Hi,

Ok working well now, actually I shouldn't have set up the srcid with my
public_ip. Without this line (or this line containing private IP) it's
working well.

Regards,
Sebastien

On Sat, Mar 18, 2017 at 2:03 AM, Sébastien Morand <[email protected]>
wrote:

> Hello Mike,
>
> "group none" in phase 2 because of this in the documentation:
> <<
>  Possible values for auth, enc, and group are described below in CRYPTO
> TRANSFORMS.  Perfect Forward Secrecy (PFS) is enabled unless group none is
> specified.
> >>
>
> And their documentation says: No PFS. As far as I understand I disable PFS
> by putting "group none" in phase 2, don't I?
>
> I'm actually waiting their logs for more information.
>
> Regards,
> Sebastien
>
>
> On Thu, Mar 16, 2017 at 10:08 PM, Mik J <[email protected]> wrote:
>
>> Hello Sebastien,
>> Why "group none" for phase 2 ?
>>
>> "     The following group types are permitted with the group keyword:
>>            Group       Size
>>            none        0       [phase 2 only]
>> "
>>
>> maybe you should ask them their conf and their logs
>>
>> Try also
>> sysctl -a | grep esp
>>
>>
>>
>>
>> Le Jeudi 16 mars 2017 16h33, Sébastien Morand <[email protected]> a
>> écrit :
>>
>>
>> Hi Mike and everybody,
>>
>> Thank you Mike for your answer. There is nothing more like you said.
>> Actually we succeed in phase 1 but not in phase 2.
>>
>> My client give me the following spec:
>> Phase 1: SHA1 - 160 bits / DH 5 / Authentication with PSK / CIPHER :
>> AES-256 / Lifetime 86400s
>> Phase 2: Tunnel mode / SHA1 / No PFS / Authentication with PSK / CIPHER
>> AES-128 / Lifetime 3600s
>>
>> So I end up with the following in ipsec.conf:
>> ike active esp tunnel \
>>     from 10.85.98.16/29 to \
>>         {10.249.0.0/21} \
>>     peer <public_ip_of_my_client> \
>>     main auth hmac-sha1 enc aes-256 group modp1536 lifetime 86400 \
>>     quick auth hmac-sha1 enc aes-128 group none lifetime 3600 \
>>     srcid "<my_public_ip>" \
>>     psk "************"
>>
>> I'm starting the ipsec like this :
>> isakmpd -Kdvvv (to see what is happening)
>> and
>> ipsecctl -f /etc/ipsec.conf
>>
>> It's look like good to me and conform to the provided specs. Phase 1 is ok
>> but no phase 2:
>> 155851.640374 Default ipsec_validate_id_information: dubious ID
>> information
>> accepted
>> 155851.640478 Default isakmpd: phase 1 done: initiator id 196.207.241.154,
>> responder id 80.125.165.142, src: 192.168.254.2 dst: 80.125.165.142
>> 155918.682560 Default transport_send_messages: giving up on exchange
>> from-10.85.98.16/29-to-10.249.0.0/21, no response from peer
>> 80.125.165.142:4500
>> 155918.682611 Default transport_send_messages: giving up on exchange
>> from-10.85.98.16/29-to-80.125.172.0/23, no response from peer
>> 80.125.165.142:4500
>> 155918.682644 Default transport_send_messages: giving up on exchange
>> from-10.85.98.16/29-to-80.125.174.0/24, no response from peer
>> 80.125.165.142:4500
>>
>> In TCPDUMP I got no answer on port 4500 (but everything fine on port 500)
>> so it means to me they don't answer to my packet but I don't know why :
>> 16:01:41.673599 192.168.254.2.4500 > 80.125.165.142.4500:udpencap: isakmp
>> v1.0 exchange QUICK_MODE encrypted
>> 16:01:41.673655 192.168.254.2.4500 > 80.125.165.142.4500:udpencap: isakmp
>> v1.0 exchange QUICK_MODE encrypted
>> 16:01:41.673674 192.168.254.2.4500 > 80.125.165.142.4500:udpencap: isakmp
>> v1.0 exchange QUICK_MODE encrypted
>> 16:01:50.686803 192.168.254.2.4500 > 80.125.165.142.4500:udpencap: isakmp
>> v1.0 exchange QUICK_MODE encrypted
>> 16:01:50.686862 192.168.254.2.4500 > 80.125.165.142.4500:udpencap: isakmp
>> v1.0 exchange QUICK_MODE encrypted
>> 16:01:50.686881 192.168.254.2.4500 > 80.125.165.142.4500:udpencap: isakmp
>> v1.0 exchange QUICK_MODE encrypted
>> 16:02:01.700016 192.168.254.2.4500 > 80.125.165.142.4500:udpencap: isakmp
>> v1.0 exchange QUICK_MODE encrypted
>> 16:02:01.700106 192.168.254.2.4500 > 80.125.165.142.4500:udpencap: isakmp
>> v1.0 exchange QUICK_MODE encrypted
>> 16:02:01.700154 192.168.254.2.4500 > 80.125.165.142.4500:udpencap: isakmp
>> v1.0 exchange QUICK_MODE encrypted
>> (... it can last forever ...)
>>
>> Any idea what can be done or a way to get more information on what's going
>> on? They are using CISCO 6509 with IOS 12.2-33.SXH3a.
>>
>> Thanks by advance,
>> Sebastien
>>
>> On Tue, Mar 14, 2017 at 12:46 AM, Mik J <[email protected]> wrote:
>>
>> > Hello Sebastien,
>> > I'm not sure there's something special to force nat-t, it's automatic.
>> > The natted side has to initiate the flow to the non natted side.
>> > If the two sides are natted then there should be a port forward to one
>> of
>> > them.
>> > There should be a nat keepalive parameter as well.
>> >
>> >
>> >
>> > Le Lundi 13 mars 2017 18h40, Sébastien Morand <[email protected]>
a
>> > écrit :
>>
>> >
>> >
>> > Hi,
>> >
>> > I'm trying to set up a NAT-T IPSec VPN with one of my client.
>> >
>> > Is this configuration ok on ipsec.conf for NAT-T?
>> > ike esp \
>> >    from 10.85.98.16/29 to {10.249.0.0/21} \
>> >    peer <IP CLIENT> \
>> >    main auth hmac-sha1 enc aes-256 group modp1536 lifetime 86400 \
>> >    quick auth hmac-sha1 enc aes-256 group modp1536 lifetime 86400 \
>> >    srcid "<MY PUBLIC IP>" \
>> >    psk "********"
>> >
>> > Something else to force NAT-T?
>> > Thanks by advance,
>>
>> > Sébastien

Reply via email to