Hi Charles and Lynn. 

Thank you for your suggestions. Things are not changed much after
I did the following as you advised:

- As per Lynn's remark, I now use only one /etc/ipsec.conf on
  both sides. The FreeSWAN doc said that you may need to change 
  the line "interfaces=", but they are identical in this case
  too, i.e. both use eth0.
  So only the ipsec.secrets are different. 

- The ping I did was done on an internal machine behind the firewall,
  192.168.9.204, not on the gateway (192.168.9.254). From there 
  I tried to ping 192.168.1.202, another machine behind the
  remote gateway.

- I removed "ip_masq_ipsec" from /etc/modules. I also set 
  eth0_IP_SPOOF=NO in /etc/network.conf

- I saw some suspicious variables in /etc/network.conf but
  not sure if they affect anything in my case:

# Accept ICMP Redirects on ALL interfaces, also depends on /proc
# per interface IP forwarding flag. - YES/NO
ALLIF_ACCEPT_REDIRECTS=NO
...
# Need these both for interfaces run by daemons - ie PPP, CIPE, some
#         WAN interfaces
# IP spoofing protection by default for interfaces - YES/NO
DEF_IP_SPOOF=YES
...
eth1_IPADDR=192.168.1.254
eth1_MASKLEN=24
eth1_BROADCAST=192.168.1.255
eth1_IP_SPOOF=YES
...

- After pinging, I saw nothing particular in /var/log/auth.log
  nor in /var/log/messages on both sides.

- I think I have protocol 50, 51 and UDP port 500 set in 
  /etc/network.conf, but for sure I list the partial output from
  net ipfilter list. You may see something wrong I have here.

Extern IP: 24.83.28.213
Chain input (policy DENY: 3 packets, 734 bytes):
 pkts bytes target     prot opt    tosa tosx  ifname     mark       outsize  source    
            destination           ports
    0     0 DENY       icmp ----l- 0xFF 0x00  *                              0.0.0.0/0 
           0.0.0.0/0             5 ->   *
    0     0 DENY       icmp ----l- 0xFF 0x00  *                              0.0.0.0/0 
           0.0.0.0/0             13 ->   *
    0     0 DENY       icmp ----l- 0xFF 0x00  *                              0.0.0.0/0 
           0.0.0.0/0             14 ->   *
    0     0 DENY       all  ----l- 0xFF 0x00  eth0                           0.0.0.0   
           0.0.0.0/0             n/a
    0     0 DENY       all  ----l- 0xFF 0x00  eth0                           
255.255.255.255      0.0.0.0/0             n/a
    0     0 DENY       all  ----l- 0xFF 0x00  eth0                           
127.0.0.0/8          0.0.0.0/0             n/a
    0     0 DENY       all  ----l- 0xFF 0x00  eth0                           
224.0.0.0/4          0.0.0.0/0             n/a
   13   528 DENY       all  ----l- 0xFF 0x00  eth0                           
10.0.0.0/8           0.0.0.0/0             n/a
    0     0 DENY       all  ----l- 0xFF 0x00  eth0                           
172.16.0.0/12        0.0.0.0/0             n/a
    5   280 DENY       all  ----l- 0xFF 0x00  eth0                           
192.168.0.0/16       0.0.0.0/0             n/a
    0     0 DENY       all  ----l- 0xFF 0x00  eth0                           0.0.0.0/8 
           0.0.0.0/0             n/a
    0     0 DENY       all  ----l- 0xFF 0x00  eth0                           
128.0.0.0/16         0.0.0.0/0             n/a
    0     0 DENY       all  ----l- 0xFF 0x00  eth0                           
191.255.0.0/16       0.0.0.0/0             n/a
    0     0 DENY       all  ----l- 0xFF 0x00  eth0                           
192.0.0.0/24         0.0.0.0/0             n/a
    0     0 DENY       all  ----l- 0xFF 0x00  eth0                           
223.255.255.0/24     0.0.0.0/0             n/a
    0     0 DENY       all  ----l- 0xFF 0x00  eth0                           
240.0.0.0/4          0.0.0.0/0             n/a
    0     0 DENY       all  ----l- 0xFF 0x00  eth0                           
192.168.9.0/24       0.0.0.0/0             n/a
    0     0 DENY       all  ----l- 0xFF 0x00  eth0                           
192.168.3.0/24       0.0.0.0/0             n/a
    0     0 DENY       all  ----l- 0xFF 0x00  eth0                           
24.83.28.213         0.0.0.0/0             n/a
    0     0 REJECT     all  ----l- 0xFF 0x00  eth0                           0.0.0.0/0 
           127.0.0.0/8           n/a
    0     0 REJECT     all  ----l- 0xFF 0x00  eth0                           0.0.0.0/0 
           192.168.9.0/24        n/a
...
11940 2123K ACCEPT     udp  ------ 0xFF 0x00  eth0                           0.0.0.0/0 
           0.0.0.0/0             * ->   500
    0     0 DENY       udp  ------ 0xFF 0x00  eth0                           0.0.0.0/0 
           0.0.0.0/0             * ->   67
46676 7613K ACCEPT     udp  ------ 0xFF 0x00  eth0                           0.0.0.0/0 
           0.0.0.0/0             * ->   1024:65535
  466 61519 ACCEPT     icmp ------ 0xFF 0x00  eth0                           0.0.0.0/0 
           0.0.0.0/0             * ->   *
    0     0 ACCEPT     ospf ------ 0xFF 0x00  eth0                           0.0.0.0/0 
           0.0.0.0/0             n/a
    0     0 ACCEPT     50   ------ 0xFF 0x00  eth0                           0.0.0.0/0 
           24.83.28.213          n/a
    0     0 ACCEPT     51   ------ 0xFF 0x00  eth0                           0.0.0.0/0 
           24.83.28.213          n/a
  108  6512 DENY       all  ----l- 0xFF 0x00  eth0                           0.0.0.0/0 
           0.0.0.0/0             n/a
    0     0 REJECT     udp  ----l- 0xFF 0x00  *                              0.0.0.0/0 
           0.0.0.0/0             * ->   161:162
    0     0 REJECT     udp  ----l- 0xFF 0x00  *                              0.0.0.0/0 
           0.0.0.0/0             161:162 ->   *
 911K   67M ACCEPT     all  ------ 0xFF 0x00  *                              0.0.0.0/0 
           0.0.0.0/0             n/a
Chain forward (policy DENY: 0 packets, 0 bytes):
...




---------- Original Message ----------------------------------
From: "Charles Steinkuehler" <[EMAIL PROTECTED]>
Date:  Wed, 24 Apr 2002 09:35:41 -0500

>
>Well, it looks like your tunnel is coming up, so I'd look at firewalling
>rules.  The behavior you're seeing can be caused if protocol 50 packets are
>being denied or rejected by one (or both) of the firewalls.  Since you're
>not setting [left|right]firewall=yes, you need to make sure you're allowing
>the ESP (protocol 50) packets between the firewalls.  Check
>/var/log/messages for denied packets, and the output of "net ipfilter list"
>for non-zero counts beside any deny/reject rules.
>
>Charles Steinkuehler
>http://lrp.steinkuehler.net
>http://c0wz.steinkuehler.net (lrp.c0wz.com mirror)
>
>
>_______________________________________________
>Leaf-user mailing list
>[EMAIL PROTECTED]
>https://lists.sourceforge.net/lists/listinfo/leaf-user
>

_______________________________________________
Leaf-user mailing list
[EMAIL PROTECTED]
https://lists.sourceforge.net/lists/listinfo/leaf-user

Reply via email to