Hello community, I wana do something like:

http://openbsd.org/papers/asiabsdcon07-ipsec/mgp00065.html

I have:

cat /etc/ipsec.conf

ike dynamic from any to any \
        main auth  hmac-sha1 enc aes group modp1024 \
        quick auth hmac-sha1 enc aes psk secret

; ike passive, ike passive esp, ike esp, etc - no results.

Client side:

http://www.thegreenbow.com/vpn.html

Server side:

isakmpd -4dKv && ipsecctl -F -f /etc/ipsec.conf : 

143203.134966 Default isakmpd: phase 1 done: initiator id c0a80321: 
192.168.3.33, responder id 5851eaa2: XX.XX.XX.XX, src: XX.XX.XX.XX dst:
++YY.YY.YY.YY 
143203.154202 Default responder_recv_HASH_SA_NONCE: peer proposed invalid phase 
2 IDs: initiator id c0a80321: 192.168.3.33, responder id
+0a0+10100/ffffff00: 10.1.1.0/255.255.255.0
143203.154348 Default dropped message from YY.YY.YY.YY port 59312 due to 
notification type NO_PROPOSAL_CHOSEN
143210.166313 Default responder_recv_HASH_SA_NONCE: peer proposed invalid phase 
2 IDs: initiator id c0a80321: 192.168.3.33, responder id
+0a0+10100/ffffff00: 10.1.1.0/255.255.255.0

; In this case I'm not along: 
                                
http://marc.info/?l=openbsd-misc&m=118429600703803&w=2
                                
http://marc.info/?l=openbsd-misc&m=118434909801312&w=2 

Parts from /etc/pf.conf relating to Subj:

scrub in no-df

pass in on $ext_if proto udp to ($ext_if) port { 500 4500 }
pass in on $ext_if proto esp to ($ext_if)
pass on enc0 

Any ideas? Thoughts? Or maybe I'm just missed something? I sincerely appreciate 
any assistance.
Thank you.

PS: http://www.thegreenbow.com/vpn_faq.html - done, no results.
    http://www.allard.nu/openbsd/ - done, no results.

PS2: Tried with different algorithms : 3des, aes, etc - no results. System: 
OpenBSD 4.1-stable.

My continued thanks for any assistance,
    
-- 
Sergey Prysiazhnyi

Reply via email to