I recently configured an IPSEC tunnel between OpenBSD 4.4 machine and a Cisco 
gateway.  I had trouble during the key exchange because I had configured DH 
group 2.  The Cisco sent a proposal for DH group 5 with a lifetime of 7800 
seconds, along with a proposal for DH group 2 with a lifetime of 00015180 
seconds.

The key exchange would not complete until I changed the OpenBSD side to use DH 
group 5.  The only difference in the proposal appears to be the lifetime.

Does anyone know why the Cisco would send a lifetime of 00015180 seconds (the 
Cisco tech said he configured it for 86400 seconds)?

I'm also interested why OpenBSD responded with NO_PROPOSAL_CHOSEN in this 
instance?

       payload: SA len: 160 DOI: 1(IPSEC) situation: IDENTITY_ONLY
           payload: PROPOSAL len: 148 proposal: 1 proto: ISAKMP spisz: 0
xforms: 4
               payload: TRANSFORM len: 32
                   transform: 1 ID: ISAKMP
                       attribute ENCRYPTION_ALGORITHM = 3DES_CBC
                       attribute HASH_ALGORITHM = SHA
                       attribute GROUP_DESCRIPTION = MODP_1536
                       attribute AUTHENTICATION_METHOD = PRE_SHARED
                       attribute LIFE_TYPE = SECONDS
                       attribute LIFE_DURATION = 7800
               payload: TRANSFORM len: 36
                   transform: 2 ID: ISAKMP
                       attribute ENCRYPTION_ALGORITHM = 3DES_CBC
                       attribute HASH_ALGORITHM = SHA
                       attribute GROUP_DESCRIPTION = MODP_1024
                       attribute AUTHENTICATION_METHOD = PRE_SHARED
                       attribute LIFE_TYPE = SECONDS
                       attribute LIFE_DURATION = 00015180

Mar  5 08:30:28 gw1 isakmpd[6650]: dropped message from x.x.x.x port 500 due to 
notification type NO_PROPOSAL_CHOSEN

Thanks,
Cam

Reply via email to