Зарегистрирован: Вс сен 06, 2009 22:41 Сообщений: 8
|
Приветствую! Имеется 1)DI-804HV: железо C3 \\ прошика V1.51b16 (последняя с этого сайта) WAN 172.21.136.194/26 \\ LAN 192.168.2.1/24 2) сервер: AltLinux Server 5.0.2 + Openswan Version 2.6.32 WAN 172.21.136.195/26 \\ LAN 192.168.1.2/24 нужно поднять между ними тунель IPsec. начинал с нуля, прокопал кучу материала, но не получается... конфиги: D-link: в основе http://dlink.ru/ru/faq/92/500.html и http://wiki.openswan.org/index.php/Openswan/DI-804HV и пр. Код: Local Subnet: 192.168.2.0 Local Netmask: 255.255.255.0 Remote Subnet: 192.168.1.0 Remote Netmask: 255.255.255.0 Remote Gateway: 172.21.136.195 Preshare Key: PASSWORD Extended Authentication: NOT Enabled IPSec NAT Traversal: NOT Enabled Remote ID: IP Address Value: 172.21.136.195 <- Set to external IP of remote gateway Local ID: IP Address Value: 172.21.136.194 <- Set to external IP of D-Link
----- IKE PROPOSAL INDEX -------
Proposal Name: IKE Proposal DH Group: Group 2 Encrypt Algorithm: 3DES Auth Algorithm: MD5 Life Time: 28800
----- IPSEC PROPOSAL INDEX -----
Proposal Name: IPSEC Proposal DH Group: Group 2 Encap Protocol: ESP Encrypt algorithm: 3DES Auth algorithm: SHA1 Life Time: 3600
на сервере - файл ipsec.conf Цитата: # /etc/ipsec.conf - Openswan IPsec configuration file config setup plutodebug=all interfaces=%defaultroute klipsdebug=none uniqueids=yes nat_traversal=no protostack=netkey
conn small left=172.21.136.195 leftid=172.21.136.195 leftsubnet=192.168.1.0/24 #leftsourceip=192.168.1.2 #leftnexthop=172.21.136.194 right=172.21.136.194 rightsubnet=192.168.2.0/24 rightid=172.21.136.194 #rightnexthop=172.21.136.195 keyexchange=ike ikelifetime=240m keylife=3600s pfs=yes ike=3des-md5 compress=no authby=secret keyingtries=0 disablearrivalcheck=no auto=start rekey=no auth=esp
логи с D-Link Код: Mon Feb 14 20:55:43 2011 Receive IKE M1(INIT) : 172.21.136.195 --> 172.21.136.194 Mon Feb 14 20:55:43 2011 Try to match with ENC:3DES AUTH:PSK HASH:MD5 Group:Group5 Mon Feb 14 20:55:43 2011 Try to match with ENC:3DES AUTH:PSK HASH:MD5 Group:Group2 Mon Feb 14 20:55:43 2011 Send IKE M2(RESP) : 172.21.136.194 --> 172.21.136.195 Mon Feb 14 20:55:46 2011 Receive IKE INFO : 172.21.136.195 --> 172.21.136.194 Mon Feb 14 20:55:49 2011 IKED re-TX : RESP to 172.21.136.195 Mon Feb 14 20:55:51 2011 Receive IKE INFO : 172.21.136.195 --> 172.21.136.194 Mon Feb 14 20:55:54 2011 IKED re-TX : RESP to 172.21.136.195 Mon Feb 14 20:55:56 2011 Receive IKE INFO : 172.21.136.195 --> 172.21.136.194 Mon Feb 14 20:55:57 2011 receiving a re-Tx MM msg, response the last msg Mon Feb 14 20:55:57 2011 IKED re-TX : MM to 172.21.136.195 Mon Feb 14 20:55:59 2011 Receive IKE INFO : 172.21.136.195 --> 172.21.136.194 Mon Feb 14 20:56:07 2011 IKED re-TX : RESP to 172.21.136.195 Mon Feb 14 20:56:09 2011 Receive IKE INFO : 172.21.136.195 --> 172.21.136.194 Mon Feb 14 20:56:17 2011 receiving a re-Tx MM msg, response the last msg Mon Feb 14 20:56:17 2011 IKED re-TX : MM to 172.21.136.195 Mon Feb 14 20:56:18 2011 Send IKE (INFO) : delete 172.21.136.194 -> 172.21.136.195 phase 1 Mon Feb 14 20:56:18 2011 IKE phase1 (ISAKMP SA) remove : 172.21.136.194 <-> 172.21.136.195
лог с сервера /var/log/auth/secure Код: ---------------- Starting Pluto subsystem... Starting Pluto (Openswan Version 2.6.32; Vendor ID OEhyLdACecfa) pid:19664 LEAK_DETECTIVE support [disabled] OCF support for IKE [disabled] SAref support [disabled]: Protocol not available SAbind support [disabled]: Protocol not available NSS support [disabled] HAVE_STATSD notification support not compiled in Setting NAT-Traversal port-4500 floating to off port floating activation criteria nat_t=0/port_float=1 NAT-Traversal support [disabled] | opening /dev/urandom using /dev/urandom as source of random entropy | inserting event EVENT_REINIT_SECRET, timeout in 3600 seconds | event added at head of queue | inserting event EVENT_PENDING_DDNS, timeout in 60 seconds | event added at head of queue | inserting event EVENT_PENDING_PHASE2, timeout in 120 seconds | event added after event EVENT_PENDING_DDNS ike_alg_register_enc(): Activating OAKLEY_TWOFISH_CBC_SSH: Ok (ret=0) ike_alg_register_enc(): Activating OAKLEY_TWOFISH_CBC: Ok (ret=0) ike_alg_register_enc(): Activating OAKLEY_SERPENT_CBC: Ok (ret=0) ike_alg_register_enc(): Activating OAKLEY_AES_CBC: Ok (ret=0) ike_alg_register_enc(): Activating OAKLEY_BLOWFISH_CBC: Ok (ret=0) ike_alg_register_hash(): Activating OAKLEY_SHA2_512: Ok (ret=0) ike_alg_register_hash(): Activating OAKLEY_SHA2_256: Ok (ret=0) no helpers will be started, all cryptographic operations will be done inline Using Linux 2.6 IPsec interface code on 2.6.27-ovz-smp-alt9 (experimental code) | process 19664 listening for PF_KEY_V2 on file descriptor 9 | finish_pfkey_msg: K_SADB_REGISTER message 1 for AH | 02 07 00 02 02 00 00 00 01 00 00 00 d0 4c 00 00 | pfkey_get: K_SADB_REGISTER message 1 | AH registered with kernel. | finish_pfkey_msg: K_SADB_REGISTER message 2 for ESP | 02 07 00 03 02 00 00 00 02 00 00 00 d0 4c 00 00 | pfkey_get: K_SADB_REGISTER message 2 | alg_init():memset(0x700be0, 0, 2016) memset(0x7013c0, 0, 2048) | kernel_alg_register_pfkey(): SADB_SATYPE_ESP: sadb_msg_len=19 sadb_supported_len=56 | kernel_alg_add():satype=3, exttype=14, alg_id=251 | kernel_alg_register_pfkey(): SADB_SATYPE_ESP: alg[0], exttype=14, satype=3, alg_id=251, alg_ivlen=0, alg_minbits=0, alg_maxbits=0, res=0, ret=1 | kernel_alg_add():satype=3, exttype=14, alg_id=2 | kernel_alg_register_pfkey(): SADB_SATYPE_ESP: alg[1], exttype=14, satype=3, alg_id=2, alg_ivlen=0, alg_minbits=128, alg_maxbits=128, res=0, ret=1 | kernel_alg_add():satype=3, exttype=14, alg_id=3 | kernel_alg_register_pfkey(): SADB_SATYPE_ESP: alg[2], exttype=14, satype=3, alg_id=3, alg_ivlen=0, alg_minbits=160, alg_maxbits=160, res=0, ret=1 | kernel_alg_add():satype=3, exttype=14, alg_id=5 | kernel_alg_register_pfkey(): SADB_SATYPE_ESP: alg[3], exttype=14, satype=3, alg_id=5, alg_ivlen=0, alg_minbits=256, alg_maxbits=256, res=0, ret=1 | kernel_alg_add():satype=3, exttype=14, alg_id=8 | kernel_alg_register_pfkey(): SADB_SATYPE_ESP: alg[4], exttype=14, satype=3, alg_id=8, alg_ivlen=0, alg_minbits=160, alg_maxbits=160, res=0, ret=1 | kernel_alg_add():satype=3, exttype=14, alg_id=9 | kernel_alg_register_pfkey(): SADB_SATYPE_ESP: alg[5], exttype=14, satype=3, alg_id=9, alg_ivlen=0, alg_minbits=128, alg_maxbits=128, res=0, ret=1 | kernel_alg_register_pfkey(): SADB_SATYPE_ESP: sadb_msg_len=19 sadb_supported_len=80 | kernel_alg_add():satype=3, exttype=15, alg_id=11 | kernel_alg_register_pfkey(): SADB_SATYPE_ESP: alg[6], exttype=15, satype=3, alg_id=11, alg_ivlen=0, alg_minbits=0, alg_maxbits=0, res=0, ret=1 | kernel_alg_add():satype=3, exttype=15, alg_id=2 | kernel_alg_register_pfkey(): SADB_SATYPE_ESP: alg[7], exttype=15, satype=3, alg_id=2, alg_ivlen=8, alg_minbits=64, alg_maxbits=64, res=0, ret=1 | kernel_alg_add():satype=3, exttype=15, alg_id=3 | kernel_alg_register_pfkey(): SADB_SATYPE_ESP: alg[8], exttype=15, satype=3, alg_id=3, alg_ivlen=8, alg_minbits=192, alg_maxbits=192, res=0, ret=1 | kernel_alg_add():satype=3, exttype=15, alg_id=7 | kernel_alg_register_pfkey(): SADB_SATYPE_ESP: alg[9], exttype=15, satype=3, alg_id=7, alg_ivlen=8, alg_minbits=40, alg_maxbits=448, res=0, ret=1 | kernel_alg_add():satype=3, exttype=15, alg_id=12 | kernel_alg_register_pfkey(): SADB_SATYPE_ESP: alg[10], exttype=15, satype=3, alg_id=12, alg_ivlen=8, alg_minbits=128, alg_maxbits=256, res=0, ret=1 | kernel_alg_add():satype=3, exttype=15, alg_id=252 | kernel_alg_register_pfkey(): SADB_SATYPE_ESP: alg[11], exttype=15, satype=3, alg_id=252, alg_ivlen=8, alg_minbits=128, alg_maxbits=256, res=0, ret=1 | kernel_alg_add():satype=3, exttype=15, alg_id=22 | kernel_alg_register_pfkey(): SADB_SATYPE_ESP: alg[12], exttype=15, satype=3, alg_id=22, alg_ivlen=8, alg_minbits=128, alg_maxbits=256, res=0, ret=1 | kernel_alg_add():satype=3, exttype=15, alg_id=253 | kernel_alg_register_pfkey(): SADB_SATYPE_ESP: alg[13], exttype=15, satype=3, alg_id=253, alg_ivlen=8, alg_minbits=128, alg_maxbits=256, res=0, ret=1 | kernel_alg_add():satype=3, exttype=15, alg_id=13 | kernel_alg_register_pfkey(): SADB_SATYPE_ESP: alg[14], exttype=15, satype=3, alg_id=13, alg_ivlen=8, alg_minbits=128, alg_maxbits=256, res=0, ret=1 | kernel_alg_add():satype=3, exttype=15, alg_id=18 | kernel_alg_add():satype=3, exttype=15, alg_id=19 | kernel_alg_add():satype=3, exttype=15, alg_id=20 | kernel_alg_add():satype=3, exttype=15, alg_id=14 | kernel_alg_add():satype=3, exttype=15, alg_id=15 | kernel_alg_add():satype=3, exttype=15, alg_id=16 ike_alg_register_enc(): Activating aes_ccm_8: Ok (ret=0) ike_alg_add(): ERROR: Algorithm already exists ike_alg_register_enc(): Activating aes_ccm_12: FAILED (ret=-17) ike_alg_add(): ERROR: Algorithm already exists ike_alg_register_enc(): Activating aes_ccm_16: FAILED (ret=-17) ike_alg_add(): ERROR: Algorithm already exists ike_alg_register_enc(): Activating aes_gcm_8: FAILED (ret=-17) ike_alg_add(): ERROR: Algorithm already exists ike_alg_register_enc(): Activating aes_gcm_12: FAILED (ret=-17) ike_alg_add(): ERROR: Algorithm already exists ike_alg_register_enc(): Activating aes_gcm_16: FAILED (ret=-17) | ESP registered with kernel. | finish_pfkey_msg: K_SADB_REGISTER message 3 for IPCOMP | 02 07 00 09 02 00 00 00 03 00 00 00 d0 4c 00 00 | pfkey_get: K_SADB_REGISTER message 3 | IPCOMP registered with kernel. Changed path to directory '/etc/ipsec.d/cacerts' Changed path to directory '/etc/ipsec.d/aacerts' Changed path to directory '/etc/ipsec.d/ocspcerts' Changing to directory '/etc/ipsec.d/crls' Warning: empty directory | inserting event EVENT_LOG_DAILY, timeout in 10012 seconds | event added after event EVENT_REINIT_SECRET | next event EVENT_PENDING_DDNS in 57 seconds | | *received whack message | alg_info_parse_str() ealg_buf=3des aalg_buf=md5eklen=0 aklen=0 | enum_search_prefix () calling enum_search(0x4c4740, "OAKLEY_3DES") | enum_search_ppfixi () calling enum_search(0x4c4740, "OAKLEY_3DES_CBC") | parser_alg_info_add() ealg_getbyname("3des")=5 | enum_search_prefix () calling enum_search(0x4c4780, "OAKLEY_MD5") | parser_alg_info_add() aalg_getbyname("md5")=1 | __alg_info_ike_add() ealg=5 aalg=1 modp_id=5, cnt=1 | __alg_info_ike_add() ealg=5 aalg=1 modp_id=2, cnt=2 | Added new connection small with policy PSK+ENCRYPT+TUNNEL+PFS+DONTREKEY+IKEv2ALLOW+SAREFTRACK | from whack: got --esp=3des-sha1;modp1024 | enum_search_prefix () calling enum_search(0x4c4820, "OAKLEY_GROUP_MODP1024") | alg_info_parse_str() ealg_buf=3des aalg_buf=sha1eklen=0 aklen=0 | enum_search_prefix () calling enum_search(0x4c4220, "ESP_3DES") | parser_alg_info_add() ealg_getbyname("3des")=3 | enum_search_prefix () calling enum_search(0x4c4440, "AUTH_ALGORITHM_HMAC_SHA1") | parser_alg_info_add() aalg_getbyname("sha1")=2 | __alg_info_esp_add() ealg=3 aalg=2 cnt=1 | esp string values: 3DES(3)_000-SHA1(2)_000; pfsgroup=MODP1024(2); flags=-strict | ike (phase1) algorihtm values: 3DES_CBC(5)_000-MD5(1)_000-MODP1536(5), 3DES_CBC(5)_000-MD5(1)_000-MODP1024(2); flags=-strict | counting wild cards for 172.21.136.195 is 0 | counting wild cards for 172.21.136.194 is 0 | alg_info_addref() alg_info->ref_cnt=1 | alg_info_addref() alg_info->ref_cnt=1 added connection description "small" | 192.168.1.0/24===172.21.136.195<172.21.136.195>[+S=C]...172.21.136.194<172.21.136.194>[+S=C]===192.168.2.0/24 | ike_life: 14400s; ipsec_life: 3600s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; policy: PSK+ENCRYPT+TUNNEL+PFS+DONTREKEY+IKEv2ALLOW+SAREFTRACK | * processed 0 messages from cryptographic helpers | next event EVENT_PENDING_DDNS in 56 seconds | next event EVENT_PENDING_DDNS in 56 seconds | | *received whack message listening for IKE messages | found lo with address 127.0.0.1 | found eth0 with address 172.21.136.195 | found eth1 with address 192.168.1.2 adding interface eth1/eth1 192.168.1.2:500 adding interface eth0/eth0 172.21.136.195:500 adding interface lo/lo 127.0.0.1:500 | could not open /proc/net/if_inet6 | connect_to_host_pair: 172.21.136.195:500 172.21.136.194:500 -> hp:none loading secrets from "/etc/ipsec.secrets" | id type added to secret(0x705d40) PPK_PSK: 172.21.136.194 | id type added to secret(0x705d40) PPK_PSK: 172.21.136.195 | Processing PSK at line 1: passed | * processed 0 messages from cryptographic helpers | next event EVENT_PENDING_DDNS in 55 seconds | next event EVENT_PENDING_DDNS in 55 seconds | | *received whack message | processing connection small | route owner of "small" unrouted: NULL; eroute owner: NULL | could_route called for small (kind=CK_PERMANENT) | route owner of "small" unrouted: NULL; eroute owner: NULL | route_and_eroute with c: small (next: none) ero:null esr:{(nil)} ro:null rosr:{(nil)} and state: 0 | request to add a prospective erouted policy with netkey kernel --- experimental | route_and_eroute: firewall_notified: true | command executing prepare-client | executing prepare-client: 2>&1 PLUTO_VERB='prepare-client' PLUTO_VERSION='2.0' PLUTO_CONNECTION='small' PLUTO_INTERFACE='eth0' PLUTO_NEXT_HOP='172.21.136.194' PLUTO_ME='172.21.136.195' PLUTO_MY_ID='172.21.136.195' PLUTO_MY_CLIENT='192.168.1.0/24' PLUTO_MY_CLIENT_NET='192.168.1.0' PLUTO_MY_CLIENT_MASK='255.255.255.0' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_PEER='172.21.136.194' PLUTO_PEER_ID='172.21.136.194' PLUTO_PEER_CLIENT='192.168.2.0/24' PLUTO_PEER_CLIENT_NET='192.168.2.0' PLUTO_PEER_CLIENT_MASK='255.255.255.0' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PLUTO_PEER_CA='' PLUTO_STACK='netkey' PLUTO_CONN_POLICY='PSK+ENCRYPT+TUNNEL+PFS+DONTREKEY+IKEv2ALLOW+SAREFTRACK' PLUTO_CISCO_DNS_INFO='' PLUTO_CISCO_DOMAIN_INFO='' PLUTO_PEER_BANNER='' ipsec _updown | popen(): cmd is 746 chars long | cmd( 0):2>&1 PLUTO_VERB='prepare-client' PLUTO_VERSION='2.0' PLUTO_CONNECTION='small' PL: | cmd( 80):UTO_INTERFACE='eth0' PLUTO_NEXT_HOP='172.21.136.194' PLUTO_ME='172.21.136.195' P: | cmd( 160):LUTO_MY_ID='172.21.136.195' PLUTO_MY_CLIENT='192.168.1.0/24' PLUTO_MY_CLIENT_NET: | cmd( 240):='192.168.1.0' PLUTO_MY_CLIENT_MASK='255.255.255.0' PLUTO_MY_PORT='0' PLUTO_MY_P: | cmd( 320):ROTOCOL='0' PLUTO_PEER='172.21.136.194' PLUTO_PEER_ID='172.21.136.194' PLUTO_PEE: | cmd( 400):R_CLIENT='192.168.2.0/24' PLUTO_PEER_CLIENT_NET='192.168.2.0' PLUTO_PEER_CLIENT_: | cmd( 480):MASK='255.255.255.0' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PLUTO_PEER_CA=': | cmd( 560):' PLUTO_STACK='netkey' PLUTO_CONN_POLICY='PSK+ENCRYPT+TUNNEL+PFS+DONTREKEY+IKEv: | cmd( 640):2ALLOW+SAREFTRACK' PLUTO_CISCO_DNS_INFO='' PLUTO_CISCO_DOMAIN_INFO='' PLUTO_PE: | cmd( 720):ER_BANNER='' ipsec _updown: | command executing route-client | executing route-client: 2>&1 PLUTO_VERB='route-client' PLUTO_VERSION='2.0' PLUTO_CONNECTION='small' PLUTO_INTERFACE='eth0' PLUTO_NEXT_HOP='172.21.136.194' PLUTO_ME='172.21.136.195' PLUTO_MY_ID='172.21.136.195' PLUTO_MY_CLIENT='192.168.1.0/24' PLUTO_MY_CLIENT_NET='192.168.1.0' PLUTO_MY_CLIENT_MASK='255.255.255.0' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_PEER='172.21.136.194' PLUTO_PEER_ID='172.21.136.194' PLUTO_PEER_CLIENT='192.168.2.0/24' PLUTO_PEER_CLIENT_NET='192.168.2.0' PLUTO_PEER_CLIENT_MASK='255.255.255.0' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PLUTO_PEER_CA='' PLUTO_STACK='netkey' PLUTO_CONN_POLICY='PSK+ENCRYPT+TUNNEL+PFS+DONTREKEY+IKEv2ALLOW+SAREFTRACK' PLUTO_CISCO_DNS_INFO='' PLUTO_CISCO_DOMAIN_INFO='' PLUTO_PEER_BANNER='' ipsec _updown | popen(): cmd is 744 chars long | cmd( 0):2>&1 PLUTO_VERB='route-client' PLUTO_VERSION='2.0' PLUTO_CONNECTION='small' PLUT: | cmd( 80):O_INTERFACE='eth0' PLUTO_NEXT_HOP='172.21.136.194' PLUTO_ME='172.21.136.195' PLU: | cmd( 160):TO_MY_ID='172.21.136.195' PLUTO_MY_CLIENT='192.168.1.0/24' PLUTO_MY_CLIENT_NET=': | cmd( 240):192.168.1.0' PLUTO_MY_CLIENT_MASK='255.255.255.0' PLUTO_MY_PORT='0' PLUTO_MY_PRO: | cmd( 320):TOCOL='0' PLUTO_PEER='172.21.136.194' PLUTO_PEER_ID='172.21.136.194' PLUTO_PEER_: | cmd( 400):CLIENT='192.168.2.0/24' PLUTO_PEER_CLIENT_NET='192.168.2.0' PLUTO_PEER_CLIENT_MA: | cmd( 480):SK='255.255.255.0' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PLUTO_PEER_CA='' : | cmd( 560):PLUTO_STACK='netkey' PLUTO_CONN_POLICY='PSK+ENCRYPT+TUNNEL+PFS+DONTREKEY+IKEv2A: | cmd( 640):LLOW+SAREFTRACK' PLUTO_CISCO_DNS_INFO='' PLUTO_CISCO_DOMAIN_INFO='' PLUTO_PEER: | cmd( 720):_BANNER='' ipsec _updown: | * processed 0 messages from cryptographic helpers | next event EVENT_PENDING_DDNS in 54 seconds | next event EVENT_PENDING_DDNS in 54 seconds | | *received whack message | processing connection small | kernel_alg_db_new() initial trans_cnt=90 | kernel_alg_db_new() will return p_new->protoid=3, p_new->trans_cnt=1 | kernel_alg_db_new() trans[0]: transid=3, attr_cnt=1, attrs[0].type=5, attrs[0].val=2 | returning new proposal from esp_info | creating state object #1 at 0x705e40 | processing connection small | ICOOKIE: 55 91 31 ac 75 e9 24 fe | RCOOKIE: 00 00 00 00 00 00 00 00 | state hash entry 13 | inserting state object #1 on chain 13 | inserting event EVENT_SO_DISCARD, timeout in 0 seconds for #1 | event added at head of queue | processing connection small | Queuing pending Quick Mode with 172.21.136.194 "small" "small" #1: initiating Main Mode | **emit ISAKMP Message: | initiator cookie: | 55 91 31 ac 75 e9 24 fe | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_SA | ISAKMP version: ISAKMP Version 1.0 (rfc2407) | exchange type: ISAKMP_XCHG_IDPROT | flags: none | message ID: 00 00 00 00 | ***emit ISAKMP Security Association Payload: | next payload type: ISAKMP_NEXT_VID | DOI: ISAKMP_DOI_IPSEC | ****emit IPsec DOI SIT: | IPsec DOI SIT: SIT_IDENTITY_ONLY | out_sa pcn: 0 has 1 valid proposals | out_sa pcn: 0 pn: 0<1 valid_count: 1 trans_cnt: 2 | ****emit ISAKMP Proposal Payload: | next payload type: ISAKMP_NEXT_NONE | proposal number: 0 | protocol ID: PROTO_ISAKMP | SPI size: 0 | number of transforms: 2 | *****emit ISAKMP Transform Payload (ISAKMP): | next payload type: ISAKMP_NEXT_T | transform number: 0 | transform ID: KEY_IKE | ******emit ISAKMP Oakley attribute: | af+type: OAKLEY_LIFE_TYPE | length/value: 1 | [1 is OAKLEY_LIFE_SECONDS] | ******emit ISAKMP Oakley attribute: | af+type: OAKLEY_LIFE_DURATION | length/value: 14400 | ******emit ISAKMP Oakley attribute: | af+type: OAKLEY_ENCRYPTION_ALGORITHM | length/value: 5 | [5 is OAKLEY_3DES_CBC] | ******emit ISAKMP Oakley attribute: | af+type: OAKLEY_HASH_ALGORITHM | length/value: 1 | [1 is OAKLEY_MD5] | ******emit ISAKMP Oakley attribute: | af+type: OAKLEY_AUTHENTICATION_METHOD | length/value: 1 | [1 is OAKLEY_PRESHARED_KEY] | ******emit ISAKMP Oakley attribute: | af+type: OAKLEY_GROUP_DESCRIPTION | length/value: 5 | [5 is OAKLEY_GROUP_MODP1536] | emitting length of ISAKMP Transform Payload (ISAKMP): 32 | *****emit ISAKMP Transform Payload (ISAKMP): | next payload type: ISAKMP_NEXT_NONE | transform number: 1 | transform ID: KEY_IKE | ******emit ISAKMP Oakley attribute: | af+type: OAKLEY_LIFE_TYPE | length/value: 1 | [1 is OAKLEY_LIFE_SECONDS] | ******emit ISAKMP Oakley attribute: | af+type: OAKLEY_LIFE_DURATION | length/value: 14400 | ******emit ISAKMP Oakley attribute: | af+type: OAKLEY_ENCRYPTION_ALGORITHM | length/value: 5 | [5 is OAKLEY_3DES_CBC] | ******emit ISAKMP Oakley attribute: | af+type: OAKLEY_HASH_ALGORITHM | length/value: 1 | [1 is OAKLEY_MD5] | ******emit ISAKMP Oakley attribute: | af+type: OAKLEY_AUTHENTICATION_METHOD | length/value: 1 | [1 is OAKLEY_PRESHARED_KEY] | ******emit ISAKMP Oakley attribute: | af+type: OAKLEY_GROUP_DESCRIPTION | length/value: 2 | [2 is OAKLEY_GROUP_MODP1024] | emitting length of ISAKMP Transform Payload (ISAKMP): 32 | emitting length of ISAKMP Proposal Payload: 72 | emitting length of ISAKMP Security Association Payload: 84 | ***emit ISAKMP Vendor ID Payload: | next payload type: ISAKMP_NEXT_VID | emitting 12 raw bytes of Vendor ID into ISAKMP Vendor ID Payload | Vendor ID 4f 45 68 79 4c 64 41 43 65 63 66 61 | emitting length of ISAKMP Vendor ID Payload: 16 | out_vendorid(): sending [Dead Peer Detection] | ***emit ISAKMP Vendor ID Payload: | next payload type: ISAKMP_NEXT_NONE | emitting 16 raw bytes of V_ID into ISAKMP Vendor ID Payload | V_ID af ca d7 13 68 a1 f1 c9 6b 86 96 fc 77 57 01 00 | emitting length of ISAKMP Vendor ID Payload: 20 | nat traversal enabled: 0 | emitting length of ISAKMP Message: 148 | sending 148 bytes for main_outI1 through eth0:500 to 172.21.136.194:500 (using #1) | 55 91 31 ac 75 e9 24 fe 00 00 00 00 00 00 00 00 | 01 10 02 00 00 00 00 00 00 00 00 94 0d 00 00 54 | 00 00 00 01 00 00 00 01 00 00 00 48 00 01 00 02 | 03 00 00 20 00 01 00 00 80 0b 00 01 80 0c 38 40 | 80 01 00 05 80 02 00 01 80 03 00 01 80 04 00 05 | 00 00 00 20 01 01 00 00 80 0b 00 01 80 0c 38 40 | 80 01 00 05 80 02 00 01 80 03 00 01 80 04 00 02 | 0d 00 00 10 4f 45 68 79 4c 64 41 43 65 63 66 61 | 00 00 00 14 af ca d7 13 68 a1 f1 c9 6b 86 96 fc | 77 57 01 00 | deleting event for #1 | inserting event EVENT_RETRANSMIT, timeout in 10 seconds for #1 | event added at head of queue | * processed 0 messages from cryptographic helpers | next event EVENT_RETRANSMIT in 10 seconds for #1 | next event EVENT_RETRANSMIT in 10 seconds for #1 | | *received 84 bytes from 172.21.136.194:500 on eth0 (port=500) | 55 91 31 ac 75 e9 24 fe 5b 2a 88 b8 36 16 dc 01 | 01 10 02 00 00 00 00 00 00 00 00 54 04 00 00 38 | 00 00 00 01 00 00 00 01 00 00 00 2c 01 01 00 01 | 00 00 00 24 01 01 00 00 80 01 00 05 80 02 00 01 | 80 03 00 01 80 04 00 02 80 0b 00 01 00 0c 00 04 | 00 00 38 40 | **parse ISAKMP Message: | initiator cookie: | 55 91 31 ac 75 e9 24 fe | responder cookie: | 5b 2a 88 b8 36 16 dc 01 | next payload type: ISAKMP_NEXT_SA | ISAKMP version: ISAKMP Version 1.0 (rfc2407) | exchange type: ISAKMP_XCHG_IDPROT | flags: none | message ID: 00 00 00 00 | length: 84 | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) | ICOOKIE: 55 91 31 ac 75 e9 24 fe | RCOOKIE: 5b 2a 88 b8 36 16 dc 01 | state hash entry 25 | v1 state object not found | ICOOKIE: 55 91 31 ac 75 e9 24 fe | RCOOKIE: 00 00 00 00 00 00 00 00 | state hash entry 13 | v1 peer and cookies match on #1, provided msgid 00000000 vs 00000000 | v1 state object #1 found, in STATE_MAIN_I1 | processing connection small | got payload 0x2(ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080 | ***parse ISAKMP Security Association Payload: | next payload type: ISAKMP_NEXT_KE | length: 56 | DOI: ISAKMP_DOI_IPSEC "small" #1: message ignored because it contains an unexpected payload type (ISAKMP_NEXT_KE) "small" #1: sending notification INVALID_PAYLOAD_TYPE to 172.21.136.194:500 | **emit ISAKMP Message: | initiator cookie: | 55 91 31 ac 75 e9 24 fe | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_N | ISAKMP version: ISAKMP Version 1.0 (rfc2407) | exchange type: ISAKMP_XCHG_INFO | flags: none | message ID: 00 00 00 00 | ***emit ISAKMP Notification Payload: | next payload type: ISAKMP_NEXT_NONE | DOI: ISAKMP_DOI_IPSEC | protocol ID: 1 | SPI size: 0 | Notify Message Type: INVALID_PAYLOAD_TYPE | emitting length of ISAKMP Notification Payload: 12 | emitting length of ISAKMP Message: 40 | sending 40 bytes for notification packet through eth0:500 to 172.21.136.194:500 (using #1) | 55 91 31 ac 75 e9 24 fe 00 00 00 00 00 00 00 00 | 0b 10 05 00 00 00 00 00 00 00 00 28 00 00 00 0c | 00 00 00 01 01 00 00 01 | * processed 0 messages from cryptographic helpers | next event EVENT_RETRANSMIT in 7 seconds for #1
как мне кажется ключевыми могут быть эти строчки Код: .... ike_alg_register_enc(): Activating aes_ccm_8: Ok (ret=0) ike_alg_add(): ERROR: Algorithm already exists ike_alg_register_enc(): Activating aes_ccm_12: FAILED (ret=-17) ike_alg_add(): ERROR: Algorithm already exists ike_alg_register_enc(): Activating aes_ccm_16: FAILED (ret=-17) ike_alg_add(): ERROR: Algorithm already exists ike_alg_register_enc(): Activating aes_gcm_8: FAILED (ret=-17) ike_alg_add(): ERROR: Algorithm already exists ike_alg_register_enc(): Activating aes_gcm_12: FAILED (ret=-17) ike_alg_add(): ERROR: Algorithm already exists ike_alg_register_enc(): Activating aes_gcm_16: FAILED (ret=-17) ..................... | *received 84 bytes from 172.21.136.194:500 on eth0 (port=500) | 55 91 31 ac 75 e9 24 fe 5b 2a 88 b8 36 16 dc 01 | 01 10 02 00 00 00 00 00 00 00 00 54 04 00 00 38 | 00 00 00 01 00 00 00 01 00 00 00 2c 01 01 00 01 | 00 00 00 24 01 01 00 00 80 01 00 05 80 02 00 01 | 80 03 00 01 80 04 00 02 80 0b 00 01 00 0c 00 04 | 00 00 38 40 | **parse ISAKMP Message: | initiator cookie: | 55 91 31 ac 75 e9 24 fe | responder cookie: | 5b 2a 88 b8 36 16 dc 01 | next payload type: ISAKMP_NEXT_SA | ISAKMP version: ISAKMP Version 1.0 (rfc2407) | exchange type: ISAKMP_XCHG_IDPROT | flags: none | message ID: 00 00 00 00 | length: 84 | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) | ICOOKIE: 55 91 31 ac 75 e9 24 fe | RCOOKIE: 5b 2a 88 b8 36 16 dc 01 | state hash entry 25 | v1 state object not found | ICOOKIE: 55 91 31 ac 75 e9 24 fe | RCOOKIE: 00 00 00 00 00 00 00 00 | state hash entry 13 | v1 peer and cookies match on #1, provided msgid 00000000 vs 00000000 | v1 state object #1 found, in STATE_MAIN_I1 | processing connection small | got payload 0x2(ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080 | ***parse ISAKMP Security Association Payload: | next payload type: ISAKMP_NEXT_KE | length: 56 | DOI: ISAKMP_DOI_IPSEC "small" #1: message ignored because it contains an unexpected payload type (ISAKMP_NEXT_KE) "small" #1: sending notification INVALID_PAYLOAD_TYPE to 172.21.136.194:500 ..........
прошу совета 
|
|