Attached.

On 9/3/07, Hans-Joerg Hoexer <[EMAIL PROTECTED]> wrote:
> Hi,
>
> could you please run isakmpd with the "-L" (see isakmpd(8)) flag and could
> you provide we the generated pcap file?
>
> On Mon, Sep 03, 2007 at 04:17:22PM +0100, JosC) Costa wrote:
> > Okay, I've altered the range from 10.0.0.1 to 10.0.0.255 -> 10.0.0.0
> > to 10.0.0.255.
> >
> > FLOWS:
> > flow esp in from 172.26.10.83 to 10.0.0.0/24 peer 172.26.10.83 srcid
> > obsd1.my.domain dstid 172.26.10.83/32 type use
> > flow esp out from 10.0.0.0/24 to 172.26.10.83 peer 172.26.10.83 srcid
> > obsd1.my.domain dstid 172.26.10.83/32 type require
> >
> > SAD:
> > esp tunnel from 172.26.10.83 to 172.26.10.82 spi 0x3fe97772 auth
> > hmac-sha1 enc 3des-cbc
> > esp tunnel from 172.26.10.82 to 172.26.10.83 spi 0x981a7980 auth
> > hmac-sha1 enc 3des-cbc
> >
> > BUT there's another error:
> >
> > Sep  3 16:12:08 obsd1 isakmpd[16423]: exchange_run: exchange_validate failed
> > Sep  3 16:12:08 obsd1 isakmpd[16423]: dropped message from
> > 172.26.10.83 port 500 due to notification type PAYLOAD_MALFORMED
> >
> >
> > On 9/3/07, Hans-Joerg Hoexer <[EMAIL PROTECTED]> wrote:
> > > Hi,
> > >
> > > On Mon, Sep 03, 2007 at 03:11:35PM +0100, JosC) Costa wrote:
> > > > Sep  3 15:05:16 obsd1 isakmpd[25239]: dropped message from
> > > > 172.26.10.83 port 500 due to notification type NO_PROPOSAL_CHOSEN
> > > > Sep  3 15:05:16 obsd1 isakmpd[25239]: responder_recv_HASH_SA_NONCE:
> > > > KEY_EXCH payload without a group desc. attribute
> > > > Sep  3 15:05:16 obsd1 isakmpd[25239]: dropped message from
> > > > 172.26.10.83 port 500 due to notification type NO_PROPOSAL_CHOSEN
> > > > Sep  3 15:05:16 obsd1 isakmpd[25239]: responder_recv_HASH_SA_NONCE:
> > > > peer proposed invalid phase 2 IDs: initiator id ac1a0a53:
> > > > 172.26.10.83, responder id 0a000080/ffffff80:
> > > > 10.0.0.128/255.255.255.128
> > >
> > > isakmpd tells you, that the peer sent the wront phase 2 ID.
> > >
> > > Here, you tell ISA to propose these IDs, but...
> > >
> > > > Remote Network 'OBSD1' IP Subnets:
> > > >     Subnet: 10.0.0.1/255.255.255.255
> > > >     Subnet: 10.0.0.2/255.255.255.254
> > > >     Subnet: 10.0.0.4/255.255.255.252
> > > >     Subnet: 10.0.0.8/255.255.255.248
> > > >     Subnet: 10.0.0.16/255.255.255.240
> > > >     Subnet: 10.0.0.32/255.255.255.224
> > > >     Subnet: 10.0.0.64/255.255.255.192
> > > >     Subnet: 10.0.0.128/255.255.255.128
> > >
> > > here you tell isakmpd to accept only 10.0.1.0/24, which is never proposed
> > > by the peer:
> > >
> > > --- /etc/ipsec.conf ---
> > >
> > > ike dynamic esp from 10.0.0.0/24 to 10.0.1.0/24 peer 172.26.10.83 \
> > >         main auth hmac-sha1 enc 3des group modp1024 \
> > >         quick auth hmac-sha1 enc 3des \
> > >         psk teste tag teste
> > >
> > >
> > > To get started, tell ISA to only use one remote subnet, ie. 10.0.1.0/24
tcpdump: WARNING: snaplen raised from 96 to 65536

17:12:40.500794 172.26.10.83.500 > 172.26.10.82.500: [udp sum ok] isakmp v1.0 
exchange QUICK_MODE

        cookie: 45e904f3a6260510->116cb8bcab6a79b2 msgid: 518e3038 len: 292

        payload: HASH len: 24

        payload: SA len: 56 DOI: 1(IPSEC) situation: IDENTITY_ONLY

            payload: PROPOSAL len: 44 proposal: 1 proto: IPSEC_ESP spisz: 4 
xforms: 1 SPI: 0x17b3274e

                payload: TRANSFORM len: 32

                    transform: 1 ID: 3DES

                        attribute LIFE_TYPE = SECONDS

                        attribute LIFE_DURATION = 00000e10

                        attribute ENCAPSULATION_MODE = TUNNEL

                        attribute AUTHENTICATION_ALGORITHM = HMAC_SHA

                        attribute GROUP_DESCRIPTION = 2

        payload: KEY_EXCH len: 132

        payload: NONCE len: 24

        payload: ID len: 12 type: IPV4_ADDR = 172.26.10.83

        payload: ID len: 16 type: IPV4_ADDR_SUBNET = 10.0.0.0/255.255.255.0 
[ttl 0] (id 1, len 320)

17:12:40.510601 172.26.10.82.500 > 172.26.10.83.500: [udp sum ok] isakmp v1.0 
exchange QUICK_MODE

        cookie: 45e904f3a6260510->116cb8bcab6a79b2 msgid: 518e3038 len: 292

        payload: HASH len: 24

        payload: SA len: 56 DOI: 1(IPSEC) situation: IDENTITY_ONLY

            payload: PROPOSAL len: 44 proposal: 1 proto: IPSEC_ESP spisz: 4 
xforms: 1 SPI: 0xeb318a59

                payload: TRANSFORM len: 32

                    transform: 1 ID: 3DES

                        attribute LIFE_TYPE = SECONDS

                        attribute LIFE_DURATION = 00000e10

                        attribute ENCAPSULATION_MODE = TUNNEL

                        attribute AUTHENTICATION_ALGORITHM = HMAC_SHA

                        attribute GROUP_DESCRIPTION = 2

        payload: NONCE len: 24

        payload: KEY_EXCH len: 132

        payload: ID len: 12 type: IPV4_ADDR = 172.26.10.83

        payload: ID len: 16 type: IPV4_ADDR_SUBNET = 10.0.0.0/255.255.255.0 
[ttl 0] (id 1, len 320)

17:12:40.530390 172.26.10.83.500 > 172.26.10.82.500: [udp sum ok] isakmp v1.0 
exchange QUICK_MODE

        cookie: 45e904f3a6260510->116cb8bcab6a79b2 msgid: 518e3038 len: 52

        payload: HASH len: 24 [ttl 0] (id 1, len 80)

17:59:32.728642 172.26.10.83.500 > 172.26.10.82.500: [udp sum ok] isakmp v1.0 
exchange INFO

        cookie: 45e904f3a6260510->116cb8bcab6a79b2 msgid: d4f8d311 len: 68

        payload: HASH len: 24

        payload: DELETE len: 16 DOI: 1(IPSEC) proto: IPSEC_ESP nspis: 1

            SPI: 0x78543e11 [ttl 0] (id 1, len 96)

17:59:47.662884 172.26.10.82.500 > 172.26.10.83.500: [udp sum ok] isakmp v1.0 
exchange QUICK_MODE

        cookie: 45e904f3a6260510->116cb8bcab6a79b2 msgid: b7a314d5 len: 288

        payload: HASH len: 24

        payload: SA len: 52 DOI: 1(IPSEC) situation: IDENTITY_ONLY

            payload: PROPOSAL len: 40 proposal: 1 proto: IPSEC_ESP spisz: 4 
xforms: 1 SPI: 0xe926d709

                payload: TRANSFORM len: 28

                    transform: 1 ID: 3DES

                        attribute LIFE_TYPE = SECONDS

                        attribute LIFE_DURATION = 1200

                        attribute ENCAPSULATION_MODE = TUNNEL

                        attribute AUTHENTICATION_ALGORITHM = HMAC_SHA

                        attribute GROUP_DESCRIPTION = 2

        payload: NONCE len: 20

        payload: KEY_EXCH len: 132

        payload: ID len: 16 type: IPV4_ADDR_SUBNET = 10.0.0.0/255.255.255.0

        payload: ID len: 16 type: IPV4_ADDR_SUBNET = 10.0.1.0/255.255.255.0 
[ttl 0] (id 1, len 316)

17:59:47.713313 172.26.10.83.500 > 172.26.10.82.500: [udp sum ok] isakmp v1.0 
exchange QUICK_MODE commit

        cookie: 45e904f3a6260510->116cb8bcab6a79b2 msgid: b7a314d5 len: 300

        payload: HASH len: 24

        payload: SA len: 56 DOI: 1(IPSEC) situation: IDENTITY_ONLY

            payload: PROPOSAL len: 44 proposal: 1 proto: IPSEC_ESP spisz: 4 
xforms: 1 SPI: 0xfdaadf5e

                payload: TRANSFORM len: 32

                    transform: 1 ID: 3DES

                        attribute LIFE_TYPE = SECONDS

                        attribute LIFE_DURATION = 000004b0

                        attribute ENCAPSULATION_MODE = TUNNEL

                        attribute AUTHENTICATION_ALGORITHM = HMAC_SHA

                        attribute GROUP_DESCRIPTION = 2

        payload: KEY_EXCH len: 132

        payload: NONCE len: 24

        payload: ID len: 16 type: IPV4_ADDR_SUBNET = 10.0.0.0/255.255.255.0

        payload: ID len: 16 type: IPV4_ADDR_SUBNET = 10.0.1.0/255.255.255.0 
[ttl 0] (id 1, len 328)

17:59:47.713490 172.26.10.82.500 > 172.26.10.83.500: [udp sum ok] isakmp v1.0 
exchange QUICK_MODE

        cookie: 45e904f3a6260510->116cb8bcab6a79b2 msgid: b7a314d5 len: 52

        payload: HASH len: 24 [ttl 0] (id 1, len 80)

17:59:47.726407 172.26.10.83.500 > 172.26.10.82.500: [udp sum ok] isakmp v1.0 
exchange QUICK_MODE commit

        cookie: 45e904f3a6260510->116cb8bcab6a79b2 msgid: b7a314d5 len: 76

        payload: HASH len: 24

        payload: NOTIFICATION len: 24

            notification: 16384 (unknown) [ttl 0] (id 1, len 104)

17:59:47.730118 172.26.10.82.500 > 172.26.10.83.500: [udp sum ok] isakmp v1.0 
exchange INFO

        cookie: 45e904f3a6260510->116cb8bcab6a79b2 msgid: 0f879510 len: 64

        payload: HASH len: 24

        payload: NOTIFICATION len: 12

            notification: PAYLOAD MALFORMED [ttl 0] (id 1, len 92)


Reply via email to