Hi all I just bring up my ipsec tunnel.
The solution to my problem comes from the article http://www.freeswan.org/freeswan_trees/freeswan-1.99/doc/faq.html regarding Interpreting error messages : route-client (or host) exited with status 7. To resume, i just have to add leftnexthop and rightnexthop to my ipsec.conf for each computer in the tunnel. Thanks again Lynn for your help. You don't give me the solution but you give me the urge to continue because i feel a little bit alone with my problem. Stephane Froment guitarlynn wrote: OK, now that we have a lot of information, let's go through what's here. # defaults for subsequent connection descriptions conn %default # How persistent to be in (re)keying negotiations (0 means very). keyingtries=0 # RSA authentication with keys from DNS. # authby=rsasig # leftrsasigkey=%dns # rightrsasigkey=%dns authby=secret left=ip.pub.lik.254 leftsubnet=192.168.0.0/24 leftfirewall=yes pfs=yes auto=add conn w2k-road-warriors right=%any Everything looks plausible here. I would get rid of the unnecessary connections. We truly wish you wouldn't change lines to hide your public ip address... You spend a lot of time doing it, you can make errors by hiding it, and we could get it if we wanted anyway. Changing it will not protect you from getting hacked if someone wanted to (and believe me, noone here has any interest in hacking you). I would also get rid of the *firewall=yes line, if the connection goes down, you will be forced to reboot the firewall to reconnect, which may be the problem....see later in the post. I have information on manually setting the firewall to allow the connections w/o this option at http://leaf.sourceforge.net/devel/guitarlynn/ipsec.txt and Tom has instruction for doing the same on http://www.shorewall.net or http://leaf.sourceforge.net/devel/jnilo/buipsec.html#AEN1436 . Nov 16 13:35:34 firewall ipsec_setup: Starting FreeS/WAN IPsec 1.98b... Nov 16 13:35:35 firewall ipsec_setup: Using /lib/modules/ipsec.o Nov 16 13:35:35 firewall ipsec_setup: KLIPS ipsec0 on ppp0 ip.pub.lik.254 peer ip.pub.lik.1/32 Nov 16 13:35:35 firewall ipsec_setup: ...FreeS/WAN IPsec started Nov 16 13:38:37 firewall kernel: Shorewall:FORWARD:REJECT:IN=ipsec0 OUT=eth1 SRC=62.147.151.223 DST=192.168.0.201 LEN=89 TOS=0x00 PREC=0x00 TTL=127 ID=60576 PROTO=UDP SPT=3309 DPT=161 LEN=69 OK, ipsec starts, then rejects a packet from the roadwarrior, we'll check for the error further down. + _________________________ plog + + sed -n 2,$p /var/log/auth.log + egrep -i pluto + cat Nov 16 13:35:35 firewall ipsec__plutorun: Starting Pluto subsystem... Nov 16 13:35:35 firewall pluto[24215]: Starting Pluto (FreeS/WAN Version 1.98b) Nov 16 13:35:35 firewall pluto[24215]: including X.509 patch (Version 0.9.13) Nov 16 13:35:35 firewall pluto[24215]: Could not change to directory '/etc/ipsec.d/cacerts' Nov 16 13:35:35 firewall pluto[24215]: Could not change to directory '/etc/ipsec.d/crls' Nov 16 13:35:35 firewall pluto[24215]: loaded my default X.509 cert file '/etc/x509cert.der' (7 bytes) Nov 16 13:35:35 firewall pluto[24215]: file coded in unknown format, discarded Nov 16 13:35:35 firewall pluto[24215]: OpenPGP certificate file '/etc/pgpcert.pgp' not found It appears to be trying to load a x509 cert, If I remember correctly the Bering ipsec package(s) offer seperate packages for use of x509 certs, but this could be a possible problem. I know Dachstein offers an add-on package for x509 certs. Nov 16 13:35:36 firewall pluto[24215]: added connection description "sample" Nov 16 13:35:37 firewall pluto[24215]: added connection description "w2k-road-warriors" Nov 16 13:35:37 firewall pluto[24215]: listening for IKE messages Nov 16 13:35:37 firewall pluto[24215]: adding interface ipsec0/ppp0 ip.pub.lik.254 Nov 16 13:35:37 firewall pluto[24215]: loading secrets from "/etc/ipsec.secrets" Nov 16 13:38:36 firewall pluto[24215]: packet from 62.147.151.223:500: ignoring Vendor ID payload Nov 16 13:38:36 firewall pluto[24215]: "w2k-road-warriors"[1] 62.147.151.223 #1: responding to Main Mode from unknown peer 62.147.151.223 Nov 16 13:38:36 firewall pluto[24215]: "w2k-road-warriors"[1] 62.147.151.223 #1: Peer ID is ID_IPV4_ADDR: '62.147.151.223' Nov 16 13:38:36 firewall pluto[24215]: "w2k-road-warriors"[1] 62.147.151.223 #1: sent MR3, ISAKMP SA established Nov 16 13:38:37 firewall pluto[24215]: "w2k-road-warriors"[1] 62.147.151.223 #2: responding to Quick Mode Here your "w2k-road-warriors" tunnel comes up successfully, all that has not happened here is the successful transmission of information across the tunnel. Nov 16 13:38:37 firewall pluto[24215]: "w2k-road-warriors"[1] 62.147.151.223 #2: route-client output: RTNETLINK answers: Network is unreachable Nov 16 13:38:37 firewall pluto[24215]: This is the indication of the problem. For some reason, the network becomes unreachable and/or the tunnel bombs out. Why this is happening is the only unclear problem, I can't say clearly and monitoring tcpdump may be the only good way of locating exactly why. Possibly your ISP is blocking the packets or the road-warrior kills the connection. The rest of the log indicates that the boxes attempt to restart the tunnel, but fail. This is what normally happens after a dropped tunnel with the *firewall=yes" option and why I do not suggest using this option. I hope this helps, ~Lynn ------------------------------------------------------- This sf.net email is sponsored by: To learn the basics of securing your web site with SSL, click here to get a FREE TRIAL of a Thawte Server Certificate: http://www.gothawte.com/rd524.html ------------------------------------------------------------------------ leaf-user mailing list: [EMAIL PROTECTED] https://lists.sourceforge.net/lists/listinfo/leaf-user SR FAQ: http://leaf-project.org/pub/doc/docmanager/docid_1891.html -------------------------------- Interface WebMail / Magic OnLine --> http://webmail.magic.fr ------------------------------------------------------- This sf.net email is sponsored by: To learn the basics of securing your web site with SSL, click here to get a FREE TRIAL of a Thawte Server Certificate: http://www.gothawte.com/rd524.html ------------------------------------------------------------------------ leaf-user mailing list: [EMAIL PROTECTED] https://lists.sourceforge.net/lists/listinfo/leaf-user SR FAQ: http://leaf-project.org/pub/doc/docmanager/docid_1891.html