Hello Claude,
the relevant error messag ies
: "cisco-vpn"[2] 192.168.3.53:53276 #1:
cannot respond to IPsec SA request because no connection is known
for 0.0.0.0/0===192.168.1.13
[C=LU, ST=Luxembourg, L=Luxembourg, O=Fondation RESTENA,
OU=IT, CN=vpn6-pub.restena.lu, [email protected]]
...192.168.3.53:53276
[C=LU, ST=Luxembourg, L=Luxembourg, O=Fondation RESTENA, OU=IT,
CN=Group_xyz, [email protected]]===192.168.120.129/32
The client by default wants to tunnel all Internet traffic (no
split tunneling), therefore the gateway must define
leftsubnet=0.0.0.0/0
Regards
Andreas
On 21.05.2010 10:14, Claude Tompers wrote:
> Hello,
>
> After my recently solved problem with the Cisco VPN client, I hit another
> one. Everything seems to work fine, but the connection won't establish.
> In logs pasted below the text, you can see that the certificate
> authentication as well as the xauth user authentication work fine. For some
> reason however, the SA seems to be deleted, and I can't explain why.
> If anyone has an idea, I'd be grateful.
>
> kind regards
> Claude
>
> /etc/ipsec.conf:
>
> ca vpnca
> cacert=VPNCA-cacert.pem
> crluri=VPNCA-crl.pem
> auto=add
>
> config setup
> plutostart=yes
> #plutodebug=control
> charonstart=no
> charondebug="net 0"
> nat_traversal=yes
> crlcheckinterval=10m
> strictcrlpolicy=yes
>
> # Add connections here.
>
> conn %default
> ike=aes256-sha1-modp1536!
> esp=aes256-sha1!
> dpdaction=clear
> dpddelay=300s
> rekeymargin=3m
> keyingtries=1
> left=%defaultroute
> leftcert=vpncert.pem
> leftid="C=LU, ST=Luxembourg, L=Luxembourg, O=Fondation RESTENA,
> OU=IT, CN=vpn6-pub.restena.lu, [email protected]"
> right=%any
> rightsourceip=192.168.120.128/25
> auto=add
>
> conn cisco-vpn
> ikelifetime=60m
> keylife=20m
> rekeymargin=3m
> keyingtries=1
> type=tunnel
> pfs=no
> authby=xauthrsasig
> xauth=server
>
>
> /etc/ipsec.secrets
>
> : RSA vpncert-key.pem
>
> : XAUTH ctompers "verysecretpassword"
>
>
> /var/log/ipsec:
>
> May 21 09:52:40 vpn6-test pluto[31904]: adding interface lo/lo ::1:500
> May 21 09:52:40 vpn6-test pluto[31904]: loading secrets from
> "/usr/local/etc/ipsec.secrets"
> May 21 09:52:40 vpn6-test pluto[31904]: loaded private key from
> 'vpncert-key.pem'
> May 21 09:52:40 vpn6-test pluto[31904]: loaded xauth credentials of user
> 'ctompers'
> May 21 09:52:40 vpn6-test pluto[31904]: loaded CA certificate from
> '/usr/local/etc/ipsec.d/cacerts/VPNCA-cacert.pem'
> May 21 09:52:40 vpn6-test pluto[31904]: added ca description "vpnca"
> May 21 09:52:40 vpn6-test pluto[31904]: loaded host certificate from
> '/usr/local/etc/ipsec.d/certs/vpncert.pem'
> May 21 09:52:40 vpn6-test pluto[31904]: added connection description
> "cisco-vpn"
> May 21 09:52:40 vpn6-test pluto[31904]: loaded host certificate from
> '/usr/local/etc/ipsec.d/certs/vpncert.pem'
> May 21 09:52:40 vpn6-test pluto[31904]: added connection description "ikev2"
> May 21 09:52:49 vpn6-test pluto[31904]: packet from 192.168.3.53:53276: size
> (1160) differs from size specified in ISAKMP HDR (1144)
> May 21 09:52:49 vpn6-test pluto[31904]: packet from 192.168.3.53:53276: Cisco
> VPN client appends 16 surplus NULL bytes
> May 21 09:52:49 vpn6-test pluto[31904]: packet from 192.168.3.53:53276:
> received Vendor ID payload [XAUTH]
> May 21 09:52:49 vpn6-test pluto[31904]: packet from 192.168.3.53:53276:
> received Vendor ID payload [Dead Peer Detection]
> May 21 09:52:49 vpn6-test pluto[31904]: packet from 192.168.3.53:53276:
> ignoring Vendor ID payload [FRAGMENTATION 80000000]
> May 21 09:52:49 vpn6-test pluto[31904]: packet from 192.168.3.53:53276:
> received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n]
> May 21 09:52:49 vpn6-test pluto[31904]: packet from 192.168.3.53:53276:
> ignoring Vendor ID payload [Cisco-Unity]
> May 21 09:52:49 vpn6-test pluto[31904]: "cisco-vpn"[1] 192.168.3.53:53276 #1:
> responding to Main Mode from unknown peer 192.168.3.53:53276
> May 21 09:52:49 vpn6-test pluto[31904]: "cisco-vpn"[1] 192.168.3.53:53276 #1:
> peer requested 2147483 seconds which exceeds our limit 86400 seconds
> May 21 09:52:49 vpn6-test pluto[31904]: "cisco-vpn"[1] 192.168.3.53:53276 #1:
> lifetime reduced to 86400 seconds (todo: IPSEC_RESPONDER_LIFETIME
> notification)
> May 21 09:52:49 vpn6-test pluto[31904]: packet from 192.168.3.53:53276: size
> (352) differs from size specified in ISAKMP HDR (336)
> May 21 09:52:49 vpn6-test pluto[31904]: packet from 192.168.3.53:53276: Cisco
> VPN client appends 16 surplus NULL bytes
> May 21 09:52:49 vpn6-test pluto[31904]: "cisco-vpn"[1] 192.168.3.53:53276 #1:
> ignoring Vendor ID payload [276f4f549eef9da547a168470992f47f]
> May 21 09:52:49 vpn6-test pluto[31904]: "cisco-vpn"[1] 192.168.3.53:53276 #1:
> ignoring Vendor ID payload [Cisco-Unity]
> May 21 09:52:49 vpn6-test pluto[31904]: "cisco-vpn"[1] 192.168.3.53:53276 #1:
> NAT-Traversal: Result using draft-ietf-ipsec-nat-t-ike-02/03: no NAT detected
> May 21 09:52:49 vpn6-test pluto[31904]: "cisco-vpn"[1] 192.168.3.53:53276 #1:
> ignoring informational payload, type IPSEC_INITIAL_CONTACT
> May 21 09:52:49 vpn6-test pluto[31904]: "cisco-vpn"[1] 192.168.3.53:53276 #1:
> Peer ID is ID_DER_ASN1_DN: 'C=LU, ST=Luxembourg, L=Luxembourg, O=Fondation
> RESTENA, OU=IT, CN=Group_xyz, [email protected]'
> May 21 09:52:49 vpn6-test pluto[31904]: "cisco-vpn"[2] 192.168.3.53:53276 #1:
> deleting connection "cisco-vpn" instance with peer 192.168.3.53
> {isakmp=#0/ipsec=#0}
> May 21 09:52:49 vpn6-test pluto[31904]: "cisco-vpn"[2] 192.168.3.53:53276 #1:
> we have a cert and are sending it upon request
> May 21 09:52:49 vpn6-test pluto[31904]: "cisco-vpn"[2] 192.168.3.53:53276 #1:
> sent MR3, ISAKMP SA established
> May 21 09:52:49 vpn6-test pluto[31904]: "cisco-vpn"[2] 192.168.3.53:53276 #1:
> sending XAUTH request
> May 21 09:53:09 vpn6-test pluto[31904]: "cisco-vpn"[2] 192.168.3.53:53276 #1:
> parsing XAUTH reply
> May 21 09:53:09 vpn6-test pluto[31904]: "cisco-vpn"[2] 192.168.3.53:53276 #1:
> extended authentication was successful
> May 21 09:53:09 vpn6-test pluto[31904]: "cisco-vpn"[2] 192.168.3.53:53276 #1:
> sending XAUTH status:
> May 21 09:53:09 vpn6-test pluto[31904]: "cisco-vpn"[2] 192.168.3.53:53276 #1:
> parsing XAUTH ack
> May 21 09:53:09 vpn6-test pluto[31904]: "cisco-vpn"[2] 192.168.3.53:53276 #1:
> received XAUTH ack, established
> May 21 09:53:09 vpn6-test pluto[31904]: "cisco-vpn"[2] 192.168.3.53:53276 #1:
> unsupported ModeCfg attribute 28683?? received.
> May 21 09:53:09 vpn6-test pluto[31904]: "cisco-vpn"[2] 192.168.3.53:53276 #1:
> unsupported ModeCfg attribute 28684?? received.
> May 21 09:53:09 vpn6-test pluto[31904]: "cisco-vpn"[2] 192.168.3.53:53276 #1:
> peer requested virtual IP %any
> May 21 09:53:09 vpn6-test pluto[31904]: assigning new lease to 'C=LU,
> ST=Luxembourg, L=Luxembourg, O=Fondation RESTENA, OU=IT, CN=Group_xyz,
> [email protected]'
> May 21 09:53:09 vpn6-test pluto[31904]: "cisco-vpn"[2] 192.168.3.53:53276 #1:
> assigning virtual IP 192.168.120.129 to peer
> May 21 09:53:09 vpn6-test pluto[31904]: "cisco-vpn"[2] 192.168.3.53:53276 #1:
> sending ModeCfg reply
> May 21 09:53:09 vpn6-test pluto[31904]: "cisco-vpn"[2] 192.168.3.53:53276 #1:
> sent ModeCfg reply, established
> May 21 09:53:09 vpn6-test pluto[31904]: "cisco-vpn"[2] 192.168.3.53:53276 #1:
> cannot respond to IPsec SA request because no connection is known for
> 0.0.0.0/0===192.168.1.13[C=LU, ST=Luxembourg, L=Luxembourg, O=Fondation
> RESTENA, OU=IT, CN=vpn6-pub.restena.lu,
> [email protected]]...192.168.3.53:53276[C=LU, ST=Luxembourg,
> L=Luxembourg, O=Fondation RESTENA, OU=IT, CN=Group_xyz,
> [email protected]]===192.168.120.129/32
> May 21 09:53:09 vpn6-test pluto[31904]: "cisco-vpn"[2] 192.168.3.53:53276 #1:
> sending encrypted notification INVALID_ID_INFORMATION to 192.168.3.53:53276
> May 21 09:53:14 vpn6-test pluto[31904]: "cisco-vpn"[2] 192.168.3.53:53276 #1:
> Quick Mode I1 message is unacceptable because it uses a previously used
> Message ID 0x5913d71e (perhaps this is a duplicated packet)
> May 21 09:53:14 vpn6-test pluto[31904]: "cisco-vpn"[2] 192.168.3.53:53276 #1:
> sending encrypted notification INVALID_MESSAGE_ID to 192.168.3.53:53276
> May 21 09:53:19 vpn6-test pluto[31904]: "cisco-vpn"[2] 192.168.3.53:53276 #1:
> Quick Mode I1 message is unacceptable because it uses a previously used
> Message ID 0x5913d71e (perhaps this is a duplicated packet)
> May 21 09:53:19 vpn6-test pluto[31904]: "cisco-vpn"[2] 192.168.3.53:53276 #1:
> sending encrypted notification INVALID_MESSAGE_ID to 192.168.3.53:53276
> May 21 09:53:24 vpn6-test pluto[31904]: "cisco-vpn"[2] 192.168.3.53:53276 #1:
> Quick Mode I1 message is unacceptable because it uses a previously used
> Message ID 0x5913d71e (perhaps this is a duplicated packet)
> May 21 09:53:24 vpn6-test pluto[31904]: "cisco-vpn"[2] 192.168.3.53:53276 #1:
> sending encrypted notification INVALID_MESSAGE_ID to 192.168.3.53:53276
> May 21 09:53:29 vpn6-test pluto[31904]: "cisco-vpn"[2] 192.168.3.53:53276 #1:
> ignoring Delete SA payload: PROTO_IPSEC_ESP SA(0x818764bf) not found (maybe
> expired)
> May 21 09:53:59 vpn6-test pluto[31904]: "cisco-vpn"[2] 192.168.3.53:53276 #1:
> received Delete SA payload: deleting ISAKMP State #1
> May 21 09:53:59 vpn6-test pluto[31904]: "cisco-vpn"[2] 192.168.3.53:53276:
> deleting connection "cisco-vpn" instance with peer 192.168.3.53
> {isakmp=#0/ipsec=#0}
> May 21 09:53:59 vpn6-test pluto[31904]: lease 192.168.120.129 by 'C=LU,
> ST=Luxembourg, L=Luxembourg, O=Fondation RESTENA, OU=IT, CN=Group_xyz,
> [email protected]' went offline
>
>
>
>
> _______________________________________________
> Users mailing list
> [email protected]
> https://lists.strongswan.org/mailman/listinfo/users
--
======================================================================
Andreas Steffen [email protected]
strongSwan - the Linux VPN Solution! www.strongswan.org
Institute for Internet Technologies and Applications
University of Applied Sciences Rapperswil
CH-8640 Rapperswil (Switzerland)
===========================================================[ITA-HSR]==
_______________________________________________
Users mailing list
[email protected]
https://lists.strongswan.org/mailman/listinfo/users