I'm trying to get an FC5 laptop behind a firewall connected to an OpenBSD 4.0 server running isakmpd (controlled by ipsecctl) with IPsec using CA authentication. The CA authentication seems to be working and I seem to have passed the Phase 1 exchange but am getting stuck in the Phase 2 exchange.
My /etc/ipsec.d/work.conf: conn work type=tunnel left=[ip of eth0 on FC5 laptop] right=[vpn server ip] keyexchange=ike auto=ignore auth=esp ike=aes128-sha1-modp1024 authby=rsasig leftrsasigkey=%cert [EMAIL PROTECTED] laptop FQDN] leftcert=[FC5 laptop FQDN].crt leftsendcert=always rightrsasigkey=%cert [EMAIL PROTECTED] host FQDN] rightcert=[vpn host FQDN].crt /etc/ipsec.conf is: ike passive esp from 192.168.1.0/24 to 192.168.6.0/24 \ srcid [vpn host FQDN] dstid [FC5 laptop FQDN] I had to change the quick auth parameters because Openswan doesn't support sha2, the default for isakmpd. When I start Openswan on the FC5 laptop: # ipsec auto --replace work; ipsec auto --up --verbose work 002 "work" #28: initiating Main Mode 104 "work" #28: STATE_MAIN_I1: initiate 003 "work" #28: ignoring unknown Vendor ID payload [6c0dcd481deae8ae0b0a68384b3072f9] 003 "work" #28: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n] method set to=106 003 "work" #28: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03] method set to=108 003 "work" #28: received Vendor ID payload [RFC 3947] method set to=109 003 "work" #28: received Vendor ID payload [Dead Peer Detection] 002 "work" #28: enabling possible NAT-traversal with method 3 002 "work" #28: transition from state STATE_MAIN_I1 to state STATE_MAIN_I2 106 "work" #28: STATE_MAIN_I2: sent MI2, expecting MR2 003 "work" #28: NAT-Traversal: Result using 3: i am NATed 002 "work" #28: I am sending my cert 002 "work" #28: I am sending a certificate request 002 "work" #28: transition from state STATE_MAIN_I2 to state STATE_MAIN_I3 108 "work" #28: STATE_MAIN_I3: sent MI3, expecting MR3 003 "work" #28: ignoring informational payload, type IPSEC_INITIAL_CONTACT 002 "work" #28: Main mode peer ID is ID_FQDN: '@[vpn host FQDN]' 002 "work" #28: no crl from issuer "[blah]" found (strict=no) 002 "work" #28: transition from state STATE_MAIN_I3 to state STATE_MAIN_I4 004 "work" #28: STATE_MAIN_I4: ISAKMP SA established {auth=OAKLEY_RSA_SIG cipher=aes_128 prf=oakley_sha group=modp1024} 002 "work" #29: initiating Quick Mode RSASIG+ENCRYPT+TUNNEL+PFS+UP {using isakmp#28} 002 "work" #2: initiating Quick Mode RSASIG+ENCRYPT+TUNNEL+PFS+UP {using isakmp#1} 117 "work" #29: STATE_QUICK_I1: initiate 010 "work" #29: STATE_QUICK_I1: retransmission; will wait 20s for response 010 "work" #29: STATE_QUICK_I1: retransmission; will wait 40s for response 031 "work" #29: max number of retransmissions (2) reached STATE_QUICK_I1. No acceptable response to our first Quick Mode message: perhaps peer likes no proposal 000 "work" #29: starting keying attempt 2 of an unlimited number, but releasing whack According to ipsec.conf(5): quick auth algorithm enc algorithm group group These parameters define the cryptographic transforms to be used for quick mode. Possible values for auth, enc, and group are described below in CRYPTO TRANSFORMS. If group is specified, Perfect Forward Security (PFS) is used. If the value none is used, PFS is dis- abled. If omitted, ipsecctl(8) will use the default values hmac-sha2-256 and aes; PFS will only be used if the remote side requests it. However, Openswan doesn't support sha2 so I added the following to /etc/ipsec.d/work.conf: esp=aes-sha1 and then /etc/ipsec.conf becomes: ike passive esp from 192.168.1.0/24 to 192.168.6.0/24 \ quick auth hmac-sha1 enc aes \ srcid vpn.thewrittenword.com dstid home.thewrittenword.com But, the above doesn't get me any further. Any ideas? -- albert chin ([EMAIL PROTECTED])