Hi folks, I am trying to setup an IPsec connection between OpenBSD and WindowsXP (NCP IPsec client). ipsec.conf is just a single line:
ike passive esp from 192.168.5.1 to 192.168.1.249 (192.168.1.249 is the Windows PC.) Phase I seems to work, but in Phase II isakmpd complains: Jun 27 14:55:34 fw01 isakmpd[30626]: log_packet_init: starting IKE packet capture to file "/var/run/isakmpd.dump" Jun 27 14:56:30 fw01 isakmpd[30626]: responder_recv_HASH_SA_NONCE: peer proposed invalid phase 2 IDs: initiator id c0a801f9: 192.168.1.249, responder id c0a80501/ffffffff: 192.168.5.1/255.255.255.255 Jun 27 14:56:30 fw01 isakmpd[30626]: dropped message from 192.168.1.249 port 500 due to notification type NO_PROPOSAL_CHOSEN Jun 27 14:56:35 fw01 isakmpd[30626]: responder_recv_HASH_SA_NONCE: peer proposed invalid phase 2 IDs: initiator id c0a801f9: 192.168.1.249, responder id c0a80501/ffffffff: 192.168.5.1/255.255.255.255 Jun 27 14:56:35 fw01 isakmpd[30626]: dropped message from 192.168.1.249 port 500 due to notification type NO_PROPOSAL_CHOSEN Jun 27 14:56:38 fw01 isakmpd[30626]: responder_recv_HASH_SA_NONCE: peer proposed invalid phase 2 IDs: initiator id c0a801f9: 192.168.1.249, responder id c0a80501/ffffffff: 192.168.5.1/255.255.255.255 Jun 27 14:56:38 fw01 isakmpd[30626]: dropped message from 192.168.1.249 port 500 due to notification type NO_PROPOSAL_CHOSEN Jun 27 14:56:41 fw01 isakmpd[30626]: responder_recv_HASH_SA_NONCE: peer proposed invalid phase 2 IDs: initiator id c0a801f9: 192.168.1.249, responder id c0a80501/ffffffff: 192.168.5.1/255.255.255.255 Jun 27 14:56:41 fw01 isakmpd[30626]: dropped message from 192.168.1.249 port 500 due to notification type NO_PROPOSAL_CHOSEN Looking into the negotiation packets I see at the beginning of Phase II: 14:56:30.370925 192.168.1.249.500 > 192.168.5.1.500: [udp sum ok] isakmp v1.0 exchange QUICK_MODE cookie: 27b9931138233444->5f559cf7b1c1dda0 msgid: 45305a4f len: 220 payload: HASH len: 24 payload: SA len: 92 DOI: 1(IPSEC) situation: IDENTITY_ONLY payload: PROPOSAL len: 40 proposal: 1 proto: IPSEC_ESP spisz: 4 xforms: 1 SPI: 0x8b62522d payload: TRANSFORM len: 28 transform: 1 ID: AES attribute AUTHENTICATION_ALGORITHM = HMAC_SHA attribute ENCAPSULATION_MODE = TUNNEL attribute LIFE_TYPE = SECONDS attribute LIFE_DURATION = 28800 attribute KEY_LENGTH = 256 payload: PROPOSAL len: 40 proposal: 2 proto: IPSEC_ESP spisz: 4 xforms: 1 SPI: 0xdc14778f payload: TRANSFORM len: 28 transform: 1 ID: AES attribute AUTHENTICATION_ALGORITHM = HMAC_MD5 attribute ENCAPSULATION_MODE = TUNNEL attribute LIFE_TYPE = SECONDS attribute LIFE_DURATION = 28800 attribute KEY_LENGTH = 128 payload: NONCE len: 44 payload: ID len: 12 type: IPV4_ADDR = 192.168.1.249 payload: ID len: 16 type: IPV4_ADDR_SUBNET = 192.168.5.1/255.255.255.255 [ttl 0] (id 1, len 248) 14:56:30.371301 192.168.5.1.500 > 192.168.1.249.500: [udp sum ok] isakmp v1.0 exchange INFO cookie: 27b9931138233444->5f559cf7b1c1dda0 msgid: 93170a11 len: 64 payload: HASH len: 24 payload: NOTIFICATION len: 12 notification: NO PROPOSAL CHOSEN [ttl 0] (id 1, len 92) Obviously isakmpd doesn't like something in the negotiation packet sent by the NCP IPsec client on Windows. Anybody got an idea? Regards Harri