Hello,

I have three machines: one 3.7, one 3.6, and one Windows 2000 laptop.
The client software on the laptop is this:

  ftp://ftp.funkwerk-ec.com/pub/ipsec_client/bintec_secure_client_v11.zip

aka "NCP Secure Entry" which usually runs very nicely.

The two OpenBSD machines are configured identically, except for IP
numbers and server certificates. Everything is set up to run with X.509
certificates off of my private CA.

Connecting from the windows machine to the 3.6 machine works fine as
long as I only use the primary IP number (it has two from different
networks), but connecting to the 3.7 machine, which has only one IP
number, yields "INVALID PAYLOAD TYPE", and nothing works. This is what
I get with tcpdump (IP numbers fudged):


# /usr/sbin/tcpdump -n -vvv -e -s 1500 -i bge0 \(esp or port 500 or port 4500 
\) and host 1.2.3.4
tcpdump: listening on bge0, link-type EN10MB
12:15:35.791290 0:0:c:3e:48:dc 0:e0:81:63:16:d2 0800 294: 1.2.3.4.500 > 
5.6.7.8.500:  [udp sum ok] isakmp v1.0 exchange ID_PROT
        cookie: 0c052e9abace2953->0000000000000000 msgid: 00000000 len: 252
        payload: SA len: 60 DOI: 1(IPSEC) situation: IDENTITY_ONLY 
            payload: PROPOSAL len: 48 proposal: 1 proto: ISAKMP spisz: 0 
xforms: 1
                payload: TRANSFORM len: 40
                    transform: 1 ID: ISAKMP
                        attribute ENCRYPTION_ALGORITHM = AES_CBC
                        attribute HASH_ALGORITHM = SHA
                        attribute AUTHENTICATION_METHOD = RSA_SIG
                        attribute GROUP_DESCRIPTION = MODP_1536
                        attribute LIFE_TYPE = SECONDS
                        attribute LIFE_DURATION = 00007080
                        attribute KEY_LENGTH = 256
        payload: VENDOR len: 12
        payload: VENDOR len: 12
        payload: VENDOR len: 20 (supports v3 NAT-T, 
draft-ietf-ipsec-nat-t-ike-03)
        payload: VENDOR len: 20 (supports v2 NAT-T, 
draft-ietf-ipsec-nat-t-ike-02)
        payload: VENDOR len: 20 (supports v1 NAT-T, 
draft-ietf-ipsec-nat-t-ike-00)
        payload: VENDOR len: 20 (supports NAT-T, RFC 3947)
        payload: VENDOR len: 20 (supports DPD v1.0)
        payload: VENDOR len: 20
        payload: VENDOR len: 20 (ttl 126, id 1731, len 280)
12:15:35.797183 0:e0:81:63:16:d2 0:0:c:3e:48:dc 0800 210: 5.6.7.8.500 > 
1.2.3.4.500:  [udp sum ok] isakmp v1.0 exchange ID_PROT
        cookie: 0c052e9abace2953->6297719b10aab610 msgid: 00000000 len: 168
        payload: SA len: 60 DOI: 1(IPSEC) situation: IDENTITY_ONLY 
            payload: PROPOSAL len: 48 proposal: 1 proto: ISAKMP spisz: 0 
xforms: 1
                payload: TRANSFORM len: 40
                    transform: 1 ID: ISAKMP
                        attribute ENCRYPTION_ALGORITHM = AES_CBC
                        attribute HASH_ALGORITHM = SHA
                        attribute AUTHENTICATION_METHOD = RSA_SIG
                        attribute GROUP_DESCRIPTION = MODP_1536
                        attribute LIFE_TYPE = SECONDS
                        attribute LIFE_DURATION = 00007080
                        attribute KEY_LENGTH = 256
        payload: VENDOR len: 20 (supports v2 NAT-T, 
draft-ietf-ipsec-nat-t-ike-02)
        payload: VENDOR len: 20 (supports v3 NAT-T, 
draft-ietf-ipsec-nat-t-ike-03)
        payload: VENDOR len: 20 (supports NAT-T, RFC 3947)
        payload: VENDOR len: 20 (supports DPD v1.0) (ttl 64, id 13783, len 196)
12:15:36.113303 0:0:c:3e:48:dc 0:e0:81:63:16:d2 0800 358: 1.2.3.4.500 > 
5.6.7.8.500:  [udp sum ok] isakmp v1.0 exchange ID_PROT
        cookie: 0c052e9abace2953->6297719b10aab610 msgid: 00000000 len: 316
        payload: KEY_EXCH len: 196
        payload: NONCE len: 44
        payload: <unknown> len: 24
        payload: <unknown> len: 24 (ttl 126, id 1732, len 344)
12:15:36.115954 0:e0:81:63:16:d2 0:0:c:3e:48:dc 0800 82: 5.6.7.8.500 > 
1.2.3.4.500:  [udp sum ok] isakmp v1.0 exchange INFO
        cookie: d6da19765da85f25->0000000000000000 msgid: 00000000 len: 40
        payload: NOTIFICATION len: 12
            notification: INVALID PAYLOAD TYPE (ttl 64, id 29429, len 68)
12:16:05.215393 0:0:c:3e:48:dc 0:e0:81:63:16:d2 0800 358: 1.2.3.4.500 > 
5.6.7.8.500:  [udp sum ok] isakmp v1.0 exchange ID_PROT
        cookie: 0c052e9abace2953->6297719b10aab610 msgid: 00000000 len: 316
        payload: KEY_EXCH len: 196
        payload: NONCE len: 44
        payload: <unknown> len: 24
        payload: <unknown> len: 24 (ttl 126, id 1733, len 344)
12:16:05.217956 0:e0:81:63:16:d2 0:0:c:3e:48:dc 0800 82: 5.6.7.8.500 > 
1.2.3.4.500:  [udp sum ok] isakmp v1.0 exchange INFO
        cookie: 6af35ef1d456e460->0000000000000000 msgid: 00000000 len: 40
        payload: NOTIFICATION len: 12
            notification: INVALID PAYLOAD TYPE (ttl 64, id 15575, len 68)
12:16:09.220412 0:0:c:3e:48:dc 0:e0:81:63:16:d2 0800 358: 1.2.3.4.500 > 
5.6.7.8.500:  [udp sum ok] isakmp v1.0 exchange ID_PROT
        cookie: 0c052e9abace2953->6297719b10aab610 msgid: 00000000 len: 316
        payload: KEY_EXCH len: 196
        payload: NONCE len: 44
        payload: <unknown> len: 24
        payload: <unknown> len: 24 (ttl 126, id 1734, len 344)
12:16:09.222948 0:e0:81:63:16:d2 0:0:c:3e:48:dc 0800 82: 5.6.7.8.500 > 
1.2.3.4.500:  [udp sum ok] isakmp v1.0 exchange INFO
        cookie: 8e945543b69f3d8e->0000000000000000 msgid: 00000000 len: 40
        payload: NOTIFICATION len: 12
            notification: INVALID PAYLOAD TYPE (ttl 64, id 25815, len 68)
12:16:14.226697 0:0:c:3e:48:dc 0:e0:81:63:16:d2 0800 358: 1.2.3.4.500 > 
5.6.7.8.500:  [udp sum ok] isakmp v1.0 exchange ID_PROT
        cookie: 0c052e9abace2953->6297719b10aab610 msgid: 00000000 len: 316
        payload: KEY_EXCH len: 196
        payload: NONCE len: 44
        payload: <unknown> len: 24
        payload: <unknown> len: 24 (ttl 126, id 1735, len 344)
12:16:14.229247 0:e0:81:63:16:d2 0:0:c:3e:48:dc 0800 82: 5.6.7.8.500 > 
1.2.3.4.500:  [udp sum ok] isakmp v1.0 exchange INFO
        cookie: d7059971fb358e93->0000000000000000 msgid: 00000000 len: 40
        payload: NOTIFICATION len: 12
            notification: INVALID PAYLOAD TYPE (ttl 64, id 15834, len 68)


Btw, on the 3.6 box, when I configure the client to talk on the
aliased address, it doesn't work either, but with a very different
error message. I'm willing to ignore this problem if I can get
the 3.7 (3.8?) problem solved.


Any help is very much appreciated!



Best,
--Toni++

Reply via email to