Having trouble brining up a tunnel. I have followed these instructions http://mirror.huxley.org.ar/ipsec/isakmpd.htm and used the included script to gen my certs.
This seems to complete phase 1 see snip1 Though never seems to move on to phase 2 see snip 2 the licesnsees line gives me some pause as that is not the common can of the cert, though that is what prints in the debug. The name in the subject field on the cert is loanerxppc2.xxx.gov configs are included after snips client is an XP box running ipsec.exe from e.bootis behind a nat on a Openbsd fw. This works with preshared keys through the fw isakmpd -dDA=50 --------snip 1 -------- 173611.209764 Exch 40 exchange_run: exchange 0x893c00 finished step 5, advancing... 173611.210067 Mesg 10 virtual_send_message: enabling NAT-T encapsulation for this exchange 173611.210410 Exch 10 exchange_finalize: 0x893c00 xpws Default-main-mode policy responder phase 1 doi 1 exchange 2 step 6 173611.210685 Exch 10 exchange_finalize: icookie 90d893da9f1f4816 rcookie 83c51437d4efd48e 173611.210921 Exch 10 exchange_finalize: msgid 00000000 173611.212348 Exch 10 exchange_finalize: phase 1 done: initiator id /C=US/ST=California/L=Martinez/O=ccchsd/OU=IS/CN=loanerxppc2.xxxx.gov, responder id [EMAIL PROTECTED], src: 172.16.5.241 dst: 172.16.4.230 17361 ----------snip 2 --------- 5555ghri_fw:root:/etc/isakmpd #isakmpd -dD9=99 173331.863667 Default log_debug_cmd: log level changed from 0 to 99 for class 9 [priv] 173332.317663 Plcy 30 policy_init: initializing 173332.321123 Default x509_read_from_dir: PEM_read_X509 failed for ca.srl 173338.331292 Plcy 90 x509_generate_kn: generating KeyNote policy for certificate 0x88da00 173338.332119 Plcy 60 x509_generate_kn: added credential 173338.332481 Plcy 80 x509_generate_kn: added credential: Authorizer: "DN:/C=US/ST=California/L=Martinez/O=ccchsd/OU=IS/CN=555ghrifw.xxxx.gov" Licensees: "DN:/C=US/ST=California/L=Martinez/O=ccchsd/OU=IS/CN=loanerxppc2. 173338.335104 Plcy 30 keynote_cert_obtain: failed to open "/etc/isakmpd/keynote//[EMAIL PROTECTED]/credentials" 5555ghri_fw:root:/etc/isakmpd #cat isakmpd.conf [General] Retransmits= 5 Exchange-max-time= 120 Listen-on= 172.16.5.241 # X.509 certificate locations [X509-certificates] Accept-self-signed= 1 CA-directory= /etc/isakmpd/ca/ Cert-directory= /etc/isakmpd/certs/ Private-key= /etc/isakmpd/private/[EMAIL PROTECTED] [Phase 1] 172.16.4.230= xpws [xpws] Phase= 1 Transport= udp Local-address= 172.16.5.241 Address= 0.0.0.0 Configuration= Default-main-mode ID= My-ID [My-ID] ID-type= USER_FQDN # this is the certificate for this gateway Name= [EMAIL PROTECTED] [Phase 2] Connections= winxp [winxp] Phase= 2 ISAKMP-peer= xpws Configuration= Default-quick-mode Local-ID= dmz Remote-ID= Unknown-address [loanerxp] ID-type= IPV4_ADDR Address= 192.168.10.15 [dmz] ID-type= IPV4_ADDR_SUBNET Network= 192.168.12.0 Netmask= 255.255.255.0 [Unknown-address] ID-Type= IPV4_ADDR Address= 0.0.0.0 [Default-quick-mode] DOI= IPSEC EXCHANGE_TYPE= QUICK_MODE Suites= QM-ESP-3DES-SHA-SUITE [Default-main-mode] DOI= IPSEC EXCHANGE_TYPE= ID_PROT Transforms= 3DES-SHA-RSA_SIG # Encryption/Authentication suite definitions [3DES-SHA-RSA_SIG] ENCRYPTION_ALGORITHM= 3DES_CBC HASH_ALGORITHM= SHA AUTHENTICATION_METHOD= RSA_SIG ENCAPSULATION_MODE= TUNNEL AUTHENTICATION_ALGORITHM= HMAC_SHA 5555ghri_fw:root:/etc/isakmpd #cat isakmpd.policy KeyNote-Version: 2 Comment: This policy accepts ESP SAs from a remote that uses the right password $OpenBSD: policy,v 1.6 2001/06/20 16:36:19 angelos Exp $ $EOM: policy,v 1.6 2000/10/09 22:08:30 angelos Exp $ Authorizer: "POLICY" Licensees: "DN:/C=US/ST=California/L=Martinez/O=ccchsd/OU=IS/CN=555ghrifw.ccchsd.gov" || "passphrase:1234" || "passphrase:0291ff014dccdd03874d9e8e4cdf3e6" Conditions: app_domain == "IPsec policy" && esp_present == "yes" && esp_enc_alg != "null" -> "true"; # --- [EMAIL PROTECTED] --- authorizer: "[EMAIL PROTECTED]" licensees:"DN:" conditions: remote_id_type =="ASN1 DN" && remote_id =="" -> "true"; # --- [EMAIL PROTECTED] --- authorizer: "[EMAIL PROTECTED]" licensees:"DN:" conditions: remote_id_type =="ASN1 DN" && remote_id =="" -> "true";