Hello everybody,

I followed config tutorial https://libreswan.org/wiki/VPN_server_for_remote_clients_using_IKEv1_XAUTH with small modifications but cisco vpn client forces 1des encryption which libreswan do not support anymore. Is there any solution how to get it work with cisco vpn client?
Auth log:

Jul 11 11:41:07 IPsec pluto[22157]: packet from 192.168.110.76:59670: received Vendor ID payload [XAUTH] Jul 11 11:41:07 IPsec pluto[22157]: packet from 192.168.110.76:59670: received Vendor ID payload [Dead Peer Detection] Jul 11 11:41:07 IPsec pluto[22157]: packet from 192.168.110.76:59670: received Vendor ID payload [FRAGMENTATION 80000000] Jul 11 11:41:07 IPsec pluto[22157]: packet from 192.168.110.76:59670: ignoring received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n] method=draft-ietf-ipsec-nat-t-ike-02/03, because port floating is off Jul 11 11:41:07 IPsec pluto[22157]: packet from 192.168.110.76:59670: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n] Jul 11 11:41:07 IPsec pluto[22157]: packet from 192.168.110.76:59670: received Vendor ID payload [Cisco-Unity] Jul 11 11:41:07 IPsec pluto[22157]: "xauth-psk-xauth-aggrmode"[3] 192.168.110.76 #2: Aggressive mode peer ID is ID_KEY_ID: '<deleted>' Jul 11 11:41:07 IPsec pluto[22157]: "xauth-psk-xauth-aggrmode"[3] 192.168.110.76 #2: switched from "xauth-psk-xauth-aggrmode" to "xauth-psk-xauth-aggrmode" Jul 11 11:41:07 IPsec pluto[22157]: "xauth-psk-xauth-aggrmode"[4] 192.168.110.76 #2: deleting connection "xauth-psk-xauth-aggrmode" instance with peer 192.168.110.76 {isakmp=#0/ipsec=#0} Jul 11 11:41:07 IPsec pluto[22157]: "xauth-psk-xauth-aggrmode"[4] 192.168.110.76 #2: responding to Aggressive Mode, state #2, connection "xauth-psk-xauth-aggrmode" from 192.168.110.76 Jul 11 11:41:07 IPsec pluto[22157]: "xauth-psk-xauth-aggrmode"[4] 192.168.110.76 #2: peer requested 2147483 seconds which exceeds our limit 86400 seconds. Attribute OAKLEY_LIFE_DURATION (variable length) Jul 11 11:41:07 IPsec pluto[22157]: "xauth-psk-xauth-aggrmode"[4] 192.168.110.76 #2: peer requested 2147483 seconds which exceeds our limit 86400 seconds. Attribute OAKLEY_LIFE_DURATION (variable length) Jul 11 11:41:07 IPsec pluto[22157]: "xauth-psk-xauth-aggrmode"[4] 192.168.110.76 #2: policy mandates Extended Authentication (XAUTH) with PSK of initiator (we are responder). Attribute OAKLEY_AUTHENTICATION_METHOD Jul 11 11:41:07 IPsec pluto[22157]: "xauth-psk-xauth-aggrmode"[4] 192.168.110.76 #2: policy mandates Extended Authentication (XAUTH) with PSK of initiator (we are responder). Attribute OAKLEY_AUTHENTICATION_METHOD Jul 11 11:41:07 IPsec pluto[22157]: "xauth-psk-xauth-aggrmode"[4] 192.168.110.76 #2: peer requested 2147483 seconds which exceeds our limit 86400 seconds. Attribute OAKLEY_LIFE_DURATION (variable length) Jul 11 11:41:07 IPsec pluto[22157]: "xauth-psk-xauth-aggrmode"[4] 192.168.110.76 #2: peer requested 2147483 seconds which exceeds our limit 86400 seconds. Attribute OAKLEY_LIFE_DURATION (variable length) Jul 11 11:41:07 IPsec pluto[22157]: "xauth-psk-xauth-aggrmode"[4] 192.168.110.76 #2: policy mandates Extended Authentication (XAUTH) with PSK of initiator (we are responder). Attribute OAKLEY_AUTHENTICATION_METHOD Jul 11 11:41:07 IPsec pluto[22157]: "xauth-psk-xauth-aggrmode"[4] 192.168.110.76 #2: policy mandates Extended Authentication (XAUTH) with PSK of initiator (we are responder). Attribute OAKLEY_AUTHENTICATION_METHOD Jul 11 11:41:07 IPsec pluto[22157]: "xauth-psk-xauth-aggrmode"[4] 192.168.110.76 #2: peer requested 2147483 seconds which exceeds our limit 86400 seconds. Attribute OAKLEY_LIFE_DURATION (variable length) Jul 11 11:41:07 IPsec pluto[22157]: "xauth-psk-xauth-aggrmode"[4] 192.168.110.76 #2: peer requested 2147483 seconds which exceeds our limit 86400 seconds. Attribute OAKLEY_LIFE_DURATION (variable length) Jul 11 11:41:07 IPsec pluto[22157]: "xauth-psk-xauth-aggrmode"[4] 192.168.110.76 #2: policy mandates Extended Authentication (XAUTH) with PSK of initiator (we are responder). Attribute OAKLEY_AUTHENTICATION_METHOD Jul 11 11:41:07 IPsec pluto[22157]: "xauth-psk-xauth-aggrmode"[4] 192.168.110.76 #2: policy mandates Extended Authentication (XAUTH) with PSK of initiator (we are responder). Attribute OAKLEY_AUTHENTICATION_METHOD Jul 11 11:41:07 IPsec pluto[22157]: "xauth-psk-xauth-aggrmode"[4] 192.168.110.76 #2: 1DES is not encryption Jul 11 11:41:07 IPsec pluto[22157]: "xauth-psk-xauth-aggrmode"[4] 192.168.110.76 #2: OAKLEY_DES_CBC is not supported. Attribute OAKLEY_ENCRYPTION_ALGORITHM Jul 11 11:41:07 IPsec pluto[22157]: "xauth-psk-xauth-aggrmode"[4] 192.168.110.76 #2: 1DES is not encryption Broadcast message from root@IPsec (pts/1) (Fri Jul 11 09:50:05 2014):.168.110.76 #2: OAKLEY_DES_CBC is not supported. Attribute OAKLEY_ENCRYPTION_ALGORITHM Jul 11 11:41:07 IPsec pluto[22157]: "xauth-psk-xauth-aggrmode"[4] 192.168.110.76 #2: no acceptable Oakley Transform The system is going down for reboot NOW!th-psk-xauth-aggrmode"[4] 192.168.110.76 #2: sending notification NO_PROPOSAL_CHOSEN to 192.168.110.76:59670 Jul 11 11:41:07 IPsec pluto[22157]: "xauth-psk-xauth-aggrmode"[4] 192.168.110.76: deleting connection "xauth-psk-aggrmode" instance with peer 192.168.110.76 {isakmp=#0/ipsec=#0}



I found some materials about cisco vpn client supported modes in this document (http://www.cisco.com/en/US/docs/security/vpn_client/cisco_vpn_client/vpn_client500_501/administration/5vcA.pdf) on page 205 table 11-3. Then I tried some of Preshared Keys (XAUTH) modes, but with no luck. My ipsec.conf is following:

config setup
        protostack=netkey
        # exclude networks used on server side by adding %v4:!a.b.c.0/24
virtual_private=%v4:10.0.0.0/8,%v4:192.168.0.0/16,%v4:172.16.0.0/12,%v4:25.0.0.0/8,%v4:!10.231.247.0/24,%v4:!10.231.246.0/24

conn xauth-psk-aggrmode
        aggrmode=yes
        authby=secret
        ike=3des-md5;modp1024
        phase2=esp
        phase2alg=3des-sha1
        pfs=no
        auto=add
        rekey=no
        left=<my real server IP>
        [email protected]
        leftsubnet=0.0.0.0/0
        rightaddresspool=10.231.247.1-10.231.247.254
        right=%any
        modecfgdns1=<my real DNS server>
        leftxauthserver=yes
        rightxauthclient=yes
        leftmodecfgserver=yes
        rightmodecfgclient=yes
        modecfgpull=yes
        xauthby=alwaysok
        ike_frag=yes
        xauthfail=soft


Libreswan vesion:
Linux Libreswan 3.8 (netkey) on 3.2.0-4-amd64

Cisco vpn client version:
Cisco Systems VPN Client Version 5.0.07.0440


Everything works like a charm with shrew soft vpn client, but I want to get it work with cisco vpn client. I would be wery glad for every idea.
Thank you.


_______________________________________________
Swan mailing list
[email protected]
https://lists.libreswan.org/mailman/listinfo/swan

Reply via email to