>   Here is the configuration I used between 2 peers 
> ike esp tunnel \

Interesting.  Thanks for that, and for your help.

I now seem to be able to get a flow going but not traffic (e.g. 
with the below I cannot ping).

I'm sure I'm missing something obvious, but I think I need that 
second pair of eyes as I've been working on this problem so long !

HOST A (10.0.0.1) :
-- ping 172.16.11.170
PING 172.16.11.170 (172.16.11.170): 56 data bytes
64 bytes from 172.16.11.170: icmp_seq=0 ttl=255 time=0.251 ms
64 bytes from 172.16.11.170: icmp_seq=1 ttl=255 time=0.336 ms

--ipsec.conf :
ike esp tunnel \
        from 10.0.0.1 to 10.0.0.2 local 172.16.11.169 peer 
172.16.11.170 \
        main  auth hmac-sha1 enc aes group grp5 \
        quick auth hmac-sha1 enc aes group grp5 \
        psk OpenBSD

-- ipsecctl -s all
FLOWS:
flow esp in from 10.0.0.2 to 10.0.0.1 peer 172.16.11.170 srcid 
172.16.11.169/32 dstid 172.16.11.170/32 type use
flow esp out from 10.0.0.1 to 10.0.0.2 peer 172.16.11.170 srcid 
172.16.11.169/32 dstid 172.16.11.170/32 type require
SAD:
esp tunnel from 172.16.11.169 to 172.16.11.170 spi 0x457e29e4 auth 
hmac-sha1 enc aes
tcpmd5 from 172.16.11.169 to 172.16.11.170 spi 0x5ebc181a
tcpmd5 from 172.16.11.170 to 172.16.11.169 spi 0xa8496b5c
esp tunnel from 172.16.11.170 to 172.16.11.169 spi 0xbb35f85d auth 
hmac-sha1 enc aes

-- isakmpd -Kvd
114001.702446 Default isakmpd: phase 1 done: initiator id 
172.16.11.170, responder id 172.16.11.169, src: 172.16.11.169 dst: 
172.16.11.170
114001.793818 Default isakmpd: quick mode done: src: 172.16.11.169 
dst: 172.16.11.170
114022.266040 Default transport_send_messages: giving up on 
exchange peer-172.16.11.170-local-172.16.11.169, no response from 
peer 172.16.11.170:500

HOST B (10.0.0.2) :
-- ping 172.16.11.169
PING 172.16.11.169 (172.16.11.169): 56 data bytes
64 bytes from 172.16.11.169: icmp_seq=0 ttl=255 time=0.336 ms
64 bytes from 172.16.11.169: icmp_seq=1 ttl=255 time=0.220 ms

--ipsec.conf :                                                      
                                                                    
                        
ike esp tunnel \
        from 10.0.0.2 to 10.0.0.1 local 172.16.11.170 peer 
172.16.11.169 \
        main  auth hmac-sha1 enc aes group grp5 \
        quick auth hmac-sha1 enc aes group grp5 \
        psk OpenBSD

--ipsecctl -s all
FLOWS:
flow esp in from 10.0.0.1 to 10.0.0.2 peer 172.16.11.169 srcid 
172.16.11.170/32 dstid 172.16.11.169/32 type use
flow esp out from 10.0.0.2 to 10.0.0.1 peer 172.16.11.169 srcid 
172.16.11.170/32 dstid 172.16.11.169/32 type require

SAD:
esp tunnel from 172.16.11.169 to 172.16.11.170 spi 0x457e29e4 auth 
hmac-sha1 enc aes
esp tunnel from 172.16.11.170 to 172.16.11.169 spi 0xbb35f85d auth 
hmac-sha1 enc aes
tcpmd5 from 172.16.11.170 to 172.16.11.169 spi 0xe62273b9
tcpmd5 from 172.16.11.169 to 172.16.11.170 spi 0xf286fa8f

--isakmpd -Kvd 
123955.361080 Default attribute_unacceptable: ENCRYPTION_ALGORITHM: 
got AES_CBC, expected 3DES_CBC
123955.361154 Default message_negotiate_sa: no compatible proposal 
found
123955.361181 Default dropped message from 172.16.11.169 port 500 
due to notification type NO_PROPOSAL_CHOSEN
124001.827314 Default isakmpd: phase 1 done: initiator id 
172.16.11.170, responder id 172.16.11.169, src: 172.16.11.170 dst: 
172.16.11.169
124001.922104 Default isakmpd: quick mode done: src: 172.16.11.170 
dst: 172.16.11.169

Reply via email to