Hi,

Trying to debug the nortel connect issue. Probably we can take this on
the turnpike-dev list rather than in this list, since it seems like a
VPN connectivity issue.

1. Did you also install the novell-nortelplugins-0.1.18-i586.rpm? They
are required for the Nortel switch interop. I am assuming you did
because you were able to create nortel gateway specific profiles.

2. Looking at your racoon.debug file (posted in turnpike-dev), the
first phase1 packet itself is not going through. Looking further, the
sockname and send from addresses are mismatching (see line#37, #38:
192.168.112.1 and 192.168.1.102). Probably you have switched interfaces
when racoon is running. This looks like a problem with racoon not able
to handle correctly when an interface switch happens when racoon is
running. In that case, /etc/init.d/racoon restart should make your
problem go away. I guess we should automatically restart racoon from
ipsec-vpn when an interface is switched, but for now can you please try
to restart racoon and see if you can proceed further?

3. Also, comparing the configurations, your working configuration using
apani seems to use DH group 3 (MODP_1536), whereas the turnpike profile
uses DH 2. Is your Nortel switch configured to allow DH group 2? 
Otherwise phase 1 will not go through. We currently dont support DH 3.
It is quite simple to add it though, so we can send you a patch for the
same if you need it. Please let us know.

Thanks and Regards,
Haripriya S.

>>> Wendell MacKenzie <[EMAIL PROTECTED]> 02/03/06 10:18 pm >>> 
Hi:

   I've setup the following components on SUSE 10.0:

NetworkManager- 0.5.1cvs20060107- 2
NetworkManager- vpnc- 0.5.0cvs20051102- 3
NetworkManager- glib- 0.5.1cvs20060107- 2
NetworkManager- devel- 0.5.1cvs20060107- 2
NetworkManager- gnome- 0.5.1cvs20060107- 2

ipsec- tools- 0.6.3_turnpike- 1.i586.rpm
novell- vpn- 20060113.tar (make + make install worked fine)
turnpike- 0.1.0- 22.i586.rpm

I then restarted networkmanager in /etc/init.d and relaunched the nm-
applet.

All good so far...

Then I configured our Corporate Nortel Switch in the VPN Configuration

menus in the nm- applet menus, saved it and tried to connect.

Here is what shows in /var/log/messages:

Feb  3 11:24:16 macduff NetworkManager: <information>   Will activate 
VPN connection 'BEA Corporate Network', service 
'org.freedesktop.NetworkManager.vpnc', user_name 'wendell', vpn_data 
'IPSec gateway / 63.96.177.3 / IPSec ID / bea / Xauth username /
wendell 
/ Domain / bea.com'.
Feb  3 11:24:16 macduff NetworkManager: <information>   VPN Activation

(BEA Corporate Network) Stage 1 (Connection Prepare) scheduled...
Feb  3 11:24:16 macduff NetworkManager: <information>   
nm_vpn_service_stage1_daemon_exec(org.freedesktop.NetworkManager.vpnc):

execed the VPN service, PID is 27535.
Feb  3 11:24:16 macduff NetworkManager: <information>   VPN Activation

(BEA Corporate Network) Stage 2 (Connection Prepare Wait) scheduled...
Feb  3 11:24:16 macduff NetworkManager: <information>   VPN Activation

(BEA Corporate Network) Stage 2 (Connection Prepare Wait) scheduled...
Feb  3 11:24:17 macduff dhclient: No DHCPOFFERS received.
Feb  3 11:24:17 macduff dhclient: No working leases in persistent 
database -  sleeping.
Feb  3 11:24:17 macduff NetworkManager: <information>   VPN Activation

(BEA Corporate Network) Stage 2 (Connection Prepare Wait) scheduled...
Feb  3 11:24:17 macduff NetworkManager: <information>   VPN Activation

(BEA Corporate Network) Stage 2 (Connection Prepare Wait) scheduled...
Feb  3 11:24:18 macduff NetworkManager: <information>   VPN Activation

(BEA Corporate Network) failed.

Any thoughts on debugging this?  I have Apani's netlock client working

no problem...but they are SLOW at keeping pace with new kernels ...

The nortel switch uses Group ID authentication with an RSA token which

I've setup in my connection profile and in the menu at connect
time.

Any help is appreciated.

Regards,
Wendell

_______________________________________________
NetworkManager- list mailing list
NetworkManager- [EMAIL PROTECTED]
http://mail.gnome.org/mailman/listinfo/networkmanager- list

Attachment: racoon_1.debug
Description: Binary data

2006-02-03 12:09:01 (01,12e80003):Handling VPN Login Request        
2006-02-03 12:09:01 (01,12e80010):Negotiation Status: Idle        
2006-02-03 12:09:01 (01,12590016):Adding VPN record        
2006-02-03 12:09:01 (01,12e80002):Received KM to GUI Notification Message       
 
2006-02-03 12:09:01 (16,12e80008):<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<        
2006-02-03 12:09:01 (16,12e80008):Initiating negotiation with switch at 
63.96.177.3        
2006-02-03 12:09:01 (01,12e80010):Negotiation Status: In Progress        
2006-02-03 12:09:01 (01,12af0004):SA_REQ_OUTBOUND_ES_IS (from SP) received. 
Local Address: 192.168.1.102 Remote Address: 63.96.177.3      
2006-02-03 12:09:01 (01,11220002):The MM identity type is KEY_ID and the value 
is: bea. Local Address: 192.168.1.102 Remote Address: 63.96.177.3 Local ESP 
SPI: 1AB9E12C     
2006-02-03 12:09:01 (01,11220001):Success in building IPSEC DATA from state 
entry Local Address: 192.168.1.102 Remote Address: 63.96.177.3 Local ESP SPI: 
1AB9E12C     
2006-02-03 12:09:01 (01,013a0001):QOS: 
        Confidentiality: ALGOR_CONF_DES_CBC
        Integrity: ALGOR_INTEG_MD5
        AH: ALGOR_OFF
        Mode: TRANSPORT_MODE
        ESP Replay: OFF
        AH Replay: OFF
        Compression: COMPRESSION_OFF
        PFS: OFF
        SA_PER_HOST: OFF
        Exchange Type: NEGOTIATION_MODE_AGGRESSIVE
        ISAKMP Encryption Algorithm: ISAKMP_AES_CBC
        ISAKMP Hash Algorithm: ISAKMP_HASH_SHA
        Authentication Method: PRE_SHARED_KEY
        Group Description: MODP_1536
        Group Type: MODP_GROUP
        Main Mode Identity Type: KEY_ID
        Main Mode Identity Value: bea
        Use No QM Identity: OFF
        SA creation delay: 0 seconds
        Firewall Type: Contivity Extranet Switch
 Local Address: 192.168.1.102 Remote Address: 63.96.177.3 Local ESP SPI: 
1AB9E12C     
2006-02-03 12:09:01 (01,013a0002):Local proposal(s):
0) Proposal 1 - Protocols: 1, Secs: 0, Kb: 0, PFS: 0.
    0) Protocol: ESP, Transforms: 1
        0) Transform 1: DES
            Lifetime: 0 Kb - 0 Secs
            Group: RESERVED
            Mode: Tunnel
            Auth alg: MD5
            Key length: 0 bits for 0 rounds        

_______________________________________________
NetworkManager-list mailing list
[email protected]
http://mail.gnome.org/mailman/listinfo/networkmanager-list

Reply via email to