On 2017-03-16, Sébastien Morand <[email protected]> wrote:
> Thank you Mike for your answer. There is nothing more like you said.
> Actually we succeed in phase 1 but not in phase 2.
..
> It's look like good to me and conform to the provided specs. Phase 1 is ok
> but no phase 2:
> 155851.640374 Default ipsec_validate_id_information: dubious ID information
> accepted
> 155851.640478 Default isakmpd: phase 1 done: initiator id 196.207.241.154,
> responder id 80.125.165.142, src: 192.168.254.2 dst: 80.125.165.142
> 155918.682560 Default transport_send_messages: giving up on exchange
> from-10.85.98.16/29-to-10.249.0.0/21, no response from peer
> 80.125.165.142:4500
..
> so it means to me they don't answer to my packet but I don't know why :
> 16:01:41.673599 192.168.254.2.4500 > 80.125.165.142.4500:udpencap: isakmp
> v1.0 exchange QUICK_MODE encrypted
..
> Any idea what can be done or a way to get more information on what's going
> on? They are using CISCO 6509 with IOS 12.2-33.SXH3a.

isakmpd sends the wrong encapsulation mode (always TUNNEL, not
UDP_ENCAPSULATED_TUNNEL). But also last time I tried this (in 2011)
Cisco hadn't caught up with the RFC and actually required the
UDP_ENCAPSULATED_TUNNEL_DRAFT value from the draft nat-t spec.

This would cause a phase 2 failure, an ASA reports it like
"[IKEv1]Phase 2 failure: Mismatched attribute types for class
 Encapsulation Mode: Rcv'd: Tunnel Cfg'd: UDP Tunnel(NAT-T)"

Here's an old post about it with an isakmpd diff that was working
against Cisco. What I don't know is whether it harms interop with
anything else. 
 
http://marc.info/?l=openbsd-tech&m=131244805816474

Reply via email to