Hi,

this worked with an older isakmpd version?  Is this netscreen box
some kind of appliance or just some windows software?

The general problem is, I can only test interoperatibility with
open source vpn solutions on standard hareware.  If people need to
rely on interoperability with appliance X and Windows client Y and
MacOS client Z, I need this kind of hardware/software.

People interrested in providing those, are welcome to contact me :-)

HJ.

On Wed, Jul 27, 2005 at 01:35:34AM -0700, Sean Knox wrote:
> (posted a similar message originally on the IPSec list; thought I'd post 
> here too)
> 
> Hey all-
> 
> I almost have a working VPN between isakmpd and a Netscreen box-- things
> fail at phase 2 as the peers enter quick mode.
> 
> 64.81.74.226 = isakmpd
> 206.14.210.146 = netscreen
> 
> 00:28:11.947907 64.81.74.226.500 > 206.14.210.146.500:  [udp sum ok]
> isakmp v1.0 exchange QUICK_MODE
>       cookie: eb114e8223bc0965->3aac9200ac79d919 msgid: 9e7ccdd5 len: 284
>       payload: HASH len: 24
>       payload: SA len: 56 DOI: 1(IPSEC) situation: IDENTITY_ONLY
>           payload: PROPOSAL len: 44 proposal: 1 proto: IPSEC_ESP spisz: 4
> xforms: 1 SPI: 0xadfa06f3
>               payload: TRANSFORM len: 32
>                   transform: 1 ID: AES
>                       attribute LIFE_TYPE = SECONDS
>                       attribute LIFE_DURATION = 1200
>                       attribute ENCAPSULATION_MODE = TUNNEL
>                       attribute AUTHENTICATION_ALGORITHM = HMAC_SHA
>                       attribute GROUP_DESCRIPTION = 2
>                       attribute KEY_LENGTH = 128
>       payload: NONCE len: 20
>       payload: KEY_EXCH len: 132
>       payload: ID len: 12 type: IPV4_ADDR = 64.81.74.226
>       payload: ID len: 12 type: IPV4_ADDR = 130.94.4.65 [ttl 0] (id 1, len 
>       312)
> 00:28:12.138720 206.14.210.146.500 > 64.81.74.226.500:  [udp sum ok]
> isakmp v1.0 exchange QUICK_MODE
>       cookie: eb114e8223bc0965->3aac9200ac79d919 msgid: 9e7ccdd5 len: 300
>       payload: HASH len: 24
>       payload: SA len: 60 DOI: 1(IPSEC) situation: IDENTITY_ONLY
>           payload: PROPOSAL len: 48 proposal: 1 proto: IPSEC_ESP spisz: 4
> xforms: 1 SPI: 0x0502a8eb
>               payload: TRANSFORM len: 36
>                   transform: 1 ID: AES
>                       attribute LIFE_TYPE = SECONDS
>                       attribute LIFE_DURATION = 000004b0
>                       attribute ENCAPSULATION_MODE = TUNNEL
>                       attribute AUTHENTICATION_ALGORITHM = HMAC_SHA
>                       attribute GROUP_DESCRIPTION = 2
>                       attribute KEY_LENGTH = 128
>       payload: NONCE len: 24
>       payload: KEY_EXCH len: 132
>       payload: ID len: 12 type: IPV4_ADDR = 64.81.74.226
>       payload: ID len: 12 type: IPV4_ADDR = 130.94.4.65 [ttl 0] (id 1, len 
>       328)
> 00:28:15.838995 206.14.210.146.500 > 64.81.74.226.500:  [udp sum ok]
> isakmp v1.0 exchange QUICK_MODE
>       cookie: eb114e8223bc0965->3aac9200ac79d919 msgid: 9e7ccdd5 len: 300
>       payload: HASH len: 24
>       payload: SA len: 60 DOI: 1(IPSEC) situation: IDENTITY_ONLY
>           payload: PROPOSAL len: 48 proposal: 1 proto: IPSEC_ESP spisz: 4
> xforms: 1 SPI: 0x0502a8eb
>               payload: TRANSFORM len: 36
>                   transform: 1 ID: AES
>                       attribute LIFE_TYPE = SECONDS
>                       attribute LIFE_DURATION = 000004b0
>                       attribute ENCAPSULATION_MODE = TUNNEL
>                       attribute AUTHENTICATION_ALGORITHM = HMAC_SHA
>                       attribute GROUP_DESCRIPTION = 2
>                       attribute KEY_LENGTH = 128
>       payload: NONCE len: 24
>       payload: KEY_EXCH len: 132
>       payload: ID len: 12 type: IPV4_ADDR = 64.81.74.226
>       payload: ID len: 12 type: IPV4_ADDR = 130.94.4.65 [ttl 0] (id 1, len 
>       328)
> 
> --snip--
> 
> Note the wacky LIFE_DURATION sent by the netscreen. As shown in the 
> packet capture the netscreen continues to send quick mode packets but 
> isakmpd never responds. I've logs at http://obstacle9.com/isakmpd/ . 
> I've tried different transforms and proposal settings but the result is 
> the same. This happens on a snapshot from a few days ago.
> 
> 
> thanks,
> sk
> 

-- 
pub  1024D/513AEFD9 1999-12-18 Hans-Joerg Hoexer 
                             <[EMAIL PROTECTED]>
Key fingerprint = 83D2 436A 0D3C 34A9 E0FF  4C33 35F6 617C 513A EFD9

Reply via email to