Re: ipsec-vpn connect issue



Hi,

Trying to debug the nortel connect issue. Probably we can take this on
the turnpike-dev list rather than in this list, since it seems like a
VPN connectivity issue.

1. Did you also install the novell-nortelplugins-0.1.18-i586.rpm? They
are required for the Nortel switch interop. I am assuming you did
because you were able to create nortel gateway specific profiles.

2. Looking at your racoon.debug file (posted in turnpike-dev), the
first phase1 packet itself is not going through. Looking further, the
sockname and send from addresses are mismatching (see line#37, #38:
192.168.112.1 and 192.168.1.102). Probably you have switched interfaces
when racoon is running. This looks like a problem with racoon not able
to handle correctly when an interface switch happens when racoon is
running. In that case, /etc/init.d/racoon restart should make your
problem go away. I guess we should automatically restart racoon from
ipsec-vpn when an interface is switched, but for now can you please try
to restart racoon and see if you can proceed further?

3. Also, comparing the configurations, your working configuration using
apani seems to use DH group 3 (MODP_1536), whereas the turnpike profile
uses DH 2. Is your Nortel switch configured to allow DH group 2? 
Otherwise phase 1 will not go through. We currently dont support DH 3.
It is quite simple to add it though, so we can send you a patch for the
same if you need it. Please let us know.

Thanks and Regards,
Haripriya S.

>>> Wendell MacKenzie <mackendw sympatico ca> 02/03/06 10:18 pm >>> 
Hi:

   I've setup the following components on SUSE 10.0:

NetworkManager- 0.5.1cvs20060107- 2
NetworkManager- vpnc- 0.5.0cvs20051102- 3
NetworkManager- glib- 0.5.1cvs20060107- 2
NetworkManager- devel- 0.5.1cvs20060107- 2
NetworkManager- gnome- 0.5.1cvs20060107- 2

ipsec- tools- 0.6.3_turnpike- 1.i586.rpm
novell- vpn- 20060113.tar (make + make install worked fine)
turnpike- 0.1.0- 22.i586.rpm

I then restarted networkmanager in /etc/init.d and relaunched the nm-
applet.

All good so far...

Then I configured our Corporate Nortel Switch in the VPN Configuration

menus in the nm- applet menus, saved it and tried to connect.

Here is what shows in /var/log/messages:

Feb  3 11:24:16 macduff NetworkManager: <information>   Will activate 
VPN connection 'BEA Corporate Network', service 
'org.freedesktop.NetworkManager.vpnc', user_name 'wendell', vpn_data 
'IPSec gateway / 63.96.177.3 / IPSec ID / bea / Xauth username /
wendell 
/ Domain / bea.com'.
Feb  3 11:24:16 macduff NetworkManager: <information>   VPN Activation

(BEA Corporate Network) Stage 1 (Connection Prepare) scheduled...
Feb  3 11:24:16 macduff NetworkManager: <information>   
nm_vpn_service_stage1_daemon_exec(org.freedesktop.NetworkManager.vpnc):

execed the VPN service, PID is 27535.
Feb  3 11:24:16 macduff NetworkManager: <information>   VPN Activation

(BEA Corporate Network) Stage 2 (Connection Prepare Wait) scheduled...
Feb  3 11:24:16 macduff NetworkManager: <information>   VPN Activation

(BEA Corporate Network) Stage 2 (Connection Prepare Wait) scheduled...
Feb  3 11:24:17 macduff dhclient: No DHCPOFFERS received.
Feb  3 11:24:17 macduff dhclient: No working leases in persistent 
database -  sleeping.
Feb  3 11:24:17 macduff NetworkManager: <information>   VPN Activation

(BEA Corporate Network) Stage 2 (Connection Prepare Wait) scheduled...
Feb  3 11:24:17 macduff NetworkManager: <information>   VPN Activation

(BEA Corporate Network) Stage 2 (Connection Prepare Wait) scheduled...
Feb  3 11:24:18 macduff NetworkManager: <information>   VPN Activation

(BEA Corporate Network) failed.

Any thoughts on debugging this?  I have Apani's netlock client working

no problem...but they are SLOW at keeping pace with new kernels ...

The nortel switch uses Group ID authentication with an RSA token which

I've setup in my connection profile and in the menu at connect
time.

Any help is appreciated.

Regards,
Wendell

_______________________________________________
NetworkManager- list mailing list
NetworkManager- list gnome org
http://mail.gnome.org/mailman/listinfo/networkmanager- list

Attachment: racoon_1.debug
Description: Binary data

2006-02-03 12:09:01 (01,12e80003):Handling VPN Login Request        
2006-02-03 12:09:01 (01,12e80010):Negotiation Status: Idle        
2006-02-03 12:09:01 (01,12590016):Adding VPN record        
2006-02-03 12:09:01 (01,12e80002):Received KM to GUI Notification Message        
2006-02-03 12:09:01 (16,12e80008):<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<        
2006-02-03 12:09:01 (16,12e80008):Initiating negotiation with switch at 63.96.177.3        
2006-02-03 12:09:01 (01,12e80010):Negotiation Status: In Progress        
2006-02-03 12:09:01 (01,12af0004):SA_REQ_OUTBOUND_ES_IS (from SP) received. Local Address: 192.168.1.102 Remote Address: 63.96.177.3      
2006-02-03 12:09:01 (01,11220002):The MM identity type is KEY_ID and the value is: bea. Local Address: 192.168.1.102 Remote Address: 63.96.177.3 Local ESP SPI: 1AB9E12C     
2006-02-03 12:09:01 (01,11220001):Success in building IPSEC DATA from state entry Local Address: 192.168.1.102 Remote Address: 63.96.177.3 Local ESP SPI: 1AB9E12C     
2006-02-03 12:09:01 (01,013a0001):QOS: 
	Confidentiality: ALGOR_CONF_DES_CBC
	Integrity: ALGOR_INTEG_MD5
	AH: ALGOR_OFF
	Mode: TRANSPORT_MODE
	ESP Replay: OFF
	AH Replay: OFF
	Compression: COMPRESSION_OFF
	PFS: OFF
	SA_PER_HOST: OFF
	Exchange Type: NEGOTIATION_MODE_AGGRESSIVE
	ISAKMP Encryption Algorithm: ISAKMP_AES_CBC
	ISAKMP Hash Algorithm: ISAKMP_HASH_SHA
	Authentication Method: PRE_SHARED_KEY
	Group Description: MODP_1536
	Group Type: MODP_GROUP
	Main Mode Identity Type: KEY_ID
	Main Mode Identity Value: bea
	Use No QM Identity: OFF
	SA creation delay: 0 seconds
	Firewall Type: Contivity Extranet Switch
 Local Address: 192.168.1.102 Remote Address: 63.96.177.3 Local ESP SPI: 1AB9E12C     
2006-02-03 12:09:01 (01,013a0002):Local proposal(s):
0) Proposal 1 - Protocols: 1, Secs: 0, Kb: 0, PFS: 0.
    0) Protocol: ESP, Transforms: 1
        0) Transform 1: DES
            Lifetime: 0 Kb - 0 Secs
            Group: RESERVED
            Mode: Tunnel
            Auth alg: MD5
            Key length: 0 bits for 0 rounds        



[Date Prev][Date Next]   [Thread Prev][Thread Next]   [Thread Index] [Date Index] [Author Index]