I forgot to ask:

what are the NAT statements in your pf.conf, that you mention. the ipsec
packets should not be NAT'ed inyour configuration ( although ipsec can go
through NAT in general ).

> -----Urspr|ngliche Nachricht-----
> Von: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] Auftrag
> von jcr
> Gesendet: Dienstag, 27. November 2007 12:10
> An: [email protected]
> Betreff: ipsec vpn netgear DG834 : openbsd 4.2 (new thread)
>
>
> New thread .. after some new test..
>
> And stiill the same ... shit !
>
> Here is the LAn/WAn network
>
>
> 192.168.0/24(lan)-->Netgear DG 834 (adsl + NAT + ipsec +ip fix A)
>                                                  |
>                                          <---WEB--->
>                                                   |
>                                  Openbsd 4.2
> (ipsec.conf+isakmpd.policy+ip fix B+ NAT) --> 10.7.22.0/24(lan)
>
>
> Here are the conf :
>
> netgear :
>
> local lan : 192.168.0.0/24
> remote lan : 10.7.22.0/24
> IKE :
> direction : initiator & respond
> mode : main
> diffie-Hellman : Groupe 2 (1024)
> local id : IP wan
> remote id: IP
>
> Params
> Crypto algo : 3DES
> Algo auth : SHA-1
> pre shared key : 123456789
> SA life time : 36000
>
>
> Openbsd :
> ipsec.conf
>
> ike passive esp tunnel from IP_A to IP_B \
>      main auth hmac-sha1 enc 3des group modp1024 \
>      quick auth hmac-sha1 enc 3des  psk 123456789
>
> ike dynamic esp tunnel from 192.168.0.0/24 to 10.7.22.0/24 peer IP_A \
>      main auth hmac-sha1 enc 3des group modp1024 \
>      quick auth hmac-sha1 enc 3des psk 123456789
>
>    i have tried passive & dynamic for ike esp .. it's the same
>
> isakmpd.policy
>
> KeyNote-Version: 2
> Authorizer: "POLICY"
>
> pf.conf
>
> pass in on $ext_if1 proto udp from $IP_A to $IP_B port {500,4500}
> pass out on $ext_if1 proto udp from $IP_B to $IP_A port {500,4500}
>
> pass in  on $IP_B proto esp from $IP_A to $IP_B
> pass out on $IP_B proto esp from $IP_B to $IP_A
>
> pass in on enc0 proto ipencap from $IP_A to $IP_B keep state
> (if-bound)
> pass out on enc0 proto ipencap from $IP_B to $IP_A keep state
> (if-bound)
>
> pass in on enc0 from 192.168.0.0/24 to 10.7.22.0/24 keep
> state (if-bound)
> pass out on enc0 from 10.7.22.0/24 to 192.168.0.0/24 keep
> state (if-bound)
>
> i have a rule for nat on $IP_B
>
>
> enc0 is up and running
>
> i start my vpn with
>
> isakmpd -dv -D 8=99
>
>
> And Finally here is the Trouble , i got this on isakmpd console
>
> 151330.400513 Negt 30 message_negotiate_sa: transform 0 proto
> 1 proposal
> 0 ok
> 151330.400933 Negt 20 ike_phase_1_validate_prop: success
> 151330.401046 Negt 30 message_negotiate_sa: proposal 0 succeeded
> 151357.435134 Default transport_send_messages: giving up on exchange
> peer-IP_A, no response from peer IP_A:500
>
> And this on the DG834
>
> Fri, 2007-11-23 14:13:30 - [idle] initiating Main Mode
> Fri, 2007-11-23 14:13:40 - [idle] STATE_MAIN_I1: retransmission; will
> wait 20s for response
> Fri, 2007-11-23 14:14:00 - [idle] STATE_MAIN_I1: retransmission; will
> wait 40s for response
> Fri, 2007-11-23 14:14:40 - [idle] max number of
> retransmissions reached
> STATE_MAIN_I1.  No acceptable response to our first IKE message
>
>
> and finally ( As wanted for those who try to help me .. thanks)
>
> echo "p on" > /var/run/isakmpd.fif and tcpdump -r
> /var/run/isakmpd.pcap
> -vvn
>
>
> tcpdump: WARNING: snaplen raised from 96 to 65536
> 11:40:31.600710 IP_A.500 > IP_B.500: [udp sum ok] isakmp v1.0
> exchange
> ID_PROT
>         cookie: cb79617a4b409a8f->0000000000000000 msgid:
> 00000000 len: 100
>         payload: SA len: 52 DOI: 1(IPSEC) situation: IDENTITY_ONLY
>             payload: PROPOSAL len: 40 proposal: 0 proto:
> ISAKMP spisz: 0
> xforms: 1
>                 payload: TRANSFORM len: 32
>                     transform: 0 ID: ISAKMP
>                         attribute LIFE_TYPE = SECONDS
>                         attribute LIFE_DURATION = 3600
>                         attribute ENCRYPTION_ALGORITHM = 3DES_CBC
>                         attribute HASH_ALGORITHM = SHA
>                         attribute AUTHENTICATION_METHOD = PRE_SHARED
>                         attribute GROUP_DESCRIPTION = MODP_1024
>         payload: VENDOR len: 20 (supports DPD v1.0) [ttl 0]
> (id 1, len 128)
> 11:40:31.601712 IP_B.500 > IP_A.500: [udp sum ok] isakmp v1.0
> exchange
> ID_PROT
>         cookie: cb79617a4b409a8f->76316a628a99ce2b msgid:
> 00000000 len: 180
>         payload: SA len: 52 DOI: 1(IPSEC) situation: IDENTITY_ONLY
>             payload: PROPOSAL len: 40 proposal: 0 proto:
> ISAKMP spisz: 0
> xforms: 1
>                 payload: TRANSFORM len: 32
>                     transform: 0 ID: ISAKMP
>                         attribute LIFE_TYPE = SECONDS
>                         attribute LIFE_DURATION = 3600
>                         attribute ENCRYPTION_ALGORITHM = 3DES_CBC
>                         attribute HASH_ALGORITHM = SHA
>                         attribute AUTHENTICATION_METHOD = PRE_SHARED
>                         attribute GROUP_DESCRIPTION = MODP_1024
>         payload: VENDOR len: 20 (supports OpenBSD-4.0)
>         payload: VENDOR len: 20 (supports v2 NAT-T,
> draft-ietf-ipsec-nat-t-ike-02)
>         payload: VENDOR len: 20 (supports v3 NAT-T,
> draft-ietf-ipsec-nat-t-ike-03)
>         payload: VENDOR len: 20 (supports NAT-T, RFC 3947)
>         payload: VENDOR len: 20 (supports DPD v1.0) [ttl 0]
> (id 1, len 208)
>
>
>
> And then nothing !!!!
>
> it is not related to my FAI i have tried with 2 different..
> it is the same
>
>
> For me it is around pf.conf .. but i can't find where
>
> jc

Reply via email to