NetBSD-Users archive

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]

Re: Simple IPSEC client with certificate - phase 1 time out



Brett Lymn wrote:

> OK, does phase 2 actually complete?

I doubt that. Currently I'm not even sure whether phase 1 completes, because
the phase1-up script is never called. On the other hand the phase1-down
script is called, as soon as the connection is terminated.


> What does a "setkey -aD" output?

No SAD entries. And no SPD entries either.
I guess they would be added by the phase1-up script...?


> Have you tried a tcpdump to see what is going on at the network level?

Yes, always. I have attached the tcpdump from my client and the vpn-status
log of the Lancom-router (the VPN "server").


> You should expect encrypted packets, if you are seeing stuff in the
> clear then check your routing and ensure the packets are properly
> routed to the vpn tunnel end point.

This is something to worry about as soon as both phases have been completed,
which definitely is not the case. ;)


> It has been a long while since I played with this but I seem to recall
> that you do get a log of what is being proposed by both sides.

The proposal is accepted (refer to the Lancom VPN log).

Looking at the tcpdump I wonder why the NetBSD client says it is exchanging
"isakmp: phase 2" packets, while the Lancom still calls these isakmp
notifies "Phase-1 SA"?

IKE info: ISAKMP_NOTIFY_DPD_R_U_THERE sent for Phase-1 SA to peer
VPNCLIENT15EF90, sequence nr 0x7a8b3f4b

-- 
Frank Wille
Mar  1 11:40:50 powerbook racoon: INFO: @(#)ipsec-tools cvs (http://ipsec-tools.sourceforge.net) 
Mar  1 11:40:50 powerbook racoon: INFO: @(#)This product linked OpenSSL 1.0.1p 9 Jul 2015 (http://www.openssl.org/) 
Mar  1 11:40:50 powerbook racoon: INFO: Reading configuration from "/etc/racoon/racoon.conf" 
Mar  1 11:40:50 powerbook racoon: INFO: 192.168.1.5[500] used for NAT-T 
Mar  1 11:40:50 powerbook racoon: INFO: 192.168.1.5[500] used as isakmp port (fd=7) 
Mar  1 11:40:50 powerbook racoon: INFO: 192.168.1.5[4500] used for NAT-T 
Mar  1 11:40:50 powerbook racoon: INFO: 192.168.1.5[4500] used as isakmp port (fd=8) 
Mar  1 11:40:50 powerbook racoon: INFO: 127.0.0.1[500] used for NAT-T 
Mar  1 11:40:50 powerbook racoon: INFO: 127.0.0.1[500] used as isakmp port (fd=9) 
Mar  1 11:40:50 powerbook racoon: INFO: 127.0.0.1[4500] used for NAT-T 
Mar  1 11:40:50 powerbook racoon: INFO: 127.0.0.1[4500] used as isakmp port (fd=10) 
Mar  1 11:52:06 powerbook racoon: INFO: accept a request to establish IKE-SA: 1.2.3.4 
Mar  1 11:52:06 powerbook racoon: INFO: initiate new phase 1 negotiation: 192.168.1.5[500]<=>1.2.3.4[500] 
Mar  1 11:52:06 powerbook racoon: INFO: begin Identity Protection mode. 
Mar  1 11:52:06 powerbook racoon: INFO: received Vendor ID: draft-ietf-ipsec-nat-t-ike-02  
Mar  1 11:52:06 powerbook racoon: INFO: received Vendor ID: draft-ietf-ipsec-nat-t-ike-03 
Mar  1 11:52:06 powerbook racoon: INFO: received Vendor ID: RFC 3947 
Mar  1 11:52:06 powerbook racoon: INFO: received Vendor ID: draft-ietf-ipsra-isakmp-xauth-06.txt 
Mar  1 11:52:06 powerbook racoon: INFO: received Vendor ID: DPD 
Mar  1 11:52:06 powerbook racoon: [1.2.3.4] INFO: Selected NAT-T version: RFC 3947 
Mar  1 11:52:06 powerbook racoon: [1.2.3.4] INFO: Hashing 1.2.3.4[500] with algo #1  
Mar  1 11:52:06 powerbook racoon: [192.168.1.5] INFO: Hashing 192.168.1.5[500] with algo #1  
Mar  1 11:52:06 powerbook racoon: INFO: Adding remote and local NAT-D payloads. 
Mar  1 11:52:06 powerbook racoon: [192.168.1.5] INFO: Hashing 192.168.1.5[500] with algo #1  
Mar  1 11:52:06 powerbook racoon: INFO: NAT-D payload #0 doesn't match 
Mar  1 11:52:06 powerbook racoon: [1.2.3.4] INFO: Hashing 1.2.3.4[500] with algo #1  
Mar  1 11:52:06 powerbook racoon: INFO: NAT-D payload #1 verified 
Mar  1 11:52:06 powerbook racoon: INFO: NAT detected: ME  
Mar  1 11:52:06 powerbook racoon: INFO: KA list add: 192.168.1.5[4500]->1.2.3.4[4500] 
Mar  1 11:52:07 powerbook racoon: WARNING: unable to get certificate CRL(3) at depth:0 SubjectName:/postalCode=32052/OU=IT/ST=NRW/L=HERFORD/C=DE/O=WPS/CN=ZENTRALE 
Mar  1 11:52:07 powerbook racoon: WARNING: unable to get certificate CRL(3) at depth:1 SubjectName:/C=DE/O=LANCOM SYSTEMS/CN=LANCOM CA 
Mar  1 11:52:07 powerbook racoon: [1.2.3.4] INFO: received INITIAL-CONTACT 
Mar  1 11:52:07 powerbook racoon: INFO: ISAKMP-SA established 192.168.1.5[4500]-1.2.3.4[4500] spi:4da2f5f910bbdf44:444ae08dd7de45a5 
Mar  1 11:53:12 powerbook racoon: [1.2.3.4] INFO: DPD: remote (ISAKMP-SA spi=4da2f5f910bbdf44:444ae08dd7de45a5) seems to be dead. 
Mar  1 11:53:12 powerbook racoon: INFO: purging ISAKMP-SA spi=4da2f5f910bbdf44:444ae08dd7de45a5. 
Mar  1 11:53:12 powerbook racoon: INFO: purged ISAKMP-SA spi=4da2f5f910bbdf44:444ae08dd7de45a5. 
Mar  1 11:53:12 powerbook racoon: INFO: ISAKMP-SA deleted 192.168.1.5[4500]-1.2.3.4[4500] spi:4da2f5f910bbdf44:444ae08dd7de45a5 
Mar  1 11:53:12 powerbook racoon: INFO: KA remove: 192.168.1.5[4500]->1.2.3.4[4500] 
11:52:06.441891 IP 192.168.1.5.500 > 1.2.3.4.500: isakmp: phase 1 I ident
11:52:06.500027 IP 1.2.3.4.500 > 192.168.1.5.500: isakmp: phase 1 R ident
11:52:06.569110 IP 192.168.1.5.500 > 1.2.3.4.500: isakmp: phase 1 I ident
11:52:06.659061 IP 1.2.3.4.500 > 192.168.1.5.500: isakmp: phase 1 R ident
11:52:06.806959 IP 192.168.1.5.4500 > 1.2.3.4.4500: NONESP-encap: isakmp: phase 1 I ident[E]
11:52:07.498526 IP 1.2.3.4.4500 > 192.168.1.5.4500: NONESP-encap: isakmp: phase 1 R ident[E]
11:52:11.124742 IP 192.168.1.5.4500 > 1.2.3.4.4500: isakmp-nat-keep-alive
11:52:23.925863 IP 1.2.3.4.4500 > 192.168.1.5.4500: NONESP-encap: isakmp: phase 2/others R inf[E]
11:52:23.957487 IP 192.168.1.5.4500 > 1.2.3.4.4500: NONESP-encap: isakmp: phase 2/others I inf[E]
11:52:27.567012 IP 192.168.1.5.4500 > 1.2.3.4.4500: NONESP-encap: isakmp: phase 2/others I inf[E]
11:52:27.609318 IP 1.2.3.4.4500 > 192.168.1.5.4500: NONESP-encap: isakmp: phase 2/others R inf[E]
11:52:31.144706 IP 192.168.1.5.4500 > 1.2.3.4.4500: isakmp-nat-keep-alive
11:52:47.657437 IP 192.168.1.5.4500 > 1.2.3.4.4500: NONESP-encap: isakmp: phase 2/others I inf[E]
11:52:51.175044 IP 192.168.1.5.4500 > 1.2.3.4.4500: isakmp-nat-keep-alive
11:52:52.687182 IP 192.168.1.5.4500 > 1.2.3.4.4500: NONESP-encap: isakmp: phase 2/others I inf[E]
11:52:57.727506 IP 192.168.1.5.4500 > 1.2.3.4.4500: NONESP-encap: isakmp: phase 2/others I inf[E]
11:53:02.766923 IP 192.168.1.5.4500 > 1.2.3.4.4500: NONESP-encap: isakmp: phase 2/others I inf[E]
11:53:07.807263 IP 192.168.1.5.4500 > 1.2.3.4.4500: NONESP-encap: isakmp: phase 2/others I inf[E]
11:53:11.204796 IP 192.168.1.5.4500 > 1.2.3.4.4500: isakmp-nat-keep-alive
[VPN-Status] 2016/03/01 11:52:06,101
IKE info: The remote peer def-main-peer supports NAT-T in RFC mode
IKE info: The remote peer def-main-peer supports NAT-T in draft mode
IKE info: The remote server 91.56.237.127:2532 (UDP) peer def-main-peer id <no_id> negotiated rfc-3706-dead-peer-detection


[VPN-Status] 2016/03/01 11:52:06,102
IKE info: Phase-1 remote proposal 1 for peer def-main-peer matched with local proposal 1


[VPN-Status] 2016/03/01 11:52:06,535
IKE log: 115206.535526 Default conf_get_list: empty field, ignoring...


[VPN-Status] 2016/03/01 11:52:07,095
VPN: WAN state changed to WanSetup for  (0.0.0.0), called by: 009c5f50

[VPN-Status] 2016/03/01 11:52:07,095
VPN: WAN state changed to WanCalled for VPNCLIENT15EF90 (0.0.0.0), called by: 009c5cb8

[VPN-Status] 2016/03/01 11:52:07,096
vpn-maps[38], remote: VPNCLIENT15EF90, nego, connected-by-name

[VPN-Status] 2016/03/01 11:52:07,096
IKE info: exchange_finalize: assuming identified for road-warrior with cert, id=VPNCLIENT15EF90, RemoteGW=91.56.237.127


[VPN-Status] 2016/03/01 11:52:07,121
IKE info: Phase-1 [responder] for peer VPNCLIENT15EF90 initiator id CN=VPNCLIENT15,O=WPS,C=DE,L=HERFORD,ST=NRW,OU=IT,postalCode=32052, responder id CN=ZENTRALE,O=WPS,C=DE,L=HERFORD,ST=NRW,OU=IT,postalCode=32052
IKE info: initiator cookie: 0x4da2f5f910bbdf44, responder cookie: 0x444ae08dd7de45a5
IKE info: NAT-T enabled in mode rfc, we are not behind a nat, the remote side is  behind a nat
IKE info: SA ISAKMP for peer VPNCLIENT15EF90 encryption aes-cbc authentication MD5
IKE info: life time ( 28800 sec/ 0 kb) DPD 0 sec


[VPN-Status] 2016/03/01 11:52:07,123
IKE info: Phase-1 SA Timeout (Hard-Event) for peer VPNCLIENT15EF90 set to 28800 seconds (Responder)


[VPN-Status] 2016/03/01 11:52:23,541
IKE info: ISAKMP_NOTIFY_DPD_R_U_THERE sent for Phase-1 SA to peer VPNCLIENT15EF90, sequence nr 0x7a8b3f4b


[VPN-Status] 2016/03/01 11:52:23,614
IKE info: NOTIFY received of type ISAKMP_NOTIFY_DPD_R_U_THERE_ACK for peer VPNCLIENT15EF90 Seq-Nr 0x7a8b3f4b, expected 0x7a8b3f4b


[VPN-Status] 2016/03/01 11:52:27,223
IKE info: NOTIFY received of type ISAKMP_NOTIFY_DPD_R_U_THERE for peer VPNCLIENT15EF90 Seq-Nr 0xe8, expected 0xe8


[VPN-Status] 2016/03/01 11:52:27,224
IKE info: ISAKMP_NOTIFY_DPD_R_U_THERE_ACK sent for Phase-1 SA to peer VPNCLIENT15EF90, sequence nr 0xe8


[VPN-Status] 2016/03/01 11:52:37,096
VPN: connection for VPNCLIENT15EF90 (91.56.237.127) timed out: no response

[VPN-Status] 2016/03/01 11:52:37,096
VPN: Error: IFC-R-Connection-timeout-dynamic (0x1205) for VPNCLIENT15EF90 (91.56.237.127)

[VPN-Status] 2016/03/01 11:52:37,096
vpn-maps[38], remote: VPNCLIENT15EF90

[VPN-Status] 2016/03/01 11:52:37,096
VPN: installing ruleset for VPNCLIENT15EF90 (91.56.237.127)

[VPN-Status] 2016/03/01 11:52:37,096
VPN: WAN state changed to WanDisconnect for VPNCLIENT15EF90 (91.56.237.127), called by: 009c5cb8

[VPN-Status] 2016/03/01 11:52:37,097
IKE info: Phase-1 SA removed: peer VPNCLIENT15EF90 rule VPNCLIENT15EF90 removed


[VPN-Status] 2016/03/01 11:52:37,102
VPN: WAN state changed to WanIdle for VPNCLIENT15EF90 (91.56.237.127), called by: 009c5cb8

[VPN-Status] 2016/03/01 11:52:37,103
removeAllDeletedRoutes, called by: 009bdd24

[VPN-Status] 2016/03/01 11:52:37,108
VPN: VPNCLIENT15EF90 (91.56.237.127)  disconnected


[VPN-Status] 2016/03/01 11:52:47,318
IKE log: 115247.318276 Default message_drop_invalid_cookies: invalid cookie(s) 4da2f5f910bbdf44 444ae08dd7de45a5


[VPN-Status] 2016/03/01 11:52:47,318
IKE log: 115247.318468 Default dropped message from 91.56.237.127 port 2500 due to notification type INVALID_COOKIE


[VPN-Status] 2016/03/01 11:52:47,318
IKE info: Informational messages are unidirectional and therefore are not answered! (cookies 4D A2 F5 F9 10 BB DF 44 44 4A E0 8D D7 DE 45 A5)


[VPN-Status] 2016/03/01 11:52:52,355
IKE log: 115252.355368 Default message_drop_invalid_cookies: invalid cookie(s) 4da2f5f910bbdf44 444ae08dd7de45a5


[VPN-Status] 2016/03/01 11:52:52,355
IKE log: 115252.355560 Default dropped message from 91.56.237.127 port 2500 due to notification type INVALID_COOKIE


[VPN-Status] 2016/03/01 11:52:52,355
IKE info: Informational messages are unidirectional and therefore are not answered! (cookies 4D A2 F5 F9 10 BB DF 44 44 4A E0 8D D7 DE 45 A5)


[VPN-Status] 2016/03/01 11:52:57,384
IKE log: 115257.384602 Default message_drop_invalid_cookies: invalid cookie(s) 4da2f5f910bbdf44 444ae08dd7de45a5


[VPN-Status] 2016/03/01 11:52:57,384
IKE log: 115257.384795 Default dropped message from 91.56.237.127 port 2500 due to notification type INVALID_COOKIE


[VPN-Status] 2016/03/01 11:52:57,385
IKE info: Informational messages are unidirectional and therefore are not answered! (cookies 4D A2 F5 F9 10 BB DF 44 44 4A E0 8D D7 DE 45 A5)


[VPN-Status] 2016/03/01 11:53:02,424
IKE log: 115302.424565 Default message_drop_invalid_cookies: invalid cookie(s) 4da2f5f910bbdf44 444ae08dd7de45a5


[VPN-Status] 2016/03/01 11:53:02,424
IKE log: 115302.424757 Default dropped message from 91.56.237.127 port 2500 due to notification type INVALID_COOKIE


[VPN-Status] 2016/03/01 11:53:02,425
IKE info: Informational messages are unidirectional and therefore are not answered! (cookies 4D A2 F5 F9 10 BB DF 44 44 4A E0 8D D7 DE 45 A5)


[VPN-Status] 2016/03/01 11:53:07,463
IKE log: 115307.463673 Default message_drop_invalid_cookies: invalid cookie(s) 4da2f5f910bbdf44 444ae08dd7de45a5


[VPN-Status] 2016/03/01 11:53:07,463
IKE log: 115307.463865 Default dropped message from 91.56.237.127 port 2500 due to notification type INVALID_COOKIE


[VPN-Status] 2016/03/01 11:53:07,464
IKE info: Informational messages are unidirectional and therefore are not answered! (cookies 4D A2 F5 F9 10 BB DF 44 44 4A E0 8D D7 DE 45 A5)


Home | Main Index | Thread Index | Old Index