This is fixed in 3.7-stable and above. HJ. On Thu, Sep 22, 2005 at 12:37:16PM +0200, Toni Mueller wrote: > Hello, > > I have three machines: one 3.7, one 3.6, and one Windows 2000 laptop. > The client software on the laptop is this: > > ftp://ftp.funkwerk-ec.com/pub/ipsec_client/bintec_secure_client_v11.zip > > aka "NCP Secure Entry" which usually runs very nicely. > > The two OpenBSD machines are configured identically, except for IP > numbers and server certificates. Everything is set up to run with X.509 > certificates off of my private CA. > > Connecting from the windows machine to the 3.6 machine works fine as > long as I only use the primary IP number (it has two from different > networks), but connecting to the 3.7 machine, which has only one IP > number, yields "INVALID PAYLOAD TYPE", and nothing works. This is what > I get with tcpdump (IP numbers fudged): > > > # /usr/sbin/tcpdump -n -vvv -e -s 1500 -i bge0 \(esp or port 500 or port 4500 > \) and host 1.2.3.4 > tcpdump: listening on bge0, link-type EN10MB > 12:15:35.791290 0:0:c:3e:48:dc 0:e0:81:63:16:d2 0800 294: 1.2.3.4.500 > > 5.6.7.8.500: [udp sum ok] isakmp v1.0 exchange ID_PROT > cookie: 0c052e9abace2953->0000000000000000 msgid: 00000000 len: 252 > payload: SA len: 60 DOI: 1(IPSEC) situation: IDENTITY_ONLY > payload: PROPOSAL len: 48 proposal: 1 proto: ISAKMP spisz: 0 > xforms: 1 > payload: TRANSFORM len: 40 > transform: 1 ID: ISAKMP > attribute ENCRYPTION_ALGORITHM = AES_CBC > attribute HASH_ALGORITHM = SHA > attribute AUTHENTICATION_METHOD = RSA_SIG > attribute GROUP_DESCRIPTION = MODP_1536 > attribute LIFE_TYPE = SECONDS > attribute LIFE_DURATION = 00007080 > attribute KEY_LENGTH = 256 > payload: VENDOR len: 12 > payload: VENDOR len: 12 > payload: VENDOR len: 20 (supports v3 NAT-T, > draft-ietf-ipsec-nat-t-ike-03) > payload: VENDOR len: 20 (supports v2 NAT-T, > draft-ietf-ipsec-nat-t-ike-02) > payload: VENDOR len: 20 (supports v1 NAT-T, > draft-ietf-ipsec-nat-t-ike-00) > payload: VENDOR len: 20 (supports NAT-T, RFC 3947) > payload: VENDOR len: 20 (supports DPD v1.0) > payload: VENDOR len: 20 > payload: VENDOR len: 20 (ttl 126, id 1731, len 280) > 12:15:35.797183 0:e0:81:63:16:d2 0:0:c:3e:48:dc 0800 210: 5.6.7.8.500 > > 1.2.3.4.500: [udp sum ok] isakmp v1.0 exchange ID_PROT > cookie: 0c052e9abace2953->6297719b10aab610 msgid: 00000000 len: 168 > payload: SA len: 60 DOI: 1(IPSEC) situation: IDENTITY_ONLY > payload: PROPOSAL len: 48 proposal: 1 proto: ISAKMP spisz: 0 > xforms: 1 > payload: TRANSFORM len: 40 > transform: 1 ID: ISAKMP > attribute ENCRYPTION_ALGORITHM = AES_CBC > attribute HASH_ALGORITHM = SHA > attribute AUTHENTICATION_METHOD = RSA_SIG > attribute GROUP_DESCRIPTION = MODP_1536 > attribute LIFE_TYPE = SECONDS > attribute LIFE_DURATION = 00007080 > attribute KEY_LENGTH = 256 > payload: VENDOR len: 20 (supports v2 NAT-T, > draft-ietf-ipsec-nat-t-ike-02) > payload: VENDOR len: 20 (supports v3 NAT-T, > draft-ietf-ipsec-nat-t-ike-03) > payload: VENDOR len: 20 (supports NAT-T, RFC 3947) > payload: VENDOR len: 20 (supports DPD v1.0) (ttl 64, id 13783, len > 196) > 12:15:36.113303 0:0:c:3e:48:dc 0:e0:81:63:16:d2 0800 358: 1.2.3.4.500 > > 5.6.7.8.500: [udp sum ok] isakmp v1.0 exchange ID_PROT > cookie: 0c052e9abace2953->6297719b10aab610 msgid: 00000000 len: 316 > payload: KEY_EXCH len: 196 > payload: NONCE len: 44 > payload: <unknown> len: 24 > payload: <unknown> len: 24 (ttl 126, id 1732, len 344) > 12:15:36.115954 0:e0:81:63:16:d2 0:0:c:3e:48:dc 0800 82: 5.6.7.8.500 > > 1.2.3.4.500: [udp sum ok] isakmp v1.0 exchange INFO > cookie: d6da19765da85f25->0000000000000000 msgid: 00000000 len: 40 > payload: NOTIFICATION len: 12 > notification: INVALID PAYLOAD TYPE (ttl 64, id 29429, len 68) > 12:16:05.215393 0:0:c:3e:48:dc 0:e0:81:63:16:d2 0800 358: 1.2.3.4.500 > > 5.6.7.8.500: [udp sum ok] isakmp v1.0 exchange ID_PROT > cookie: 0c052e9abace2953->6297719b10aab610 msgid: 00000000 len: 316 > payload: KEY_EXCH len: 196 > payload: NONCE len: 44 > payload: <unknown> len: 24 > payload: <unknown> len: 24 (ttl 126, id 1733, len 344) > 12:16:05.217956 0:e0:81:63:16:d2 0:0:c:3e:48:dc 0800 82: 5.6.7.8.500 > > 1.2.3.4.500: [udp sum ok] isakmp v1.0 exchange INFO > cookie: 6af35ef1d456e460->0000000000000000 msgid: 00000000 len: 40 > payload: NOTIFICATION len: 12 > notification: INVALID PAYLOAD TYPE (ttl 64, id 15575, len 68) > 12:16:09.220412 0:0:c:3e:48:dc 0:e0:81:63:16:d2 0800 358: 1.2.3.4.500 > > 5.6.7.8.500: [udp sum ok] isakmp v1.0 exchange ID_PROT > cookie: 0c052e9abace2953->6297719b10aab610 msgid: 00000000 len: 316 > payload: KEY_EXCH len: 196 > payload: NONCE len: 44 > payload: <unknown> len: 24 > payload: <unknown> len: 24 (ttl 126, id 1734, len 344) > 12:16:09.222948 0:e0:81:63:16:d2 0:0:c:3e:48:dc 0800 82: 5.6.7.8.500 > > 1.2.3.4.500: [udp sum ok] isakmp v1.0 exchange INFO > cookie: 8e945543b69f3d8e->0000000000000000 msgid: 00000000 len: 40 > payload: NOTIFICATION len: 12 > notification: INVALID PAYLOAD TYPE (ttl 64, id 25815, len 68) > 12:16:14.226697 0:0:c:3e:48:dc 0:e0:81:63:16:d2 0800 358: 1.2.3.4.500 > > 5.6.7.8.500: [udp sum ok] isakmp v1.0 exchange ID_PROT > cookie: 0c052e9abace2953->6297719b10aab610 msgid: 00000000 len: 316 > payload: KEY_EXCH len: 196 > payload: NONCE len: 44 > payload: <unknown> len: 24 > payload: <unknown> len: 24 (ttl 126, id 1735, len 344) > 12:16:14.229247 0:e0:81:63:16:d2 0:0:c:3e:48:dc 0800 82: 5.6.7.8.500 > > 1.2.3.4.500: [udp sum ok] isakmp v1.0 exchange INFO > cookie: d7059971fb358e93->0000000000000000 msgid: 00000000 len: 40 > payload: NOTIFICATION len: 12 > notification: INVALID PAYLOAD TYPE (ttl 64, id 15834, len 68) > > > Btw, on the 3.6 box, when I configure the client to talk on the > aliased address, it doesn't work either, but with a very different > error message. I'm willing to ignore this problem if I can get > the 3.7 (3.8?) problem solved. > > > Any help is very much appreciated! > > > > Best, > --Toni++ > >
-- Dipl.-Inf. Hans-Joerg Hoexer room: 07.137 phone:+49 9131 852 7915 Dept. of Computer Science 3 University of Erlangen-Nuremberg Martensstr. 3, 91058 Erlangen, Germany