Hi all

I just bring up my ipsec tunnel.

The solution to my problem comes from the article
http://www.freeswan.org/freeswan_trees/freeswan-1.99/doc/faq.html regarding
Interpreting error messages : route-client (or host) exited with status 7.

To resume, i just have to add leftnexthop and rightnexthop to my ipsec.conf for
each computer in the tunnel.

Thanks again Lynn for your help. You don't give me the solution but you give me
the urge to continue because i feel a little bit alone with my problem.

Stephane Froment



guitarlynn wrote:
OK, now that we have a lot of information, let's go through what's here.


 

# defaults for subsequent connection descriptions
conn %default
    # How persistent to be in (re)keying negotiations (0 means very).
    keyingtries=0
    # RSA authentication with keys from DNS.
    # authby=rsasig
    # leftrsasigkey=%dns
    # rightrsasigkey=%dns
    authby=secret
    left=ip.pub.lik.254
    leftsubnet=192.168.0.0/24
    leftfirewall=yes
    pfs=yes
    auto=add

conn w2k-road-warriors
    right=%any

 

Everything looks plausible here. I would get rid of the unnecessary
connections. We truly wish you wouldn't change lines to hide your
public ip address... You spend a lot of time doing it, you can make
errors by hiding it, and we could get it if we wanted anyway. Changing
it will not protect you from getting hacked if someone wanted to (and
believe me, noone here has any interest in hacking you). I would also
get rid of the *firewall=yes line, if the connection goes down, you will
be forced to reboot the firewall to reconnect, which may be the problem....see
later in the post. I have information on manually setting
the firewall to allow the connections w/o this option at
http://leaf.sourceforge.net/devel/guitarlynn/ipsec.txt  and Tom has
instruction for doing the same on http://www.shorewall.net or
http://leaf.sourceforge.net/devel/jnilo/buipsec.html#AEN1436 .


 

Nov 16 13:35:34 firewall ipsec_setup: Starting FreeS/WAN IPsec
1.98b... Nov 16 13:35:35 firewall ipsec_setup: Using
/lib/modules/ipsec.o Nov 16 13:35:35 firewall ipsec_setup: KLIPS
ipsec0 on ppp0 ip.pub.lik.254 peer ip.pub.lik.1/32
Nov 16 13:35:35 firewall ipsec_setup: ...FreeS/WAN IPsec started
Nov 16 13:38:37 firewall kernel: Shorewall:FORWARD:REJECT:IN=ipsec0
OUT=eth1 SRC=62.147.151.223 DST=192.168.0.201 LEN=89 TOS=0x00
PREC=0x00 TTL=127 ID=60576 PROTO=UDP SPT=3309 DPT=161 LEN=69
 

OK, ipsec starts, then rejects a packet from the roadwarrior, we'll
check for the error further down.


 

+ _________________________ plog
+
+ sed -n 2,$p /var/log/auth.log
+ egrep -i pluto
+ cat
Nov 16 13:35:35 firewall ipsec__plutorun: Starting Pluto subsystem...
Nov 16 13:35:35 firewall pluto[24215]: Starting Pluto (FreeS/WAN
Version 1.98b) Nov 16 13:35:35 firewall pluto[24215]:   including
X.509 patch (Version 0.9.13) Nov 16 13:35:35 firewall pluto[24215]:
Could not change to directory '/etc/ipsec.d/cacerts'
Nov 16 13:35:35 firewall pluto[24215]: Could not change to directory
'/etc/ipsec.d/crls'
Nov 16 13:35:35 firewall pluto[24215]:   loaded my default X.509 cert
file '/etc/x509cert.der' (7 bytes)
Nov 16 13:35:35 firewall pluto[24215]:   file coded in unknown
format, discarded Nov 16 13:35:35 firewall pluto[24215]: OpenPGP
certificate file '/etc/pgpcert.pgp' not found
 

It appears to be trying to load a x509 cert, If I remember correctly the
Bering ipsec package(s) offer seperate packages for use of x509 certs,
but this could be a possible problem. I know Dachstein offers an add-on
package for x509 certs.


 

Nov 16 13:35:36 firewall pluto[24215]: added connection description
"sample" Nov 16 13:35:37 firewall pluto[24215]: added connection
description "w2k-road-warriors"
Nov 16 13:35:37 firewall pluto[24215]: listening for IKE messages
Nov 16 13:35:37 firewall pluto[24215]: adding interface ipsec0/ppp0
ip.pub.lik.254 Nov 16 13:35:37 firewall pluto[24215]: loading secrets
from "/etc/ipsec.secrets" Nov 16 13:38:36 firewall pluto[24215]:
packet from 62.147.151.223:500: ignoring Vendor ID payload
Nov 16 13:38:36 firewall pluto[24215]: "w2k-road-warriors"[1]
62.147.151.223 #1: responding to Main Mode from unknown peer
62.147.151.223
Nov 16 13:38:36 firewall pluto[24215]: "w2k-road-warriors"[1]
62.147.151.223 #1: Peer ID is ID_IPV4_ADDR: '62.147.151.223'
Nov 16 13:38:36 firewall pluto[24215]: "w2k-road-warriors"[1]
62.147.151.223 #1: sent MR3, ISAKMP SA established
Nov 16 13:38:37 firewall pluto[24215]: "w2k-road-warriors"[1]
62.147.151.223 #2: responding to Quick Mode
 

Here your "w2k-road-warriors" tunnel comes up successfully, all that has not
happened here is the successful transmission
of information across the tunnel.

 

Nov 16 13:38:37 firewall pluto[24215]: "w2k-road-warriors"[1]
62.147.151.223 #2: route-client output: RTNETLINK answers: Network is
unreachable Nov 16 13:38:37 firewall pluto[24215]:
 

This is the indication of the problem. For some reason, the
network becomes unreachable and/or the tunnel bombs out.
Why this is happening is the only unclear problem, I can't
say clearly and monitoring tcpdump may be the only good way of locating exactly
why. Possibly your ISP is blocking
the packets or the road-warrior kills the connection.

The rest of the log indicates that the boxes attempt to restart the
tunnel, but fail. This is what normally happens after a dropped
tunnel with the *firewall=yes" option and why I do not suggest using this option.

I hope this helps,
~Lynn
 






-------------------------------------------------------
This sf.net email is sponsored by: To learn the basics of securing your web site
with SSL, click here to get a FREE TRIAL of a Thawte Server Certificate:
http://www.gothawte.com/rd524.html
------------------------------------------------------------------------
leaf-user mailing list: [EMAIL PROTECTED]
https://lists.sourceforge.net/lists/listinfo/leaf-user
SR FAQ: http://leaf-project.org/pub/doc/docmanager/docid_1891.html








        --------------------------------
        Interface WebMail / Magic OnLine
          --> http://webmail.magic.fr




-------------------------------------------------------
This sf.net email is sponsored by: To learn the basics of securing 
your web site with SSL, click here to get a FREE TRIAL of a Thawte 
Server Certificate: http://www.gothawte.com/rd524.html
------------------------------------------------------------------------
leaf-user mailing list: [EMAIL PROTECTED]
https://lists.sourceforge.net/lists/listinfo/leaf-user
SR FAQ: http://leaf-project.org/pub/doc/docmanager/docid_1891.html

Reply via email to