: 52
> >         payload: NAT-D len: 24
> >         payload: NAT-D len: 24 [ttl 0] (id 1, len 288)
> > 07:29:45.036815 1.1.1.1.isakmp > 2.2.2.2.isakmp: [udp sum ok] isakmp
> > v1.0 exchange ID_PROT
> >         cookie: e3ee87821c134d03->5e09a5d35142c2d9 msgid: 00000000 len:
> 92
> >         payload: ID len: 12 type: IPV4_ADDR = 1.1.1.1
> >         payload: HASH len: 24
> >         payload: NOTIFICATION len: 28
> >             notification: INITIAL CONTACT
> > (e3ee87821c134d03->5e09a5d35142c2d9) [ttl 0] (id 1, len 120)
> > 07:29:45.096249 2.2.2.2.isakmp > 1.1.1.1.isakmp: [udp sum ok] isakmp
> > v1.0 exchange ID_PROT
> >         cookie: e3ee87821c134d03->5e09a5d35142c2d9 msgid: 00000000 len:
> 76
> >         payload: ID len: 12 type: IPV4_ADDR = 2.2.2.2
> >         payload: HASH len: 24 [ttl 0] (id 1, len 104)
> > 07:29:45.096471 1.1.1.1.isakmp > 2.2.2.2.isakmp: [udp sum ok] isakmp
> > v1.0 exchange QUICK_MODE
> >         cookie: e3ee87821c134d03->5e09a5d35142c2d9 msgid: 74d44758 len:
> 156
> >         payload: HASH len: 24
> >         payload: SA len: 52 DOI: 1(IPSEC) situation: IDENTITY_ONLY
> >             payload: PROPOSAL len: 40 proposal: 1 proto: IPSEC_ESP
> > spisz: 4 xforms: 1 SPI: 0x9444a03c
> >                 payload: TRANSFORM len: 28
> >                     transform: 1 ID: AES
> >                         attribute LIFE_TYPE = SECONDS
> >                         attribute LIFE_DURATION = 3600
> >                         attribute ENCAPSULATION_MODE = TUNNEL
> >                         attribute AUTHENTICATION_ALGORITHM = HMAC_SHA
> >                         attribute KEY_LENGTH = 256
> >         payload: NONCE len: 20
> >         payload: ID len: 16 type: IPV4_ADDR_SUBNET =
> 10.10.0.0/255.255.255.0
> >         payload: ID len: 16 type: IPV4_ADDR_SUBNET =
> > 10.20.2.0/255.255.255.0 [ttl 0] (id 1, len 184)
> > 07:29:45.130791 2.2.2.2.isakmp > 1.1.1.1.isakmp: [udp sum ok] isakmp
> > v1.0 exchange QUICK_MODE commit
> >         cookie: e3ee87821c134d03->5e09a5d35142c2d9 msgid: 74d44758 len:
> 204
> >         payload: HASH len: 24
> >         payload: SA len: 56 DOI: 1(IPSEC) situation: IDENTITY_ONLY
> >             payload: PROPOSAL len: 44 proposal: 1 proto: IPSEC_ESP
> > spisz: 4 xforms: 1 SPI: 0x86ec6b36
> >                 payload: TRANSFORM len: 32
> >                     transform: 1 ID: AES
> >                         attribute ENCAPSULATION_MODE = TUNNEL
> >                         attribute KEY_LENGTH = 256
> >                         attribute AUTHENTICATION_ALGORITHM = HMAC_SHA
> >                         attribute LIFE_TYPE = SECONDS
> >                         attribute LIFE_DURATION = 00000e10
> >         payload: NONCE len: 52
> >         payload: ID len: 16 type: IPV4_ADDR_SUBNET =
> 10.10.0.0/255.255.255.0
> >         payload: ID len: 16 type: IPV4_ADDR_SUBNET =
> > 10.20.2.0/255.255.255.0 [ttl 0] (id 1, len 232)
> > 07:29:45.130835 1.1.1.1.isakmp > 2.2.2.2.isakmp: [udp sum ok] isakmp
> > v1.0 exchange QUICK_MODE
> >         cookie: e3ee87821c134d03->5e09a5d35142c2d9 msgid: 74d44758 len:
> 52
> >         payload: HASH len: 24 [ttl 0] (id 1, len 80)
> > 07:29:45.164471 2.2.2.2.isakmp > 1.1.1.1.isakmp: [udp sum ok] isakmp
> > v1.0 exchange QUICK_MODE commit
> >         cookie: e3ee87821c134d03->5e09a5d35142c2d9 msgid: 74d44758 len:
> 76
> >         payload: HASH len: 24
> >         payload: NOTIFICATION len: 16
> >             notification: 16384 (unknown) [ttl 0] (id 1, len 104)
> > 07:29:45.164524 1.1.1.1.isakmp > 2.2.2.2.isakmp: [udp sum ok] isakmp
> > v1.0 exchange INFO
> >         cookie: e3ee87821c134d03->5e09a5d35142c2d9 msgid: a260b82d len:
> 64
> >         payload: HASH len: 24
> >         payload: NOTIFICATION len: 12
> >             notification: PAYLOAD MALFORMED [ttl 0] (id 1, len 92)
> > 07:29:49.885574 1.1.1.1.isakmp > 2.2.2.2.isakmp: [udp sum ok] isakmp
> > v1.0 exchange INFO
> >         cookie: e3ee87821c134d03->5e09a5d35142c2d9 msgid: 044e1bd6 len:
> 68
> >         payload: HASH len: 24
> >         payload: DELETE len: 16 DOI: 1(IPSEC) proto: IPSEC_ESP nspis: 1
> >             SPI: 0x9444a03c [ttl 0] (id 1, len 96)
> > 07:29:49.885752 1.1.1.1.isakmp > 2.2.2.2.isakmp: [udp sum ok] isakmp
> > v1.0 exchange INFO
> >         cookie: e3ee87821c134d03->5e09a5d35142c2d9 msgid: 2079b3c2 len:
> 80
> >         payload: HASH len: 24
> >         payload: DELETE len: 28 DOI: 1(IPSEC) proto: ISAKMP nspis: 1
> >             cookie: e3ee87821c134d03->5e09a5d35142c2d9 [ttl 0] (id 1,
> len 108)

Reply via email to