dear list,
after our v5-update the ssh-sentinel clients connections dont work anymore.
After couldnt debugging this, i deleted all the existing certificates and settings, now I followed the official AstaroV5-HowTo for IPSEC Roadwarriors with SSH Sentinel, but I cant get it working again.
I allways get "INVALID_ID_INFORMATION" as the reason of error.
The Astaro-Log says that there is no connection, but the connection is defined the right way:
vpn-ipsec_roadwarriors
Conn. Key(s): Matthias_Eichler
Local Endpoint: transit_eth3
Remote Endpoint: Any
Local Subnet: lan_eth5 (Network)
Remote Subnet: none
IPSec Policy: AES_PFS
The Astaro VPN Status shows:
000 "D_vpn-ipsec__roadwarriors_0": 10.1.0.0/16===82.135.32.2...%virtual[m.eichler@kernzeit.com]
000 "D_vpn-ipsec__roadwarriors_0": CAs: 'C=de, ST=Bavaria, L=Ottobrunn, O=kernzeit AG, OU=Technik, CN=ca, E=ca@kernzeit.com'...'%any'
000 "D_vpn-ipsec__roadwarriors_0": ike_life: 7800s; ipsec_life: 3600s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0
000 "D_vpn-ipsec__roadwarriors_0": policy: RSASIG+ENCRYPT+TUNNEL+PFS; interface: eth3; unrouted
000 "D_vpn-ipsec__roadwarriors_0": newest ISAKMP SA: #0; newest IPsec SA: #0; eroute owner: #0
000 "D_vpn-ipsec__roadwarriors_0": IKE algorithms wanted: 5_000-1-5, flags=-strict
000 "D_vpn-ipsec__roadwarriors_0": IKE algorithms found: 5_192-1_128-5,
000 "D_vpn-ipsec__roadwarriors_0": ESP algorithms wanted: 12_128-1, ; pfsgroup=5; flags=-strict
000 "D_vpn-ipsec__roadwarriors_0": ESP algorithms loaded: 12_128-1_128,
But the SSH Sentinel stops on Phase-2 with "Exchanging IPSec proposals FAILED!
The SSH Sentinel Audit says:
: Phase-2 [initiator] for ipv4(icmp:0,[0..3]=10.99.0.31) and ipv4(icmp:0,[0..3]=82.135.32.2) failed; Aborted notification.
: The remote server at 82.135.32.2:500 is 'draft-ietf-ipsec-nat-t-ike-03'
DEBUG: 0.0.0.0:500 (Initiator) 82.135.32.2:4500 { d4c463db e676f79c - 80685c65 7885e5ec [-1] / 0x00000000 } IP; MESSAGE: Phase 1 version = 1.0, auth_method = RSA signatures, cipher = 3des-cbc, hash = md5, prf = hmac-md5, life = 0 kB / 7800 sec, key len = 0, group = 5
DEBUG: 0.0.0.0:4500 (Responder) 82.135.32.2:4500 { d4c463db e676f79c - 80685c65 7885e5ec [1] / 0x403fb14d } Info; Received notify err = Invalid ID information (18) to isakmp sa, delete it
And the Astaro Log tells:
2004:08:03-16:15:35 (none) pluto[23329]: packet from 217.232.209.131:500: SSH Sentinel 1.4.1 found, setting XAUTH_ACK quirk
2004:08:03-16:15:35 (none) pluto[23329]: packet from 217.232.209.131:500: received Vendor ID payload [SSH Sentinel 1.4.1]
2004:08:03-16:15:35 (none) pluto[23329]: packet from 217.232.209.131:500: ignoring Vendor ID payload [draft-stenberg-ipsec-nat-traversal-02]
2004:08:03-16:15:35 (none) pluto[23329]: packet from 217.232.209.131:500: ignoring Vendor ID payload [draft-stenberg-ipsec-nat-traversal-01]
2004:08:03-16:15:35 (none) pluto[23329]: packet from 217.232.209.131:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03]
2004:08:03-16:15:35 (none) pluto[23329]: packet from 217.232.209.131:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n]
2004:08:03-16:15:35 (none) pluto[23329]: packet from 217.232.209.131:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02]
2004:08:03-16:15:35 (none) pluto[23329]: packet from 217.232.209.131:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-00]
2004:08:03-16:15:35 (none) pluto[23329]: packet from 217.232.209.131:500: ignoring Vendor ID payload [XAUTH]
2004:08:03-16:15:35 (none) pluto[23329]: "D_vpn-ipsec__roadwarriors_0"[2] 217.232.209.131 #4: responding to Main Mode from unknown peer 217.232.209.131
2004:08:03-16:15:35 (none) pluto[23329]: "D_vpn-ipsec__roadwarriors_0"[2] 217.232.209.131 #4: transition from state (null) to state STATE_MAIN_R1
2004:08:03-16:15:35 (none) pluto[23329]: "D_vpn-ipsec__roadwarriors_0"[2] 217.232.209.131 #4: NAT-Traversal: Result using draft-ietf-ipsec-nat-t-ike-02/03: peer is NATed
2004:08:03-16:15:35 (none) pluto[23329]: "D_vpn-ipsec__roadwarriors_0"[2] 217.232.209.131 #4: transition from state STATE_MAIN_R1 to state STATE_MAIN_R2
2004:08:03-16:15:35 (none) pluto[23329]: "D_vpn-ipsec__roadwarriors_0"[2] 217.232.209.131 #4: ignoring informational payload, type IPSEC_INITIAL_CONTACT
2004:08:03-16:15:35 (none) pluto[23329]: "D_vpn-ipsec__roadwarriors_0"[2] 217.232.209.131 #4: Main mode peer ID is ID_USER_FQDN: 'm.eichler@kernzeit.com'
2004:08:03-16:15:35 (none) pluto[23329]: "D_vpn-ipsec__roadwarriors_0"[2] 217.232.209.131 #4: Issuer CRL not found
2004:08:03-16:15:35 (none) pluto[23329]: "D_vpn-ipsec__roadwarriors_0"[2] 217.232.209.131 #4: Issuer CRL not found
2004:08:03-16:15:35 (none) pluto[23329]: "D_vpn-ipsec__roadwarriors_0"[2] 217.232.209.131 #4: transition from state STATE_MAIN_R2 to state STATE_MAIN_R3
2004:08:03-16:15:35 (none) pluto[23329]: | NAT-T: new mapping 217.232.209.131:500/4500)
2004:08:03-16:15:35 (none) pluto[23329]: "D_vpn-ipsec__roadwarriors_0"[2] 217.232.209.131:4500 #4: sent MR3, ISAKMP SA established
2004:08:03-16:15:35 (none) pluto[23329]: "D_vpn-ipsec__roadwarriors_0"[2] 217.232.209.131:4500 #4: Virtual IP 10.99.0.31/32 is already used by '(none)'
2004:08:03-16:15:35 (none) pluto[23329]: "D_vpn-ipsec__roadwarriors_0"[2] 217.232.209.131:4500 #4: Your ID is 'm.eichler@kernzeit.com'
2004:08:03-16:15:35 (none) pluto[23329]: "D_vpn-ipsec__roadwarriors_0"[2] 217.232.209.131:4500 #4: Virtual IP 10.99.0.31/32 is already used by '(none)'
2004:08:03-16:15:35 (none) pluto[23329]: "D_vpn-ipsec__roadwarriors_0"[2] 217.232.209.131:4500 #4: Your ID is 'm.eichler@kernzeit.com'
2004:08:03-16:15:35 (none) pluto[23329]: "D_vpn-ipsec__roadwarriors_0"[2] 217.232.209.131:4500 #4: cannot respond to IPsec SA request because no connection is known for 10.1.0.0/16===82.135.32.2:4500...217.232.209.131:4500[m.eichler@kernzeit.com]===10.99.0.31/32
2004:08:03-16:15:35 (none) pluto[23329]: "D_vpn-ipsec__roadwarriors_0"[2] 217.232.209.131:4500 #4: sending encrypted notification INVALID_ID_INFORMATION to 217.232.209.131:4500
Thanks for all your help!!!
Matthias
This thread was automatically locked due to age.