[Apologies if anyone gets this a second time --
 Sent twice but did not show up in the list]

5.7-stable.
Cannot get an ikev2 road warrior setup working for days now.

Read all relevant stuff but cannot see what I am doing wrong.
Other people report similar setup working, so it must be my fault.

The connection schema follows:

(Note: 57.57.57.57 is the OBSD-5.7 box ext interface;
81.81.81.81 is the ext interface of the router the win box
is behind.)

LAN (10.15.0.0/16) <--> [ obsd 5.7 box (ext if 57.57.57.57) ] <-->
<--> Internet <--> router (81.81.81.81) <--> win 8.1 box

The win box shows error 809 (remote server is not responding) on
connection attempt. (I never managed to get anything else.)


Client is Win8.1 Enterprise (behind nat, should not matter...?)
Connection properties:
-- General | Host name: 57.57.57.57
-- Security | Type of VPN: IKEv2
-- Security | Data Encryption: Require Encryption
-- Security | Authentication: use machine certificates
-- Networking | IPv4 (the only thing enabled):
set to IP 10.10.10.7, DNS 8.8.8.8

# sysctl net.inet.ip.forwarding=1
# pfctl -d # only to get ipsec tunnel working; then I'll set it up


# cat /etc/iked.conf:
ikev2 "road-warriors" passive esp \
  from 10.15.0.0/16 to 10.10.10.0/24 \
  local 57.57.57.57 peer 0.0.0.0/0 \
  srcid 57.57.57.57 \
  config address 10.10.10.7


Debug log from 'iked -vv -d' shown below.

Please, help me figure this out.
Any hints or directions are much appreciated!
-Yassen D.


P.S. Forgot to mention that the full CA dance has been properly done;
the Win box has the vpn CA cert and key (in Trusted Root Authorities)
and its own client certificate (in Personal) imported successfully.


# iked -vv -d

ikev2_recv: IKE_SA_INIT request from initiator 81.81.81.81:53392 to 
57.57.57.57:500 policy 'road-warriors' id 0, 880 bytes
ikev2_recv: ispi 0xc775b4390519c851 rspi 0x0000000000000000
ikev2_policy2id: srcid IPV4/57.57.57.57 length 8
ikev2_pld_parse: header ispi 0xc775b4390519c851 rspi 0x0000000000000000 
nextpayload SA version 0x20 exchange IKE_SA_INIT flags 0x08 msgid 0 length 880 
response 0
ikev2_pld_payloads: payload SA nextpayload KE critical 0x00 length 520
ikev2_pld_sa: more than one proposal specified
ikev2_pld_sa: more 2 reserved 0 length 40 proposal #1 protoid IKE spisize 0 
xforms 4 spi 0
ikev2_pld_xform: more 3 reserved 0 length 8 type ENCR id 3DES
ikev2_pld_xform: more 3 reserved 0 length 8 type INTEGR id HMAC_SHA1_96
ikev2_pld_xform: more 3 reserved 0 length 8 type PRF id HMAC_SHA1
ikev2_pld_xform: more 0 reserved 0 length 8 type DH id MODP_1024
ikev2_pld_payloads: payload KE nextpayload NONCE critical 0x00 length 136
ikev2_pld_ke: dh group MODP_1024 reserved 0
ikev2_pld_payloads: payload NONCE nextpayload NOTIFY critical 0x00 length 52
ikev2_pld_payloads: payload NOTIFY nextpayload NOTIFY critical 0x00 length 28
ikev2_pld_notify: protoid NONE spisize 0 type NAT_DETECTION_SOURCE_IP
ikev2_nat_detection: peer source 0xc775b4390519c851 0x0000000000000000 
81.81.81.81:53392
ikev2_pld_notify: NAT_DETECTION_SOURCE_IP detected NAT, enabling UDP 
encapsulation
ikev2_pld_payloads: payload NOTIFY nextpayload VENDOR critical 0x00 length 28
ikev2_pld_notify: protoid NONE spisize 0 type NAT_DETECTION_DESTINATION_IP
ikev2_nat_detection: peer destination 0xc775b4390519c851 0x0000000000000000 
57.57.57.57:500
ikev2_pld_payloads: payload VENDOR nextpayload VENDOR critical 0x00 length 24
ikev2_pld_payloads: payload VENDOR nextpayload VENDOR critical 0x00 length 20
ikev2_pld_payloads: payload VENDOR nextpayload VENDOR critical 0x00 length 20
ikev2_pld_payloads: payload VENDOR nextpayload NONE critical 0x00 length 24
sa_state: INIT -> SA_INIT
ikev2_sa_negotiate: score 23
sa_stateok: SA_INIT flags 0x00, require 0x00
sa_stateflags: 0x00 -> 0x10 sa (required 0x00 )
ikev2_sa_keys: SKEYSEED with 20 bytes
ikev2_sa_keys: S with 96 bytes
ikev2_prfplus: T1 with 20 bytes
ikev2_prfplus: T2 with 20 bytes
ikev2_prfplus: T3 with 20 bytes
ikev2_prfplus: T4 with 20 bytes
ikev2_prfplus: T5 with 20 bytes
ikev2_prfplus: T6 with 20 bytes
ikev2_prfplus: T7 with 20 bytes
ikev2_prfplus: T8 with 20 bytes
ikev2_prfplus: Tn with 160 bytes
ikev2_sa_keys: SK_d with 20 bytes
ikev2_sa_keys: SK_ai with 20 bytes
ikev2_sa_keys: SK_ar with 20 bytes
ikev2_sa_keys: SK_ei with 24 bytes
ikev2_sa_keys: SK_er with 24 bytes
ikev2_sa_keys: SK_pi with 20 bytes
ikev2_sa_keys: SK_pr with 20 bytes
ikev2_add_proposals: length 40
ikev2_next_payload: length 44 nextpayload KE
ikev2_next_payload: length 136 nextpayload NONCE
ikev2_next_payload: length 36 nextpayload NOTIFY
ikev2_nat_detection: local source 0xc775b4390519c851 0x5a9bb34a8d3b420e 
57.57.57.57:500
ikev2_next_payload: length 28 nextpayload NOTIFY
ikev2_nat_detection: local destination 0xc775b4390519c851 0x5a9bb34a8d3b420e 
81.81.81.81:53392
ikev2_next_payload: length 28 nextpayload CERTREQ
ikev2_add_certreq: type X509_CERT length 21
ikev2_next_payload: length 25 nextpayload NONE
ikev2_pld_parse: header ispi 0xc775b4390519c851 rspi 0x5a9bb34a8d3b420e 
nextpayload SA version 0x20 exchange IKE_SA_INIT flags 0x20 msgid 0 length 325 
response 1
ikev2_pld_payloads: payload SA nextpayload KE critical 0x00 length 44
ikev2_pld_sa: more 0 reserved 0 length 40 proposal #1 protoid IKE spisize 0 
xforms 4 spi 0
ikev2_pld_xform: more 3 reserved 0 length 8 type ENCR id 3DES
ikev2_pld_xform: more 3 reserved 0 length 8 type PRF id HMAC_SHA1
ikev2_pld_xform: more 3 reserved 0 length 8 type INTEGR id HMAC_SHA1_96
ikev2_pld_xform: more 0 reserved 0 length 8 type DH id MODP_1024
ikev2_pld_payloads: payload KE nextpayload NONCE critical 0x00 length 136
ikev2_pld_ke: dh group MODP_1024 reserved 0
ikev2_pld_payloads: payload NONCE nextpayload NOTIFY critical 0x00 length 36
ikev2_pld_payloads: payload NOTIFY nextpayload NOTIFY critical 0x00 length 28
ikev2_pld_notify: protoid NONE spisize 0 type NAT_DETECTION_SOURCE_IP
ikev2_pld_payloads: payload NOTIFY nextpayload CERTREQ critical 0x00 length 28
ikev2_pld_notify: protoid NONE spisize 0 type NAT_DETECTION_DESTINATION_IP
ikev2_pld_payloads: payload CERTREQ nextpayload NONE critical 0x00 length 25
ikev2_pld_certreq: type X509_CERT length 20
ikev2_msg_send: IKE_SA_INIT response from 57.57.57.57:500 to 81.81.81.81:53392 
msgid 0, 325 bytes
config_free_proposals: free 0x3cc6b78ad00
=eof=

Reply via email to