Hello everyone,
This is actually a freeswan VPN query, so I'm sorry if I had to post
this query here also. But I do know that most of you are experts in
the VPN field, hence, here goes...
I've been trying to do a subnet-to-subnet VPN using my LEAF based
routers without success.
My setup involves another LEAF machine acting as a virtual internet
between the two VPN boxes.
Here's a diagram of my setup:
VPN1-CLI
|eth0: 192.168.4.1
|gw: 192.168.4.200
|
|
|eth1: 192.168.4.200
|gw: 192.168.2.1
VPN1 BOX
|eth0: 192.168.2.1
|gw: 192.168.2.200
|
|
|eth1: 192.168.2.200
|gw: 192.168.1.200
ROUTER----eth0: 192.168.1.200
|eth2: 192.168.3.200
|gw: 192.168.1.200
|
|
|eth0: 192.168.3.1
|gw: 192.168.3.200
VPN2 BOX
|eth1: 192.168.5.200
|gw: 192.168.3.1
|
|
|eth0: 192.168.5.1
|gw: 192.168.5.200
VPN2-CLI
My VPN and ROUTER machines are LEAF/LRP 2.2.19 based, while
the VPN-CLI client machines are Win98 PCs.
My problem is that, I cannot 'ping' 192.168.4.1 from 192.168.5.1 and
vise versa. Upon running 'ipsec look' on either side, I get a 'trap'
status instead of a tunnel.
SR3K-VPN1 Tue Jul 30 04:02:27 UTC 2002
192.168.4.0/24 -> 192.168.5.0/24 => %trap (0)
ipsec0->eth0 mtu=16260(1500)->1500
Destination Gateway Genmask Flags MSS Window irtt
Iface
0.0.0.0 192.168.2.200 0.0.0.0 UG 0 0 0
eth0
192.168.2.0 0.0.0.0 255.255.255.0 U 0 0 0
eth0
192.168.2.0 0.0.0.0 255.255.255.0 U 0 0 0
ipsec0
192.168.5.0 192.168.2.200 255.255.255.0 UG 0 0 0
ipsec0
I believe there's nothing wrong with my network setup and ipchaining /
routing rules as I am able to 'ping' VPN1 BOX from VPN2-CLI,
and 'ping' VPN2 BOX from VPN1-CLI. I can also 'ping' VPN1
from VPN2 BOX, and vise versa.
Below are some of the listings in my 'ipsec barf' result. I'm currently
employing a very lame ipchain rule set just to see this work. Both
of my VPN machines are currently using the same set of rules with
respect to their network settings.
I also tried allowing ipsec protocols to pass thru ROUTER's internal
networks thinking it may be needed.... not!
What else am I missing here?
TIA - Vic
=============================
SR3K-VPN1
Tue Jul 30 03:43:58 UTC 2002
+ _________________________
+
+ ipsec --version
Linux FreeS/WAN 1.91
See `ipsec --copyright' for copyright information.
+ _________________________
+
+ cat /proc/net/ipsec_eroute
0 192.168.4.0/24 -> 192.168.5.0/24 => %trap
+ _________________________
+
+ cat /proc/net/ipsec_spi
+ _________________________
+
+ cat /proc/net/ipsec_spigrp
+ _________________________
+
+ netstat -nr
Kernel IP routing table
Destination Gateway Genmask Flags MSS Window irtt
Iface
192.168.5.0 192.168.2.200 255.255.255.0 UG 0 0 0
ipsec0
192.168.4.0 0.0.0.0 255.255.255.0 U 0 0 0
eth1
192.168.2.0 0.0.0.0 255.255.255.0 U 0 0 0
eth0
192.168.2.0 0.0.0.0 255.255.255.0 U 0 0 0
ipsec0
0.0.0.0 192.168.2.200 0.0.0.0 UG 0 0 0
eth0
+ _________________________
+
+ cat /proc/net/ipsec_tncfg
ipsec0 -> eth0 mtu=16260(1500) -> 1500
ipsec1 -> NULL mtu=0(0) -> 0
ipsec2 -> NULL mtu=0(0) -> 0
ipsec3 -> NULL mtu=0(0) -> 0
+ _________________________
+
+ cat /proc/net/pf_key
sock pid socket next prev e n p sndbf Flags Type
St
c7278680 1574 c54643b0 0 0 0 0 2 32767 00000000 3
1
+ _________________________
+
+ cd /proc/net
+ egrep ^ pf_key_registered pf_key_supported
pf_key_registered:satype socket pid sk
pf_key_registered: 2 c54643b0 1574 c7278680
pf_key_registered: 3 c54643b0 1574 c7278680
pf_key_registered: 9 c54643b0 1574 c7278680
pf_key_registered: 10 c54643b0 1574 c7278680
pf_key_supported:satype exttype alg_id ivlen minbits maxbits
pf_key_supported: 2 14 3 0 160 160
pf_key_supported: 2 14 2 0 128 128
pf_key_supported: 3 15 3 128 168 168
pf_key_supported: 3 14 3 0 160 160
pf_key_supported: 3 14 2 0 128 128
pf_key_supported: 9 15 4 0 128 128
pf_key_supported: 9 15 3 0 32 128
pf_key_supported: 9 15 2 0 128 32
pf_key_supported: 9 15 1 0 32 32
pf_key_supported: 10 15 2 0 1 1
+ _________________________
+
+ cd /proc/sys/net/ipsec
+ egrep ^ debug_ah debug_eroute debug_esp debug_ipcomp debug_netlink
debug_pfkey debug_radij debug_rcv debug_spi debug_tunnel debug_verbose
debug_xform icmp inbound_policy_check tos
debug_ah:0
debug_eroute:0
debug_esp:0
debug_ipcomp:0
debug_netlink:0
debug_pfkey:0
debug_radij:0
debug_rcv:0
debug_spi:0
debug_tunnel:0
debug_verbose:0
debug_xform:0
icmp:0
inbound_policy_check:1
tos:1
+ _________________________
+
+ ipsec auto --status
000 interface ipsec0/eth0 192.168.2.1
000
000 "VNP1-VPN2": 192.168.4.0/24===192.168.2.1---192.168.2.200...
000 "VNP1-VPN2": ...192.168.3.200---192.168.3.1===192.168.5.0/24
000 "VNP1-VPN2": ike_life: 3600s; ipsec_life: 28800s; rekey_margin:
540s; rekey_fuzz: 100%; keyingtries: 0
000 "VNP1-VPN2": policy: RSASIG+ENCRYPT+TUNNEL+PFS; interface: eth0;
trap erouted
000 "VNP1-VPN2": newest ISAKMP SA: #0; newest IPsec SA: #0; eroute
owner: #0
000
000 #1: "VNP1-VPN2" STATE_MAIN_I1 (sent MI1, expecting MR1);
EVENT_RETRANSMIT in 31s
+ _________________________
+
+ ifconfig -a
lo Link encap:Local Loopback
inet addr:127.0.0.1 Mask:255.0.0.0
UP LOOPBACK RUNNING MTU:3924 Metric:1
RX packets:11766 errors:0 dropped:0 overruns:0 frame:0
TX packets:11766 errors:0 dropped:0 overruns:0 carrier:0
Collisions:0
ipsec0 Link encap:Ethernet HWaddr 00:04:A7:01:02:48
inet addr:192.168.2.1 Mask:255.255.255.0
UP RUNNING NOARP MTU:16260 Metric:1
RX packets:0 errors:0 dropped:0 overruns:0 frame:0
TX packets:0 errors:0 dropped:0 overruns:0 carrier:0
Collisions:0
ipsec1 Link encap:IPIP Tunnel HWaddr
unspec addr:[NONE SET] Mask:[NONE SET]
NOARP MTU:0 Metric:1
RX packets:0 errors:0 dropped:0 overruns:0 frame:0
TX packets:0 errors:0 dropped:0 overruns:0 carrier:0
Collisions:0
ipsec2 Link encap:IPIP Tunnel HWaddr
unspec addr:[NONE SET] Mask:[NONE SET]
NOARP MTU:0 Metric:1
RX packets:0 errors:0 dropped:0 overruns:0 frame:0
TX packets:0 errors:0 dropped:0 overruns:0 carrier:0
Collisions:0
ipsec3 Link encap:IPIP Tunnel HWaddr
unspec addr:[NONE SET] Mask:[NONE SET]
NOARP MTU:0 Metric:1
RX packets:0 errors:0 dropped:0 overruns:0 frame:0
TX packets:0 errors:0 dropped:0 overruns:0 carrier:0
Collisions:0
brg0 Link encap:Ethernet HWaddr FE:FD:06:00:09:FA
unspec addr:[NONE SET] Bcast:[NONE SET] Mask:[NONE SET]
BROADCAST MULTICAST MTU:1500 Metric:1
RX packets:0 errors:0 dropped:0 overruns:0 frame:0
TX packets:0 errors:0 dropped:0 overruns:0 carrier:0
Collisions:0
eth0 Link encap:Ethernet HWaddr 00:04:A7:01:02:48
inet addr:192.168.2.1 Bcast:192.168.2.255 Mask:255.255.255.0
UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1
RX packets:20 errors:0 dropped:0 overruns:0 frame:0
TX packets:20 errors:0 dropped:0 overruns:0 carrier:0
Collisions:0
Interrupt:11 Base address:0xdc00
eth1 Link encap:Ethernet HWaddr 00:04:A7:01:02:47
inet addr:192.168.4.200 Bcast:192.168.4.255
Mask:255.255.255.0
UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1
RX packets:0 errors:0 dropped:0 overruns:0 frame:0
TX packets:0 errors:0 dropped:0 overruns:0 carrier:0
Collisions:0
Interrupt:10 Base address:0xd800
+ _________________________
+
+ ipsec --directory
/usr/local/lib/ipsec
+ _________________________
+
+ hostname --fqdn
SR3K-VPN1
+ _________________________
+
+ hostname --ip-address
192.168.2.1
+ _________________________
+
+ uptime
03:43:59 up 0 Days (0h), load average: 0.27 0.22 0.10
+ _________________________
+
+ ipsec showdefaults
#dr: no default route
# no default route
# no default route
+ _________________________
+
+ ipsec _include /etc/ipsec.conf
+ ipsec _keycensor
#< /etc/ipsec.conf 1
# /etc/ipsec.conf - FreeS/WAN IPsec configuration file
# basic configuration
config setup
interfaces="ipsec0=eth0"
klipsdebug=none
plutodebug=none
plutoload=%search
plutostart=%search
uniqueids=yes
conn %default
keyingtries=0
authby=rsasig
conn VNP1-VPN2
leftid=192.168.2.1
left=192.168.2.1
leftsubnet=192.168.4.0/24
leftnexthop=192.168.2.200
leftfirewall=yes
rightid=192.168.3.1
right=192.168.3.1
rightsubnet=192.168.5.0/24
rightnexthop=192.168.3.200
rightfirewall=yes
auto=start
leftrsasigkey=[sums to 364c...]
rightrsasigkey=[sums to 1636...]
+ _________________________
+
+ ipsec _include /etc/ipsec.secrets
+ ipsec _secretcensor
+ _________________________
+ cat /proc/net/dev
Inter-| Receive |
Transmit
face |bytes packets errs drop fifo frame compressed multicast|bytes
packets errs drop fifo colls carrier compressed
lo: 859794 11803 0 0 0 0 0 0
859794 11803 0 0 0 0 0 0
ipsec0: 0 0 0 0 0 0 0 0
0 0 0 0 0 0 0 0
ipsec1: 0 0 0 0 0 0 0 0
0 0 0 0 0 0 0 0
ipsec2: 0 0 0 0 0 0 0 0
0 0 0 0 0 0 0 0
ipsec3: 0 0 0 0 0 0 0 0
0 0 0 0 0 0 0 0
brg0: 0 0 0 0 0 0 0 0
0 0 0 0 0 0 0 0
eth0: 2834 20 0 0 0 0 0 0
2806 20 0 0 0 0 0 0
eth1: 0 0 0 0 0 0 0 0
0 0 0 0 0 0 0 0
+ _________________________
+ cat /proc/net/route
Iface Destination Gateway Flags RefCnt Use Metric Mask MTU Window IRTT
ipsec0 0005A8C0 C802A8C0 0003 0 0 0 00FFFFFF 0 0 0
eth1 0004A8C0 00000000 0001 0 0 0 00FFFFFF 0 0 0
eth0 0002A8C0 00000000 0001 0 0 0 00FFFFFF 0 0 0
ipsec0 0002A8C0 00000000 0001 0 0 0 00FFFFFF 0 0 0
eth0 00000000 C802A8C0 0003 0 0 0 00000000 0 0 0
+ _________________________
+ cat /proc/sys/net/ipv4/ip_forward
1
+ _________________________
+ cat /proc/net/ipsec_version
FreeS/WAN version: 1.91
+ _________________________
+
+ ipchains -L -v -n
Chain input (policy ACCEPT: 1 packets, 100 bytes):
pkts bytes target prot opt tosa tosx ifname mark
outsize source destination ports
0 0 ACCEPT 51 ------ 0xFF 0x00 *
192.168.3.1 192.168.2.1 n/a
0 0 ACCEPT 50 ------ 0xFF 0x00 *
192.168.3.1 192.168.2.1 n/a
10 2040 ACCEPT udp ------ 0xFF 0x00 *
0.0.0.0/0 192.168.2.0/24 * -> 500
0 0 ACCEPT 50 ------ 0xFF 0x00 *
0.0.0.0/0 192.168.2.0/24 n/a
0 0 ACCEPT 51 ------ 0xFF 0x00 *
0.0.0.0/0 192.168.2.0/24 n/a
4 336 ACCEPT all ------ 0xFF 0x00 *
192.168.2.1 0.0.0.0/0 n/a
0 0 ACCEPT all ------ 0xFF 0x00 *
192.168.2.1 192.168.4.0/24 n/a
11802 860K ACCEPT all ------ 0xFF 0x00 lo
0.0.0.0/0 0.0.0.0/0 n/a
Chain forward (policy DENY: 0 packets, 0 bytes):
pkts bytes target prot opt tosa tosx ifname mark
outsize source destination ports
0 0 ACCEPT all ------ 0xFF 0x00 *
192.168.5.0/24 192.168.4.0/24 n/a
0 0 ACCEPT all ------ 0xFF 0x00 *
192.168.4.0/24 192.168.5.0/24 n/a
0 0 ACCEPT all ------ 0xFF 0x00 *
192.168.4.0/24 192.168.5.0/24 n/a
0 0 ACCEPT all ------ 0xFF 0x00 *
192.168.5.0/24 192.168.4.0/24 n/a
0 0 MASQ all ------ 0xFF 0x00 *
192.168.4.0/24 0.0.0.0/0 n/a
0 0 MASQ all ------ 0xFF 0x00 *
192.168.2.0/24 0.0.0.0/0 n/a
Chain output (policy ACCEPT: 11814 packets, 861906 bytes):
pkts bytes target prot opt tosa tosx ifname mark
outsize source destination ports
0 0 - tcp ------ 0x01 0x08 *
0.0.0.0/0 0.0.0.0/0 * -> 20
0 0 - tcp ------ 0x01 0x10 *
0.0.0.0/0 0.0.0.0/0 * -> 21
0 0 - tcp ------ 0x01 0x10 *
0.0.0.0/0 0.0.0.0/0 * -> 22
0 0 - tcp ------ 0x01 0x10 *
0.0.0.0/0 0.0.0.0/0 * -> 23
0 0 - tcp ------ 0x01 0x10 *
0.0.0.0/0 0.0.0.0/0 * -> 25
0 0 - tcp ------ 0x01 0x10 *
0.0.0.0/0 0.0.0.0/0 * -> 80
0 0 - tcp ------ 0x01 0x10 *
0.0.0.0/0 0.0.0.0/0 * -> 110
+ _________________________
+ cat /proc/modules
ds 6120 1
i82365 21964 1
pcmcia_core 44928 0 [ds i82365]
ip_masq_vdolive 1180 0 (unused)
ip_masq_user 3708 0 (unused)
ip_masq_raudio 2980 0 (unused)
ip_masq_quake 1220 0 (unused)
ip_masq_pptp 4116 0 (unused)
ip_masq_portfw 2416 0 (unused)
ip_masq_mms 2640 0 (unused)
ip_masq_mfw 3196 0 (unused)
ip_masq_irc 1924 0 (unused)
ip_masq_ipsec 7328 0 (unused)
ip_masq_icq 13096 0 (unused)
ip_masq_h323 6280 0 (unused)
ip_masq_ftp 3576 0 (unused)
ip_masq_cuseeme 964 0 (unused)
ip_masq_autofw 2476 0 (unused)
lp 4508 0 (unused)
parport_pc 7588 2
parport 6956 2 [lp parport_pc]
slip 6196 0 (unused)
ppp 20828 0 (unused)
slhc 4436 0 [slip ppp]
ext2 40548 0 (unused)
rtl8139 10852 2
pci-scan 2296 0 [rtl8139]
+ _________________________
+
+ ls -l /proc/net/ipsec_eroute /proc/net/ipsec_klipsdebug
/proc/net/ipsec_spi /proc/net/ipsec_spigrp /proc/net/ipsec_tncfg
/proc/net/ipsec_version
-r--r--r-- 1 root root 0 Jul 30 03:44
/proc/net/ipsec_eroute
-r--r--r-- 1 root root 0 Jul 30 03:44
/proc/net/ipsec_klipsdebug
-r--r--r-- 1 root root 0 Jul 30 03:44
/proc/net/ipsec_spi
-r--r--r-- 1 root root 0 Jul 30 03:44
/proc/net/ipsec_spigrp
-r--r--r-- 1 root root 0 Jul 30 03:44
/proc/net/ipsec_tncfg
-r--r--r-- 1 root root 0 Jul 30 03:44
/proc/net/ipsec_version
+ _________________________
+
+ egrep -i ipsec|klips|pluto
+ egrep -n Starting FreeS.WAN /var/log/syslog
+ cat
+ sed -n $s/:.*//p
+ sed -n 105,$p /var/log/syslog
Jul 30 03:38:36 SR3K-VPN1 ipsec_setup: Starting FreeS/WAN IPsec 1.91...
Jul 30 03:38:36 SR3K-VPN1 ipsec_setup: KLIPS debug `none'
Jul 30 03:38:36 SR3K-VPN1 ipsec_setup: KLIPS ipsec0 on eth0
192.168.2.1/255.255.255.0 broadcast 192.168.2.255
Jul 30 03:38:36 SR3K-VPN1 ipsec_setup: ...FreeS/WAN IPsec started
+ _________________________
+
+ cat
+ egrep -i pluto
+ egrep -n Starting Pluto /var/log/auth.log
+ sed -n $s/:.*//p
+ sed -n 1,$p /var/log/auth.log
Jul 30 03:38:37 SR3K-VPN1 Pluto[1574]: Starting Pluto (FreeS/WAN Version
1.91)
Jul 30 03:38:37 SR3K-VPN1 Pluto[1574]: including X.509 patch (Version
0.9.3)
Jul 30 03:38:37 SR3K-VPN1 Pluto[1574]: Could not change to directory
'/etc/ipsec.d/cacerts'
Jul 30 03:38:37 SR3K-VPN1 Pluto[1574]: Could not change to directory
'/etc/ipsec.d/crls'
Jul 30 03:38:37 SR3K-VPN1 Pluto[1574]: could not open my X.509 cert
file '/etc/x509cert.der'
Jul 30 03:38:37 SR3K-VPN1 Pluto[1574]: OpenPGP certificate file
'/etc/pgpcert.pgp' not found
Jul 30 03:38:39 SR3K-VPN1 Pluto[1574]: added connection description
"VNP1-VPN2"
Jul 30 03:38:39 SR3K-VPN1 Pluto[1574]: listening for IKE messages
Jul 30 03:38:39 SR3K-VPN1 Pluto[1574]: adding interface ipsec0/eth0
192.168.2.1
Jul 30 03:38:39 SR3K-VPN1 Pluto[1574]: loading secrets from
"/etc/ipsec.secrets"
Jul 30 03:38:40 SR3K-VPN1 Pluto[1574]: packet from 192.168.2.200:61070:
initial Main Mode message received on 192.168.2.1:500 but no connection
has been authorized
Jul 30 03:38:40 SR3K-VPN1 Pluto[1574]: "VNP1-VPN2" #1: initiating Main
Mode
Jul 30 03:38:50 SR3K-VPN1 Pluto[1574]: packet from 192.168.2.200:61070:
initial Main Mode message received on 192.168.2.1:500 but no connection
has been authorized
Jul 30 03:39:10 SR3K-VPN1 Pluto[1574]: packet from 192.168.2.200:61070:
initial Main Mode message received on 192.168.2.1:500 but no connection
has been authorized
Jul 30 03:39:50 SR3K-VPN1 Pluto[1574]: packet from 192.168.2.200:61070:
initial Main Mode message received on 192.168.2.1:500 but no connection
has been authorized
Jul 30 03:40:30 SR3K-VPN1 Pluto[1574]: packet from 192.168.2.200:61070:
initial Main Mode message received on 192.168.2.1:500 but no connection
has been authorized
Jul 30 03:41:10 SR3K-VPN1 Pluto[1574]: packet from 192.168.2.200:61070:
initial Main Mode message received on 192.168.2.1:500 but no connection
has been authorized
Jul 30 03:41:50 SR3K-VPN1 Pluto[1574]: packet from 192.168.2.200:61070:
initial Main Mode message received on 192.168.2.1:500 but no connection
has been authorized
Jul 30 03:42:30 SR3K-VPN1 Pluto[1574]: packet from 192.168.2.200:61070:
initial Main Mode message received on 192.168.2.1:500 but no connection
has been authorized
+ _________________________
+
+ date
Tue Jul 30 03:44:01 UTC 2002
-------------------------------------------------------
This sf.net email is sponsored by:ThinkGeek
Welcome to geek heaven.
http://thinkgeek.com/sf
------------------------------------------------------------------------
leaf-user mailing list: [EMAIL PROTECTED]
https://lists.sourceforge.net/lists/listinfo/leaf-user
SR FAQ: http://leaf-project.org/pub/doc/docmanager/docid_1891.html