Hello

Am rezolvat problema initiala, acum se face Phase1 intre debian si ruter. Am 
dezinstalat tot si am pus Strongswan 4.1.8-2:

---------------debian-----------

# ipsec.conf - strongSwan IPsec configuration file

# basic configuration

config setup
        klipsdebug=all
        plutodebug=all
        # crlcheckinterval=600
        # strictcrlpolicy=yes
        # cachecrls=yes
        # nat_traversal=yes
        # charonstart=no
        plutostart=yes
        charonstart=yes
        charondebug=dmn4,mgr4,ike4,chd4,job4,cfg4,knl4,net4,enc4,lib4

conn %default
        ikelifetime=5m
        keylife=5m
        rekeymargin=5m
        keyingtries=50
        compress=no
        mobike=no
        authby=secret
        auth=esp
        pfs=yes
        keyexchange=ikev1
conn ipsec01-cisco6500
        left=19.1.255.254
        leftsubnet=19.2.0.0/16
        right=19.1.255.253
        rightsubnet=66.6.0.0/16
        auto=add
        authby=secret
        auth=esp
        compress=no
        pfs=yes
        esp=3des-md5-modp1024
        ike=3des-md5-modp1024
        keyexchange=ikev1
        mobike=no


fisierul ipsec.secrets are:
: PSK "cheie"




eth1      Link encap:Ethernet  HWaddr 00:0A:5E:5C:7C:E7 
          inet addr:19.1.255.254  Bcast:19.1.255.255  Mask:255.255.0.0
          inet6 addr: 2000:99:99:100:20a:5eff:fe5c:7ce7/64 Scope:Global
          inet6 addr: fe80::20a:5eff:fe5c:7ce7/64 Scope:Link
          UP BROADCAST RUNNING MULTICAST  MTU:1500  Metric:1
          RX packets:1901 errors:0 dropped:0 overruns:0 frame:0
          TX packets:1411 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:1000
          RX bytes:196249 (191.6 KiB)  TX bytes:145534 (142.1 KiB)
          Interrupt:23



in syslog am:

Nov 27 18:53:23 cvintila-ipsec01 charon: 01[DMN] starting charon (strongSwan 
Version 4.1.8)
Nov 27 18:53:23 cvintila-ipsec01 charon: 01[CFG] loading ca certificates from 
'/etc/ipsec.d/cacerts'
Nov 27 18:53:23 cvintila-ipsec01 charon: 01[CFG] loading aa certificates from 
'/etc/ipsec.d/aacerts'
Nov 27 18:53:23 cvintila-ipsec01 charon: 01[CFG] loading attribute certificates 
from '/etc/ipsec.d/acerts'
Nov 27 18:53:23 cvintila-ipsec01 charon: 01[CFG] loading ocsp certificates from 
'/etc/ipsec.d/ocspcerts'
Nov 27 18:53:23 cvintila-ipsec01 charon: 01[CFG] loading crls from 
'/etc/ipsec.d/crls'
Nov 27 18:53:23 cvintila-ipsec01 charon: 01[CFG] loading secrets from 
"/etc/ipsec.secrets"
Nov 27 18:53:23 cvintila-ipsec01 charon: 01[CFG]   loading shared key for %any
Nov 27 18:53:23 cvintila-ipsec01 charon: 01[CFG] loading control interface 
modules from '/usr/lib/ipsec/plugins/interfaces'
Nov 27 18:53:23 cvintila-ipsec01 charon: 01[CFG]   loaded control interface 
module successfully from libstroke.so
Nov 27 18:53:23 cvintila-ipsec01 charon: 01[CFG] loading backend modules from 
'/usr/lib/ipsec/plugins/backends'
Nov 27 18:53:23 cvintila-ipsec01 charon: 01[CFG]   loaded backend module 
successfully from liblocal.so
Nov 27 18:53:23 cvintila-ipsec01 charon: 01[KNL] listening on interfaces:
Nov 27 18:53:23 cvintila-ipsec01 charon: 01[KNL]   eth4
Nov 27 18:53:23 cvintila-ipsec01 charon: 01[KNL]     19.2.0.254
Nov 27 18:53:23 cvintila-ipsec01 charon: 01[KNL]     
2000:99:99:100:204:23ff:feb5:2ae1
Nov 27 18:53:23 cvintila-ipsec01 charon: 01[KNL]     fe80::204:23ff:feb5:2ae1
Nov 27 18:53:23 cvintila-ipsec01 charon: 01[KNL]   eth0
Nov 27 18:53:23 cvintila-ipsec01 charon: 01[KNL]     10.205.16.62
Nov 27 18:53:23 cvintila-ipsec01 charon: 01[KNL]     fe80::20a:5eff:fe5c:8252
Nov 27 18:53:23 cvintila-ipsec01 charon: 01[KNL]   eth1
Nov 27 18:53:23 cvintila-ipsec01 charon: 01[KNL]     19.1.255.254
Nov 27 18:53:23 cvintila-ipsec01 charon: 01[KNL]     
2000:99:99:100:20a:5eff:fe5c:7ce7
Nov 27 18:53:23 cvintila-ipsec01 charon: 01[KNL]     fe80::20a:5eff:fe5c:7ce7
Nov 27 18:53:23 cvintila-ipsec01 charon: 01[LIB] initializing libcurl
Nov 27 18:53:23 cvintila-ipsec01 charon: 01[CFG] loading EAP modules from 
'/usr/lib/ipsec/plugins/eap'
Nov 27 18:53:23 cvintila-ipsec01 charon: 01[CFG]   loaded EAP method 
EAP_IDENTITY successfully from libeapidentity.so
Nov 27 18:53:23 cvintila-ipsec01 charon: 01[JOB] spawning 16 worker threads
Nov 27 18:53:23 cvintila-ipsec01 charon: 03[CFG] received stroke: add 
connection 'ipsec01-cisco6500'
Nov 27 18:53:23 cvintila-ipsec01 charon: 03[CFG] added configuration 
'ipsec01-cisco6500': 19.1.255.254[19.1.255.254]...19.1.255.253[19.1.255.253]


---------------ruter-----------

!
crypto isakmp policy 10
 encr 3des
 hash md5
 authentication pre-share
 group 2
crypto isakmp key cheie address 19.1.255.254
!
crypto ipsec security-association lifetime seconds 86400
!
crypto ipsec transform-set IL esp-3des esp-md5-hmac
!
crypto map IL 10 ipsec-isakmp
 set peer 19.1.255.254
 set transform-set IL
 match address 100

-------map-ul este aplicat pe interfata gi4/27, care are ip 19.1.255.253/16

Extended IP access list 100
    10 permit ip any any (1420 matches)



dau ping de pe ruter pe debian sau invers


avand
debug crypto verbose, pe cisco am:


7w3d: %CRYPTO-4-RECVD_PKT_NOT_IPSEC: Rec'd packet not an IPSEC packet.
        (ip) vrf/dest_addr= /192.168.1.255, src_addr= 192.168.1.2, prot= 17
7w3d: IPSEC(sa_request): ,
  (key eng. msg.) OUTBOUND local= 19.1.255.253, remote= 19.1.255.254,
    local_proxy= 0.0.0.0/0.0.0.0/0/0 (type=4),
    remote_proxy= 0.0.0.0/0.0.0.0/0/0 (type=4),
    protocol= ESP, transform= esp-3des esp-md5-hmac ,
    lifedur= 86400s and 4608000kb,
    spi= 0x905A43B8(2421834680), conn_id= 0, keysize= 0, flags= 0x400A
7w3d: ISAKMP: received ke message (1/1)
7w3d: ISAKMP:(0:0:N/A:0): SA request profile is (NULL)
7w3d: ISAKMP: Attempting to insert peer index node : 18
7w3d: ISAKMP: Created a peer struct for 19.1.255.254, peer port 500, peer index 
18
7w3d: ISAKMP: Locking peer struct 0x53EBA708, IKE refcount 1 for 
isakmp_initiator
7w3d: ISAKMP: local port 500, remote port 500
7w3d: ISAKMP: set new node 0 to QM_IDLE
7w3d: insert sa successfully sa = 53EA83A0
7w3d: ISAKMP:(0:1:SW:1):Can not start Aggressive mode, trying Main mode.
7w3d: ISAKMP: Looking for a matching key for 19.1.255.254 in default : success
7w3d: ISAKMP:(0:1:SW:1):found peer pre-shared key matching 19.1.255.254
7w3d: ISAKMP:(0:1:SW:1): constructed NAT-T vendor-03 ID
7w3d: ISAKMP:(0:1:SW:1): constructed NAT-T vendor-02 ID
7w3d: ISAKMP:(0:1:SW:1):Input = IKE_MESG_FROM_IPSEC, IKE_SA_REQ_MM
7w3d: ISAKMP:(0:1:SW:1):Old State = IKE_READY  New State = IKE_I_MM1

7w3d: ISAKMP:(0:1:SW:1): beginning Main Mode exchange
7w3d: ISAKMP:(0:1:SW:1): sending packet to 19.1.255.254 my_port 500 peer_port 
500 (I) MM_NO_STATE
7w3d: ISAKMP (0:134217729): received packet from 19.1.255.254 dport 500 sport 
500 Global (I) MM_NO_STATE
7w3d: ISAKMP:(0:1:SW:1):Input = IKE_MESG_FROM_PEER, IKE_MM_EXCH
7w3d: ISAKMP:(0:1:SW:1):Old State = IKE_I_MM1  New State = IKE_I_MM2

7w3d: ISAKMP:(0:1:SW:1): processing SA payload. message ID = 0
7w3d: ISAKMP:(0:1:SW:1): processing vendor id payload
7w3d: ISAKMP:(0:1:SW:1): vendor ID seems Unity/DPD but major 234 mismatch
7w3d: ISAKMP:(0:1:SW:1): processing vendor id payload
7w3d: ISAKMP:(0:1:SW:1): vendor ID is Unity
7w3d: ISAKMP:(0:1:SW:1): processing vendor id payload
7w3d: ISAKMP:(0:1:SW:1): vendor ID seems Unity/DPD but major 215 mismatch
7w3d: ISAKMP:(0:1:SW:1): vendor ID is XAUTH
7w3d: ISAKMP:(0:1:SW:1): processing vendor id payload
7w3d: ISAKMP:(0:1:SW:1): vendor ID is DPD
7w3d: ISAKMP: Looking for a matching key for 19.1.255.254 in default : success
7w3d: ISAKMP:(0:1:SW:1):found peer pre-shared key matching 19.1.255.254
7w3d: ISAKMP:(0:1:SW:1): local preshared key found
7w3d: ISAKMP : Scanning profiles for xauth ...
7w3d: ISAKMP:(0:1:SW:1):Checking ISAKMP transform 1 against priority 10 policy
7w3d: ISAKMP:      encryption 3DES-CBC
7w3d: ISAKMP:      hash MD5
7w3d: ISAKMP:      default group 2
7w3d: ISAKMP:      auth pre-share
7w3d: ISAKMP:      life type in seconds
7w3d: ISAKMP:      life duration (VPI) of  0x0 0x1 0x51 0x80
7w3d: ISAKMP:(0:1:SW:1):atts are acceptable. Next payload is 0
7w3d: ISAKMP:(0:1:SW:1):Input = IKE_MESG_INTERNAL, IKE_PROCESS_MAIN_MODE
7w3d: ISAKMP:(0:1:SW:1):Old State = IKE_I_MM2  New State = IKE_I_MM2

7w3d: ISAKMP:(0:1:SW:1): sending packet to 19.1.255.254 my_port 500 peer_port 
500 (I) MM_SA_SETUP
7w3d: ISAKMP:(0:1:SW:1):Input = IKE_MESG_INTERNAL, IKE_PROCESS_COMPLETE
7w3d: ISAKMP:(0:1:SW:1):Old State = IKE_I_MM2  New State = IKE_I_MM3

7w3d: ISAKMP (0:134217729): received packet from 19.1.255.254 dport 500 sport 
500 Global (I) MM_SA_SETUP
7w3d: ISAKMP:(0:1:SW:1):Input = IKE_MESG_FROM_PEER, IKE_MM_EXCH
7w3d: ISAKMP:(0:1:SW:1):Old State = IKE_I_MM3  New State = IKE_I_MM4

7w3d: ISAKMP:(0:1:SW:1): processing KE payload. message ID = 0
7w3d: ISAKMP:(0:1:SW:1): processing NONCE payload. message ID = 0
7w3d: ISAKMP: Looking for a matching key for 19.1.255.254 in default : success
7w3d: ISAKMP:(0:1:SW:1):found peer pre-shared key matching 19.1.255.254
7w3d: ISAKMP:(0:1:SW:1):SKEYID state generated
7w3d: ISAKMP:(0:1:SW:1):Input = IKE_MESG_INTERNAL, IKE_PROCESS_MAIN_MODE
7w3d: ISAKMP:(0:1:SW:1):Old State = IKE_I_MM4  New State = IKE_I_MM4

7w3d: ISAKMP:(0:1:SW:1):Send initial contact
7w3d: ISAKMP:(0:1:SW:1):SA is doing pre-shared key authentication using id type 
ID_IPV4_ADDR
7w3d: ISAKMP (0:134217729): ID payload
        next-payload : 8
        type         : 1
        address      : 19.1.255.253
        protocol     : 17
        port         : 500
        length       : 12
7w3d: ISAKMP:(0:1:SW:1):Total payload length: 12
7w3d: ISAKMP:(0:1:SW:1): sending packet to 19.1.255.254 my_port 500 peer_port 
500 (I) MM_KEY_EXCH
7w3d: ISAKMP:(0:1:SW:1):Input = IKE_MESG_INTERNAL, IKE_PROCESS_COMPLETE
7w3d: ISAKMP:(0:1:SW:1):Old State = IKE_I_MM4  New State = IKE_I_MM5

7w3d: ISAKMP (0:134217729): received packet from 19.1.255.254 dport 500 sport 
500 Global (I) MM_KEY_EXCH
7w3d: ISAKMP:(0:1:SW:1):Input = IKE_MESG_FROM_PEER, IKE_MM_EXCH
7w3d: ISAKMP:(0:1:SW:1):Old State = IKE_I_MM5  New State = IKE_I_MM6

7w3d: ISAKMP:(0:1:SW:1): processing ID payload. message ID = 0
7w3d: ISAKMP (0:134217729): ID payload
        next-payload : 8
        type         : 1
        address      : 19.1.255.254
        protocol     : 0
        port         : 0
        length       : 12
7w3d: ISAKMP:(0:1:SW:1): processing HASH payload. message ID = 0
7w3d: ISAKMP:(0:1:SW:1):SA authentication status:
7w3d: ISAKMP:(0:1:SW:1):        authenticated
7w3d: ISAKMP:(0:1:SW:1):SA has been authenticated with 19.1.255.254
7w3d: ISAKMP:(0:1:SW:1):: peer matches *none* of the profiles
7w3d: ISAKMP: Trying to insert a peer 19.1.255.253/19.1.255.254/500/,  and 
inserted successfully 53EBA708.
7w3d: ISAKMP:(0:1:SW:1):Input = IKE_MESG_INTERNAL, IKE_PROCESS_MAIN_MODE
7w3d: ISAKMP:(0:1:SW:1):Old State = IKE_I_MM6  New State = IKE_I_MM6

7w3d: ISAKMP:(0:1:SW:1):Input = IKE_MESG_INTERNAL, IKE_PROCESS_COMPLETE
7w3d: ISAKMP:(0:1:SW:1):Old State = IKE_I_MM6  New State = IKE_P1_COMPLETE

7w3d: ISAKMP:(0:1:SW:1):beginning Quick Mode exchange, M-ID of 1651465696
7w3d: ISAKMP:(0:1:SW:1): sending packet to 19.1.255.254 my_port 500 peer_port 
500 (I) QM_IDLE
7w3d: ISAKMP:(0:1:SW:1):Node 1651465696, Input = IKE_MESG_INTERNAL, IKE_INIT_QM
7w3d: ISAKMP:(0:1:SW:1):Old State = IKE_QM_READY  New State = IKE_QM_I_QM1
7w3d: ISAKMP:(0:1:SW:1):Input = IKE_MESG_INTERNAL, IKE_PHASE1_COMPLETE
7w3d: ISAKMP:(0:1:SW:1):Old State = IKE_P1_COMPLETE  New State = IKE_P1_COMPLETE

7w3d: ISAKMP (0:134217729): received packet from 19.1.255.254 dport 500 sport 
500 Global (I) QM_IDLE
7w3d: ISAKMP: set new node -1908897605 to QM_IDLE
7w3d: ISAKMP:(0:1:SW:1): processing HASH payload. message ID = -1908897605
7w3d: ISAKMP:(0:1:SW:1): processing NOTIFY INVALID_ID_INFO protocol 1
        spi 0, message ID = -1908897605, sa = 53EA83A0
7w3d: ISAKMP:(0:1:SW:1):peer does not do paranoid keepalives.

7w3d: ISAKMP:(0:1:SW:1):deleting SA reason "recevied fatal informational" state 
(I) QM_IDLE       (peer 19.1.255.254) input queue 0
7w3d: ISAKMP:(0:1:SW:1):deleting node -1908897605 error FALSE reason 
"informational (in) state 1"
7w3d: ISAKMP:(0:1:SW:1):Input = IKE_MESG_FROM_PEER, IKE_INFO_NOTIFY
7w3d: ISAKMP:(0:1:SW:1):Old State = IKE_P1_COMPLETE  New State = IKE_P1_COMPLETE

7w3d: ISAKMP: set new node 318867261 to QM_IDLE
7w3d: ISAKMP:(0:1:SW:1): sending packet to 19.1.255.254 my_port 500 peer_port 
500 (I) QM_IDLE
7w3d: ISAKMP:(0:1:SW:1):purging node 318867261
7w3d: ISAKMP:(0:1:SW:1):Input = IKE_MESG_INTERNAL, IKE_PHASE1_DEL
7w3d: ISAKMP:(0:1:SW:1):Old State = IKE_P1_COMPLETE  New State = IKE_DEST_SA

7w3d: ISAKMP:(0:1:SW:1):deleting SA reason "" state (I) QM_IDLE       (peer 
19.1.255.254) input queue 0
7w3d: ISAKMP: Unlocking IKE struct 0x53EBA708 for isadb_mark_sa_deleted(), 
count 0
7w3d: ISAKMP: Deleting peer node by peer_reap for 19.1.255.254: 53EBA708
7w3d: ISAKMP: Freeing node for peer index 18
7w3d: ISAKMP:(0:1:SW:1):deleting node 1651465696 error FALSE reason ""
7w3d: ISAKMP:(0:1:SW:1):Input = IKE_MESG_FROM_PEER, IKE_MM_EXCH
7w3d: ISAKMP:(0:1:SW:1):Old State = IKE_DEST_SA  New State = IKE_DEST_SA

7w3d: ISAKMP (0:134217729): received packet from 19.1.255.254 dport 500 sport 
500 Global (I) MM_NO_STATE
7w3d: %CRYPTO-4-RECVD_PKT_NOT_IPSEC: Rec'd packet not an IPSEC packet.
        (ip) vrf/dest_addr= /19.1.255.253, src_addr= 19.1.255.254, prot= 1


-------------


Am facut captura cu ethereal pe switch si am doar pachete ISAKMP Identity 
Protection (Main Mode), ISAKMP Quick Mode si ISAKMP Informational.



Gresesc ceva in acl?...trebuie definit exact traficul intre noduri (nu e 
suficient permit ip any any?)...sau problema este pe linux undeva?

Mersi frumos,
Cristina





----- Original Message ----
From: Silviu Dicu <[EMAIL PROTECTED]>
To: Romanian Linux Users Group <[email protected]>
Sent: Monday, 26 November, 2007 6:48:13 PM
Subject: RE: [rlug] ipsec server sub debian vs. cisco

 

hey

1. tcpdump-ul imi arata mesaje icmp in clar, nimic de esp sau isakmp 2.
lista de acces este definita

ms,
Cristina

---
Hey

Tcpdump trebuie sa iti spuna ceva de genul  

ESP(spi=0x00000301,seq=0x1cee8d)

Ruleaza tcpdump fara nici un filtru si dai un grep ESP ori AH.

Daca nu vezi nici un fel de traffic de genul asta e sigur ca nu ai
traffic
Via ipsec. Poate iti lipseste o ruta, nu prea e clar din examplul tau
care sint ip urile.

Ai pus in cisco peer 20.0.0.254 iar in linux spui ca esti 26.0.0.254 -
poate doar e un typo


silviu

_______________________________________________
RLUG mailing list
[email protected]
http://lists.lug.ro/mailman/listinfo/rlug






      ___________________________________________________________ 
Want ideas for reducing your carbon footprint? Visit Yahoo! For Good  
http://uk.promotions.yahoo.com/forgood/environment.html
_______________________________________________
RLUG mailing list
[email protected]
http://lists.lug.ro/mailman/listinfo/rlug

Raspunde prin e-mail lui