Hello,

Firstly i want to mention that it's my begining with ipsec/isakmpd tunneling.

My problem is about making connection from OpenBSD 4.3 to Cisco VPN 
concentrator 3060.
Cisco concentrator is out of my range so i can't check log there and i only 
wish that configuration there is done well.

Here it is my example:

a.a.a.a_net <obsd> b.b.b.b_public_ip --- c.c.c.c_public_ip <cisco> d.d.d.d_net

What i wan't to achiev is: - comunication from a.a.a.a_net to d.d.d.d_net

What i know about cisco configuration:
- VPN concentrator 3060
- c.c.c.c_public_ip
- d.d.d.d_net
- VPN Method: IPSec
- Encryption: 3DES
- Key exchange IKE
- Pre-Shared Key: somekey
- Perfect Forward Secrecy: Yes - Group 2 (1024 bits) - Hashing: SHA-1 - Diffie-Hellman: Yes - Group 2 - Time Lifetime: 28800 seconds
- Encapsulation Mode: Tunnel
- Negotiation Mode: Main

OpenBSD:
- clean instalation of 4.3
- no pf yet
- em0: a.a.a.a_net
- em1: b.b.b.b_public_ip

After couple hours of reading stuff on internet and reading some configuration 
files i achivied this configuration:

-- isakmpd.conf --
[General]
Listen-on                = b.b.b.b_public_ip

[Phase 1]
c.c.c.c_public_ip        = CONN

[Phase 2]
Connections              = LINK

[CONN]
Phase                    = 1
Transport                = udp
Address                  = c.c.c.c_public_ip
Configuration            = Default-Main-Mode
Authentication           = somekey

[LINK]
Phase                    = 2
ISAKMP-Peer              = HP
Configuration            = Default-Quick-Mode
Local-ID                 = LAN-1
Remote-ID                = LAN-2

[LAN-1]
ID-Type                  = IPV4_ADDR_SUBNET
Network                  = a.a.a.a_net
Netmask                  = a.a.a.a_netmask

[LAN-2]
ID-Type                  = IPV4_ADDR_SUBNET
Network                  = d.d.d.d_net
Netmask                  = d.d.d.d_netmask

[Default-Main-Mode]
DOI                      = IPSEC
Exchange_Type            = ID_PROT
Transforms               = 3DES-SHA

[Default-Quick-Mode]
DOI                      = IPSEC
Exchange_Type            = QUICK_MODE
Suites                   = QM-ESP-3DES-SHA-SUITE

[3DES-SHA]
ENCRYPTION_ALGORITHM     = 3DES_CBC
HASH_ALGORITHM           = SHA
AUTHENTICATION_METHOD    = PRE_SHARED
GROUP_DESCRIPTION        = MODP_1024
Life                     = LIFE_3600_SECS

[QM-ESP-3DES-SHA-SUITE]
Protocols                = QM-ESP-3DES-SHA

[QM-ESP-3DES-SHA-PFS-SUITE]
Protocols                = QM-ESP-3DES-SHA-PFS

[QM-ESP-3DES-SHA]
PROTOCOL_ID              = IPSEC_ESP
Transforms               = QM-ESP-3DES-SHA-XF

[QM-ESP-3DES-SHA-PFS]
PROTOCOL_ID              = IPSEC_ESP
Transforms               = QM-ESP-3DES-SHA-PFS-XF

[QM-ESP-3DES-SHA-TRP]
PROTOCOL_ID              = IPSEC_ESP
Transforms               = QM-ESP-3DES-SHA-TRP-XF

[QM-ESP-3DES-SHA-XF]
TRANSFORM_ID             = 3DES
ENCAPSULATION_MODE       = TUNNEL
AUTHENTICATION_ALGORITHM = HMAC_SHA
Life                     = LIFE_28800_SECS

[QM-ESP-3DES-SHA-PFS-XF]
TRANSFORM_ID             = 3DES
ENCAPSULATION_MODE       = TUNNEL
AUTHENTICATION_ALGORITHM = HMAC_SHA
GROUP_DESCRIPTION        = MODP_1024
Life                     = LIFE_28800_SECS

[QM-ESP-3DES-SHA-TRP-XF]
TRANSFORM_ID             = 3DES
ENCAPSULATION_MODE       = TRANSPORT
AUTHENTICATION_ALGORITHM = HMAC_SHA
Life                     = LIFE_28800_SECS

[LIFE_3600_SECS]
LIFE_TYPE                = SECONDS
LIFE_DURATION            = 3600,1800:7200

[LIFE_28800_SECS]
LIFE_TYPE               = SECONDS
LIFE_DURATION             = 28800
-- isakmpd.conf --

After this i am able to get threw first phase.
But i am unable to get the second.

Here it is my debug:

-- isakmpd -d -DA=10 --
164003.690124 Default log_debug_cmd: log level changed from 0 to 10 for class 0 
[priv]
164003.690315 Default log_debug_cmd: log level changed from 0 to 10 for class 1 
[priv]
164003.690379 Default log_debug_cmd: log level changed from 0 to 10 for class 2 
[priv]
164003.690437 Default log_debug_cmd: log level changed from 0 to 10 for class 3 
[priv]
164003.690493 Default log_debug_cmd: log level changed from 0 to 10 for class 4 
[priv]
164003.690554 Default log_debug_cmd: log level changed from 0 to 10 for class 5 
[priv]
164003.690610 Default log_debug_cmd: log level changed from 0 to 10 for class 6 
[priv]
164003.690670 Default log_debug_cmd: log level changed from 0 to 10 for class 7 
[priv]
164003.690726 Default log_debug_cmd: log level changed from 0 to 10 for class 8 
[priv]
164003.690787 Default log_debug_cmd: log level changed from 0 to 10 for class 9 
[priv]
164003.690844 Default log_debug_cmd: log level changed from 0 to 10 for class 
10 [priv]
164003.691747 Misc 10 monitor_init: privileges dropped for child process
164003.839514 Timr 10 timer_add_event: event connection_checker(0x8848bdf0) 
added last, expiration in 0s
164003.841346 Timr 10 timer_handle_expirations: event 
connection_checker(0x8848bdf0)
164003.841426 Timr 10 timer_add_event: event connection_checker(0x8848bdf0) 
added last, expiration in 60s
164003.841595 Timr 10 timer_add_event: event exchange_free_aux(0x85b87500) 
added last, expiration in 120s
164003.841694 Exch 10 exchange_establish_p1: 0x85b87500 HP Default-Main-Mode 
policy initiator phase 1 doi 1 exchange 2 step 0
164003.841759 Exch 10 exchange_establish_p1: icookie 89c5123a508af611 rcookie 
0000000000000000
164003.841824 Exch 10 exchange_establish_p1: msgid 00000000
164003.842106 Timr 10 timer_add_event: event message_send_expire(0x82fcc380) 
added before connection_checker(0x8848bdf0), expiration in 7s
164003.915645 Timr 10 timer_remove_event: removing event 
message_send_expire(0x82fcc380)
164003.915747 Exch 10 nat_t_check_vendor_payload: NAT-T capable peer detected
164003.915881 Exch 10 exchange_handle_leftover_payloads: unexpected payload 
VENDOR
164003.927145 Timr 10 timer_add_event: event message_send_expire(0x82fcc380) 
added before connection_checker(0x8848bdf0), expiration in 7s
164004.016036 Timr 10 timer_remove_event: removing event 
message_send_expire(0x82fcc380)
164004.028960 Exch 10 exchange_handle_leftover_payloads: unexpected payload 
VENDOR
164004.029187 Timr 10 timer_add_event: event message_send_expire(0x82fcc500) 
added before connection_checker(0x8848bdf0), expiration in 7s
164004.201816 Timr 10 timer_remove_event: removing event 
message_send_expire(0x82fcc500)
164004.201919 Default ipsec_validate_id_information: dubious ID information 
accepted
164004.201986 Exch 10 dpd_check_vendor_payload: DPD capable peer detected
164004.202091 Exch 10 exchange_finalize: 0x85b87500 HP Default-Main-Mode policy 
initiator phase 1 doi 1 exchange 2 step 5
164004.202156 Exch 10 exchange_finalize: icookie 89c5123a508af611 rcookie 
18b62c758e254f26
164004.202212 Exch 10 exchange_finalize: msgid 00000000
164004.202307 Exch 10 exchange_finalize: phase 1 done: initiator id 53ee0ef5: 
b.b.b.b_public_ip, responder id 0fcba9e1: c.c.c.c_public_ip, src: 
b.b.b.b_public_ip dst: c.c.c.c_public_ip
164004.202380 Timr 10 timer_add_event: event sa_soft_expire(0x85b87900) added 
last, expiration in 3124s
164004.202443 Timr 10 timer_add_event: event sa_hard_expire(0x85b87900) added 
last, expiration in 3600s
164004.202536 Timr 10 timer_add_event: event exchange_free_aux(0x85b87c00) 
added before sa_soft_expire(0x85b87900), expiration in 120s
164004.202609 Exch 10 exchange_establish_p2: 0x85b87c00 LINK Default-Quick-Mode 
policy initiator phase 2 doi 1 exchange 32 step 0
164004.202670 Exch 10 exchange_establish_p2: icookie 89c5123a508af611 rcookie 
18b62c758e254f26
164004.202736 Exch 10 exchange_establish_p2: msgid 92fba8ce sa_list
164004.203164 Timr 10 timer_remove_event: removing event 
exchange_free_aux(0x85b87500)
164004.203278 Timr 10 timer_add_event: event message_send_expire(0x82fcc680) 
added before connection_checker(0x8848bdf0), expiration in 7s
164004.288093 Timr 10 timer_add_event: event exchange_free_aux(0x85b87500) 
added before sa_soft_expire(0x85b87900), expiration in 120s
164004.288162 Exch 10 exchange_setup_p2: 0x85b87500 <unnamed> <no policy> 
policy responder phase 2 doi 1 exchange 5 step 0
164004.288222 Exch 10 exchange_setup_p2: icookie 89c5123a508af611 rcookie 
18b62c758e254f26
164004.288278 Exch 10 exchange_setup_p2: msgid f4674a28 sa_list
164004.288347 Timr 10 timer_remove_event: removing event 
sa_hard_expire(0x85b87900)
164004.288406 Timr 10 timer_remove_event: removing event 
sa_soft_expire(0x85b87900)
164004.288475 Exch 10 exchange_finalize: 0x85b87500 <unnamed> <no policy> 
policy responder phase 2 doi 1 exchange 5 step 0
164004.288535 Exch 10 exchange_finalize: icookie 89c5123a508af611 rcookie 
18b62c758e254f26
164004.288596 Exch 10 exchange_finalize: msgid f4674a28 sa_list
164004.288654 Timr 10 timer_remove_event: removing event 
exchange_free_aux(0x85b87500)
164011.216819 Timr 10 timer_handle_expirations: event 
message_send_expire(0x82fcc680)
164011.217085 Timr 10 timer_add_event: event message_send_expire(0x82fcc680) 
added before connection_checker(0x8848bdf0), expiration in 9s
164020.226826 Timr 10 timer_handle_expirations: event 
message_send_expire(0x82fcc680)
164020.227092 Timr 10 timer_add_event: event message_send_expire(0x82fcc680) 
added before connection_checker(0x8848bdf0), expiration in 11s
164031.236823 Timr 10 timer_handle_expirations: event 
message_send_expire(0x82fcc680)
164031.237085 Default transport_send_messages: giving up on exchange LINK, no 
response from peer c.c.c.c_public_ip:500
-- isakmpd -d -DA=10 --

I am really bad in understanding this logs.

We can see is that:
xchange_finalize: phase 1 done: initiator id 53ee0ef5: b.b.b.b_public_ip, 
responder id 0fcba9e1: c.c.c.c_public_ip, src: b.b.b.b_public_ip dst: 
c.c.c.c_public_ip
But still nothing about second phase.

Thanks for any help.
Mariusz Makowski

Reply via email to