On 2021-05-04, Giacomo Marconi <g.marc...@comune.arezzo.it> wrote:
> Hi all
>
> I have some openbsd boxes as vpn endpoint to a Palo Alto Pa-820.
>
> In my last VPN config (unsing 6.8) I see in the logs that isakmpd is 
> expexting RSA_SIG as authentication method, while in ipsec.conf I set the psk 
> value.

This usually means that the packets seen from the other side didn't
match your configuration (possibly a wrong IP or something) and
instead were matched by the implicit default phase 1 configuration
(which is 3DES-SHA-RSA_SIG)

If that doesn't give any clues, bump up logging in isakmpd. This
set of debug levels (worked out by studying source code) enables
most logs that are possible to do without being so noisy that
they're useless.

isakmpd_flags="-Kv -D0=29 -D1=49 -D2=10 -D3=30 -D5=20 -D6=30 -D8=30 -D9=30 
-D10=20"

Sometimes looking at captured packets is useful too. For phase 1
negotiation then just watching the network interface is usually
good

tcpdump -vvs1500 -i $interface port 500 or 4500 

(For problems with phase 2 nego you often need to enable isakmpd's
cleartext IKE packet capture via the isakmpd.fifo control socket
but you aren't that far).


Reply via email to