Sorry i forgot to attach the log when the plutodebug option is disable.
Regards,
António
On 05/08/2015 03:39 PM, Antonio Silva wrote:
Hi,
Not sure if this apply to me, i saw this same error in my log, "cannot
install eroute -- it is in use for "tunnel2-nat", when behind NAT i
tried to connect simultaneous users with windows and l2tp/ipsec
I've installed libreswan 3.12.
Is this setup possible?
For openswan i found this
https://lists.openswan.org/pipermail/users/2014-July/023037.html , but
not sure if this apply to libreswan as well....
****
My lab scenario to simulate a nat connection is very simple, two
virtual machines using wm on a debian box and them connect to the
remote ipsec server:
WM host win8.1 [192.168.8.131]
----
----
[192.168.8.1] HOST [192.168.10.25] ------- [192.168.10.254] SERVER
--- -
WM host win8.1 [192.168.8.129]
Attach my configuration and the respective log files when try to connect.
peer_one_connected.log.txt => peer one connected
peer_two_fail_simultaneous_con.log.txt => peer two fail to connect
Thanks for the help.
regards,
António
On 12/16/2014 02:11 AM, Paul Wouters wrote:
On Fri, 12 Dec 2014, Elison Niven wrote:
Subject: [Swan] Error ”cannot install eroute” when rekey/reconnect
from the
same IP (for L2TP)
Is this fixed now ?
https://lists.openswan.org/pipermail/users/2010-April/018685.html
I changed this test case:
https://github.com/libreswan/libreswan/tree/master/testing/pluto/l2tp-02-netkey
to simulate your scenario using:
ipsec auto --up north-east-l2tp
echo "c server" > /var/run/xl2tpd/l2tp-control
sleep 5
ipsec look
: ==== cut ====
cat /tmp/xl2tpd.log
: ==== tuc ====
ping -c 4 -n 192.0.2.254
# testing passthrough plaintext
echo quit | nc 192.0.2.254 22
ip addr show dev ppp0
sleep 5
echo "d server" > /var/run/xl2tpd/l2tp-control
ipsec auto --down north-east-l2tp
sleep 5
ipsec auto --up north-east-l2tp
echo "c server" > /var/run/xl2tpd/l2tp-control
sleep 5
ipsec look
echo done
This worked fine. Both the first IPsec and PPP and the second IPsec and
PPP came up successfully. Since it uses RSA, I then modified it to use
PSK. But it still worked.
Is there a chance you can try and test this with libreswan-3.12 ?
Paul
I'm not sure if that fully reproduced your
connection from behind NAT? This connection used RSA, not PSK.
_______________________________________________
Swan mailing list
[email protected]
https://lists.libreswan.org/mailman/listinfo/swan
--
---
António Silva
May 8 15:43:30 bitch ipsec__plutorun: Starting Pluto subsystem...
May 8 15:43:30 bitch pluto[28840]: nss directory plutomain: /etc/ipsec.d
May 8 15:43:30 bitch pluto[28840]: NSS Initialized
May 8 15:43:30 bitch pluto[28840]: libcap-ng support [disabled]
May 8 15:43:30 bitch pluto[28840]: FIPS HMAC integrity support [disabled]
May 8 15:43:30 bitch pluto[28840]: Linux audit support [disabled]
May 8 15:43:30 bitch pluto[28840]: Starting Pluto (Libreswan Version 3.12
XFRM(netkey) KLIPS NSS DNSSEC XAUTH_PAM NETWORKMANAGER KLIPS_MAST CURL(non-NSS)
LDAP(non-NSS)) pid:28840
May 8 15:43:30 bitch pluto[28840]: core dump dir: /var/run/pluto
May 8 15:43:30 bitch pluto[28840]: secrets file: /etc/ipsec.secrets
May 8 15:43:30 bitch pluto[28840]: leak-detective disabled
May 8 15:43:30 bitch pluto[28840]: SAref support [disabled]: Protocol not
available
May 8 15:43:30 bitch pluto[28840]: SAbind support [disabled]: Protocol not
available
May 8 15:43:30 bitch pluto[28840]: NSS crypto [enabled]
May 8 15:43:30 bitch pluto[28840]: XAUTH PAM support [enabled]
May 8 15:43:30 bitch pluto[28840]: NAT-Traversal support [enabled]
May 8 15:43:30 bitch pluto[28840]: ike_alg_register_enc(): Activating
OAKLEY_TWOFISH_CBC_SSH: Ok
May 8 15:43:30 bitch pluto[28840]: ike_alg_register_enc(): Activating
OAKLEY_TWOFISH_CBC: Ok
May 8 15:43:30 bitch pluto[28840]: ike_alg_register_enc(): Activating
OAKLEY_SERPENT_CBC: Ok
May 8 15:43:30 bitch pluto[28840]: ike_alg_register_enc(): Activating
OAKLEY_AES_CBC: Ok
May 8 15:43:30 bitch pluto[28840]: ike_alg_register_enc(): Activating
DISABLED-OAKLEY_AES_CTR: Ok
May 8 15:43:30 bitch pluto[28840]: ike_alg_register_hash(): Activating
DISABLED-OAKLEY_AES_XCBC: Ok
May 8 15:43:30 bitch pluto[28840]: ike_alg_register_enc(): Activating
DISABLED-OAKLEY_CAMELLIA_CBC: Ok
May 8 15:43:30 bitch pluto[28840]: ike_alg_register_enc(): Activating
OAKLEY_CAMELLIA_CTR: Ok
May 8 15:43:30 bitch pluto[28840]: ike_alg_register_hash(): Activating
OAKLEY_SHA2_512: Ok
May 8 15:43:30 bitch pluto[28840]: ike_alg_register_hash(): Activating
OAKLEY_SHA2_384: Ok
May 8 15:43:30 bitch pluto[28840]: ike_alg_register_hash(): Activating
OAKLEY_SHA2_256: Ok
May 8 15:43:30 bitch pluto[28840]: starting up 3 crypto helpers
May 8 15:43:30 bitch pluto[28840]: started thread for crypto helper 0 (master
fd 6)
May 8 15:43:30 bitch pluto[28840]: started thread for crypto helper 1 (master
fd 8)
May 8 15:43:30 bitch pluto[28840]: started thread for crypto helper 2 (master
fd 10)
May 8 15:43:30 bitch pluto[28840]: Using Linux XFRM/NETKEY IPsec interface
code on 3.10.58
May 8 15:43:30 bitch pluto[28840]: ike_alg_register_enc(): Activating
aes_ccm_8: Ok
May 8 15:43:30 bitch pluto[28840]: ike_alg_register_enc(): Activating
aes_ccm_12: Ok
May 8 15:43:30 bitch pluto[28840]: ike_alg_register_enc(): Activating
aes_ccm_16: Ok
May 8 15:43:30 bitch pluto[28840]: ike_alg_register_enc(): Activating
aes_gcm_8: Ok
May 8 15:43:30 bitch pluto[28840]: ike_alg_register_enc(): Activating
aes_gcm_12: Ok
May 8 15:43:30 bitch pluto[28840]: ike_alg_register_enc(): Activating
aes_gcm_16: Ok
May 8 15:43:31 bitch pluto[28840]: added connection description "tunnel1-nat"
May 8 15:43:31 bitch pluto[28840]: added connection description "tunnel1"
May 8 15:43:31 bitch pluto[28840]: listening for IKE messages
May 8 15:43:31 bitch pluto[28840]: adding interface eth2/eth2 192.168.3.254:500
May 8 15:43:31 bitch pluto[28840]: adding interface eth2/eth2
192.168.3.254:4500
May 8 15:43:31 bitch pluto[28840]: adding interface eth1/eth1
192.168.11.254:500
May 8 15:43:31 bitch pluto[28840]: adding interface eth1/eth1
192.168.11.254:4500
May 8 15:43:31 bitch pluto[28840]: adding interface eth1/eth1
192.168.10.254:500
May 8 15:43:31 bitch pluto[28840]: adding interface eth1/eth1
192.168.10.254:4500
May 8 15:43:31 bitch pluto[28840]: adding interface eth0/eth0 10.10.0.1:500
May 8 15:43:31 bitch pluto[28840]: adding interface eth0/eth0 10.10.0.1:4500
May 8 15:43:31 bitch pluto[28840]: adding interface lo/lo 127.0.0.1:500
May 8 15:43:31 bitch pluto[28840]: adding interface lo/lo 127.0.0.1:4500
May 8 15:43:31 bitch pluto[28840]: loading secrets from "/etc/ipsec.secrets"
May 8 15:43:39 bitch pluto[28840]: packet from 192.168.10.25:500: ignoring
unknown Vendor ID payload [01528bbbc00696121849ab9a1c5b2a5100000001]
May 8 15:43:39 bitch pluto[28840]: packet from 192.168.10.25:500: ignoring
Vendor ID payload [MS NT5 ISAKMPOAKLEY 00000009]
May 8 15:43:39 bitch pluto[28840]: packet from 192.168.10.25:500: received
Vendor ID payload [RFC 3947]
May 8 15:43:39 bitch pluto[28840]: packet from 192.168.10.25:500: ignoring
Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n]
May 8 15:43:39 bitch pluto[28840]: packet from 192.168.10.25:500: received
Vendor ID payload [FRAGMENTATION]
May 8 15:43:39 bitch pluto[28840]: packet from 192.168.10.25:500: ignoring
Vendor ID payload [MS-Negotiation Discovery Capable]
May 8 15:43:39 bitch pluto[28840]: packet from 192.168.10.25:500: ignoring
Vendor ID payload [Vid-Initial-Contact]
May 8 15:43:39 bitch pluto[28840]: packet from 192.168.10.25:500: ignoring
Vendor ID payload [IKE CGA version 1]
May 8 15:43:39 bitch pluto[28840]: "tunnel1-nat"[1] 192.168.10.25 #1: enabling
possible NAT-traversal with method RFC 3947 (NAT-Traversal)
May 8 15:43:39 bitch pluto[28840]: "tunnel1-nat"[1] 192.168.10.25 #1:
responding to Main Mode from unknown peer 192.168.10.25
May 8 15:43:39 bitch pluto[28840]: "tunnel1-nat"[1] 192.168.10.25 #1:
OAKLEY_GROUP 20 not supported. Attribute OAKLEY_GROUP_DESCRIPTION
May 8 15:43:39 bitch pluto[28840]: "tunnel1-nat"[1] 192.168.10.25 #1:
OAKLEY_GROUP 19 not supported. Attribute OAKLEY_GROUP_DESCRIPTION
May 8 15:43:39 bitch pluto[28840]: "tunnel1-nat"[1] 192.168.10.25 #1:
transition from state STATE_MAIN_R0 to state STATE_MAIN_R1
May 8 15:43:39 bitch pluto[28840]: "tunnel1-nat"[1] 192.168.10.25 #1:
STATE_MAIN_R1: sent MR1, expecting MI2
May 8 15:43:39 bitch pluto[28840]: "tunnel1-nat"[1] 192.168.10.25 #1:
NAT-Traversal: Result using RFC 3947 (NAT-Traversal) sender port 500: peer
behind NAT
May 8 15:43:39 bitch pluto[28840]: "tunnel1-nat"[1] 192.168.10.25 #1:
transition from state STATE_MAIN_R1 to state STATE_MAIN_R2
May 8 15:43:39 bitch pluto[28840]: "tunnel1-nat"[1] 192.168.10.25 #1:
STATE_MAIN_R2: sent MR2, expecting MI3
May 8 15:43:39 bitch pluto[28840]: "tunnel1-nat"[1] 192.168.10.25 #1: Main
mode peer ID is ID_IPV4_ADDR: '192.168.8.131'
May 8 15:43:39 bitch pluto[28840]: "tunnel1-nat"[1] 192.168.10.25 #1: switched
from "tunnel1-nat" to "tunnel1-nat"
May 8 15:43:39 bitch pluto[28840]: "tunnel1-nat"[2] 192.168.10.25 #1: deleting
connection "tunnel1-nat" instance with peer 192.168.10.25 {isakmp=#0/ipsec=#0}
May 8 15:43:39 bitch pluto[28840]: "tunnel1-nat"[2] 192.168.10.25 #1:
transition from state STATE_MAIN_R2 to state STATE_MAIN_R3
May 8 15:43:39 bitch pluto[28840]: "tunnel1-nat"[2] 192.168.10.25 #1: new NAT
mapping for #1, was 192.168.10.25:500, now 192.168.10.25:4500
May 8 15:43:39 bitch pluto[28840]: "tunnel1-nat"[2] 192.168.10.25 #1:
STATE_MAIN_R3: sent MR3, ISAKMP SA established {auth=PRESHARED_KEY
cipher=aes_256 integ=sha group=MODP2048}
May 8 15:43:39 bitch pluto[28840]: "tunnel1-nat"[2] 192.168.10.25 #1: Dead
Peer Detection (RFC 3706): not enabled because peer did not advertise it
May 8 15:43:39 bitch pluto[28840]: "tunnel1-nat"[2] 192.168.10.25 #1: the peer
proposed: 192.168.10.254/32:17/0 -> 192.168.8.131/32:17/0
May 8 15:43:39 bitch pluto[28840]: "tunnel1-nat"[2] 192.168.10.25 #1:
NAT-Traversal: received 2 NAT-OA. Using first, ignoring others
May 8 15:43:39 bitch pluto[28840]: "tunnel1-nat"[2] 192.168.10.25 #2:
responding to Quick Mode proposal {msgid:01000000}
May 8 15:43:39 bitch pluto[28840]: "tunnel1-nat"[2] 192.168.10.25 #2: us:
vhost:?===192.168.10.254<192.168.10.254>:17/%any
May 8 15:43:39 bitch pluto[28840]: "tunnel1-nat"[2] 192.168.10.25 #2: them:
192.168.10.25[192.168.8.131]:17/1701
May 8 15:43:39 bitch pluto[28840]: "tunnel1-nat"[2] 192.168.10.25 #2:
transition from state STATE_QUICK_R0 to state STATE_QUICK_R1
May 8 15:43:39 bitch pluto[28840]: "tunnel1-nat"[2] 192.168.10.25 #2:
STATE_QUICK_R1: sent QR1, inbound IPsec SA installed, expecting QI2
May 8 15:43:41 bitch pluto[28840]: "tunnel1-nat"[2] 192.168.10.25 #2: Dead
Peer Detection (RFC 3706): not enabled because peer did not advertise it
May 8 15:43:41 bitch pluto[28840]: "tunnel1-nat"[2] 192.168.10.25 #2:
transition from state STATE_QUICK_R1 to state STATE_QUICK_R2
May 8 15:43:41 bitch pluto[28840]: "tunnel1-nat"[2] 192.168.10.25 #2:
STATE_QUICK_R2: IPsec SA established transport mode {ESP/NAT=>0x403b2214
<0x13dd2ad6 xfrm=AES_256-HMAC_SHA1 NATOA=192.168.8.131 NATD=192.168.10.25:4500
DPD=active}
May 8 15:43:55 bitch pluto[28840]: packet from 192.168.10.25:1: ignoring
unknown Vendor ID payload [01528bbbc00696121849ab9a1c5b2a5100000001]
May 8 15:43:55 bitch pluto[28840]: packet from 192.168.10.25:1: ignoring
Vendor ID payload [MS NT5 ISAKMPOAKLEY 00000009]
May 8 15:43:55 bitch pluto[28840]: packet from 192.168.10.25:1: received
Vendor ID payload [RFC 3947]
May 8 15:43:55 bitch pluto[28840]: packet from 192.168.10.25:1: ignoring
Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n]
May 8 15:43:55 bitch pluto[28840]: packet from 192.168.10.25:1: received
Vendor ID payload [FRAGMENTATION]
May 8 15:43:55 bitch pluto[28840]: packet from 192.168.10.25:1: ignoring
Vendor ID payload [MS-Negotiation Discovery Capable]
May 8 15:43:55 bitch pluto[28840]: packet from 192.168.10.25:1: ignoring
Vendor ID payload [Vid-Initial-Contact]
May 8 15:43:55 bitch pluto[28840]: packet from 192.168.10.25:1: ignoring
Vendor ID payload [IKE CGA version 1]
May 8 15:43:55 bitch pluto[28840]: "tunnel1-nat"[2] 192.168.10.25 #3: enabling
possible NAT-traversal with method RFC 3947 (NAT-Traversal)
May 8 15:43:55 bitch pluto[28840]: "tunnel1-nat"[2] 192.168.10.25 #3:
responding to Main Mode from unknown peer 192.168.10.25
May 8 15:43:55 bitch pluto[28840]: "tunnel1-nat"[2] 192.168.10.25 #3:
OAKLEY_GROUP 20 not supported. Attribute OAKLEY_GROUP_DESCRIPTION
May 8 15:43:55 bitch pluto[28840]: "tunnel1-nat"[2] 192.168.10.25 #3:
OAKLEY_GROUP 19 not supported. Attribute OAKLEY_GROUP_DESCRIPTION
May 8 15:43:55 bitch pluto[28840]: "tunnel1-nat"[2] 192.168.10.25 #3:
transition from state STATE_MAIN_R0 to state STATE_MAIN_R1
May 8 15:43:55 bitch pluto[28840]: "tunnel1-nat"[2] 192.168.10.25 #3:
STATE_MAIN_R1: sent MR1, expecting MI2
May 8 15:43:55 bitch pluto[28840]: "tunnel1-nat"[2] 192.168.10.25 #3:
NAT-Traversal: Result using RFC 3947 (NAT-Traversal) sender port 1: peer behind
NAT
May 8 15:43:55 bitch pluto[28840]: "tunnel1-nat"[2] 192.168.10.25 #3:
transition from state STATE_MAIN_R1 to state STATE_MAIN_R2
May 8 15:43:55 bitch pluto[28840]: "tunnel1-nat"[2] 192.168.10.25 #3:
STATE_MAIN_R2: sent MR2, expecting MI3
May 8 15:43:55 bitch pluto[28840]: "tunnel1-nat"[2] 192.168.10.25 #3: Main
mode peer ID is ID_IPV4_ADDR: '192.168.8.129'
May 8 15:43:55 bitch pluto[28840]: "tunnel1-nat"[2] 192.168.10.25 #3: switched
from "tunnel1-nat" to "tunnel1-nat"
May 8 15:43:55 bitch pluto[28840]: "tunnel1-nat"[3] 192.168.10.25 #3:
transition from state STATE_MAIN_R2 to state STATE_MAIN_R3
May 8 15:43:55 bitch pluto[28840]: "tunnel1-nat"[3] 192.168.10.25 #3: new NAT
mapping for #3, was 192.168.10.25:1, now 192.168.10.25:1024
May 8 15:43:55 bitch pluto[28840]: "tunnel1-nat"[3] 192.168.10.25 #3:
STATE_MAIN_R3: sent MR3, ISAKMP SA established {auth=PRESHARED_KEY
cipher=aes_256 integ=sha group=MODP2048}
May 8 15:43:55 bitch pluto[28840]: "tunnel1-nat"[3] 192.168.10.25 #3: Dead
Peer Detection (RFC 3706): not enabled because peer did not advertise it
May 8 15:43:55 bitch pluto[28840]: "tunnel1-nat"[3] 192.168.10.25 #3: the peer
proposed: 192.168.10.254/32:17/0 -> 192.168.8.129/32:17/0
May 8 15:43:55 bitch pluto[28840]: "tunnel1-nat"[3] 192.168.10.25 #3:
NAT-Traversal: received 2 NAT-OA. Using first, ignoring others
May 8 15:43:55 bitch pluto[28840]: "tunnel1-nat"[3] 192.168.10.25 #4:
responding to Quick Mode proposal {msgid:01000000}
May 8 15:43:55 bitch pluto[28840]: "tunnel1-nat"[3] 192.168.10.25 #4: us:
vhost:?===192.168.10.254<192.168.10.254>:17/%any
May 8 15:43:55 bitch pluto[28840]: "tunnel1-nat"[3] 192.168.10.25 #4: them:
192.168.10.25[192.168.8.129]:17/1701
May 8 15:43:55 bitch pluto[28840]: "tunnel1-nat"[3] 192.168.10.25 #4: cannot
install eroute -- it is in use for "tunnel1-nat"[2] 192.168.10.25 #2
May 8 15:43:56 bitch pluto[28840]: "tunnel1-nat"[3] 192.168.10.25 #4: next
payload type of ISAKMP Hash Payload has an unknown value: 94
May 8 15:43:56 bitch pluto[28840]: "tunnel1-nat"[3] 192.168.10.25 #4:
malformed payload in packet
_______________________________________________
Swan mailing list
[email protected]
https://lists.libreswan.org/mailman/listinfo/swan