What sonicwall firmware version?
I have a spare sonicwall that I could use to try and mirror your configuration
and see if it works for me.
I'd have to wait until I get in to work on Monday.


-----Original Message-----
From: [EMAIL PROTECTED] on behalf of Trepliev
Sent: Fri 9/30/2005 8:57 PM
To: misc@openbsd.org
Subject: OpenBSD VPN SonicWall Problems

I'm having some unusual difficulties getting a VPN running between
OpenBSD3.7 and a SonicWall.

The remote gateway is not under my control and I have to make the
adjustments on my side to make this work.

For some reason it looks to be failing during Phase 1 when it is getting the
USER_FQDN from the remote gateway.

Does anyone here have working configuration snippets for this sort of
arrangement?

Thanks!

AAA.AAA.AAA.AAA is the address of the local OpenBSD 3.7 VPN Server
BBB.BBB.BBB.BBB is the address of the remote SonicWall

=========================================
isakmpd.conf
=========================================

[General]
Retransmits= 3
Exchange-max-time= 120
Check-interval= 300
Policy-file= /etc/isakmpd/isakmpd.policy

[Phase 1]
BBB.BBB.BBB.BBB= ISAKMP-peer-SonicWall

[Phase 2]
Connections= IPsec-Fission-SonicWall

[ISAKMP-peer-SonicWall]
Phase= 1
Transport= udp
Address= BBB.BBB.BBB.BBB
Configuration= SonicWall-main-mode
Authentication= mekmitasdigoat
Local-ID= ID-Fission
Remote-ID= ID-SonicWall

[IPsec-Fission-SonicWall]
Phase= 2
ISAKMP-peer= ISAKMP-peer-SonicWall
Configuration= SonicWall-quick-mode
Local-ID= Net-Corp
Remote-ID= Net-SonicWall

[ID-SonicWall]
ID-type= USER_FQDN
Name= SonicWall

[ID-Fission]
ID-type= FQDN
Name= fission.corp.local

[Net-SonicWall]
ID-type= IPV4_ADDR_SUBNET
Network= 172.16.0.0 <http://172.16.0.0>
Netmask= 255.255.0.0 <http://255.255.0.0>

[Net-Corp]
ID-type= IPV4_ADDR_SUBNET
Network= 10.1.105.0 <http://10.1.105.0>
Netmask= 255.255.255.0 <http://255.255.255.0>

[SonicWall-main-mode]
DOI= IPSEC
EXCHANGE_TYPE= AGGRESSIVE
Transforms= AES-SHA-GRP2

[SonicWall-quick-mode]
DOI= IPSEC
EXCHANGE_TYPE= QUICK_MODE
Suites= QM-ESP-AES-SHA-GRP2-SUITE


=========================================
Debugging information from ISAKMPD -dvL -D0=70 -D4=99 -D5=50 -D6=60 -D7=50
-D8=40 -D9=40
=========================================

174101.074956 Default log_debug_cmd: log level changed from 0 to 70 for
class 0 [priv]
174101.075646 Default log_debug_cmd: log level changed from 0 to 99 for
class 4 [priv]
174101.075713 Default log_debug_cmd: log level changed from 0 to 50 for
class 5 [priv]
174101.075773 Default log_debug_cmd: log level changed from 0 to 60 for
class 6 [priv]
174101.075832 Default log_debug_cmd: log level changed from 0 to 50 for
class 7 [priv]
174101.075891 Default log_debug_cmd: log level changed from 0 to 40 for
class 8 [priv]
174101.075950 Default log_debug_cmd: log level changed from 0 to 40 for
class 9 [priv]
174101.077609 Sdep 30 monitor_init: pid 18819 my fd 6 [priv]
174101.079134 Sdep 30 monitor_init: pid 0 my fd 5 [priv]
174101.079510 Misc 10 monitor_init: privileges dropped for child process
174101.654766 Timr 10 timer_add_event: event connection_checker(0x3c1e8c80)
added last, expiration in 0s
174101.655255 Misc 60 connection_record_passive: passive connection
"IPsec-Fission-SonicWall" added
174101.645410 Plcy 30 policy_init: initializing
174101.658148 Misc 20 udp_make: transport 0x3c1ead00 socket 8 ip
127.0.0.1<http://127.0.0.1>port 500
174101.659980 Misc 20 udp_encap_make: transport 0x3c1ead40 socket 9 ip
127.0.0.1 <http://127.0.0.1> port 4500
174101.675446 Misc 20 udp_make: transport 0x3c06a0c0 socket 16 ip
AAA.AAA.AAA.AAA port 500
174101.677576 Misc 20 udp_encap_make: transport 0x3c06a100 socket 17 ip
AAA.AAA.AAA.AAA port 4500
174101.696403 Misc 20 udp_make: transport 0x3c06a480 socket 26 ip
0.0.0.0<http://0.0.0.0>port 500
174101.698525 Misc 20 udp_encap_make: transport 0x3c06a4c0 socket 27 ip
0.0.0.0 <http://0.0.0.0> port 4500
174101.743637 Default log_packet_init: starting IKE packet capture to file
"/var/run/isakmpd.pcap"
174101.744459 Timr 10 timer_handle_expirations: event
connection_checker(0x3c1e8c80)
174101.745041 Timr 10 timer_add_event: event connection_checker(0x3c1e8c80)
added last, expiration in 300s
174101.746671 Timr 10 timer_add_event: event exchange_free_aux(0x3c065d00)
added before connection_checker(0x3c1e8c80), expiration in 120s
174101.748101 Exch 10 exchange_establish_p1: 0x3c065d00
ISAKMP-peer-SonicWall SonicWall-main-mode policy initiator phase 1 doi 1
exchange 4 step 0
174101.748691 Exch 10 exchange_establish_p1: icookie 0f7fd1a961498319
rcookie 0000000000000000
174101.749186 Exch 10 exchange_establish_p1: msgid 00000000
174101.749826 SA 60 sa_create: sa 0x3c065f00 phase 1 added to exchange
0x3c065d00 (ISAKMP-peer-SonicWall)
174101.745797 Misc 70 attribute_set_constant: no PRF in the AES-SHA-GRP2
section
174101.745971 Misc 70 group_get: returning 0x3c06a6c0 of group 2
174101.746116 Exch 50 nat_t_setup_hashes: MD5("draft-ietf-ipsec-nat-t-ike-02
") (16 bytes)
174101.746174 Exch 50 nat_t_setup_hashes:
174101.746242 Exch 50 90cb8091 3ebb696e 086381b5 ec427b1f
174101.746299 Exch 50 nat_t_setup_hashes:
MD5("draft-ietf-ipsec-nat-t-ike-03") (16 bytes)
174101.746347 Exch 50 nat_t_setup_hashes:
174101.746412 Exch 50 7d9419a6 5310ca6f 2c179d92 15529d56
174101.746467 Exch 50 nat_t_setup_hashes: MD5("RFC 3947") (16 bytes)
174101.746513 Exch 50 nat_t_setup_hashes:
174101.746580 Exch 50 4a131c81 07035845 5c5728f2 0e95452f
174101.789728 Negt 40 ike_phase_1_send_ID: IPV4_ADDR:
174101.789821 Negt 40 00000000
174101.800761 Exch 40 exchange_run: exchange 0x3c065d00 finished step 0,
advancing...
174101.801342 Timr 10 timer_add_event: event message_send_expire(0x3c069580)
added before exchange_free_aux(0x3c065d00), expiration in 7s
174104.088867 Timr 10 timer_remove_event: removing event
message_send_expire(0x3c069580)
174104.089711 Exch 50 nat_t_check_vendor_payload: bad size 8 != 16
174104.090254 Exch 50 nat_t_check_vendor_payload: bad size 8 != 16
174104.090740 Exch 10 nat_t_check_vendor_payload: NAT-T capable peer
detected
174104.091406 Exch 10 dpd_check_vendor_payload: DPD capable peer detected
174104.091962 Negt 30 message_negotiate_sa: transform 1 proto 1 proposal 1
ok
174104.094023 Negt 20 ike_phase_1_validate_prop: success
174104.094612 Negt 30 message_negotiate_sa: proposal 1 succeeded
174104.095100 Misc 20 ipsec_decode_transform: transform 1 chosen
174104.146533 Negt 40 ike_phase_1_recv_ID: FQDN:
174104.147189 Negt 40 4d696372 6f706c65 78
174110.127525 Negt 30 message_negotiate_sa: transform 1 proto 1 proposal 1
ok
174110.128426 Negt 20 ike_phase_1_validate_prop: success
174110.128963 Negt 30 message_negotiate_sa: proposal 1 succeeded
174110.129448 Misc 20 ipsec_decode_transform: transform 1 chosen
174110.180487 Negt 40 ike_phase_1_recv_ID: FQDN:
174110.181143 Negt 40 4d696372 6f706c65 78
174119.127216 Negt 30 message_negotiate_sa: transform 1 proto 1 proposal 1
ok
174119.128104 Negt 20 ike_phase_1_validate_prop: success
174119.128638 Negt 30 message_negotiate_sa: proposal 1 succeeded
174119.129119 Misc 20 ipsec_decode_transform: transform 1 chosen
174119.180523 Negt 40 ike_phase_1_recv_ID: FQDN:
174119.181182 Negt 40 4d696372 6f706c65 78
174139.126306 Negt 30 message_negotiate_sa: transform 1 proto 1 proposal 1
ok
174139.127198 Negt 20 ike_phase_1_validate_prop: success
174139.127731 Negt 30 message_negotiate_sa: proposal 1 succeeded
174139.128214 Misc 20 ipsec_decode_transform: transform 1 chosen
174139.179205 Negt 40 ike_phase_1_recv_ID: FQDN:
174139.179854 Negt 40 4d696372 6f706c65 78
174301.765855 Timr 10 timer_handle_expirations: event
exchange_free_aux(0x3c065d00)
174301.766599 Exch 20 exchange_establish_finalize: finalizing exchange
0x3c065d00 with arg 0x3c12bc40 (IPsec-Fission-SonicWall) & fail = 1

Reply via email to