Hi Damien,

Firstly, do you think I will be able to do this with the
/etc/ipsec.conf setup, or will I have to go thru all the
/etc/isakmpd/* stuff?

> > crypto isakmp policy 10
> >  encr 3des
> >  hash md5
> >  authentication pre-share
> >  group 2
>
> Last time I tried, I had to specify an explicit lifetime for the
> phase 1 policy here.

This was from the working Cisco config, before I tried to OpenBSD it...

> > run isakmpd -K -d, then ipsecctl -f /etc/ipsec.conf and get:
> >
> > 170525.073348 Default message_recv: invalid cookie(s) 03af03aac4e7f22f
> > 9c282b0073a7218f
> > 170525.073424 Default dropped message from 202.1.1.30 port 500 due to
> > notification type INVALID_COOKIE
>
> You really need to turn up debugging to figure this out.

# isakmpd -K -d -v


192900.955220 Default isakmpd: phase 1 done: initiator id cb5e8756:
203.0.0.1, responder id 90871c27: 202.1.1.30, src: 203.0.0.1 dst:
202.1.1.30
192901.017180 Default message_recv: invalid cookie(s) 63eb546007dc51cc
d1409bbf559913e2
192901.017227 Default dropped message from 202.1.1.30 port 500 due to
notification type INVALID_COOKIE
192907.996683 Default message_recv: invalid cookie(s) 63eb546007dc51cc
d1409bbf559913e2
192907.996749 Default dropped message from 202.1.1.30 port 500 due to
notification type INVALID_COOKIE

Reply via email to