Hi,

 I want to setup following IPSec tunneling mode
[IPHDR][IPoptions][AH][ESP][IPHDR2][IPoptions][TCP][data]

given in
http://anoncvs.openbsd.lt/cgi-bin/viewcvs.cgi/www/faq/faq13.html?rev=1.6

Following is my network setup (or in attachment)


Net-A: 192.3.20.0/24
Net-B: 192.3.40.0/24
Net-C: 195.85.10.32/27 (private network)

open1: 192.3.20.238
gate:  192.3.20.1 and 192.3.40.1
open15:192.3.40.55 (Interface to B), 195.85.10.33 (interface to C)
open3: 195.85.10.34

Setup IPSec tunnel mode:
[IPHDR][IPoptions][AH][ESP][IPHDR2][IPoptions][TCP][data]

I failed to achieve following
1. setup IPSec ESP and AH tunnel between open1 and open15
2. open1 able to access open15 and IP packets are IPSec ESP and AH tunnel
3. open1 able to access private network (195.85.10.32) and IP packets are
IPSec tunnel


I run "isakmpd -d -DA=99" in open1 and open15.

>From open1, I ping open3 and ping command doesn't print reply message.
Ethereal shows IP packet 174 bytes
open1 to open3: [IP | ESP 116 bytes ]
open3 to open1: [IP | AH | ESP 116 bytes]

>From open3, I ping open 1 and no reply packet captured by Ethereal
open3 to open1: [IP | AH | ESP 116 bytes]


1. Can this IPSec tunnel mode can be setup and valid ?
2. Why IP packet format from open1 to open3, and open3 to open1 is different?
3. Eventually I will connect open1 to GPRS network and setup IPSec in open1
and open15,
   so i have to achieve open1 to open15, and open1 to private network setup.
Can this be done ?


isampkd.conf and isakmpd.policy for open1:
KeyNote-Version: 2
Comment: This policy accepts ESP SAs from a remote that uses the right
password
        $OpenBSD: policy,v 1.4 2000/01/26 15:20:40 niklas Exp $
        $EOM: policy,v 1.5 2000/01/26 14:03:07 niklas Exp $
Authorizer: "POLICY"
Licensees: "passphrase:mekmitasdigoat"
Conditions: app_domain == "IPsec policy" -> "true";

#       $OpenBSD: singlehost-west.conf,v 1.8 2000/05/03 13:37:33 niklas Exp $
#       $EOM: singlehost-west.conf,v 1.8 2000/05/03 13:25:25 niklas Exp $

# A configuration sample for the isakmpd ISAKMP/Oakley (aka IKE) daemon.

[Phase 1]
192.3.40.55 =           ISAKMP-open15

[Phase 2]
Connections=            IPsec-open15

[ISAKMP-open15]
Phase=                  1
Transport=              udp
Address=                192.3.40.55
Configuration=          Default-main-mode
Authentication=         mekmitasdigoat

[IPsec-open15]
Phase=                  2
ISAKMP-peer=            ISAKMP-open15
Configuration=          Default-quick-mode
Local-ID=               Net-open1
Remote-ID=              Net-open15


[Net-open1]
ID-type=                IPV4_ADDR_SUBNET
Network=                192.3.20.238
Netmask=                255.255.255.255

[Net-open15]
ID-type=                IPV4_ADDR_SUBNET
Network=                195.85.10.32
Netmask=                255.255.255.224

[Default-main-mode]
DOI=                    IPSEC
EXCHANGE_TYPE=          ID_PROT
Transforms=             3DES-MD5

[3DES-MD5]
ENCRYPTION_ALGORITHM=   3DES_CBC
HASH_ALGORITHM=         MD5
AUTHENTICATION_METHOD=  PRE_SHARED
GROUP_DESCRIPTION=      MODP_1024
Life=                   LIFE_3600_SECS

[DES-MD5]
ENCRYPTION_ALGORITHM=   DES_CBC
HASH_ALGORITHM=         MD5
AUTHENTICATION_METHOD=  PRE_SHARED
GROUP_DESCRIPTION=      MODP_1024
Life=                   LIFE_3600_SECS

[Default-quick-mode]
DOI=                    IPSEC
EXCHANGE_TYPE=          QUICK_MODE
Suites=                 QM-ESP-3DES-MD5-AH-MD5-SUITE

# Quick mode protection suites
##############################
# 3DES
[QM-ESP-3DES-MD5-AH-MD5-SUITE]
Protocols=              QM-ESP-3DES-MD5,QM-AH-MD5

# Quick mode protocols
#############################
# 3DES
[QM-ESP-3DES-MD5]
PROTOCOL_ID=            IPSEC_ESP
Transforms=             QM-ESP-3DES-MD5-XF

# AH
[QM-AH-MD5]
PROTOCOL_ID=            IPSEC_AH
Transforms=             QM-AH-MD5-XF

# Quick mode transforms
#############################
# 3DES
[QM-ESP-3DES-MD5-XF]
TRANSFORM_ID=                   3DES
ENCAPSULATION_MODE=             TUNNEL
AUTHENTICATION_ALGORITHM=       HMAC_MD5
GROUP_DESCRIPTION=      MODP_1024
Life=                           LIFE_3600_SECS

# AH Transform
[QM-AH-MD5-XF]
TRANSFORM_ID=                   MD5
ENCAPSULATION_MODE=             TRANSPORT
AUTHENTICATION_ALGORITHM=       HMAC_MD5
GROUP_DESCRIPTION=      MODP_1024
Life=                           LIFE_3600_SECS

[LIFE_3600_SECS]
LIFE_TYPE=              SECONDS
LIFE_DURATION=          3600,1800:7200


/////////////////////
isampkd.conf and isakmpd.policy for open15:
KeyNote-Version: 2
Comment: This policy accepts ESP SAs from a remote that uses the right
password
        $OpenBSD: policy,v 1.4 2000/01/26 15:20:40 niklas Exp $
        $EOM: policy,v 1.5 2000/01/26 14:03:07 niklas Exp $
Authorizer: "POLICY"
Licensees: "passphrase:mekmitasdigoat"
Conditions: app_domain == "IPsec policy" -> "true";

#       $OpenBSD: singlehost-west.conf,v 1.8 2000/05/03 13:37:33 niklas Exp $
#       $EOM: singlehost-west.conf,v 1.8 2000/05/03 13:25:25 niklas Exp $

# A configuration sample for the isakmpd ISAKMP/Oakley (aka IKE) daemon.

[Phase 1]
192.3.20.238=           ISAKMP-open1

[Phase 2]
Connections=            IPsec-svr-open1

[ISAKMP-open1]
Phase=                  1
Transport=              udp
Address=                192.3.20.238
Configuration=          Default-main-mode
Authentication=         mekmitasdigoat

[IPsec-svr-open1]
Phase=                  2
ISAKMP-peer=            ISAKMP-open1
Configuration=          Default-quick-mode
Local-ID=               Net-open15
Remote-ID=              Net-open1

[Net-open15]
ID-type=                IPV4_ADDR_SUBNET
Network=                195.85.10.32
Netmask=                255.255.255.224

[Net-open1]
ID-type=                IPV4_ADDR_SUBNET
Network=                192.3.20.238
Netmask=                255.255.255.255

[Default-main-mode]
DOI=                    IPSEC
EXCHANGE_TYPE=          ID_PROT
Transforms=             3DES-MD5

[Default-quick-mode]
DOI=                    IPSEC
EXCHANGE_TYPE=          QUICK_MODE
Suites=                 QM-ESP-3DES-MD5-AH-MD5-SUITE

[3DES-MD5]
ENCRYPTION_ALGORITHM=   3DES_CBC
HASH_ALGORITHM=         MD5
AUTHENTICATION_METHOD=  PRE_SHARED
GROUP_DESCRIPTION=      MODP_1024
Life=                   LIFE_3600_SECS


# Quick mode protection suites
##############################
# ESP + AH
[QM-ESP-3DES-MD5-AH-MD5-SUITE]
Protocols=              QM-ESP-3DES-MD5,QM-AH-MD5

# Quick mode protocols
#############################
[QM-ESP-3DES-MD5]
PROTOCOL_ID=            IPSEC_ESP
Transforms=             QM-ESP-3DES-MD5-XF

# AH
[QM-AH-MD5]
PROTOCOL_ID=            IPSEC_AH
Transforms=             QM-AH-MD5-XF

# Quick mode transforms
#############################
# 3DES
[QM-ESP-3DES-MD5-XF]
TRANSFORM_ID=                   3DES
ENCAPSULATION_MODE=             TUNNEL
AUTHENTICATION_ALGORITHM=       HMAC_MD5
GROUP_DESCRIPTION=      MODP_1024
Life=                           LIFE_3600_SECS


# AH Transform
[QM-AH-MD5-XF]
TRANSFORM_ID=                   MD5
ENCAPSULATION_MODE=             TRANSPORT
AUTHENTICATION_ALGORITHM=       HMAC_MD5
GROUP_DESCRIPTION=      MODP_1024
Life=                           LIFE_3600_SECS

[LIFE_3600_SECS]
LIFE_TYPE=              SECONDS
LIFE_DURATION=          3600,1800:7200

[demime 1.01d removed an attachment of type image/jpeg which had a name of 
network.jpg]

Reply via email to