I've been trying to figure this one out for several hours, have googled a bunch
of stuff, but gotten nowhere quick :(
I'm trying to setup a tunnel between a machine I control and a remote system
controlled by someone else. Previously to today we had this tunnel setup and
running on our local Watchguard router, and it all seemed to be working
correctly. However moving forward I need to get this configuration working
elsewhere, so enter strongswan.
as far as I can tell everything is setup correctly, however when initiating the
connection, phase 1 seems to complete successfully, but as soon as QUICK_MODE
starts, I get no response back from the remote host
it doesn't help matters, that this is the first time I'm really trying to do
anything like this, and the information I've got from the remote host provider
is somewhat... vague, so I've had to make educated guesses to even get to this
point
Below are logs and configuration, and hopefully, someone will be able to shed
some light on this. As mentioned I've tried a whole bunch of different things,
so the config is a bit of a mess.
----------------My Config---------------
conn VPN
authby=psk #this specifies how the connection is authenticated
auto=add
#rightauth=psk
#aggressive=yes
type=tunnel #the type of connection
left=66.60.177.3 #This is the public ip address of server A
#leftsourceip=%config
#modeconfig=pull
leftsubnet=10.10.10.0/24 #This is the subnet/private ip of server A
right=173.14.59.177 #This is the public ip address of server B/remote
server
rightsubnet=10.1.25.0/24 #This is the subnet/private ip of server B
#rightsourceip=172.20.22.0
#rightsubnet=172.20.22.0/24
ike=aes128-sha1-modp1024! #Internet key exchange, type of encryption
#ah=aes128-sha1-modp1024 #Internet key exchange, type of encryption
#esp=aes128-sha1 #Internet key exchange, type of encryption
esp=aes128-sha256-modp1024 #Internet key exchange, type of encryption
#esp=aes128-sha1-modp1024 #Internet key exchange, type of encryption
keyexchange=ikev1 #Internet key exchange version
#pfs=yes
#pfsgroup=modp1024
#rightprotoport = udp/1801
#rightikeport=1801
---------------------configuration information provided by the remote
host---------------------
Public IP: 173.14.59.177
Local network: 10.1.25.0/24
Remote network: 172.20.22.0/24
Phase 1
key: preshare
DH Group: 2
encryption: AES 128
hash: SHA1
Phase 2
DH Group: 2 (pfs)
protocal: ESP
encryption: AES 128
hash: SHA1
Ports
TCP: 1801
UDP: 1801, 3527
--------------------- log-------------------------
initiating Main Mode IKE_SA VPN[1] to 173.14.59.177
generating ID_PROT request 0 [ SA V V V V ]
sending packet: from 66.60.177.3[500] to 173.14.59.177[500] (156 bytes)
received packet: from 173.14.59.177[500] to 66.60.177.3[500] (160 bytes)
parsed ID_PROT response 0 [ SA V V V ]
received unknown vendor ID:
94:36:e8:d6:71:74:ef:9a:ed:06:8d:5a:d5:21:3f:18:7a:3f:8b:a6:00:00:00:16:00:00:06:1e
received DPD vendor ID
received unknown vendor ID:
48:65:61:72:74:42:65:61:74:5f:4e:6f:74:69:66:79:38:6b:01:00
generating ID_PROT request 0 [ KE No ]
sending packet: from 66.60.177.3[500] to 173.14.59.177[500] (196 bytes)
received packet: from 173.14.59.177[500] to 66.60.177.3[500] (196 bytes)
parsed ID_PROT response 0 [ KE No ]
generating ID_PROT request 0 [ ID HASH ]
sending packet: from 66.60.177.3[500] to 173.14.59.177[500] (76 bytes)
received packet: from 173.14.59.177[500] to 66.60.177.3[500] (76 bytes)
parsed ID_PROT response 0 [ ID HASH ]
IKE_SA VPN[1] established between
66.60.177.3[66.60.177.3]...173.14.59.177[173.14.59.177]
scheduling reauthentication in 9941s
maximum IKE_SA lifetime 10481s
generating QUICK_MODE request 601747937 [ HASH SA No KE ID ID ]
sending packet: from 66.60.177.3[500] to 173.14.59.177[500] (316 bytes)
sending retransmit 1 of request message ID 601747937, seq 4
sending packet: from 66.60.177.3[500] to 173.14.59.177[500] (316 bytes)
sending retransmit 2 of request message ID 601747937, seq 4
sending packet: from 66.60.177.3[500] to 173.14.59.177[500] (316 bytes)
sending retransmit 3 of request message ID 601747937, seq 4
sending packet: from 66.60.177.3[500] to 173.14.59.177[500] (316 bytes)
sending retransmit 4 of request message ID 601747937, seq 4
sending packet: from 66.60.177.3[500] to 173.14.59.177[500] (316 bytes)
sending retransmit 5 of request message ID 601747937, seq 4
sending packet: from 66.60.177.3[500] to 173.14.59.177[500] (316 bytes)
giving up after 5 retransmits
establishing connection 'VPN' failed