I have posted a sanitized read of the file at:
 http://www.consault.com/vpn/capture.txt
 Will this help?
 Thanks,
-Dave

 On 10/3/05, Hans-Joerg Hoexer <[EMAIL PROTECTED]>
wrote:
>
> Hi,
>
> and please provide me the pcap file generated with -L.
>
> Thanks
> HJ.
>
> On Fri, Sep 30, 2005 at 05:57:14PM -0700, Trepliev wrote:
> > I'm having some unusual difficulties getting a VPN running between
> > OpenBSD3.7 and a SonicWall.
> >
> > The remote gateway is not under my control and I have to make the
> > adjustments on my side to make this work.
> >
> > For some reason it looks to be failing during Phase 1 when it is getting
> the
> > USER_FQDN from the remote gateway.
> >
> > Does anyone here have working configuration snippets for this sort of
> > arrangement?
> >
> > Thanks!
> >
> > AAA.AAA.AAA.AAA is the address of the local OpenBSD 3.7 VPN Server
> > BBB.BBB.BBB.BBB is the address of the remote SonicWall
> >
> > =========================================
> > isakmpd.conf
> > =========================================
> >
> > [General]
> > Retransmits= 3
> > Exchange-max-time= 120
> > Check-interval= 300
> > Policy-file= /etc/isakmpd/isakmpd.policy
> >
> > [Phase 1]
> > BBB.BBB.BBB.BBB= ISAKMP-peer-SonicWall
> >
> > [Phase 2]
> > Connections= IPsec-Fission-SonicWall
> >
> > [ISAKMP-peer-SonicWall]
> > Phase= 1
> > Transport= udp
> > Address= BBB.BBB.BBB.BBB
> > Configuration= SonicWall-main-mode
> > Authentication= mekmitasdigoat
> > Local-ID= ID-Fission
> > Remote-ID= ID-SonicWall
> >
> > [IPsec-Fission-SonicWall]
> > Phase= 2
> > ISAKMP-peer= ISAKMP-peer-SonicWall
> > Configuration= SonicWall-quick-mode
> > Local-ID= Net-Corp
> > Remote-ID= Net-SonicWall
> >
> > [ID-SonicWall]
> > ID-type= USER_FQDN
> > Name= SonicWall
> >
> > [ID-Fission]
> > ID-type= FQDN
> > Name= fission.corp.local
> >
> > [Net-SonicWall]
> > ID-type= IPV4_ADDR_SUBNET
> > Network= 172.16.0.0 <http://172.16.0.0> <http://172.16.0.0>
> > Netmask= 255.255.0.0 <http://255.255.0.0> <http://255.255.0.0>
> >
> > [Net-Corp]
> > ID-type= IPV4_ADDR_SUBNET
> > Network= 10.1.105.0 <http://10.1.105.0> <http://10.1.105.0>
> > Netmask= 255.255.255.0 <http://255.255.255.0> <http://255.255.255.0>
> >
> > [SonicWall-main-mode]
> > DOI= IPSEC
> > EXCHANGE_TYPE= AGGRESSIVE
> > Transforms= AES-SHA-GRP2
> >
> > [SonicWall-quick-mode]
> > DOI= IPSEC
> > EXCHANGE_TYPE= QUICK_MODE
> > Suites= QM-ESP-AES-SHA-GRP2-SUITE
> >
> >
> > =========================================
> > Debugging information from ISAKMPD -dvL -D0=70 -D4=99 -D5=50 -D6=60
> -D7=50
> > -D8=40 -D9=40
> > =========================================
> >
> > 174101.074956 Default log_debug_cmd: log level changed from 0 to 70 for
> > class 0 [priv]
> > 174101.075646 Default log_debug_cmd: log level changed from 0 to 99 for
> > class 4 [priv]
> > 174101.075713 Default log_debug_cmd: log level changed from 0 to 50 for
> > class 5 [priv]
> > 174101.075773 Default log_debug_cmd: log level changed from 0 to 60 for
> > class 6 [priv]
> > 174101.075832 Default log_debug_cmd: log level changed from 0 to 50 for
> > class 7 [priv]
> > 174101.075891 Default log_debug_cmd: log level changed from 0 to 40 for
> > class 8 [priv]
> > 174101.075950 Default log_debug_cmd: log level changed from 0 to 40 for
> > class 9 [priv]
> > 174101.077609 Sdep 30 monitor_init: pid 18819 my fd 6 [priv]
> > 174101.079134 Sdep 30 monitor_init: pid 0 my fd 5 [priv]
> > 174101.079510 Misc 10 monitor_init: privileges dropped for child process
> > 174101.654766 Timr 10 timer_add_event: event
> connection_checker(0x3c1e8c80)
> > added last, expiration in 0s
> > 174101.655255 Misc 60 connection_record_passive: passive connection
> > "IPsec-Fission-SonicWall" added
> > 174101.645410 Plcy 30 policy_init: initializing
> > 174101.658148 Misc 20 udp_make: transport 0x3c1ead00 socket 8 ip
> > 127.0.0.1 <http://127.0.0.1><http://127.0.0.1>port 500
> > 174101.659980 Misc 20 udp_encap_make: transport 0x3c1ead40 socket 9 ip
> > 127.0.0.1 <http://127.0.0.1> <http://127.0.0.1> port 4500
> > 174101.675446 Misc 20 udp_make: transport 0x3c06a0c0 socket 16 ip
> > AAA.AAA.AAA.AAA port 500
> > 174101.677576 Misc 20 udp_encap_make: transport 0x3c06a100 socket 17 ip
> > AAA.AAA.AAA.AAA port 4500
> > 174101.696403 Misc 20 udp_make: transport 0x3c06a480 socket 26 ip
> > 0.0.0.0 <http://0.0.0.0><http://0.0.0.0>port 500
> > 174101.698525 Misc 20 udp_encap_make: transport 0x3c06a4c0 socket 27 ip
> > 0.0.0.0 <http://0.0.0.0> <http://0.0.0.0> port 4500
> > 174101.743637 Default log_packet_init: starting IKE packet capture to
> file
> > "/var/run/isakmpd.pcap"
> > 174101.744459 Timr 10 timer_handle_expirations: event
> > connection_checker(0x3c1e8c80)
> > 174101.745041 Timr 10 timer_add_event: event
> connection_checker(0x3c1e8c80)
> > added last, expiration in 300s
> > 174101.746671 Timr 10 timer_add_event: event
> exchange_free_aux(0x3c065d00)
> > added before connection_checker(0x3c1e8c80), expiration in 120s
> > 174101.748101 Exch 10 exchange_establish_p1: 0x3c065d00
> > ISAKMP-peer-SonicWall SonicWall-main-mode policy initiator phase 1 doi 1
> > exchange 4 step 0
> > 174101.748691 Exch 10 exchange_establish_p1: icookie 0f7fd1a961498319
> > rcookie 0000000000000000
> > 174101.749186 Exch 10 exchange_establish_p1: msgid 00000000
> > 174101.749826 SA 60 sa_create: sa 0x3c065f00 phase 1 added to exchange
> > 0x3c065d00 (ISAKMP-peer-SonicWall)
> > 174101.745797 Misc 70 attribute_set_constant: no PRF in the AES-SHA-GRP2
> > section
> > 174101.745971 Misc 70 group_get: returning 0x3c06a6c0 of group 2
> > 174101.746116 Exch 50 nat_t_setup_hashes:
> MD5("draft-ietf-ipsec-nat-t-ike-02
> > ") (16 bytes)
> > 174101.746174 Exch 50 nat_t_setup_hashes:
> > 174101.746242 Exch 50 90cb8091 3ebb696e 086381b5 ec427b1f
> > 174101.746299 Exch 50 nat_t_setup_hashes:
> > MD5("draft-ietf-ipsec-nat-t-ike-03") (16 bytes)
> > 174101.746347 Exch 50 nat_t_setup_hashes:
> > 174101.746412 Exch 50 7d9419a6 5310ca6f 2c179d92 15529d56
> > 174101.746467 Exch 50 nat_t_setup_hashes: MD5("RFC 3947") (16 bytes)
> > 174101.746513 Exch 50 nat_t_setup_hashes:
> > 174101.746580 Exch 50 4a131c81 07035845 5c5728f2 0e95452f
> > 174101.789728 Negt 40 ike_phase_1_send_ID: IPV4_ADDR:
> > 174101.789821 Negt 40 00000000
> > 174101.800761 Exch 40 exchange_run: exchange 0x3c065d00 finished step 0,
> > advancing...
> > 174101.801342 Timr 10 timer_add_event: event
> message_send_expire(0x3c069580)
> > added before exchange_free_aux(0x3c065d00), expiration in 7s
> > 174104.088867 Timr 10 timer_remove_event: removing event
> > message_send_expire(0x3c069580)
> > 174104.089711 Exch 50 nat_t_check_vendor_payload: bad size 8 != 16
> > 174104.090254 Exch 50 nat_t_check_vendor_payload: bad size 8 != 16
> > 174104.090740 Exch 10 nat_t_check_vendor_payload: NAT-T capable peer
> > detected
> > 174104.091406 Exch 10 dpd_check_vendor_payload: DPD capable peer
> detected
> > 174104.091962 Negt 30 message_negotiate_sa: transform 1 proto 1 proposal
> 1
> > ok
> > 174104.094023 Negt 20 ike_phase_1_validate_prop: success
> > 174104.094612 Negt 30 message_negotiate_sa: proposal 1 succeeded
> > 174104.095100 Misc 20 ipsec_decode_transform: transform 1 chosen
> > 174104.146533 Negt 40 ike_phase_1_recv_ID: FQDN:
> > 174104.147189 Negt 40 4d696372 6f706c65 78
> > 174110.127525 Negt 30 message_negotiate_sa: transform 1 proto 1 proposal
> 1
> > ok
> > 174110.128426 Negt 20 ike_phase_1_validate_prop: success
> > 174110.128963 Negt 30 message_negotiate_sa: proposal 1 succeeded
> > 174110.129448 Misc 20 ipsec_decode_transform: transform 1 chosen
> > 174110.180487 Negt 40 ike_phase_1_recv_ID: FQDN:
> > 174110.181143 Negt 40 4d696372 6f706c65 78
> > 174119.127216 Negt 30 message_negotiate_sa: transform 1 proto 1 proposal
> 1
> > ok
> > 174119.128104 Negt 20 ike_phase_1_validate_prop: success
> > 174119.128638 Negt 30 message_negotiate_sa: proposal 1 succeeded
> > 174119.129119 Misc 20 ipsec_decode_transform: transform 1 chosen
> > 174119.180523 Negt 40 ike_phase_1_recv_ID: FQDN:
> > 174119.181182 Negt 40 4d696372 6f706c65 78
> > 174139.126306 Negt 30 message_negotiate_sa: transform 1 proto 1 proposal
> 1
> > ok
> > 174139.127198 Negt 20 ike_phase_1_validate_prop: success
> > 174139.127731 Negt 30 message_negotiate_sa: proposal 1 succeeded
> > 174139.128214 Misc 20 ipsec_decode_transform: transform 1 chosen
> > 174139.179205 Negt 40 ike_phase_1_recv_ID: FQDN:
> > 174139.179854 Negt 40 4d696372 6f706c65 78
> > 174301.765855 Timr 10 timer_handle_expirations: event
> > exchange_free_aux(0x3c065d00)
> > 174301.766599 Exch 20 exchange_establish_finalize: finalizing exchange
> > 0x3c065d00 with arg 0x3c12bc40 (IPsec-Fission-SonicWall) & fail = 1

Reply via email to