Re: [strongSwan] new to strongswan and couldn't establish a connection

2011-01-19 Thread Alok Thaker
Hi,

What are you trying to do is i think x2tp with ipsec, if your machine is
behind NAT you need to compile strongswan with NAT support, being very
addictive to vpn and fan of strongswan I have also wrote an ebook on
implementing PPTP,L2TP,IPSec,SSL vpn  Mobile Vpn on
http://www.ebooksyours.com/how_to_vpn.html .

Thanks,
Alok

On Wed, Jan 19, 2011 at 9:12 PM, Spacelee fjct...@gmail.com wrote:


 this is the first time I try strongswan, and I couldn't establish a
 connection, here is the configuration file :
 server : centos 5.5 64 bit
 strongswan : newest
 client : mac os

 ipsec.conf :
 config setup
 # crlcheckinterval=600
 # strictcrlpolicy=yes
 # cachecrls=yes
 nat_traversal=yes
 charonstart=yes
 plutostart=yes
 conn L2TP
 authby=psk
 pfs=no
 rekey=no
 type=tunnel
 left=192.168.1.97
 leftnexthop=%defaultroute
 leftprotoport=17/1701
 right=%any
 rightprotoport=17/%any
 rightsubnetwithin=0.0.0.0/0
 auto=add


 xl2tpd.conf
 [global]
 debug network = yes
 debug tunnel = yes
 [lns default]
 ip range = 10.0.0.200-10.0.0.254
 local ip = 10.0.0.1
 require chap = yes
 refuse pap = yes
 require authentication = yes
 name = NIELSPEEN.COM
 ppp debug = yes
 pppoptfile = /etc/ppp/options.xl2tpd
 length bit = yes


 options.xl2tpd
 ipcp-accept-local
 ipcp-accept-remote
 ms-dns 8.8.8.8
 noccp
 auth
 crtscts
 idle 1800
 mtu 1410
 mru 1410
 nodefaultroute
 debug
 lock
 proxyarp
 connect-delay 5000


 ipsec.secrets
 192.168.1.97 %any : PSK testpsk

 and the /var/log/secure

 Jan 19 23:31:18 localhost pluto[13051]: listening for IKE messages
 Jan 19 23:31:18 localhost pluto[13051]: adding interface eth0/eth0
 192.168.1.97:500
 Jan 19 23:31:18 localhost pluto[13051]: adding interface eth0/eth0
 192.168.1.97:4500
 Jan 19 23:31:18 localhost pluto[13051]: adding interface lo/lo
 127.0.0.1:500
 Jan 19 23:31:18 localhost pluto[13051]: adding interface lo/lo
 127.0.0.1:4500
 Jan 19 23:31:18 localhost pluto[13051]: adding interface lo/lo ::1:500
 Jan 19 23:31:18 localhost pluto[13051]: loading secrets from
 /etc/ipsec.secrets
 Jan 19 23:31:18 localhost pluto[13051]:   loaded PSK secret for
 192.168.1.97 %any
 Jan 19 23:31:18 localhost ipsec_starter[13050]: charon (13069) started
 after 20 ms
 Jan 19 23:31:18 localhost pluto[13051]: added connection description L2TP
 Jan 19 23:31:25 localhost pluto[13051]: packet from 192.168.1.102:500:
 received Vendor ID payload [RFC 3947]
 Jan 19 23:31:25 localhost pluto[13051]: packet from 192.168.1.102:500:
 ignoring Vendor ID payload [4df37928e9fc4fd1b3262170d515c662]
 Jan 19 23:31:25 localhost pluto[13051]: packet from 192.168.1.102:500:
 ignoring Vendor ID payload [8f8d83826d246b6fc7a8a6a428c11de8]
 Jan 19 23:31:25 localhost pluto[13051]: packet from 192.168.1.102:500:
 ignoring Vendor ID payload [439b59f8ba676c4c7737ae22eab8f582]
 Jan 19 23:31:25 localhost pluto[13051]: packet from 192.168.1.102:500:
 ignoring Vendor ID payload [4d1e0e136deafa34c4f3ea9f02ec7285]
 Jan 19 23:31:25 localhost pluto[13051]: packet from 192.168.1.102:500:
 ignoring Vendor ID payload [80d0bb3def54565ee84645d4c85ce3ee]
 Jan 19 23:31:25 localhost pluto[13051]: packet from 192.168.1.102:500:
 ignoring Vendor ID payload [9909b64eed937c6573de52ace952fa6b]
 Jan 19 23:31:25 localhost pluto[13051]: packet from 192.168.1.102:500:
 ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03]
 Jan 19 23:31:25 localhost pluto[13051]: packet from 192.168.1.102:500:
 ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02]
 Jan 19 23:31:25 localhost pluto[13051]: packet from 192.168.1.102:500:
 ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n]
 Jan 19 23:31:25 localhost pluto[13051]: packet from 192.168.1.102:500:
 received Vendor ID payload [Dead Peer Detection]
 Jan 19 23:31:25 localhost pluto[13051]: packet from 192.168.1.102:500:
 initial Main Mode message received on 192.168.1.97:500 but no connection
 has been authorized with policy=PSK
 Jan 19 23:31:28 localhost pluto[13051]: packet from 192.168.1.102:500:
 received Vendor ID payload [RFC 3947]
 Jan 19 23:31:28 localhost pluto[13051]: packet from 192.168.1.102:500:
 ignoring Vendor ID payload [4df37928e9fc4fd1b3262170d515c662]
 Jan 19 23:31:28 localhost pluto[13051]: packet from 192.168.1.102:500:
 ignoring Vendor ID payload [8f8d83826d246b6fc7a8a6a428c11de8]
 Jan 19 23:31:28 localhost pluto[13051]: packet from 192.168.1.102:500:
 ignoring Vendor ID payload [439b59f8ba676c4c7737ae22eab8f582]
 Jan 19 23:31:28 localhost pluto[13051]: packet from 192.168.1.102:500:
 ignoring Vendor ID payload [4d1e0e136deafa34c4f3ea9f02ec7285]
 Jan 19 23:31:28 localhost pluto[13051]: packet from 192.168.1.102:500:
 ignoring Vendor ID payload [80d0bb3def54565ee84645d4c85ce3ee]
 Jan 19 23:31:28 localhost pluto[13051]: packet from 192.168.1.102:500:
 ignoring Vendor ID payload [9909b64eed937c6573de52ace952fa6b]
 Jan 19 23:31:28 localhost 

Re: [strongSwan] strongswan ipsec XAUTH+PSK and iphone Problem !

2009-09-08 Thread Alok Thaker
Hi Techies,

   I am in a severe problem with the help of andreas and my grey
cells we made the iphone working for ipsec too but the thing is I am not
able to browse when I connect to isec vpn from iphone wiht xauth + psk. I
have masquerading enabled and this rule works fine for l2tp + ipsec.

When I see on iphone and mac book I don't get a dns ip from strongswan
ipsec. Is there any parameter to manually push the dns from ipsec.conf.

Please help me ASAP I am stucked due to this.

Thanks,
Alok

On Tue, Sep 8, 2009 at 8:36 PM, Alok Thaker alok.a...@gmail.com wrote:

 What could the possible resolutions I checked the command comes from ipsec
 which is from /usr/local/sbin/ipsec and it reads the
 /usr/local/etc/ipsec.conf created by strongswan, I am awaiting for your
 answer for the dns and internet browsing.

 And if strongswan-4.3.5 is introduced what how would we define it. It is
 very urgent for me to atleast make the internet running

 Thanks,
 Alok




 On Tue, Sep 8, 2009 at 11:01 AM, Andreas Steffen 
 andreas.stef...@strongswan.org wrote:

 Hi Alok,

 strongSwan doesn't have an ipsec verify command and does not
 enable opportunistic encryption by default. I think you
 got that from an earlier Openswan installation.

 Currently the IKEv1 pluto daemon does not support virtual
 IP pools yet. This feature will be introduced with the
 4.3.5 release in November. Currently you have to define
 one connection for each iphone client.

 Best regards

 Andreas

 Alok Thaker wrote:
  Hi Andreas,
 
I fired command ipsec verify it shows opportunitistic
 encryptions
  checks on is that might be the reason for not allowing client to browse
  internet and if i have kept rightsourceip=some ip it wld be used for all
  iphone clients simultaneously, can i give a range of ip to it or not.
 
  Please help on this issue.
 
  Thanks,
  Alok
 
  On Tue, Sep 8, 2009 at 7:43 AM, Alok Thaker alok.a...@gmail.com
 wrote:
 
  Hi Andreas,
 
  No still iphone clients can connect to strongswan but can't browse, I
 also
  added that rule but it isn't working.
 
  Thanks,
  Alok
 
 
  On Mon, Sep 7, 2009 at 8:39 AM, Alok Thaker alok.a...@gmail.com
 wrote:
 
  Would test and let you know andreas at present there is an internet
  downtime at my office. I am sending this message from my blackberry.
 
  Would let u know if this works or not in some time.
 
  Thanks,
  Alok
 
 
  On Mon, Sep 7, 2009 at 8:23 AM, andi andreas.stef...@strongswan.org
 wrote:
 
  Could you try to exempt traffic to be tunneled from masquerading by
  inserting the following rule:
 
  iptables -t nat -I POSTROUTING 1 -o eth0 -m policy --dir out --pol
 ipsec
  --proto esp -j ACCEPT
 
  Andreas
 
  On Mon, 7 Sep 2009 08:18:51 -0400, Alok Thaker alok.a...@gmail.com
  wrote:
  Here it is Anderas.
 
  iptables -v -n -t nat -L POSTROUTING
  Chain POSTROUTING (policy ACCEPT 188 packets, 13511 bytes)
   pkts bytes target prot opt in out source
  destination
122 15835 MASQUERADE  all  --  *  eth00.0.0.0/0
  0.0.0.0/0
   113K 8162K MASQUERADE  all
  --

 ==
 Andreas Steffen andreas.stef...@strongswan.org
 strongSwan - the Linux VPN Solution!www.strongswan.org
 Institute for Internet Technologies and Applications
 University of Applied Sciences Rapperswil
 CH-8640 Rapperswil (Switzerland)
 ===[ITA-HSR]==



___
Users mailing list
Users@lists.strongswan.org
https://lists.strongswan.org/mailman/listinfo/users


[strongSwan] I can ping to google but can't browse in iphone/macbook + strongswan !

2009-09-08 Thread Alok Thaker
Hi Techies,

I made the ping running through ipsec but the only thing is that
neither macbook/iphone gets the dns ip so that it can resolvecan you let
me know how can i push our dns ip to the ipsec clients which connect to our
strongswan.

i also tried keeping in charon but strongswan doesn't allows include
/usr/local/etc/strongswan.conf  at line charon - Unexpected string, I have
also tried compiling --enable-charon=yes while make of strongswan.

Please help I am near to success the only thing is I suppose it is not
getting the dns ip pushing from ipsec server to resolve the net.

Thanks,
Alok
___
Users mailing list
Users@lists.strongswan.org
https://lists.strongswan.org/mailman/listinfo/users