Hi all, I've been looking to mess around with IPSec for quite some time now, and sadly all I've had is perpetual failure.
I found this guide - http://www.securityfocus.com/infocus/1859 - and followed it apart from the NAT bits. When the two endpoints try to talk, they fall over in a heap. The systems in use are both VMware VMs with three host-only networks - one each for the "local" network and one for both to use as an "external" network. What I hope to achieve is this: Host-only (192.168.120.0/24) /|\ | \|/ obsd-ipsec-left (192.168.120.130/ 10.255.255.5) /|\ | \|/ 10.255.255.0/30 /|\ | \|/ obsd-ipsec-right (192.168.33.7/ 10.255.255.6) /|\ | \|/ Host-only (192.168.33.0/24) After I ran isakmpd -K -d and used ipsecctl to set the config up, I got these messages: obsd-ipsec-left: 210739.768482 Default message_parse_payloads: reserved field non-zero: c9 210739.770193 Default dropped message from 10.255.255.6 port 500 due to notification type PAYLOAD_MALFORMED 210739.777760 Default message_parse_payloads: reserved field non-zero: b 210739.779268 Default dropped message from 10.255.255.6 port 500 due to notification type PAYLOAD_MALFORMED 210739.801533 Default message_parse_payloads: reserved field non-zero: fc 210739.802865 Default dropped message from 10.255.255.6 port 500 due to notification type PAYLOAD_MALFORMED 210746.767433 Default message_parse_payloads: reserved field non-zero: c9 210746.769181 Default dropped message from 10.255.255.6 port 500 due to notification type PAYLOAD_MALFORMED 210746.772014 Default message_parse_payloads: reserved field non-zero: b 210746.773250 Default dropped message from 10.255.255.6 port 500 due to notification type PAYLOAD_MALFORMED 210746.806677 Default message_parse_payloads: reserved field non-zero: fc 210746.807830 Default dropped message from 10.255.255.6 port 500 due to notification type PAYLOAD_MALFORMED 210755.815875 Default message_parse_payloads: reserved field non-zero: c9 210755.817366 Default dropped message from 10.255.255.6 port 500 due to notification type PAYLOAD_MALFORMED 210755.820174 Default message_parse_payloads: reserved field non-zero: b 210755.821603 Default dropped message from 10.255.255.6 port 500 due to notification type PAYLOAD_MALFORMED 210755.857385 Default message_parse_payloads: reserved field non-zero: fc 210755.858449 Default dropped message from 10.255.255.6 port 500 due to notification type PAYLOAD_MALFORMED 210806.813902 Default message_parse_payloads: reserved field non-zero: c9 210806.815241 Default dropped message from 10.255.255.6 port 500 due to notification type PAYLOAD_MALFORMED 210806.817721 Default message_parse_payloads: reserved field non-zero: b 210806.819338 Default dropped message from 10.255.255.6 port 500 due to notification type PAYLOAD_MALFORMED 210806.854645 Default message_parse_payloads: reserved field non-zero: fc 210806.856265 Default dropped message from 10.255.255.6 port 500 due to notification type PAYLOAD_MALFORMED obsd-ipsec-right: 210720.707482 Default responder_recv_HASH_SA_NONCE: peer proposed invalid phase 2 IDs: initiator id 192.168.120.0/255.255.255.0, responder id 192.168.33.0/255.255.255.0 210720.711177 Default dropped message from 10.255.255.5 port 500 due to notification type INVALID_ID_INFORMATION 210720.714730 Default responder_recv_HASH_SA_NONCE: peer proposed invalid phase 2 IDs: initiator id 10.255.255.5, responder id 192.168.33.0/255.255.255.0 210720.718172 Default dropped message from 10.255.255.5 port 500 due to notification type INVALID_ID_INFORMATION 210720.721666 Default responder_recv_HASH_SA_NONCE: peer proposed invalid phase 2 IDs: initiator id 10.255.255.5, responder id 10.255.255.6 210720.724001 Default dropped message from 10.255.255.5 port 500 due to notification type INVALID_ID_INFORMATION 210727.752507 Default responder_recv_HASH_SA_NONCE: KEY_EXCH payload without a group desc. attribute 210727.754909 Default dropped message from 10.255.255.5 port 500 due to notification type NO_PROPOSAL_CHOSEN 210727.766740 Default responder_recv_HASH_SA_NONCE: KEY_EXCH payload without a group desc. attribute 210727.768953 Default dropped message from 10.255.255.5 port 500 due to notification type NO_PROPOSAL_CHOSEN 210727.798642 Default responder_recv_HASH_SA_NONCE: KEY_EXCH payload without a group desc. attribute 210727.800977 Default dropped message from 10.255.255.5 port 500 due to notification type NO_PROPOSAL_CHOSEN 210754.807254 Default transport_send_messages: giving up on exchange from-192.168.33.0/24-to-192.168.120.0/24, no response from peer 10.255.255.5:500 210754.810248 Default transport_send_messages: giving up on exchange from-192.168.33.0/24-to-192.168.120.0/24, no response from peer 10.255.255.5:500 210754.847582 Default transport_send_messages: giving up on exchange from-10.255.255.6-to-10.255.255.5, no response from peer 10.255.255.5:500 The listing of ipsec.conf is as follows: obsd-ipsec-left: ike esp from 192.168.120.0/24 to 192.168.33.0/24 peer 10.255.255.6 ike esp from 10.255.255.5 to 192.168.33.0/24 peer 10.255.255.6 ike esp from 10.255.255.5 to 10.255.255.6 obsd-ipsec-right: ike esp from 192.168.33.0/24 to 192.168.120.0/24 peer 10.255.255.5 ike esp from 10.255.255.6 to 192.168.120.0/24 peer 10.255.255.5 ike esp from 10.255.255.6 to 10.255.255.5 ifconfig on each side: obsd-ipsec-left# ifconfig lo0: flags=8049<UP,LOOPBACK,RUNNING,MULTICAST> mtu 33200 priority: 0 groups: lo inet 127.0.0.1 netmask 0xff000000 inet6 ::1 prefixlen 128 inet6 fe80::1%lo0 prefixlen 64 scopeid 0x4 vic0: flags=8843<UP,BROADCAST,RUNNING,SIMPLEX,MULTICAST> mtu 1500 lladdr 00:0c:29:f6:20:76 priority: 0 media: Ethernet autoselect status: active inet6 fe80::20c:29ff:fef6:2076%vic0 prefixlen 64 scopeid 0x1 inet 192.168.120.130 netmask 0xffffff00 broadcast 192.168.120.255 vic1: flags=8843<UP,BROADCAST,RUNNING,SIMPLEX,MULTICAST> mtu 1500 lladdr 00:0c:29:f6:20:80 priority: 0 media: Ethernet autoselect status: active inet 10.255.255.5 netmask 0xfffffffc broadcast 10.255.255.7 inet6 fe80::20c:29ff:fef6:2080%vic1 prefixlen 64 scopeid 0x2 enc0: flags=0<> mtu 1536 priority: 0 pflog0: flags=141<UP,RUNNING,PROMISC> mtu 33200 priority: 0 groups: pflog obsd-ipsec-right# ifconfig lo0: flags=8049<UP,LOOPBACK,RUNNING,MULTICAST> mtu 33200 priority: 0 groups: lo inet 127.0.0.1 netmask 0xff000000 inet6 ::1 prefixlen 128 inet6 fe80::1%lo0 prefixlen 64 scopeid 0x4 vic0: flags=8843<UP,BROADCAST,RUNNING,SIMPLEX,MULTICAST> mtu 1500 lladdr 00:0c:29:e1:29:22 priority: 0 media: Ethernet autoselect status: active inet6 fe80::20c:29ff:fee1:2922%vic0 prefixlen 64 scopeid 0x1 inet 192.168.33.7 netmask 0xffffff00 broadcast 192.168.33.255 vic1: flags=8843<UP,BROADCAST,RUNNING,SIMPLEX,MULTICAST> mtu 1500 lladdr 00:0c:29:e1:29:2c priority: 0 media: Ethernet autoselect status: active inet 10.255.255.6 netmask 0xfffffffc broadcast 10.255.255.7 inet6 fe80::20c:29ff:fee1:292c%vic1 prefixlen 64 scopeid 0x2 enc0: flags=0<> mtu 1536 priority: 0 pflog0: flags=141<UP,RUNNING,PROMISC> mtu 33200 priority: 0 groups: pflog pf.conf is the standard one on both sides. Any ideas? Both sides run OpenBSD 4.6 release and this was done on a fresh install with only bsd{,.rd}, base and etc. -- Aaron Mason - Programmer, open source addict I've taken my software vows - for beta or for worse