Hi Thanks, for your replies. I have some additional information now - the cisco config (below) - though it still looks quite sensibly configured (to someone who doent know any cisco commands ;)), and the errors remain :(
Regards, Richard --- Erik Carlseen <[EMAIL PROTECTED]> wrote: > It would be helpful if you could provide sanitized > configuration files > from both the OpenBSD box and the PIX (just search & > replace out > anything confidential, but pleasebe consistant). > > Also, I've found (at least for me) that a good > command line for debug > purposes is: > > isakmpd -f- -d -L -D0=79 -D1=70 -D2=90 -D3=80 -D4=99 > -D5=99 -D6=99 > -D7=99 -D8=99 -D9=99 > > For Phase 2 debugging, pay extra attention to the > 'SA' debug messages. > > Regards, > > Erik Carlseen and... --- Petr Ruzicka <[EMAIL PROTECTED]> wrote: > Hi, could you get configuration of PIX. Not all of it required, just isakmp > and crypto map stuff. > Do they use xauth ? > > Petr R. >> Cisco config (sanitized): access-list cryptomap_20 permit ip 10.3.3.8 255.255.255.248 192.168.157.0 255.255.255.0 sysopt connection permit-ipsec crypto ipsec transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac crypto map some_map 20 ipsec-isakmp crypto map some_map 20 match address cryptomap_20 crypto map some_map 20 set peer 10.1.1.17 crypto map some_map 20 set transform-set ESP-3DES-MD5 crypto map some_map 20 set security-association lifetime seconds 1800 kilobytes 4608000 crypto map some_map interface outside isakmp enable outside isakmp key shared-secret address 10.1.1.17 netmask 255.255.255.255 isakmp identity address isakmp policy 20 authentication pre-share isakmp policy 20 encryption 3des isakmp policy 20 hash md5 isakmp policy 20 group 2 isakmp policy 20 lifetime 86400 >> /etc/isakmpd/isakmpd.conf config (sanitized) [Phase 1] 10.0.0.81= peer-machine-WCpix [Phase 2] Connections= VPN-SZ-WCSQL [peer-machine-WCpix] Phase= 1 Transport= udp Address= 10.0.0.81 Local-address= 10.1.1.17 Configuration= Default-main-mode Authentication= shared-secret [VPN-SZ-WCSQL] Phase= 2 ISAKMP-peer= peer-machine-WCpix Configuration= Default-quick-mode Local-ID= SZ-internal-network Remote-ID= WCSQL-subnet [SZ-internal-network] ID-type= IPV4_ADDR_SUBNET Network= 192.168.157.0 Netmask= 255.255.255.0 [WCSQL-subnet] ID-type= IPV4_ADDR_SUBNET Network= 10.3.3.8 Netmask= 255.255.255.248 [Default-main-mode] DIO= IPSEC EXCHANGE_TYPE= ID_PROT Transforms= 3DES-MD5 [Default-quick-mode] DOI= IPSEC EXCHANGE_TYPE= QUICK_MODE Suites= QM-ESP-3DES-MD5-SUITE [3DES-MD5] GROUP_DESCRIPTION= MODP_1024 [QM-ESP-3DES-MD5-PFS-SUITE] GROUP_DESCRIPTION= MODP_1024 # >> And some parts of the debug log at your suggested debug level, at points >> where errors seem to occur. . . 104124.523585 Exch 90 dpd_check_vendor_payload: bad size 8 != 16 . . 104124.582274 SA 60 sa_create: sa 0x3c067d00 phase 2 added to exchange 0x3c067a00 (VPN-SZ-WCSQL) 104124.582284 Mesg 90 message_alloc: allocated 0x3c06b700 104124.582292 SA 80 sa_reference: SA 0x3c067900 now has 6 references 104124.582301 Cryp 60 hash_get: requested algorithm 0 104124.582399 Misc 70 attribute_set_constant: no GROUP_DESCRIPTION in the QM-ESP-3DES-MD5-XF section 104124.582433 Sdep 80 pf_key_v2_write: iov[0]: 104124.582448 Sdep 80 02010002 0a000000 01000000f2100000 104124.582456 Sdep 80 pf_key_v2_write: iov[1]: 104124.582472 Sdep 80 03000500 00000000 10020000 ca949151 00000000 00000000 104124.582480 Sdep 80 pf_key_v2_write: iov[2]: 104124.582496 Sdep 80 03000600 00000000 10020000 cb304f11 00000000 00000000 104124.582504 Sdep 80 pf_key_v2_write: iov[3]: . . 104124.665321 Cryp 30 crypto_decrypt: after decryption: 104124.665340 Cryp 30 0e000014 54f218d1 81b2fec4 56d1ad13 1006f2c6 0000000c 03000000 80140000 104124.665351 Cryp 30 00000000 00000000 104124.665365 Mesg 50 message_parse_payloads: offset 28 payload HASH 104124.665375 Mesg 50 message_parse_payloads: offset 48 payload ATTRIBUTE 104124.665388 Mesg 60 message_validate_payloads: payload HASH at 0x3c06b81c of message 0x3c06b600 104124.665399 Mesg 60 message_validate_payloads: payload ATTRIBUTE at 0x3c06b830 of message 0x3c06b600 104124.665409 Mesg 70 TYPE: 3 104124.665417 Mesg 70 ID: 0 104124.665428 Exch 90 exchange_validate: checking for required <Unknown -24112> 104124.665438 Exch 90 exchange_validate: checking for required <Unknown 7170> 104124.665447 Mesg 70 exchange_validate: msg 0x3c06b600 requires missing <Unknown 7170> 104124.665455 Default exchange_run: exchange_validate failed 104124.665455 Default exchange_run: exchange_validate failed 104124.665469 Default dropped message from 202.148.145.81 port 500 due to notification type PAYLOAD_MALFORMED 104124.665487 Timr 10 timer_add_event: event exchange_free_aux(0x3c067b00) added before sa_soft_expire(0x3c067900), expiration in 120s 104124.665501 Exch 10 exchange_establish_p2: 0x3c067b00 <unnamed> <no policy> policy initiator phase 2 doi 1 exchange 5 step 0 104124.665512 Exch 10 exchange_establish_p2: icookie 1332ba6460f97397 rcookie 49fdaa74c14081e1 104124.665520 Exch 10 exchange_establish_p2: msgid 2db40593 sa_list 104124.665530 Mesg 90 message_alloc: allocated 0x3c06b880 104124.665539 SA 80 sa_reference: SA 0x3c067900 now has 7 references 104124.665548 Cryp 60 hash_get: requested algorithm 0 104124.665558 Cryp 60 hash_get: requested algorithm 0 104124.665567 Cryp 60 hash_get: requested algorithm 0 104124.665583 Exch 90 exchange_validate: checking for required INFO 104124.665599 Cryp 60 hash_get: requested algorithm 0 104124.665608 Cryp 80 ipsec_get_keystate: final phase 1 IV: 104124.665617 Cryp 80 8ec210f6 c88a6be8 104124.665625 Cryp 80 ipsec_get_keystate: message ID: 104124.665634 Cryp 80 2db40593 104124.665642 Cryp 50 crypto_init_iv: initialized IV: 104124.665653 Cryp 50 5157e037 003668c9 104124.665661 Cryp 80 ipsec_get_keystate: phase 2 IV: 104124.665670 Cryp 80 5157e037 003668c9 104124.665678 Cryp 10 crypto_encrypt: before encryption: 104124.665696 Cryp 10 0b000014 173ebef1 862775e9 08c11690 b82a6a97 0000000c 00000001 01000010 104124.665711 Cryp 30 crypto_encrypt: after encryption: 104124.665728 Cryp 30 24378426 8c104447 1996071d 4eabdff0 61423598 44705fb0 06a80d8f 13d952ff 104124.665736 Cryp 50 crypto_update_iv: updated IV: 104124.665746 Cryp 50 06a80d8f 13d952ff 104124.665754 Mesg 70 message_send: message 0x3c06b880 104124.665765 Mesg 70 ICOOKIE: 0x1332ba6460f97397 104124.665775 Mesg 70 RCOOKIE: 0x49fdaa74c14081e1 104124.665783 Mesg 70 NEXT_PAYLOAD: HASH 104124.665791 Mesg 70 VERSION: 16 104124.665799 Mesg 70 EXCH_TYPE: INFO 104124.665808 Mesg 70 FLAGS: [ ENC ] 104124.665817 Mesg 70 MESSAGE_ID: 0x2db40593 104124.665825 Mesg 70 LENGTH: 60 104124.665843 Mesg 70 message_send: 1332ba64 60f97397 49fdaa74 c14081e1 08100501 2db40593 0000003c 24378426 104124.665859 Mesg 70 message_send: 8c104447 1996071d 4eabdff0 61423598 44705fb0 06a80d8f 13d952ff 104124.665868 Exch 40 exchange_run: exchange 0x3c067b00 finished step 0, advancing... 104124.665877 Mesg 20 message_free: freeing 0x3c06b600 104124.665885 Trpt 70 transport_release: freeing 0x3c06c540 104124.665894 SA 80 sa_release: SA 0x3c067900 had 7 references 104124.665928 Exch 10 exchange_finalize: 0x3c067b00 <unnamed> <no policy> policy initiator phase 2 doi 1 exchange 5 step 1 104124.665953 Exch 10 exchange_finalize: icookie 1332ba6460f97397 rcookie 49fdaa74c14081e1 104124.665963 Exch 10 exchange_finalize: msgid 2db40593 sa_list 104124.665974 Timr 10 timer_remove_event: removing event exchange_free_aux(0x3c067b00) 104124.665983 Exch 80 exchange_free_aux: freeing exchange 0x3c067b00 104124.665993 Mesg 20 message_free: freeing 0x3c06b880 104124.666003 SA 80 sa_release: SA 0x3c067900 had 6 references 104125.577059 Trpt 70 transport_setup: added 0x3c06c640 to transport list 104125.577072 Trpt 70 transport_setup: added 0x3c06c680 to transport list 104125.577082 Trpt 50 virtual_clone: old 0x3c06c0c0 new 0x3c06c540 (main is 0x3c06c640) 104125.577090 Trpt 70 transport_setup: virtual transport 0x3c06c540 104125.577099 Mesg 90 message_alloc: allocated 0x3c06b500 104125.577108 Mesg 70 message_recv: message 0x3c06b500 104125.577122 Mesg 70 ICOOKIE: 0x79749cd36d3e79fd 104125.577133 Mesg 70 RCOOKIE: 0x49fdaa7451d1d35a 104125.577143 Mesg 70 NEXT_PAYLOAD: HASH 104125.577152 Mesg 70 VERSION: 16 104125.577160 Mesg 70 EXCH_TYPE: INFO 104125.577168 Mesg 70 FLAGS: [ ENC ] 104125.577178 Mesg 70 MESSAGE_ID: 0x637f2172 104125.577186 Mesg 70 LENGTH: 84 104125.577203 Mesg 70 message_recv: 79749cd3 6d3e79fd 49fdaa74 51d1d35a 08100501 637f2172 00000054 6f62c961 104125.577220 Mesg 70 message_recv: fc674a97 f3c458d9 3bbf6a1d 6f49600a 083ffd4a e4b49605 22ab8a84 1ca344c1 104125.577233 Mesg 70 message_recv: c5f26aed 7ae6a40c b2c76472 5442dd6b d5833588 104125.577244 Default message_recv: invalid cookie(s) 79749cd36d3e79fd 49fdaa7451d1d35a 104125.577256 Default dropped message from 202.148.145.81 port 500 due to notification type INVALID_COOKIE > Richard Green wrote: > > Hi > > > > I've been struggling with this one for a while, > and > > would appeciate some advice from someone with more > > experiece that I on creating VPN tunnel between an > > OpenBSD (mine) and Cisco PIX (not mine..). > Previously > > I /did/ test this using OpenBSD to OpenBSD in a > test > > environment without problems. > > > > Phase 1 seems to work (at least, if I use a > > deliberatlye incorrect shared secret I don't get > this > > far...) > > > > Seems to fail at at phase 2 of creating a > connection.