IPSecuritas

Transcription

IPSecuritas
Checkpoint NG Feature Pack 4
Checkpoint NG Feature Pack 4
by Jim Kelly on 2004-03-24 14:20:30 +0100
Are there any configuration instructions for use of IP Securitas with
Checkpoint NG FP 4?
Re: Checkpoint NG Feature Pack 4
by Mitch on 2004-03-26 15:28:37 +0100
Hi Jim,
Don't have an answer for you yet. Just downloaded the software at work
today and will take home and try it out tonight or tomorrow. I had limited
success with VPN Tracker and Checkpoint and saved screen shots of my
settings in that. I'll try configuring IPSecuritas with those and pass on the
info to you.
Checkpoint is a real pain in the a** when it comes to working through
third-party software, which I wouldn't even bother if they had a Mac
version. Stuck with Checkpoint, however, since my office uses it. As long as
IPSecuritas can import my .p12 file, I should be able to do it.
I've had to use VirtualPC, a no-legged dog when it comes to speed with the
Windows version of Checkpoint installed on that.
Re: Checkpoint NG Feature Pack 4
by cnadig on 2004-03-26 17:15:56 +0100
Hello,
Have a look at the HOWTO section in the online help. There are some
instructions how to configure IPsecuritas for a Checkpoint firewall, some
settings might differ, depending of the Checkpoint setting.
Since IPSecuritas can't (yet) import PKCS#12, check out the section that
describes how to convert them into files in PEM format to import the
certificates.
Re: Checkpoint NG Feature Pack 4
by Mitch on 2004-04-11 13:14:21 +0200
I modified my p12 cert the way described in help file and imported into
ipsecuritas, but the program still doesn't recognize the pem file when
setting up the ID section. It says that there are no certs available. What am
I doing wrong?
Re: Checkpoint NG Feature Pack 4
by cnadig on 2004-04-14 07:58:55 +0200
Hello Jim,
have you imported the two files as 'own certificate' and does the certificate
show up in the certifictates manager window (with the rows private saying
yes and CA saying no)?
Christoph
Re: Checkpoint NG Feature Pack 4
by Mitch on 2004-04-15 19:39:27 +0200
Still having problems. Importing as own certificate leaves the private
column "no" and the ca column "no".
fAntivirus and Firewall
by fmorchid on 2004-05-21 12:30:03 +0200
hello,
is it possible to install a symantec antivirus with the checkpoint firewall?
thnak you
Re: Checkpoint NG Feature Pack 4
by sandra maury on 2004-11-12 13:10:57 +0100
I have same problem. can you have solution ?
Thank you very much.
Sandra
[quote author=Mitch link=1080134430/0#5 date=1082050767]Still having
problems. Importing as own certificate leaves the private column "no" and
the ca column "no".[/quote]
NAT-T Support?
NAT-T Support?
by petro on 2004-03-28 18:50:05 +0200
Does anyone know where implementing NAT-T in the core MacOS IPsec
implementation stands? Unfortunately, KAME's web site isn't the easiest to
figure this stuff out on. Is apple using the straight KAME implementation?
Thanks,
-pete
Re: NAT-T Support?
by cnadig on 2004-04-14 08:12:18 +0200
Hello Petro,
there is NAT-T support in racoon in 10.3 - as for the necessary kernel
support I don't know yet.
I'm in contact with a few people to get some experience with NAT-T and
will keep you updated on any progress!
Christoph
Re: NAT-T Support?
by NetWhiz on 2004-05-28 18:11:42 +0200
Any further knowledge on this? Testing over a wireless dial-up b/c of a lack
of NAT-T support in the Mac OS X kernel really sucks.
UPDATE: Just saw teh new client, so tried it and it works wonderfully! Now,
is there any way you could post the racoon.conf file (or its location) so that
we might see what is being set? I would love to be able to get the built-in
L2TP/IPSec client working with NAT-T if at all possible! At least I could test
plain IPSec on a NAT'd connection now. Back to dialup for the L2TP support
though ... :(
Thanks,
NetWhiz
Re: NAT-T Support?
by cnadig on 2004-06-08 22:54:39 +0200
Hello,
IPSecuritas writes its racoon.conf to /tmp/ipsecuritas.conf - only root can
read it.
Could you elaborate a bit more on your tests with NAT-T?
Thanks,
Christoph
Re: NAT-T Support?
by AaronA1975 on 2004-10-08 04:40:44 +0200
Any news as to whether NAT-T will be available in an upcoming release of
IPSecuritas?
error malformed cookie received...
error malformed cookie received...
by Viny on 2004-03-29 05:15:04 +0200
I use IPSecuritas 1.0.3 on OS X 10.3.3 to a FW-1 NG AI R54 without
problem.
When using IPSecuritas 2.0, I have this error:
Mar 28 22:06:41 xxxx racoon: DEBUG: isakmp.c:519:isakmp_main():
malformed cookie received or the initiator's cookies collide.
I don't have error on the firewall.
When I come back with 1.0.3, it's OK.
And I have deleted 1.0.3 settings before reconfiguring 2.0 without success.
Somebody can help me ?
Thanks.
Re: error malformed cookie received...
by cnadig on 2004-03-30 06:38:48 +0200
Helloy Viny,
probably the other end sends a notification, probably to indicate an
unexpected situation. This is often done without the remote cookie and
therefore you get the error message. The key exchange would probably be
aborted anyway.
Could you post just the last line before the malformed cookie message, i.e:
Mar 24 05:21:01 g4 racoon: DEBUG: plog.c:199:plogdump():
8fefe5e8 ac9d2d2c 00000000 00000000 0b100500 00000000 00000028
0000000c
00000001 0100001d
That would allow to determine the content of the notification and the
reason, why it was send (unsupported exchange type in the example
above).
Christoph
Re: error malformed cookie received...
by Viny on 2004-03-30 12:24:34 +0200
Hello Christoph,
This is the line:
Mar 30 05:18:11 xxxx racoon: DEBUG: plog.c:199:plogdump(): 65dd6250
681660e4 00000000 00000000 0b100500 4ef00f34 00000028 0000000c
00000000 01000012
Thanks
Re: error malformed cookie received...
by cnadig on 2004-03-30 23:05:14 +0200
Hello Viny,
from the log and your error description I assume you're using a DN as your
local identification. IPSecuritas 1.0.3 always treated them as a username
with fully qualified distinguished name (a USER_FQDN), which seems to be
fine with a number of firewalls/routers.
Version 2.0 now makes a strict distinction between a USER_FQDN (normally
in the form user@dn) and a FQDN (without the user part and the @). It
seems that certain firewalls (including Checkpoint) only accept a
USER_FQDN, regardless of the actual value.
With 2.0.2 (get it at http://www.lobotomo.com/products/downloads
/IPSecuritas202.dmg) you can now force IPSecuritas to use USER_FQDN. Just
put a @ sign in front of the username (instead of 'user' enter '@user' into
the DN field for your local identifier).
It should then work again for you!
I'll release an official update that resolves a few more of these smaller
issues (also in the documentation) in a few weeks.
Christoph
Re: error malformed cookie received...
by Viny on 2004-03-31 06:37:44 +0200
Perfect ! It's work !
Thanks !
Viny
Re: error malformed cookie received...
by Jeff on 2004-05-15 18:46:23 +0200
I'm getting the same "malformed cookie" error, also with VPN-1. Here is the
line before in the log:
May 15 12:25:59 Jeffs-Computer racoon: DEBUG: plog.c:199:plogdump():
3ceb1670 26c898de 00000000 00000000 0b100500 00000000
00000028 0000000c 00000000 0100001d
Can you help?
Thanks!
IPSecuritas <-> Sonicwall
IPSecuritas <-> Sonicwall
by Guy van der Kolk on 2004-03-30 11:23:04 +0200
Goodmorning/afternoon/evening ;)
I haven an issue with the interoperability between IPSecuritas and a
Sonicwall. Specs of the Sonicwall will be added as soon as I get them.
We have a succesfull setup using VPNTracker. Off-course, as we are ever
aware of the costs, a free/donation program is better, and IPSecuritas looks
good.
I have set up the connectionsettings just as they are in the Working
VPN-Tracker setup. Racoon starts up like a charm, but I do not get past:
[i]racoon: ERROR: oakley.c:2053:oakley_skeyid(): couldn't find the pskey[/i]
Having tried almost every possible combination (luckily, there aren't that
many in the Phase 1 setup) I am at a loss.
As a final note: VPN-Trackers log ALSO says it can't find a PSKey, but
VPN-Tracker somehow continues and sets a working connection anyway.
Re: IPSecuritas <-> Sonicwall
by cnadig on 2004-03-30 11:32:16 +0200
Hello,
there are two possibilities that should resolve the issue:
1. Deselect the 'Verify Identity' option in Options tab
2. Set the remote identifier to 'DN' and enter the numerical IP address of the
IPSec router into the text field (which of course is only possible if it has a
static address).
I'm not sure whether racoon (the MacOS X IKE daemon) or the firewall is at
fault here - but it rather seems to be in racoon as I has similar reports with
different VPN routers.
Christoph
Re: IPSecuritas <-> Sonicwall
by Guy van der Kolk on 2004-03-30 12:20:56 +0200
Thank you very much!
The "Verify Identifier" option did the trick.
It now gives the same message as VPN-Tracker, but builds a working
connection anyway!
We'll be looking at a donation very soon. :)
Re: IPSecuritas <-> Sonicwall
by viparre on 2004-04-14 18:37:21 +0200
Hello,
I am trying to use a SonicWall too, but with no success :-(
- Should I use a separate SA in the SonicWall, or I must use the GroupVPN?
- May I use a dynamic IP address when I connect to the SonicWall?
- I created a new SA with the following options:
* Remote IP address 0.0.0.0
* Aggressive Mode
* Group 2
* esp des hmac md5
* dest network: 192.168.10.1/32
- On the Ip Securitas side:
* Host To Network
* The remote network
* a local address 192.168.10.1
* Exchange Mode: Aggressive
* Proposal Check: Obey / 16
* Ph 1: Grp 2, DES, MD5
* Ph 2: Grp 1, DES, HMAC MD5
* ID Auth Address, Address
* Options: IPSec DOi, SIT_IDE.., Initial Conact, Generate Policy, MIP6
The negotiation starts but the Sonicwall says that the ipsec proposal
doesn't match (Phase 1).
Unfortunately, I can' find a basic working example to start a trial.
Thanks for the help,
Vito Parisi
Re: IPSecuritas <-> Sonicwall
by David Barnhart on 2004-04-21 18:10:22 +0200
I have just spent a few weeks getting IPSecuritas 2.0 to connect to a Sonic
Wall.
There are a couple of things you should note.
1. You can use either the GroupVPN or a separate SA. I finally just had the
IT guy set me up a separate SA as that made it easier to have a different
home network than the one used by the people coming in through the
GroupVPN.
2. Setting up IPSecuritas in the network-to-network mode makes the
configuration job easier. Just use the network that you local address
resides in as the local network. Host to network should work as well, but it
does some things differently that were causing me some problems.
3. Make sure that the SonicWall has a route to your home network
address/network. This also applies to any routers on the network you are
trying to tunnel to.
Now, with regard to getting the tunnel established in the first place before
worrying about routing, I used a couple of different parameters than you
mention.
Proposal check: Claim 16
Phase 1: 3DES, SHA1
Phase 1 DH Group: Group 1
Phase 2: ESP 3DES HMAC SHA1
Phase 2 PFS Group: Group 1
As mentioned in one of the messages in this thread, turn off the Verify
Identifier option.
With all of the above set, I was able to establish a tunnel to our SonicWall,
even across a home router (which has IP-Sec passthrough turned on).
Obviously, you will have to check that the options match on both sides.
Hope this info helps.
Re: IPSecuritas <-> Sonicwall
by JIMBOB on 2004-04-23 11:44:32 +0200
I've tried to connect to a sonic wall SOHO3 and cannot seem to manage.
it seems to nearly get there, this is the last lines from debug
Apr 23 10:20:06 xxxxxx racoon: DEBUG:
isakmp.c:1374:isakmp_parsewoh(): succeed.
Apr 23 10:20:06 xxxxxx racoon: ERROR:
isakmp_inf.c:848:isakmp_info_recv_n(): unknown notify message, no
phase2 handle found.
Apr 23 10:20:06 xxxxxx racoon: DEBUG:
isakmp_inf.c:870:isakmp_info_recv_n(): notification message 14:NOPROPOSAL-CHOSEN, doi=1 proto_id=3 spi=0b0b7bf9(size=4).
Apr 23 10:20:06 xxxxxx racoon: ERROR:
isakmp_inf.c:848:isakmp_info_recv_n(): unknown notify message, no
phase2 handle found.
Apr 23 10:20:16 xxxxxx racoon: ERROR: pfkey.c:745:pfkey_timeover():
xx.xx.xx.xx give up to get IPsec-SA due to time up to wait.
Apr 23 10:20:16 xxxxxx racoon: ERROR: pfkey.c:745:pfkey_timeover():
xx.xx.xx.xx give up to get IPsec-SA due to time up to wait.
Apr 23 10:20:16 xxxxxx racoon: DEBUG:
schedule.c:210:sched_scrub_param(): an undead schedule has been
deleted.
any ideas greatfully received
using host to network, Ph1 group 1 des md5, Ph2 group 1 des md5
preshared secret and verify identifier off.
os 10.3.3, cable modem, dyn IP (though quite static), local network by
airport, port mapping 500 and 4500, local ip 10.0.1.2.
J/ :P
Re: IPSecuritas <-> Sonicwall
by JIMBOB on 2004-04-23 18:41:57 +0200
Hello again,
This is the corrisponding sonic wall log.
I'll have a play soon, but any magic ideas welome.
04/23/2004 10:18:20.848
IKE Responder: ESP Perfect Forward Secrecy
mismatch
xx.xx.xx.xx,
xx.xx.xx.xx
04/23/2004 10:18:20.704
IKE Responder: Received Quick Mode
Request (Phase 2)
xx.xx.xx.xx,
xx.xx.xx.xx
04/23/2004 10:18:01.592
IKE Responder: IPSec proposal does not
match (Phase 2)
xx.xx.xx.xx,
xx.xx.xx.xx
10.0.1.2/32 ->
193.112.230.3/24
04/23/2004 10:18:01.592
IKE Responder: ESP Perfect Forward Secrecy
mismatch
xx.xx.xx.xx,
xx.xx.xx.xx
04/23/2004 10:18:01.512
IKE Responder: Received Quick Mode
Request (Phase 2)
xx.xx.xx.xx,
xx.xx.xx.xx
04/23/2004 10:18:00.464
IKE Responder: Aggressive Mode complete
(Phase 1)
xx.xx.xx.xx,
xx.xx.xx.xx
DES MD5 Group 1
lifeSeconds=3600
04/23/2004 10:18:00.320
NAT Discovery : Peer IPSec Security Gateway
doesn't support VPN NAT Traversal
xx.xx.xx.xx,
xx.xx.xx.xx
thanks.
Re: IPSecuritas <-> Sonicwall
by JIMBOB on 2004-04-27 15:34:35 +0200
Well sorted that one easy enough,
The sonic wall doesn't support phase 2 DH, so set this to null on sucuritas.
;)
Re: IPSecuritas <-> Sonicwall
by Doug Fodeman on 2004-04-28 00:37:17 +0200
Like many others I'm looking for a low cost alternative to VPN Tracker. We
have a SonicWall Pro 230 and have turned on VPN services. A PC is able to
get in just fine but I haven't been able to tunnel in with my OSX Mac. Below
is the log file.
Here are the stats:
Host to Network operation
Phase1: DH Group1, 3DES, SHA1
Phase2: PFS Group2, DES, 3DES, HMAC, SHA1
ID/Authentication: Local is set to address while remote identifier uses the
identifying key in the Sonicwall. Preshared secret is entered correctly.
Options: Verify Identifier is turned off. Turned on are IPSec_DOI,
SIT_Identity, Initial Contact, Generate Policy, MIP6, Establish IKE
Immediately.
Log reads:
Apr 27 18:17:28 Computer IPSecuritas: Racoon is running
Apr 27 18:17:28 Computer IPSecuritas: Set kernel keys
Apr 27 18:17:28 Computer racoon: INFO: isakmp.c:1357:isakmp_open():
192.168.xxx.xxx[500] used as isakmp port (fd=6)
Apr 27 18:17:28 Computer racoon: INFO: isakmp.c:1357:isakmp_open():
192.168.xxx.xxx[500] used as isakmp port (fd=6)
Apr 27 18:17:28 Computer racoon: INFO:
isakmp.c:1681:isakmp_post_acquire(): IPsec-SA request for xxx.xxx.xxx.xx
queued due to no phase1 found.
Apr 27 18:17:28 Computer racoon: INFO:
isakmp.c:1681:isakmp_post_acquire(): IPsec-SA request for xxx.xxx.xxx.xx
queued due to no phase1 found.
Apr 27 18:17:28 Computer racoon: INFO:
isakmp.c:795:isakmp_ph1begin_i(): initiate new phase 1 negotiation:
192.168.xxx.xxx[500]<=>xxx.xxx.xxx.xx[500]
Apr 27 18:17:28 Douglas-Fodemans-Computer racoon: INFO:
isakmp.c:795:isakmp_ph1begin_i(): initiate new phase 1 negotiation:
192.168.xxx.xxx[500]<=>xxx.xxx.xxx.xx[500]
Apr 27 18:17:28 Computer racoon: INFO:
isakmp.c:800:isakmp_ph1begin_i(): begin Aggressive mode.
Apr 27 18:17:28 Computer racoon: INFO:
isakmp.c:800:isakmp_ph1begin_i(): begin Aggressive mode.
Any thoughts or suggestions??
Doug
Re: IPSecuritas <-> Sonicwall
by Brian Godden on 2004-08-17 21:30:02 +0200
Hi, I have another case of trying to get IPSecuritas connected to a Sonicwall.
The settings are pretty standard for both, os it's likely just my ignorance of
what each side requires, hopefully, it's something very obvious. I'm going
to list specs, settings and results below, any suggestions on changing the
settings for the client or SA would be greatly appreciated!
Firewall: SonicWall Pro-VX
-------------------------------VPN Summary(these feature are enabled):
Enable VPN
Enable IKE Dead Peer Detection
Dead Peer Detection Interval (seconds): 60
Failure Trigger Level (missed heartbeats): 3
Clean up Active tunnels when Peer Gateway DNS name resolves to a
different IP Address
SA: GroupVPN
IPSec Keying Mode: IKE using pre-shared secret
Security Policy:
Phase 1 DH Group: Group 1
SA Life time (secs): 28800
Phase 1 Encryption/Authentication: DES & MD5
Phase 2 Encryption/Authentication: Encrypt and Authenticate (ESP DES
HMAC MD5)
Shared Secret: ---------IPSecutas, version 2.0.6
Mac OS X 10.3.5
General:
Mode: Host to Network
Remote IPSec Device: (IP Address of firewall)
Remote Network: 10.5.1.0 / 24
Exchange Mode: Main
Proposal Check: Obey Nonce Size: 16
Phase 1:
Lifetime: 28800
DH Group: Mod768(1)
Encryption: DES
Authentication: MD5
Phase 2:
Lifetime: 28800
PFS Group: Mod768 (1)
Encryption: DES
Authentication: HMAC MD5
Id/Auth:
Identifiers set to Address (also tried setting DN of remote to firewall
address)
Preshared Secret set
Options (these are enabled):
Compression Deflate
IPSec DOI
SIT_IDENTITY_ONLY
Initial Contact
MIP6
DHCP-Passthrough
Establish IKE Immediately
Re: IPSecuritas <-> Sonicwall
by Brian Godden on 2004-08-17 21:31:10 +0200
Here are my log entries:
Here is the log of IPSecuritas in normal mode:
Aug 17 12:23:02 powerbookg3 IPSecuritas: Parsing configuration
Aug 17 12:23:03 powerbookg3 IPSecuritas: Setting up racoon.conf
Aug 17 12:23:03 powerbookg3 IPSecuritas: Setting up setkey.conf
Aug 17 12:23:03 powerbookg3 IPSecuritas: Setting up psk.txt
Aug 17 12:23:03 powerbookg3 IPSecuritas: Setting up tunnel.conf
Aug 17 12:23:03 powerbookg3 IPSecuritas: Parsing configuration done
Aug 17 12:23:04 powerbookg3 IPSecuritas: Starting racoon...
Aug 17 12:23:04 powerbookg3 IPSecuritas: Racoon is running
Aug 17 12:23:04 powerbookg3 IPSecuritas: Set kernel keys
Aug 17 12:23:06 powerbookg3 racoon: ERROR:
isakmp_inf.c:848:isakmp_info_recv_n(): unknown notify message, no phase2
handle found.
Aug 17 12:23:06 powerbookg3 racoon: ERROR:
isakmp_inf.c:848:isakmp_info_recv_n(): unknown notify message, no phase2
handle found.
Aug 17 12:23:26 powerbookg3 racoon: ERROR:
isakmp_inf.c:848:isakmp_info_recv_n(): unknown notify message, no phase2
handle found.
Aug 17 12:23:36 powerbookg3 racoon: ERROR: pfkey.c:745:pfkey_timeover():
64.139.33.26 give up to get IPsec-SA due to time up to wait.
Aug 17 12:23:26 powerbookg3 racoon: ERROR:
isakmp_inf.c:848:isakmp_info_recv_n(): unknown notify message, no phase2
handle found.
Aug 17 12:23:36 powerbookg3 racoon: ERROR: pfkey.c:745:pfkey_timeover():
64.139.33.26 give up to get IPsec-SA due to time up to wait.
And the corresponding log of the firewall:
08/17/2004 12:23:27.064
SENDING>>>> ISAKMP OAK INFO (InitCookie 0x517f043c892f85c1, MsgID:
0x34722540) *(HASH, NOTIFY:NO_PROPOSAL_CHOSEN)
64.139.33.26, 500
63.196.31.22, 498
08/17/2004 12:23:27.064
IKE Responder: IPSec proposal does not match (Phase 2)
63.196.31.22 (admin)
64.139.33.26
10.5.10.127/32 -> 10.5.1.0/24
08/17/2004 12:23:27.064
IKE Responder: ESP Perfect Forward Secrecy mismatch
63.196.31.22 (admin)
64.139.33.26
08/17/2004 12:23:26.928
RECEIVED<<< ISAKMP OAK QM (InitCookie 0x517f043c892f85c1, MsgID:
0x14E299E6) *(HASH, SA, NON, KE, ID, ID)
63.196.31.22, 498 (admin)
64.139.33.26, 500
Re: IPSecuritas <-> Sonicwall
by Brian Godden on 2004-08-17 23:32:56 +0200
Hmmm.. OK, after reading more thoroughly through JIMBOBs setup above,
I set Phase 2 PFS Group to None and then estabished a connection!! You
guys rock for making this freeware, I will get a donation of some kind
going...
I am however, not able to ping machines inside the other network... Any
help on what might be happening there?
Thanks!
-Brian
Re: IPSecuritas <-> Sonicwall
by Paul Chernoff on 2004-12-24 15:58:45 +0100
I just upgraded my SonicWall 2040 to Sonic Enhanced OS 2.5 from the
regular Sonic OS 2.1. I had to recreate all of my settings on the SonicWall.
Since then I cannot get IPSecuritas to connect to the SonicWall.
My IPSecuritas settings are intended to mirror my SonicWall (which I won't
have access to until Monday). My IPSecuritas settings are as follows:
Host to Network
Exchange Mode: Main
Proposal Check: Obey, size :16
Phase 1
Lifetime: 28800
DH Group: Mod768 (1)
Encryption: 3DES
Auth: MD5
Phase 2
Lifetime: 28800
PFS Group: None (I know it is EPS on the SW)
Encryption: 3DES
Auth: MD5
ID/Auth
Address for both and a preshared secret
Options
Establish IKE immediately
Here is the log on my IPSecuritas
Dec 24 09:52:05 Paul-Chernoffs-Computer IPSecuritas: Parsing
configuration
Dec 24 09:52:05 Paul-Chernoffs-Computer IPSecuritas: Setting up
racoon.conf
Dec 24 09:52:05 Paul-Chernoffs-Computer IPSecuritas: Setting up
setkey.conf
Dec 24 09:52:05 Paul-Chernoffs-Computer IPSecuritas: Setting up psk.txt
Dec 24 09:52:05 Paul-Chernoffs-Computer IPSecuritas: Setting up
tunnel.conf
Dec 24 09:52:05 Paul-Chernoffs-Computer IPSecuritas: Parsing
configuration done
Dec 24 09:52:06 Paul-Chernoffs-Computer IPSecuritas: Starting racoon...
Dec 24 09:52:07 Paul-Chernoffs-Computer IPSecuritas: Racoon is running
Dec 24 09:52:07 Paul-Chernoffs-Computer IPSecuritas: Set kernel keys
Dec 24 09:52:07 Paul-Chernoffs-Computer racoon: ERROR:
ipsec_doi.c:2993:ipsecdoi_checkid1(): Expecting IP address type in main
mode, but FQDN.
Dec 24 09:52:07 Paul-Chernoffs-Computer racoon: ERROR:
ipsec_doi.c:2993:ipsecdoi_checkid1(): Expecting IP address type in main
mode, but FQDN.
Dec 24 09:52:07 Paul-Chernoffs-Computer racoon: ERROR:
isakmp_ident.c:668:ident_i4recv(): invalid ID payload.
Dec 24 09:52:07 Paul-Chernoffs-Computer racoon: ERROR:
isakmp_ident.c:668:ident_i4recv(): invalid ID payload.
Any suggestions would be welcome.
Re: IPSecuritas <-> Sonicwall
by Kurt Wolf on 2005-02-03 05:03:59 +0100
I am having some issues connecting to a SonicWall 2030. Leg from
ipsecuritas is below. Any help would be greatly appriciated.
Feb 2 21:02:06 WolfiePowerBook racoon: DEBUG:
isakmp.c:1718:isakmp_ph1resend(): resend phase1 packet
b4021be9c0639221:0000000000000000
Feb 2 21:02:06 WolfiePowerBook racoon: DEBUG:
isakmp.c:233:isakmp_handler(): ===
Feb 2 21:02:06 WolfiePowerBook racoon: DEBUG:
isakmp.c:234:isakmp_handler(): 92 bytes message received from
216.185.179.130[500]
Feb 2 21:02:06 WolfiePowerBook racoon: DEBUG: plog.c:199:plogdump():
b4021be9 c0639221 1270aedd d606c3e2 0b100500 00000000 0000005c
00000040 00000000 0110000e b4021be9 c0639221 1270aedd d606c3e2
00060004 00000000 00040018 0000004e 6f207072 6f706f73 616c2069
73206368 6f73656e
Feb 2 21:02:06 WolfiePowerBook racoon: DEBUG:
isakmp_inf.c:115:isakmp_info_recv(): receive Information.
Feb 2 21:02:06 WolfiePowerBook racoon: ERROR:
isakmp_inf.c:142:isakmp_info_recv(): ignore information because the
message has no hash payload.
Feb 2 21:02:06
Re: IPSecuritas <-> Sonicwall
by Martijn Goudkamp on 2005-04-19 19:48:30 +0200
Hi! I just got my Mac mini with OS 10.3.9 working with our company 3060
(running 2.6 enhanced). Full VPN, no problems.
Here is my config for IPsecuritas:
[b]General[/b]
Network to network
Aggressive mode
Claim Nonce 16
[b]Phase 1[/b]
DH group 1
Encryption 3DES
Authentication SHA1
[b]Phase 2[/b]
DH group none
Encryption 3DES
Authentication HMAC SHA1
And here's the trick; you NEED to use an identifier on BOTH sides. Put
whatever you want to use but make sure that on the other side, it's the
opposite and select Domain Name on the Sonicwall:
[b]Id[/b]
Local ident: DN mydomain.it
Remote ident: DN theirdomain.it
Preshared: whatanicesecret
The rest is default.
On the Sonicwall, I created a new SA (no GroupVPN since our clients
connect using XAUTH) with the same settings.
I'm using my Mac thru a wireless ADSL router, at work with have a 10mbit
fiber connection. Hope it's been helpfull!
Re: IPSecuritas <-> Sonicwall
by Karsten on 2005-10-12 00:45:09 +0200
[quote author=David Barnhart link=1080638584/0#4 date=1082563822]I
have just spent a few weeks getting IPSecuritas 2.0 to connect to a Sonic
Wall.
There are a couple of things you should note.
1. You can use either the GroupVPN or a separate SA. I finally just had the
IT guy set me up a separate SA as that made it easier to have a different
home network than the one used by the people coming in through the
GroupVPN.
[/quote]
Quick question here: How do you tell IPSecuritas which SA to use?
Thanks,
Karsten
Re: IPSecuritas <-> Sonicwall
by mango on 2005-10-29 09:20:45 +0200
ok, i have a wierd problem with ipsecuritas or with my sonicwall tz 170, os
10.4.2. I'm able to vpn correctly, but shortly after i make a connection, my
network or usb printer starts to print blank pages about 50 pages or so.
This has happen with two different computers each using two different
printer models and the same settings for the vpn. Everthing else seems to
work corectly, vnc, file sharing, telnet... The print manager shows multiple
completed jobs with the name (stdin) .Only the defualt printer is affected.
Any help who be nice. thanks
Re: IPSecuritas <-> Sonicwall
by ghuller on 2005-12-20 15:05:55 +0100
I need help from anyone who has experience setting up IPSecuritas & VPN
Tracker with a SonicWall. I have a SonicWall 3060. I can setup a Host to
Network VPN with no problems with VPN Tracker 3, but I'm unsuccessful
when I copy the settings into the more cost effective IPSecuritas. What am I
missing? Can someone help me translate my VPN Tracker 3 settings into
IPSecuritas and have it actually work??!!??
Here are the VPN Tracker settings I'm trying to copy over into IPSecuritas
(NOTE: if settings aren't noted, then they are left blank in the VPN Tracker
configuration):
CONNECTION:
SonicWall SonicOS
Phase1 GeneralExchange mode: aggressive, main
Proposal check: claim
Nonce size: 16
* Send INITIAL-CONTACT message
*Support MIP6
*Use IPSEC DOI
*Use SIT_IDENTITY_ONLY
Phase1 ProposalEncryption Algorithm: 3DES
Hash Algorithm: SHA1
Diffie-Hellman: Group 2 (1024 bit)
Lifetime: 28800 seconds
Phase2*PFS Enabled: Group 2 (1024 bit)
Lifetime: 28800 seconds
Encryption Algorithm: 3DES
Authentication Algorithm: HMAC SHA1
*Initiate Connection From This End
NETWORK:
Host to Network
Network Port: Automatic
VPN Gateway Address: ip address specified here
Local Address: blank
Remote Network/Mask: ip address & mask specified here
AUTHENTICATION:
Pre-shared key: key specified here
*Enable Extended Authentication (XAUTH)
IDENTIFIERS:
Local Identifier:
*FQDN: specified here
Remote Identifier
*FQDN: specified here
DNS:
*Use Remote DNS Server
*Use server for all domains
IPSecuritas, ZyWALL + NAT
IPSecuritas, ZyWALL + NAT
by chris on 2004-04-04 12:53:31 +0200
I'm working with a ZyWALL 10 and IPSecuritas as VPN Client. It works fine, if
NAT Translation is not activated in my VPN Rule on ZyWALL. Otherwise I get
an PAYLOAD ERROR 130 in IPSecuritas.
NAT Translation is needet due many customers are in Networks with NAT
and not able to use VPN to my location.
Does someone have an idea or a workaround?
- Chris (Switzerland)
what MacOS
by cnadig on 2004-04-14 08:10:12 +0200
Hello Chris,
what MacOS version do you run? There seems to be NAT-T support in 10.3
which is missing in 10.2, although I don't have any experiences yet.
Could you also post the relevant lines from log to spot the place in racoon's
sources?
Thank you,
Christoph
Re: IPSecuritas, ZyWALL + NAT
by chris on 2004-04-25 23:02:19 +0200
Hello Christoph
Sorry for my late answer, I was on holiday :D
After switching to MacOS X 10.3 and updating the ZyWall's Firmware it's
working fine now.
Thank you,
Chris
Connecting to Nortel Contivity?
Connecting to Nortel Contivity?
by George White on 2004-04-04 19:05:45 +0200
Has anyone had any luck connecting to a Nortel Contivity? I'm trying to
determine if I can use IPSecuritas in place of the Nortel Multi-OS client.
I'm pretty sure that I have the correct ESP config for my office config, but
I'm not sure the correct format of the DN and PSK. Any ideas?
Thanks,
G
Re: Connecting to Nortel Contivity?
by cnadig on 2004-04-14 08:14:00 +0200
Hello,
do you have any indication from the log window of what fails (set the log
level to 'Verbose Debug' in IPSecuritas' preferences)?
Christoph
Re: Connecting to Nortel Contivity?
by Fred on 2004-08-04 07:49:50 +0200
Could you give me a hint as to what you did to set it up?
I'm wanting to do the same thing
Connecting to multiple networks behind a firewall
Connecting to multiple networks behind a firewall
by Doug Weathers on 2004-04-04 21:23:56 +0200
Hi,
Love IPSecuritas! It's got a few more options than VaporSec, which is good
because my setup is a bit more complicated than the usual. Unfortunately,
I still can't figure out the correct combination of settings I need.
I have a SonicWALL firewall at work. There are several networks behind it,
because we connect to a lot of business partners.
I can't figure out how to connect to more than one network behind the
firewall. I've configured two tunnels with identical setups, differing only by
the destination network. They each work individually, but if I try them
simultaneously only the first one seems to work.
Anyone have any idea how to fix this?
Thanks,
Doug
Re: Connecting to multiple networks behind a firew
by cnadig on 2004-04-14 08:03:53 +0200
Hello Doug,
at the moment this is not possible (unless you can combine the severeal
networks into one with a smaller netmask). I'm also unsure whether racoon
(the IKE daemon) allows this, but I will check.
Would you be able to test an enhanced version of IPSecuritas (unfortunately
I don't have access to such a setup yet)?
Christoph
Re: Connecting to multiple networks behind a firew
by Eduardo Alvarenga on 2004-04-21 22:12:46 +0200
I have a setup like this and would be very glad to test this new release.
Currently my VPN Network is based on ISAKMPD-OpenBSD servers (5
nodes), with Windows clients I can access all the networks by specifying
0.0.0.0/0 as the destination network but it seems IPSecuritas/Racoon
doesn't allows this.
Please mail me if any version appears ok ?
Best Regards,
Eduardo
Re: Connecting to multiple networks behind a firew
by cnadig on 2004-04-22 13:35:31 +0200
Hello Eduardo,
the host to anywhere mode sets the remote network to 0.0.0.0/0 and
will send all traffic through the tunnel (using the host to network mode with
the remote network set to 0.0.0.0/0 won't work because this would also try
to send the IKE traffic through the not yet established tunnel... The host to
anywhere mode has an exclude rule for the IKE traffic).
Regards,
Christoph
Re: Connecting to multiple networks behind a firew
by Doug Weathers on 2004-04-25 06:41:06 +0200
[quote author=cnadig link=1081106636/0#1 date=1081922633]Hello
Doug,
Would you be able to test an enhanced version of IPSecuritas (unfortunately
I don't have access to such a setup yet)?
Christoph[/quote]
I would be happy to test enhanced versions of IPSecuritas. I'm the network
admin where I work and have lots and lots of networks to connect to :)
Re: Connecting to multiple networks behind a firew
by Eduardo Alvarenga on 2004-05-10 02:22:55 +0200
Unfortunatelly I can't use HOST->Anywhere mode because I need to specify
my "Local Address". Using host to anywhere doesn't give me this option.
Any ideas?
Re: Connecting to multiple networks behind a firew
by Fabrice Vincent on 2005-08-03 01:30:20 +0200
[quote author=Doug Weathers link=1081106636/0#0 date=1081106636]
I can't figure out how to connect to more than one network behind the
firewall. I've configured two tunnels with identical setups, differing only by
the destination network. They each work individually, but if I try them
simultaneously only the first one seems to work.
Anyone have any idea how to fix this?
[/quote]
Hi,
I have precisely the very same need and very same behavior as described
above. I browsed through the forum but failed to find any answer to this
question.
So, is it possible to have more than one tunnels active at the same time?
If not, is there any chance that it could work in the near future?
I will be happy to do some testing if it can be usefull.
My context: I manage our company Firewal and use IPSecuritas to create
VPN connexions for roaming users. Our Firewall is an Arkoon A200
appliance, which uses linux swansea as foundation (see
http://www.arkoon.net/EN/g_mid.php?menuon=eczone2&#p_38 for
details).
BTW, thank for this great (and cheap!) tool!!!
cheers,
Fabrice
Re: Connecting to multiple networks behind a firew
by favincen on 2005-08-03 02:25:09 +0200
Some more details:
1) Of course the different subnets I connect to cannot be merged into a
bigger subnet...
2) I managed to make this work with the demo version of VPNTracker. I just
configured the various subnets into the same VPN connexion and it worked.
If VPNTracker is using the same IPsec stack as IPSecuritas then I assume
there would be some ways to make IPSecuritas behave the same.
Thanks in advance for your help.
Re: Connecting to multiple networks behind a firew
by cnadig on 2005-08-04 23:38:14 +0200
Hello Fabrice,
I'm happy to announce that the next release of IPSecuritas will finally allow
for multiple remote networks (amongst other long awaited extensions).
Public alpha/beta versions will presumably be available by the end of
August/beginning of September - please drop me a line at
[email protected] if you're interested in an early version.
Cheers,
Christoph
Re: Connecting to multiple networks behind a firew
by favincen on 2005-08-05 13:17:58 +0200
great news. I look forward for the testing.
IPSecuritas with Airport Extreme NAT
IPSecuritas with Airport Extreme NAT
by TLangley on 2004-04-15 20:00:16 +0200
Hi,
I'm using IP Securitas to connect from DSL at home to a Netscreen firewall
at the office.
From testing at a couple of locations out of the office, I've found that if
another box (a Linksys) is doing the NAT and the AEBS is only bridging,
IPSec works great. If I take the Linksys out of the setup and have the AEBS
do NAT, IPSec stops working. It appears to connect and will ping, but will
not support any real traffic, such as a server connection.
There's a lot of talk on the Apple Discussion boards about this. On
suggestion is to set your VPN software to "Negotiate UDP encapsulation
with VPN server for NAT traversal". I'm wondering if there is a way around
this problem within IPSecuritas.
Thanks.
Re: IPSecuritas with Airport Extreme NAT
by cnadig on 2004-04-15 22:20:00 +0200
Hello,
there was an issue with older firmware versions of the AEBS (not sure of the
exact version anymore, but I think it was 5.1.x) and IP fragmentation, which
resulted in the described beahvior (small packets work (ping), real traffic
that needs fragmentation fails).
I'm using IPSec with AEBS and NAT enabled daily without problems with
firmware version 5.3.
Christoph
Re: IPSecuritas with Airport Extreme NAT
by Laurens van Hoorn on 2004-11-04 10:04:09 +0100
I have Airport in my home, and also the possibility to connect to my
(Thomson) router by dropcable.
Airport seems fine at first (no errors in log, and green lights from
IPSecuritas) but doesn't work. Connecting by dropcable (and thus going
around the Airport) does.
Checkpoint NG AI R55
Checkpoint NG AI R55
by sumpfgottheit on 2004-04-16 11:53:19 +0200
Hi!
I try a VPN to my Checkpoint in the Office, but i get the following error:
Apr 16 11:43:39 Powerbook racoon: ERROR:
isakmp.c:2033:isakmp_chkph1there(): phase2 negotiation failed due to
time up waiting for phase1. ESP <FW-IP>-><MY-IP>
Any hints?
best regards,
florian
Re: Checkpoint NG AI R55
by cnadig on 2004-04-16 13:28:27 +0200
Hello Florian,
since Phase 1 negotiation fails, there is a timeout for Phase 2 - setting the
log level to 'Verbose Debug' will give a better indication.
Have a look at the following threads for possible solutions:
http://www.lobotomo.com/cgi-bin/yabb/YaBB.pl?board=IPSecuritas;
action=display;num=1080638584
and
http://www.lobotomo.com/cgi-bin/yabb/YaBB.pl?board=IPSecuritas;
action=display;num=1080530104
If none of this resolves the problem, I'd need a more detailed log (please
make sure to remove any confidential information).
Christoph
Re: Checkpoint NG AI R55
by Viny on 2004-04-19 02:07:04 +0200
This is my parameters with NG AI R54 and IPSecuritas 2.0.2
http://www.lobotomo.com/products/downloads/IPSecuritas202.dmg
I don't know if it's the best configuration but it's work for me.
Good luck....
Check Point NG AI R54 and IPSecuritas 2.0.2
Check Point
Global Proterties
Remote Access
VPN - Basic
Check: Pre-Shared Secret, Public Key Signatures, Hybrid Mode
Check: Gateways support IKE over TCP
VPN - Advanced
User Encryption Proterties: 3DES, MD5
Check: OKE Security associations proterties: Groupe 2
Resolving mechanism: Enable Securemote/SecureClient ...
Check Point Gateway
Traditional mode IKE properties
Check: 3DES, MD5, Pre_shared Secret, Public Key Signatures,
Exportable...
Traditional mode IKE properties, Advanced
Check: Group 2, Support aggressive mode
Renegotiate IKE... : 1440 minutes
Renegotiate IPsec... : 3600 Seconds
User Properties
Encryption
Check: IKE
Encryption, Edit
Specify the password
IPSecuritas 2.0.2
General
Mode of Operation: Host to Network
Exchange Mode: Aggressive
Proposal Check: Claim
Re: Checkpoint NG AI R55
by Jonathan Lundell on 2004-05-24 00:21:51 +0200
Moving to 2.0.2 and adding @ to my user name helped, in that I'm getting
quite a bit farther. Now I get this message, repeated:
May 23 15:10:05 jlundell racoon: NOTIFY: oakley.c:2057:oakley_skeyid():
couldn't find the proper pskey, try to get one by the peer's address.
May 23 15:10:05 jlundell racoon: NOTIFY: oakley.c:2057:oakley_skeyid():
couldn't find the proper pskey, try to get one by the peer's address.
May 23 15:10:05 jlundell racoon: ERROR:
oakley.c:1190:oakley_validate_auth(): HASH mismatched
May 23 15:10:05 jlundell racoon: ERROR:
oakley.c:1190:oakley_validate_auth(): HASH mismatched
(I'm posting in this thread because we're running R55. This is my first time
trying IPSecuritas, so I don't have a history of getting it working with earlier
CKPT versions.)
Re: Checkpoint NG AI R55
by Jonathan Lundell on 2004-05-24 01:03:16 +0200
Some debug output:
May 23 15:53:59 jlundell racoon: DEBUG:
algorithm.c:382:alg_oakley_encdef(): encription(3des)
May 23 15:53:59 jlundell racoon: DEBUG: oakley.c:2519:oakley_newiv(): IV
computed:
May 23 15:53:59 jlundell racoon: DEBUG: plog.c:199:plogdump(): dfc362ed
e12abcc7
May 23 15:53:59 jlundell racoon: DEBUG:
oakley.c:1163:oakley_validate_auth(): HASH received:
May 23 15:53:59 jlundell racoon: DEBUG: plog.c:199:plogdump():
30254ef1 792a6d52 ce679ee7 d6bccc13
May 23 15:53:59 jlundell racoon: DEBUG:
oakley.c:868:oakley_ph1hash_common(): HASH with:
May 23 15:53:59 jlundell racoon: DEBUG: plog.c:199:plogdump():
d368dd02 8801cc92 a7a5a433 c22f14b7 eea5c074 989e23ac b560a021
37f32c7f a40c2447 be9ee589 a9bbb3b6 48416b8b 09fca579 d45055ca
c5e5546e 5de46d00 93e63569 268c6fd8 de759484 84cbb44e 7414b5d8
a236db8d 7648741e aa775df4 0c84420a 8021d4f7 1f0e20d6 baf83d05
fdee751b 7a0094be 4dd0ed9f 58b7707a 7ad19f1e 5b2f0eb7 86dee952
4df5e79d 344a9f95 508aa061 4d99d3f2 14a1d245 d4d76c20 55a4d9b3
4e3abe60 3769ec75 e16bf93d 3582e4ab 335d23ec 912ff688 5eb83211
f271d0a6 55509639 730389ce 06275464 023c70b5 7582fe7c 278fd227
b192a39f b3d97707 cba995a3 f83e4c02 bc4d93b1 63a3fa00 292c9b64
b6ab7457 e1c9da6c 4b438d9c 4ea96b0a 5ebba063 00000001 00000001
00000028 01010001 00000020 01010000 800b0001 800c012c
80010005 80030001 80020001 80040002 01000000 d1ac64a2
May 23 15:53:59 jlundell racoon: DEBUG:
algorithm.c:322:alg_oakley_hmacdef(): hmac(hmac_md5)
May 23 15:53:59 jlundell racoon: DEBUG:
oakley.c:878:oakley_ph1hash_common(): HASH computed:
May 23 15:53:59 jlundell racoon: DEBUG: plog.c:199:plogdump(): ef6a6f6f
86860528 202a8eff 218e7b07
May 23 15:53:59 jlundell racoon: ERROR:
oakley.c:1190:oakley_validate_auth(): HASH mismatched
Re: Checkpoint NG AI R55
by Viny on 2004-05-26 04:53:24 +0200
I use R55 HF02 now I have no problem. I'm sorry, I'm a newbie so I can't
help you more.
Re: Checkpoint NG AI R55
by Jonathan Lundell on 2004-05-26 19:51:30 +0200
Viny, thanks, it's a big help just to know that it can work. I assume that I've
got a configuration problem.
Can you tell me how you're configured? Is your configuration the same as
the one you posted for R54?
This morning I saw, as usual,
May 26 10:39:33 jlundell racoon: NOTIFY: oakley.c:2057:oakley_skeyid():
couldn't find the proper pskey, try to get one by the peer's address.
May 26 10:39:33 jlundell racoon: NOTIFY: oakley.c:2057:oakley_skeyid():
couldn't find the proper pskey, try to get one by the peer's address.
May 26 10:39:33 jlundell racoon: ERROR:
oakley.c:1190:oakley_validate_auth(): HASH mismatched
May 26 10:39:33 jlundell racoon: ERROR:
oakley.c:1190:oakley_validate_auth(): HASH mismatched
...but my net admin claims that nothing at all showed up in the Check Point
logs. Seems odd, since the debug log suggestst that there's a significant
amount of negotiation necessary to get to that point.
Anyway, thanks again, and if anyone (Christoph?) would care to suggest a
course of action, I'd be grateful.
Re: Checkpoint NG AI R55
by Viny on 2004-05-28 14:31:58 +0200
Jonathan,
It's the same configuration (R54=R55). No modification.
Viny
Re: Checkpoint NG AI R55
by Jonathan Lundell on 2004-05-29 06:01:19 +0200
Thanks. I moved to 2.0.5 today, with no change.
FWIW, I'm setting my local ID to @jlundell, which is my Check Point user
name, plus the magic FQID thing. Other combinations don't seem to get as
far, including [email protected], where mydomain is the domain of
the firewall.
I need a clue.
Re: Checkpoint NG AI R55
by Viny on 2004-05-29 07:43:32 +0200
I use a certificate now.
But if I remember, I used a username like "user", not "[email protected]"
or something else with "@". And in Check Point, the username was the same
("user").
Viny
Exporting/Importing Profiles
Exporting/Importing Profiles
by Matthew on 2004-04-21 22:41:35 +0200
Is there an easy way to export/import gateway configurations? I want to be
able to easily distribute IPSecuritas to users who don't want to go through
the process is building (and possibly screwing up) VPN connections. I
thought maybe IPsecuritas might create something in /Library/Preferences,
but I didn't see anything.
Thanks,
-matthew
Re: Exporting/Importing Profiles
by Matthew on 2004-04-22 05:36:14 +0200
Me again. I found the preferences in ~/Library/Preferences, but just copying
the com.lobotomo.IPSecuritas.plist file didn't do it for a system that hadn't
previously run IPSecuritas. Does IPSecuritas modify anything else?
Re: Exporting/Importing Profiles
by cnadig on 2004-05-05 16:57:24 +0200
Hello Matthew,
import/export of a configuration is one of the top requirements for the
next release. I'm confident to release an update in a few weeks time.
Christoph
Re: Exporting/Importing Profiles
by yadda on 2004-10-06 16:49:53 +0200
Any updates on the this issue? Can this be done yet? Thanks.
Re: Exporting/Importing Profiles
by cnadig on 2004-10-07 08:18:27 +0200
Hello,
unfortunately not yet - I plan to put a considerable amount of effort into
IPSecuritas once I have finished MoofMenu 1.5 in a few days
Cheers,
Christoph
IPSecuritas and Linksys
IPSecuritas and Linksys
by Ronald Bellamy on 2004-05-07 22:10:05 +0200
I am trying to connect to a Linksys Cable Firewall Router with VPN endpoint
(BEFSX41) from home with IPSecuritas.
The VPN endpoint has a static IP Address. At home I connect to a Linksys
DSL router that has been assigned a address from DHCP. I am using MacOS
10.2.8.
Any suggestions as to how to set up the VPN and/or IPSecuritas?
I have not worked with VPN setup before and so far I have not been able to
connect past phase 1. :-/
Re: IPSecuritas and Linksys
by cnadig on 2004-05-11 18:12:28 +0200
Hello Ronald,
what is failing after successfully establishing a phase 1 connection (set
the log level to Verbose Debug). Also, do you have access to the routers
log?
Christoph
Re: IPSecuritas and Linksys
by Ronald Bellamy on 2004-05-11 20:57:02 +0200
Hi Christopher
Not sure if this is helpful. There is a lot of lines in the log that seem to
indicate that things are OK. This is where Error lines start appearing:
May 11 12:33:10 Ronald racoon: DEBUG:
isakmp_inf.c:210:isakmp_info_recv(): hash validated.
May 11 12:33:10 Ronald racoon: DEBUG:
isakmp.c:1121:isakmp_parsewoh(): begin.
May 11 12:33:10 Ronald racoon: DEBUG:
isakmp.c:1148:isakmp_parsewoh(): seen nptype=8(hash)
May 11 12:33:10 Ronald racoon: DEBUG:
isakmp.c:1148:isakmp_parsewoh(): seen nptype=11(notify)
May 11 12:33:10 Ronald racoon: DEBUG:
isakmp.c:1187:isakmp_parsewoh(): succeed.
May 11 12:33:10 Ronald racoon: ERROR:
isakmp_inf.c:848:isakmp_info_recv_n(): unknown notify message, no
phase2 handle found.
May 11 12:33:10 Ronald racoon: ERROR:
isakmp_inf.c:848:isakmp_info_recv_n(): unknown notify message, no
phase2 handle found.
May 11 12:33:10 Ronald racoon: DEBUG:
isakmp_inf.c:870:isakmp_info_recv_n(): notification message 16:PAYLOADMALFORMED, doi=1 proto_id=3 spi=00000000(size=4).
May 11 12:33:16 Ronald racoon: DEBUG:
grabmyaddr.c:442:update_myaddrs(): msg 5 not interesting
May 11 12:33:30 Ronald racoon: DEBUG: sockmisc.c:421:sendfromto():
sockname 192.168.1.111[500]
May 11 12:33:30 Ronald racoon: DEBUG: sockmisc.c:423:sendfromto():
send packet from 192.168.1.111[500]
May 11 12:33:30 Ronald racoon: DEBUG: sockmisc.c:425:sendfromto():
send packet to 68.150.80.245[500]
May 11 12:33:30 Ronald racoon: DEBUG: sockmisc.c:563:sendfromto(): 1
times of 260 bytes message will be sent to 192.168.1.111[500]
May 11 12:33:30 Ronald racoon: DEBUG: plog.c:193:plogdump(): 0048766f
a2b9058c cfa545f0 8db74490 08102001 4a924fb2 00000104 7ce66c23
ee0f7e87 5d9ee65e fbeaf05e 345fdf59 2b946c43 ad1c46bf 85099a78
c2b20570 33004776 9aa21c82 3cc620ef 1527a9a4 20d547f6 178dba8d
93d2d258 dd7f990a 752281fb 7afee4e5 c26baa19 5f9c196b 0e6c2413
7043fa1b 663d0f4f 35dc100e 664e8b68 6e7fe02f 1a3908d2 1957955c
b792a8bf ac418956 d4f47029 274e80dc a616ae69 28ec5aac 93333935
f3f2e311 c5d4c279 20e8297c 1e6c8a84 d34c6b34 59b9f13e 805daa1a
ff63a70d 15a0e351 c1407e7d 622a35f9 762bbfc0 25087ff4 0f6b4c0a
5648f37d 90e41bba efe226c2 cdc34189 e1bfbb8c e6d37889 253385e9
15d9ce63
May 11 12:33:30 Ronald racoon: DEBUG:
isakmp.c:1496:isakmp_ph2resend(): resend phase2 packet
0048766fa2b9058c:cfa545f08db74490:4a924fb2
May 11 12:33:33 Ronald racoon: DEBUG:
grabmyaddr.c:442:update_myaddrs(): msg 5 not interesting
May 11 12:33:40 Ronald racoon: ERROR: pfkey.c:738:pfkey_timeover():
68.150.80.245 give up to get IPsec-SA due to time up to wait.
May 11 12:33:40 Ronald racoon: ERROR: pfkey.c:738:pfkey_timeover():
68.150.80.245 give up to get IPsec-SA due to time up to wait.
I do have access to the router logs but not while I am at home. I will try to
get that info next time I am out.
Re: IPSecuritas and Linksys
by Bryan Derman on 2004-06-05 13:07:12 +0200
From a press release that just got posted:
=====
2004-Jun-01 : Derman Enterprises publishes a set of web pages that
outline how to use IPSecuritas (a free VPN-setup utility) and Mac OS X to
achieve a Host-to-Network and Network-to-Network secure/VPN
connection to the popular and inexpensive LinkSys BEFSX41 Switch/Router
/Firewall/VPN appliance.
Using this information will allow you to configure a stationary or
mobile/dial-up secure tunnel to your small business or home network. See
http://www.derman.com/Misc/VPN/Overview.html for the information.
=====
Hope this helps, if you hadn't already figured it out.
Re: IPSecuritas and Linksys
by Ronald Bellamy on 2004-06-06 23:43:20 +0200
Hi Bryan
I found the information helpful and hoped that it would solve the problem
but using the settings still doesn't seem to work.
I was finally able to get the log info from IPSecuritas and the Linksys.
Hopefully somebody can find what I need to change:
Jun 6 15:21:57 Ronald racoon: DEBUG:
isakmp_inf.c:210:isakmp_info_recv(): hash validated.
Jun 6 15:21:57 Ronald racoon: DEBUG: isakmp.c:1121:isakmp_parsewoh():
begin.
Jun 6 15:21:57 Ronald racoon: DEBUG: isakmp.c:1148:isakmp_parsewoh():
seen nptype=8(hash)
Jun 6 15:21:57 Ronald racoon: DEBUG: isakmp.c:1148:isakmp_parsewoh():
seen nptype=11(notify)
Jun 6 15:21:57 Ronald racoon: DEBUG: isakmp.c:1187:isakmp_parsewoh():
succeed.
Jun 6 15:21:57 Ronald racoon: ERROR:
isakmp_inf.c:848:isakmp_info_recv_n(): unknown notify message, no
phase2 handle found.
Jun 6 15:21:57 Ronald racoon: ERROR:
isakmp_inf.c:848:isakmp_info_recv_n(): unknown notify message, no
phase2 handle found.
Jun 6 15:21:57 Ronald racoon: DEBUG:
isakmp_inf.c:870:isakmp_info_recv_n(): notification message 18:INVALIDID-INFORMATION, doi=1 proto_id=3 spi=0701eb2e(size=4).
Jun 6 15:22:02 Ronald racoon: DEBUG:
grabmyaddr.c:442:update_myaddrs(): msg 5 not interesting
Jun 6 15:22:16 Ronald racoon: DEBUG: sockmisc.c:421:sendfromto():
sockname 192.168.1.111[500]
Jun 6 15:22:16 Ronald racoon: DEBUG: sockmisc.c:423:sendfromto(): send
packet from 192.168.1.111[500]
Jun 6 15:22:16 Ronald racoon: DEBUG: sockmisc.c:425:sendfromto(): send
packet to 68.150.80.245[500]
Jun 6 15:22:16 Ronald racoon: DEBUG: sockmisc.c:563:sendfromto(): 1
times of 252 bytes message will be sent to 192.168.1.111[500]
Jun 6 15:22:16 Ronald racoon: DEBUG: plog.c:193:plogdump(): 3b1285f7
05215f04 ae763ee4 2e83205e 08102001 7e6ea993 000000fc 980cf3f9
933bf763 f98a28a0 bb374f0a 5e8f4327 d1a349b1 07266af8 eb36e65d
57dadd9d dfd13515 faf925ae 86185ad7 aaff6ae9 91d7cea8 85e736da
64fa300a 848779ea ecc81fee 9277f735 91fe9215 7693cbd8 56b6da60
22df06ba 03d79b9e 262b81ec bc24bbbf 1967f641 6cb06f56 e1da7e9d
58e6883e 3bbcc170 b4ecd9fe d87271f9 dc51b230 92791738 3163da5e
b0d72751 5156b1b3 eb26dba1 1147de86 a5e239b7 bd953863 20ece927
120be189 2e0fef10 fa47d9a1 ab0d5939 473e8c88 71d9b73a 081c8f36
95404fa9 d98c0f54 af232f52 4e48a74c 9cd0f80c 9726c1d1
Jun 6 15:22:16 Ronald racoon: DEBUG: isakmp.c:1496:isakmp_ph2resend():
resend phase2 packet 3b1285f705215f04:ae763ee42e83205e:7e6ea993
Jun 6 15:22:22 Ronald racoon: DEBUG:
grabmyaddr.c:442:update_myaddrs(): msg 5 not interesting
Jun 6 15:22:26 Ronald racoon: ERROR: pfkey.c:738:pfkey_timeover():
68.150.80.245 give up to get IPsec-SA due to time up to wait.
Jun 6 15:22:24 Ronald racoon: DEBUG:
grabmyaddr.c:442:update_myaddrs(): msg 5 not interesting
Jun 6 15:22:26 Ronald racoon: ERROR: pfkey.c:738:pfkey_timeover():
68.150.80.245 give up to get IPsec-SA due to time up to wait.
From the Linksys Router
2004-06-06 15:21:51 IKE[6] Rx << MM_I1 : 198.53.201.16 SA
Re: IPSecuritas and Linksys
by Bryan Derman on 2004-06-20 10:11:58 +0200
Sorry, don't look here very often so didn't see your posting. You might
want to check the firmware version you're using because some of the
released versions simply don't work in certain aspects, including VPN
operation. Have a look at the stuff on this page (http://www.derman.com
/Misc/VPN/BEFSX41-Problems.html) and look in the forums referenced
there, as well. BTW, the currently posted/released version on the LinkSys
site seems to be OK.
According to your log, you have a mismatch between the Local/Remote
Secure Group settings (i.e., those settings in IPSecuritas and those on the
Linksys).
Re: IPSecuritas and Linksys
by Ronald Bellamy on 2004-06-20 23:42:39 +0200
Hi Bryan
I was able to connect finally but I had to supply IPSecuritas and the VPN
Linksys with the dynamic IP of my home Linksys. "ANY" does not work
although that is the setting that Linksys documentation says to use if the
remote user will have a dynamic IP. Since my IP will change this is not an
ideal setup. It is workable since I can access the VPN Linksys from home
and can change the IP remotely before trying to connect. IPSecuritas is also
easy to change and works great. The VPN does everything that is needed
now.
unknown informational exchange...
unknown informational exchange...
by FraserJopp on 2004-05-08 08:19:59 +0200
Having set up the VPN successfully, the connection fails when the key is to
be renewed. I get the following in the log of the FVS318 (host)
4/29/2004 06:27:32 - FVS318 IPsec:STATE_QUICK_R2: IPsec SA established
Thur, 04/29/2004 07:30:32 - FVS318 IPsec:event after this is
EVENT_SA_EXPIRE in 0 seconds
Thur, 04/29/2004 07:30:32 - FVS318 IPsec:IPsec SA expired (LATEST!)
Thur, 04/29/2004 07:30:32 - FVS318 IPsec:delete_out()
Thur, 04/29/2004 07:30:32 - FVS318 IKE:[VPNLANPC_tmp20] TX >>
DELETE SA : 81.178.250.58 (SPI=5bd07bf6)
Thur, 04/29/2004 07:30:34 - FVS318 IPsec:ISAKMP SA expired (LATEST!)
Thur, 04/29/2004 07:30:34 - FVS318 IPsec:delete_isa_out()
Thur, 04/29/2004 07:30:34 - FVS318 IPsec:[VPNLANPC_tmp20] is removed
from the head of conn_list
Thur, 04/29/2004 07:30:34 - FVS318 IPsec:Connection [VPNLANPC_tmp20]
is deleted from connection table
Thur, 04/29/2004 07:31:00 - FVS318 IPsec:find_insa() not found
Thur, 0
And this in the log of the client:
Apr 29 06:27:32 Alison-Robertss-Computer IPSecuritas: Set kernel keys
Apr 29 07:30:34 Alison-Robertss-Computer racoon: ERROR:
isakmp.c:662:isakmp_main(): unknown Informational exchange received.
Apr 29 07:30:34 Alison-Robertss-Computer racoon: ERROR:
isakmp.c:662:isakmp_main(): unknown Informational exchange received.
Apr 29 07:30:36 Alison-Robertss-Computer racoon: ERROR:
isakmp.c:662:isakmp_main(): unknown Informational exchange received.
Apr 29 07:30:36 Alison-Robertss-Computer racoon: ERROR:
isakmp.c:662:isakmp_main(): unknown Informational exchange received.
Both sides have key life (phase1) at 3600 seconds, and IKE key lifetime
(phase 2) at 28,800 seconds. The connection is initiated at the Ipsecuritas
end
I then have to stop & start IPSec to reconnect
Many thanks for any help you can offer
Fraser Jopp
Re: unknown informational exchange...
by cnadig on 2004-05-10 15:38:11 +0200
Hello Fraser,
first of all sorry for not getting back to your e-mail earlier!
I'm expecting a Netgear FVS328 this week to arrive and, assuming it has
the same or a similar firmware as the 318, I expect to run into the same
problems. I'll let you know as soon as I find a solution.
From the log you attached it seems that both phase 1 and 2 time out at
the same time - what have you set for the exchange mode in IPSecuritas?
Cheers,
Christoph
Re: unknown informational exchange...
by FraserJopp on 2004-05-11 08:15:04 +0200
It's aggressive. The timeout is always 180 seconds after the phase 1 key life
(if this helps). As far as I can see, the settings are the same on both sides.
Thanks for your help
Fraser
Re: unknown informational exchange...
by FraserJopp on 2004-05-12 09:33:00 +0200
Cracked it, thanks to a clue in your reply. I had not realised that Phase 1 =
IKE SA lifetime, Phase 2 = IPSec Sa lifetime, as different terms are used at
the other end. Transposed the two figures, and it works fine..
Thanks for your help
Fraser
Re: unknown informational exchange...
by jsilk on 2004-06-06 18:19:54 +0200
Hi there,
I am hoping you would be so kind to share your working connection details
in both IPSecuritas and FVS318 (naturally exluding any IP adresses) .
Thanks,
Johan
Cisco VPN Client
Cisco VPN Client
by brichpmr on 2004-05-16 15:59:49 +0200
My company provides a .pcf file to import into the CiscoVPN client app
through our Cisco 3000 series VPN concentrator. Does IPSecuritas work
with a Cisco .pcf script? Can I import the configuration into your app? I'm
running Panther (10.3.3)
IPSecuritas to Zyxel ZyWall 35
IPSecuritas to Zyxel ZyWall 35
by Thomas von Hassel on 2004-05-17 14:34:07 +0200
Hi all
I'm trying to connect a 10.3 client with
this in my zywall logs:
IPSecuritas to a Zywall 35. I get
Phase 1 IKE SA process done
then:
!! No proposal chosen
Could someone point me in the right direction :)
/thomas
Re: IPSecuritas to Zyxel ZyWall 35
by cnadig on 2004-05-18 16:31:58 +0200
Hello Thomas,
according to the Zyxel user manual you have a mismatch of the encryption
or authentication parameters, either in pahse 1 or 2, so that no satisfying
SA proposal can be found and the tunnel negotiation is aborted.
Check the phase 1 and phase 2 settings in IPSecuritas with the ones of the
zyxel router.
If you change the log level of IPSecuritas to 'Verbose Debug', you should see
in more detail what has been offered by your side and the Zyxel router and
why the two proposals don't match.
Christoph
Re: IPSecuritas to Zyxel ZyWall 35
by Chief_Nerd on 2004-08-25 21:51:58 +0200
I too am trying to get going with a ZyWALL. But in my case, it's
10.2 I'm using.
I have AES 256 and SHA1 set.
My verbose debug says:
{wonder where the ----'ed line came from; as that's not an IP in use here}
Log output from IPSecuritas 2.0.6
Aug 25 15:30:07 Notanumber IPSecuritas: Parsing configuration
Aug 25 15:30:07 Notanumber IPSecuritas: Setting up racoon.conf
Aug 25 15:30:07 Notanumber IPSecuritas: Setting up setkey.conf
Aug 25 15:30:07 Notanumber IPSecuritas: Setting up psk.txt
Aug 25 15:30:07 Notanumber IPSecuritas: Setting up tunnel.conf
Aug 25 15:30:07 Notanumber IPSecuritas: Parsing configuration done
Aug 25 15:30:08 Notanumber IPSecuritas: Starting racoon...
Aug 25 15:30:08 Notanumber racoon: INFO: main.c:169:main(): @(#)racoon
20001216 20001216 [email protected]
Aug 25 15:30:08 Notanumber racoon: INFO: main.c:169:main(): @(#)racoon
20001216 20001216 [email protected]
Aug 25 15:30:08 Notanumber racoon: INFO: main.c:170:main(): @(#)This
product linked OpenSSL 0.9.6i Feb 19 2003 (http://www.openssl.org/)
Aug 25 15:30:08 Notanumber racoon: INFO: main.c:170:main(): @(#)This
product linked OpenSSL 0.9.6i Feb 19 2003 (http://www.openssl.org/)
Aug 25 15:30:10 Notanumber IPSecuritas: Racoon is running
Aug 25 15:30:10 Notanumber IPSecuritas: Set kernel keys
Aug 25 15:30:10 Notanumber racoon: DEBUG2: cfparse.y:1354:cfparse():
parse successed.
Aug 25 15:30:10 Notanumber racoon: INFO: isakmp.c:1369:isakmp_open():
192.168.1.69[500] used as isakmp port (fd=6o)
-----------------------------------------^^^^^^^^^ huh?
Aug 25 15:30:10 Notanumber racoon: INFO: isakmp.c:1369:isakmp_open():
192.168.1.69[500] used as isakmp port (fd=6)
Aug 25 15:30:10 Notanumber racoon: DEBUG: pfkey.c:192:pfkey_handler():
get pfkey X_SPDDUMP message
Aug 25 15:30:10 Notanumber racoon: DEBUG2: plog.c:193:plogdump():
02120200 00020000 00000000 00000200
Aug 25 15:30:10 Notanumber racoon: DEBUG: pfkey.c:207:pfkey_handler():
pfkey X_SPDDUMP failed: No such file or directory
Aug 25 15:30:10 Notanumber racoon: DEBUG: pfkey.c:192:pfkey_handler():
get pfkey REGISTER message
Aug 25 15:30:10 Notanumber racoon: DEBUG2:
{.....}
isakmp_inf.c:142:isakmp_info_recv(): ignore information because the
message has no hash payload.
Aug 25 15:30:31 Notanumber racoon: ERROR:
isakmp_inf.c:142:isakmp_info_recv(): ignore information because the
message has no hash payload.
Aug 25 15:30:42 Notanumber racoon: ERROR:
isakmp.c:1785:isakmp_chkph1there(): phase2 negotiation failed due to
time up waiting for phase1. ESP 207.188.193.107->192.168.1.69
Aug 25 15:30:42 Notanumber racoon: ERROR:
isakmp.c:1785:isakmp_chkph1there(): phase2 negotiation failed due to
time up waiting for phase1. ESP 207.188.193.107->192.168.1.69
Aug 25 15:30:42 Notanumber racoon: INFO:
isakmp.c:1790:isakmp_chkph1there(): delete phase 2 handler.
Aug 25 15:30:42 Notanumber racoon: INFO:
Replacing CheckPoint SecureClient
Replacing CheckPoint SecureClient
by Ben on 2004-05-17 15:45:02 +0200
Hi there,
I came across IPSecuritas after posting to Apple's support forums. Anyway,
here's the gist of my problem.
At work, we use Checkpoint's VPN-1 SecureClient for Windows to connect
to the company's LAN remotely. My question is how can I do the same thing
with my PowerBook.
Someone kindly suggested that I try out IPSecuritas, which I installed
without any problem. However, the tricky part came when I tried to import
the certificate.
IPSecuritas wants the certificate to be of the type .pem, whatever that is. At
work, we have Entrust certificates that have a .epf suffix. Now, I'm not sure
what these different file formats mean (simply changing the suffix didn't do
the trick), but I was hoping there would be some sort of conversion utility,
or perhaps there is some way to export a certificate from SecureClient as a
.pem. Is this even the right approach?
Apologies in advance if the above isn't the clearest, but digital certificates
and PKI are kind of new to me.
Ben
Re: Replacing CheckPoint SecureClient
by cnadig on 2004-05-18 16:26:02 +0200
Hello Ben,
I found very little information about the Entrust Profile File (.epf), especially
conecrning about it's contents and format, so importing them directly won't
be possible.
I don't know how your company generates the certificate files but I'd expect
the software to be able to export it into different format (at least PKCS12,
which can be imported into IPSecuritas with a few steps, see the online
help).
As an alternative (and it probably needs very good connections to the
network admin), you could setup an alternative CA: http://www.atsec.com
/docs/fw1-openssl.howto.pdf
Christoph
Re: Replacing CheckPoint SecureClient
by Benjamin So on 2004-05-24 10:50:03 +0200
Hi Christoph,
I think the export method seems like the better bet. At present, the utilities
supplied by the company don't allow any export function. Are there any
conversion apps available that could do this for me? And which file formats
does IPSecuritas understand?
Ben
Can't setup VPN
Can't setup VPN
by robbiemurray on 2004-05-18 16:49:20 +0200
I have had 3 days of frustration trying to connect my home network to my
colleagues using the VPN software in MAC OS X.
Both networks have static IP addresses and are using Netgear DG834
Routers, and Internet/email works fine. I tried configuring both PPTP and
L2TP connections, but either got a 'server not responding - check address
etc', message, either immediately or after a delay where the icon in the
menu bar tried to connect, but gave up after a couple of minutes. (I can
however ping from one to the other) Checked with Netgear support, who
were unhelpful, but eventually had me open all ports. Still no joy. After a
lot of trawling found recommendations for IPSecuritas. Downloaded,
installed, configured on both, but no connection - just the red X
removed all the Mac VPN configurations, but still no go.
Please can anyone help????
Re: Can't setup VPN
by cnadig on 2004-05-18 17:51:09 +0200
Hello Robbie,
a quick question first: Is NAT (Network Address Translation) enabled on any
of the routers?
Could you also post the log from IPSecuritas when set to 'Verbose Debug'
(in the IPSecuritas preferences). Please remove any confidential information
like you static IP addresses.
Christoph
Re: Can't setup VPN
by robbiemurray on 2004-05-18 23:18:17 +0200
Hi Christoph
Thanks for your interest. Yes, both have NAT enabled, as they were set up
with the simple login suggested by the ISP-login & password, with all
others info provided dynamically by the ISP,
(although the both addresses are static)
How much of the log do you want, as there are pages & pages,and it seems
to loop?
I’m new to this site, and don’t want to get in trouble...........
I could email it if that's an option
Regards
Robbie
IPSec startup failed
IPSec startup failed
by benoit_mikros on 2004-05-20 18:09:47 +0200
Hello Christoph,
I've got message "IPSec startup failed" (in the verbose log, nothing than
"Log output from IPSecuritas 2.0")
The configuration of IPSec should work because it's being used by one of
my colleague, Marc, with the same kind of connection (OS 10.3.3 with
Netscreen FW).
In fact it did work fine once, at my place (home), but I could'nt stop IPSec
properly (refused) : I had to quit IPSecuritas and then no more DNS resolve
with any app : Safari , Mail, etc...
So I found that /etc/resolv.conf was linked to /tmp/IPSecuritas...
Then I redo the link to /var/run/resolv.conf and add some DNS names in
my OS Network Preferences . So Http and Mail work fine again now...
In the meantime, I aslo removed all settings of IPSecuritas (to start from
scratch).
Then I re-edit IPSecutitas settings and prefs, checked them twice (the same
that work for Marc) but IPSecuritas does not want to start...(immediate
message : "IPSec startup failed").
I also removed my optional DNS server names in my OS Network
Preferences (and anyway I have checked "Replace DNS Settings on IPSec
Activation" with my job DNS refs).
But it doesn't start ;-(
Any idea to work this out?
Re: IPSec startup failed
by cnadig on 2004-05-20 23:44:46 +0200
Hello Benoit,
at the moment I can only guess, but I think your installation has been
corrupted. Please try to remove IPSecuritas completely and re-install it.
If you still have trouble, I'll compile a version that logs more detail in such
an event.
Christoph
Re: IPSec startup failed
by benoit_mikros on 2004-05-21 13:05:44 +0200
okay : I removed IPSecuritas and prefs, then reinstalled it completely.
Same result ;-(
Benoit
more detais for log ...;-)
by benoit_mikros on 2004-06-02 01:03:50 +0200
HEllo Chritophe,
Did you change the logs with more details in such an event, with V 2.05?
I still have the same message.
I even try to update my OS to 10.3.4 (never know...)
Still the same instantaneous "IPSec startup failed ".
Benoit
Re: IPSec startup failed
by cnadig on 2004-06-08 23:20:10 +0200
Hello Benoit,
sorry for the late answer - my daytime job is keeping me busy...
I did not have the opportunity to get more verbose log in, but a quick
question: when you try to start IPSec and it fails, do you get anything in the
lgo window (with log level set to verbose debug). Also, if you have teh
replace DNS settings options set, do you still need to replace the link to
/var/run/resolv.conf after terminating IPSecuritas in order to get normal
internet acces sback?
Christoph
Re: IPSec startup failed
by MacPapy on 2004-09-28 23:55:22 +0200
Hi everybody
I would have loved to announce that IPSecuritas is working fine with an
Equinet gateway (at least on a host to network basis) but, in my case, its
works only with one of my computer (a PowerBook G3, OS 10.2.6)
On my iMac (G3, 600 Mhz, 10.2.6) I have directly the "startup has failed"
message, and no message in the log window.
I've tried for a couple of nights to understand what the differences are, but I
do not find any succesfull explanation.
Hypothesis : on my initial launch of IPSecuritas, it happens that I was not
loged as an "Administrator" for the system. Of course, I've tried to reinstall
and relaunch, but no success :'(
Another idea : The mac which is not working was initially configured as a
gateway with IPSharing (using the MacOs embeded feature) ; I've stopped
IPSharing during the testing of IPSecuritas, (and tried to restart, and
everything ...) but this doesn't solve the problem
Last : on my iMac, there was an previous version of racoon, hidden in an old
"Previous system" directory, that was remainig on my disk. I did clean all
that stuff after, but could it be a problem linked with that bad config at
beginning.
Any idea ?
Thanks by advance
Jean (from France)
Re: IPSec startup failed
by Pascal Frey on 2004-10-16 20:43:08 +0200
Same troubles as benoit_mikros and MacPapy :
I've tried to estabilish a VPN Connection with IP Securitas, but as soon as I
click on "Start IPSec", it answers me "IPSec Startup failed", with nothing at all
in the log (even in Verbose Debug mode).
I first tried IP Securitas on an other Mac and it seemed to work fine. So I did
a clean install on my own Mac and I re-installed IP Securitas.
I managed to estabilish connections for about 15 or 20 time, and then,
back to the same error message : "IPSec startut failed"...
Then I tried to have a look into the IP Securitas.app package.
I tried to launch IPSecuritas.app/Contents/MacOS/vpntool sevral times and
it didn't answered me anything.
BUT, I then relaunched IPSecuritas by invoking IPSecuritas/contents/MacOS
/IPSecuritas in the same shell, and it seemed to work fine again.
At least I can clik on "Start IPSec" without having the error message. But this
time, the connection doesn't work. I haven't changed anything in the config
file, but the connection fails to estabilish. That's what the log shows :
[i]Log output from IPSecuritas 2.0.6
Oct 16 20:14:02 Ordinateur-de-Famille-Frey IPSecuritas: Parsing
configuration
Oct 16 20:14:02 Ordinateur-de-Famille-Frey IPSecuritas: Setting up
racoon.conf
Oct 16 20:14:02 Ordinateur-de-Famille-Frey IPSecuritas: Setting up
setkey.conf
Oct 16 20:14:02 Ordinateur-de-Famille-Frey IPSecuritas: Setting up psk.txt
Oct 16 20:14:02 Ordinateur-de-Famille-Frey IPSecuritas: Setting up
tunnel.conf
Oct 16 20:14:02 Ordinateur-de-Famille-Frey IPSecuritas: Parsing
configuration done
Oct 16 20:14:03 Ordinateur-de-Famille-Frey IPSecuritas: Starting racoon...
Oct 16 20:14:03 Ordinateur-de-Famille-Frey IPSecuritas: Racoon is running
Oct 16 20:14:03 Ordinateur-de-Famille-Frey IPSecuritas: Set kernel keys
add net 192.168.1.0: gateway gif0
Oct 16 20:14:34 Ordinateur-de-Famille-Frey racoon: ERROR:
pfkey.c:745:pfkey_timeover(): x.x.x.x give up to get IPsec-SA due to time
up to wait.
Oct 16 20:14:34 Ordinateur-de-Famille-Frey racoon: ERROR:
pfkey.c:745:pfkey_timeover(): x.x.x.x give up to get IPsec-SA due to time
up to wait.
delete net 192.168.1.0
Oct 16 20:15:26 Ordinateur-de-Famille-Frey IPSecuritas: Flushing kernel
keys
Oct 16 20:15:26 Ordinateur-de-Famille-Frey IPSecuritas: Stopping racoon...
Oct 16 20:15:27 Ordinateur-de-Famille-Frey IPSecuritas: Racoon normally
terminated[/i]
If somebody understainds what's happening ?
... Meanwhile, I've also tried with VPNTracker and it works fine in any case
Antivirus and Firewall
Antivirus and Firewall
by fmorchid on 2004-05-21 19:40:02 +0200
hello,
is it possible to install a symantec antivirus with the checkpoint firewall?
thnak you
smb query
smb query
by rnoranbrock on 2004-05-24 23:38:54 +0200
OK, I've got IPSecuritas set up and connecting properly to a SonicWall
SOHO3. And I would swear that at least the first time I set it up I was able
to connect to shared portions of an Exchange server behind the Sonic;
however, currently, I am unable to do the same thing. I try to enter
smb://MACHINE/OBJECTS in the Connect to Server dialog, but all I get is
"The Finder cannot complete the operation because some data in
"smb://MACHINE/OBJECTS" could not be read or written. (Error code -36)."
with the option to Try Again or Cancel.
If I try to double click the aliases setup for the same share from behind
the Sonic, it attempts to connect (I guess) and then asks if I want to fix or
delete the alias.
And just to add more strangeness on top, Entourage (which is configured
to connect as an IMAP client from behind the Sonic) has no problem
connecting with the address entered as
SECOND_MACHINE.DOMAIN.NAME.COM
I can use MS Remote Desktop Connection to connect through the VPN
and access the Exchange Server, so that works, but so far no success at
specifying an smb address. Any thoughts?
Thanks,
-Randy
Re: smb query
by info.helpdesk on 2007-04-25 14:44:40 +0200
We are having the same problem using version 3.0 of the software on a Mac
OS X 10.4 machine. Any ideas?
Re: smb query
by rnoranbrock on 2007-04-25 15:18:06 +0200
Sorry, I haven't tried to connect recently as I believe I read in another post
that the problem was in the Mac OS.
Interestingly though, if I bring up Win XP under Parallels, I can mount any of
the drives/machines in Win XP, but not in the Finder. Strange.
-Randy
Re: smb query
by Dave on 2007-04-26 00:42:07 +0200
Are you using IP addresses for MACHINE in your examples?
Re: smb query
by rnoranbrock on 2007-04-26 03:47:02 +0200
Honestly, I don't recall if I tried that or not. The names resolve to the
proper IP address in terminal and ping correctly. If I get a chance to try
later, I'll post back.
-R
OS X 10.3.4 breaks Ipsecuritas
OS X 10.3.4 breaks Ipsecuritas
by Thomas von Hassel on 2004-05-27 01:40:56 +0200
Well i got Ipsecuritas working with my ZyWall ... but i just installed 10.3.4
and now Ipsecuritas gives me this:
Jun 27 01:39:43 Thomas-von-Hassels-Computer IPSecuritas:
configuration
Jun 27 01:39:43 Thomas-von-Hassels-Computer IPSecuritas:
racoon.conf
Jun 27 01:39:43 Thomas-von-Hassels-Computer IPSecuritas:
setkey.conf
Jun 27 01:39:43 Thomas-von-Hassels-Computer IPSecuritas:
psk.txt
Jun 27 01:39:43 Thomas-von-Hassels-Computer IPSecuritas:
tunnel.conf
Jun 27 01:39:43 Thomas-von-Hassels-Computer IPSecuritas:
configuration done
Jun 27 01:39:44 Thomas-von-Hassels-Computer IPSecuritas:
racoon...
Jun 27 01:39:44 Thomas-von-Hassels-Computer IPSecuritas:
running
Jun 27 01:39:44 Thomas-von-Hassels-Computer IPSecuritas:
keys
ifconfig: SIOCIFCREATE: Invalid argument
route: writing to routing socket: No such process
delete net 192.168.1.0: not in table
ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address
Jun 27 01:39:45 Thomas-von-Hassels-Computer IPSecuritas:
delete gif0
Jun 27 01:39:45 Thomas-von-Hassels-Computer IPSecuritas:
racoon...
Jun 27 01:39:46 Thomas-von-Hassels-Computer IPSecuritas:
normally terminated
Jun 27 01:39:46 Thomas-von-Hassels-Computer IPSecuritas:
kernel keys
so 10.3.4 obiusliy breaks something :)
/thomas
Parsing
Setting up
Setting up
Setting up
Setting up
Parsing
Starting
Racoon is
Set kernel
Could not
Stopping
Racoon
Flushing
Re: OS X 10.3.4 breaks Ipsecuritas
by Mark Dadgar on 2004-05-27 06:39:47 +0200
Yep - broke my copy, too. :(
- Mark
Re: OS X 10.3.4 breaks Ipsecuritas
by cnadig on 2004-05-27 08:56:33 +0200
Hello,
I can reproduce the problem and am working on a solution, which should
be available within days.
Christoph
Re: OS X 10.3.4 breaks Ipsecuritas
by Mark Dadgar on 2004-05-27 18:58:07 +0200
THANK YOU!!
- Mark
Re: OS X 10.3.4 breaks Ipsecuritas
by NetWhiz on 2004-05-31 01:33:39 +0200
Any update on the status of the fix for this? ???
NetWhiz
Re: OS X 10.3.4 breaks Ipsecuritas
by cnadig on 2004-06-01 14:20:29 +0200
Hello,
sorry for the late notification! IPSecuritas 2.0.5 is available for download at
[url]http://www.lobotomo.com/products/IPSecuritas/index.html[/url].
See [url]http://www.lobotomo.com/products/IPSecuritas
/changes.html[/url] for a list
of changes.
Christoph
Re: OS X 10.3.4 breaks Ipsecuritas
by DarX on 2004-06-01 15:51:37 +0200
[quote author=cnadig link=1085614856/0#5 date=1086092429]Hello,
sorry for the late notification! IPSecuritas 2.0.5 is available for download at
[url]http://www.lobotomo.com/products/IPSecuritas/index.html[/url].
See [url]http://www.lobotomo.com/products/IPSecuritas
/changes.html[/url] for a list
of changes.
Christoph[/quote]
hey, this works!
thanks a bunch! .. keep up the good work!
/thomas
Re: OS X 10.3.4 breaks Ipsecuritas
by NetWhiz on 2004-06-02 23:14:50 +0200
Is ther a version that fixes the problem? This version is the same as from
last week and it does not fix my broken issue. Everything worked fine with
this version, until I opened and used the built-in Mac OS X IPSec/L2TP
client. When I went back to try IPSecuritas, it will not get past:
Jun 2 21:11:47 Allison-Baby-3 IPSecuritas: Parsing configuration
Jun 2 21:11:47 Allison-Baby-3 IPSecuritas: Setting up racoon.conf
Jun 2 21:11:47 Allison-Baby-3 IPSecuritas: Setting up setkey.conf
Jun 2 21:11:47 Allison-Baby-3 IPSecuritas: Setting up psk.txt
Jun 2 21:11:47 Allison-Baby-3 IPSecuritas: Setting up tunnel.conf
Jun 2 21:11:47 Allison-Baby-3 IPSecuritas: Parsing configuration done
Jun 2 21:11:48 Allison-Baby-3 IPSecuritas: Starting racoon...
Jun 2 21:11:48 Allison-Baby-3 IPSecuritas: Racoon is running
Jun 2 21:11:48 Allison-Baby-3 IPSecuritas: Set kernel keys
Jun 2 21:11:48 Allison-Baby-3 racoon: ERROR:
isakmp_inf.c:142:isakmp_info_recv(): ignore information because the
message has no hash payload.
Jun 2 21:11:48 Allison-Baby-3 racoon: ERROR:
isakmp_inf.c:142:isakmp_info_recv(): ignore information because the
message has no hash payload.
Jun 2 21:11:55 Allison-Baby-3 IPSecuritas: Flushing kernel keys
Jun 2 21:11:55 Allison-Baby-3 IPSecuritas: Stopping racoon...
Jun 2 21:11:56 Allison-Baby-3 IPSecuritas: Racoon normally terminated
Then it just sits and eventually times out or I get that error. How can this be
fixed????
NetWhiz
Re: OS X 10.3.4 breaks Ipsecuritas
by NetWhiz on 2004-06-04 05:51:50 +0200
Anyone even watching the board? No one else having this problem?
NetWhiz
Re: OS X 10.3.4 breaks Ipsecuritas
by NetWhiz on 2004-06-08 01:56:56 +0200
Just checking in to see if anyone is having this issue or a solution been
found????????
NetWhiz
Re: OS X 10.3.4 breaks Ipsecuritas
by davehodg on 2004-07-08 17:52:30 +0200
I'm getting this too, trying to connect to an FVL328:
Jul 8 16:47:34 Daves-PB syslogd: restart
Jul 8 16:47:34 Daves-PB syslogd: restart
Jul 8 16:47:35 Daves-PB racoon: ERROR:
isakmp_inf.c:142:isakmp_info_recv(): ignore information because the
message has no hash payload.
Jul 8 16:47:35 Daves-PB racoon: ERROR:
isakmp_inf.c:142:isakmp_info_recv(): ignore information because the
message has no hash payload.
Offers?
Re: OS X 10.3.4 breaks Ipsecuritas
by Rusty Bias on 2004-09-07 07:57:48 +0200
I've had the same issue... IPsecuritas working fine until messing with built
in L2TP/VPN, and even after removing L2TP configs, IPsecuritas won't
work...
Support for ...
Support for ...
by NetWhiz on 2004-05-28 18:28:34 +0200
Will there be support added for DH modp2048 and/or SHA2?
Also, will the source code for this app be released?
Thanks,
NetWhiz
New User
New User
by Spark on 2004-05-28 19:03:19 +0200
Hello I am a new user that would love to use IPSecuritas! I cannot seem to
find a how to on the SF. Is there documintation or a how to page i can be
directed to.
I am running 10.3.4 wirh the firewall on. I do a ton of file transfers and
would like to make them secure. Will this mask my ip address when
accessing sites and running my own server? Any help would be greatly
appreciated! :)
Version 2.0.5 breaks name resolution
Version 2.0.5 breaks name resolution
by Russ Marks on 2004-06-02 23:29:16 +0200
IPSecuritas 2.0.5 does not release the "DNS Servers" entry in its Preferences
panel. Once IPSecuritas is run, the OS does not revert back to the DNS
servers entry listed in the OS X "Network" system preference pane. I am able
to fix this by clearing the IPSecuritas "DNS Servers" entry, committing it
then exiting. This problem exists on my 10.3.4 & 10.2.8 machines.
Regards,
Russ Marks
anyone help me?
anyone help me?
by hopecompany on 2004-06-04 11:30:56 +0200
hi,everybody!my first time here,nice to meet all of you!
I have experienced a question:I have 2 Nokia IP530 platforms,which had
installed checkpoint NG AI(R55),I configured them running in clusters'
environment,and I am sure clusters work well!but a problem occured:when
a oracle client connects oracle server behind cluster gateway,the session
only remained about 5 to 10 minutes,and the session disconnected,I
reseted the connection in oracle client and it worked well again,but
disconnectd after 5-10 minutes,I don't know how to settled the
problem,anybody help me?looking forward to hearing from you!thanks a lot
Netgear - Phase 2 failing
Netgear - Phase 2 failing
by 2manysecrets on 2004-06-04 19:42:29 +0200
I am using a netgear FVS318 at my office with a fixed IP and connecting
from home (and would like to connect from the road) with IPSecuritas and a
dynamic IP.
The office and home have two different subnets and I did have this working
for a couple of weeks. When it was working the computer at work could not
see any of the computers on my home network. But, I could see all of the
computers on the office network.
Something has changed and I am not sure what it is.
The debug log show that phase 1 succeeded, but I keep getting
Jun 4 13:28:03 AgentSmith racoon: DEBUG:
isakmp.c:1756:isakmp_ph2resend(): resend phase2 packet
42cb18005b4777b4:f3941f0d568a1a16:de4771c6
Jun 4 13:28:12 AgentSmith racoon: ERROR: pfkey.c:745:pfkey_timeover():
55.55.55.55 give up to get IPsec-SA due to time up to wait.
Jun 4 13:28:12 AgentSmith racoon: ERROR: pfkey.c:745:pfkey_timeover():
55.55.55.55 give up to get IPsec-SA due to time up to wait.
Jun 4 13:28:12 AgentSmith racoon: DEBUG:
schedule.c:210:sched_scrub_param(): an undead schedule has been
deleted.
After reading several "guides" on setting up NetGear routers I am now total
confused.
What parameters are affecting the phase 2 verification?
Thanks for your help
Re: Netgear - Phase 2 failing
by jsilk on 2004-06-06 18:12:08 +0200
Hi,
Any possibility you could share your configuration that worked before you
tried to change so you could roam from anywhere including your home?
For Phase 2 I have the same configuration as with Phase 1 with the
exception of the life time. This seems to work fine, I am not getting any
errors like you are seeing. But after what seems like a successful connection
at both ends I am unable to access any hosts at work behind the FVS318...
Re: Netgear - Phase 2 failing
by jsilk on 2004-06-07 02:21:16 +0200
Hi there I can replicate your message when my Network settings are not
matching up between FVS318 and the IPSecuritas settings. Ensure you
remote and local network configuration is the same at both ends.
Cheers!
Johan
Re: Netgear - Phase 2 failing
by 2manysecrets on 2004-06-08 18:19:08 +0200
The only way I was able to login from a remote site was to know the public
IP and put that into the local address field. This worked from home, but
when I was at the hotel it was not a viable solution since I cannot find out
the public IP.
But since I have been reading more it sounds like that the local address
field should be the local machine's IP address.
Now I am even more confused since in the NetGear setup I need to specifiy
the IP address or range for the remote LAN IP.
I know that I am missing something and the was the reason for the original
post.
Thanks
Re: Netgear - Phase 2 failing
by cnadig on 2004-06-08 23:04:12 +0200
Hello,
the local address field in IPSecuritas is used to explicitly define the source
address of your traffic going through the tunnel - it has no effect on the
tunnel itself (its often referred to as virtual local adress because it makes
the remote end (machines within the LAN behind the VPN router, not to the
VPN router itself) think you have a different IP address.
Basically everything works for this field, but it is common to use a private
network address like 10.x.x.x or 192.168.x.x. If no local address is
specified, your computers default interface's address is used (whatever you
get from your ISP or the NAT router).
The VPN router normally has rules on how to route packets through which
tunnel. So if you define 192.168.1.1 for your local address in IPSecuritas,
you should also enter this address for the destination address rule in your
Netgear configuration.
I don't have a FVS318 but a 328, but I assume the two work quite similarily.
I could post a working configuration of my 328, if you like.
Cheers,
Christoph
Re: Netgear - Phase 2 failing
by 2manysecrets on 2004-06-09 03:19:18 +0200
Yep I found that out today. Thanks for the reply.
I now have it working and the only unresolved issue is the ability for the
computers behind the FVS318 to see my computer.
I have a good connection working, but if my laptop goes to sleep while the
VPN is connect and the network connection is dropped, I have to sleep the
laptop and wake it back up before I can reconnect.
Hope that helps.
Re: Netgear - Phase 2 failing
by 2manysecrets on 2004-06-09 03:24:00 +0200
I do have a working configuration
FVS318 settings
Connection Name : IPSecuritas
Local IPSec : FVS318
Remote: Home
Tunnel can be accessed from: any local IP
Tunnel can access: a subnet of remote addresses
Remote LAN start IP Address: 10.0.0.1
Remote LAN IP Subnetmake: 255.255.255.0
Remote WAN IP or FQDN: 0.0.0.0
Secure Association: Aggressive Mode
Perfect Forward Secrecy: Enabled
Encryption Protocol: 3DES
Key Group: Diffie- Hellman Group 2
Preshared Key: 0123456789
Key Life: 28800
IKE Life Time: 86400
NETBIOS Enabled: false
IPSecuritas Settings:
Mode of Operation: Host to Network
Remote IPSec Device: <Static IP Address> of your VPN router
Remote Network: <DHCP Address> (192.168.1.1 / 24)
Local Address: [blank]
Exchange Mode: Agressive
Proposal Check: Strict Nonce Size 16
Phase 1:
Lifetime: 28800
DH group: Mod1024 (2)
Encryption: 3DES
Authentication: MD5
Phase 2: (least sure about all of these settings, but it works)
Lifetime: 28800
PFS Group: Mod1024 (2)
Encryption: 3DES, AES192, AES128
Authentication: HMAC MD5, HMAC SHA1
ID/Auth:
Local Identifier DN: home
Remote Identifier DN: FVS318
Preshared Secret: 0123456789
Options: (where unchanged from default)
Everything selected but (Passive, Verify Certificate, and Auto Start)
----------------
Re: Netgear - Phase 2 failing
by Johan Silkenas on 2004-06-09 12:40:03 +0200
Thanks for the configuration.
Mine matches it except for the encryption, where I have opted for less
security (DES) to get better speed than when using 3DES.
About the Local IP, yes what Christoph was saying is certainly what I have
found as well. All it is, is a virtual address. As long as your settings are the
same in IPSecuritas as in FVS318 for your profile, then you can roam
anywhere.
Sorry don't know about making your machine visable to the machines
behind the FVS318.
Cheers!
Johan
Re: Netgear - Phase 2 failing
by nickb on 2004-06-11 02:44:51 +0200
I've tried building on the config above but get:
racoon: ERROR: isakmp.c:2045:isakmp_chkph1there(): phase2 negotiation
failed due to time up waiting for phase1.
?
Re: Netgear - Phase 2 failing
by 2manysecrets on 2004-06-17 15:52:12 +0200
Double check you configuration. Make sure the exchange mode, DH Group,
Encryption and Authentication match between IPSecuritas and your VPN
server. Next make sure the Local Identifier and Remote Identifier are
correct. If these do not match then you will not make it past phase 1.
Hope that helps
Re: Netgear - Phase 2 failing
by 2manysecrets on 2004-06-29 15:50:51 +0200
UPDATE
This seems to work better than "Tunnel can access: a subnet of remote
addresses "
Tunnel can access: a single address
Remote LAN start IP Address: 10.0.0.12
Remote LAN IP Subnetmake: 255.255.255.0
Remote WAN IP or FQDN: 0.0.0.0
IPSecuritas <--> NetScreen Firewall
IPSecuritas <--> NetScreen Firewall
by MacJunkie on 2004-06-05 00:56:30 +0200
I configured IPSecuritas to conect with a NetScreen Firewall and i got
following log message:
Jun 5 00:32:50 Vigor102 racoon: ERROR:
isakmp.c:2045:isakmp_chkph1there(): phase2 negotiation failed due to
time up waiting for phase1. ESP 000.000.000.000->192.168.1.102
Jun 5 00:32:50 Vigor102 racoon: ERROR:
isakmp.c:2045:isakmp_chkph1there(): phase2 negotiation failed due to
time up waiting for
(I deleted the IP-Adress in this Article because of Data Rights).
Has any body configured a IPSecuritas to Netscreen connection
successfully? How?
(With VPNTracker the connection works fine - but I want not to use
VPNTracker)
Re: IPSecuritas <--> NetScreen Firewall
by cnadig on 2004-06-08 23:10:39 +0200
Hello,
could you post a bit more of the log, especially the last 5-10 lines before
what you posted already?
Also, posting your IPSecuritas settings would be useful (please remove any
confidential information!)
Thanks,
Christoph
IPv6 and IPSecuritas
IPv6 and IPSecuritas
by Axel on 2004-06-05 22:47:08 +0200
Does Anyone knows if IPSecuritas is interoperable with IPv6 address?
Netgear FVS318 LOG says I am connected.....
Netgear FVS318 LOG says I am connected.....
by Johan Silkenas on 2004-06-06 17:38:58 +0200
I am confused to why I am not able to access the remote network. My
Netgear FVS318 VPN log says:
06/07/2004 01:17:24 - FVS318 IKE:[JohanSilkenas_tmp37] established with
144.132.212.106 successfully.
The Netgear VPN status show an Active connection.
IPSecuritas LOG confirms connection:
Jun 7 01:20:55 jsilkimac racoon: INFO: pfkey.c:1352:pk_recvadd():
IPsec-SA established: ESP/Tunnel [my IP address] -> [VPN Server IP
address] spi=3847618502(0xe555ffc6)
How ever when I try a telnet to a remote host it just sits there same if a try
connecting to a file share.
If I use VPN Tracker it works straight away. My configuration is the same in
IPSecuritas as with VPN Tracker. My OS is 10.3.4 and I am using IPSecuritas
2.0.5
Is there anyone out there who have successfully got IPSecuritas 2.0.5 to
work with Netgear FVS318? Looking forward to creative ideas for getting
this great VPN client to successfully allow access to FVS318 protected
network.
Cheers!
Johan
Re: Netgear FVS318 LOG says I am connected.....
by cnadig on 2004-06-08 23:08:26 +0200
Hello Johan,
do you get a green check mark instead of the red cross in the main
window?
If so, I suspect a routing problem or a problem with you local IP address did you fill anything into the local address field?
Also, could you post a short description of your network setup and the
settings in IPSecuritas (please remove any confidential information!)
Cheers,
Christoph
cant to connect to netscreen, VPN tracker works!
cant to connect to netscreen, VPN tracker works!
by desktopguy on 2004-06-09 16:26:54 +0200
Hi,
I am having trouble connecting to a netscreen firewall via an OS X 10.3.4
workstation. VPN tracker works fine.
The log shows;
Jun 10 00:02:55 support racoon: WARNING:
ipsec_doi.c:3064:ipsecdoi_checkid1(): ID type mismatched.
Jun 10 00:02:55 support racoon: WARNING:
ipsec_doi.c:3064:ipsecdoi_checkid1(): ID type mismatched.
Jun 10 00:02:55 support racoon: WARNING:
ipsec_doi.c:3086:ipsecdoi_checkid1(): ID value mismatched.
Jun 10 00:02:55 support racoon: WARNING:
ipsec_doi.c:3086:ipsecdoi_checkid1(): ID value mismatched.
Jun 10 00:02:55 support racoon: NOTIFY: oakley.c:2057:oakley_skeyid():
couldn't find the proper pskey, try to get one by the peer's address.
Jun 10 00:02:55 support racoon: NOTIFY: oakley.c:2057:oakley_skeyid():
couldn't find the proper pskey, try to get one by the peer's address.
Jun 10 00:02:55 support racoon: ERROR: oakley.c:2071:oakley_skeyid():
couldn't find the pskey for X.X.X.X.
Jun 10 00:02:55 support racoon: ERROR: oakley.c:2071:oakley_skeyid():
couldn't find the pskey for X.X.X.X.
my setting for ID/Auth are;
local identifier - DN: [email protected]
remote identifier - DN: netscreen
using preshared secret.
With identical setting (default) in VPN tracker it works OK.
NOTE: the VPN tracker log shows;
2004-06-09 23:23:35: INFO: isakmp.c:1034:isakmp_ph1begin_i(): begin
Aggressive mode.
2004-06-09 23:23:35: WARNING: ipsec_doi.c:3086:ipsecdoi_checkid1(): ID
type mismatched.
2004-06-09 23:23:35: WARNING: ipsec_doi.c:3134:ipsecdoi_checkid1(): ID
value mismatched.
2004-06-09 23:23:35: NOTIFY: oakley.c:2111:oakley_skeyid(): couldn't find
the proper pskey, try to get one by the peer's address.
2004-06-09 23:23:35: INFO: isakmp.c:2783:log_ph1established():
ISAKMP-SA established X.X.X.X[500]-X.X.X.X[500]
spi:1eddb852701da258:ad5d572683e3bc62
2004-06-09 23:23:36: INFO: isakmp.c:1173:isakmp_ph2begin_i(): initiate
new phase 2 negotiation: X.X.X.X[0]<=>X.X.X.X[0]
I guess VPN tracker also has problems, but then falls back to another
setting which works
any help would be appreciated
Re: cant to connect to netscreen, VPN tracker work
by cnadig on 2004-06-23 18:22:07 +0200
Hello,
try to set the remote identifier to address instead of DN.
Cheers,
Christoph
Re: cant to connect to netscreen, VPN tracker work
by desktopguy on 2004-06-24 02:28:32 +0200
thanks cnadig,
that works fine now.
It is slower to establish the VPN but it works
xauth
xauth
by manu sawkar on 2004-06-09 23:27:45 +0200
will ipsecuritas incorporate xauth support? i can't find an os x client that
has this feature.
I can connect to our sonicwall FW when i turn off xauth, but our group VPN
policy requires this and i am not allowed to keep it disabled.
any thoughts?
thanks,
Manu Sawkar
Re: xauth
by cnadig on 2004-06-23 18:20:06 +0200
Hello Manu,
IPSecuritas is completely dependant on racoon, the IKE daemon which is
responsible for the authentication and key exchange. According to their
webseit (http://www.kame.net/racoon), theyhave no plans to support
XAUTH as it is not an official IETF standard.
As soon as racoon supports XAUTH, IPSecuritas will.
Cheers,
Christoph
Re: xauth
by shaddow on 2006-01-19 01:17:34 +0100
Does Tiger support xauth yet?
I read here that it did, and was hoping if it was true it would be added to
IPsecuritas.
http://wiki.openswan.org/index.php/InteroperatingMac
I also saw that racoon went to ipsec-tools and I believe ipsec-tools now
supports xauth?
Re: xauth
by gdanko on 2006-01-30 04:49:13 +0100
How does VPN Tracker implement xauth?
Re: xauth
by cnadig on 2006-01-31 00:34:03 +0100
Hello,
a beta version of IPSecuritas 3.0 with support for XAUTH is available (not
yet public but on request) and I'm looking for testers. If interested, please
send me an e-mail to [email protected].
Christoph
Re: xauth
by gdanko on 2006-01-31 19:43:32 +0100
I installed the beta. Here are my settings on both ends.
Here are my settings for the SonicWall 5060...
[b]General Tab[/b]
IPSec Keyring Mode: IKE using Preshared Secret
Name: WAN GroupVPN
Shared Secret: SomeSharedSecretKey
[b]Proposals Tab[/b]
[u]IKE (Phase 1) Proposal[/u]
DH Group: Group 2
Encryption: 3DES
Authentication: SHA1
Life Time (seconds): 28800
[u]Ipsec (Phase 2) Proposal[/u]
Protocol: ESP
Encryption: 3DES
Authentication: SHA1
Enable Perfect Forward Security: Unchecked
Life Time (seconds): 28800
[b]Advanced Tab[/b]
Enable Windows Networking (NetBIOS) Broadcast: Checked
Enable Multicast: Unchecked
Management via this SA: HTTP and HTTPS unchecked
Default Gateway: 0.0.0.0 (aka None)
Require Authentication of VPN Clients via XAUTH: Checked
User Group for XAUTH users: Trusted Users
Here are my IPSecuritas Settings
[b]General Tab[/b]
Remote IPSec Device: aaa.bbb.ccc.ddd
Local Side Endpoint Mode: Host (IP left empty)
Remote Side Endpoint Mode: 10.0.10.0
Network Mask (CIDR): 24
[b]Phase 1 Tab[/b]
Life Time: 28800 Seconds
DH Group: 1024 (2)
Encryption: 3DES
Authentication: SHA1
Exchange Mode: Aggressive
Proposal Check: Obey (SonicWall tech doesnt know what this is for)
Nonce Size: 16
[b]Phase 2 Tab[/b]
Lifetime: 28800 Seconds
PFS Group: None
Encryption: Only 3DES is checked
Authentication: Only SHA1 is checked
[b]Id/Auth Tab[/b]
Local Identifier: Address (SonicWall tech doesnt know what this is for)
Remote Identifier: Address (SonicWall tech doesnt know what this is for)
Authentication Method: Preshared Key (my key here)
[b]Options Tab[/b]
The SonicWall tech didn't know what to put here so everything is left
Re: xauth
by shaddow on 2006-02-16 04:13:35 +0100
I tried emailing a week or so ago and have heard nothing. I can test this on
a router here that supports xauth.
[quote author=cnadig link=1086816465/0#4 date=1138664043]Hello,
a beta version of IPSecuritas 3.0 with support for XAUTH is available (not
yet public but on request) and I'm looking for testers. If interested, please
send me an e-mail to [email protected].
Christoph[/quote]
Re: xauth
by ritani on 2006-03-28 16:43:57 +0200
Hi,
We are using xauth with RSA and not with pre-shared key, was anyone able
to make it work?
We are testing revision 3.0 with Netscreen 208 version 5.1.0r4a.0.
Thank you,
ritani
Re: xauth
by ritani on 2006-03-29 15:55:59 +0200
We also tried xauth with preshared keys, but it seems that the Netscreen is
not detecting that the client is sending him any password while the client
starts Phase 2 negotiations.
Below is the log of the Netscreen:
2006-03-29 14:04:26 info IKE: User <[email protected]> with ID <75>
requested a connection
2006-03-29 14:04:26 info IKE<192.168.136.24> Phase 1: Responder
starts AGGRESSIVE mode negotiations.
2006-03-29 14:04:26 info IKE: User <[email protected]> with ID <75>
requested a connection.
2006-03-29 14:04:26 info IKE<192.168.136.24> Phase 1: IKE responder
has detected NAT in front of the local device.
2006-03-29 14:04:26 info IKE<192.168.136.24> Phase 1: IKE responder
has detected NAT in front of the remote device.
2006-03-29 14:04:26 info IKE<192.168.136.24> Phase 1: Completed
Aggressive mode negotiations with a <28800>-second lifetime.
2006-03-29 14:04:26 info IKE<192.168.136.24> Phase 2 msg ID
<fb4be856>: Responded to the peer's first message.
2006-03-29 14:04:26 info Rejected an IKE packet on loopback.1 from
192.168.136.24:4500 to 192.168.140.2:4500 with cookies
d2b2a44cc455b8a0 and 70ac984644c807a1 because a Phase 2 packet
arrived while XAuth was still pending.
2006-03-29 14:04:26 info IKE<192.168.136.24> Phase 2 msg ID
<fb4be856>: Negotiations have failed.
2006-03-29 14:04:32 info IKE<192.168.136.24>: XAuth login was aborted
for gateway <CNSwlanGW>, username <zs03>, retry: 0.
2006-03-29 14:04:40 info IKE<192.168.136.24>: XAuth login expired and
was terminated for username <zs03> at <192.168.157.105>.
Has any body faced the same?
Thanks
IPSec with Bintec Router works fine.
IPSec with Bintec Router works fine.
by netgoblin on 2004-06-14 10:15:58 +0200
Hello,
for information I have tested IPSecuritas with Bintec Router IPsec.
- Presahred Key and Certificate works
- But in the moment only 3des / AES encryption works.
By interest I may send the config form both sides.
by netgoblin
Re: IPSec with Bintec Router works fine.
by cnadig on 2004-06-23 18:17:45 +0200
Hello Netgoblin,
I'd be thankful for a short description that I could add to the online help in
IPSecuritas!
Thanks,
Christoph
Re: IPSec with Bintec Router works fine.
by netgoblin on 2004-06-28 09:44:28 +0200
IPSec Config Bintec VPN25:
1. IPSec Main Screen
2. IKE Phase 1 defaults
3. IPsec Phase 2 defaults
4. Peer Config
4.1 Traffic List
5. Certificates
5.1 CA Certificat
5.2 Own Certificat
5.3 Peer Certificat
6. Tips
Software Releases:
Bintec VPN25:
fossie:> show rev
Logik :
V.1.0
Bootmon :
V.7.1.2
Boss
:
V.7.1 Rev. 2 (Patch 8 ) IPSec V. 2.1.1 from 2004/06/17
00:00:00
1. IPSec Main Screen
VPN Access 25 Setup Tool
BinTec Access Networks GmbH
[IPSEC]: IPsec Configuration - Main Menu
fossie
_______________________________________________________________________________
Enable IPSec
: yes
Pre IPSec Rules >
Configure Peers >
Post IPSec Rules >
IKE (Phase 1) Defaults *autogenerated*
IPsec (Phase 2) Defaults *autogenerated*
Certificate and Key Management >
edit >
edit >
Advanced Settings >
Wizard >
Monitoring >
SAVE
CANCEL
_______________________________________________________________________________
2. IKE Phase 1 defaults: (*autogenerated*)
VPN Access 25 Setup Tool
BinTec Access Networks GmbH
[IPSEC][PHASE1][EDIT]
fossie
_______________________________________________________________________________
Description (Idx 1) : *autogenerated*
Proposal
: 2 (DES3/MD5)
Lifetime
: 7200 Sec (1)
Group
: 2 (1024 bit MODP)
Authentication Method : RSA Signatures
Mode
: id_protect
Heartbeats
: none
Block Time
: 0
Re: IPSec with Bintec Router works fine.
by netgoblin on 2004-06-28 09:45:03 +0200
5. Certificates
5.1 CA Certificat
VPN Access 25 Setup Tool
BinTec Access Networks GmbH
[IPSEC][CERTMGMT][OWN]: IPsec Configuration - Certificate Management
fossie
_______________________________________________________________________________
Flags: 'O'= own cert, 'CA'= CA cert, 'N'= no CRLs, 'T'= cert forced trusted
Description
Flags SerialNo Subject Names
vpn25-fossie O
2
CN=vpn25, OU=Support, O=netgoblin, ST=Bav
DOWNLOAD
DELETE
EXIT
_______________________________________________________________________________
5.2 Own Certificat
VPN Access 25 Setup Tool
BinTec Access Networks GmbH
[IPSEC][CERTMGMT][CAS]: IPsec Configuration - Certificate Management
fossie
_______________________________________________________________________________
Flags: 'O'= own cert, 'CA'= CA cert, 'N'= no CRLs, 'T'= cert forced trusted
Description
Chewbacker
O=netgoblin
Flags SerialNo
CA,N,T 0
Subject Names
CN=chewbacker, OU=chewbacker,
DOWNLOAD
DELETE
EXIT
_______________________________________________________________________________
5.3 Peer Certificat
VPN Access 25 Setup Tool
BinTec Access Networks GmbH
[IPSEC][CERTMGMT][PEERS]: IPsec Configuration - Certificate Management
fossie
_______________________________________________________________________________
Flags: 'O'= own cert, 'CA'= CA cert, 'N'= no CRLs, 'T'= cert forced trusted
Description
powerbook
Flags SerialNo Subject Names
T
0
OU=pb4, O=netgoblin, ST=Bavaria, C=DE, [n
DOWNLOAD
DELETE
EXIT
______________________________________________________________________________
8.
Watch your time and date on the Bintec specialy when you work with
certificates. ( New Bintec Products have not realtime clocks.)
Timesync via ntp or isdn.
fossie:> date
Mon Jun 28 9:33:35 2004
Debug level increment.
IPSecuritas appears to be doing nothing at all
IPSecuritas appears to be doing nothing at all
by DarkBytes on 2004-06-23 14:58:52 +0200
Hi I have installed & ran the latest version of IPSecuritas on macOS 10.2.8 in
an attempt to have it connect through our checkpoint NG firewall.
The thing is after configuring the client , & attempting to intialize a
connection, My gateway logs are showing no connections from the client at
all ?
I must be doing something fundementally wrong , but it is as if the
IPSecuritas is doing nothing at all.
also could someone explain where i can find the logs for the client , or how
i run it in verbous mode.
I would assume that as long as i have the correct ip of my gateway &
roughly the correct settings on the client , i should see some kind of
connection attempts on my firewall, be them failed attempts etc.
please help
Many many thanks
Re: IPSecuritas appears to be doing nothing at all
by cnadig on 2004-06-23 18:14:31 +0200
Hello,
to open the log window, go to File and select Open Log. The log detail can
be increased in the preferences.
I would also assume that there should be some activity visible in the
firewall's log, as long as the 'Establish IKE' option is enabled in IPSecuritas.
I can probably give more hints if you'd post the IPSecuritas log (with log
level to debug or verbose debug) - please remove any confidential
information.
Christoph
Can you use certs and user/pass on same connection
Can you use certs and user/pass on same connection
by LoopyShane on 2004-06-23 18:14:37 +0200
This may be a unique setup here but my client has just had a BSD based
router installed that is setup for incoming L2TP over IPSec connections that
use a cert as well as username/password auth.
Apple's Internet Connect allows the username/password but no certs.
IPSecuritas allows the certs but I can't see that it allows user/pass.
Is there a way to use both or get IPSecuritas to add cert auth to the apple
connect?
Or is there a way to get IPSecuritas to use the user/pass?
Re: Can you use certs and user/pass on same connec
by nbirnbaum on 2004-08-26 21:21:30 +0200
Did you ever figure this out?
Re: Can you use certs and user/pass on same connec
by Fernando J. Pereda on 2004-09-08 02:14:35 +0200
I really need this.... If you know how to do it. It'd be great !
Cheers
Stop IPSec keeps GIF1 alive - Route corrupt
Stop IPSec keeps GIF1 alive - Route corrupt
by mhaury on 2004-06-29 14:02:18 +0200
Hello,
Don't know if this is a bug or not, I have two VPN connection setup in
parallel, one for our Intranet, another for our DMZ. Both work fine however
when I stop IPSec the second connection (to the DMZ) continues to stay
active, although apparently IPSec is shutdown.
At least the routing table seems wrong and indicates a route via GIF1 (and
should be EN0):
route to: xxx.aaa.bbb.com
destination: 192.168.0.0
mask: 255.255.0.0
interface: gif1
flags: <UP,DONE,STATIC,PRCLONING>
recvpipe sendpipe ssthresh rtt,msec rttvar hopcount
mtu
expire
0
0
0
0
0
0
1280
0
I'm Running OSX10.3.4 all updates and IPSecurityas 2.0.5
Any ideas, also how can I reset the routes correctly such that things work,
'route flush' does not work, only restart.
Thanks for the GREAT Software anyway !!!
Matthias
checkpoint userc.C file
checkpoint userc.C file
by ac7ub on 2004-06-30 11:05:31 +0200
Greetings folks,
Does anyone out there know how to extract the pkcs12 certificate from
a userc.C file my company gave me for the winblows client and convert it
to a format I can import?
Re: checkpoint userc.C file
by llllllllllllllllllllllll on 2004-09-30 03:51:32 +0200
Did anyone ever figure this out? I have a userc.C file from windows that I'd
like to use to set up IPS on my new Mac.
Are these keys linked with hardware in anyway? I'm wondering if there is
some Intel chip code that it's looking for.
Using IPSecuritas for a VPN-1 SecuRemote login
Using IPSecuritas for a VPN-1 SecuRemote login
by mluker on 2004-07-07 00:50:03 +0200
I have an office VPN that is accessed using the standard VPN-1 SecuRemote
client on Windows. I have a powerbook at home I would rather use than the
corporate laptop I was given.
I have tried to get IPSecuritas setup, but I must confess to being complete
ignorant of what settings I should use. My HelpDesk only supports the
Windows software, and the "settings" they gave me were next to useless
(i.e. enter this IP and use your login) when it comes to all the IPSecuritas
settings.
Does anyone have the standard settings for a CheckPoint firewall that is
normally accessed by a SecuRemote client?
Any help at all is greatly appreciated :D
Re: Using IPSecuritas for a VPN-1 SecuRemote login
by Matthias Haury on 2004-07-08 19:43:08 +0200
Hello,
we had the same problem, we have a pretty much standard VPN setup in a
Checkpoint NG... so here are the settings for IPSecuritas that work for us:
remote device <IP of your Checkpoint FW>
remote network 172.22.0.0/16 (or whatever netmask you choose for
access)
local mask 32
main
shared secret: <password entered in VPN of Checkpoint>
local IP: <leave empty>
mode: aggressive
proposal check: claim
nounce size: 16
phase 1
lifetime 1440 secondss
dh group 2
3des
sha1
phase 2
lifetime 3600 seconds
pfs group 2
3des
hmac_sha1
id
local: <your email or whatever ID you entererd in Checkpoint>
remote:<leave empty>
Here for a couple of commandline tools to see your setup once started in IP
Securitas (you need to be root or run as sudo)
Diagnosis:
==========
See the Current Setup
sudo setkey -DP
Flush the Current Setup
sudo setkey -FP
Hope that helps.. we have some problems when stopping the IPSecuritas
on OSX 10.3.4 where it sometimes keeps the gif1 Interface active for a
second VPN connection that one enters (see my post on this issue), other
than that it works great. You can add a special local IP if you wish (i left it
empty above), and this helps you to be identified correctly.. however you
cannot specify the same network range for local IP as the one behind your
Checkpoint FW !!!
Best.
Matthias
Re: Using IPSecuritas for a VPN-1 SecuRemote login
by mluker on 2004-07-08 22:15:47 +0200
Thanks for your reply. Unfortunately it is still not working :-(
Here are the settings I currently have:
General
Mode: Host To NetWork
Remote IPSec Device:
[address as given to me by support for SecuRemote]
Remote Network: [same address sans a byte] / 24
Local Address: <blank>
Exchange Mode: Aggressive
Proposal: Claim
Nonce: 16
Phase 1
Lifetime: 1440
DH Group: Mod1024(2)
Encryption: 3DES
Authentication: SHA1
Phase 2
Lifetime: 3600
PFS Group: Mod1024(2)
Encryption: 3DES
Authentication: HMAC SHA1
ID/Auth
Identificaton: DN: [my username]
Remote Identifier: Address
Authentication: Preshared Secret: [my password]
Options:
IPSec/IKE Options:
IPSEC DOI, SIT_IDENTITY_ONLY, Initial Contact,
Generate Policy, MIP6
General Options:
Establish IKE immediately
---Is there something I am missing? From the log file, it appears to be failing on
phase 1:
[quote]
Jul 8 13:03:32 meson racoon: INFO: isakmp.c:1953:isakmp_post_acquire():
IPsec-SA request for checkpoint-ip queued due to no phase1 found.
Jul 8 13:03:32 meson racoon: DEBUG: isakmp.c:1001:isakmp_ph1begin_i():
===
Jul 8 13:03:32 meson racoon: INFO: isakmp.c:1006:isakmp_ph1begin_i():
initiate new phase 1 negotiation: 10.20.20.33[500]<=>checkpoint-ip[500]
Jul 8 13:03:32 meson racoon: INFO: isakmp.c:1011:isakmp_ph1begin_i():
begin Aggressive mode.
Jul 8 13:03:32 meson racoon: DEBUG: isakmp.c:2265:isakmp_newcookie():
new cookie: 9fac4f294e77ce4f
Jul 8 13:03:32 meson racoon: DEBUG: ipsec_doi.c:3212:ipsecdoi_setid1(): use
ID type of FQDN
Jul 8 13:03:32 meson racoon: DEBUG: oakley.c:257:oakley_dh_generate():
compute DH's private.
Jul 8 13:03:32 meson racoon: DEBUG: oakley.c:259:oakley_dh_generate():
compute DH's public.
Jul 8 13:03:32 meson racoon: DEBUG: isakmp_agg.c:169:agg_i1send():
authmethod is pre-shared key
Jul 8 13:03:32 meson racoon: DEBUG: isakmp.c:2382:set_isakmp_payload():
add payload of len 48, next type 4
Jul 8 13:03:32 meson racoon: DEBUG: isakmp.c:2382:set_isakmp_payload():
add payload of len 128, next type 10
Jul 8 13:03:32 meson racoon: DEBUG: isakmp.c:2382:set_isakmp_payload():
add payload of len 16, next type 5
Re: Using IPSecuritas for a VPN-1 SecuRemote login
by Matthias Haury on 2004-07-19 10:40:38 +0200
Hello,
well, sorry, might be my mistake, have now some different settings
running, but don't remember if this was because of an upgrade of NG... try
those:
Tab: Phase 1
Lifetime 28800 seconds
Group: mod1024(2)
Endryption: DES
Authentication: SHA1
Tab: Id/Auth
Encryption:
I have active: DES, AES256, 3DES, AES128
Authenciation:
I have HMAC MD5 and HMAC SHA1
Options:
I don't have selected "Verify Identifier"
Everything else is identical to yours...
If this does not work, you have to see with your support what are the
settings they hacked into Checkpoint.. maybe they modified the default
ones.
Also verify that your IP netmask is really /24
Let me know if this helps...
M.
Re: Using IPSecuritas for a VPN-1 SecuRemote login
by Helmut Peschke on 2004-09-21 17:40:00 +0200
Hi folks,
I am using IPSecuritas on Mac OS 10.3.5 with CheckPoint with all the
parameters described in the HOWTO, however the Local Identifier in
Id/Auth has to be written as
name@domain
(e.g. the email adress), which in turn has to be the userid in the VPN-1
software, otherwise the contents is not identified as user id.
Hope this helps.
Re: Using IPSecuritas for a VPN-1 SecuRemote login
by Fabrice on 2004-11-06 18:43:38 +0100
[quote author=Helmut Peschke link=1089154204/0#4
date=1095781200]Hi folks,
I am using IPSecuritas on Mac OS 10.3.5 with CheckPoint with all the
parameters described in the HOWTO, however the Local Identifier in
Id/Auth has to be written as
name@domain
(e.g. the email adress), which in turn has to be the userid in the VPN-1
software, otherwise the contents is not identified as user id.
Hope this helps.[/quote]
Can you help me ?
I used with success vaporsec 0.9 on panther, but I know that the developer
stop this program, and he suggests IPSecuritas.
I'm just trying to connect my computer from my home to my network
(firewall checkpoint).
I can admin the server side.
I've got the "green check" on IPSecuritas, but the log give the error :
Nov 6 18:12:14 XXXX racoon: NOTIFY: oakley.c:2057:oakley_skeyid():
couldn't find the proper pskey, try to get one by the peer's address.
And of course it doesn't work.
Is the problem you're talking about ?
You mean that in the "local identifier DN" I put my full e-mail ?
And on server side, I put the full e-mail ? Where ?
Thanks a lot in advance
Kind regards
Re: Using IPSecuritas for a VPN-1 SecuRemote login
by cnadig on 2004-11-07 01:42:25 +0100
Hello Fabrice,
try disabling the 'Verify Identifier' option in IPSecuritas.
Let us know how it goes!
Cheers,
Christoph
Re: Using IPSecuritas for a VPN-1 SecuRemote login
by Fabrice on 2004-11-07 10:12:10 +0100
[quote author=cnadig link=1089154204/0#6 date=1099788145]Hello
Fabrice,
try disabling the 'Verify Identifier' option in IPSecuritas.
Let us know how it goes!
Cheers,
Christoph[/quote]
Thanks for your answer. "Verify Identifier" was already disabled.
Re: Using IPSecuritas for a VPN-1 SecuRemote login
by fabrice on 2004-11-07 10:47:12 +0100
Difficult to explain, but it works !
The only thing I've changed is in phase 2 in IPSecuritas : I've unchecked
DES, AES 128, AES 256 and HMAC MD5.
Of course anybody can tell me my settings, if it can help.
Thanks for your help.
Using IPSecuritas with NetScreen 208
Using IPSecuritas with NetScreen 208
by joanba on 2004-07-09 19:43:03 +0200
Hi,
I'm a completely newbie with VPN questions and I want to know if what is
happening to me is normal.
We use a NetScreen 208 firewall to protect our company network and I want
to access it from Internet using a Mac ( MacOS X 10.3.4 ).
The NetScreen is configured to use L2TP, I think that without IPSec. I can
connect, but look what I need to do:
I've configured Internet Connect, using VPN(L2TP), I write my
user/password but in the log appears:
Fri Jul 9 19:37:19 2004 : L2TP: starting racoon...
Fri Jul 9 19:37:22 2004 : L2TP connecting to server '62.ZZ.XX.YY'
(62.ZZ.XX.YY)...
Nothing else.
But if I run IPSecuritas 2.0.5 ( without any configuration ), the Start IPSec
button is disabled and Stop IPSec is enabled. If I press Stop IPSec the
connection starts and works fine:
Fri
Fri
Fri
Fri
Fri
Fri
Fri
Fri
Fri
Fri
Fri
Fri
Jul
Jul
Jul
Jul
Jul
Jul
Jul
Jul
Jul
Jul
Jul
Jul
9
9
9
9
9
9
9
9
9
9
9
9
19:37:26
19:37:26
19:37:26
19:37:26
19:37:26
19:37:26
19:37:26
19:37:26
19:37:26
19:37:53
19:37:53
19:37:53
2004
2004
2004
2004
2004
2004
2004
2004
2004
2004
2004
2004
:
:
:
:
:
:
:
:
:
:
:
:
L2TP connection established.
Using interface ppp0
Connect: ppp0 <--> socket[34:18]
Remote message: We welcome you.
acsp resetci called
local IP address 10.250.250.1
remote IP address 62.ZZ.XX.YY
primary DNS address 10.0.0.15
secondary DNS address 10.0.0.16
Terminating on signal 15.
Connection terminated.
Connect time 0.5 minutes.
And when I close the connection the log also finishes:
Fri Jul 9 19:37:53 2004 : Sent 44 bytes, received 0 bytes.
Fri Jul 9 19:37:53 2004 : L2TP disconnecting...
Fri Jul 9 19:37:53 2004 : L2TP disconnected
Any idea or comment ? What I'm doing wrong ?
Best regards,
Joan B. Altadill
VPN is happy; but can't see remote network
VPN is happy; but can't see remote network
by twarge on 2004-07-15 06:52:55 +0200
So I've made a connection with the linksys BEFVP41 router in the lab; I have
a nice green checkbox and both sides seem to agree that they're happily
connected. Now I'm missing something rather serious here: I'm not seeing
the remote network.
I've tried various computer's IP addresses and get no response. If I look at
the computers in the Network folder, I see just the local computers at home
like I've always seen. So how do I channel all my traffic through the tunnel?
What am I missing?
Help is greatly appreciated.
Tom Kornack
Re: VPN is happy; but can't see remote network
by sbickle on 2004-07-29 16:39:20 +0200
Is this still a problems? It would sound like the IPSEC tunnel doesn't contain
the right information for what IP's are on the other side of the remote
network...
Re: VPN is happy; but can't see remote network
by sfazzina on 2004-08-06 02:43:54 +0200
I HAVE THE SAME PROBLEM :) - EXCEPT - I DO NOT HAVE A CHECKBOX - I
HAVE A RED X
Re: VPN is happy; but can't see remote network
by Matt Deatherage on 2004-08-06 09:36:43 +0200
I have the same problem, and it's not that the tunnel contains the wrong
information. The BEFVP41 reports that the tunnel is connected, and the
remote computer correctly reports that traffic to the local area network
should be routed through gif0 - but nothing happens. The network on the
Linksys end is 192.168.1/24, and the remote computer is trying to connect
as 192.168.1.100, but even though the tunnel is up and the routing is
right, the remote computer can't reach any machines on the local network
or vice-versa. Attempts on the local network to ping 192.168.1.100 are
fruitless.
Re: VPN is happy; but can't see remote network
by Laurens van Hoorn on 2004-11-04 09:06:41 +0100
I (now) have the same problem, although the VPN used to work fine from
another location. Unfortunately, that location is on another continent so
going back there is not an option.
No indication in the log that anything is wrong:
Log output from IPSecuritas 2.0.6
Nov 4 08:50:19 PowerBook-G4-Laurens IPSecuritas:
Nov 4 08:50:19 PowerBook-G4-Laurens IPSecuritas:
Nov 4 08:50:19 PowerBook-G4-Laurens IPSecuritas:
Nov 4 08:50:19 PowerBook-G4-Laurens IPSecuritas:
Nov 4 08:50:19 PowerBook-G4-Laurens IPSecuritas:
Nov 4 08:50:19 PowerBook-G4-Laurens IPSecuritas:
done
Nov 4 08:50:20 PowerBook-G4-Laurens IPSecuritas:
Nov 4 08:50:20 PowerBook-G4-Laurens IPSecuritas:
Nov 4 08:50:20 PowerBook-G4-Laurens IPSecuritas:
Parsing configuration
Setting up racoon.conf
Setting up setkey.conf
Setting up psk.txt
Setting up tunnel.conf
Parsing configuration
Starting racoon...
Racoon is running
Set kernel keys
So what could be the problem?!
Any suggestions greatly appreciated.
Re: VPN is happy; but can't see remote network
by Rich on 2004-11-05 12:29:19 +0100
Same trouble. Cannot ping wireless machines from Xserve, cannot see
wired Macs in Local on wireless machines. Wireless machines can see each
other in Local
Re: VPN is happy; but can't see remote network
by JP on 2004-12-02 00:34:27 +0100
I had the same problem if I try to VPN from the corporate network. Turns
out they filter just about everything. No ipsec pass-thru, no ESP, etc.
Here's how you can test. Dial up to AOL via modem, try to VPN again, now
it should work. If you can ping your remote machine, then you know for
sure something is being filtered.
Hope this helps someone.
Re: VPN is happy; but can't see remote network
by Bryan Derman on 2004-12-17 22:22:02 +0100
Y'all might want to have a look at the stuff on [size=13]
[url]http://www.derman.com/Misc/VPN/Overview.html[/url][/size].
'Though it's for a LinkSys [b]BEFSX41[/b], the information also applies to
the [b]BEFVP41[/b].
Hope this helps.
FVL328 denial of service?
FVL328 denial of service?
by davehodg on 2004-07-21 17:11:15 +0200
I've got a Netgear FVL328 merrily conversing with Netgear Windows VPN
client software.
I've set up IPSecuritas, as far as I can see, identically to the textbook
example that Netgear supply.
It negotiates the IKE phase1 fine but then the phase 2 just ends up with a
bunch of stuff as attached at the end. Seems like it's just lost the plot.
Worse still, it seems to knock out the internet-facing interface on the
router! Not good.
Any ideas?
Jul 21 15:39:26 Daves-PB racoon: DEBUG:
algorithm.c:322:alg_oakley_hmacdef(): hmac(hmac_sha1)
Jul 21 15:39:26 Daves-PB racoon: DEBUG:
oakley.c:759:oakley_compute_hash1(): HASH computed:
Jul 21 15:39:26 Daves-PB racoon: DEBUG: plog.c:199:plogdump():
571bee24 e446718f 55faeb79 d1d7e435 fad70c7b
Jul 21 15:39:26 Daves-PB racoon: ERROR:
isakmp_quick.c:1810:get_sainfo_r(): failed to get sainfo.
Jul 21 15:39:26 Daves-PB racoon: ERROR:
isakmp_quick.c:1810:get_sainfo_r(): failed to get sainfo.
Jul 21 15:39:26 Daves-PB racoon: ERROR:
isakmp_quick.c:1044:quick_r1recv(): failed to get sainfo.
Jul 21 15:39:26 Daves-PB racoon: ERROR:
isakmp_quick.c:1044:quick_r1recv(): failed to get sainfo.
Jul 21 15:39:26 Daves-PB racoon: ERROR:
isakmp.c:1271:isakmp_ph2begin_r(): failed to pre-process packet.
Jul 21 15:39:26 Daves-PB racoon: ERROR:
isakmp.c:1271:isakmp_ph2begin_r(): failed to pre-process packet.
Jul 21 15:39:27 Daves-PB racoon: DEBUG:
grabmyaddr.c:454:update_myaddrs(): caught rtm:2, need update interface
address list
Jul 21 15:39:27 Daves-PB racoon: DEBUG:
grabmyaddr.c:454:update_myaddrs(): caught rtm:2, need update interface
address list
Jul 21 15:39:27 Daves-PB racoon: DEBUG:
grabmyaddr.c:454:update_myaddrs(): caught rtm:13, need update interface
address list
Jul 21 15:39:27 Daves-PB racoon: DEBUG: pfkey.c:196:pfkey_handler(): get
pfkey X_SPDFLUSH message
Jul 21 15:39:27 Daves-PB racoon: DEBUG:
grabmyaddr.c:448:update_myaddrs(): msg 16 not interesting
Jul 21 15:39:27 Daves-PB racoon: DEBUG:
grabmyaddr.c:448:update_myaddrs(): msg 15 not interesting
Jul 21 15:39:27 Daves-PB racoon: DEBUG: pfkey.c:196:pfkey_handler(): get
pfkey FLUSH message
Jul 21 15:39:27 Daves-PB racoon: DEBUG: oakley.c:2563:oakley_newiv2():
compute IV for phase2
Jul 21 15:39:27 Daves-PB racoon: DEBUG: oakley.c:2564:oakley_newiv2():
phase1 last IV:
Jul 21 15:39:27 Daves-PB racoon: DEBUG: plog.c:199:plogdump():
9caad0f2 386c356a d0a5d3d3
Jul 21 15:39:27 Daves-PB racoon: DEBUG:
algorithm.c:252:alg_oakley_hashdef(): hash(sha1)
Jul 21 15:39:27 Daves-PB racoon: DEBUG:
algorithm.c:382:alg_oakley_encdef(): encription(3des)
Jul 21 15:39:27 Daves-PB racoon: DEBUG: oakley.c:2596:oakley_newiv2():
SonicWall PRO100
SonicWall PRO100
by Peter Pop on 2004-07-21 21:32:36 +0200
Hi,
Maybe some of you can tell me whats wrong here:
Log output from IPSecuritas 2.0.6
<removed date and machine name> IPSecuritas: Parsing configuration
<removed date and machine name> IPSecuritas: Setting up racoon.conf
<removed date and machine name> IPSecuritas: Setting up setkey.conf
<removed date and machine name> IPSecuritas: Setting up psk.txt
<removed date and machine name> IPSecuritas: Setting up tunnel.conf
<removed date and machine name> IPSecuritas: Parsing configuration done
<removed date and machine name> IPSecuritas: Starting racoon...
<removed date and machine name> IPSecuritas: Racoon is running
<removed date and machine name> IPSecuritas: Set kernel keys
<removed date and machine name> racoon: WARNING:
ipsec_doi.c:3064:ipsecdoi_checkid1(): ID type mismatched.
<removed date and machine name> racoon: WARNING:
ipsec_doi.c:3064:ipsecdoi_checkid1(): ID type mismatched.
<removed date and machine name> racoon: WARNING:
ipsec_doi.c:3086:ipsecdoi_checkid1(): ID value mismatched.
<removed date and machine name> racoon: WARNING:
ipsec_doi.c:3086:ipsecdoi_checkid1(): ID value mismatched.
<removed date and machine name> racoon: WARNING:
ipsec_doi.c:920:cmp_aproppair_i(): attribute has been modified.
<removed date and machine name> racoon: WARNING:
ipsec_doi.c:920:cmp_aproppair_i(): attribute has been modified.
In the connection overview the connection has the green checkmark
indicating an established connection, so there's nothing wrong with the
link.
Netgear FVS318 Cofig Help!!
Netgear FVS318 Cofig Help!!
by Wayne Sturman on 2004-07-29 02:19:34 +0200
These are the settings I am trying to use to connect from my Powerbook G4
Laptop to my Imac G4 15" behind Netgear FVS318 both running OS x
10.3.4
Static Public IP address of my Netgear 66.93.84.14
Lan IP address of my Imac at the office: 192.168.0.25
Dynamic IP at home from cable modem- Powerbook connected to internet
via airport through Asante Freindly Net Router Model #FR3004C.
Local Lan IP address is 192.168.123.194
I am including jpgs of configuration settiings for both the netgear and
IPSecuritas as well as the Log file for these settings.
Please can anyone help!!
THIS IS THE MAIN VPN SCREEN FOR NETGEAR
[img]http://aquaexperts.com/IPs/Netgear_FVS318Main.jpg[/img]
THIS IS THE SETTINGS PAGE FOR NETGEAR
[img]http://aquaexperts.com/IPs/Netgear_FVS318settings.jpg[/img]
THIS IS THE GENERAL TAB FOR IPSecuritas
[img]http://aquaexperts.com/IPs/IPS_general.jpg[/img]
THIS IS THE PHASE 1 TAB FOR IPSecuritas
[img]http://aquaexperts.com/IPs/IPS_Phase1.jpg[/img]
THIS IS THE PHASE 2 TAB FOR IPSecuritas
[img]http://aquaexperts.com/IPs/IPS_Phase2.jpg[/img]
THIS IS THE ID/AUTH TAB GOT IPSecuritas
[img]http://aquaexperts.com/IPs/IPS_ID.jpg[/img]
THID IS THE LOG FILE GENERATED BY IPSecuritas when I try to connect
[img]http://aquaexperts.com/IPs/IPS_Log.jpg[/img]
CAN SOMEONE GIVE ME THE CORRECT SETTINGS SO I CAN CONNECT TO MY
OFFICE NETWORK
THANKS
WAYNE
Re: Netgear FVS318 Cofig Help!!
by sbickle on 2004-07-30 17:37:14 +0200
I had a lot of the same problems setting it up... My settings are similiar,
but I have aggressive mode selected with 3des, enable perf. and netbios
ARE checked.
What I found was that in the remote address field I had to specify the IP of
my IPSecuritas client and NOT the remote network.
Hope that helps.
S
Re: Netgear FVS318 Cofig Help!!
by cnadig on 2004-08-02 23:23:44 +0200
Hello Wayne,
try disabling the 'verify identifier' option or set the remote identification to
address instead of DN.
Christoph
Re: Netgear FVS318 Cofig Help!!
by John Hamann on 2004-08-05 04:56:33 +0200
I think your Proposal Check should be set to Claim, DH Group and PFS
Group should be set to Mod1024. I don't have Verify Identifier checked but
do have checked IPSec DOI, SIT_IDENTITY_ONLY, Initial Contact, MIP6 and
DHCP Pass-Though. Hope this helps.
NETGEAR FVS318 doesn't allow remote network
NETGEAR FVS318 doesn't allow remote network
by sbickle on 2004-07-29 16:35:37 +0200
After reading through the other messages and playing around with multiple
settings I was able to get the FVS318 talking. The problem I found is that
for some reason it does not work if I set the remote as a network with a
/24 only if I set it as single host and put the private IP of the remote
device.
Has anyone else seen this? Any ideas what causes this?
Thanks in advance
S
Import certificate failed
Import certificate failed
by Yann Borg on 2004-08-03 00:47:07 +0200
Hello,
if I receive and download a certificate from Microsoft Entourage v.X or
v.2004, IPSecuritas is not able to import it properly:
Failed to import xxx_cert.pem. Please make sure the file contains a
signed X.509 certificate in PEM format.
But if I bounce the mail to Mail.app and download the certificate, then
IPSecuritas import it fine.
I'm not very ease in UCL but when I make a 'diff file1 file2' the result ist "No
newline at end of file".
Have a look with BBEdit in the file doesn't help me to find where the new
line is in the one file and should be in the second.
It seems to be an Entourage bug/whatever, but could IPSecuritas recognize
such certificate although?
Thanks,
Yann
Re: Import certificate failed
by Yann Borg on 2004-08-03 14:07:21 +0200
Hi,
I've asked our security partner and he tolds that on byte level, an Entourage
"Newline" is a 0x0d (Carraige Return) and for Mail.app a 0x0a (Line Feed).
Could IPSecuritas be more tolerant to accept those Entourage newlines?
Thanks,
Yann
Re: Import certificate failed
by Yann Borg on 2004-08-03 23:06:44 +0200
Hello again,
a helpfull and easy workaround is to open a certificate who was
downloaded from Microsoft Entourage with BBEit Lite and to save it with
"options" > "Line Break" > "Unix". So IPSecuritas 2.0.6 will import the
certificate it could not before, because of the Macintosh line break.
Regards,
Yann, alone in the forum today? ;-)
having a problem with certificates
having a problem with certificates
by sfazzina on 2004-08-04 20:45:07 +0200
IPSecuritas will not allow me to select the use of certificates in the config.
All cert. related checkboxes are greyed out and not available - can
someone help me get these boxes woken up?
Re: having a problem with certificates
by cnadig on 2004-08-04 20:55:59 +0200
Hello,
have you already imported the certificates with the Certificates Manager?
Christoph
Re: having a problem with certificates
by sfazzina on 2004-08-05 04:37:03 +0200
[quote author=cnadig link=1091645108/0#1 date=1091645759]Hello,
have you already imported the certificates with the Certificates Manager?
Christoph[/quote]
Yes - they show up in the Cert Manager -
Re: having a problem with certificates
by cnadig on 2004-08-05 07:41:12 +0200
Hello,
if you select Certificates instead of Preshared Key for the authentication, the
certificates ID radiobuttons stay greyed-out?
Or is this button already greyed-out?
Christoph
Re: having a problem with certificates
by sfazzina on 2004-08-05 15:26:47 +0200
[quote author=cnadig link=1091645108/0#3 date=1091684472]Hello,
if you select Certificates instead of Preshared Key for the authentication, the
certificates ID radiobuttons stay greyed-out?
Or is this button already greyed-out?
Christoph[/quote]
ALL certificate options are greyed out.
here is a screenshot
[img]http://www.supersam.com/certt.jpg[/img]
I can provide more if you like - just tell me which screens you want to see.
Thanx
--sam
Re: having a problem with certificates
by sfazzina on 2004-08-05 17:01:56 +0200
NEVERMIND - I GOT MY ANSWER......
YOU NEED TO IMPORT A X.509 CERT AND PRIVATE KEY.
I DID IMPORT MY KEY - BUT NO PRIVATE KEY - THAT WAS THE PROBLEM.
THEN IT LIGHTS UP LIKE A XMAS TREE,
LOL
THANX ANYWAYS.
I WILL PROBABLY HAVE MORE QUESTIONS.
Re: having a problem with certificates
by sfazzina on 2004-08-06 02:12:24 +0200
hi again - sdo i finally got this thing to use certs - now it wont connect - i
get the following error - any help would be appreciated
Mac OS X Version 10.3.4 (Build 7H63)
Aug 5 20:05:25 SUPERBOOK syslogd: restart
Aug 5 20:05:25 SUPERBOOK syslogd: restart
Aug 5 20:05:27 SUPERBOOK racoon: ERROR:
isakmp_inf.c:142:isakmp_info_recv(): ignore information because the
message has no hash payload.
Aug 5 20:05:27 SUPERBOOK racoon: ERROR:
isakmp_inf.c:142:isakmp_info_recv(): ignore information because the
message has no hash payload.
Aug 5 20:05:47 SUPERBOOK racoon: ERROR:
isakmp_inf.c:142:isakmp_info_recv(): ignore information because the
message has no hash payload.
Aug 5 20:05:58 SUPERBOOK racoon: ERROR:
isakmp.c:2045:isakmp_chkph1there(): phase2 negotiation failed due to
time up waiting for phase1. ESP 209.202.127.66->192.168.1.103
Aug 5 20:05:47 SUPERBOOK racoon: ERROR:
isakmp_inf.c:142:isakmp_info_recv(): ignore information because the
message has no hash payload.
Aug 5 20:05:58 SUPERBOOK racoon: ERROR:
isakmp.c:2045:isakmp_chkph1there(): phase2 negotiation failed due to
time up waiting for phase1. ESP 209.202.127.66->192.168.1.103
Aug 5 20:06:07 SUPERBOOK racoon: ERROR:
isakmp_inf.c:142:isakmp_info_recv(): ignore information because the
message has no hash payload.
Aug 5 20:06:07 SUPERBOOK racoon: ERROR:
isakmp_inf.c:142:isakmp_info_recv(): ignore information because the
message has no hash payload.
Netgear FVM318 problem, any ideas?
Netgear FVM318 problem, any ideas?
by John Hamann on 2004-08-05 04:48:55 +0200
Hello, I have a VPN set up with a Netgear FVM318 router and it works
fine...except that I cannot connect to certain computers (OS X) on the office
network. Others can connect with no problem. All I can decern is that the
IP I am connecting to is not on the primary NIC but on a secondary one.
This is no problem locally, the IP can be pinged all day but through the
tunnel, it doesn't respond. Other computers, both OS 9 and OS X, ping OK
and can be connected to through Appleshare. Does anybody have any idea
what could be going on? ??? I've been banging my head with this one for
days now, any ideas would be much appreciated.
Re: Netgear FVM318 problem, any ideas?
by 2manysecrets on 2004-08-16 19:15:26 +0200
I have not been able to connect from home using Mac OSX with a subnet
specified in the FVM318 settings. The only way was to specify an IP
address. I could see the entire network behind the FVM318, but so far they
cannot see me. This has not been a problem since I am normally the one
connecting to the office to get files.
I have not had any difficulty connecting to any of the computers behind the
FVM318. I might have to input the computer's IP address manually, but it
will always connect.
I have not been able to locate most of the computer with network browser.
Not sure what is causing the problem.
Steve
SonicWall VPN tunnel up, no network
SonicWall VPN tunnel up, no network
by Brian Godden on 2004-08-18 21:10:48 +0200
Sorry for opening a new topic if this isn't appropriate, just thought my
messages in the other SonicWall topic might be fairly buried.
Thanks for any help!!
I have been able to establish a successful host to network connection from
IPSecuritas to a SonicWall, but can't get access to the remote network. Here
are my current settings:
Firewall: SonicWall Pro-VX
-------------------------------VPN Summary(these feature are enabled):
Enable VPN
Enable IKE Dead Peer Detection
Dead Peer Detection Interval (seconds): 60
Failure Trigger Level (missed heartbeats): 3
Clean up Active tunnels when Peer Gateway DNS name resolves to a
different IP Address
SA: GroupVPN
IPSec Keying Mode: IKE using pre-shared secret
Security Policy:
Phase 1 DH Group: Group 1
SA Life time (secs): 28800
Phase 1 Encryption/Authentication: DES & MD5
Phase 2 Encryption/Authentication: Encrypt and Authenticate (ESP DES
HMAC MD5)
Shared Secret: ---------IPSecutas, version 2.0.6
Mac OS X 10.3.5
General:
Mode: Host to Network
Remote IPSec Device: (IP Address of firewall)
Remote Network: 10.5.1.0 / 24
(Also have tried setting local address)
Exchange Mode: Main
Proposal Check: Obey Nonce Size: 16
Phase 1:
Lifetime: 28800
DH Group: Mod768(1)
Encryption: 3DES
Authentication: SHA1
Phase 2:
Lifetime: 28800
PFS Group: None
Encryption: 3DES
Authentication: HMAC SHA1
Id/Auth:
Identifiers set to Address
Preshared Secret set
Options (these are enabled):
Compression Deflate
IPSec DOI
SIT_IDENTITY_ONLY
Initial Contact
Netgear FVS318 setup
Netgear FVS318 setup
by Brian Nichols on 2004-08-19 06:22:48 +0200
Can someone be so kind as to give the setup of their FVS318 and
IPSecuritas that WORK? I have been successfully using VPN Tracker but
would rather use IPSecuritas but I can't get a connection with the FVS318
settings as they are. I would rather just use the settings on the FVS318 that
work for someone else (minus the shared key, etc.) rather than play with my
settings as that has become very frustrating for a newbie to VPN. Thanks!
Re: Netgear FVS318 setup
by Brian Nichols on 2004-08-21 21:45:13 +0200
Never mind. It's actually quite easy to match the settings in IPSecuritas with
the FVS318. Thanks to the developer for this great app!
Re: Netgear FVS318 setup
by edy piro on 2004-09-10 15:30:35 +0200
can you (or anyone else0 help me with config????
i have a netpilot as well, but i cannot make it work!
please help
:-)
thanks
edy
Re: Netgear FVS318 setup
by edy piro on 2004-09-10 15:33:53 +0200
SORRY
i have a NETPILOT not a NETGEAR...any ideas?
thanks anyway
edy
Re: Netgear FVS318 setup
by Greg on 2004-10-21 03:58:24 +0200
[quote author=Brian Nichols link=1092889368/0#1
date=1093117513]Never mind. It's actually quite easy to match the
settings in IPSecuritas with the FVS318. Thanks to the developer for this
great app![/quote]
I'm glad to hear that someone got it working... I've played with it all day still
to no avail....
Would you or anyone else mind posting your settings so the rest of us can
see something that's working?
Thanks
Greg
Re: Netgear FVS318 setup
by Mike Johnson on 2004-11-23 12:49:27 +0100
Does anyone have a configuration that works with the FVS318?
IPSecuritas 2.0.6 problems
IPSecuritas 2.0.6 problems
by Paul van der Laan on 2004-08-26 12:06:41 +0200
I'm trying for several days now to get a 'host to network' connection to
work, but so far my attempts were unfruitfull. I'm using Panther 10.3.5 in
combination with a Vigor 2200E router to connect to the internet. When I
start IPSecuritas there's a red cross in the name of my configuration
indicating that no connection can be established. The worrying thing is that
when I stop and quit IPSecuritas my entire network connection is dead: no
e-mail, web or anything. I can only revive it again by rebooting the system.
This is what the logfile reads:
Log output from IPSecuritas 2.0.6
Aug 25 19:14:40 Vigor10 IPSecuritas: Parsing configuration
Aug 25 19:14:40 Vigor10 IPSecuritas: Setting up racoon.conf
Aug 25 19:14:40 Vigor10 IPSecuritas: Setting up setkey.conf
Aug 25 19:14:40 Vigor10 IPSecuritas: Setting up psk.txt
Aug 25 19:14:40 Vigor10 IPSecuritas: Setting up tunnel.conf
Aug 25 19:14:40 Vigor10 IPSecuritas: Parsing configuration done
Aug 25 19:14:41 Vigor10 IPSecuritas: Starting racoon...
Aug 25 19:14:42 Vigor10 IPSecuritas: Racoon is running
Aug 25 19:14:42 Vigor10 IPSecuritas: Set kernel keys
route: writing to routing socket: File exists
add net 192.168.1.0: gateway gif0: File exists
Aug 25 19:14:43 Vigor10 racoon: WARNING:
ipsec_doi.c:3086:ipsecdoi_checkid1(): ID value mismatched.
Aug 25 19:14:43 Vigor10 racoon: WARNING:
ipsec_doi.c:3086:ipsecdoi_checkid1(): ID value mismatched.
Aug 25 19:14:43 Vigor10 racoon: ERROR: isakmp_agg.c:384:agg_i2recv():
invalid ID payload.
Aug 25 19:14:43 Vigor10 racoon: ERROR: isakmp_agg.c:384:agg_i2recv():
invalid ID payload.
Aug 25 19:14:58 Vigor10 racoon: WARNING:
ipsec_doi.c:3086:ipsecdoi_checkid1(): ID value mismatched.
Aug 25 19:14:58 Vigor10 racoon: WARNING:
ipsec_doi.c:3086:ipsecdoi_checkid1(): ID value mismatched.
Aug 25 19:14:58 Vigor10 racoon: ERROR: isakmp_agg.c:384:agg_i2recv():
invalid ID payload.
Aug 25 19:14:58 Vigor10 racoon: ERROR: isakmp_agg.c:384:agg_i2recv():
invalid ID payload.
Aug 25 19:15:13 Vigor10 racoon: ERROR:
isakmp.c:2045:isakmp_chkph1there(): phase2 negotiation failed due to
time up waiting for phase1. ESP 80.127.72.35->192.168.1.10
Aug 25 19:15:13 Vigor10 racoon: ERROR:
isakmp.c:2045:isakmp_chkph1there(): phase2 negotiation failed due to
time up waiting for phase1. ESP 80.127.72.35->192.168.1.10
Aug 25 19:15:13 Vigor10 racoon: WARNING:
ipsec_doi.c:3086:ipsecdoi_checkid1(): ID value mismatched.
Aug 25 19:15:13 Vigor10 racoon: WARNING:
ipsec_doi.c:3086:ipsecdoi_checkid1(): ID value mismatched.
Aug 25 19:15:13 Vigor10 racoon: ERROR: isakmp_agg.c:384:agg_i2recv():
invalid ID payload.
Aug 25 19:15:13 Vigor10 racoon: ERROR: isakmp_agg.c:384:agg_i2recv():
invalid ID payload.
delete net 192.168.1.0
Aug 25 19:15:17 Vigor10 IPSecuritas: Flushing kernel keys
Aug 25 19:15:17 Vigor10 IPSecuritas: Stopping racoon...
Aug 25 19:15:18 Vigor10 IPSecuritas: Racoon normally terminated
Any help would be greatly appreciated.
Cheers,
Re: IPSecuritas 2.0.6 problems
by netgoblin on 2004-08-27 13:27:26 +0200
Hello Paul,
can you check ID/Auth parameters,
see log > ID value mismatched
cu netgoblin
Re: IPSecuritas 2.0.6 problems
by tom lafleur on 2004-08-28 06:15:39 +0200
I also am having problems with 2.06 and osx 10.3.5 into a Zyxel Zwall10...
using VPN tracker works fine on the same system...
IPSecuritas crashes FVL328, VPNTracker works!
IPSecuritas crashes FVL328, VPNTracker works!
by davehodg on 2004-08-26 12:43:41 +0200
Hi - revisiting connecting to and FVL328.
VPNTracker just went through a major version bump so I've been able to
re-test connecting to my FVL328.
Using exactly the same parameters as the Netgear VPN client recommends
(3DES/SHA-1/1024 in both phases), VPNtracker works perfectly and I can
see the internal network.
Loading up IPSecuritas, it sees the identical parameters (with most of the
option flags in phase 2 turned off), connects, the router's VPN status sees a
well-made connection but I can't see the internal LAN. Furthermore, the
LAN users stop being able to see the Internet!
It looks like we'll have to grudgingly fork out for VPNTracker licenses...
OS X 10.3.5 Server lost connection to IN
OS X 10.3.5 Server lost connection to IN
by Frogstar on 2004-08-29 19:22:30 +0200
Hi,
for a VPN Test i install IPsecuritas on my Webserver on an other location.
After start IPsecuritas and config a Setup i lost the connection to my server
over ARD (Apple Remote Desktop).
Then, i can't connect to my server over ssh or anything. The last chance for
me, to connect to my server ist to connect to another Computer in that
location und connect via Timbuktu in the local Subnet onto the server.
The firewall Setup is unchangend an i test it with turning the Firewall off,
too. But the Problem is the same.
If i'm in the local Network i can connect to the Server. If i'll try to connet
over the Internet the answer is "Connection refused"
My Server cannot connetct to the Internet after that.
Any Idea?
PS: Sorry about my english. Im from Germany and my english is not the
best. :-)
Nortel Problems
Nortel Problems
by rbrugman on 2004-09-04 22:26:59 +0200
Hello,
I am trying to connect to my schools VPN with my Mac. There is a PC client,
but Netlock wants to charge me $95 for their official nortel client. The
main problem is that the universities VPN switch is set to use Group
Password Authentication. I know the group username and password, but
that's it. I also know that the encryption is "3DES" and MD5 is mentioned.
That's pretty much all I can find out. If there's some way to get into
Netlocks config file, I could possibly tell more, but prefs.db just is a bunch
of text. I tried putting the settings in IPSecuritas, and this is what I got as
an output:
(Edit: Too long, so I put it as a .rtf file)
http://hosted.reaktor6.net/ipsec_error.rtf
I hope someone can help me decipher.
Robert
Re: Nortel Problems
by rbrugman on 2004-09-04 23:10:31 +0200
I found out some more information that I hope helps. I installed the VPN
client for Windows on my desktop and made a log file, and I also took a
screenshot. Here they are:
Log file from PC:
http://hosted.reaktor6.net/vpn_pc.txt
Screenshot from PC:
http://hosted.reaktor6.net/vpn_pc_ss.jpg
I seriously hope that can help someone help me.
Robert
Re: Nortel Problems
by rbrugman on 2004-09-07 04:17:01 +0200
I have more information. The creators of VPN tracker say that at least in my
case, the Nortel VPN switch is using an IPSec extension called mod_cfg.
Does anyone know if IPSecuritas has this feature?
Thanks,
Robert
Any issues re recent Security Update 9-7?
Any issues re recent Security Update 9-7?
by rnoranbrock on 2004-09-08 15:28:06 +0200
Is there any reason to hold off applying this Security Update? Any effect on
IP Securitas?
Thanks,
-Randy
IPSecuritas and NAT-T support, routing issues
IPSecuritas and NAT-T support, routing issues
by seano on 2004-09-09 03:54:08 +0200
Hi all,
I checked out IPSecuritas after finding out VPN Tracker doesn't have NAT-T
support. I'm using OS 10.3.4.
Seems I can establish a tunnel ok, but two things are wrong:
1.) On a NAT'ed network, I can't actually communicate to a host over the
tunnel. I've verified our firewall (isakmpd/pf on openbsd) is correctly
allowing ESP traffic. Seems NAT-T support is not working.
2.) When tunnels are created, I don't see a route created in the routing
table. Is this normal?
thanks,
Sean
Re: IPSecuritas and NAT-T support, routing issues
by seano on 2004-09-14 22:36:13 +0200
does anyone have an idea or am i just out of luck for support?
Re: IPSecuritas and NAT-T support, routing issues
by Grant Janssen on 2004-09-16 07:09:06 +0200
:P Me too, I feel your pain.
I can establish a "Host To Network" connection. Keys exchange fine, but I
can't stuff anything over the tunnel. When I move my laptop on the other
side of the router (no NAT), this runs perfectly.
I've seen VPN client software function with NAT, so I know this can work, as
long as you don't try to establish multiple tunnels from the same NATed
network to the same destination firewall.
All my other clients are PCs running the SafeNet SoftRemote product
[url]http://www.safenet.biz/prod/software/software_a.asp[/url]. This
supports NAT, and has run well for us, but is PC only.
Is there some setup detail I've missed? ???
Cookies Colliding using IPSecuritas to SOHO 6tc
Cookies Colliding using IPSecuritas to SOHO 6tc
by Graeme Rae on 2004-09-22 01:58:52 +0200
Trying to connect from a 192.168.1.# network via net and SOHO 6tc to a
192.168.146.# network. Using a Mac OSX10.3.5
All security settings are identical on each side (checked many times)
Getting this error:
Sep 21 16:32:32 graemes-g4 racoon: DEBUG: sockmisc.c:421:sendfromto():
sockname 192.168.1.56[500]
Sep 21 16:32:32 graemes-g4 racoon: DEBUG: sockmisc.c:423:sendfromto():
send packet from 192.168.1.56[500]
Sep 21 16:32:32 graemes-g4 racoon: DEBUG: sockmisc.c:425:sendfromto():
send packet to 64.7.211.227[500]
Sep 21 16:32:32 graemes-g4 racoon: DEBUG: sockmisc.c:570:sendfromto():
1 times of 112 bytes message will be sent to 192.168.1.56[500]
Sep 21 16:32:32 graemes-g4 racoon: DEBUG: plog.c:199:plogdump():
fc7dfa15 5b5d18bf 00000000 00000000 01100100 00000000 00000070
05000034 00000001 00000001 00000028 01010001 00000020
01010000 800b0001 800c7080 80010005 80030001 80020001
80040001 0a00000c 011101f4 c0a80138 00000014 e2e59147 a73c03ce
319df5da 5dd11fdf
Sep 21 16:32:32 graemes-g4 racoon: DEBUG:
isakmp.c:1718:isakmp_ph1resend(): resend phase1 packet
fc7dfa155b5d18bf:0000000000000000
Sep 21 16:32:32 graemes-g4 racoon: DEBUG:
isakmp.c:233:isakmp_handler(): ===
Sep 21 16:32:32 graemes-g4 racoon: DEBUG:
isakmp.c:234:isakmp_handler(): 68 bytes message received from
64.7.211.227[500]
Sep 21 16:32:32 graemes-g4 racoon: DEBUG: plog.c:199:plogdump():
fc7dfa15 5b5d18bf 00000000 00000000 0b100500 00000000 00000044
00000028 00000001 01000004 fc7dfa15 5b5d18bf 00000000 00000000
01100100 00000000 00000070
Sep 21 16:32:32 graemes-g4 racoon: DEBUG: isakmp.c:531:isakmp_main():
malformed cookie received or the initiator's cookies collide.
Sep 21 16:32:52 graemes-g4 racoon: ERROR:
isakmp.c:1706:isakmp_ph1resend(): phase1 negotiation failed due to time
up. fc7dfa155b5d18bf:0000000000000000
Sep 21 16:32:52 graemes-g4 racoon: ERROR:
isakmp.c:1706:isakmp_ph1resend(): phase1 negotiation failed due to time
up. fc7dfa155b5d18bf:0000000000000000
Any ideas? Please Help!!!
Using
Phase 1/Mod768/3Des/MD5
Phase 2/No PFS/3Des/Md5
Local ID DN: graeme
Remote ID: Address
Auth: Pre-shared secret (checked many times)
Problems with PPP
Problems with PPP
by strandoo on 2004-09-22 14:08:30 +0200
I've been able to use IPSecuritas from my home via an ADSL account, but
can't get it to work when I use a modem/ppp dial-up account. Any ideas
about what I'm doing wrong?
Thanks.
racoon: must be root to invoke this program
racoon: must be root to invoke this program
by cdant on 2004-09-29 04:01:32 +0200
I'm having an error with starting up a connection, getting an error from
racoon that I must be root to invoke it. I've tried setting racoon to suid root
but that didn't resolve the issue.
Here's my log:
Log output from IPSecuritas 2.0.6
Sep 28 21:30:27 localhost IPSecuritas: Parsing configuration
Sep 28 21:30:27 localhost IPSecuritas: Setting up racoon.conf
Sep 28 21:30:27 localhost IPSecuritas: Setting up setkey.conf
Sep 28 21:30:27 localhost IPSecuritas: Setting up psk.txt
Sep 28 21:30:27 localhost IPSecuritas: Setting up tunnel.conf
Sep 28 21:30:27 localhost IPSecuritas: Parsing configuration done
Sep 28 21:30:27 localhost IPSecuritas: Could not create
/etc/syslog_ipsecuritas_orig.conf
Sep 28 21:30:27 localhost IPSecuritas: Starting racoon...
racoon: must be root to invoke this program.
Sep 28 21:30:27 localhost IPSecuritas: Failed to start racoon
Sep 28 21:30:27 localhost IPSecuritas: Stopping racoon...
Sep 28 21:30:27 localhost IPSecuritas: Racoon normally terminated
Sep 28 21:30:27 localhost IPSecuritas: Flushing kernel keys
pfkey_open: Operation not permitted
pfkey_open: Operation not permitted
from scratch
from scratch
by love on 2004-10-05 00:35:00 +0200
Hi folks!
I am a real newbie on this i being trying to figure ut how to set up a VPN
connection, but its just to many different parameters to set to figure put my
self !
this is what it looks like
------------------------------Office Network
Zywall10
set to NAT
LAN IP: 192.168.3.0~
Config in Zywall10
Menu 27.1.1 - IPSec Setup
Index #= 1
Name= test
Active= Yes
Keep Alive= No Nat Traversal= Yes
Local ID type= IP
Content=
My IP Addr= 213.xxx.xxx.xxx
Peer ID type= IP
Content= 0.0.0.0
Secure Gateway Address= 0.0.0.0
Protocol= 0
Local: Addr Type= RANGE
IP Addr Start= 192.168.3.1
End/Subnet Mask= 192.168.3.99
Port Start= 0
End= N/A
Remote: Addr Type= N/A
IP Addr Start= N/A
End/Subnet Mask= N/A
Port Start= N/A
End= N/A
Enable Replay Detection= No
Key Management= IKE
Edit Key Management Setup= No
------------------------------------------------------------------------
Menu 27.1.1.1 - IKE Setup
Phase 1
Negotiation Mode= Main
PSK= keykeykey
Encryption Algorithm= DES
Authentication Algorithm= MD5
SA Life Time (Seconds)= 28800
Key Group= DH1
Phase 2
Active Protocol= ESP
Encryption Algorithm= DES
Authentication Algorithm= SHA1
SA Life Time (Seconds)= 28800
Encapsulation= Tunnel
Perfect Forward Secrecy (PFS)= None
-----------------------------------------------------------------this is what i want to achieve
static ip on wan
DHCP on wan
Officenetwork--officerouterNAT--internet--airportexpressNAT--
Re: from scratch
by cnadig on 2004-10-07 08:32:04 +0200
Hello,
I'd propose the following to start with for IPSecuritas' configuration:
General:
Host to Network mode
Remote IPSec device: 213.xxx.xxx.xxx (the public IP address of the Zyxel
10)
Remote Network: 192.168.3.0/24
Local Address: Leave empty
Exchange Mode: Main
Propopsal Check: Obey
Nonce Size: 16
Phase 1:
Lifetime: 28800
DH Group: Mod768 (1)
Encryption: DES
Authentication: MD5
Phase 2:
Lifetime 28800
PFS Group: None
Encryption: Enable DES, disable all others
Authentication: Enable HMAC SHA1, disable all others
Id/Auth:
Local Identifier: Address
Remote Identifier: Address
Authentication: Preshared key, enter keykeykey (and change this once
everything is working :-) )
Options: Leave all on defaults.
From experience I know that Zyxel is very picky about the network mask
settings - it might be necessary to change the remote addr type to subnet
with a netmask of 24.
Please make sure to increas IPSecuritas' log level and post the log output if
it is not working.
CAUTION: Please remove any confidential information like your public IP
address! And change the preshared key before posting the log!
Cheers,
Christoph
Trying to set up IPSec between two Macs
Trying to set up IPSec between two Macs
by Lee Kilpatrick on 2004-10-05 03:55:48 +0200
I want to use IPSecuritas in the "host to anywhere" mode so I can have
encrypted traffic when I am using a public WiFi network. I do not have a
VPN gateway product, but would like ot use another Mac as the secure
endpoint at my house. The documentation is not clear on how you set up
this configuration, and I am trying to set up simple configurations just to
see if I can get it working (since debugging it remotely from a coffee shop
would be pretty difficult).
I don't have a lot of equipment to test with, so I am trying to create a tunnel
between two Macs on the same ethernet. Is this possible, or will there be
routing/interface problems? Do I need another network interface on both
machines in order to have a private address to try and access over the
tunnel? I set up both with another interface -- one with an Airport, and one
with an IP over Firewire.
How should I set up IPsecuritas? From reading the online documentation, I
have gathered that I should set up the server as "network to network", and
my laptop as "host to anywhere". Is this correct?
The two machines are connected to an ethernet through the hub/router
which is a linksys BEFR41. I have set the router to "IPSec pass through". In
general, I'm not even sure that that setting has any effect if you are
communicating through two LAN ports on it.
When I start IPSec on both machine, the chekmark never becomes green,
but stays as a red "X". In the IPSecuritas log, I get this on one machine (the
"client"):
Oct 4 20:54:47 Scarlet IPSecuritas: Oct 4 20:54:47 Scarlet IPSecuritas:
Parsing configurationParsing configuration
Oct 4 20:54:48 Scarlet IPSecuritas: Oct 4 20:54:48 Scarlet IPSecuritas:
Setting up racoon.confSetting up racoon.conf
Oct 4 20:54:48 Scarlet IPSecuritas:
Oct 4 20:54:48 Scarlet IPSecuritas:
Oct 4 20:54:48 Scarlet IPSecuritas:
Oct 4 20:54:48 Scarlet IPSecuritas:
Oct 4 20:54:48 Scarlet IPSecuritas:
Oct 4 20:54:48 Scarlet IPSecuritas:
Oct 4 20:54:48 Scarlet IPSecuritas:
Oct 4 20:54:48 Scarlet IPSecuritas:
Oct 4 20:54:49 Scarlet IPSecuritas:
Starting racoon...Starting racoon...
Setting up setkey.conf
Setting up psk.txt
Setting up tunnel.conf
Parsing configuration done
Setting up setkey.conf
Setting up psk.txt
Setting up tunnel.conf
Parsing configuration done
Oct 4 20:54:49 Scarlet IPSecuritas:
Oct 4 20:54:49 Scarlet IPSecuritas: Oct 4 20:54:49 Scarlet IPSecuritas:
Racoon is runningRacoon is running
Oct 4 20:54:49 Scarlet IPSecuritas: Oct 4 20:54:49 Scarlet IPSecuritas: Set
kernel keys
I then tried to ping the private address on the other machine (the server)
and got no response. After a while, the log showed:
Oct 4 20:55:37 Scarlet racoon: ERROR:
isakmp.c:2045:isakmp_chkph1there(): phase
2 negotiation failed due to time up waiting for phase1. ESP
10.0.0.4->10.0.0.100
Re: Trying to set up IPSec between two Macs
by cnadig on 2004-10-07 08:16:44 +0200
Hello Lee,
I'd try the following:
Client Side: Host to anywhere is fine, other settings on their default values
Server Side: Use Host to Host (Tunnel), with the local IP address of the
Ethernet interface and the laptop's IP as remote IP.
Please also set the passive option on the server side.
Then first start the server side IPSec, once it says running, you can start the
client (laptop) IPSec.
Please increase the log level in IPSecuritas beforehand (in Preferences) to
'Verbose debug' - the log output then contains much more information.
If you want to access other machines (or the internet) through the server
Mac, you will need a second interface on that machine (although you
probably can get around with aliased interfaces, but I would need to figure
this out first - let me know if you need it).
Let us know how it goes!
Cheers,
Christoph
zywall 10II
zywall 10II
by andrew on 2004-10-10 03:17:20 +0200
Hi,
Wondering if anyone has a setup for IPSecuritas for a ZyWall 10II with
something flexible enough on various locations? I connect often from
behind a school firewall (cisco pix) but with real ips and sometimes from
locations behind a standard RFC1918 (adsl router - no control over it) and
othertimes on the road from a dialup ip..
My internal LAN is 192.168.1.0/24
Thanks.
FVS318 now working, but no Network Browsing
FVS318 now working, but no Network Browsing
by Greg on 2004-10-21 20:53:10 +0200
So after playing with it all day I finally bagged the VPN tracker settings I was
trying to get into the IP Securitas, and instead used the VPN Wizard that is
available in newer firmware versions of the FVS318. At the end, it offered
the proper settings to put into the VPN client... once those were inputed...
away it went no problems connected rightup.
One setting it had added was the Enable NetBios for network browsing... I
couldn't find a setting in IPSecuritas however to allow me to enable network
browsing... does anyone know how I can enable that. As I'd like to be able
to browse the network rather then needing to go in and find each IP
address and type it in manually. And this will make printing and using
some other network functions alot easier....
Thanks in advance..
Greg
Re: FVS318 now working, but no Network Browsing
by AaronA1975 on 2004-10-21 22:01:03 +0200
NetBIOS is a non-routable protocol that Windows uses for file and print
sharing, and it usually transmits data via broadcasts. The checkbox allows
NetBIOS broadcasts to be sent over the VPN connection. If you're using
Windows, this setting is convenience, but since NetBIOS tends to be a chatty
protocol, some people would rather not have that traffic sent over the WAN.
Checking that box means nothing to your Mac because it does not use
NetBIOS. Macs use SLP (Service Location Protocol) to discover network
services, which can be enabled in the Directory Access app.
If you're unable to browse the network you're connected to via VPN, the
NetBIOS checkbox is not your problem.
Re: FVS318 now working, but no Network Browsing
by Greg on 2004-10-21 22:16:02 +0200
Thanks for the info.... so I've gone and looked the SLP is turned on in
direcoty access, any ideas on how to make sure that the VPN tunnel is
allowing it. Or is that even possible to browse a Mac Network via a VPN
using SLP or any other method for that matter?
Thanks,
Greg
Re: FVS318 now working, but no Network Browsing
by AaronA1975 on 2004-10-22 23:08:14 +0200
It's entirely possible to browse a Mac network over your VPN connection - I
do it with mine all the time. There should be no reason why your firewall
would disallow SLP unless you've somehow expressly instructed it to.
Re: FVS318 now working, but no Network Browsing
by GaryS on 2004-11-01 23:18:03 +0100
I have the same router and have the same experience... I'm unable to
browse the office network remotely, yet SLP is enabled and I'm running the
latest version of IPSecuritas and the NetGear firmware for the router.
Aargh...
Connecting to Linksys 10/100 8port router
Connecting to Linksys 10/100 8port router
by oolong on 2004-10-23 04:24:30 +0200
Hi everyone I'm attempting to connect to this Linksys 10/100 8-port VPN router via
IPSecurita (no VPN router on my side). So far, it doesn't work and I haven't
found anybody talk about this combination either.
If you happen to have this connection established, please share the config
on both Linksys and IPSecurita.
My current IPSecurita log goes on and on for a while, but here are the
highlights:
(At early stage it says...)
IPSecuritas: Racoon is running
IPSecuritas: Set kernel keys
route: writing to routing socket: File exists
add net 172.137.2.0: gateway gif0: File exists
racoon: DEBUG2: cfparse.y:1365:cfparse(): parse successed.
(Towards the end it says...)
racoon: DEBUG: grabmyaddr.c:454:update_myaddrs(): caught rtm:2, need
update interface address list
racoon: DEBUG: grabmyaddr.c:448:update_myaddrs(): msg 1 not interesting
And then it eventually shuts down after not finding phase1 nor 2.
As I have no idea at this point, I appreciate any help!! Thank you.
Autostart
Autostart
by Rich Eaton on 2004-10-26 16:37:11 +0200
OS X.3.5 IPsecuritas autostart does not appear to work on boot up. Once
manually started it works fine.
Re: Autostart
by Rich on 2004-10-29 12:37:32 +0200
I should add, it does autostart but the connection fails. Starting by hand
after login works fine. Using Airport to conect to IPsec device. Is this an OS
X startup problem ?
FQDN in phase 2
FQDN in phase 2
by Daniel Cini on 2004-10-29 11:52:36 +0200
Hi,
I currently have a host to network configuration. My remote IPSec device
expects the phase 2 proposal to contain my FQDN instead of the IP address.
Is it possible to configure IPSecuritas to do so?
Also, does IPSecuritas support NAT traversal?
Thanks in advance for any help,
Daniel Cini
Re: FQDN in phase 2
by GaryS on 2004-11-01 23:27:36 +0100
I do this for my office connections... simply select the "DN" radio button in
the ID/auth tab (instead of the "Address" button), and enter your FQDN in
the blank field.
Unstable VPN Connection to FVS318
Unstable VPN Connection to FVS318
by GaryS on 2004-11-01 23:24:18 +0100
I recently upgraded to the latest firmware for the NetGear FVS318 (v.2.4) in
the hopes that I would be able to browse my office network, but to no avail.
Anyways, since the upgrade, the router runs much better... except for my
VPN connections using IPSecuritas. IPSec starts successfully, and my
connection shows the little green arrow. But, whereas I used to be able to
mount any office Mac quickly, now the mounting times out regularly, and
even a Mac that I've mounted doesn't respond properly all the time.
The log shows the following:
Nov 1 13:53:49 THUNDERDOME IPSecuritas: Parsing configuration
Nov 1 13:53:49 THUNDERDOME IPSecuritas: Setting up racoon.conf
Nov 1 13:53:49 THUNDERDOME IPSecuritas: Setting up setkey.conf
Nov 1 13:53:50 THUNDERDOME IPSecuritas: Setting up psk.txt
Nov 1 13:53:50 THUNDERDOME IPSecuritas: Setting up tunnel.conf
Nov 1 13:53:50 THUNDERDOME IPSecuritas: Parsing configuration done
Nov 1 13:53:51 THUNDERDOME IPSecuritas: Starting racoon...
Nov 1 13:53:51 THUNDERDOME IPSecuritas: Racoon is running
Nov 1 13:53:51 THUNDERDOME IPSecuritas: Set kernel keys
Nov 1 13:53:54 THUNDERDOME racoon: ERROR:
proposal.c:490:cmpsatrns(): trns_id mismatched: my:2 peer:3
Nov 1 13:53:54 THUNDERDOME racoon: ERROR:
proposal.c:490:cmpsatrns(): trns_id mismatched: my:2 peer:3
Nov 1 13:53:54 THUNDERDOME racoon: ERROR:
proposal.c:490:cmpsatrns(): trns_id mismatched: my:2 peer:3
Nov 1 13:53:54 THUNDERDOME racoon: ERROR:
proposal.c:490:cmpsatrns(): trns_id mismatched: my:2 peer:3
Nov 1 13:55:34 THUNDERDOME IPSecuritas: Flushing kernel keys
Nov 1 13:55:34 THUNDERDOME IPSecuritas: Stopping racoon...
Nov 1 13:55:35 THUNDERDOME IPSecuritas: Racoon normally terminated
My settings on the router are identical now as how they were prior to the
upgrade, and I don't understand the "trns_id mismatched" error in the log.
Any help would be appreciated. BTW, I'm running OSX 10.3.5.
VPN with dynamic IP on both sides?
VPN with dynamic IP on both sides?
by mandarax on 2004-11-02 15:12:10 +0100
I'm trying to figure out, wether it is possible to connect to networks or even
Macs, both connected to the internet via DSL. Both sides receive dynamic IP
adresses when logging in.
Is it possible to use a domain name offered by a service like DynDNS
instead of a known IP adress in the "General Settings" section when setting
up a new connection?
Any help appreciated.
Thanks, Hans
Re: VPN with dynamic IP on both sides?
by cnadig on 2004-11-03 07:24:12 +0100
Hello Hans,
you can enter a hostname into the remote IPSec device field. The hostname
is then translated into an IP address every time you start IPSec.
Christoph
Netgear FVS328
Netgear FVS328
by sgljungholm on 2004-11-04 14:58:15 +0100
I have set up the Netgear box and tested with other clients that seem to
work. When I try IPSecuritas I get a message that says
EROOR:isakmp_inf.c:848:isakmp_info_recv_n():unknown notify message, no
phase2 handle found.
Any ideas?
Thanks
Re: Netgear FVS328
by cnadig on 2004-11-07 01:46:59 +0100
Hello sgljungholm,
please find a working example setup at [url]http://www.lobotomo.com
/products/IPSecuritas/howtoUpdates.html[/url]
Cheers,
Christoph
Re: Netgear FVS328
by sgljungholm on 2004-12-26 13:57:51 +0100
I have gotten this working to a point. I now am connected but I cannot see
any of the computers on the remote network. I noticed this in the logs. Any
idea?
Dec 26 07:54:40 Svens-Computer racoon: NOTIFY:
isakmp.c:267:isakmp_handler(): the packet is retransmitted by
138.88.162.101[500].
Dec 26 07:54:53 Svens-Computer racoon: DEBUG:
grabmyaddr.c:448:update_myaddrs(): msg 5 not interesting
Dec 26 07:56:31 Svens-Computer racoon: DEBUG:
grabmyaddr.c:448:update_myaddrs(): msg 5 not interesting
Dec 26 07:57:25 Svens-Computer racoon: INFO:
isakmp.c:1785:isakmp_ph1expire(): ISAKMP-SA expired
192.168.168.102[500]-138.88.162.101[500]
spi:25c51c4f8287898b:25b94c4b38c99f17
Dec 26 07:57:25 Svens-Computer racoon: INFO:
isakmp.c:1785:isakmp_ph1expire(): ISAKMP-SA expired
192.168.168.102[500]-138.88.162.101[500]
spi:25c51c4f8287898b:25b94c4b38c99f17
Dec 26 07:57:26 Svens-Computer racoon: INFO:
isakmp.c:1833:isakmp_ph1delete(): ISAKMP-SA deleted
192.168.168.102[500]-138.88.162.101[500]
spi:25c51c4f8287898b:25b94c4b38c99f17
Dec 26 07:57:26 Svens-Computer racoon: INFO:
isakmp.c:1833:isakmp_ph1delete(): ISAKMP-SA deleted
192.168.168.102[500]-138.88.162.101[500]
spi:25c51c4f8287898b:25b94c4b38c99f17
Dec 26 07:57:35 Svens-Computer racoon: DEBUG:
grabmyaddr.c:448:update_myaddrs(): msg 5 not interesting
Re: Netgear FVS328
by sgljungholm on 2005-02-05 23:24:36 +0100
This is still not working. I am now testing with another unit and I still can't
make it work. Can anyone help. I set the VPN as the site suggested but
nothing.
Watchguard Firebox X15 Edge
Watchguard Firebox X15 Edge
by Raggamax on 2004-11-04 16:46:51 +0100
Hi Everyone...
i am using IPSecuritas on my Mac to connect to a Watchguard Firebox X15
Edge without any success. I tried different settings but i always get the
following Error: isakmp.c:2045:isakmp_chkph1there(): phase 2 negotiation
failed due to time up waiting for phase 1.
Can anyone help me with that? Any idea what goes wrong?
I am wondering if i have to change the settings on my box or on the client.
From a PC with installed MUVPN-Client (Provided by watchguard) everything
goes just fine. I can connect via VPN to the remote Network without any
problem.
Thank you in advance for your help...
Re: Watchguard Firebox X15 Edge
by swamphopper on 2005-01-28 05:14:11 +0100
I seem to have the same problem. Using VPN Tracker, I've got a VPN
between my Mac and Firebox X1000, but IPSecuritas doesn't work. Can
anyone suggest a solution? Thanks.
Automatically dial VPN ?
Automatically dial VPN ?
by bwinter on 2004-11-05 12:29:32 +0100
Hi - I have a user who I need to have to the IPSecuritas VPN automatically
dial, say upon login. I have added IPSecuritas to the startup items in the
users account settings. I would like to be able to have it all happen
automatically.
Also, is there anyway to have a dial up connection dial an internet
connection automatically before the VPN connection is attempted ??????
Thanks
New Sample Configurations Available
New Sample Configurations Available
by cnadig on 2004-11-07 01:44:46 +0100
Hello,
please find sample configurations for Netgear FVS328, Netpilot VPN and
Linksys BEFSX41 at [url]http://www.lobotomo.com/products/IPSecuritas
/howtoUpdates.html[/url]
Cheers,
Christoph
router and ipsecuritas
router and ipsecuritas
by Fabrice on 2004-11-13 00:23:37 +0100
Hi,
I need your help again. I'm using IPSecuritas on my powerbook to connect
via ADSL to my professionnal network (so "Host to network") with success.
I've just received my freebox, an ADSL modem with NAT properties.
No way to connect to my network. The ckeck comes finally green, but I can't
ping my network.
I've hard fixed my local IP in my local network.
I use the following IP forwarding :
Port: 2746 - Protocole: tcp - Destination: 192.168.0.1 - Port: 2746
Port: 2746 - Protocole: udp - Destination: 192.168.0.1 - Port: 2746
Is that correct ? Should I use or not IP DMZ option ?
I've tried to modify IPSecuritas with "Network to network", with :
Remote Network : 172.23.0.0 / 16 (the network mask is 255.255.0.0)
Local network : 192.168.0.0 / 24 (the network mask is 255.255.255.0)
But it's not better.
Thanks in advance
Fabrice
Re: router and ipsecuritas
by cnadig on 2004-11-14 00:04:24 +0100
Hello Fabrice,
do you know the manufacturere and model of the router?
Some router require to enable IPSec passthrough explicitely or
don't allow IPSec with NAT.
also, as it seems that the tunnel can be established successfully,
a dump from tcpdump could be useful (tcpdump -i en0 for
Ethernet or tcpdump -i en1 for Airport).
Cheers,
Christoph
Re: router and ipsecuritas
by Fabrice on 2004-11-14 14:51:00 +0100
[quote author=cnadig link=1100301817/0#1 date=1100387064]Hello
Fabrice,
do you know the manufacturere and model of the router?
Some router require to enable IPSec passthrough explicitely or
don't allow IPSec with NAT.
also, as it seems that the tunnel can be established successfully,
a dump from tcpdump could be useful (tcpdump -i en0 for
Ethernet or tcpdump -i en1 for Airport).
Cheers,
Christoph[/quote]
Thanks for your response. I'm waiting for more informations on the
freebox, but it's a specific modem of my provider (Free). Some people say
i't's pass-through, some other not. A person said just me "option priority
must be on "legacy" and not on "normal" to not cut udp packets, but I don't
find this option in IPSecuritas.
I've juste seen the "DHCP Pass-through" option in IPSecuritas ; should I
check it ?
For more informations, I give a link to a picture of the on-line web page
given by my provider to modify the NAT table :
http://kerlienes.free.fr/freebox.jpg
About tcpdump, can you please explain me ? I don't undersand at all, sorry.
Thanks a lot in advance.
Fabrice
Re: router and ipsecuritas
by akerem on 2005-01-09 12:38:10 +0100
Hi,
If you use CheckPoint firewall remotely, you should make sure that its vpn
domain includes the ip addresses you are trying to connect. (The
172.23.0.0/16 block) That may be the problem.
Nortel and local bind issue
Nortel and local bind issue
by djb on 2004-11-13 06:54:54 +0100
hi,
I am attempting to connect to a Nortel Contivity but can barely start the
connection when the log spits this out :
Nov 13 00:23:03 JDAB IPSecuritas: Racoon is running
Nov 13 00:23:03 JDAB IPSecuritas: Set kernel keys
Nov 13 00:23:03 JDAB racoon: ERROR:
isakmp.c:1532:isakmp_setup_socket(): failed to bind (Address already in
use).
Nov 13 00:23:03 JDAB racoon: ERROR:
isakmp.c:1532:isakmp_setup_socket(): failed to bind (Address already in
use).
Nov 13 00:23:03 JDAB racoon: ERROR: isakmp.c:1616:isakmp_open(): no
address could be bound.
Nov 13 00:23:03 JDAB racoon: ERROR: isakmp.c:1616:isakmp_open(): no
address could be bound.
lsof says that the other process holding the isakml port is something called
INM.
any thoughts or fixes? I cannot kill teh inm proc for some reason.
thanks
derek
Re: Nortel and local bind issue
by cnadig on 2004-11-14 00:05:49 +0100
Hi Derek,
do you have any more information on this process - I did a Google
search but could not find anything.
What happens if you create another user and log in as him - is the process
still running?
Christoph
Re: Nortel and local bind issue
by djb on 2004-11-15 05:20:19 +0100
this is the result of
root
363 0.0 0.1
ps -aux | grep inm
28068
296 ?? S
10:21PM 0:00.20 inm -p9165
the proc is run at startup ...
thanks
derek
Re: Nortel and local bind issue
by Grant McChesney on 2006-03-01 23:08:26 +0100
Do you by chance have the Netlock Contivity VPN Client from Apani
installed? I do, and I get the same error. In fact, I get this error when I load
the Netlock VPN after installing Securitas:
Connection to the switch dropped due to an IKE/ISAKMP Error.
This is probably the cause of the error. Trying uninstalling the Netlock vpn
client.
Classic Applications (Outlook2001) over VPN
Classic Applications (Outlook2001) over VPN
by alhinds on 2004-11-16 20:20:49 +0100
Does anyone know if IPSecuritas will support applications running in Classic
environment (under OSX) over IPSec VPN?
Main use required is Outlook2001 (as Entourage just doesn't seem to be up
to scratch yet).
Thanks...
network to network
network to network
by Fabrice on 2004-11-17 11:43:08 +0100
Hello everybody,
Does anyone use the protocol "network to network" ? In that case, thanks
in advance to give me the configuration for ipsecuritas.
Should I modify anything on the server side (I use Checkpoint firewall) ?
Thanks a lot
Fabrice
Can't assign requested Address (Ipsecuritas 2.06)
Can't assign requested Address (Ipsecuritas 2.06)
by AndreasF on 2004-11-25 10:02:49 +0100
Hello!
I am trying to connect to my office. But I keep getting this message in the
log. I have used the same configuration before (and it worked). Does
anybody understand what could be the possible error?
"Log output from IPSecuritas 2.0.6
Nov 25 09:08:19 Andreas-Fredrikssons-dator IPSecuritas: Parsing
configuration
Nov 25 09:08:19 Andreas-Fredrikssons-dator IPSecuritas: Setting up
racoon.conf
Nov 25 09:08:19 Andreas-Fredrikssons-dator IPSecuritas: Setting up
setkey.conf
Nov 25 09:08:19 Andreas-Fredrikssons-dator IPSecuritas: Setting up
psk.txt
Nov 25 09:08:19 Andreas-Fredrikssons-dator IPSecuritas: Setting up
tunnel.conf
Nov 25 09:08:19 Andreas-Fredrikssons-dator IPSecuritas: Parsing
configuration done
Nov 25 09:08:20 Andreas-Fredrikssons-dator IPSecuritas: Starting racoon...
Nov 25 09:08:20 Andreas-Fredrikssons-dator IPSecuritas: Racoon is
running
Nov 25 09:08:20 Andreas-Fredrikssons-dator IPSecuritas: Set kernel keys
The result of line 7: File exists.
The result of line 8: File exists.
add net 192.168.1.0: gateway gif0
[b]ifconfig: SIOCSIFPHYADDR: Can't assign requested address
add net 192.168.100.0: gateway gif1
ifconfig: interface gif2 does not exist[/b]
delete net 192.168.1.0
delete net 192.168.100.0
route: writing to routing socket: No such process
delete net 192.168.100.0: not in table
ifconfig: interface gif2 does not exist
Nov 25 09:08:21 Andreas-Fredrikssons-dator IPSecuritas: Could not delete
tunnel gif2 192.168.1.1 192.168.100.0/24
ifconfig: interface gif2 does not exist
Nov 25 09:08:21 Andreas-Fredrikssons-dator IPSecuritas: Could not delete
gif2
Nov 25 09:08:21 Andreas-Fredrikssons-dator IPSecuritas: Stopping
racoon...
Nov 25 09:08:22 Andreas-Fredrikssons-dator IPSecuritas: Racoon normally
terminated
Nov 25 09:08:22 Andreas-Fredrikssons-dator IPSecuritas: Flushing kernel
keys
Log output from IPSecuritas 2.0.6"
Regards Andreas
IPSEcuritas and zywall1
IPSEcuritas and zywall1
by gbuma on 2004-11-25 15:45:34 +0100
Hello, I am trying to create a connection between a distant laptop (dynamic
IP) and the office firewall (dynamic ip, can be found with dyndns.org).
I keep on getting the "couldn't find the pskey for OFFICE_IP " error.
Auth is done with email for local and remote. Using pre-shared key.
On ipsecuritas, mode is "host to network".
Sonicwall Pro 230
Sonicwall Pro 230
by Jim Collis on 2004-11-28 00:41:28 +0100
Has anybody successfully gotten IPSecuritas running on OSX 0.3.6 to work
with a Sonicwall Pro 230? If so, can you provide complete configuration
info?
Verified working with IpCop
Verified working with IpCop
by gloin on 2004-11-30 22:16:13 +0100
Am short on time, but will create a sample configuration page on my blog
as soon as I can. Just so you know, it works both with certificate and PSK.
Sorry for the tease...
Re: Verified working with IpCop
by gloin on 2004-12-14 21:05:16 +0100
Well, that took way too long, but I had some things come up at home here
that really needed my attention. Here's the link (which will hopefully
change if some Benificient Admin deigns to relieve my burgeoning
bandwidth bill by mirroring the sample configurations:
http://www.taupehat.com/vpn/
Enjoy!
Re: Verified working with IpCop
by Rob D on 2005-03-25 20:19:30 +0100
[quote author=gloin link=1101849373/0#1 date=1103054716]Well, that
took way too long, but I had some things come up at home here that really
needed my attention. Here's the link (which will hopefully change if some
Benificient Admin deigns to relieve my burgeoning bandwidth bill by
mirroring the sample configurations:
http://www.taupehat.com/vpn/
Enjoy![/quote]
Hi gloin / all
I've been unable to connect to IPCOP 1.4.2 from my 10.3.8 iBook. My log
file is below. Any ideas?
Log output from IPSecuritas 2.0.6
Mar 25 19:08:24 Rob-Dykes-Computer IPSecuritas: Parsing configuration
Mar 25 19:08:24 Rob-Dykes-Computer IPSecuritas: Setting up racoon.conf
Mar 25 19:08:24 Rob-Dykes-Computer IPSecuritas: Setting up setkey.conf
Mar 25 19:08:24 Rob-Dykes-Computer IPSecuritas: Setting up psk.txt
Mar 25 19:08:24 Rob-Dykes-Computer IPSecuritas: Setting up tunnel.conf
Mar 25 19:08:24 Rob-Dykes-Computer IPSecuritas: Setting up resolv.conf
Mar 25 19:08:24 Rob-Dykes-Computer IPSecuritas: Parsing configuration
done
Mar 25 19:08:25 Rob-Dykes-Computer IPSecuritas: Starting racoon...
Mar 25 19:08:26 Rob-Dykes-Computer IPSecuritas: Racoon is running
Mar 25 19:08:26 Rob-Dykes-Computer IPSecuritas: Set kernel keys
line 3: Unknown error at [192.168.0.0]
line 3: Unknown error at [192.168.10.3]
line 4: Unknown error at [192.168.10.3]
line 4: Unknown error at [192.168.0.0]
Mar 25 19:08:26 Rob-Dykes-Computer racoon: ERROR:
sockmisc.c:738:str2saddr(): getaddrinfo(80.46.98.226,500): resolved to
multiple address, taking the first one
Mar 25 19:08:26 Rob-Dykes-Computer racoon: ERROR:
sockmisc.c:738:str2saddr(): getaddrinfo(80.46.98.226,500): resolved to
multiple address, taking the first one
Mar 25 19:08:26 Rob-Dykes-Computer racoon: ERROR:
sockmisc.c:738:str2saddr(): getaddrinfo(192.168.10.3,0): resolved to
multiple address, taking the first one
Mar 25 19:08:26 Rob-Dykes-Computer racoon: ERROR:
sockmisc.c:738:str2saddr(): getaddrinfo(192.168.10.3,0): resolved to
multiple address, taking the first one
Mar 25 19:08:26 Rob-Dykes-Computer racoon: ERROR:
sockmisc.c:738:str2saddr(): getaddrinfo(192.168.0.0,0): resolved to
multiple address, taking the first one
Mar 25 19:08:26 Rob-Dykes-Computer racoon: ERROR:
sockmisc.c:738:str2saddr(): getaddrinfo(192.168.0.0,0): resolved to
multiple address, taking the first one
Mar 25 19:08:26 Rob-Dykes-Computer racoon: ERROR:
sockmisc.c:738:str2saddr(): getaddrinfo(192.168.10.3,500): resolved to
multiple address, taking the first one
Mar 25 19:08:26 Rob-Dykes-Computer racoon: ERROR:
sockmisc.c:738:str2saddr(): getaddrinfo(192.168.10.3,500): resolved to
multiple address, taking the first one
Mar 25 19:08:29 Rob-Dykes-Computer racoon: ERROR:
isakmp_inf.c:848:isakmp_info_recv_n(): unknown notify message, no
phase2 handle found.
Mar 25 19:08:29 Rob-Dykes-Computer racoon: ERROR:
isakmp_inf.c:848:isakmp_info_recv_n(): unknown notify message, no
phase2 handle found.
Mar 25 19:08:48 Rob-Dykes-Computer racoon: ERROR:
Re: Verified working with IpCop
by gloin on 2005-03-26 19:58:49 +0100
Not entirely sure, but it does look like someone's multihoming. You
probably want to start with the simplest case possible and then add in extra
interfaces once things are working.
Re: Verified working with IpCop
by Rob - D on 2005-03-28 23:30:24 +0200
[quote author=gloin link=1101849373/0#3 date=1111863529]Not entirely
sure, but it does look like someone's multihoming. You probably want to
start with the simplest case possible and then add in extra interfaces once
things are working.[/quote]
Gloin...
someone = who?
my local iBoook is not multihomed...only interface UP and with IP is WLAN.
WLAN is connected to AP routing to INTERNET to remote/IPCOP f/w.
I can understand why you are saying that though... the 'resolved to multiple
address' in the log file made me think something similar...
Yet...
I get all the way to phase 2 authentication. And then I am unable to make
phase 2. It would seem that
isakmp_inf.c:848:isakmp_info_recv_n(): unknown notify message, no
phase2 handle found.
is the crucial part of the problem.....
Re: Verified working with IpCop
by robd on 2005-03-29 22:48:39 +0200
Some further testing.
Right. I've verified that all is working on the IPCOP side as I have
successfully setup a net-to-net VPN connection to the IPCOP.
Gotta work out whats going on on the client side for my host-to-net
roadwarrior connection.
FreeS/WAN (X.509) connection fails
FreeS/WAN (X.509) connection fails
by petschni on 2004-12-02 09:32:40 +0100
Hello,
i am trying to access the network in my university but unfortunatley i get an
error (see end of the message).
The Gateway runs on a Debian/LINUX and IPSec is implemented with
Openswan. The Data Connection is secured with ESP (Encapsulated Security
Payload RFC 2406). In Openswan is the 3DES Encryption used.
Authentification works with X.509-Certificates.
I got it to work in VPN Tracker but in IPSecurtitas I get the error when i trys
to connect.
I don't know if it is of any interest, but if you start VPN Tracker and
IPSecurtitas at the same time and establish the connection with VPN Tracker
the button in IPSecurtitas turns green also, but if IPSecurtitas has to do it on
its own it stays red.
Do you got any idea what I can do?
greetings and thanks
peter
Log output from IPSecuritas 2.0.6
Dec 2 09:02:43 wlanbzw25 IPSecuritas: Parsing configuration
Dec 2 09:02:43 wlanbzw25 IPSecuritas: Setting up racoon.conf
Dec 2 09:02:43 wlanbzw25 IPSecuritas: Setting up setkey.conf
Dec 2 09:02:43 wlanbzw25 IPSecuritas: Setting up psk.txt
Dec 2 09:02:43 wlanbzw25 IPSecuritas: Setting up tunnel.conf
Dec 2 09:02:43 wlanbzw25 IPSecuritas: Parsing configuration done
Dec 2 09:02:44 wlanbzw25 IPSecuritas: Starting racoon...
Dec 2 09:02:44 wlanbzw25 IPSecuritas: Racoon is running
Dec 2 09:02:44 wlanbzw25 IPSecuritas: Set kernel keys
Dec 2 09:03:26 wlanbzw25 racoon: ERROR:
isakmp.c:2045:isakmp_chkph1there(): phase2 negotiation failed due to
time up waiting for phase1. ESP 141.76.18.225->141.76.18.34
Dec 2 09:03:26 wlanbzw25 racoon: ERROR:
isakmp.c:2045:isakmp_chkph1there(): phase2 negotiation failed due to
time up waiting for phase1. ESP 141.76.18.225->141.76.18.34
Sidewinder
Sidewinder
by Chris Coyne on 2004-12-02 21:42:41 +0100
Hi
Has anyone set up ipsecuritas to work with Sidewinder G2?? I am very
confused as to how to do this. Any help would be great!
Thanks
Chris
Re: Sidewinder
by Chris Creighton on 2005-03-08 19:14:12 +0100
Yes, it's pretty easy. They now have an unsupported document
explaining how to do this. Contact Secure Computing.
However I am having a problem with the Mac in this regard, not
the IPSEC configuration that is stopping my Mac from beginning
the negotiation. I think the problem is what IPSecuritas is doing
to set up the IPSEC connection, but since the error messages are
vague to say the least, I can't tell what the problem is.
See my other post.
I have connected to the Sidewinder using FQDN, and fixed IP, both
with shared secrets. I have not yet got the certificates to work, but
I was working with 5.2.1.10, not 6.1, which may generate the
files in the format that IPSecuritas will accept, i.e. *.pem format.
Good luck ... Chris
VPN to Sonicwall TZ-170
VPN to Sonicwall TZ-170
by Doug Smart on 2004-12-13 22:51:05 +0100
Can ipsecuritas be used to create a VPN connection to a sonicwall tz170
using domain authentication? I have a group VPN policy set up that grants
Access using a pre shared secret and the domain log in credentials. I have
not found anything about passing domain user and password credentials In
the ipsecuritas online help or in the forum which is why I am submitting a
new topic.
I have a few home a Mac users (including myself) and I think you would be
great for them to be able to connect using ipsecuritas. I have the ability to
create new SA’s, so if I can’t use domain authentication I can use just about
any method That works.
Thanks.
Doug
connecting to Fortinet VPN: "invalid ex
connecting to Fortinet VPN: "invalid ex
by Michael Hanisch on 2004-12-22 23:55:58 +0100
Hi everyone,
I'm out of luck trying to connect my Mac to a VPN (host to network setup).
The remote endpoint is a Fortinet 200 firewall w/ VPN.
The log contains lots of debug messages, but also some errors, the first
being:
Dec 22 23:51:20 Vigor11 racoon: DEBUG: plog.c:199:plogdump():
7025a13e a4e13035 6fe41458 7991664e 08100601 ebfef208 0000004c
c7fcbfb8 5681de4a f247e6e3 6c5f2990 685b48bc aa605eb6 c55a8fd4
a325ac70 7613fc0d d1dad56d 53f688e5 d6050555
Dec 22 23:51:20 Vigor11 racoon: ERROR: isakmp.c:759:isakmp_main():
Invalid exchange type 6 from X.X.X.X[500].
Dec 22 23:51:23 Vigor11 racoon: DEBUG: sockmisc.c:421:sendfromto():
sockname 192.168.11.11[500]
These error messages are repeated multiple times.
Can anyone shed some light on this? I can adapt the firewall's config if
necessary, but at the moment I don't have any idea where to start...
I can provide more info if necessary.
Startup - IPsec failed
Startup - IPsec failed
by taniwha on 2004-12-29 05:33:15 +0100
Apple Mac.
When trying to establish the VPN I get the error message "Startup IPsec
failed" instantly.
Any ideas anyone.
Re: Startup - IPsec failed
by sdls on 2004-12-30 21:01:00 +0100
I had the same problem
I'm still testing, but i ran it as root and it got passed the ipsec failed
try it as root
SDLS :)
Netscreen Xauth
Netscreen Xauth
by XAuth on 2005-01-07 21:31:19 +0100
Will IPSECURITAS support the authentication method Xauth or is that a
Netscreen proprietary standard?
Thanks!
Re: Netscreen Xauth
by tji on 2005-06-08 23:17:32 +0200
Xauth is not a Netscreen proprietary thing.. it was on the standards track,
with a draft RFC. But, I don't think it was ever ratified (though I don't
know for sure).
While there are Xauth patches available for KAME / racoon, I don't think
Apple has integrated that support into the Apple code. So, as far as I
know, you cannot use Xauth with MacOS today.
Also, I am not sure if one could get Xauth support by just updating the
racoon binary in MacOS, or if the IPSec support in the kernel needs to be
updated. If only racoon needs updating, it could be pretty easy.
MacOS can be made to work with netscreen, via standard pre-shared keys.
But, the config is a lot more convoluted than the Xauth config. equinux /
VPN Tracker has a good dock on configuring Netscreen to work with their
client config software.
Re: Netscreen Xauth
by tji on 2005-07-08 19:55:21 +0200
I tried Xauth with a Netscreen gateway using the "VPN Tracker" demo, and I
was able to connect. "VPN Tracker" is not free, but if you need Xauth, it's
the only game going right now.
I have a sample config for CheckPoint
I have a sample config for CheckPoint
by akerem on 2005-01-09 11:23:00 +0100
Hi people,
I have at last configured my Checkpoint NG R55 and my Powerbook with
IPSecuritas 2.0.6 with certificates. The VPN connection works perfectly.
I saw that, in the online help of IPSecuritas, using certificates is missing
(and the online help says that it should be updated) so I would like to be
the one who updates it. Also in the online help, there are some problems
with certificate importing, so I would also like to correct those.
Can somebody send me instructions about how to do this? So I can be some
help to people ;D
Cheers,
Kerem
Re: I have a sample config for CheckPoint
by Don on 2005-02-11 06:13:48 +0100
Could you please provide a sample of your configuration as well as the
process you went through to get it to work. For example did you need to
make any changes to the CheckPoint side to get things working or was it
just a case of getting all the IPSecuritas settings right?
I've worked through all the settings with the CheckPoint firewall manager
but have been unable to get things to work. I still don't know how to set the
"Proposal Check" in the general tab or the "Local Identifier" or "Remote
Identifier" in the Identification section of the ID/Auth tab.
Any help would be appreciated.
Thanks . . . Don
Symantec Security Gateway with IPsecuritas
Symantec Security Gateway with IPsecuritas
by matteth on 2005-01-13 10:27:47 +0100
Has anyone been able to use IPSecuritas for VPN with the Symantec 360R,
or any other in the 300-series firewalls?
Thanks! /Mats
Re: Symantec Security Gateway with IPsecuritas
by Chris Liddle on 2005-02-19 02:13:33 +0100
I have the same issue; IPSecuritas <--> Symantec 360R - ? if anyone has
this working.
Re: Symantec Security Gateway with IPsecuritas
by R Teller on 2005-08-16 19:35:24 +0200
Here is a symantec article on how to set up a 200 series device using
vaporsec. I spoke with symantec and they said a few helpful things such as
the username should be formatted as an email address and you should
have firmware build 922 before starting. Here's the article
http://service1.symantec.com/SUPPORT/ent-gate.nsf
/6c5cd071f100c71888256ccd0050d548
/3bc9eaa31908580888256e3e004a1d6c?OpenDocument&src=bar_sch_nam
As an alternative you may visit http://www.symantec.com/search and type
in the following document number 2004021808393554
I will be trying some of the "procedure" today, although from the look of it,
they are not alike, lots of digging.
Re: Symantec Security Gateway with IPsecuritas
by RT on 2005-08-30 22:37:17 +0200
Tried the Procedure listed on the site and adjusted for differences, but it
will not connect, this are the log entries I get when connecting to the
firewall
<--- Log Begin---!>
[DATE TIME] Connection name - Responding to Aggressive
Mode from
Remote Peer *CLIENT IP ADDRESS*
[DATE TIME] Connection name - ERR:preshared secret disappeared!
[DATE TIME] Connection name - STATE_AGGR_R1:
AUTHENTICATION_FAILED
[DATE TIME] Connection name - state transition function for
STATE_AGGR_R0 failed: AUTHENTICATION_FAILED
[DATE TIME] Connection name - Sending ISAKMP OAK INFO (Notification IKE
SA)
[DATE TIME] Connection name - Terminating connection
[DATE TIME] Connection name - Terminating connection
<---End Log---!>
Am I missing something? I need some assistance on this please.
Thank you
Re: Symantec Security Gateway with IPsecuritas
by RT on 2005-09-20 22:11:52 +0200
Has anyone had any luck with this, Symantec is most definitely less than
helpful.
360 R from tiger, supposedly it worked with vaporware on panther
Re: Symantec Security Gateway with IPsecuritas
by RT on 2005-09-26 17:41:55 +0200
Finally broke down and called symantec tech support, wasn't able to get it
to work, they finally got to the point where they said "sorry, can't help you"
. So, if anyone has any idea how to make this work, It keeps saying the
preshared secret has dissapeared in the device log file, and have been able
to connect using Symantec's client, please let me know. Thank you.
Re: Symantec Security Gateway with IPsecuritas
by ron on 2005-10-10 23:35:12 +0200
use mac ids for this
Re: Symantec Security Gateway with IPsecuritas
by jc on 2006-01-29 23:26:09 +0100
Document ID:2005021009270354
Re: Symantec Security Gateway with IPsecuritas
by pmossip on 2006-03-16 17:05:20 +0100
The Symantec 200R standard firmware only supports the "keyid" type of
client identifier.
The Documents on symantec's website where it worked with VAPORSEC
were a private 1.7I firmware build where they supported user_fqdn. This
user_fqdn support was never added to the regular released firmware
updates that are generally available. Currently 1.8F.
I have been able to use IPSecuritas to create a skeleton racoon config &
then manually switch to using "keyid".
-Paul Mossip
Certificate Manager
Certificate Manager
by Jose on 2005-01-16 04:47:47 +0100
Could any one tell me where is the Certificate Manager. I need to import a
watchguard certificate but can't find that manager.
Thanks for all your help
Re: Certificate Manager
by akerem on 2005-02-02 16:54:56 +0100
You can open Certificate Manager from File > Open Certificates Manager
Source code
Source code
by Leif Larsson on 2005-02-02 20:21:22 +0100
Hi,
Out of curiosity, is the source code available for IPSecuritas ?
Cheers,
/Leif
Re: Source code
by cnadig on 2005-02-10 22:43:27 +0100
It's not... :)
Re: Source code
by Ty on 2005-05-06 18:12:42 +0200
If I wanted to help donate features that I wanted (in terms of coding them
myself), can I arrange to get the source and do some work on it? I am not
interested in releasing the product, but I would like some features and I
would be willing to code them myself and then hand them back to you for
the next release.
Insert pauses, alternate proxy port, and l2tpd.
Insert pauses, alternate proxy port, and l2tpd.
by sj7trunks on 2005-02-03 23:22:51 +0100
Hi there,
Going through the configs and getting an understanding of whats going on,
I see a couple things that work on a Linux machine and not on the OS X.
cat ipsecuritas_setkey.conf
flush;
spdflush;
spdadd 1.1.1.1/32 2.2.2.2/32 any -P in ipsec esp/transport
/1.1.1.1-2.2.2.2/require;
spdadd 2.2.2.2/32 1.1.1.1/32 any -P out ipsec esp/transport
/2.2.2.2-1.1.1.1/require;
I set the proxy port on the Linux box to [1701] and the connection works
fine.
spdadd 1.1.1.1[1701] 2.2.2.2 any -P in ipsec esp/transport/1.1.1.1-2.2.2.2
/require;
spdadd 2.2.2.2 1.1.1.1[1701] any -P out ipsec esp/transport
/2.2.2.2-1.1.1.1/require;
----------It'd be nice to maybe pause the startup so you can manually edit the config
and put some configuration variables. Or if you specify MIP6 to ungrey an
area where you can specify a UDP proxy port. I've also been able to upgrade
the racoon binary but I run into the problem of MIP6 being outdated,
another great place to insert a pause to do a replacement of MIP4 to proxy.
This might also lead to getting NAT-T working for OS X.
On the case of l2tpd, it seems to be running within the client. Is there a
way to run this program in stages? I'm only curious because it would help
with a lot of debug problems where you can't get further than the limited
GUI interface.
Any help here is greatly appreciated!
Thanks,
Benjamin
Re: Insert pauses, alternate proxy port, and l2tpd
by cnadig on 2005-02-10 22:56:57 +0100
Hello Benjamin,
please get in touch with me on [email protected] as I'm working on the
next release of IPSecuritas and I'd like to discuss ways to integrate your
proposals.
Christoph
Set kernel keys Problem ?
Set kernel keys Problem ?
by fmusso on 2005-02-07 20:46:58 +0100
Hi everybody,
No way to start a VPN Connection with version 2.06 and MAC OS 10.3.7
here is my log
Log output from IPSecuritas 2.0.6
Feb 7 20:43:16 Titanium IPSecuritas: Parsing configuration
Feb 7 20:43:16 Titanium IPSecuritas: Setting up racoon.conf
Feb 7 20:43:16 Titanium IPSecuritas: Setting up setkey.conf
Feb 7 20:43:16 Titanium IPSecuritas: Setting up psk.txt
Feb 7 20:43:16 Titanium IPSecuritas: Setting up tunnel.conf
Feb 7 20:43:16 Titanium IPSecuritas: Parsing configuration done
Feb 7 20:43:17 Titanium IPSecuritas: Starting racoon...
Feb 7 20:43:17 Titanium IPSecuritas: Racoon is running
Feb 7 20:43:17 Titanium IPSecuritas: Set kernel keys
And no more message... I am sure of my VPN configuration. But it is
strange : no error message. Any idea ?
Re: Set kernel keys Problem ?
by fmusso on 2005-02-07 22:02:04 +0100
does VPN TRACKER make change in my system ?
SonicWALL TZ170W Works
SonicWALL TZ170W Works
by Eric Kaiser on 2005-02-08 18:12:02 +0100
Here is my current setup. PowerBook G4 10.3.7 and SonicWALL TZ170W
with SonicOS Enhanced 2.6.0.4-42e. The connection is through the
airport/wireless interface.
SonicWALL settings:
General:
IKE using Preshared Secret on the WLAN GroupVPN
Proposals:
IKE (Phase 1)
DH Group 2
Encryption 3DES
Authentication SHA1
Life Time 28800 seconds
Ipsec (Phase 2)
Protocol ESLP
Encryption 3DES
Enable Perfect Forward Secrecy checked
DH Group 2
Life Time 28800 seconds
Advanced
All boxes unchecked
Default Gateway 192.168.225.193 (Which is my LAN Gateway)
Allow Unauthenticated VPN Client Access: All Interface IP
Client
Allow Connections to: Split Tunnels
Set Default Route as this Gateway checked
All other boxes unchecked
IPSecuritas Settings:
General
Mode Host to Network
Remote Ipsec Device 192.168.225.161 (My WLAN gateway)
Remote Network 192.168.225.192/27 (My LAN network address/subnet)
Local Adress Blank
Exchange Mode: Aggressive (only one checked)
Proposal Check: Obey Nonce Size: 16
Phase 1
Same settings as on SonicWall
Phase 2
Same settings as on SonicWALL
Only 3DES checked
Id/Auth
Local Identifier: Address
Remote Identifier: DN (Put the Uniqe Firewall Identifier from the SonicWALL
in this box)
Preshared Secret: Obviously the Preshared Secret from the SonicWALL
Options
Check the following
Compression Deflate
Re: SonicWALL TZ170W Works
by Simon T on 2005-02-10 04:56:01 +0100
Where you using RADIUS auth for this?
Is so how do you use the username and password?
Re: SonicWALL TZ170W Works
by Eric Kaiser on 2005-02-20 16:24:03 +0100
I was not using Radius Auth. or Xauth for the VPN. However, I do use
WPA-EAP for wireless authentication.
Sonicwall 4060 Pro connection problem via DSL
Sonicwall 4060 Pro connection problem via DSL
by jharris on 2005-02-08 23:46:11 +0100
We are remotely connecting to our network via a Sonicwall 4060 Pro using
IPSecuritas v. 2.0.5 in Mac OS X 10.3.x. I can successfully connect to the
network from our Comcast Internet connection at work as well as mine
from home. We have two remote properties that have an Earthlink DSL
connection as a backup solution. We keep getting a "no hash payload" error
during the Phase 1 negotiation. All Macs are using the same config settings.
They are:
General: Host to Network, Aggressive exchange mode, and Claim proposal
check, nonce size is 16
Phase 1: Lifetime=9600 seconds, Group 1, Encryption=DES,
Authentication=MD5
Phase 2: Lifetime=3600 seconds, PFS Group=None, Encryption=3DES,
Authentication=HMAC SHA1
ID/AUTH: Local ID=Address, Remote ID= DN + Sonicwall Unique ID,
Authentication by Preshared Secret
Options: IPSec/IKE Options enabled-IPSec DOI, Generate Policy,
SIT_IDENTITY_ONLY, MIP6, Initial Contact, and DHCP Pass-Through; General
Options are Establish IKE immediately
I would post a full log, but each time I do I get an error that the message is
too long. I will be happy to email the full log if needed. For now only what
appears to be the relevant portion is included:
Feb 8 16:47:20 user-vc8f15a racoon: DEBUG:
isakmp.c:1718:isakmp_ph1resend(): resend phase1 packet
3e2ca792b4de9801:0000000000000000
Feb 8 16:47:20 user-vc8f15a racoon: DEBUG:
isakmp.c:233:isakmp_handler(): ===
Feb 8 16:47:20 user-vc8f15a racoon: DEBUG:
isakmp.c:234:isakmp_handler(): 92 bytes message received from
207.59.138.242[500]
Feb 8 16:47:20 user-vc8f15a racoon: DEBUG: plog.c:199:plogdump():
3e2ca792 b4de9801 8cf63ebd ff806252 0b100500 00000000 0000005c
00000040 00000000 0110000e 3e2ca792 b4de9801 8cf63ebd ff806252
00060004 00000000 00040018 0000004e 6f207072 6f706f73 616c2069
73206368 6f73656e
Feb 8 16:47:20 user-vc8f15a racoon: DEBUG:
isakmp_inf.c:115:isakmp_info_recv(): receive Information.
Feb 8 16:47:20 user-vc8f15a racoon: ERROR:
isakmp_inf.c:142:isakmp_info_recv(): ignore information because the
message has no hash payload.
Feb 8 16:47:20 user-vc8f15a racoon: ERROR:
isakmp_inf.c:142:isakmp_info_recv(): ignore information because the
message has no hash payload.
Any assistance that can be offered in solving this dilemma would be greatly
appreciated. All that the support at Sonicwall can tell me is the the problem
is in the Phase 1 configuration. That doesn't seem likely as these settings
are working via cable modem.
Sonicwall Enhanced OS using radius
Sonicwall Enhanced OS using radius
by simon t on 2005-02-10 05:02:43 +0100
Question,
I see that the client works with sonicwall enhanced OS group connection;
however, does it work with this when you have the user authenticate?
If not are their any step by step solutions: i.e. setting up another SA on
enhanced OS and allowing the client to connect?
In advance, thanks for your help.
P.S. great client.
Re: Sonicwall Enhanced OS using radius
by Eric Kaiser on 2005-02-20 16:33:36 +0100
Are you referring to using Xauth? If you are, then you have to establish the
appropriate user group which will authenticate against the SonicWALL (Local
Users and Local Groups) or an external Radius server. This is assuming that
IPSecuritas supports Xauth.
Connecting to Linksys RV082
Connecting to Linksys RV082
by Orb on 2005-02-17 00:59:24 +0100
I've been fiddling all day trying to get my Powerbook to connect to my
remote RV082. I can connect via PPTP, but getting IPSec to work is not
going well.
Anyone have a config that works that I can play with.
Thank.
Re: Connecting to Linksys RV082
by apelsin on 2005-03-25 19:39:25 +0100
Hi i too have an RV802
i cant get anything to work, Which firmware are you using?
Could you send me your settings for pptp?
I'll let you know if i can get ipsec to work.
Thanks
Netgear FVS318 flakey
Netgear FVS318 flakey
by Troy Virojana on 2005-02-17 19:07:53 +0100
Hi.
I am able to connect to the router, but it stops after 2 to 3 minutes.
I have used the same settings as a VPN Tracker client, who doesn't have this
problem.
It will connect, and I'm in the middle of doing something, and just stop
talking. The green checkmark is still there, and no errors come up in the
log at that time.
The only issue I get when I log on is this.
Feb 17 12:01:38 Dhole IPSecuritas: Starting racoon...
Feb 17 12:01:38 Dhole IPSecuritas: Racoon is running
Feb 17 12:01:38 Dhole IPSecuritas: Set kernel keys
line 3: Unknown error at [192.168.1.0]
line 3: Unknown error at [10.1.2.3]
line 4: Unknown error at [10.1.2.3]
line 4: Unknown error at [192.168.1.0]
Feb 17 12:01:38 Dhole racoon: ERROR: sockmisc.c:738:str2saddr():
getaddrinfo(X.X.X.X,500): resolved to multiple address, taking the first one
Feb 17 12:01:38 Dhole racoon: ERROR: sockmisc.c:738:str2saddr():
getaddrinfo(X.X.X.X,500): resolved to multiple address, taking the first one
Feb 17 12:01:38 Dhole racoon: ERROR: sockmisc.c:738:str2saddr():
getaddrinfo(10.1.2.3,0): resolved to multiple address, taking the first one
Feb 17 12:01:38 Dhole racoon: ERROR: sockmisc.c:738:str2saddr():
getaddrinfo(10.1.2.3,0): resolved to multiple address, taking the first one
Feb 17 12:01:38 Dhole racoon: ERROR: sockmisc.c:738:str2saddr():
getaddrinfo(192.168.1.0,0): resolved to multiple address, taking the first
one
Feb 17 12:01:38 Dhole racoon: ERROR: sockmisc.c:738:str2saddr():
getaddrinfo(192.168.1.0,0): resolved to multiple address, taking the first
one
Feb 17 12:01:38 Dhole racoon: ERROR: sockmisc.c:738:str2saddr():
getaddrinfo(10.69.69.101,500): resolved to multiple address, taking the
first one
Feb 17 12:01:38 Dhole racoon: ERROR: sockmisc.c:738:str2saddr():
getaddrinfo(10.69.69.101,500): resolved to multiple address, taking the
first one
add net 192.168.1.0: gateway gif0
as I said, it works, but only for a few minutes. I copied the settings from
VPN Tracker, and I used the setup guide from Equinux. The VPN Tracker
client has no issue. I moved the key life from 3600 (recommended by
Equinux) to 28800 to see if that would help, but it did not.
Any ideas? I don't want to buy VPN Tracker if I don't need to, but it seems
like that is the only one that works well ALL the time.
By the way, I have no problems with IPSecuritas connecting to a sonicwall
TZ170 at all.
Re: Netgear FVS318 flakey
by Roger Meador on 2005-03-21 15:35:17 +0100
hey,
I am having trouble with a 318 as well. Have you had any luck?
Roger
VPN established - unable to pass traffic
VPN established - unable to pass traffic
by Kirk Paulsen on 2005-02-20 06:04:40 +0100
We are trying to establish a VPN between a PowerBook G4 running 10.3.7
and a Netscreen 5GT. This is the only Mac in the organization and I will
admit that I know very little about them. We have established the tunnels
using Netscreen Remote on the Windows XP laptops and they all work as
expected. I have been able to establish the tunnel between the PowerBook
and the Netscreen (both logs show the tunnel connected and green
checkmark in IPSecuritas) however when I try to ping anything on the LAN
behind the firewall - there is complete loss. Is there some special setting
for the Mac to know that the traffic is bound for the VPN? These are the
settings I currently have for IPSecuritas:
General Mode of Operation: Host to Network
Remote IPSec Device: 64.x.x.x
Remote Network: 192.168.14.0/24
Local Address: 192.168.14.140 (also have tried leaving this blank - same
result)
Exchange Mode: Aggressive
Proposal Check: Obey
Nonce Size: 16
Phase 1 Lifetime: 28800 seconds
DH Group: Mod1024 (2)
Encryption: 3DES
Authentication: SHA1
Phase 2 Lifetime: 28800 seconds
PFS Group: Mod1024 (2)
Encryption: 3DES
Authentication: HMAC SHA1
Id/Auth Local Identifier: DN @[email protected] (found in an article online to
preface with @ since we were having trouble in the beginning even
establishing the tunnel because the firewall didn't recognize the peer
Remote Identifier: blank
Preshared Secret: ********
Options Compression Deflate checked (greyed out)
IPSec DOI checked
SIT_IDENTITY_ONLY checked
Initial Contact checked
MIP6 checked
DHCP Pass-through checked
Establish IKE immediately checked
all other options unchecked
Thanks in advance for any help.
Re: VPN established - unable to pass traffic
by Kirk Paulsen on 2005-02-20 21:27:32 +0100
An update for anyone that is trying to do a similar configuration. Took the
PowerBook home and everything worked fine when behind a Linksys router.
At the office, we were behind our Netscreen and even though none of our
PC's had a problem something with the PowerBook and our Netscreen was
causing traffic not to be routed or passed correctly.
Another note, found while home that the configuration worked best with
the Local Address left blank.
Re: VPN established - unable to pass traffic
by KJ on 2005-04-14 22:19:20 +0200
I had the same problem with a PowerMac G5 and a bigger Netscreen as
well, we solved it with turning on reverse-nat on our VPN policy at the
netscreen.
Re: VPN established - unable to pass traffic
by Paul on 2005-06-22 02:54:31 +0200
Reverse-Nat?
Do you mean nat traversal or incoming NAT translation?
Regards,
Paul.
Isakmp.c 1361: failed2bind(address already in use)
Isakmp.c 1361: failed2bind(address already in use)
by Chris Creighton on 2005-03-08 01:22:38 +0100
I am baffled by this as I am clueless as to what address it is referring to.
My internal Ethernet address is not the same address that I am trying to
reach. But I get this message quickly and it fails to even begin to talk to the
remote IKE server.
Any ideas? I am behind on a project just because of this simple problem.
I am assuming it's simple. This is not an issue of how IPSEC is configured
with IPSecuritas, as at times, it works, but at times, I get these errors and it
just stops trying, quickly.
thanks much ... Chris
Mar 2 00:08:40 Chris racoon: DEBUG2: cfparse.y:1354:cfparse(): parse
successed.
Mar 2 00:05:31 Chris racoon: ERROR: isakmp.c:1361:isakmp_open(): failed
to bind (Address already in use).
Mar 2 00:05:31 Chris racoon: ERROR: isakmp.c:1361:isakmp_open(): failed
to bind (Address already in use).
Mar 2 00:05:31 Chris racoon: ERROR: isakmp.c:1384:isakmp_open(): no
address could be bound.
Mar 2 00:05:31 Chris racoon: ERROR: isakmp.c:1384:isakmp_open(): no
address could be bound.
Error Messages
Error Messages
by Jeremy Brown on 2005-03-09 06:10:11 +0100
Hello,
I am trying to connect to a Sidewinder G2 using IPSecuritas. I have received
the document from Secure Computing on how to set this up and followed
the directions. I am using self-signed certificates, imported in PEM format.
I am directly connected to the Internet (not behind a firewall/NAT) and
have full outgoing access.
I have tested this VPN on Windows with their supplied SoftRemote program
and confirmed that the server configuration is correct.
I'm stumped, particularly at the messages saying it's resolved to multiple
addresses. Any help on this would be *greatly* appreciated. I have
google'd for help and come up dry. Here is a log dump (IP's have been
censored):
Log output from IPSecuritas 2.0.6
Mar 8 21:02:09 jbrown IPSecuritas: Parsing configuration
Mar 8 21:02:09 jbrown IPSecuritas: Setting up racoon.conf
Mar 8 21:02:09 jbrown IPSecuritas: Setting up setkey.conf
Mar 8 21:02:09 jbrown IPSecuritas: Setting up psk.txt
Mar 8 21:02:09 jbrown IPSecuritas: Setting up tunnel.conf
Mar 8 21:02:09 jbrown IPSecuritas: Parsing configuration done
Mar 8 21:02:10 jbrown IPSecuritas: Starting racoon...
Mar 8 21:02:11 jbrown IPSecuritas: Racoon is running
Mar 8 21:02:11 jbrown IPSecuritas: Set kernel keys
line 3: Unknown error at [<remote internal subnet>]
line 3: Unknown error at [<my IP address>]
line 4: Unknown error at [<my IP address>]
line 4: Unknown error at [<remote internal subnet>]
Mar 8 21:02:11 jbrown racoon: ERROR: sockmisc.c:738:str2saddr():
getaddrinfo(<VPN server IP>,500): resolved to multiple address, taking the
first one
Mar 8 21:02:11 jbrown racoon: ERROR: sockmisc.c:738:str2saddr():
getaddrinfo(<VPN server IP>,500): resolved to multiple address, taking the
first one
Mar 8 21:02:11 jbrown racoon: ERROR: sockmisc.c:738:str2saddr():
getaddrinfo(<my IP address>,0): resolved to multiple address, taking the
first one
Mar 8 21:02:11 jbrown racoon: ERROR: sockmisc.c:738:str2saddr():
getaddrinfo(<my IP address>,0): resolved to multiple address, taking the
first one
Mar 8 21:02:11 jbrown racoon: ERROR: sockmisc.c:738:str2saddr():
getaddrinfo(<remote internal subnet>,0): resolved to multiple address,
taking the first one
Mar 8 21:02:11 jbrown racoon: ERROR: sockmisc.c:738:str2saddr():
getaddrinfo(<remote internal subnet>,0): resolved to multiple address,
taking the first one
Mar 8 21:02:11 jbrown racoon: ERROR: sockmisc.c:738:str2saddr():
getaddrinfo(<my IP address>,500): resolved to multiple address, taking the
first one
Mar 8 21:02:11 jbrown racoon: ERROR: sockmisc.c:738:str2saddr():
getaddrinfo(<my IP address>,500): resolved to multiple address, taking the
first one
Mar 8 21:02:11 jbrown racoon: ERROR: isakmp_ident.c:237:ident_i2recv():
ignore the packet, received unexpecting payload type 7.
Mar 8 21:02:11 jbrown racoon: ERROR: isakmp_ident.c:237:ident_i2recv():
ignore the packet, received unexpecting payload type 7.
Mar 8 21:02:42 jbrown racoon: ERROR:
isakmp.c:2045:isakmp_chkph1there(): phase2 negotiation failed due to
time up waiting for phase1. ESP <VPN server IP>-><my IP address>
Netgear FVL328 configuration same as FVS328?
Netgear FVL328 configuration same as FVS328?
by Eric Kelly on 2005-03-18 18:50:22 +0100
Anybody know if the optimal configuration for the FVL328 would be the
same as for the FVS328?
Thanks,
Eric
How To Read Log File
How To Read Log File
by GLC on 2005-03-19 05:58:00 +0100
If I could understand the log file messages, I would not post a note that
says "I tried everything and it still does not work.!
I am trying to tunnel in to a Fortigate. I finally have a green checkmark, but
when I run Remote Desktop, it cannot see anything. The log file has lots of
info, but I do not understand it.
Is there a "How to Read The Log File" FAQ somewhere?
Thanks!
Re: How To Read Log File
by robd on 2005-03-26 14:14:09 +0100
What do these error messages mean? I agree GLC we need some more help
so we can help ourselves! Can we get a IPsecuritas wiki? I'd be keen to help.
10.3.80 to IPCOP 1.4.2
10.3.80 to IPCOP 1.4.2
by Rob on 2005-03-25 20:15:25 +0100
I've been following this HOWTO http://www.taupehat.com/vpn/ to get my
10.3.8 machine to connect to an IPCOP firewall v1.4.2
My log output is below.
Anyone got any ideas as to why it is going wrong?
Log output from IPSecuritas 2.0.6
Mar 25 19:08:24 Rob-Dykes-Computer IPSecuritas: Parsing configuration
Mar 25 19:08:24 Rob-Dykes-Computer IPSecuritas: Setting up racoon.conf
Mar 25 19:08:24 Rob-Dykes-Computer IPSecuritas: Setting up setkey.conf
Mar 25 19:08:24 Rob-Dykes-Computer IPSecuritas: Setting up psk.txt
Mar 25 19:08:24 Rob-Dykes-Computer IPSecuritas: Setting up tunnel.conf
Mar 25 19:08:24 Rob-Dykes-Computer IPSecuritas: Setting up resolv.conf
Mar 25 19:08:24 Rob-Dykes-Computer IPSecuritas: Parsing configuration
done
Mar 25 19:08:25 Rob-Dykes-Computer IPSecuritas: Starting racoon...
Mar 25 19:08:26 Rob-Dykes-Computer IPSecuritas: Racoon is running
Mar 25 19:08:26 Rob-Dykes-Computer IPSecuritas: Set kernel keys
line 3: Unknown error at [192.168.0.0]
line 3: Unknown error at [192.168.10.3]
line 4: Unknown error at [192.168.10.3]
line 4: Unknown error at [192.168.0.0]
Mar 25 19:08:26 Rob-Dykes-Computer racoon: ERROR:
sockmisc.c:738:str2saddr(): getaddrinfo(80.46.98.226,500): resolved to
multiple address, taking the first one
Mar 25 19:08:26 Rob-Dykes-Computer racoon: ERROR:
sockmisc.c:738:str2saddr(): getaddrinfo(80.46.98.226,500): resolved to
multiple address, taking the first one
Mar 25 19:08:26 Rob-Dykes-Computer racoon: ERROR:
sockmisc.c:738:str2saddr(): getaddrinfo(192.168.10.3,0): resolved to
multiple address, taking the first one
Mar 25 19:08:26 Rob-Dykes-Computer racoon: ERROR:
sockmisc.c:738:str2saddr(): getaddrinfo(192.168.10.3,0): resolved to
multiple address, taking the first one
Mar 25 19:08:26 Rob-Dykes-Computer racoon: ERROR:
sockmisc.c:738:str2saddr(): getaddrinfo(192.168.0.0,0): resolved to
multiple address, taking the first one
Mar 25 19:08:26 Rob-Dykes-Computer racoon: ERROR:
sockmisc.c:738:str2saddr(): getaddrinfo(192.168.0.0,0): resolved to
multiple address, taking the first one
Mar 25 19:08:26 Rob-Dykes-Computer racoon: ERROR:
sockmisc.c:738:str2saddr(): getaddrinfo(192.168.10.3,500): resolved to
multiple address, taking the first one
Mar 25 19:08:26 Rob-Dykes-Computer racoon: ERROR:
sockmisc.c:738:str2saddr(): getaddrinfo(192.168.10.3,500): resolved to
multiple address, taking the first one
Mar 25 19:08:29 Rob-Dykes-Computer racoon: ERROR:
isakmp_inf.c:848:isakmp_info_recv_n(): unknown notify message, no
phase2 handle found.
Mar 25 19:08:29 Rob-Dykes-Computer racoon: ERROR:
isakmp_inf.c:848:isakmp_info_recv_n(): unknown notify message, no
phase2 handle found.
Mar 25 19:08:48 Rob-Dykes-Computer racoon: ERROR:
isakmp_inf.c:848:isakmp_info_recv_n(): unknown notify message, no
phase2 handle found.
Mar 25 19:08:48 Rob-Dykes-Computer racoon: ERROR:
isakmp_inf.c:848:isakmp_info_recv_n(): unknown notify message, no
phase2 handle found.
Mar 25 19:08:58 Rob-Dykes-Computer racoon: ERROR:
pfkey.c:745:pfkey_timeover(): 80.46.98.226 give up to get IPsec-SA due to
Re: 10.3.80 to IPCOP 1.4.2
by Matt Hodson on 2005-04-15 12:20:24 +0200
Any luck on your problem?
I have just got a mac and trying to use securitas to connect as an l2tp road
warrior to a smoothwall network, but I get the same errors in the log i.e.
line 3: Unknown error at [192.168.111.0]
line 3: Unknown error at [192.168.111.31]
line 4: Unknown error at [192.168.111.31]
line 4: Unknown error at [192.168.111.0]
add net 192.168.111.0:gateway gif0
Apr 15 09:39:03 Junta racoon: ERROR: sockmisc.c:738:str2saddr():
getaddrinfo(
etc ......
using osx 10.3.8
ipsecuritas 2.0.6
Regards
Matt
Re: 10.3.80 to IPCOP 1.4.2
by Tsathul on 2005-04-22 19:26:06 +0200
Similar problems here with OS X 10.3.8 and IPSecuritas 2.0.6. Tried
changing to dialup and back to network (read somewhere that this resets
some network settings that can get corrupted in OS X 10.3) but that had no
effect.
So, used the recent combo updater to OS X 10.3.9 and hey! It actually
started negotiating with the ZyWALL router at headquarters. Some
configuration debugging and then the link was up.
IPSecuritas has been out for awhile so it must have worked with earlier
versions of OS X 10.3. However there may be something faulty added in
10.3.8 that was fixed in 10.3.9? Or maybe just rebooting solved the
problem and the update is a red herring.
Regardless, all is not perfect, my connection dropped this morning and now
I can't seem to restore it. If it's not one thing it's another.
alias IP address on the Mac
alias IP address on the Mac
by Thomas on 2005-03-31 12:03:07 +0200
Hi
I have successfully managed to get VPN Tracker to work with my Linksys
rv082 router despite the fact that my client machine resides behind a NAT
firewall. To do this I had to set a virtual ip in VPN Tracker.
Does anyone know if a virtual ip adress can be set in IPSecuritas? And if so
how?
Strangeness with port 9 at startup...
Strangeness with port 9 at startup...
by NickBoz on 2005-04-01 06:36:44 +0200
I'm curious about the usage of port 9 by IPSecuritas. When starting the
latest version of the application, it immediately tries to contact the various
IPSec tunnel destination via port 9 (aka Discard protocol).
Since the IPsec destination address is to my firewall's built in IPSec VPN
Server, it immediately closes down the socket and blocks the outside IP
address I was using. I have the firewall's intrusion detection system turned
on. As a result of the close, IPSecuritas fails immediately and contains
nothing in its log.
Now, I can turn all of this firewall blocking off, but what I don't understand
is why this would ever work. Who is going to have a system available on the
Internet that will respond to queries on port 9? It is unsafe and clearly not
part of the standard specs I have been reading.
Furthermore, it prevents IPSecuritas from working at all. If I try the same
configuration in VaporSec, I can at least get to the negotiation stage of
phase 1.
Anyone have any ideas as to why port 9 is used? Can it be turned off?
Thanks,
Nick
Re: Strangeness with port 9 at startup...
by cnadig on 2005-04-11 00:22:24 +0200
Hello Nick,
a UDP packet to port 9 is sent to start the key exchange by racoon without this packet, racoon will only start the key exchange and thus
establish the tunnel with the first user traffic for the remote network.
You can switch this off by disabling the 'Establish IKE immediatly' option in
your connection definition. In this case, you need to access the remote
network manually to start IKE.
Christoph
Tiger compatibility
Tiger compatibility
by AaronA1975 on 2005-04-04 19:10:51 +0200
Is the current version of IPSecuritas compatible with Tiger, or will there be
an update issued?
Re: Tiger compatibility
by Andreas Ley on 2005-04-27 16:04:08 +0200
Seems to work fine on 10.4, Build 8A428. But the Finder still stops
responding whenever a connected AFP volume doesn't respond fast
enough, which is a pain, but nothing to blame Lobotomo for. :)
Re: Tiger compatibility
by jayk on 2005-04-30 09:41:17 +0200
There is a minor incompatibility that I noticed.
The 'replace DNS' settings option in preferences no longer works under
tiger. It does put the info in the /etc/resolv.conf - but apparantly Tiger
ignores that now. I think it has to go into netinfo or something for it to be
effective.
Re: Tiger compatibility
by UncleRobin on 2005-05-01 01:11:11 +0200
Without a doubt, IPSecuritas is the best VPN client I have used, by far.
However it seems like Tiger has crippled it. It works, but it is very
sluggish. Ping packets that where taking 40ms to return are now typically
500ms and more if they return.
UR
Re: Tiger compatibility
by Influence on 2005-05-01 17:02:00 +0200
I've noticed the same issue as UncleRobin:
Since upgrading to tiger the latacy went up from 100ms to 1000ms
rendering my vpn connection basically unusable (at the very least for
interactive applications like ssh).
Any idea what's the problem?
Thanks,
Influence
Re: Tiger compatibility
by RotundRanter on 2005-05-02 03:47:42 +0200
I am seeing the same thing, seems connections still work but are really
slow, to the point of being unusable. I've noticed it with Windows shares
and ssh/sftp. Anyone have a workaround? I could provide Ethereal output
if that helps.
NAT-T work ?
NAT-T work ?
by befek-18 on 2005-04-12 09:49:15 +0200
Hallo,
short question.
Is here someone with a working nat-traversal enviroment.
(Ipsecuritas behind a NAT Router over UDP/4500).
Uwe
Re: NAT-T work ?
by Sander on 2005-04-22 22:46:10 +0200
I had the same question and I e-mailed Lobotomo about it. At this moment
Mac OS X does not support NAT-T. It will come with Mac OS X Tiger but it
only supports one implementation of NAT-T which is probably not
compatible with most routers/vpn servers.
Connect to D-Link DFL-200
Connect to D-Link DFL-200
by Essington on 2005-04-23 02:52:50 +0200
I am trying to connect to a D-Link DFL-200, and am getting an error:
Invalid exchange type 6 from xxx.xxx.xxx.xxx
any idea where I should start mucking around to alleviate this?
Any ideas would be most helpful
Thanks
-jason
Re: Connect to D-Link DFL-200
by dkreutz on 2005-08-20 18:40:46 +0200
I use Ipsecuritas to connect to a DLink DFL-700.
On the firewall configure a VPN of roaming-type. Enter local network and
preshared secret key. Do not change any of the advanced settings.
Ipsecuritas configuration as following:
General - Exchange mode: main, Proposal check: claim, Nonce size 16
Phase1 - Lifetime 28800, DH group: Mod1024 (2), Encryption: AES 128,
Authentication: MD5
Phase1 - Lifetime 28800, PFS group: Mod1024 (2), Encryption:
DES/3DES/AES 128, Authentication: HMAC MD5/HMAC SHA1
ID/Auth - Local identifier: Address, Remote identifier: Address, enter
preshared secret key (same as above)
Options: Initial contact, Generate policy, MIP6, Establish IKE immediately
IPSecuritas SonicWall Pro 230
IPSecuritas SonicWall Pro 230
by stewymac on 2005-05-01 15:39:12 +0200
Hi folks,
I am having troubles getting IPSecuritas 2.0.6 to work with my SonicWall Pro
230 and Mac OS X 10.3.9. I have tried creating a seperate SA and tried
using the GroupVPN, but no luck. I was hoping someone could post their
Client and firewall config. I have been through the Forums and have tried all
the suggestions....any help would be really great.
Thanks
stewymac
Re: IPSecuritas SonicWall Pro 230
by Guest on 2005-07-28 20:32:07 +0200
Bump to this having same issue with Sonicwall Firmware upgrade 3.1
Tiger Compatibility
Tiger Compatibility
by cnadig on 2005-05-01 22:22:59 +0200
Hello,
there have been a number of user reports on IPSecuritas on Tiger. So far,
the following problems have been reported to us:
a. Tunnel establishes normal, but throughput is very bad, packet round-trip
times (ping) between 500 and 1000ms (on connections with approx 50ms
before). This seems to be a bug in the MacOS kernel.
b. DNS replacement does not work anymore - the settings are ignored.
c. In one case, the tunnel could not be established at all.
We are working on problems b. and c., while only Apple can resolve a. At
the moment we don't recommend to update to Tiger if you rely on VPN
connectivity.
More user feedback (positive or negative) is highly appreciated - please
include a short summary of your setup (peer device, mode of operation etc.)
Any progress will be made public on [url]http://www.lobotomo.com[/url]
and in this forum.
Thanks,
Christoph
Re: Tiger Compatibility
by Kevin on 2005-05-02 02:51:47 +0200
I've been hit by a & b. My ping times are 1000ms range (slightly over
actually.)
For the DNS issue, my resolv.conf does change, but the settings in it are
ignored.
Kevin
Re: Tiger Compatibility
by frogmella on 2005-05-03 13:00:18 +0200
Using IPSecuritas to connect to a CheckPoint SecuRemote VPN.
The good news is that IPSecuritas does actually create the connection (this
was not working in earlier betas of Tiger). But yes, (a) is a problem although I can SSH to servers within my company, it's slow, and mail.app
fails connecting to our Exchange server.
I don't use (b) - yet - and haven't done enough testing to see if (c) occurs.
Thanks for the excellent work!
Re: Tiger Compatibility
by J Mitchell on 2005-05-03 14:39:42 +0200
I can confirm the 1000ms ping time.
The tunnel to a gnatbox GB-1000 is established but performance is very
poor.
Mac OS X 10.4 dual 500.
Thanks
Jonathan
Re: Tiger Compatibility
by Matthias on 2005-05-03 16:42:53 +0200
Same problem here 2.06 with OSX 10.4 Various Macs connection to
Checkpoint FW1
Tunnel seems to be working
Ping >1000
DNS replacement seems to work because on the commandline the nslookup
or dig do work ok, however the Browser does not seem to pickup the DNS
Settings.
Hope that helps, can provide more details if anybody wants...
thanks for the great app, and letґs hope weґll solve this fast...
Matthias
Re: Tiger Compatibility
by Terry Katz on 2005-05-03 23:14:02 +0200
Same issues here. 1000ms ping times, mostly unuseable.
OSX 10.4 on a PM G5 Dual 2.5ghz, and a 17" PB 1ghz connecting to various
SonicWall devices.
-Terry
Re: Tiger Compatibility
by Cid Matrix on 2005-05-04 16:10:39 +0200
Upgraded my PB to Tiger. I'm having issue "c" while attempting to connect
to my corporate Sonicwall firewall.
Re: Tiger Compatibility
by Andreas Ley on 2005-05-05 00:30:00 +0200
Etablishing a "Host To Network" tunnel to a monowall (http://m0n0.ch/wall)
works fine, but I too have the problem with high pings (>1000ms).
I thought my WLAN was the cause, but apparently it isn't...
Re: Tiger Compatibility
by Craig on 2005-05-05 01:28:35 +0200
Also seeing the (a) & (b) problems connecting from a test system (old 600
mhz G3 iBook) to a Netgear FVX538 in a Host-To-Network configuration.
In testing, I noticed that the DNS for "host myserver.mydomain.com"
worked most of the time (with the occasional ";; connection timed out; no
servers could be reached" because of the lag time.)
But when pinging that same name, you get a "ping: cannot resolve
myserver.mydomain.com: Unknown host".
Thought there might be an issue with lookupd overriding resolv.conf, but
the configuration looks the same as in Panther:
-------% lookupd -configuration
ConfigSource: default
LookupOrder: Cache NI DS
MaxIdleServers: 4
MaxIdleThreads: 2
MaxThreads: 64
TimeToLive: 43200
Timeout: 30
ValidateCache: YES
ValidationLatency: 15
_config_name: Global Configuration
LookupOrder: Cache FF DNS NI DS
_config_name: Host Configuration
LookupOrder: Cache FF NI DS
_config_name: Service Configuration
LookupOrder: Cache FF NI DS
_config_name: Protocol Configuration
LookupOrder: Cache FF NI DS
_config_name: Rpc Configuration
TimeToLive: 60
ValidateCache: NO
_config_name: Group Configuration
TimeToLive: 300
ValidateCache: NO
_config_name: Initgroup Configuration
LookupOrder: Cache FF DNS NI DS
_config_name: Network Configuration
-------A "lookupd -flushcache" didn't help.
-ch
Re: Tiger Compatibility
by Craig on 2005-05-05 01:48:37 +0200
Looks like my suspicion about lookupd being the culprit is correct:
-------% lookupd -d
> hostWithName: myserver.mydomain.com
nil
> hostWithName: mydomain.com
Dictionary: "DNS: host mydomain.com"
_lookup_DNS_domain: org
_lookup_DNS_server: 192.168.2.1
_lookup_DNS_time_to_live: 3600
_lookup_DNS_timestamp: 1115249859
_lookup_agent: DNSAgent
_lookup_info_system: DNS
interface: 5
ip_address: 99.99.99.99
name: mydomain.com
+ Category: host
+ Time to live: 43200
+ Age: 38 (expires in 43162 seconds)
+ Negative: No
+ Cache hits: 1
+ Retain count: 3
> quit
-------192.168.2.1 is the IP address of the wireless router I'm testing with (my
host was assigned an IP of 192.168.2.8 ).
The 99.99.99.99 is the public address of mydomain.com, not the one
returned by the DNS server that sits behind the firewall.
The nil response for the server explains why ping isn't happy.
Hope this information is helpful.
-ch
Re: Tiger Compatibility
by Todd I on 2005-05-07 02:00:25 +0200
I am seeing the same thing, with Tiger IPSec through a Linksys WRV54G
gateway.
PING 10.10.10.9 (10.10.10.9): 56 data bytes
64 bytes from 10.10.10.9: icmp_seq=0 ttl=63
64 bytes from 10.10.10.9: icmp_seq=1 ttl=63
64 bytes from 10.10.10.9: icmp_seq=2 ttl=63
64 bytes from 10.10.10.9: icmp_seq=3 ttl=63
64 bytes from 10.10.10.9: icmp_seq=4 ttl=63
time=293.814 ms
time=1093.747 ms
time=1095.896 ms
time=816.548 ms
time=1093.376 ms
Are there any other general MacOS X forums, or Apple www sites, where we
should be submitting information about this?
Re: Tiger Compatibility
by David on 2005-05-07 07:07:39 +0200
Yup, same here. Ping times are about 1020 ms from a Powerbook G4 to
OpenBSD 3.6 gateways running isakmpd. The high delay breaks virtual
clients like VNC and Remote Desktop Connection.
Re: Tiger Compatibility
by Amanda Walker on 2005-05-10 21:03:00 +0200
Interestingly enough, I'm not seeing any performance difference under 10.4
talking to either FreeBSD 5.3 or a Netscreen firewall. Seems to work fine,
with round trip times indistinguishable from running under 10.3.8.
Re: Tiger Compatibility
by andreast on 2005-05-11 17:05:57 +0200
Apple can be notified of this bug here:
http://www.apple.com/macosx/feedback/
If many of us send them a message, maybe they will do something.
Re: Tiger Compatibility
by filipp on 2005-05-14 22:36:22 +0200
Same problem here.
Running IPSecuritas on 10.4 to Netgear FVS338
Ping is pretty much exactly 1000 msec over usual (1035 instead of normal
35)
Interesting, when i simultaniously ping the Internet IP of the Netgear, the
ping times are down to 550, then go back up to 1035 when I stop pinging
the public address.
/ filipp
Re: Tiger Compatibility
by atze on 2005-05-16 11:36:02 +0200
i get this on stopping ipsec - the app still runs, seems to be a subprocess:
2005-05-16 11:35:01 +0200
EXC_BAD_ACCESS (0x0001)
KERN_INVALID_ADDRESS (0x0001) at 0xc000429b
Thread 0 Crashed:
0 removedir + 168
1 removecerts + 52
2 performstop + 52
3 main + 320
4 _start + 380
5 start + 48
Re: Tiger Compatibility
by Scott Hander on 2005-05-16 20:28:03 +0200
I upgraded to 10.4 before finding there was a problem with IPSecuritas and
10.4, but I was able to use it with Apple Remote Desktop. The connection
was a little odd (it was a little slower than usual and there were several
disconnects, but it did work). The connection was a 10.4 system to a
remote SonicWall firewall and a server on the other side of the firewall. I
thought I would mention this in response to the comments about VNC and
MS RDC.
Re: Tiger Compatibility
by bluemeanie on 2005-05-17 02:09:22 +0200
It looks like 10.4.1 does nothing to fix the issue. I'm still getting no VPN
connection to our OpenBSD server (not even a 1000ms response time).
I miss my VPN. :'(
Re: Tiger Compatibility
by Draven Weston on 2005-05-17 03:48:39 +0200
I just updated to 10.4.1 and I am seeing a vast improvement in
performance with IPSec. Ping times are down to about 20 ms from
1000+ms
Re: Tiger Compatibility
by RotundRanter on 2005-05-17 07:26:37 +0200
10.4.1 fixes my problems connecting to a GTA Gnatbox. Pings are back
down to 35mS and files transfers once again fill the T1 pipe at work. w00t!
Re: Tiger Compatibility
by Matt on 2005-05-17 15:40:58 +0200
Anyone tried this with 10.4.1? Apparently the update has fixed problems
with VPNTracker, so fingers crossed...
http://www.macnn.com/print/29256
Re: Tiger Compatibility
by Dan on 2005-05-17 21:12:10 +0200
Howdy,
These ping times are from 10.4.1...
192.168.253.0/24[any] x.x.x.x[any] any
in ipsec
esp/tunnel/x.x.x.x-x.x.x.x/require
spid=16 seq=1 pid=904
refcnt=1
x.x.x.x[any] 192.168.253.0/24[any] any
out ipsec
esp/tunnel/x.x.x.x-x.x.x.x/require
spid=17 seq=0 pid=904
refcnt=1
dhcp-248:~ dan$ ping 192.168.253.2
PING 192.168.253.2 (192.168.253.2): 56 data bytes
64 bytes from 192.168.253.2: icmp_seq=0 ttl=64 time=38.098
64 bytes from 192.168.253.2: icmp_seq=1 ttl=64 time=35.874
64 bytes from 192.168.253.2: icmp_seq=2 ttl=64 time=39.370
64 bytes from 192.168.253.2: icmp_seq=3 ttl=64 time=39.581
64 bytes from 192.168.253.2: icmp_seq=4 ttl=64 time=40.872
64 bytes from 192.168.253.2: icmp_seq=5 ttl=64 time=40.179
64 bytes from 192.168.253.2: icmp_seq=6 ttl=64 time=39.722
64 bytes from 192.168.253.2: icmp_seq=7 ttl=64 time=37.892
64 bytes from 192.168.253.2: icmp_seq=8 ttl=64 time=39.310
64 bytes from 192.168.253.2: icmp_seq=9 ttl=64 time=39.321
ms
ms
ms
ms
ms
ms
ms
ms
ms
ms
Looks like no more latency in 10.4.1
Re: Tiger Compatibility
by evilmeanie on 2005-05-18 05:53:39 +0200
Well, I fixed my problem. It was the encryption algorithm used in
quick-mode (Phase 2).
Out of AES, only AES-128 will allow packets to pass now. Blowfish doesn't
work, either. 3DES does work. I didn't try anything else.
It seems odd. Why would some algorithms just stop working in Tiger?
Should I stick with AES or go 3DES? Or Cast?
Re: Tiger Compatibility
by Jayk on 2005-05-18 21:16:57 +0200
Hi all,
I have stumbled onto the 'no connection' solution. With IPSecuritas 2.1 and
Tiger 10.4.1 - I can get my VPN working again - although I had to adjust
my settings a little.
I had to disable all but AES128 on the 'phase 2' screen. Prior to Tiger, AES
256 would work, as would blowfish.
With 10.4 - having AES 256 enabled would result in no functional
connection - IPSecuritas would show the green check, but packets would
not pass.
Now, AES 128 works and the others do not. Disabling everything but AES
128 worked for me.
Hope this helps others get their VPN working again.
Jay
Re: Tiger Compatibility
by Henrik on 2005-05-23 14:50:25 +0200
Hello,
I still have problems with IPsecuritas 2.1 and OS X 10.4.1, connecting to a
Linux FreeS/WAN box.
The connection has always been established without problems, but when
trying to access any machines, it will not. If I ping my VPN IP (that ifconfig
states) it just says no route to host. Very strange...
Any ideas?
Henrik
Watchgaurd Firebox X500 VPN
Watchgaurd Firebox X500 VPN
by Ben Thomas on 2005-05-13 00:18:10 +0200
Hi,
I have been trying for a few months now to connect to a Firebox X500 VPN
using VPN Tracker but have had no luck. Are there any particular issues i
should be on the lookout for concerning the Firebox X500 and settings in IP
Securitas, VPN Tracker or OSX 10.3.9 in general?
I am able to connect using the Watchgaurd VPN client using a PC on my
existing Airport Wireless network. I have the BSD Subsystem installed and
have triple checked passwords and all settings to make sure they are
accurate.
Thanks for any help,
Ben
Re: Watchgaurd Firebox X500 VPN
by cnadig on 2005-05-13 23:18:28 +0200
Hello Ben,
please send me the ouput from the log window to [email protected] with
the log level set to verbose debug (in IPSecuritas' settings).
Please make sure to remove all confidential information like firewall IP
address.
Christoph
Re: Watchgaurd Firebox X500 VPN
by ben on 2005-05-14 03:44:40 +0200
Hi,
I sent you a PM but not sure if it went through, is there an email address I
can send my log file to?
Thanks again,
Ben
Re: Watchgaurd Firebox X500 VPN
by ben on 2005-05-18 16:45:33 +0200
Hi,
Just wondering what the status of my support request is and if you have the
time to help me out.. Thanks again
Re: Watchgaurd Firebox X500 VPN
by david on 2006-07-04 15:21:37 +0200
Hi all,
I'm trying to configure a VPN network with my firebox 500, but i cannot
access to Policy Manger->Network->Remote User ! :-(
And when i use VPN Wizard, it says "VPN module is not loaded onto the
firebox!"
I need help, thanks in advance for your help, you can contact by mail
[email protected]
IPSEC vulnerability: advice?
IPSEC vulnerability: advice?
by tiffert on 2005-05-13 04:16:27 +0200
Having read the NISCC advisory on IPSEC vulnerability, a newbie like me is a
little unclear on what to do about it.
http://www.niscc.gov.uk/niscc/docs/al-20050509-00386.html?lang=en
I wonder if someone could offer configuration advice for IP Securitas that
addresses the vulnerability.
I have a Linksys BEFVP41 (vers. 1) router. What configuration options
should I look at there?
TIA!
Re: IPSEC vulnerability: advice?
by cnadig on 2005-05-13 23:13:55 +0200
Hello,
the advisory describes a possible vulnerability for configurations that don't
use encryption and/or authentication.
In order to prevent such a configuration, disable Null encryption and Null
authentication on the Phase 2 tab in IPSecuritas. These options are meant
for debugging purposes of a connection only and I'm thinking of removing
them in future releases.
Cheers,
Christoph
Tiger 10.4.1 OK
Tiger 10.4.1 OK
by UncleRobin on 2005-05-17 01:49:24 +0200
It appears, at least on my computer, the 10.4.1 update fixes the problem
with latency. My ping times are back to normal. :)
UR
Re: Tiger 10.4.1 OK
by jonathan mitchell on 2005-05-17 10:45:55 +0200
I can confirm that the 10.4.1 update restores the ping time. VNC and RDP
client performance back to normal.
Jonathan
Juniper Netscreen 25 working config
Juniper Netscreen 25 working config
by Robert on 2005-05-18 04:57:28 +0200
In case anyone is interested, I got Ipsecuritas to work with my Netscreen
25.
I used the documentation on the vpntracker.com site and configured the
vpn for use this vpntracker client (tested with the demo version) then
simply duplicated most of the settings with ipsecuritas (and did some trial
and error for settings that were not shown in vpntracker).
Hope this helps someone.
Here is the info:
I followed the steps in this document to setup the netscreen using the
single user setup.
http://www.equinux.com/cms_components/us/products/vpntracker/media
/files/HowTo_Netscreen_Rev_4.0.pdf
General
Host to Network
Remote Ipsec Device <ip address of your netscreen untrust interface>
Remote Network <internal network that you are connecting to
192.168.1.0/24>
Exchnage Mode Aggressive
Proposal Check Claim
Nonce Size 16
Phase 1
Lifetime 3600
DH Group Mod1024(2)
Encryption 3DES
Authentication SHA1
Phase 2
Lifetime 28800
PFS Group None
Encryption DES and 3DES checked
Authentication HMAC MD5 and HMAC SHA1 checked
Id/Auth
Local Identifier DN <identifier you used for the user you set up in the
Netscreen>
Remote Identifier Address
Preshared Secret <the secret you put in the netscreen setup>
Options
Compression Deflate grayed out but checked
IPSec DOI not checked
SIT_IDENTITY_ONLY checked
Verify Identifier not checked
Initial Contact checked
Passive not checked
Generate Policy not checked
MIP6 checked
Verify Certificate not checked
DHCP Pass-through checked
Establish IKE immediately checked
Auto Start not checked
Re: Juniper Netscreen 25 working config
by Andre Knudsen on 2005-12-15 14:23:35 +0100
Thanks I've been looking for this for connection to a few 5GT's and 5XP's
Administrator rights at first startup?
Administrator rights at first startup?
by Michael Kussmaul on 2005-05-18 21:28:46 +0200
I like IPSecuritas, it works quite well!
I only have a quick question, I have not found an answer so far: When I first
startup IPSecuritas, it asks me to enter my administrator password, for what
operation does it need it? (E.g. which file(s) does it install/alter on the
system)
many thanks
Michael
Re: Administrator rights at first startup?
by cnadig on 2005-05-24 12:12:03 +0200
Hello Michael,
certain operations require administrator's priviledges (such as changing the
routing tables, adding security associations to the kernel and running
racoon, the IKE daemon). All of these operations are performed by a
background process called vpntool, which needs to have these priviledges in order to acquire them, the administrator's password is queried the first
time it runs (please note that this is part of the authentication and
authorisation framework of MacOS X - the password is not stored by nor is
it even visible to IPSecuritas).
Christoph
D-Link DI-804HV Compatability?
D-Link DI-804HV Compatability?
by hammer32 on 2005-05-20 14:45:58 +0200
Does anyone have any tips for configuring ISSecuritas with a D-Link
DI-804HV router?
Thanks!
-Sean
Re: D-Link DI-804HV Compatability?
by Mikael on 2005-10-18 14:27:01 +0200
Had a try, but didn't make it. Does not say it doesn't work, but it is,
apparently, not a straightforward setup. I will be trying something else...
Re: D-Link DI-804HV Compatability?
by hammer32 on 2005-10-18 15:24:12 +0200
I tried VPNTracker, they didn't have one to test, but I was able to set it up
and have used it while on the road for several months. So far so good!
Re: D-Link DI-804HV Compatability?
by Randall on 2006-02-11 06:51:32 +0100
[quote]Does anyone have any tips for configuring ISSecuritas with a D-Link
DI-804HV router?[/quote]
Has anybody found a setup since? I feel like I'm close, but it's not working..
Re: D-Link DI-804HV Compatability?
by Randall on 2006-02-19 00:18:31 +0100
[quote author=Randall link=1116593158/0#3 date=1139637092]
Has anybody found a setup since? I feel like I'm close, but it's not working..
[/quote]
I got mine working (with two different DI-804HV's, actually). I think I had
the remote network address and subnet a little mixed up and that was
preventing success. Everything's good now, with a Rev A1 box with FW 1.40
and and a Rev C1 box with FW 1.42.
If anyone needs help, post here and I'll try to provide a little writeup.
Randy
Re: D-Link DI-804HV Compatability?
by Red on 2007-01-09 20:49:06 +0100
I have an 804 at home and an 808 at the office, I would like to use them
with IPSecuritas. Your setup tips would be very much appreciated. The
D-Link docs are worthless.
I had a Trendnet VPN router before and it had MUCH better documentation
and configuration. Fairly easy to set up with IPSecuritas. The Trendnet just
didn't jive with the Riverstone/Lucent fiber-backbone router we connect to
and finally went nuts.
We have a SonicWall Firewall/VPN appliance in the server room, also no
problems with IPSecuritas on that. Great app.
AH Only configuration using ipsecuritas?
AH Only configuration using ipsecuritas?
by Terr-Oz on 2005-05-31 21:47:38 +0200
Has anyone been able to configure ipsecuritas for this setkey policy?
ah/transport/src-dst/require;
?
IPSecuritas appears to only configure racoon for esp.
Re: AH Only configuration using ipsecuritas?
by cnadig on 2005-06-07 08:37:45 +0200
Hello,
IPSecuritas does not support AH at the moment as I thought it was pretty
much obsolete. However, if the demand for AH is here, I think about
implementing it in the next major release.
Christoph
Re: AH Only configuration using ipsecuritas?
by tji on 2005-07-08 20:02:53 +0200
Terr-Oz: Many VPN devices don't support AH.. Instead, they use ESP with
NULL encryption, effectively achieving the same thing as AH.
One of the major reasons AH is not used is because Network Address
Translation (NAT), used on just about every broadband gateway, breaks AH.
ESP works through NAT, so more people use it.
IPSecuritas connectivity to SonicWall TZW
IPSecuritas connectivity to SonicWall TZW
by George Zervakos on 2005-06-03 15:43:14 +0200
Hello,
I was wondering if anyone has been successful in setting up a VPN tunnel
from Mac OS X with IPSecuritas to a SonicWall TZW or something similar?
I have been successful in getting the tunnel negotiation to succeed (at least
that's what logs on both ends would lead me to believe); I get a green arrow
in the IPSecuritas interface after hitting start ipsec, and I also see a green
icon LED in the SonicWall's GUI and a log entry stating that Phase 2 has
been successfully completed.
The problem comes in when I want to ping something (from the Mac) that is
on the LAN interface of the SonicWall. It seems that packets are not getting
sent through the tunnel at all. I see no entries in the SonicWall's logs. I
have put the SonicWall LAN subnet as the destination network in
IPSecuritas.
I might add that the Mac is behind a firewall and has a private IP that gets
NATted to a public IP. Will this scenario work with the NAT or does the Mac
need to have the private IP making it the edge device?
Does anyone have any troubleshooting ideas or places where I could look
for some help?
Thanks,
George
Re: IPSecuritas connectivity to SonicWall TZW
by cnadig on 2005-06-07 08:46:03 +0200
Hello,
most modern NAT routers support IPSec-Passthrough of at least one IPSec
tunnel, so this is probably not your problem - of course a direct connection
to the internet at least for tests would rule this out.
Another problem might be an address conflict between your local addresses
and the network your trying to reach - is your local address within the
remote network range?
Another problem could be that the remote firewall will not route private
addresses (other than the ones configured), so you might want to try
entering a different IP address into the Local Address field on the General
tab in IPSecuritas (your machine will then appear at this address for the
remote machines - if the field is empty, your default interface's address is
used instead).
There's also some problems with the new AES implementation in Tiger, I'd
recommend 3DES for best compatibility.
Christoph
Re: IPSecuritas connectivity to SonicWall TZW
by George Zervakos on 2005-06-09 22:58:20 +0200
Hello,
I did a tcpdump on the Mac OS X and I see that traffic bound for the remote
network is getting encapsulated in ESP.
The thing is, I'm running Mac OS X on a PC in a program called PearPC. In
order to get networking in PearPC, I had to share my PC's LAN connection
and assign a private IP to the Mac OS X. What happens is the Mac OS X has
a 192.168.0.0 IP and my PC has a 10.0.0.0 IP. While I can access the
Internet from PearPC using Safari for example, ESP packets are not getting
passed along from my PC out to the internet.
The Mac IP is getting NATted by my PC whose IP is in turn getting NATted
by my firewall.
There are no address conflicts with the VPN domains; these are distinct
subnets.
Geirge
Immediate Red X
Immediate Red X
by Kevin Mader on 2005-06-03 16:43:05 +0200
I am trying to setup a connection to a SonicWALL TZ 170 -SP Wireless and I
think I know all the correct settings, but when I put them in a red X apears
next to my connection icon before I even have time to connect. The log is
empty because all I have done is edit the connection.
Thank you
Checkpoint and IPSecuritas
Checkpoint and IPSecuritas
by Art_of_Noise on 2005-06-04 21:42:14 +0200
Hi everybody,
I'm trying to connect to my work network (firewall : Checkpoint). I'm using
a powerbook with Mac OS 10.4.1. My preferences are "host to network" and
the authentification is by address and preshared key.
The light becomes green, but I can't check my network. Here are the last of
the log. All seems to be okay, but when I test the connection (for example
making a traceroute), the text "msg 4 not interesting" is added in the log.
Can anybody help me ? Thanks a lot in advance.
Jun 4 21:18:28 Ordinateur-de-MY racoon: DEBUG:
pfkey.c:1117:pk_recvupdate(): pfkey UPDATE succeeded: ESP/Tunnel
217.167.X.X->82.227.X.X spi=147717185(0x8cdfc41)
Jun 4 21:18:28 Ordinateur-de-MY racoon: INFO:
pfkey.c:1124:pk_recvupdate(): IPsec-SA established: ESP/Tunnel
217.167.X.X->82.227.X.X spi=147717185(0x8cdfc41)
Jun 4 21:18:28 Ordinateur-de-MY racoon: DEBUG:
pfkey.c:1162:pk_recvupdate(): ===
Jun 4 21:18:28 Ordinateur-de-MY racoon: DEBUG:
pfkey.c:195:pfkey_handler(): get pfkey ADD message
Jun 4 21:18:28 Ordinateur-de-MY racoon: DEBUG2:
plog.c:199:plogdump():
Jun 4 21:18:28 Ordinateur-de-MY racoon: INFO:
pfkey.c:1351:pk_recvadd(): IPsec-SA established: ESP/Tunnel
82.227.X.X->217.167.X.X spi=2149506554(0x801eddfa)
Jun 4 21:18:28 Ordinateur-de-MY racoon: DEBUG:
pfkey.c:1356:pk_recvadd(): ===
Jun 4 21:19:22 Ordinateur-de-MY racoon: DEBUG:
grabmyaddr.c:340:update_myaddrs(): msg 4 not interesting
Re: Checkpoint and IPSecuritas
by cnadig on 2005-06-07 08:35:09 +0200
Hello,
are you by any chance using AES256 or AES192 for encryption? The AES
encryption in 10.4 is not compatible wuith checkpoint's implementation
anymore. Use 3DES for best compatibility (AES128 seems to work in some
cases, so you might want to try this as well).
Christoph
Re: Checkpoint and IPSecuritas
by Art_of_Noise on 2005-06-07 08:54:00 +0200
[quote author=cnadig link=1117914134/0#1 date=1118126109]Hello,
are you by any chance using AES256 or AES192 for encryption? The AES
encryption in 10.4 is not compatible wuith checkpoint's implementation
anymore. Use 3DES for best compatibility (AES128 seems to work in some
cases, so you might want to try this as well).
Christoph[/quote]
Thanks for your response. But I'm already using 3DES for encryption in
phase 1 and phase 2.
Re: Checkpoint and IPSecuritas
by tji on 2005-07-08 19:59:12 +0200
There are also dependancies on the gateway configuration.. If the
administrator has enabled the client integrity checking features (where it
checks to make sure the host OS is patched up to date, antivirus is running,
etc.) it will only work with the Check Point client (SecureClient).
If the administrator turns that feature off, IPSecuritas will work fine.
Also, Check Point (finally) released their MacOS X VPN client not too long
ago. So, you may want to try that one out instead.
Re: Checkpoint and IPSecuritas
by MikeyG_U2 on 2005-07-12 18:42:42 +0200
I don't mean to jack your thread, I'm just hoping that by posting my
problem in your thread we might both find a solution...
I've also been having trouble accessing our Checkpoint VPN. I'm running
Tiger so the SecureClient doesn't work for me yet. I've followed all the
setup guides for both IPSecuritas and the Checkpoint firewall itself, but still
can't create a connection. The little red 'X' is all I get.
I'm using IPSecuritas 2.1(on Mac OS 10.4.1) and I've tried enabling only the
security protocols mentioned earlier in this topic. I admit that I am new to
IPSecuritas, only attempting to make it work after I upgraded to Tiger and
broke the SecureClient. So I've never had IPSecuritas working. If anyone
has any suggestions, I would greatly appreciate it. In case it helps, here is
my most recent connect log, I'm not getting nearly as far as Art_of_Noise...
Log output from IPSecuritas 2.1
Jul 12 11:15:06 mailman IPSecuritas: Parsing configuration
Jul 12 11:15:06 mailman IPSecuritas: Setting up racoon.conf
Jul 12 11:15:06 mailman IPSecuritas: Setting up setkey.conf
Jul 12 11:15:06 mailman IPSecuritas: Setting up psk.txt
Jul 12 11:15:06 mailman IPSecuritas: Setting up tunnel.conf
Jul 12 11:15:06 mailman IPSecuritas: Parsing configuration done
Jul 12 11:15:07 mailman IPSecuritas: Starting racoon...
Jul 12 11:15:08 mailman IPSecuritas: Racoon is running
Jul 12 11:15:08 mailman IPSecuritas: Set kernel keys
Jul 12 11:15:08 mailman racoon: DEBUG2: cfparse.y:1413:cfparse(): parse
successed.
Jul 12 11:15:08 mailman racoon: DEBUG: isakmp.c:1592:isakmp_open():
192.168.69.69[500] used as isakmp port (fd=8)
Jul 12 11:15:08 mailman racoon: DEBUG: isakmp.c:1610:isakmp_open():
192.168.69.69[4500] used as nat-t isakmp port (fd=9)
Jul 12 11:15:08 mailman racoon: DEBUG: pfkey.c:195:pfkey_handler(): get
pfkey X_SPDDUMP message
Jul 12 11:15:08 mailman racoon: DEBUG2: plog.c:199:plogdump():
Jul 12 11:15:08 mailman racoon: DEBUG: pfkey.c:210:pfkey_handler(): pfkey
X_SPDDUMP failed: No such file or directory
Thanks in advance for any assistance.
-Mike
Re: Checkpoint and IPSecuritas
by Art_of_noise on 2005-07-29 10:20:32 +0200
Hi everybody,
Finally I got the green check... The Smartdashboard configuration was not
correct (checkbox agressive not checked). In the Smartdashboard tool, open
the line of your extern access, click on the left on VPN, then on the
"traditional mode configuration button". Be sure checking all the option to
match the options choosen in IPSecuritas (don't forget the "advanced"
button").
Hope this help
Kinds regards
Re: Checkpoint and IPSecuritas
by Art_of_noise on 2005-08-01 19:29:03 +0200
Well, another point of study ! All is currently OK in direct access, but I
would use the routing functionnality on my modem.
When I active this functionnality, I get the green check, but I can't ping
anything.
I currently use the "network to network" mode of operation.
Here are the router properties, I'm not sure of these ports (IP of my
computer : 192.168.0.1 ; IP of the modem : 192.168.0.254) :
Port: 500 - Protocole: udp - Destination: 192.168.0.1 - Port: 500
Port: 500 - Protocole: tcp - Destination: 192.168.0.1 - Port: 500
Port: 264 - Protocole: tcp - Destination: 192.168.0.1 - Port: 264
Port: 265 - Protocole: tcp - Destination: 192.168.0.1 - Port: 265
Port: 266 - Protocole: tcp - Destination: 192.168.0.1 - Port: 266
Port: 3389 - Protocole: tcp - Destination: 192.168.0.1 - Port: 3389
Port: 9 - Protocole: udp - Destination: 192.168.0.1 - Port: 9
Port: 9 - Protocole: tcp - Destination: 192.168.0.1 - Port: 9
Can anybody help me ?
Thanks in advance for any help.
P.S. The Tiger version of the Checkpoint VPN client will not arrive before 6
months, dixit the Checkpoint support !!!
Re: Checkpoint and IPSecuritas
by VPNmac on 2005-08-06 23:05:30 +0200
I am also trying to get IPSecuritas 2.1 on Mac OS X at home to work with
CheckPoint VPN at my University. After configuring and clicking the Start
IPSec button, I get: IPSec startuo failed. The log just says: Log output from
IPSecuritas 2.1
Could someone post screen captures of a configuration that works with
CheckPoint?
Any help most appreciated.
Re: Checkpoint and IPSecuritas
by VPNmac on 2005-08-07 02:14:10 +0200
OK, I can get IPSecuritas to start now, but the connection gets a red cross
on the right. The log says:
----------------Log output from IPSecuritas 2.1
Aug 7 02:09:22 Mac IPSecuritas: Parsing configuration
Aug 7 02:09:22 Mac IPSecuritas: Setting up racoon.conf
Aug 7 02:09:22 Mac IPSecuritas: Setting up setkey.conf
Aug 7 02:09:22 Mac IPSecuritas: Setting up psk.txt
Aug 7 02:09:22 Mac IPSecuritas: Setting up tunnel.conf
Aug 7 02:09:22 Mac IPSecuritas: Parsing configuration done
Aug 7 02:09:23 Mac IPSecuritas: Starting racoon...
Aug 7 02:09:23 Mac IPSecuritas: Racoon is running
Aug 7 02:09:23 Mac IPSecuritas: Set kernel keys
Aug 7 02:09:23 Mac racoon: ERROR: isakmp_inf.c:142:isakmp_info_recv():
ignore information because the message has no hash payload.
Aug 7 02:09:23 Mac racoon: ERROR: isakmp_inf.c:142:isakmp_info_recv():
ignore information because the message has no hash payload.
----------------------Any feedback most welcome.
Re: Checkpoint and IPSecuritas
by VPNmac on 2005-08-07 02:16:44 +0200
More from the log:
-----------Aug 7 02:09:55 Mac racoon: ERROR: isakmp.c:2045:isakmp_chkph1there():
phase2 negotiation failed due to time up waiting for phase1. ESP
150.214.231.234->172.26.0.2
Aug 7 02:09:55 Mac racoon: ERROR: isakmp.c:2045:isakmp_chkph1there():
phase2 negotiation failed due to time up waiting for phase1. ESP
150.214.231.234->172.26.0.2
Aug 7 02:11:23 Mac racoon: ERROR: isakmp.c:1706:isakmp_ph1resend():
phase1 negotiation failed due to time up.
3c45f68e73644412:f9fbeadda5cbbeda
Aug 7 02:11:23 Mac racoon: ERROR: isakmp.c:1706:isakmp_ph1resend():
phase1 negotiation failed due to time up.
3c45f68e73644412:f9fbeadda5cbbeda
---------------------
Re: Checkpoint and IPSecuritas
by VPNmac on 2005-08-24 22:59:38 +0200
This is what I get with IPSecuritas 2.1 on Mac OS X 10.4.2:
A red cross and the following log. Any help most appreciated.
-------Aug 24 22:55:16 peters-power-mac-g4-agp-graphics IPSecuritas: Parsing
configuration
Aug 24 22:55:16 peters-power-mac-g4-agp-graphics IPSecuritas: Setting
up racoon.conf
Aug 24 22:55:16 peters-power-mac-g4-agp-graphics IPSecuritas: Setting
up setkey.conf
Aug 24 22:55:16 peters-power-mac-g4-agp-graphics IPSecuritas: Setting
up psk.txt
Aug 24 22:55:16 peters-power-mac-g4-agp-graphics IPSecuritas: Setting
up tunnel.conf
Aug 24 22:55:16 peters-power-mac-g4-agp-graphics IPSecuritas: Parsing
configuration done
Aug 24 22:55:17 peters-power-mac-g4-agp-graphics IPSecuritas: Starting
racoon...
Aug 24 22:55:17 peters-power-mac-g4-agp-graphics IPSecuritas: Racoon
is running
Aug 24 22:55:17 peters-power-mac-g4-agp-graphics IPSecuritas: Set
kernel keys
Aug 24 22:55:17 peters-power-mac-g4-agp-graphics racoon: DEBUG2:
cfparse.y:1413:cfparse(): parse successed.
Aug 24 22:55:17 peters-power-mac-g4-agp-graphics racoon: DEBUG:
isakmp.c:1592:isakmp_open(): 192.168.1.2[500] used as isakmp port
(fd=8)
Aug 24 22:55:17 peters-power-mac-g4-agp-graphics racoon: DEBUG:
pfkey.c:195:pfkey_handler(): get pfkey X_SPDADD message
Aug 24 22:55:17 peters-power-mac-g4-agp-graphics racoon: DEBUG2:
plog.c:199:plogdump():
Aug 24 22:55:17 peters-power-mac-g4-agp-graphics racoon: DEBUG:
policy.c:184:cmpspidxstrict(): sub:0xbffff980: 192.168.1.2/32[0]
150.214.110.0/24[0] proto=any dir=out
Aug 24 22:55:17 peters-power-mac-g4-agp-graphics racoon: DEBUG:
policy.c:185:cmpspidxstrict(): db :0x306568: 150.214.110.0/24[0]
192.168.1.2/32[0] proto=any dir=in
Aug 24 22:56:18 peters-power-mac-g4-agp-graphics IPSecuritas: Flushing
kernel keys
Aug 24 22:56:18 peters-power-mac-g4-agp-graphics IPSecuritas:
Stopping racoon...
Aug 24 22:56:18 peters-power-mac-g4-agp-graphics racoon: DEBUG:
pfkey.c:195:pfkey_handler(): get pfkey X_SPDFLUSH message
Aug 24 22:56:18 peters-power-mac-g4-agp-graphics racoon: DEBUG2:
plog.c:199:plogdump():
Aug 24 22:56:18 peters-power-mac-g4-agp-graphics racoon: INFO:
session.c:331:check_sigreq(): caught signal 15
Aug 24 22:56:18 peters-power-mac-g4-agp-graphics racoon: DEBUG:
pfkey.c:195:pfkey_handler(): get pfkey FLUSH message
Aug 24 22:56:18 peters-power-mac-g4-agp-graphics racoon: DEBUG2:
plog.c:199:plogdump():
Aug 24 22:56:18 peters-power-mac-g4-agp-graphics racoon: INFO:
session.c:331:check_sigreq(): caught signal 15
Aug 24 22:56:18 peters-power-mac-g4-agp-graphics racoon: DEBUG:
pfkey.c:195:pfkey_handler(): get pfkey FLUSH message
Aug 24 22:56:18 peters-power-mac-g4-agp-graphics racoon: DEBUG2:
plog.c:199:plogdump():
Aug 24 22:56:18 peters-power-mac-g4-agp-graphics racoon: INFO:
session.c:331:check_sigreq(): caught signal 15
Aug 24 22:56:18 peters-power-mac-g4-agp-graphics racoon: DEBUG:
Only two connection at a time?
Only two connection at a time?
by Alexander Barton on 2005-06-07 20:32:15 +0200
Hi!
I'm using IPSecuritas 2.1 on Mac OS X 10.4.1 and it works great! Thank you
guys!
But I'm only able to establish at least two simultanous connections at a
time, if I select more IPSecuritas fails. All individual connections do work ok.
Am I doing something wrong or is this is limitation of IPSecuritas and/or
Mac OS X?
Thanks!
Alex
How to get connected through a Trustgate
How to get connected through a Trustgate
by Thomas Hoffmann on 2005-06-08 11:52:42 +0200
Hello YABBs
I' ve the problem How To Connect to a Trustgate 232R
I'd tried everything but it dind't work.
I cannot pass Phase I
The Trustgate Config
VPN Peers
Peer Name ( Remote ID): 192.168.200.203
Public IP Address : 0.0.0.0
Dynamic IP : empty
- Pre-Shared-Key
- ID Type : Domain Name
- Encryption Algo. : AES
- Hash Algo : SHA1
- Deffie-Hell.: 2 (1024 bits)
- Perfect Forward Sec.: On
IPSecuritas Config
General
- Mode of Op. : Host to Network
- Remote IPsec Device: Public IP of the Trustgate
- Remote network: 192.168.5.0 / 24
- Local Address: 192.168.200.203
- Exchange Mode: Main
- Proposal Check : Claim Nonce Size 16
PH1
- Lifetime : 28800 sec
- DH Droup: Mod1024 (2)
- Encryption: AES 128
- Authentication: SHA1
PH2
- Liftime: 28800 sec
- PFS Group: Mod1024 (2)
- Encryption: AES128
- Authentication: HMAC SHA1
Id/Auth
- Local Identifier: DN 192.168.200.203
- Remote Identifier: Address
- Authentication: Pre-Shared-Secret (Filled in as ASCII)
Options
- IPSec DOI: Y
- SIT_IDENTITIY_ONLY:Y
- Verify Identifier: N
- Initial Contact: Y
- Passive: N
- Generate Policy: N
- MIP6: Y
- Verify Certificate: N
- DHCP-Pass-Through:Y
- Establish IKE Immediatly: Y
- Auto Start: N
Re: How to get connected through a Trustgate
by Thomas Hoffmann on 2005-06-08 22:15:50 +0200
:) :) :) :) :)
If got the Solution iv any one has Problems Connection Mac though
Trustgate ask me ;D
IpSecuritas and Zyxel P334WT
IpSecuritas and Zyxel P334WT
by jayjhunski on 2005-06-10 08:56:02 +0200
is there anyone out there that has successfully established a VPN
connection using IPsecuritas and a Zyxel P-334WT wireless router. I'm
using Mac OSX 10.3.9.
In particular, I'm in need of configuration pointers for both the router and
IPSecuritas. I have a static IP address assigned to my router and a 2nd one
mapped using NAT to a private IP address on one computer in the office.
any help would be greatly appreciated! :)
Re: IpSecuritas and Zyxel P334WT
by DDA on 2006-01-31 23:34:58 +0100
I'd love an answer to this, too. I just got a P-334wt and have been totally
unsuccessful in getting any kind of VPN going. :-(
Re: IpSecuritas and Zyxel P334WT
by DDA on 2006-02-13 16:10:35 +0100
I *was* able to get a connection to the P-334wt when I hung it off my local
LAN for testing. I used Host-to-Host (Tunnel), Aggressive with the WAN IP
of the p-334wt as Remote IPSexc device and the LAN IP of the P-334wt for
Remote Address in General, 3DES, SHA1 and DH2 for Phase 1, 3DES, SHA1
no PFS for Phase 2 and DN (email address) for Authentication with
Preshared Secret. The tunnel terminated in the LANIP for the P-334wt and I
was able to connect and use the web interface to verify the tunnel.
When I tried it with my Mac behind NAT, it failed, leading me to believe that
the NAT-T part of OS X is not working (as others have claimed). But I didn't
try very hard because the single LANIP tunnels of the P-334wt aren't really
what I want; I'm replacing it with a Netgear FWG114p. I've set that up on the
local LAN and tested it with Host-to-Network and it works fine. Next I'll try
it from work behind NAT routers and see how that goes.
I hope this helps.
netgear fvs318 NAT-T and Tiger
netgear fvs318 NAT-T and Tiger
by waldo on 2005-06-11 07:38:03 +0200
has anyone had any luck using ipsecuritas 2.1 on 10.4.1 to connect to a
netgear fvs318 with nat traversal?
if yes, feel like sharing the recipe?
if no, any suggestions?
thanks!
Re: netgear fvs318 NAT-T and Tiger
by Cameron Wilhelm on 2005-07-05 21:25:08 +0200
I'm trying to essentially do this same thing, and I can't seem to get it to
connect.
I'm relatively new to VPN and I've tried everything I can think of from
allowing just me to connect, to attempting to allow the world to connect.
Worse, I can seem to get any useful info from any logs.
Nothing shows in the IPSecuritas log
This is all that shows on the 318 side:
[2005-07-05 11:22:45]**** RECEIVED FIRST MESSAGE OF AGGR MODE ****
[2005-07-05 11:22:45]<POLICY: > PAYLOADS: SA
[2005-07-05 11:22:45]SENDING NOTIFY MSG:
[2005-07-05 11:22:45]INVALID_ID_INFORMATION
[2005-07-05 11:22:45]**** SENT OUT INFORMATIONAL EXCHANGE
MESSAGE ****
[2005-07-05 11:22:45]<POLICY: > PAYLOADS: NOTIFY
Anyone have any ideas?
Thanks.
-Cameron Wilhelm
Re: netgear fvs318 NAT-T and Tiger
by jmizoguchi on 2006-01-29 19:51:37 +0100
if your FVS318 v2.4 then I have soluton at vpncasestudy.com
moving IPsecuritas configuration around
moving IPsecuritas configuration around
by maq on 2005-06-15 14:23:20 +0200
HI, I'm using IPSECURITAS with Netscreen 25. Works fine and really easy to
configure. My question iis what iis the quickest and easiest way to move a
config from one computer to another?
Is there a way to export the config into one file?
Or maybe copy the configuration files to the other computer?
Where are the configuration files?
Thanks for your help
Mounting samba share over VPN connection w/ Tiger
Mounting samba share over VPN connection w/ Tiger
by Mike on 2005-06-15 17:04:49 +0200
The latest version of IPSecuritas + Tiger 10.4.1 seems to have fixed the
ping time issues. Has anyone else had issues with attempting to browse
shares on the network after connecting to the VPN? Previous to Tiger I had
no issues with browsing file shares on the remote system (Apple Server
10.3), now I get spinning beachballs when attempting to browse shares.
Thanks in advance.
Mike
Re: Mounting samba share over VPN connection w/ Ti
by Jim Collis on 2005-06-30 21:17:04 +0200
I have experienced the same issue. I had the same issue when I upgraded
to Tiger and was directly connected to my network. I cleared that issue by
deleting my keychain containing the server password. I tried that over my
VPN and unfortunately that did not work.
Re: Mounting samba share over VPN connection w/ Ti
by tji on 2005-07-08 19:52:17 +0200
I have manually connected to samba file shares via VPN with tiger. But, I
have not browsed networks..
I believe the SMB browsing relies on broadcasts on a local LAN, which would
not work over a VPN (broadcasts don't go beyond subnets). But, you may
be able to configure a WINS server in the samba config, to point to the
samba "name server" and find hosts over the VPN (I've never tried that, but
it might be worth checking out).
Re: Mounting samba share over VPN connection w/ Ti
by rnoranbrock on 2005-07-28 07:14:47 +0200
Any tips on how to "configure a WINS server . . . " I'm not sure I understand
what you've suggested.
Previous to 10.4.2, at least, I was able to connect to a Windows 2000 file
server and mount shares over the VPN. Now, spinning beachballs. The
share appears to mount to the desktop, but then it never shows any files
and just hangs the Finder.
-Randy
Re: Mounting samba share over VPN connection w/ Ti
by Derek on 2005-08-25 15:19:37 +0200
[quote author=Mike link=1118847889/0#0 date=1118847889]The latest
version of IPSecuritas + Tiger 10.4.1 seems to have fixed the ping time
issues. Has anyone else had issues with attempting to browse shares on
the network after connecting to the VPN? Previous to Tiger I had no issues
with browsing file shares on the remote system (Apple Server 10.3), now I
get spinning beachballs when attempting to browse shares.
Thanks in advance.
Mike
[/quote]
Browsing shares is apparently a known issue. If you check your console.log
when this happens, you'll see tons of error messages, with an additional
note that you should report it as a bug, similar to these:
bug: ecnt = 33, but m_len = 0 and m_next = 0 (please report)
I emailed the makers of VPNTracker (Equinux) a few weeks ago and they
confirmed the problem to me with their product, so it's not restricted to
IPSecuritas. Apple has received at least two bug reports on the issue (one
from me, one from Equinux), so hopefully this finally gets resolved with the
next update...
Re: Mounting samba share over VPN connection w/ Ti
by Jim Collis on 2005-09-03 08:03:44 +0200
I have been told by the tech support folks at Equinux that this is a know
bug in Tiger 10.4.2 in how SMB handles packets over the vpn. Until apple
fixes this problem there is no way around it. They said the entire SMB stack
was rewritten for Tiger and all the issues with Microsoft networking aren't
fixed. They were hopeful, but not encouraging, that this might be fixed in
10.4.3 or 10.4.4. Not an exciting answer.
Re: Mounting samba share over VPN connection w/ Ti
by rnoranbrock on 2005-11-01 05:59:20 +0100
Any word on whether the 10.4.3 update corrects the above problem?
-Randy
Re: Mounting samba share over VPN connection w/ Ti
by Brian on 2005-11-01 15:54:53 +0100
10.4.3 did not fix the issue on our systems. >:(
We get the same 'please report' errors.
Re: Mounting samba share over VPN connection w/ Ti
by Tsathul on 2006-01-20 02:32:40 +0100
Problem appears still to be there under 10.4.4. Lots of "kernel[0]: bug: ecnt
= 32, but m_len = 0 and m_next = 0 (please report)" entries in /var/log
/system.log, and the Finder hangs repeatedly necessitating relaunch. How
long can this go on?
Re: Mounting samba share over VPN connection w/ Ti
by chuck_theobald on 2006-02-09 21:11:18 +0100
Yes, I can confirm this problem under 10.4.4 with VPN Tracker 2.2.6.
Supposedly, this version of VPN Tracker does not work with Tiger, but it
works for me. I am able to get all sorts of connectivity except SMB
browsing, either through the Finder, or trying to see the contents of a
volume mounted with mount_smbfs.
Waiting for the next apple to drop...
Re: Mounting samba share over VPN connection w/ Ti
by rnoranbrock on 2006-05-10 00:09:04 +0200
Any happiness with browsing SMB shares over VPN connection under
10.4.6? Will this ever be fixed?
-R
Re: Mounting samba share over VPN connection w/ Ti
by chuck_theobald on 2007-12-24 20:01:28 +0100
I can confirm that this is still broken in 10.4.11 using IPSecuritas 3.0, build
1693. Connecting (Cmd-K) to a Samba server through the VPN connection
allows authentication and selection of the share, but Finder then goes out
to lunch with the pinwheel of death. I can still browse to a Windows-based
SMB server within my own network (not through the VPN) and all works fine.
I found a message on the Samba site (http://lists.samba.org/archive/samba
/2005-July/108903.html) that seems to indicate that this is limited to the
Tiger-Samba-VPN combination (note that this would include the
Samba-based OS X SMB server). I do not have a Windows-based SMB server
on the other side of the VPN to test this for myself, though.
In my system.log I get some 24 messages each second:
Dec 24 10:38:05 chuck-theobalds-powerbook-g4
33, but m_len = 0 and m_next = 0 (please report)
Dec 24 10:38:05 chuck-theobalds-powerbook-g4
32, but m_len = 0 and m_next = 0 (please report)
Dec 24 10:38:06 chuck-theobalds-powerbook-g4
33, but m_len = 0 and m_next = 0 (please report)
Dec 24 10:38:06 chuck-theobalds-powerbook-g4
32, but m_len = 0 and m_next = 0 (please report)
Dec 24 10:38:06 chuck-theobalds-powerbook-g4
33, but m_len = 0 and m_next = 0 (please report)
Dec 24 10:38:06 chuck-theobalds-powerbook-g4
32, but m_len = 0 and m_next = 0 (please report)
Dec 24 10:38:06 chuck-theobalds-powerbook-g4
33, but m_len = 0 and m_next = 0 (please report)
Dec 24 10:38:06 chuck-theobalds-powerbook-g4
32, but m_len = 0 and m_next = 0 (please report)
Dec 24 10:38:06 chuck-theobalds-powerbook-g4
33, but m_len = 0 and m_next = 0 (please report)
Dec 24 10:38:06 chuck-theobalds-powerbook-g4
32, but m_len = 0 and m_next = 0 (please report)
Dec 24 10:38:06 chuck-theobalds-powerbook-g4
33, but m_len = 0 and m_next = 0 (please report)
Dec 24 10:38:06 chuck-theobalds-powerbook-g4
32, but m_len = 0 and m_next = 0 (please report)
Dec 24 10:38:06 chuck-theobalds-powerbook-g4
33, but m_len = 0 and m_next = 0 (please report)
Dec 24 10:38:06 chuck-theobalds-powerbook-g4
32, but m_len = 0 and m_next = 0 (please report)
Dec 24 10:38:06 chuck-theobalds-powerbook-g4
33, but m_len = 0 and m_next = 0 (please report)
Dec 24 10:38:06 chuck-theobalds-powerbook-g4
32, but m_len = 0 and m_next = 0 (please report)
Dec 24 10:38:06 chuck-theobalds-powerbook-g4
33, but m_len = 0 and m_next = 0 (please report)
Dec 24 10:38:06 chuck-theobalds-powerbook-g4
32, but m_len = 0 and m_next = 0 (please report)
Dec 24 10:38:06 chuck-theobalds-powerbook-g4
33, but m_len = 0 and m_next = 0 (please report)
Dec 24 10:38:06 chuck-theobalds-powerbook-g4
32, but m_len = 0 and m_next = 0 (please report)
Dec 24 10:38:06 chuck-theobalds-powerbook-g4
33, but m_len = 0 and m_next = 0 (please report)
Dec 24 10:38:06 chuck-theobalds-powerbook-g4
32, but m_len = 0 and m_next = 0 (please report)
Dec 24 10:38:06 chuck-theobalds-powerbook-g4
33, but m_len = 0 and m_next = 0 (please report)
Dec 24 10:38:06 chuck-theobalds-powerbook-g4
32, but m_len = 0 and m_next = 0 (please report)
kernel[0]: bug: ecnt =
kernel[0]: bug: ecnt =
kernel[0]: bug: ecnt =
kernel[0]: bug: ecnt =
kernel[0]: bug: ecnt =
kernel[0]: bug: ecnt =
kernel[0]: bug: ecnt =
kernel[0]: bug: ecnt =
kernel[0]: bug: ecnt =
kernel[0]: bug: ecnt =
kernel[0]: bug: ecnt =
kernel[0]: bug: ecnt =
kernel[0]: bug: ecnt =
kernel[0]: bug: ecnt =
kernel[0]: bug: ecnt =
kernel[0]: bug: ecnt =
kernel[0]: bug: ecnt =
kernel[0]: bug: ecnt =
kernel[0]: bug: ecnt =
kernel[0]: bug: ecnt =
kernel[0]: bug: ecnt =
kernel[0]: bug: ecnt =
kernel[0]: bug: ecnt =
kernel[0]: bug: ecnt =
CPU and memory usage?
CPU and memory usage?
by Me Here on 2005-06-17 21:52:37 +0200
Using IPSecuritas 2.1 on Mac OS X 10.3.9 on a 1GHz powerbook connecting
via Airport to an IPCop box. Top lists CPU usage as at least 50%, usually
closer to 70%+ just sitting idle (no network activity besides IPSec stuff
itself), and RSIZE of 96M and VSIZE of 960M when IPSecuritas is up for any
length of time. Needless to say, system slows to a crawl, and it may literally
take over a minute to switch applications or close applications with alot of
disk swap activity.
Anyone else experience something similar? Any suggestions?
Thanks.
Re: CPU and memory usage?
by Me Again on 2005-06-17 23:06:41 +0200
I think I found the answer to my own problem. Posting just in case someone
makes the same mistake...
It seems that I changed the log level in IPSecuritas to DEBUG about a week
ago when I was initially setting it up, and never changed it back. Well my
system.log was up to nearly 3GB :o and IPSecuritas didn't play well because
of that. Turned it back to Normal logging and cleared system.log and all
seems well. 0% CPU and RSIZE of 16M.
I'll let it run for a while and see how it goes, but it seems all better.
IPSecuritas and Smoothwall
IPSecuritas and Smoothwall
by paschke on 2005-06-21 00:52:44 +0200
Hi,
Has anyone had any success getting IPSecuritas and Smoothwall VPN to talk
to each other? I am using IPSecuritas 2.1 on Tiger (10.4.1) and trying to
talk to a Smoothwall 3.1 VPN gateway. Using certificates for
authentication... I successfully loaded the certificates and get some
progress in the logs, but it always seems to die with the following two lines
in the log:
Jun 20 18:49:28 ashnazg racoon: ERROR:
isakmp_inf.c:847:isakmp_info_recv_n(): unknown notify message, no
phase2 handle found.
Jun 20 18:49:28 ashnazg racoon: DEBUG:
isakmp_inf.c:869:isakmp_info_recv_n(): notification message 9:INVALIDMESSAGE-ID, doi=1 proto_id=1 spi=(size=0).
Does anyone have any clues?
Thanks!
Matt Paschke
Newbie looking for help
Newbie looking for help
by Tacitus on 2005-06-22 10:21:46 +0200
Hi all,
I am a newbie to VPN and am trying to connect from home using a PBk G4
running 10.3.9 (D-Link 504 with VPN passthrough) to a small office
network. The office fortunately runs on Macs also with 10.3.9. Sorry this ia
a bit long but here goes http://www.lobotomo.com/yabb/YaBBImages
/smiley.gif
IP securitas on PBk details:
General Mode of Operation: Host to Network
Office IPSec Device (Router/firewall): 64.x.x.x
Office Network: 192.168.1.1/24
Local Address (in office): 192.168.1.21
Exchange Mode: Main
Proposal Check: Claim
Nonce Size: 16
Phase 1 Lifetime: 28800 seconds
DH Group: Mod768 (1)
Encryption: DES
Authentication: MD5
Phase 2 Lifetime: 3600 seconds
PFS Group: None
Encryption: DES & 3DES
Authentication: HMAC SHA1 & HMAC MD5
Id/Auth Local Identifier: 192.168.1.21 (This is the machine in the office)
Remote Identifier: blank
Preshared Secret: ***
Options Compression Deflate checked (greyed out)
IPSec DOI checked
SIT_IDENTITY_ONLY checked
Initial Contact checked
MIP6 checked
DHCP Pass-through checked
Establish IKE immediately checked
all other options unchecked
IP Sec appears to be running but I can’t raise the office machine. Here’s
part of the PBk log:
Freds-Computer racoon: ERROR: proposal.c:490:cmpsatrns(): trns_id
mismatched: my:2 peer:3
Freds-Computer racoon: ERROR: proposal.c:490:cmpsatrns(): trns_id
mismatched: my:2 peer:3
Freds-Computer racoon: ERROR: proposal.c:490:cmpsatrns(): trns_id
mismatched: my:2 peer:3
Freds-Computer racoon: ERROR: proposal.c:490:cmpsatrns(): trns_id
mismatched: my:2 peer:3
Freds-Computer IPSecuritas: Flushing kernel keys
Freds-Computer IPSecuritas: Stopping racoon...
Freds-Computer IPSecuritas: Racoon normally terminated
Sorry this is so long, but thanks to anyone who can help.
10.2 Incompatibility and "Can't connect twice
10.2 Incompatibility and "Can't connect twice
by Nat! on 2005-06-24 18:23:05 +0200
1. When I try to start IP Securitas on 10.2.8 I get a crash and the following
entry in the Console: [font=Courier]dyld: /Volumes/Users/Applications
/IPSecuritas.app/Contents/MacOS/IPSecuritas can't open library: /usr/lib
/libcrypto.0.9.7.dylib (No such file or directory, errno = 2)[/font]
2. When I use it under 10.4 I can sucessfully connect once to the firewall at
the remote site, but I can't connect a second time (doesn't matter if I just
quit IP Securitas, "properly Stop IPSEC" or even reboot my machine). The
sysadmin "over there" says, that the first session was not properly closed
and that their software therefore doesn't allow a second session to be
opened. The timeout on their machine appears to be greater than a day ::)
This might not be a problem of IP Securitas, but I figure it doesn't hurt to
ask, if this is a known problem with possibly a known solution :)
Re: 10.2 Incompatibility and "Can't connect t
by cdmaris1 on 2005-08-13 05:45:02 +0200
Were you ever able to resolve your problem with 10.2.8? I am get the sam
eerror message so would be very interested in finding out if there is a fix
for this.
thanks
Re: 10.2 Incompatibility and "Can't connect t
by David on 2005-11-03 16:58:02 +0100
I'm just looking for any confirmation on whether IPSecuritas 2.1 is
incompatible with 10.2.8 ? I get a crash log written when it fails to start up.
Static Routes setup with IPSecuritas?
Static Routes setup with IPSecuritas?
by Mike E on 2005-06-28 19:04:32 +0200
One of our developers is using IPSecuritas to VPN (host to network) onto
our subnet (10.191.2.0/24). He is setup to look like 10.191.1.140 (local
address).
He needs to be able to route 38.160.70.118 traffic through 10.191.2.34 on
our subnet, so I had him create a static route. But it doesn't work. Any
ideas?
Notice how the static route be binding to en0? seems like it should have
bound to gif0?
On Jun 27, 2005, at 2:02 PM, John wrote:
Here is the situation after "sudo route add 38.160.70.118 10.191.2.34"
Destination
Gateway
Flags Refs
Use Netif Expire
default
10.0.1.1
UGSc
71
11 en0
10.0.1/24
link#4
UCS
2
0 en0
10.0.1.1
0:d:93:25:3c:40 UHLW
72
1322 en0 1094
10.0.1.2
0:3:93:70:28:4e UHLW
0
122 en0 331
10.0.1.17
127.0.0.1
UHS
6
1065 lo0
10.191.2.0
10.191.1.140
UH
0
1 gif0
10.191.2/24
gif0
USc
6
1354 gif0
38.160.70.118
10.191.2.34
UGHS
0
2 en0
127
127.0.0.1
UCS
0
0 lo0
127.0.0.1
127.0.0.1
UH
20 245677 lo0
169.254
link#4
UCS
0
0 en0
Johns-Laptop:$ ping 38.160.70.118
PING 38.160.70.118 (38.160.70.118): 56 data bytes
ping: sendto: Cannot allocate memory
DHCP
DHCP
by Scott Hander on 2005-06-30 01:49:06 +0200
I am trying to get a VPN setup that will have remote machine request an IP
via DHCP from our firewall. We are using a Sonicwall 2040, and I can't seem
to get it to work. I can get everything to work with a good connection, just
no DHCP. I can assign a specific ip to the computer on the other end, but
the connection will not pass any traffic through to that address.
Does anyone have any thoughts or insights for this?
Thanks,
Scott Hander
10.4.1, packets gets lost inside kernel
10.4.1, packets gets lost inside kernel
by Henrik on 2005-07-04 21:20:18 +0200
Hi,
The VPN with OpenSWAN worked great with OS X 10.3.x. Upgraded to
10.4.1 and now nothing works (I even installed it from scratch).
I can create a successfull VPN connection (Host to Network), so IPSEC SA is
established and ESP packets are flowing to both directions (checked with
ethereal).
The downside is the the ESP packets seems somehow to be discared after
they are received. The same happens with and without NAT.
Any help is greatly apprechiated, since I'm leaving on holyday on saturday
and I *don't* want to change the a PC because of this.
Thanks,
Henrik
Finland
Re: 10.4.1, packets gets lost inside kernel
by cnadig on 2005-07-05 09:56:15 +0200
Hello Henrik,
are you by any chance using AES256 or AES192 in phase 2 - the
implementation has changed from 10.3 to 10.4 and leads to
incompatibilities.
I recommend using 3DES for best compatibility with other devices.
Hope this helps,
Christoph
Re: 10.4.1, packets gets lost inside kernel
by Henrik on 2005-07-05 11:44:22 +0200
Hi Christoph,
It worked! Actually the last thing I tried yesterday was 3DES, but at the
same time I broke my NAT when tweaking it, so no connection at all was
established.
Thanks!
Best regrads,
Henrik
Watchguard X-15 Edge
Watchguard X-15 Edge
by dd on 2005-07-08 13:31:07 +0200
hi
Has anyone successfully connected a VPN using IPSecuritas to a watchguard
X15 Edge?
I have PC MUVPN working successfully and a number of Edge to Edge
tunnels working, but dont seem to be able to succed with IPSecuritas.
If any body out there has got things to work with the X15, and feels like
sharing howto do it, it would save me having to lug a laptop pc as well as
my iBook around!
Many Thanks
???
Feature Requests: multiple subnets, dynamic PSK
Feature Requests: multiple subnets, dynamic PSK
by tji on 2005-07-08 20:17:07 +0200
IPSecuritas is a great tool. Thanks for providing such a nice piece of
software for free!
If/when you guys update it, could you look into the feasability of
implementing a few enhancements?
- Multiple Subnets: My office network has several /24 subnets, protected
by a Netscreen VPN device. I can define each subnet as a seperate
configuration, and enable each one of them individually. But, I cannot
enable multiple subnets at the same time (only the first subnet actually gets
negotiated).
Defining all the available subnets in one VPN config should
allow them to be all negotiated in one IKE session.
- Dynamic PSK -- external command/script: I set up a Linksys WRV54G at
my parents house, and I use that to connect back to their systems for
remote tech support. The quirky thing about the WRV54G is that they
have an HTTPS front end that is used to authenticate users and dynamically
generate the PSK before the IPSec/IKE session starts.
I have put together
a script to pull that PSK, and generate the IPSec config files. But, being
able to call a command/script from within IPSecuritas would be a better
solution. (There are probably some other authentication systems that
operate similarly (like S/Key). So, this feature would allow IPSecuritas to
work with more VPN gateways.)
- XAuth -- The updated IPSec tools project supports Xauth authentication
(and NAT-Traversal). Apple includes an older version of racoon, which
does not. Including an updated racoon binary would allow IPSecuritas to
support XAuth authentication.
m0n0wall ?
m0n0wall ?
by Sean McGrath on 2005-07-11 19:48:57 +0200
I can't get a connection to m0n0wall 1.1 or 1.2b9.
The error message in the log is
"racoon: ERROR: isakmp_inf.c:193:isakmp_info_recv(): ignore information
due to hash length mismatch".
The server logs show this happens during phase 2. MD5 and SHA1 hashes
both fail.
Any success stories?
Thanks
Re: m0n0wall ?
by stephenb on 2005-07-15 05:42:37 +0200
I got it up and running. I sent the settings to Christoph but he's probably
been too busy to post.
email me and I'll send you screen shots.
stephenbatmacdotcom
Sonicwall TZ170 failing phase 2
Sonicwall TZ170 failing phase 2
by spectre51 on 2005-07-12 06:07:27 +0200
Okay so I got my ibook setup with ipsecuritas and my netscreen 5gt at
home so I decided to hook it up to my sonicwall tz170 at work. I am trying
to use the GroupVPN option on the sonicwall which is on the latest SonicOS
Standard firmware. We are making it through phas 1 no problem but the
vpn continues to fail at phase 2. I'm wondering does the sonicwall have to
be the enhanced version? What should I put in the ID/Auth section under
Identification for local and remote identifier?
Re: Sonicwall TZ170 failing phase 2
by w_grace on 2006-02-21 19:02:23 +0100
Are you getting what I am getting?
My post...
Phase-1
Group 1
3DES
MD5
28000
Phase-2
ESP
3DES
MD5
Feb 21 16:31:35 HDGroup-01 racoon: ERROR:
isakmp_inf.c:848:isakmp_info_recv_n(): unknown notify message, no
phase2 handle found.
Feb 21 16:31:35 HDGroup-01 racoon: ERROR:
isakmp_inf.c:848:isakmp_info_recv_n(): unknown notify message, no
phase2 handle found.
Feb 21 16:31:54 HDGroup-01 racoon: ERROR:
isakmp_inf.c:848:isakmp_info_recv_n(): unknown notify message, no
phase2 handle found.
Feb 21 16:32:04 HDGroup-01 racoon: ERROR:
pfkey.c:745:pfkey_timeover(): 80.169.171.194 give up to get IPsec-SA
to time up to wait.
Feb 21 16:31:54 HDGroup-01 racoon: ERROR:
isakmp_inf.c:848:isakmp_info_recv_n(): unknown notify message, no
phase2 handle found.
Feb 21 16:32:04 HDGroup-01 racoon: ERROR:
pfkey.c:745:pfkey_timeover(): 80.169.171.194 give up to get IPsec-SA
to time up to wait.
Feb 21 16:33:49 HDGroup-01 racoon: ERROR:
isakmp_inf.c:848:isakmp_info_recv_n(): unknown notify message, no
phase2 handle found.
Feb 21 16:33:49 HDGroup-01 racoon: ERROR:
isakmp_inf.c:848:isakmp_info_recv_n(): unknown notify message, no
phase2 handle found.
Feb 21 16:34:10 HDGroup-01 racoon: ERROR:
isakmp_inf.c:848:isakmp_info_recv_n(): unknown notify message, no
phase2 handle found.
Feb 21 16:34:19 HDGroup-01 racoon: ERROR:
pfkey.c:745:pfkey_timeover(): 80.169.171.194 give up to get IPsec-SA
to time up to wait.
Feb 21 16:34:10 HDGroup-01 racoon: ERROR:
isakmp_inf.c:848:isakmp_info_recv_n(): unknown notify message, no
phase2 handle found.
Feb 21 16:34:19 HDGroup-01 racoon: ERROR:
pfkey.c:745:pfkey_timeover(): 80.169.171.194 give up to get IPsec-SA
to time up to wait.
Re: Sonicwall TZ170 failing phase 2
by cnadig on 2006-02-21 23:37:42 +0100
due
due
due
due
Hello,
do you have access to the log of the Sonicwall?
Changing the log level of IPSecuritas to 'Verbose Debug' will give you
additional information about the unknown notification sent by the firewall.
Cheers,
Christoph
Re: Sonicwall TZ170 failing phase 2
by Tim Pipes on 2006-03-02 21:27:45 +0100
We had been making a connection to our TZ170 without fail for a while
there. Upgraded to 10.4.4 and IPSecuritas stopped working. It also says that
it's failing at Phase 2 but none of the settings changed.
We have thought about setting up a new SA but instead have decided to
delve into this a little more as it was working.
IKE using preshared secret
Phase 1
DH Group: Group 1
Encryption: 3DES
Authentication: MD5
Lifetime: 28800
Phase 2
Protocol: ESP
Encryption: 3DES
Authentication: MD5
Enable Perfect Forward Secrecy: Unchecked
Advanced
Enable Windows Networking Broadcast: checked
that's it in Advanced.
Client
Cache XAUTH: never
Virtual Adaptor: DHCP Lease
Allow Connections to: Split Tunnels
nothing else checked.
As I said, it had been working flawlessly and now I have messed with just
about every setting in IPSecuritas and have not been able to make the
connection. I believe I am getting the same error output as w_grace (no
phase 2 handle found)
Any setup that works for anyone? Please fill me in.
cheers,
Tim
IPsecuritas and Linksys RV042
IPsecuritas and Linksys RV042
by jprsa on 2005-07-13 01:23:54 +0200
I have a linksys RV042 and having issues establishing a tunnel.
I previoulsy had a different Linksys vpn router model and that worked great.
I decided to upgrade to the new and improved router.
Linksys is of no help
Can anyone help me?
Re: IPsecuritas and Linksys RV042
by Mike O'Reilly on 2005-09-12 00:58:02 +0200
I just figured out the Linksys RV042 and RV082 with IPSecuritas and figured
that some other people might be having the same issues... It seems that
Linksys removed to the "connect from any" option in their routers, but it's
really still there!
Set up your tunnels just like you would have before (with another router)
but use the option "Dynamic IP + E-mail Addr.(USER FQDN) Authentication"
Input an email address (real or not, just a unique identifer) in the router for
the tunnel.
The magic is buried in the IPSecuritas help:
2. Domain Name (DN): This can either be a fully qualified distinguished
name (FQDN, e.g. lobotomo.com) or a user fully qualified distinguished
name (USER_FQDN, e.g. [email protected]).
This means just put that same email address in the Id/Auth dialog box
under the "DN" option for the Local Identifier and your connection should
work.
I hope this helps someone out there, if anyone needs screenshots of the
RV042 and IPSecuritas screens I can try and post them. Just reply to this
post...
Re: IPsecuritas and Linksys RV042
by Alan H on 2005-09-20 17:11:20 +0200
Could you provide the screen shots please. Thanks
Re: IPsecuritas and Linksys RV042
by Glenn Dallas on 2005-10-21 03:31:57 +0200
I'm trying to setup a vpn tunnel to a mobile user also and can't find any
good documentation. Could you send me the screenshots also. Thanks.
Re: IPsecuritas and Linksys RV042
by Dave Story on 2005-11-12 05:03:17 +0100
Thanks for offering, could you send the screen shots along to me as well.
Re: IPsecuritas and Linksys RV042
by Some Pinoy on 2005-11-16 01:57:26 +0100
Please send some pics that would be awesome! We just updated to the
RV016
Re: IPsecuritas and Linksys RV042
by BJS on 2005-11-30 16:42:26 +0100
I would also appreciate the screenshots.
Thanks!
Re: IPsecuritas and Linksys RV042
by Cbo on 2005-12-30 22:27:08 +0100
Could you send me the screenshot also. Thanks a lot !
Re: IPsecuritas and Linksys RV042
by Jonathan Steuer on 2006-01-02 12:49:54 +0100
screen shots most appreciated! also firmware version of router, if you
please. i assume this should work identically with the RV082?
-j-
Re: IPsecuritas and Linksys RV042
by Mike O'Reilly on 2006-01-04 04:56:22 +0100
Well, it looks like my post from Sept. 12 has sparked some discussion...
After a long testing period and some time in front of a graphics editor I
finally got the screenshots everyone has been asking for!
It looks like I can't post them directly in the forum here, so I'm going to put
them in a Yahoo! photo gallery:
http://pg.photos.yahoo.com/ph/mike_b_oreilly/album?.dir=
/8802&.src=ph&.tok=ph7NeMEBjUPy0h8U
If that URL is too long, try this TinyURL:
http://tinyurl.com/74e82
...and now for the description of what you're looking at:
IPSecuritas
#1 "General" tab
The red box is over the public IP address of my RV042, this could be a
public DNS name. I'm using DynDNS without any issues.
#2 "Phase 1" tab
The info here needs to match what you set on the router.
#3 "Phase 2" tab
The info here also needs to match what you set on the router.
#4 "ID/Auth" tab
This is where it got tricky; Use the "Local Identifier" "DN" Option. (For those
of you in the know, you know that this is the Domain Name... Not here!)
This is the email address that you will use to establish the tunnel. The email
address is the fully qualified address but doesn't need to be a real address;
Only the address needs to match what you set on the router!
This is also where you set the "preshared secret"; This is the VPN key that
you use as the password between IPSecuritas and the RV042.
#5 "Options" tab
I don't remember changing anything here, but who knows at this point. Just
follow the example and things should work for you.
#6 RV042 VPN Summary
This is a bit difficult to see, but it's the overview of how the tunnels are set
up. The red box on the left is the name of the tunnel (this could be
anything, name it something that helps you to identify the tunnel!) The
green box on the right will automagically populate with the email adress
entered when you set up the tunnel (this will match the address in image
#4). Don't worry about the black boxes, that's just to protect the users of
my VPN.
#7 Tunnel Summary Overview
This is where the actual tunnel details are set. The first red box is where the
tunnel name goes, this helps to identify who is connecting. The second red
box is not avaliable to edit, this is the IP address of the router. The 3rd and
4th red boxes are the email address that is used to identify the tunnel
between IPSecuritas and the RV042, this is the same email address entered
in image #4. Finally the 5th red box is the "preshared key" that is the
password between the router and VPN client.
#8. This is just the summary of what the VPN log should look like on the
RV042. I blocked off my tunnel's email address so that I can try to avoid
UMTS / GPRS
UMTS / GPRS
by lganzetti on 2005-07-16 18:00:43 +0200
IPSECURITAS not work with connection by UMTS or GPRS.
The VPN start without error, but when try to user VPN not work.
I try with modem56k and work correctly,
but with PHONE Nokia UMTS or GPRS not work.
Please Help me
Problem 2.1: Cannot change Nonce size
Problem 2.1: Cannot change Nonce size
by Andrea on 2005-07-18 13:40:24 +0200
This looks like a GUI problem...
In IPSecuritas 2.1 (MacOS 10.4.1) I cannot edit the Nonce
size field.
The default is 16, I can add a third digit then remove
it but I cannot set it to 64 as I wish!
Thank you for your attention!
Andrea
Re: Problem 2.1: Cannot change Nonce size
by cnadig on 2005-07-21 22:34:49 +0200
Hello Andrea,
I confirm that this is a bug - i will make an update available fixing the bug
in a few days.
Thank you very much,
Christoph
IPSecuritas not working on PB, but does on another
IPSecuritas not working on PB, but does on another
by Sean McNamara on 2005-07-26 00:21:21 +0200
Hi folx,
I've successfully gotten IPSecuritas connecting to a Netgear FVS318 VPN
router using the instructions [url]http://www.aaronadams.net/index.php
/2004/12/20/establishing_a_vpn_with_ipsecuritas_and[/url]. This PB was
using Panther originally, and now uses Tiger (we've had to use 128 bit for
Tiger, but otherwise all the same).
My client's PB running Panther and Tiger doesn't want to work, even if I
copy my IPSecuritas configuration. I've finally gotten him to send me a log
from IPSecuritas, so I'm hoping someone can point me in the right
direction:
Log output from IPSecuritas 2.1
Jul 26 07:53:53 dewG4laptop IPSecuritas: Parsing configuration
Jul 26 07:53:53 dewG4laptop IPSecuritas: Setting up racoon.conf
Jul 26 07:53:53 dewG4laptop IPSecuritas: Setting up setkey.conf
Jul 26 07:53:53 dewG4laptop IPSecuritas: Setting up psk.txt
Jul 26 07:53:53 dewG4laptop IPSecuritas: Setting up tunnel.conf
Jul 26 07:53:53 dewG4laptop IPSecuritas: Parsing configuration done
Jul 26 07:53:54 dewG4laptop IPSecuritas: Starting racoon...
Jul 26 07:53:54 dewG4laptop IPSecuritas: Racoon is running
Jul 26 07:53:54 dewG4laptop IPSecuritas: Set kernel keys
add net 192.168.0.0: gateway gif0
Jul 26 07:53:54 dewG4laptop racoon: DEBUG2: cfparse.y:1413:cfparse():
parse successed.
Jul 26 07:53:54 dewG4laptop racoon: DEBUG:
isakmp.c:1592:isakmp_open(): 192.168.1.5[500] used as isakmp port
(fd=8)
Jul 26 07:53:54 dewG4laptop racoon: DEBUG:
isakmp.c:1610:isakmp_open(): 192.168.1.5[4500] used as nat-t isakmp
port (fd=9)
Jul 26 07:53:54 dewG4laptop racoon: DEBUG:
grabmyaddr.c:346:update_myaddrs(): caught rtm:12, need update interface
address list
Jul 26 07:53:54 dewG4laptop racoon: DEBUG:
grabmyaddr.c:340:update_myaddrs(): msg 1 not interesting
Jul 26 07:53:55 dewG4laptop racoon: DEBUG:
grabmyaddr.c:346:update_myaddrs(): caught rtm:14, need update interface
address list
Jul 26 07:53:55 dewG4laptop racoon: DEBUG:
grabmyaddr.c:340:update_myaddrs(): msg 1 not interesting
Jul 26 07:53:55 dewG4laptop racoon: DEBUG: pfkey.c:195:pfkey_handler():
get pfkey ACQUIRE message
Jul 26 07:53:55 dewG4laptop racoon: DEBUG2: plog.c:199:plogdump():
Jul 26 07:53:55 dewG4laptop racoon: DEBUG:
pfkey.c:1551:pk_recvacquire(): suitable outbound SP found: 10.0.0.3/32[0]
192.168.0.0/16[0] proto=any dir=out.
Jul 26 07:53:55 dewG4laptop racoon: DEBUG: policy.c:184:cmpspidxstrict():
sub:0xbffff970: 192.168.0.0/16[0] 10.0.0.3/32[0] proto=any dir=in
Jul 26 07:53:55 dewG4laptop racoon: DEBUG: policy.c:185:cmpspidxstrict():
db :0x306618: 192.168.0.0/16[0] 10.0.0.3/32[0] proto=any dir=in
Jul 26 07:53:55 dewG4laptop racoon: DEBUG:
pfkey.c:1567:pk_recvacquire(): suitable inbound SP found:
192.168.0.0/16[0] 10.0.0.3/32[0] proto=any dir=in.
Jul 26 07:53:55 dewG4laptop racoon: DEBUG:
pfkey.c:1606:pk_recvacquire(): new acquire 10.0.0.3/32[0]
192.168.0.0/16[0] proto=any dir=out
Jul 26 07:53:55 dewG4laptop racoon: DEBUG:
proposal.c:826:printsaproto(): (proto_id=ESP spisize=4 spi=00000000
spi_p=00000000 encmode=Tunnel reqid=0:0)
Re: IPSecuritas not working on PB, but does on ano
by sean McNamara on 2005-07-26 00:22:34 +0200
...log continued...
Jul 26 07:53:55 dewG4laptop racoon: DEBUG:
oakley.c:260:oakley_dh_generate(): compute DH's private.
Jul 26 07:53:55 dewG4laptop racoon: DEBUG: plog.c:199:plogdump():
Jul 26 07:53:55 dewG4laptop racoon: DEBUG:
oakley.c:262:oakley_dh_generate(): compute DH's public.
Jul 26 07:53:55 dewG4laptop racoon: DEBUG: plog.c:199:plogdump():
Jul 26 07:53:55 dewG4laptop racoon: DEBUG: isakmp_agg.c:169:agg_i1send():
authmethod is pre-shared key
Jul 26 07:53:55 dewG4laptop racoon: DEBUG:
isakmp.c:2457:set_isakmp_payload(): add payload of len 52, next type 4
Jul 26 07:53:55 dewG4laptop racoon: DEBUG:
isakmp.c:2457:set_isakmp_payload(): add payload of len 96, next type 10
Jul 26 07:53:55 dewG4laptop racoon: DEBUG:
isakmp.c:2457:set_isakmp_payload(): add payload of len 16, next type 5
Jul 26 07:53:55 dewG4laptop racoon: DEBUG:
isakmp.c:2457:set_isakmp_payload(): add payload of len 13, next type 13
Jul 26 07:53:55 dewG4laptop racoon: DEBUG:
isakmp.c:2457:set_isakmp_payload(): add payload of len 16, next type 0
Jul 26 07:53:55 dewG4laptop racoon: DEBUG: sockmisc.c:421:sendfromto():
sockname 192.168.1.5[500]
Jul 26 07:53:55 dewG4laptop racoon: DEBUG: sockmisc.c:423:sendfromto():
send packet from 192.168.1.5[500]
Jul 26 07:53:55 dewG4laptop racoon: DEBUG: sockmisc.c:425:sendfromto():
send packet to xxx.xxx.xxx.xxx[500]
Jul 26 07:53:55 dewG4laptop racoon: DEBUG: sockmisc.c:570:sendfromto(): 1
times of 241 bytes message will be sent to 192.168.1.5[500]
Jul 26 07:53:55 dewG4laptop racoon: DEBUG: plog.c:199:plogdump():
Jul 26 07:53:55 dewG4laptop racoon: DEBUG:
isakmp.c:1784:isakmp_ph1resend(): resend phase1 packet
618d997594493356:0000000000000000
Jul 26 07:53:57 dewG4laptop racoon: DEBUG:
grabmyaddr.c:340:update_myaddrs(): msg 16 not interesting
Jul 26 07:53:57 dewG4laptop racoon: DEBUG:
grabmyaddr.c:340:update_myaddrs(): msg 15 not interesting
Jul 26 07:54:01 dewG4laptop racoon: DEBUG:
grabmyaddr.c:340:update_myaddrs(): msg 16 not interesting
Jul 26 07:54:02 dewG4laptop racoon: DEBUG:
grabmyaddr.c:340:update_myaddrs(): msg 15 not interesting
Jul 26 07:54:15 dewG4laptop racoon: DEBUG: sockmisc.c:421:sendfromto():
sockname 192.168.1.5[500]
Jul 26 07:54:15 dewG4laptop racoon: DEBUG: sockmisc.c:423:sendfromto():
send packet from 192.168.1.5[500]
Jul 26 07:54:15 dewG4laptop racoon: DEBUG: sockmisc.c:425:sendfromto():
send packet to xxx.xxx.xxx.xxx[500]
Jul 26 07:54:15 dewG4laptop racoon: DEBUG: sockmisc.c:570:sendfromto(): 1
times of 241 bytes message will be sent to 192.168.1.5[500]
Jul 26 07:54:15 dewG4laptop racoon: DEBUG: plog.c:199:plogdump():
Jul 26 07:54:15 dewG4laptop racoon: DEBUG:
isakmp.c:1784:isakmp_ph1resend(): resend phase1 packet
618d997594493356:0000000000000000
Jul 26 07:54:26 dewG4laptop racoon: ERROR:
isakmp.c:2120:isakmp_chkph1there(): phase2 negotiation failed due to time
up waiting for phase1. ESP xxx.xxx.xxx.xxx->192.168.1.5
Jul 26 07:54:26 dewG4laptop racoon: INFO:
isakmp.c:2125:isakmp_chkph1there(): delete phase 2 handler.
Jul 26 07:54:35 dewG4laptop racoon: DEBUG: sockmisc.c:421:sendfromto():
sockname 192.168.1.5[500]
Jul 26 07:54:35 dewG4laptop racoon: DEBUG: sockmisc.c:423:sendfromto():
send packet from 192.168.1.5[500]
Jul 26 07:54:35 dewG4laptop racoon: DEBUG: sockmisc.c:425:sendfromto():
Re: IPSecuritas not working on PB, but does on ano
by Sean McNamara on 2005-07-26 00:23:37 +0200
...last bit...
Jul 26 07:54:36 dewG4laptop racoon: DEBUG: plog.c:199:plogdump():
Jul 26 07:54:36 dewG4laptop racoon: DEBUG:
isakmp.c:1784:isakmp_ph1resend(): resend phase1 packet
618d997594493356:0000000000000000
Jul 26 07:54:56 dewG4laptop racoon: DEBUG: sockmisc.c:421:sendfromto():
sockname 192.168.1.5[500]
Jul 26 07:54:56 dewG4laptop racoon: DEBUG: sockmisc.c:423:sendfromto():
send packet from 192.168.1.5[500]
Jul 26 07:54:56 dewG4laptop racoon: DEBUG: sockmisc.c:425:sendfromto():
send packet to xxx.xxx.xxx.xxx[500]
Jul 26 07:54:56 dewG4laptop racoon: DEBUG: sockmisc.c:570:sendfromto(): 1
times of 241 bytes message will be sent to 192.168.1.5[500]
Jul 26 07:54:56 dewG4laptop racoon: DEBUG: plog.c:199:plogdump():
Jul 26 07:54:56 dewG4laptop racoon: DEBUG:
isakmp.c:1784:isakmp_ph1resend(): resend phase1 packet
618d997594493356:0000000000000000
Jul 26 07:55:16 dewG4laptop racoon: DEBUG: sockmisc.c:421:sendfromto():
sockname 192.168.1.5[500]
Jul 26 07:55:16 dewG4laptop racoon: DEBUG: sockmisc.c:423:sendfromto():
send packet from 192.168.1.5[500]
Jul 26 07:55:16 dewG4laptop racoon: DEBUG: sockmisc.c:425:sendfromto():
send packet to xxx.xxx.xxx.xxx[500]
Jul 26 07:55:16 dewG4laptop racoon: DEBUG: sockmisc.c:570:sendfromto(): 1
times of 241 bytes message will be sent to 192.168.1.5[500]
Jul 26 07:55:16 dewG4laptop racoon: DEBUG: plog.c:199:plogdump():
Jul 26 07:55:16 dewG4laptop racoon: DEBUG:
isakmp.c:1784:isakmp_ph1resend(): resend phase1 packet
618d997594493356:0000000000000000
Jul 26 07:55:36 dewG4laptop racoon: DEBUG: sockmisc.c:421:sendfromto():
sockname 192.168.1.5[500]
Jul 26 07:55:36 dewG4laptop racoon: DEBUG: sockmisc.c:423:sendfromto():
send packet from 192.168.1.5[500]
Jul 26 07:55:36 dewG4laptop racoon: DEBUG: sockmisc.c:425:sendfromto():
send packet to xxx.xxx.xxx.xxx[500]
Jul 26 07:55:36 dewG4laptop racoon: DEBUG: sockmisc.c:570:sendfromto(): 1
times of 241 bytes message will be sent to 192.168.1.5[500]
Jul 26 07:55:36 dewG4laptop racoon: DEBUG: plog.c:199:plogdump():
Jul 26 07:55:36 dewG4laptop racoon: DEBUG:
isakmp.c:1784:isakmp_ph1resend(): resend phase1 packet
618d997594493356:0000000000000000
Jul 26 07:55:56 dewG4laptop racoon: ERROR:
isakmp.c:1772:isakmp_ph1resend(): phase1 negotiation failed due to time up.
618d997594493356:0000000000000000
delete net 192.168.0.0
Jul 26 07:56:40 dewG4laptop IPSecuritas: Flushing kernel keys
Jul 26 07:56:40 dewG4laptop racoon: DEBUG:
grabmyaddr.c:346:update_myaddrs(): caught rtm:2, need update interface
address list
Jul 26 07:56:40 dewG4laptop racoon: DEBUG:
grabmyaddr.c:346:update_myaddrs(): caught rtm:2, need update interface
address list
Jul 26 07:56:40 dewG4laptop racoon: DEBUG:
grabmyaddr.c:346:update_myaddrs(): caught rtm:13, need update interface
address list
Jul 26 07:56:40 dewG4laptop IPSecuritas: Stopping racoon...
Jul 26 07:56:40 dewG4laptop racoon: DEBUG: pfkey.c:195:pfkey_handler(): get
pfkey X_SPDFLUSH message
Jul 26 07:56:40 dewG4laptop racoon: DEBUG2: plog.c:199:plogdump():
Jul 26 07:56:40 dewG4laptop racoon: DEBUG: pfkey.c:195:pfkey_handler(): get
pfkey FLUSH message
Lucent IPSec
Lucent IPSec
by Bob on 2005-07-26 11:49:56 +0200
Hi
I was wondering if anyone has tips for getting IPSecuritas working with the
Lucent IPSec implementation.
The standard Lucent client works with Windows only and I'd love to get
access on my Mac.
BTW, it does ask for a username and password. I've read that some IPSec
implementations use something called xauth which I believe allows
proprietory authentication though I don't really understand the in's and
out's of how all this works.
Can someone please provide me with some advice or point me in a suitable
direction for more information? I've been searching google for weeks trying
to find a solution but haven't had any luck so far.
Thanks
Tiger, IPSecuritas, Sonicwall 2040 and NAT Trversl
Tiger, IPSecuritas, Sonicwall 2040 and NAT Trversl
by miles on 2005-08-01 19:38:18 +0200
we've been using IPSecuritas for some time, but suddenly it's stopped
working for all OS X users in my office.
We did recently upgrade the fw to SonicOS 3.1, but all windows users are
still able to VPN so we're wondering if this is tied to OS X 10.4.2 update last
week
In the client logs we see NO PROPOSAL CHOSEN for phase 2, and in the
firewall logs we see that NAT Traversal is failing on the client
any ideas? did something change in OS X?
thanks in advance
Re: Tiger, IPSecuritas, Sonicwall 2040 and NAT Trv
by David Chamberlin on 2005-08-16 02:04:06 +0200
I've been trying to setup IPSecuritas to a SonicWall 2040 as well with the
latest 3.1.7.x firmware and can't get past phase 2. It always gives a
NO-PROPOSAL-CHOSEN error. We are trying to connect to our group vpn
policy using preshared keys. Strangely, I tested using IPSecuritas (racoon)
on both 10.4.2 and 10.3.9 OS X with same result. Same result if I used the
other VPN clients that utilize racoon. So, I don't think it's related to racoon
version, unless you upgraded from much earlier OS X. Any ideas?
Re: Tiger, IPSecuritas, Sonicwall 2040 and NAT Trv
by miles on 2005-08-18 08:23:51 +0200
hey David, I've come to the conclusion it must be sonicos. just renewing our
support with sonicwall so I'll podt what I find out
may have to roll back to 2.1
IPSecuritas and SonicWall Pro 2040
IPSecuritas and SonicWall Pro 2040
by zervakos on 2005-08-02 15:39:17 +0200
Hello,
I have been successful in getting IPSecuritas to work with a SonicWall TZW,
and now I'm trying to get IPSecuritas to work with a SonicWall Pro 2040.
The problem I'm seeing is this in the logs of IPSecuritas:
Aug 2 06:26:41 vpnclient racoon: ERROR:
ipsec_doi.c:2993:ipsecdoi_checkid1(): Expecting IP address type in main
mode, but FQDN.
Aug 2 06:26:41 vpnclient racoon: ERROR:
ipsec_doi.c:2993:ipsecdoi_checkid1(): Expecting IP address type in main
mode, but FQDN.
Aug 2 06:26:41 vpnclient racoon: ERROR:
isakmp_ident.c:668:ident_i4recv(): invalid ID payload.
Aug 2 06:26:41 vpnclient racoon: ERROR:
isakmp_ident.c:668:ident_i4recv(): invalid ID payload.
Aug 2 06:26:52 vpnclient racoon: ERROR:
isakmp.c:2045:isakmp_chkph1there(): phase2 negotiation failed due to
time up waiting for phase1. ESP sonicwall_ip->192.168.1.110
Aug 2 06:26:52 vpnclient racoon: ERROR:
isakmp.c:2045:isakmp_chkph1there(): phase2 negotiation failed due to
time up waiting for phase1. ESP sonicwall_ip->192.168.1.110
Aug 2 06:26:52 vpnclient racoon: INFO:
isakmp.c:2050:isakmp_chkph1there(): delete phase 2 handler.
In the logs of the SonicWall, I see that phase I successfully completes, but I
also get this:
Warning Received packet retransmission. Drop duplicate packet public_ip_vpnclient_hides_behind 0.0.0.0 -
Has anyone come across this perhaps?
Re: IPSecuritas and SonicWall Pro 2040
by Mike on 2005-08-11 22:40:16 +0200
Bump on this but I get a different error message with mine. Here is what
mine is saying. Also Sonicwall is running latest firmware update version
3.1.0.6-75s
Sonicwall output
IKE Responder: IPSec proposal does not match (Phase 2)
IPsecuritas Output
Log output from IPSecuritas 2.1
Aug 11 13:39:35 Michael-Palfreys-Computer-2
configuration
Aug 11 13:39:35 Michael-Palfreys-Computer-2
racoon.conf
Aug 11 13:39:35 Michael-Palfreys-Computer-2
setkey.conf
Aug 11 13:39:35 Michael-Palfreys-Computer-2
psk.txt
Aug 11 13:39:35 Michael-Palfreys-Computer-2
tunnel.conf
Aug 11 13:39:35 Michael-Palfreys-Computer-2
configuration done
Aug 11 13:39:36 Michael-Palfreys-Computer-2
racoon...
Aug 11 13:39:36 Michael-Palfreys-Computer-2
running
Aug 11 13:39:36 Michael-Palfreys-Computer-2
The result of line 5: File exists.
The result of line 6: File exists.
IPSecuritas: Parsing
IPSecuritas: Setting up
IPSecuritas: Setting up
IPSecuritas: Setting up
IPSecuritas: Setting up
IPSecuritas: Parsing
IPSecuritas: Starting
IPSecuritas: Racoon is
IPSecuritas: Set kernel keys
netgear fvs318 vpn setup
netgear fvs318 vpn setup
by mike on 2005-08-03 18:14:35 +0200
I set up a netgear fvs318 in a branch office that is using dsl to the internet.
I am trying to setup vpn connections from the computers in the branch
office back to the main office. We are using a cisco concentrator at the
main office and the cisco vpn client on the pc's in the branch office. I am
able to connect one computer back to the main office. when I attempt to
connect a second computer the first computer loses connection. from what
i understand the ng fvs318 is supposed to do nat'ing(one to many), says so
on the box. where in the web interface do i config nat and/or do i need
config seperat vpn tunnels for each pc. I only have one ip from my isp.
thanks
mike
Re: netgear fvs318 vpn setup
by cnadig on 2005-08-04 23:33:02 +0200
Hello Mike,
having multiple IPSec clients in a NAT'ed private network talking to the
same remote won't work unless you used NAT-T for all clients (the NAT
router cannot distinguish incoming IPSec traffic and will just send it on to
the last known client - resulting in the behaviour you described).
In your situation I'd recommend to permanently connect the two LANs
(branch office and main office) by the FVS318 itself - so instead of having
an individual tunnel for each PC, there is only one between the FVS318 and
the Cisco concentrator, tunneling the traffic for all PCs.
Hope this helps,
Christoph
Resolved Multiple Addresses
Resolved Multiple Addresses
by MikeyG_U2 on 2005-08-03 20:25:53 +0200
I'm in the process of configuring IPSecuritas to access a Checkpoint VPN-1
but have run into many problems. The one that is currently throwing me is
that it reports that it's resolving multiple addresses... Here is my log:
Aug 3 13:02:45 Panther IPSecuritas: Parsing configuration
Aug 3 13:02:45 Panther IPSecuritas: Setting up racoon.conf
Aug 3 13:02:45 Panther IPSecuritas: Setting up setkey.conf
Aug 3 13:02:45 Panther IPSecuritas: Setting up psk.txt
Aug 3 13:02:45 Panther IPSecuritas: Setting up tunnel.conf
Aug 3 13:02:45 Panther IPSecuritas: Parsing configuration done
Aug 3 13:02:46 Panther IPSecuritas: Starting racoon...
Aug 3 13:02:46 Panther IPSecuritas: Racoon is running
Aug 3 13:02:46 Panther IPSecuritas: Set kernel keys
line 3: Unknown error at [192.168.1.0]
line 3: Unknown error at [192.168.69.69]
line 4: Unknown error at [192.168.69.69]
line 4: Unknown error at [192.168.1.0]
Aug 3 13:02:46 Panther racoon: ERROR: sockmisc.c:738:str2saddr():
getaddrinfo(204.253.2.254,500): resolved to multiple address, taking the
first one
Aug 3 13:02:46 Panther racoon: ERROR: sockmisc.c:738:str2saddr():
getaddrinfo(204.253.2.254,500): resolved to multiple address, taking the
first one
Aug 3 13:02:46 Panther racoon: ERROR: sockmisc.c:738:str2saddr():
getaddrinfo(192.168.69.69,0): resolved to multiple address, taking the first
one
Aug 3 13:02:46 Panther racoon: ERROR: sockmisc.c:738:str2saddr():
getaddrinfo(192.168.69.69,0): resolved to multiple address, taking the first
one
Aug 3 13:02:46 Panther racoon: ERROR: sockmisc.c:738:str2saddr():
getaddrinfo(192.168.1.0,0): resolved to multiple address, taking the first
one
Aug 3 13:02:46 Panther racoon: ERROR: sockmisc.c:738:str2saddr():
getaddrinfo(192.168.1.0,0): resolved to multiple address, taking the first
one
Aug 3 13:02:46 Panther racoon: ERROR: sockmisc.c:738:str2saddr():
getaddrinfo(192.168.69.69,500): resolved to multiple address, taking the
first one
Aug 3 13:02:46 Panther racoon: ERROR: sockmisc.c:738:str2saddr():
getaddrinfo(192.168.69.69,500): resolved to multiple address, taking the
first one
Aug 3 13:09:42 Panther racoon: ERROR:
isakmp.c:2045:isakmp_chkph1there(): phase2 negotiation failed due to
time up waiting for phase1. ESP 204.253.2.254->192.168.69.69
Aug 3 13:09:42 Panther racoon: ERROR:
isakmp.c:2045:isakmp_chkph1there(): phase2 negotiation failed due to
time up waiting for phase1. ESP 204.253.2.254->192.168.69.69
Aug 3 13:10:42 Panther IPSecuritas: Flushing kernel keys
Has anyone seen this issue? I can't figure out what is causing it. Oh,
192.168.69.69 is my internal IP (behind a Linksys router with IPSec
passthrough enabled) and 192.168.1.0 is the remote network and netmask
I'm connecting to.
Thanks for any insight.
-Mike
Re: Resolved Multiple Addresses
by VPNmac on 2005-08-07 10:12:37 +0200
More issues with Check Point here:
http://www.lobotomo.com/cgi-bin/yabb/YaBB.pl?board=IPSecuritas;
action=display;num=1117914134
IPSecuritas behind FW to Bintec VPN25 ?
IPSecuritas behind FW to Bintec VPN25 ?
by avalon_s_de on 2005-08-14 16:48:08 +0200
Hello all,
i try to get a working connection to a funkwerk (afka Bintec) VPN Access 25.
The VPN Phase1 and Phase2 are established correctly, but i cannot ping any
host in the remote network.
I set up a Host-Network connection.
I use the following setup-details:
Phase1: 3des/MD5
Phase2: PFS 3des/MD5
Preshared key
remote-auth: adress
local-auth: fqdn
I get the VPN up, but reaching the remote-hosts dowsn't work
any hints / ideas ?
connection with VPN Tracker works correctly...
thx stefan
Re: IPSecuritas behind FW to Bintec VPN25 ?
by Florian on 2006-03-29 17:24:45 +0200
Hi Stefan,
how did you get your VPN to work?
Thanks a lot
florian
Re: IPSecuritas behind FW to Bintec VPN25 ?
by Stefan Dietz on 2006-03-30 10:15:37 +0200
Florian,
i got the vpn working by setting up the traffic settings correctly ;) there
where some entries missing.
send an email when you have further questions.
regards,
-stefan
Re: IPSecuritas behind FW to Bintec VPN25 ?
by netgoblin on 2006-05-17 11:19:47 +0200
Hey Florian,
see this Link
http://www.lobotomo.com/cgi-bin/yabb/YaBB.pl?board=IPSecuritas;
action=display;num=1087200958
for more Info about Bintec / IPSecuritas write a EMail.
-thorsten
GB OS 3.7 Mac 10.4.2
GB OS 3.7 Mac 10.4.2
by Ryan.Haller on 2005-08-24 19:13:15 +0200
Hello,
GB-500 with GB OS 3.7 using a Mac 10.4.2 Client and IPSecuritas. Anyone
else have this setup? Still in the testing stage but I can not seem to get it to
work. Check box goes green, I show authenticated user and Active VPN but
I can not get anywhere on the local network. IPsecuritas seems to be
ignoring the getmyaddr response message.... possibly because I put it in
during configuration. it is msg #4 and or #5
If anyone has any insight, please help?
-Ryan
IPSecuritas 2.1 mysterious failure
IPSecuritas 2.1 mysterious failure
by Olaf Mьller-Michaels on 2005-09-12 19:32:06 +0200
Until today IPSecuritas worked great with the Bintec router in our firm.
Starting today, I cannot connect to the internal network anymore. Nothing
was changed on the company side. I also tried the same settings with VPN
Tracker and everything still works fine. However, with IPSecuritas I can
connect fine to the router, and it seems to establish a tunnel, but when I try
to ping our internal server, it does not work.
Maybe I can do a total reinstall of IPSecuritas, but I do not know where all
the settings sit; simply deleting IPSecuritas from the Applications folder is
not enough.
Any other ideas? On request, I can send the debug output. I do not want to
change to VPN Tracker, please ... ;D
Re: IPSecuritas 2.1 mysterious failure
by Olaf Mьller-Michaels on 2005-09-12 22:51:53 +0200
Intermittently it worked again, but very unreliable. This is what seems to
cause the problem, I get this message repeatedely:
Sep 12 22:49:28 Powerbook-OMM racoon: DEBUG:
grabmyaddr.c:340:update_myaddrs(): msg 5 not interesting
Olaf
Mac Gateway Assistant
Mac Gateway Assistant
by mitchellzone on 2005-09-12 19:59:04 +0200
Anyone have any luck setting up a VPN that can be accessed by machines
behind a Mac OS X internet gateway, or know how this can be done? The
VPN appears to work fine on the gateway machine itself, but I can't get any
machines BEHIND the gateway to see the VPN.
Sure there's a routing trick that can make this work, but the route table
looks okay already, so not sure what's happening there...
/mike
IPSecuritas and SonicWALL SOHO3
IPSecuritas and SonicWALL SOHO3
by Louis Gephardt on 2005-09-13 22:10:45 +0200
I'm trying to connect to a SonicWALL SOHO3 device at a remote office and I
keep getting this in the log and it won't connect:
Sep 13 16:08:27 Mozart racoon: DEBUG:
isakmp.c:1784:isakmp_ph1resend(): resend phase1 packet
be12e283176fab00:0000000000000000
Sep 13 16:08:27 Mozart racoon: DEBUG: isakmp.c:238:isakmp_handler():
===
Sep 13 16:08:27 Mozart racoon: DEBUG: isakmp.c:239:isakmp_handler():
208 bytes message received from 66.159.77.44[500]
Sep 13 16:08:27 Mozart racoon: DEBUG: plog.c:199:plogdump():
Sep 13 16:08:27 Mozart racoon: DEBUG: isakmp.c:539:isakmp_main():
malformed cookie received or the initiator's cookies collide.
Sep 13 16:08:47 Mozart racoon: DEBUG: sockmisc.c:421:sendfromto():
sockname 10.0.0.102[500]
Sep 13 16:08:47 Mozart racoon: DEBUG: sockmisc.c:423:sendfromto(): send
packet from 10.0.0.102[500]
Sep 13 16:08:47 Mozart racoon: DEBUG: sockmisc.c:425:sendfromto(): send
packet to xxx.xxx.xxx.xxx[500]
Sep 13 16:08:47 Mozart racoon: DEBUG: sockmisc.c:570:sendfromto(): 1
times of 112 bytes message will be sent to 10.0.0.102[500]
Sep 13 16:08:47 Mozart racoon: DEBUG: plog.c:199:plogdump():
Sep 13 16:08:47 Mozart racoon: DEBUG:
isakmp.c:1784:isakmp_ph1resend(): resend phase1 packet
be12e283176fab00:0000000000000000
Sep 13 16:08:47 Mozart racoon: DEBUG: isakmp.c:238:isakmp_handler():
===
Sep 13 16:08:47 Mozart racoon: DEBUG: isakmp.c:239:isakmp_handler():
208 bytes message received from xxx.xxx.xxx.xxx[500]
Sep 13 16:08:47 Mozart racoon: DEBUG: plog.c:199:plogdump():
Sep 13 16:08:47 Mozart racoon: DEBUG: isakmp.c:539:isakmp_main():
malformed cookie received or the initiator's cookies collide.
Sep 13 16:09:07 Mozart racoon: ERROR:
isakmp.c:1772:isakmp_ph1resend(): phase1 negotiation failed due to time
up. be12e283176fab00:0000000000000000
Any ideas? I'm running 10.4.2 on my Mac and the SOHO3 has the latest
firmware.
known good sonicwall pro 230 settings
known good sonicwall pro 230 settings
by nunya biznas on 2005-09-17 16:58:14 +0200
I just got a sonicwall pro 230 work, here are my settings. omitted items are
blank or unchecked.
:General
host to network
static ip at work
first three numbers of work network with a zero on the end (192,168.1.0)
24
blank
main and agressive checked
obey
16
:Phase 1
28000
mod768(1)
3des
sha1
:phase 2
28800
none
des
3des
hmac sha1
:id/auth
address
address
preshared secret from sonicwall
:options
ipsec doi
sit_identity_only
initial contact
generate policy
dhcp pass-through
establish ike immediatly
:sonicwall
groupvpn
ike using pre-shared secret
group 1
28800
3des &sha1
strg enc and auth (esp 3des hmac sha1)
shared secret
:advanced
all unchecked
group 1
0.0.0.0
lan
(after changing items on this menu you must hit update on main screen for
items to take effect)
Re: known good sonicwall pro 230 settings
by nunya biznas on 2005-09-17 17:07:05 +0200
oops
am using Mac OS X 10.4.1
known good sonicwall tz 170 settings
known good sonicwall tz 170 settings
by nunya biznas on 2005-09-17 17:04:28 +0200
I just got a sonicwall tz 170 work, here are my settings. omitted items are
blank or unchecked.
:General
host to network
static ip at work
first three numbers of work network with a zero on the end (192,168.1.0)
24
blank
main and agressive checked
obey
16
:Phase 1
28000
mod768(1)
3des
sha1
:phase 2
28800
none
des
3des
hmac sha1
:id/auth
address
address
preshared secret from sonicwall
:options
ipsec doi
sit_identity_only
initial contact
generate policy
dhcp pass-through
establish ike immediatly
:sonicwall
groupvpn
ike using pre-shared secret
:proposals
group 2
3des
sha1
28800
esp
des
md5
group 1
28800
:advanced
forward packets
0.0.0.0
lan
:Client
split tunnels
Re: known good sonicwall tz 170 settings
by nunya biznas on 2005-09-17 17:06:24 +0200
oops.
Am using Mac OS X 10.4.1
Re: known good sonicwall tz 170 settings
by w_grace on 2006-02-21 19:06:01 +0100
Hello,
Thats using the default settings on the Sonicwall, is it possible to change
anything from the default settings and still keep it working?
It seems strange that you can not change it from the default settings.
Re: known good sonicwall tz 170 settings
by Uptimejeff on 2006-03-08 17:19:30 +0100
No go for me...
OS X 10.4.5
Sonicwall TZ170 3.1.0.12-86s
I am able to make ipSEC connection to several Linksys devices, but have not
had any success connecting to a Sonicwall (tried several)
On the Sonicwall, I tried the defaults of the Group VPN with the settings as
described in this thread. It's not possible for me to be sure that all the
settings are the same because not all fields are listed. Screen shots might
be more accurate (and faster).
If anyone has a similar config running, I would be willing to email screen
shots of my ipSecuritas and Sonciwall setup or receive screenshots of your
working configuration.
Thanks
Jeff
Re: known good sonicwall tz 170 settings
by xrub on 2006-06-04 18:52:20 +0200
Doesn't work for me either with exact settings. OS X 10.4.6
Firmware SonicOS Standard 3.1.0.15-95s on TZ170W
I spent 3 hours trying to get this to work without success. Then
I downloaded VPN Tracker and set it up in 5 minutes. Is it worth the money?
Depends how much your time is worth. Personally, I think spending time
setting up a VPN connection is a gross waste of time. I'll gladly pay for a
good solution.
Re: My working TZ170 settings
by northben on 2006-07-29 06:31:15 +0200
I finally have this working except for dns. I can ping an ip address but it
apparently isn't getting the dns server (our Domain Controller, not the
Sonicwall). I opened up the sonicwall config page and copy the settings to
IP Securitas.
If anyone has questions, I'd be glad to help with what I can. email/IM me at
[email protected].
If anyone has any suggestions for dns, I'd be glad to know about it.
Troubles while installing certs
Troubles while installing certs
by Dennis on 2005-09-20 18:36:49 +0200
While installing the certs according to dividedsky.net/~equate/vpn/
I am told to do the follwing:
openssl pkc12 -in RoadCert.p12 -nodes -nokeys -clcerts -out
x509gate.pem
for extracting in PEM format.
openssl pkcs12 -nodes -nocerts -in RoadCert.p12 -out private.pem
for extracting the private key.
After that I try to import these files by using the Certificate Manager.
First the foreign, but while importing the private key I get this message:
"Failed to import priv.pem.
Please make sure the file contains a signed X.509 certifcate in PEM format."
Any hints?
VPN Broken in Mac OS X 10.4.2 ?
VPN Broken in Mac OS X 10.4.2 ?
by nunya biznas on 2005-10-06 03:53:56 +0200
For some reason I have a 10.4.1 laptop that works from home with a
sonicwall at work, yet my 10.4.2 G5 tower from home does not.
Identical settings in IPSecuritas.
Anyone know if I should post my log file and try to solve or just wait for
10.4.3?
thanks for any insight.
Re: VPN Broken in Mac OS X 10.4.2 ?
by jt on 2005-10-09 16:52:50 +0200
Wow, not a single reply. I'd a thought someone would let me know if 10.4.2
is or isn't broken. I have other problems with it as well, it broke some
networking features in Virtual PC.
;)
Here's my log output from a known good configuration with a sonicwall.
Again, I have a 10.4.1 laptop that, with the same configuration has no
problem connecting.
Log output from IPSecuritas 2.1
Oct 9 09:44:23 gtower IPSecuritas: Parsing configuration
Oct 9 09:44:23 gtower IPSecuritas: Setting up racoon.conf
Oct 9 09:44:23 gtower IPSecuritas: Setting up setkey.conf
Oct 9 09:44:23 gtower IPSecuritas: Setting up psk.txt
Oct 9 09:44:23 gtower IPSecuritas: Setting up tunnel.conf
Oct 9 09:44:23 gtower IPSecuritas: Parsing configuration done
Oct 9 09:44:24 gtower IPSecuritas: Starting racoon...
Oct 9 09:44:25 gtower IPSecuritas: Racoon is running
Oct 9 09:44:25 gtower IPSecuritas: Set kernel keys
Oct 9 09:44:25 gtower racoon: DEBUG2: cfparse.y:1413:cfparse(): parse
successed.
Oct 9 09:44:25 gtower racoon: DEBUG: isakmp.c:1592:isakmp_open():
10.0.1.4[500] used as isakmp port (fd=8)
Oct 9 09:44:25 gtower racoon: DEBUG: isakmp.c:1610:isakmp_open():
10.0.1.4[4500] used as nat-t isakmp port (fd=9)
Oct 9 09:44:25 gtower racoon: DEBUG: pfkey.c:195:pfkey_handler(): get
pfkey X_SPDDUMP message
Oct 9 09:44:25 gtower racoon: DEBUG2: plog.c:199:plogdump():
Oct 9 09:44:25 gtower racoon: DEBUG: pfkey.c:210:pfkey_handler(): pfkey
X_SPDDUMP failed: No such file or directory
Re: VPN Broken in Mac OS X 10.4.2 ?
by jt on 2005-10-09 16:54:33 +0200
for completeness, this is my log
Re: VPN Broken in Mac OS X 10.4.2 ?
by jt on 2005-10-09 16:59:31 +0200
for completeness, this is my log off 10.4.2 to a different sonicwall. This
configuration also works fine off the 10.4.1 laptop.
Oct 9 09:53:56 gtower IPSecuritas: Parsing configuration
Oct 9 09:53:56 gtower IPSecuritas: Setting up racoon.conf
Oct 9 09:53:56 gtower IPSecuritas: Setting up setkey.conf
Oct 9 09:53:56 gtower IPSecuritas: Setting up psk.txt
Oct 9 09:53:56 gtower IPSecuritas: Setting up tunnel.conf
Oct 9 09:53:56 gtower IPSecuritas: Parsing configuration done
Oct 9 09:53:57 gtower IPSecuritas: Starting racoon...
Oct 9 09:53:57 gtower IPSecuritas: Racoon is running
Oct 9 09:53:57 gtower IPSecuritas: Set kernel keys
add net 172.16.10.0: gateway gif0
Oct 9 09:53:57 gtower racoon: DEBUG2: cfparse.y:1413:cfparse(): parse
successed.
Oct 9 09:53:57 gtower racoon: DEBUG: isakmp.c:1592:isakmp_open():
10.0.1.4[500] used as isakmp port (fd=8)
Oct 9 09:53:57 gtower racoon: DEBUG: isakmp.c:1610:isakmp_open():
10.0.1.4[4500] used as nat-t isakmp port (fd=9)
Oct 9 09:53:57 gtower racoon: DEBUG: pfkey.c:195:pfkey_handler(): get
pfkey X_SPDDUMP message
Oct 9 09:53:57 gtower racoon: DEBUG2: plog.c:199:plogdump():
Oct 9 09:53:57 gtower racoon: DEBUG: pfkey.c:210:pfkey_handler(): pfkey
X_SPDDUMP failed: No such file or directory
Oct 9 09:53:58 gtower racoon: DEBUG:
grabmyaddr.c:346:update_myaddrs(): caught rtm:12, need update interface
address list
Oct 9 09:53:58 gtower racoon: DEBUG:
grabmyaddr.c:340:update_myaddrs(): msg 1 not interesting
Oct 9 09:53:58 gtower racoon: DEBUG:
grabmyaddr.c:346:update_myaddrs(): caught rtm:14, need update interface
address list
Oct 9 09:53:58 gtower racoon: DEBUG:
grabmyaddr.c:340:update_myaddrs(): msg 1 not interesting
Oct 9 09:53:58 gtower racoon: DEBUG: pfkey.c:195:pfkey_handler(): get
pfkey ACQUIRE message
Oct 9 09:53:58 gtower racoon: DEBUG2: plog.c:199:plogdump():
Oct 9 09:53:58 gtower racoon: DEBUG: pfkey.c:1551:pk_recvacquire():
suitable outbound SP found: 10.0.12.1/32[0] 172.16.10.0/24[0] proto=any
dir=out.
Oct 9 09:53:58 gtower racoon: DEBUG: policy.c:184:cmpspidxstrict():
sub:0xbffff970: 172.16.10.0/24[0] 10.0.12.1/32[0] proto=any dir=in
Oct 9 09:53:58 gtower racoon: DEBUG: policy.c:185:cmpspidxstrict(): db
:0x306778: 172.16.10.0/24[0] 10.0.12.1/32[0] proto=any dir=in
Oct 9 09:53:58 gtower racoon: DEBUG: pfkey.c:1567:pk_recvacquire():
suitable inbound SP found: 172.16.10.0/24[0] 10.0.12.1/32[0] proto=any
dir=in.
Oct 9 09:53:58 gtower racoon: DEBUG: pfkey.c:1606:pk_recvacquire(): new
acquire 10.0.12.1/32[0] 172.16.10.0/24[0] proto=any dir=out
Oct 9 09:53:58 gtower racoon: DEBUG: proposal.c:826:printsaproto():
(proto_id=ESP spisize=4 spi=00000000 spi_p=00000000
encmode=Tunnel reqid=0:0)
Oct 9 09:53:58 gtower racoon: DEBUG: proposal.c:860:printsatrns():
(trns_id=DES encklen=0 authtype=1)
Oct 9 09:53:58 gtower racoon: DEBUG: proposal.c:860:printsatrns():
(trns_id=DES encklen=0 authtype=2)
Oct 9 09:53:58 gtower racoon: DEBUG: proposal.c:860:printsatrns():
(trns_id=3DES encklen=0 authtype=1)
Oct 9 09:53:58 gtower racoon: DEBUG: proposal.c:860:printsatrns():
(trns_id=3DES encklen=0 authtype=2)
Oct 9 09:53:58 gtower racoon: DEBUG: remoteconf.c:118:getrmconf():
Re: VPN Broken in Mac OS X 10.4.2 ?
by cnadig on 2005-10-10 08:38:34 +0200
Hello,
I'm not aware of any problems with 10.4.2. From what I can see in your log,
it seems that the remote router/firewall does not send an answer on your
side's request. Do you have access to the router's log?
Christoph
Re: VPN Broken in Mac OS X 10.4.2 ?
by nunya biznas on 2005-10-27 02:44:52 +0200
Got it working on my G5.
Turns out all I had to do was completely delete the settings I had been
working with out of the IPSecuritas menu and start over. Started working
first try.
RV042 Setup Needed
RV042 Setup Needed
by johnnj on 2005-10-14 19:08:40 +0200
I've got to say this router as driven me nuts! I can't get it to work with any
of our Mac OS X users.
I just want to set up 3 connections with mobile users. All using Mac OS X
(Hey OS X helps cut down on IT work for the mobile users).
I have read through most of the postings on this site for linksys routers and
only a few have stated that they have gotten it to work but don't supply
sufficent information. LinkSys claims that Mac OS X VPN software only
works with the Cisco routers. (Which is BS because I have to use a Cisco
VPN Client for their routers)
If anyone could please provide me with some help, links, advice, etc...
Thanks
JohnNJ
Re: RV042 Setup Needed
by Rand on 2005-12-09 06:45:56 +0100
Has anyone been succesful creating a VPN connection to a RV042/RV042?
Any help would be appreciated.
Re: RV042 Setup Needed
by Heston on 2006-01-05 20:20:18 +0100
Hey - any joy with this?? I'm thinking of getting some RV042/RV082 for an
all mac environment - gulp.
Thanks
Re: RV042 Setup Needed
by macmouse on 2006-03-31 15:15:20 +0200
If anyone has gotten this to work an you please post the settings?
Thank you!
VPN/IPSec to LANCOM Routers
VPN/IPSec to LANCOM Routers
by Heiko Amft on 2005-10-17 00:47:58 +0200
Does anyone have success with vpn-IPSec-connection between Mac (10.4.2)
and a LANCOM-Router with preshared keys, especially LANCOM
DSL/I-1611 or the new 1611+ ?
I'm testing for a few days, it seems to be the ipsec-tunnel starts up but no
traffic in- or outgoing.
any ideas ?
greetings Heiko
Re: VPN/IPSec to LANCOM Routers
by Erik Roderwald on 2006-02-06 09:44:13 +0100
Hi Heiko!
First of all, do you have access to a windows machine? If you have you
should install the Lancom software which includes the Lancom Monitor.
That tool is very helpfull for looking up what's going wrong with your VPN
connection. Also the assistants are not bad.
I just made it for a client. Two things went wrong:
First of all make sure that there is for each VPN connection an entry in
configure (Konfigurieren), PPP connections (PPP-Verbindungen; I hope that I
retranslate it correctly; your name sounds german, so I gave you the
german items in the brackets). If there isn't an entry add one which
contains only the name of the wanted connection. You may activate IP
forwarding and NetBIOS over IP. The rest you leave blank.
The other thing which went wrong was the local and remote identifier. I
tried it with a full qualified user name which didn't work even though I
found it in several online documents to be configured like that. I changed it
to domain name and it worked fine. The router I named like
router.network.local and the clients like user1.network.local.
Well, I also called the Lancom hotline which is quite expensive but very
helpfull. They sent me a step by step help file (pdf; german). Unfortunately
it is not public. So I cannot give you an URL or send it to you. I'm sorry, you
have to call them and ask for it.
HTH
Erik
Tiger 10.4.2 and IPSecuritas 2.1 Problems
Tiger 10.4.2 and IPSecuritas 2.1 Problems
by Nick Rigby on 2005-10-18 14:03:26 +0200
Hi,
I'm having problems with my VPN (IPSecuritas 2.1) and Tiger 10.4.2.
I can create a connection with my work network, and can connect to a
couple of the server. However, some servers cause finder to hang and then
stop responding. It appears that it's only the servers with a large amount of
folders on them that I can't connect to.
Does anyone know of a problem, or the solution.
Thanks,
Nick
Re: Tiger 10.4.2 and IPSecuritas 2.1 Problems
by Nick Rigby on 2005-11-09 12:59:30 +0100
Still having problems, even with the 10.4.3 update. It certainly appears that
connecting to servers with a large amount of data (folders) causes finder to
crash.
AEBS setup examples?
AEBS setup examples?
by Sig on 2005-10-18 21:12:16 +0200
Can anyone help with a sample config or settings for an AEBS? I'm trying to
use IP2sec from a Powerbook, through the AEBS firewall (most likely have to
open ports, though I have no idea which one, guessing 24), and out to the
Internet. I would assume this would bypass all firewall settings without
some customization. A good and bad thing, though not real risky on OS X.
Thanks much in advance.
Acquiring IP address from Cisco 3000?
Acquiring IP address from Cisco 3000?
by WD40 on 2005-10-19 20:40:05 +0200
I just recently got IPSecuritas to connect to a Cisco 3000 Concentrator VPN.
One area that doesn't seem to be working, though, is that IPSecuritas
(racoon?) won't acquire an IP address from the Cisco unit.
If I leave "local address" blank, ifconfig shows "gif0" with no address, and
the VPN for the most part doesn't work. However, if I manually enter a
local address, the ipsec stuff works fine.
How can I set up IPSecuritas to request and use an IP address from the
remote IPSec device?
Thanks!
Early Replacement Of Name Servers
Early Replacement Of Name Servers
by goldharv on 2005-10-21 01:23:17 +0200
I love IPSecuritas, but I've run into a problem implementing it.
I've defined a default domain name and 2 name servers that are visable only
when connected to my VPNs. However, /etc/resolv.conf gets replaced
immediately after IPSecuritas starts IPSec. Unfortunately, my ISP changes
my IP address occasionally and I have to use a dynamic DNS service. My
VPNs are defined to use the fully qualified domain name of my home
firewall. The net result is that if my VPN does not come up soon enough,
my access to DNS servers is gone.
I'm mainly posting this as a warning to others. I spent an hour or two
trying to figure out what was going on. It would be great if IPSecuritas
waited until the VPN was established before switching resolv.conf, and if it
switched it back if the connection drops.
To be really snazzy, you should be able to tell if the DNS server is
accessible based on the network address of the VPN. For example, if I've
entered 192.168.0.1 and 192.168.2.1 as name server addresses and if one
of my VPNs connects to 192.168.0.0 and the other connects to
192.168.2.0, it should be obvious which connections have to be up before
modifying resolv.conf.
Harry
IPSecuritas Auto Start with certificates (10.3.9)
IPSecuritas Auto Start with certificates (10.3.9)
by SomeUser on 2005-10-27 22:24:21 +0200
IPSecuritas Auto Start in 10.3.9 is broken if you use certificates...
IPSecuritas stores certificates and config files in /private/tmp when you
click "Auto Start". Mac OS X runs /etc/rc.cleanup after boot, which deletes
all files in /private/tmp.
Solution:
1) Lobotomo could save the config/cert files somewhere more sensible like
/etc
2) Edit /etc/rc.cleanupto spare deletion of your config/cert files:
e.g.
(line 43)[code]
# Clean out /private/tmp.
if [ -d /private/tmp ]; then
# blow away any _tmp_ in case it exists as well
if [ -f /private/_tmp_ ]; then
chflags -R nouchg /private/_tmp_ && rm -rf /private/_tmp_
fi
echo -n " /private/tmp"
+ mkdir -m 1777 /private/_tmp_
+ find /private/tmp/* ! -name ipsecuritas\* -maxdepth 0 -exec mv {}
/private/_tmp_ \;
+ find /private/tmp/.[^.]* -maxdepth 0 -exec mv {} /private/_tmp_ \;
- mv /private/tmp /private/_tmp_
(chflags -R nouchg /private/_tmp_ && rm -rf /private/_tmp_) &
fi
- mkdir -m 1777 /private/tmp
[/code]
Netgear FVS124G
Netgear FVS124G
by David on 2005-11-01 17:47:26 +0100
I can connect to the likes of Netgear FVS318 just fine but this new FVS124G
is more complex - anyone else connecting to it?
Re: Netgear FVS124G
by Daniel Loewus-Deitch on 2006-01-19 22:25:21 +0100
I also am having no luck connecting to a Netgear FVS124G. If possible, can
anyone explain all the settings necessary on both the router and IPSecuritas
in order to make this VPN connection work?
I am really frustrated and I am hoping to avoid spending an exorbant
amount of money to buy VPN Tracker, just because Netgear is too lazy to
support Macs with their own VPN client.
If anyone has IP
Re: Netgear FVS124G
by danlode on 2006-01-19 22:35:07 +0100
To finish my post above:
If anyone has been able to get IPSecuritas to work with the Netgear
FVS124G, please post here or contact me at
[email protected].
Thank you so much!!
Regards
Re: Netgear FVS124G
by grep on 2006-05-10 03:55:14 +0200
I have recently purchased the FVS124g router to replace my linksys router
with service from verizon.dsl.
Nope doesn't work, so I took it back to the store and got another one. Nope
it doesn't work either. Then called tech support in India, level one was quite
good but couldn't make it work, Level 2 was so so, but couldn't make it
work, now level 3 is working on it but with no luck so far. My fix at the
moment is to unplug the netgear and plug the linksys back in, works
almost instantly and works fine. My current opinion of Netgear is probably
not very good.
Grep
Re: Netgear FVS124G
by rogerm on 2007-04-09 19:05:21 +0200
Greetings,
I was able to get this to work. As others did I looked at how VPN tracker
configured itself and adapted from there. Below is the info. (please note
the formatting got a bit messed up)
--------------------------------------------------------------Setting up IPSecuritas and FVS124G router.
Configuration of FVS124G VPN.
Log into your FVS124G router
1.Create and name a new IKE policy.
1.Direction Type : Responder
2.Exchange Mode: Aggressive.
3.Local. Select Local Gateway. Select Wan1, or Wan2 depending on which
port this policy will be active on.
1.Local Identity Type: FQDN – Fully Qualified Domain Name
2.Local Identity Data: netgearrouter.local. This can be anything you want
and will be used in the client configuration as well.
4.Remote. Remote Host Configuration Record : None
1.Remote Identity Type: FQDN – Fully Qualified Domain Name
2.Remote Identity Data: thevpncleint.com. This can be anything you want
and will be used in the client configuration as well.
5.IKE SA Parameters.
1.Encryption algorithm: 3DES
2.Authentication Algorithm: SHA1
3.Authentication Method: Select Pre-Shared Key
1.Enter the pre-shared key.
4.Diffle Hellman (DH) Group: Group 2 (1024 Bit)
5.SA Life Time: 3600
6.Select Apply to save the configuration.
2.Create a new VPN Policy.
1.IKE Policy: Select the name of the IKE Policy that you just created.
2.Remote VPN End Point:
1.Address Type: IP Address
2.Address Data: 0.0.0.0
3.SA Life Time
1.Seconds: 3600
2.Kbytes: 0
4.Check Box: IPSec PFS – no check.
1.PFS Key group: Ignored as step 4 contains no check.
5.Traffic Selector
1.Local IP: Subnet Address ( you will need to adjust this section with your
IP info)
1.Start IP Address: 192.168.254.0
2.Finish IP Address:
3.Subnet Mask: 255.255.255.0
2.Remote IP: Single Address
1.Start IP Address: 192.168.252.100
2.Finish IP Address
3.Subnet Mask:
3.AH Configuration
1.Check Box: Enable Authentication – no check
2.Authentication Algorithm. ignored with no check in section 3.1
4.ESP Configuration
1.Check Box: Enable Encryption – Check
1.Encryption Algorithm: 3DES
2.Check Box: Enable Authentication – Check
1.Authentication Algorithm: SHA-1
5.Select apply to save the configuration.
Re: Netgear FVS124G
by mpilch on 2007-04-15 01:30:08 +0200
rogerm:
I tried to mimic your configuration but still without success.
Which firmware do you have in your FVS124G ?
I have 1.1.38.
Also looks like you are not using "VPN wizard" to set your "IKE Policies" and
"VPN Policies".
So I have question: How did you set "VPN Client Policy". I assume this is one
you are using in your walkthrough?
There is no way (at list I can not find it) to add new "VPN Client Policy".
Manualy I can add only "VPN Policy". Only using "VPN Wizard" I can add
entry to "VPN Client Policy" and later edit it.
I also assumed you are using IPSecuritas v3 in your guide.
thanks,
Marek
Re: Netgear FVS124G
by mpilch on 2007-04-15 06:27:50 +0200
It works now. ;D
Thanks for great walk through. Good work.
Marek
Mac VPN Client using IPSecuritias Case Study is av
Mac VPN Client using IPSecuritias Case Study is av
by jmizoguchi on 2005-11-06 20:13:51 +0100
FYI
http://www.xtreme-racing-team.com/casestudy.html
Re: Mac VPN Client using IPSecuritias Case Study i
by jmizoguchi on 2006-01-29 19:48:25 +0100
New site is vpncasestudy.com
Zyxell Zywall 2 and IPsecuritas
Zyxell Zywall 2 and IPsecuritas
by tota on 2005-11-10 16:52:50 +0100
Did someone ever have luck to set up a Zyxell Zywall 2 and IPSecuritas that
way that both are working together?
For your information I give you the actual settings of the Zywall 2 as shown
below.
Hope someone may able to give me some advice.
Name:
VPN-Test
Key Management: IKE
Negotiation Mode: Main
Local
Address Type
: Subnet
Starting IP Address: 192.168.2.0
Ending IP Address / Subnet Mask: 255.255.255.0
Remote
Address Type
: Single Address
Starting IP Address: 0.0.0.0
Ending IP Address / Subnet Mask: 0.0.0.0
DNS Server (for IPSec VPN): 0.0.0.0
Authentication Method
Pre-Shared Key: securekey
Local ID Type: IP
Content: 130.60.32.95
Peer ID Type: IP
Content: 0.0.0.0
My IP Address
: 0.0.0.0
Secure Gateway Address: 0.0.0.0
Encapsulation Mode: Tunnel
Encryption Algorithm: DES
Authentication Algorithm: SHA1
Phase 1
Negotiation Mode: Main
Encryption Algorithm: DES
Authentication Algorithm: MD5
SA Life Time (Seconds)
: 28800
Key Group: DH1
Phase 2
Active Protocol: ESP
Encryption Algorithm: DES
Authentication Algorithm: SHA1
SA Life Time (Seconds): 28800
Encapsulation
: Tunnel
Perfect Forward Secrecy(PFS): None
Best regards for anyone's help and advice and tipps.
Greetings from Switzerland
Thomas Thaler
IPSecuritas & OpenBSD?
IPSecuritas & OpenBSD?
by Iggy on 2005-11-14 07:24:00 +0100
I was wondering if any has had sucess getting isakmpd work well with
mobile IPSecuritas clients. If you have I'd appreciate it if you can let me
take a looke at your isakmpd.conf and policy files as an example.
Re: IPSecuritas & OpenBSD?
by Iggy on 2005-11-14 07:47:08 +0100
Or even examples from Freebsd isakmpd.conf/policy will be great.
Re: IPSecuritas & OpenBSD?
by rical on 2006-01-14 19:05:46 +0100
for isakmpd on OBSD 3.6 to 3.8:
isakmpd.conf
[General]
Listen-on=
82.58.73.130
Policy-file=
/etc/isakmpd/isakmpd.policy
Default-phase-1-lifetime=
1800,360:28800
Default-phase-2-lifetime=
1800,360:28800
Retransmits=
3
[Phase 1]
Default=
company-Nomades
[Phase 2]
Connections=
[Iniflux-Nomades]
Phase=
Transport=
Local-address=
Address=
Configuration=
ID=
Authentication=
[company-gw]
ID-type=
Address=
[IPsec-Nomades]
Phase=
ISAKMP-peer=
Configuration=
Local-ID=
Remote-ID=
IPsec-Nomades
1
udp
82.58.73.130
0.0.0.0
Default-main-mode
company-gw
good-password
IPV4_ADDR
82.58.73.130
2
company-Nomades
Default-quick-mode
Internal
Nomades
[Internal]
ID-type=
Network=
Netmask=
IPV4_ADDR_SUBNET
192.168.1.0
255.255.255.0
[Nomades]
Id-type=
Address=
IPV4_ADDR
0.0.0.0
[Default-main-mode]
DOI=
EXCHANGE_TYPE=
Transforms=
IPSEC
ID_PROT
3DES-SHA
[Default-quick-mode]
DOI=
IPSEC
EXCHANGE_TYPE=
QUICK_MODE
Suites=
QM-ESP-3DES-SHA-SUITE
policy:
Re: Can't connect to Netgear FVS338
Re: Can't connect to Netgear FVS338
by Cryobat on 2005-12-21 14:19:11 +0100
I have the exact same problem on the exact same hardware! Did you have
any success in this? It seems like the Netgear router doesn't like IPSecuritas
to define the remote network or something? The router can't find the SPD
for this client...
I had the exact same messages in the log on the router from the beginning
when trying to configure the Netgear IPSec client for Windows machines,
but that was because I used the VPN Wizard instead of doing the "mode
config" by hand.
Does anyone know how to make IPSecuritas go through this last step?
Re: Can't connect to Netgear FVS338
by Ken Anderson on 2006-01-31 16:15:19 +0100
That makes three of us! Has anyone ever solved this?
Re: Can't connect to Netgear FVS338
by Ted Mittelstaedt on 2006-03-01 10:49:19 +0100
Hi All,
Yes there is a solution to this. Your all going to hate
it but it works.
The problem is the Netgear's view of what an IPSec VPN is, is basically a
classical LAN2LAN IPSec VPN. The so-called "VPN Client Policies" in the
Netgear's VPN Policies that appears to be usable for a single client to VPN in
with, is actually a nasty hack that was worked out with the old Secure ID
IPSec client, and nothing other than this client interoperates with it.
You can get a Mac (or other UNIX) system to connect in to the Netgear, but
you MUST use the standard VPN Policies, not the VPN Client policies, and
you must define it by hand. Also, most importantly, you MUST USE a
STATIC ip address. This is due to a bug in the Netgear's firmware which
when you define a Fully Qualified Domain Name as a peer, the Netgear
DOES NOT do a DNS lookup of that and substitute the remote peer IP
address. Instead it just substitutes 0.0.0.0 which makes the VPN code in
the netgear fall back to the borked Secure ID client method.
Basically what is going on here is we are defining a static peer on the
Netgear side and a static peer on the Mac side and they must be mirror
images of each other.
So, in summary - your going to have to pay extra to your DSL providers for
a static IP. Also, I do NOT think this will work if the client is BEHIND a NAT
router.
Here are the setup instructions. This is on Panther (MacOS X 10.3) running
the current MacOS patches and version 2.1 of IPSecuritas. The Netgear is
running
firmware version V1.6.47 Have phun with it! :-)
1) Setup your Mac client with a static IP number. In this case I'll use IP
address 75.75.97.32
Login into the Netgear admin interface and click on IKE Policies on the left,
then click Add. Here is the policy:
Policy Name: macattack
Direction Type: Responder
Exchange Mode: Agressive Mode
Local Identity Type: WAN IP Address
Locl Identity Data: leave blank!
Remote Host Configuration Record: None
Remote Identity Type: Remote WAN IP
Remote Identity Data: leave blank for now!
IKE SA
Encryption Algorithm: DES
Authentication Algorithm: MD5
Authentication Method: Preshared Key
Preshared Key: freebsdkicksass
DH Group: Group 1
SA Life Time: 28800
X Authentication: None
Click Apply
Re: Can't connect to Netgear FVS338
by Cryobat on 2006-03-01 12:21:57 +0100
Ouch.... I wish it would work better somehow... how often do you have a
static IP when you're out working at another location....
Ohh well, I think setting up a PPTP server behind the firewall and playing
with port forwardning might be a better solution for Mac users then.
Thanks for your reply tho! That was a really good answer with precise
information on how to solve the problem! Thank you!
Re: Can't connect to Netgear FVS338
by Ted Mittelstaedt on 2006-03-04 08:55:03 +0100
Well, actually all you have to do is enable remote access on the Netgear,
then when your at a location, just obtain your IP address from
www.whatismyip.com or some such, then access the Netgear's
administrative page, change the IP addresses in the VPN policy and isakmp
policy, and your in business. Obviously this is tiresome and certainly not
an answer that you would want to give to your regular users! Might be
doable for system administrators, though.
As for setting up a PPTP server behind the Netgear, another possibility is
running a Linux/FreeBSD system in parallel with the Netgear, and running
poptop on that. I can confirm MacOSX Panther pptp will successfully
connect to that if you use 128bit encryption, since that is what we do. One
of our Tiger users claims it only works if encryption is switched off on
Tiger. One of these days I'm going to have to test that.
Re: Can't connect to Netgear FVS338
by Nathan Hilderman on 2006-05-06 21:32:10 +0200
I haven't got a FVS338, but I've had success with both an FVL328 and
FVX338.
I've noticed between the FVL and FVX familly a few differences, but did get
both to work. My main problem was with the 'ID/Auth' part in IPSecuritas I made the local and remote names 'fvx_host.com' on both IPSecuritas and
in the local/remote FQDN (Fully Qualified Domain Name) within Netgear's
IKE policy. Next hurdle (for me, anyways) was the IP settings - in
IPSecuritas the 'Remote Network' uses the slash notiation (i.e. /24) notation,
while Netgear wants a subnet address. To let it use your whole subnet (e.g.
10.0.0.0 /24), you have to set the subnet to 255.255.255.0 (e.g. 10.0.0.0
as start IP, 255.255.255.0 as subnet address). You can use whatever
subnet you want - but unless both sides are EXACTLY THE SAME you won't
ever get a proper connection. In fact, it seems there are VERY few settings
(SA Lifetimes, for example) that don't have to be identical for it to work.
Also, in case you haven't figured it out, when you connect take a look at the
VPN status to determine where your bad settings are. If you can't establish
Phase 1 even, then something in your IKE policy is wrong. If you can't
establish Phase 2, the problem is in your VPN Policy.
Oh, and I don't know about the FVS family, but on the FVX I also had to
make sure my VPN Policy was a 'VPN Policy' as opposed to a 'VPN Client
Policy', if that makes a difference.
Keep at it, you'll eventually get it to work.
Re: Can't connect to Netgear FVS338
by William Kyngesburye on 2006-05-13 01:42:06 +0200
Well, the FVS338 has been commandeered for a host-to-host VPN off our
main internal network (and thru a different ISP) all this time (just a few
Windoze computers there), so I haven't had a need to pursue this. Until
now. I'm getting ready to put it back on our main network and ISP and
decided to try it again. I doubled-checked settings on the FVS338 and in
IPSecuritas. One thing I noticed on my IPSec config was that the remote
subnet setting was 192.168.1.1/24. From Nathan's last post I got the idea
to try 192.168.1.0/24. Now it's working - VPN connection made. I'm sure I
tried this before. Maybe some OSX update since then affected something. I
didn't update the FVS firmware.
I'm at home now and don't have my notes, but I'll post a summary later. I
haven't been able to test file sharing yet - nothing really on the other end
right now - but I could ping the firewall's local IP. The real test will be
when I get the FVS on the main internal network, where the server, printers
and Macs are.
I can say that the FVS338 works with fvs_local.com and fvs_remote.com for
the identifiers, just as the FVS docs say. And the VPN policy vs. VPN client
policy distinction seems to be automatic, or something odd. I had a client
policy and host-host policy generated from the wizard, then deleted the
client policy that wasn't working. But when I added a policy, it
automatically became a client policy. There can only be one client policy it's used for the 50 client limit on the FVS338 (100 on the FVL328 and 200
on the FVX538) - and any more policies become the 'VPN Policies' (and then
the FVS became a little confused). That didn't make much sense, but the
VPN Client Policy works, I didn't need to make it a VPN Policy.
Re: Can't connect to Netgear FVS338
by kb on 2006-06-15 12:02:34 +0200
try with "A remote VPN client" option in VPN Wizard along with NG VPN
client installed in your windows, that must solve the problem
Re: Can't connect to Netgear FVS338
by pristine on 2006-06-15 12:35:09 +0200
has anyone tried Extended authentication in FVS338, have any one tried
modeconfig, any inputs for configuring modeconfig in FVS338 would be
appreciated.
IPSecuritas & Checkpoint
IPSecuritas & Checkpoint
by fiddelm3742 on 2005-11-23 07:12:54 +0100
I'm having some issues with my IPSecuritas/Checkpoint setup. I've got all
of the default IPSecuritas settings in as suggest via the forums and the
example. I do not have a key being my corporation has a managed
firewall(thank you quest :-/) Anywho, perhaps i'm missing a step. Anywho
my logs wont help anyone I"ve stopped and started IPsec via ipsecuritas but
my log doens't report anything usefull, Just
Log output from IPSecuritas 2.1
Nov 23 00:11:16 iBook IPSecuritas: Parsing configuration
Nov 23 00:11:16 iBook IPSecuritas: Setting up racoon.conf
Nov 23 00:11:16 iBook IPSecuritas: Setting up setkey.conf
Nov 23 00:11:16 iBook IPSecuritas: Setting up psk.txt
Nov 23 00:11:16 iBook IPSecuritas: Setting up tunnel.conf
Nov 23 00:11:16 iBook IPSecuritas: Parsing configuration done
Nov 23 00:11:17 iBook IPSecuritas: Starting racoon...
Nov 23 00:11:17 iBook IPSecuritas: Racoon is running
Nov 23 00:11:17 iBook IPSecuritas: Set kernel keys
No real connection info.
Now, with the windows client I just attempt to connect to something on our
network (206.99.156.0/24) and it then prompts me for the User/Pass
(which I already have setup in the software
Am I missing something here?
Re: IPSecuritas & Checkpoint
by fiddelm3742 on 2005-12-08 20:52:03 +0100
No one knows ehh?
Re: IPSecuritas & Checkpoint
by trs80 on 2005-12-15 16:45:14 +0100
You have to use Aggressive Mode under the phase 1 settings, and the rest
of the config has to match whatever's in the checkpoint policy (should be
able to get that info from the admins).
You also must have a user account in what's called the "Internal DB" (again,
the admins will know what that is), in the form of an email address.
Netgear FVS318V3
Netgear FVS318V3
by Tony on 2005-12-06 19:48:20 +0100
I see a lot of people were able to get IPSecuritas to work with the FVS318.
This wouldn't by any chance be V3 of the router would it? I have an
FVS318V3 that simply refuses to cooperate with IPSecuritas (my
understanding is that V3 is essentially a completely different router than V1
& V2).
Re: Netgear FVS318V3
by jmizoguchi on 2006-01-29 19:47:50 +0100
I think so too.FVS318, FVX538 doesn't seems to run. newer router has IKE
and VPN seperate and old V1,2.4 was differenent setup. I go to work on
v2.4. that is on my site at vpncasestudy.com.
if someone has done FVS318v3~ to work please submit your story to
[email protected]
compatible with FORTIGATE
compatible with FORTIGATE
by Sepp maier on 2005-12-13 11:54:00 +0100
IPSECURITAS works well with the fortinet Firewalls (IPSEC with fixed or
dynamic IP)
GREAT APP.
Re: compatible with FORTIGATE
by Gary S on 2005-12-14 21:53:41 +0100
I am trying to get that setup myself, but I don't have any experience with
fortigates. I don't think I am setting up the gateway right. Is there any
advice you could give me on getting this setup?
Re: compatible with FORTIGATE
by Sebastien on 2006-01-02 14:21:33 +0100
Hi,
I tried to set up IP Securitas but I am not able to connect to the VPN
gateway F50A. I will provide logs this evening if somebody could help me.
Sebastien.
Re: compatible with FORTIGATE
by stephan on 2006-01-03 13:34:09 +0100
hi, i'm just trying to connect to our fortigate 400.
i can't see anything in its logs, i don't even know if my mac tries to connect
to it.
are there any logs i could look for errors in on the mac side? haven't found
any...
Re: compatible with FORTIGATE
by sebastien on 2006-01-10 08:19:01 +0100
I got invalid exchange type 6, any idea ?
Log output from IPSecuritas 2.1
Jan 10 08:15:33 sunnyday IPSecuritas: Parsing configuration
Jan 10 08:15:33 sunnyday IPSecuritas: Setting up racoon.conf
Jan 10 08:15:34 sunnyday IPSecuritas: Setting up setkey.conf
Jan 10 08:15:34 sunnyday IPSecuritas: Setting up psk.txt
Jan 10 08:15:34 sunnyday IPSecuritas: Setting up tunnel.conf
Jan 10 08:15:34 sunnyday IPSecuritas: Setting up DNS configuration
Jan 10 08:15:34 sunnyday IPSecuritas: Parsing configuration done
Jan 10 08:15:35 sunnyday IPSecuritas: Starting racoon...
Jan 10 08:15:36 sunnyday IPSecuritas: Racoon is running
Jan 10 08:15:36 sunnyday IPSecuritas: Set kernel keys
Jan 10 08:15:36 sunnyday racoon: DEBUG2: cfparse.y:1413:cfparse(): parse
successed.\n
Jan 10 08:15:36 sunnyday racoon: DEBUG: isakmp.c:1592:isakmp_open():
10.70.1.100[500] used as isakmp port (fd=8)\n
Jan 10 08:15:36 sunnyday racoon: DEBUG: isakmp.c:1610:isakmp_open():
10.70.1.100[4500] used as nat-t isakmp port (fd=9)\n
Jan 10 08:15:36 sunnyday racoon: DEBUG: pfkey.c:195:pfkey_handler(): get
pfkey X_SPDDUMP message\n
Jan 10 08:15:36 sunnyday racoon: DEBUG2: plog.c:199:plogdump():
\n02120200 00020000 00000000 00000395\n
Jan 10 08:15:36 sunnyday racoon: DEBUG: pfkey.c:210:pfkey_handler():
pfkey X_SPDDUMP failed: No such file or directory\n
Jan 10 08:15:36 sunnyday racoon: DEBUG:
grabmyaddr.c:340:update_myaddrs(): msg 5 not interesting\n
Jan 10 08:15:36 sunnyday racoon: DEBUG:
grabmyaddr.c:340:update_myaddrs(): msg 5 not interesting\n
Jan 10 08:15:36 sunnyday racoon: DEBUG:
grabmyaddr.c:340:update_myaddrs(): msg 5 not interesting\n
Jan 10 08:15:36 sunnyday racoon: DEBUG:
grabmyaddr.c:340:update_myaddrs(): msg 5 not interesting\n
Jan 10 08:15:36 sunnyday racoon: DEBUG:
grabmyaddr.c:340:update_myaddrs(): msg 5 not interesting\n
Jan 10 08:15:36 sunnyday racoon: DEBUG:
grabmyaddr.c:340:update_myaddrs(): msg 5 not interesting\n
Jan 10 08:15:36 sunnyday racoon: DEBUG:
grabmyaddr.c:340:update_myaddrs(): msg 5 not interesting\n
Jan 10 08:15:36 sunnyday racoon: DEBUG:
grabmyaddr.c:340:update_myaddrs(): msg 5 not interesting\n
add net 192.168.1.0: gateway gif0
Jan 10 08:15:37 sunnyday IPSecuritas: Setting ip-label.com|192.168.0.3
Jan 10 08:15:37 sunnyday racoon: DEBUG:
grabmyaddr.c:340:update_myaddrs(): msg 5 not interesting\n
Jan 10 08:15:37 sunnyday racoon: DEBUG:
grabmyaddr.c:340:update_myaddrs(): msg 5 not interesting\n
Jan 10 08:15:37 sunnyday racoon: DEBUG:
grabmyaddr.c:340:update_myaddrs(): msg 5 not interesting\n
Jan 10 08:15:37 sunnyday racoon: DEBUG:
grabmyaddr.c:340:update_myaddrs(): msg 5 not interesting\n
Jan 10 08:15:37 sunnyday racoon: DEBUG:
grabmyaddr.c:346:update_myaddrs(): caught rtm:12, need update interface
address list\n
Jan 10 08:15:37 sunnyday racoon: DEBUG:
grabmyaddr.c:340:update_myaddrs(): msg 1 not interesting\n
Jan 10 08:15:37 sunnyday racoon: DEBUG:
grabmyaddr.c:346:update_myaddrs(): caught rtm:14, need update interface
address list\n
Jan 10 08:15:37 sunnyday racoon: DEBUG:
grabmyaddr.c:340:update_myaddrs(): msg 1 not interesting\n
Re: compatible with FORTIGATE
by sebastien on 2006-01-10 08:21:04 +0100
next ...
Jan 10 08:15:40 sunnyday racoon: DEBUG:
algorithm.c:322:alg_oakley_hmacdef(): hmac(hmac_md5)\n
Jan 10 08:15:40 sunnyday racoon: DEBUG: oakley.c:2278:oakley_skeyid_dae():
SKEYID_d computed:\n
Jan 10 08:15:40 sunnyday racoon: DEBUG: plog.c:199:plogdump():
\n2f74bea4 1d9d45d0 59b513c1 fa7e59af\n
Jan 10 08:15:40 sunnyday racoon: DEBUG:
algorithm.c:322:alg_oakley_hmacdef(): hmac(hmac_md5)\n
Jan 10 08:15:40 sunnyday racoon: DEBUG: oakley.c:2307:oakley_skeyid_dae():
SKEYID_a computed:\n
Jan 10 08:15:40 sunnyday racoon: DEBUG: plog.c:199:plogdump():
\n7f9756d6 71e1a348 d92dca61 ec3c22ce\n
Jan 10 08:15:40 sunnyday racoon: DEBUG:
algorithm.c:322:alg_oakley_hmacdef(): hmac(hmac_md5)\n
Jan 10 08:15:40 sunnyday racoon: DEBUG: oakley.c:2336:oakley_skeyid_dae():
SKEYID_e computed:\n
Jan 10 08:15:40 sunnyday racoon: DEBUG: plog.c:199:plogdump(): \n130facfb
a8d233e5 9f0f3758 41719485\n
Jan 10 08:15:40 sunnyday racoon: DEBUG:
algorithm.c:382:alg_oakley_encdef(): encription(des)\n
Jan 10 08:15:40 sunnyday racoon: DEBUG:
algorithm.c:252:alg_oakley_hashdef(): hash(md5)\n
Jan 10 08:15:40 sunnyday racoon: DEBUG:
oakley.c:2478:oakley_compute_enckey(): final encryption key computed:\n
Jan 10 08:15:40 sunnyday racoon: DEBUG: plog.c:199:plogdump(): \n130facfb
a8d233e5\n
Jan 10 08:15:40 sunnyday racoon: DEBUG:
algorithm.c:252:alg_oakley_hashdef(): hash(md5)\n
Jan 10 08:15:40 sunnyday racoon: DEBUG:
algorithm.c:382:alg_oakley_encdef(): encription(des)\n
Jan 10 08:15:40 sunnyday racoon: DEBUG: oakley.c:2589:oakley_newiv(): IV
computed:\n
Jan 10 08:15:40 sunnyday racoon: DEBUG: plog.c:199:plogdump():
\n2d2fb498 79fe1ee8\n
Jan 10 08:15:40 sunnyday racoon: DEBUG: ipsec_doi.c:3238:ipsecdoi_setid1():
use ID type of IPv4_address\n
Jan 10 08:15:40 sunnyday racoon: DEBUG:
oakley.c:871:oakley_ph1hash_common(): HASH with:\n
Jan 10 08:15:40 sunnyday racoon: DEBUG: plog.c:199:plogdump():
\nef3561d9 f0900c3e 029593fb 25841dd0 594e3fcd d5fe1b58 efe1df7c
08c9c8fd\n29b35525 9cb6f812 879bae26 ed82f54e c5eb274f 218b23eb
1f2d45ef 0dc9bc14\nd7763a03 4079501e d72bca21 3b3510e0 ff751e4d
ccbf2f04 ff67e2ad fceb1f9a\n56585bbe 55a48b2f af8596b7 ad5123b2
11762332 bb616f81 23b97c83 ef2da978\n2023db40 7cb9aace 919d4f1c
ce0aa8c6 bdac3f1d 5aa3135c 4e2902c6 66288852\n3ae66d81 de6a179b
f52962b0 17a65f1e ba74a423 1e9044e4 f04cb396 8f867c65\naba97d0c
c961d04b aa6c9521 fd2e762c 429e876c 03078ebb 6bfb6a60
2373be69\n42f79b97 1464ef99 76a9d436 3c3761fe b01a6cfb b9d5ff4e
fc74f5df d0f4a49b\nf79acfe3 3dc85eea 0bea0204 079f0db2 ecde9573
baad6157 f4435c0a cc0fc10f\nbcb0c6ae 998f0c93 f7855faf 89e0dc05
686f787a 98e3a555 76e3baa7 4e40401c\n69a05ea7 bd751de4 2e1fe8cf
e1be51d4 f9162b4b 23ec04d2 61f4ab22 1a70da86\n28bbbc8e 041d5253
70af87da 66c5c9b4 da9870a1 80574be5 050ed0a8 d7f067b7\n6f42de18
bdfa477e a83c25fb 8b970626 00000001 00000001 00000028
01010001\n00000020 01010000 800b0001 80
Jan 10 08:15:40 sunnyday racoon: DEBUG:
algorithm.c:322:alg_oakley_hmacdef(): hmac(hmac_md5)\n
Jan 10 08:15:40 sunnyday racoon: DEBUG:
oakley.c:881:oakley_ph1hash_common(): HASH computed:\n
Jan 10 08:15:40 sunnyday racoon: DEBUG: plog.c:199:plogdump():
Re: compatible with FORTIGATE
by sebastien on 2006-01-10 08:21:26 +0100
Jan 10 08:15:40 sunnyday racoon: DEBUG: plog.c:199:plogdump():
\n0800000c 011101f4 0a460164 00000014 123027b8 5e8928cd 11cbdddf
36911daa\n00000000 00000008\n
Jan 10 08:15:40 sunnyday racoon: DEBUG:
algorithm.c:382:alg_oakley_encdef(): encription(des)\n
Jan 10 08:15:40 sunnyday racoon: DEBUG: oakley.c:2883:oakley_do_encrypt():
with key:\n
Jan 10 08:15:40 sunnyday racoon: DEBUG: plog.c:199:plogdump(): \n130facfb
a8d233e5\n
Jan 10 08:15:40 sunnyday racoon: DEBUG: oakley.c:2891:oakley_do_encrypt():
encrypted payload by IV:\n
Jan 10 08:15:40 sunnyday racoon: DEBUG: plog.c:199:plogdump():
\n2d2fb498 79fe1ee8\n
Jan 10 08:15:40 sunnyday racoon: DEBUG: oakley.c:2898:oakley_do_encrypt():
save IV for next:\n
Jan 10 08:15:40 sunnyday racoon: DEBUG: plog.c:199:plogdump():
\ndd836560 cb31998b\n
Jan 10 08:15:40 sunnyday racoon: DEBUG: oakley.c:2915:oakley_do_encrypt():
encrypted.\n
Jan 10 08:15:40 sunnyday racoon: DEBUG: sockmisc.c:421:sendfromto():
sockname 10.70.1.100[500]\n
Jan 10 08:15:40 sunnyday racoon: DEBUG: sockmisc.c:423:sendfromto(): send
packet from 10.70.1.100[500]\n
Jan 10 08:15:40 sunnyday racoon: DEBUG: sockmisc.c:425:sendfromto(): send
packet to 62.160.52.119[500]\n
Jan 10 08:15:40 sunnyday racoon: DEBUG: sockmisc.c:570:sendfromto(): 1
times of 68 bytes message will be sent to 10.70.1.100[500]\n
Jan 10 08:15:40 sunnyday racoon: DEBUG: plog.c:199:plogdump():
\n6f42de18 bdfa477e a83c25fb 8b970626 05100201 00000000 00000044
b748f5c3\n3d61547d d39260d9 9620820e 4f7dfcb3 096ffa0f 887ea505
810acc28 dd836560\ncb31998b\n
Jan 10 08:15:40 sunnyday racoon: DEBUG:
isakmp.c:1784:isakmp_ph1resend(): resend phase1 packet
6f42de18bdfa477e:a83c25fb8b970626\n
Jan 10 08:15:40 sunnyday racoon: DEBUG:
grabmyaddr.c:340:update_myaddrs(): msg 5 not interesting\n
Jan 10 08:15:40 sunnyday racoon: DEBUG:
grabmyaddr.c:340:update_myaddrs(): msg 5 not interesting\n
Jan 10 08:15:40 sunnyday racoon: DEBUG:
grabmyaddr.c:340:update_myaddrs(): msg 5 not interesting\n
Jan 10 08:15:40 sunnyday racoon: DEBUG:
grabmyaddr.c:340:update_myaddrs(): msg 5 not interesting\n
Jan 10 08:15:40 sunnyday racoon: DEBUG:
grabmyaddr.c:340:update_myaddrs(): msg 5 not interesting\n
Jan 10 08:15:40 sunnyday racoon: DEBUG:
grabmyaddr.c:340:update_myaddrs(): msg 5 not interesting\n
Jan 10 08:15:40 sunnyday racoon: DEBUG: isakmp.c:238:isakmp_handler():
===\n
Jan 10 08:15:40 sunnyday racoon: DEBUG: isakmp.c:239:isakmp_handler(): 60
bytes message received from 62.160.52.119[500]\n
Jan 10 08:15:40 sunnyday racoon: DEBUG: plog.c:199:plogdump():
\n6f42de18 bdfa477e a83c25fb 8b970626 05100201 00000000 0000003c
a016f50c\n60d392c7 245425dd b460723d ddb226d6 9eb4ce3c e5d6dbef
3a509b07\n
Jan 10 08:15:40 sunnyday racoon: DEBUG: oakley.c:2709:oakley_do_decrypt():
begin decryption.\n
Jan 10 08:15:40 sunnyday racoon: DEBUG:
algorithm.c:382:alg_oakley_encdef(): encription(des)\n
Jan 10 08:15:40 sunnyday racoon: DEBUG: oakley.c:2723:oakley_do_decrypt():
IV was saved for next processing:\n
Jan 10 08:15:40 sunnyday racoon: DEBUG: plog.c:199:plogdump():
Re: compatible with FORTIGATE
by sebastien on 2006-01-10 08:23:54 +0100
Jan 10 08:15:40 sunnyday racoon: DEBUG: plog.c:199:plogdump():
\nb34d0bdb 03fd6f25 f40ce451 8b0125cb\n
Jan 10 08:15:40 sunnyday racoon: DEBUG:
oakley.c:871:oakley_ph1hash_common(): HASH with:\n
Jan 10 08:15:40 sunnyday racoon: DEBUG: plog.c:199:plogdump():
\naba97d0c c961d04b aa6c9521 fd2e762c 429e876c 03078ebb 6bfb6a60
2373be69\n42f79b97 1464ef99 76a9d436 3c3761fe b01a6cfb b9d5ff4e
fc74f5df d0f4a49b\nf79acfe3 3dc85eea 0bea0204 079f0db2 ecde9573
baad6157 f4435c0a cc0fc10f\nbcb0c6ae 998f0c93 f7855faf 89e0dc05
686f787a 98e3a555 76e3baa7 4e40401c\n69a05ea7 bd751de4 2e1fe8cf
e1be51d4 f9162b4b 23ec04d2 61f4ab22 1a70da86\n28bbbc8e 041d5253
70af87da 66c5c9b4 da9870a1 80574be5 050ed0a8 d7f067b7\nef3561d9
f0900c3e 029593fb 25841dd0 594e3fcd d5fe1b58 efe1df7c
08c9c8fd\n29b35525 9cb6f812 879bae26 ed82f54e c5eb274f 218b23eb
1f2d45ef 0dc9bc14\nd7763a03 4079501e d72bca21 3b3510e0 ff751e4d
ccbf2f04 ff67e2ad fceb1f9a\n56585bbe 55a48b2f af8596b7 ad5123b2
11762332 bb616f81 23b97c83 ef2da978\n2023db40 7cb9aace 919d4f1c
ce0aa8c6 bdac3f1d 5aa3135c 4e2902c6 66288852\n3ae66d81 de6a179b
f52962b0 17a65f1e ba74a423 1e9044e4 f04cb396 8f867c65\na83c25fb
8b970626 6f42de18 bdfa477e 00000001 00000001 00000028
01010001\n00000020 01010000 800b0001 80
Jan 10 08:15:40 sunnyday racoon: DEBUG:
algorithm.c:322:alg_oakley_hmacdef(): hmac(hmac_md5)\n
Jan 10 08:15:40 sunnyday racoon: DEBUG:
oakley.c:881:oakley_ph1hash_common(): HASH computed:\n
Jan 10 08:15:40 sunnyday racoon: DEBUG: plog.c:199:plogdump():
\nb34d0bdb 03fd6f25 f40ce451 8b0125cb\n
Jan 10 08:15:40 sunnyday racoon: DEBUG:
oakley.c:1197:oakley_validate_auth(): HASH for PSK validated.\n
Jan 10 08:15:40 sunnyday racoon: DEBUG: isakmp_ident.c:695:ident_i4recv():
peer's ID:
Jan 10 08:15:40 sunnyday racoon: DEBUG: plog.c:199:plogdump():
\n01000000 3ea03477\n
Jan 10 08:15:40 sunnyday racoon: DEBUG: isakmp.c:838:ph1_main(): ===\n
Jan 10 08:15:40 sunnyday racoon: DEBUG: oakley.c:2633:oakley_newiv2():
compute IV for phase2\n
Jan 10 08:15:40 sunnyday racoon: DEBUG: oakley.c:2634:oakley_newiv2():
phase1 last IV:\n
Jan 10 08:15:40 sunnyday racoon: DEBUG: plog.c:199:plogdump():
\ne5d6dbef 3a509b07 705fe9e2\n
Jan 10 08:15:40 sunnyday racoon: DEBUG:
algorithm.c:252:alg_oakley_hashdef(): hash(md5)\n
Jan 10 08:15:40 sunnyday racoon: DEBUG:
algorithm.c:382:alg_oakley_encdef(): encription(des)\n
Jan 10 08:15:40 sunnyday racoon: DEBUG: oakley.c:2666:oakley_newiv2():
phase2 IV computed:\n
Jan 10 08:15:40 sunnyday racoon: DEBUG: plog.c:199:plogdump():
\n424f2cb7 f670fab8\n
Jan 10 08:15:40 sunnyday racoon: DEBUG:
oakley.c:752:oakley_compute_hash1(): HASH with:\n
Jan 10 08:15:40 sunnyday racoon: DEBUG: plog.c:199:plogdump():
\n705fe9e2 0000001c 00000001 01106002 6f42de18 bdfa477e a83c25fb
8b970626\n
Jan 10 08:15:40 sunnyday racoon: DEBUG:
algorithm.c:322:alg_oakley_hmacdef(): hmac(hmac_md5)\n
Jan 10 08:15:40 sunnyday racoon: DEBUG:
oakley.c:762:oakley_compute_hash1(): HASH computed:\n
Jan 10 08:15:40 sunnyday racoon: DEBUG: plog.c:199:plogdump():
\n266ad6a8 f6e45dc4 5fb596ec 7d0e1603\n
Jan 10 08:15:40 sunnyday racoon: DEBUG: oakley.c:2832:oakley_do_encrypt():
begin encryption.\n
Re: compatible with FORTIGATE
by sebastien on 2006-01-10 08:24:14 +0100
Jan 10 08:15:40 sunnyday racoon: DEBUG:
isakmp_inf.c:705:isakmp_info_send_common(): sendto Information notify.\n
Jan 10 08:15:40 sunnyday racoon: INFO: isakmp.c:2756:log_ph1established():
ISAKMP-SA established 10.70.1.100[500]-62.160.52.119[500]
spi:6f42de18bdfa477e:a83c25fb8b970626\n
Jan 10 08:15:40 sunnyday racoon: DEBUG: isakmp.c:885:ph1_main(): ===\n
Jan 10 08:15:40 sunnyday racoon: DEBUG: isakmp.c:238:isakmp_handler():
===\n
Jan 10 08:15:40 sunnyday racoon: DEBUG: isakmp.c:239:isakmp_handler(): 68
bytes message received from 62.160.52.119[500]\n
Jan 10 08:15:40 sunnyday racoon: DEBUG: plog.c:199:plogdump():
\n6f42de18 bdfa477e a83c25fb 8b970626 08100601 532c13ae 00000044
fd7cc74d\nd84776b2 a5f0dc47 fd531bdd 431b17ae 96b7eab9 e371d10a
5daa0397 2c6e4af7\n4aa76e10\n
Jan 10 08:15:40 sunnyday racoon: ERROR: isakmp.c:767:isakmp_main():
Invalid exchange type 6 from 62.160.52.119[500].\n
Jan 10 08:15:40 sunnyday racoon: DEBUG:
grabmyaddr.c:340:update_myaddrs(): msg 5 not interesting\n
Jan 10 08:15:40 sunnyday racoon: DEBUG:
grabmyaddr.c:340:update_myaddrs(): msg 5 not interesting\n
Jan 10 08:15:40 sunnyday racoon: DEBUG:
grabmyaddr.c:340:update_myaddrs(): msg 5 not interesting\n
Jan 10 08:15:40 sunnyday racoon: DEBUG:
grabmyaddr.c:340:update_myaddrs(): msg 5 not interesting\n
Jan 10 08:15:41 sunnyday racoon: DEBUG:
grabmyaddr.c:340:update_myaddrs(): msg 5 not interesting\n
Jan 10 08:15:41 sunnyday racoon: DEBUG:
isakmp.c:1153:isakmp_ph2begin_i(): ===\n
Jan 10 08:15:41 sunnyday racoon: DEBUG:
isakmp.c:1154:isakmp_ph2begin_i(): begin QUICK mode.\n
Jan 10 08:15:41 sunnyday racoon: INFO: isakmp.c:1158:isakmp_ph2begin_i():
initiate new phase 2 negotiation: 10.70.1.100[0]<=>62.160.52.119[0]\n
Jan 10 08:15:41 sunnyday racoon: DEBUG: oakley.c:2633:oakley_newiv2():
compute IV for phase2\n
Jan 10 08:15:41 sunnyday racoon: DEBUG: oakley.c:2634:oakley_newiv2():
phase1 last IV:\n
Jan 10 08:15:41 sunnyday racoon: DEBUG: plog.c:199:plogdump():
\ne5d6dbef 3a509b07 766e76a7\n
Jan 10 08:15:41 sunnyday racoon: DEBUG:
algorithm.c:252:alg_oakley_hashdef(): hash(md5)\n
Jan 10 08:15:41 sunnyday racoon: DEBUG:
algorithm.c:382:alg_oakley_encdef(): encription(des)\n
Jan 10 08:15:41 sunnyday racoon: DEBUG: oakley.c:2666:oakley_newiv2():
phase2 IV computed:\n
Jan 10 08:15:41 sunnyday racoon: DEBUG: plog.c:199:plogdump():
\na39303c3 e9f82df6\n
Jan 10 08:15:41 sunnyday racoon: DEBUG: pfkey.c:795:pk_sendgetspi(): call
pfkey_send_getspi\n
Jan 10 08:15:41 sunnyday racoon: DEBUG: pfkey.c:808:pk_sendgetspi(): pfkey
GETSPI sent: ESP/Tunnel 62.160.52.119->10.70.1.100 \n
Jan 10 08:15:41 sunnyday racoon: DEBUG: isakmp_quick.c:129:quick_i1prep():
pfkey getspi sent.\n
Jan 10 08:15:41 sunnyday racoon: DEBUG: pfkey.c:195:pfkey_handler(): get
pfkey GETSPI message\n
Jan 10 08:15:41 sunnyday racoon: DEBUG2: plog.c:199:plogdump():
\n02010003 000a0000 00000001 00000396 00020001 01d84e96
00000001 00000014\n00030005 ff200000 10020000 3ea03477 00000000
00000000 00030006 ff200000\n10020000 0a460164 00000000
00000000\n
Jan 10 08:15:41 sunnyday racoon: DEBUG: pfkey.c:879:pk_recvgetspi(): pfkey
GETSPI succeeded: ESP/Tunnel 62.160.52.119->10.70.1.100
Re: compatible with FORTIGATE
by sebastien on 2006-01-10 08:24:30 +0100
Jan 10 08:15:41 sunnyday racoon: DEBUG: plog.c:199:plogdump():
\n764e1119 daad3630 d773ca44 7d163814 fd735244 bcf3b18a 4c7b78ae
2c3e225d\n1bcdab8f 1a9e3c2f f57e513f fb2add11 073ce657 5bfddfeb
f25d0c67 811edbc5\n45848390 3e4b9762 8e1b8ce3 7c639985 3d8cbe40
7089edb4 6fd50f19 47f2256d\n0a39e2d7 ee6ae265 02ea18b7 f057b4e7
18ff5fcc 68f93184 8c95904a 4d93753d\n8361dec0 5365272d 005298e5
7e85860d 3283b3f5 50c31319 7f02ad7d 1a22eab2\na0b073be f6ee8ad1
58420fe6 e1aa6bfb 41c9dbd7 20e0b0f0 382ada9c 6fc3d6a0\n
Jan 10 08:15:41 sunnyday racoon: DEBUG: ipsec_doi.c:3374:ipsecdoi_setid2():
use local ID type IPv4_address\n
Jan 10 08:15:41 sunnyday racoon: DEBUG: ipsec_doi.c:3419:ipsecdoi_setid2():
use remote ID type IPv4_subnet\n
Jan 10 08:15:41 sunnyday racoon: DEBUG:
isakmp_quick.c:206:quick_i1send(): IDci:
Jan 10 08:15:41 sunnyday racoon: DEBUG: plog.c:199:plogdump():
\n01000000 0a010364\n
Jan 10 08:15:41 sunnyday racoon: DEBUG:
isakmp_quick.c:208:quick_i1send(): IDcr:
Jan 10 08:15:41 sunnyday racoon: DEBUG: plog.c:199:plogdump():
\n04000000 c0a80100 ffffff00\n
Jan 10 08:15:41 sunnyday racoon: DEBUG:
isakmp.c:2457:set_isakmp_payload(): add payload of len 76, next type 10\n
Jan 10 08:15:41 sunnyday racoon: DEBUG:
isakmp.c:2457:set_isakmp_payload(): add payload of len 16, next type 4\n
Jan 10 08:15:41 sunnyday racoon: DEBUG:
isakmp.c:2457:set_isakmp_payload(): add payload of len 192, next type 5\n
Jan 10 08:15:41 sunnyday racoon: DEBUG:
isakmp.c:2457:set_isakmp_payload(): add payload of len 8, next type 5\n
Jan 10 08:15:41 sunnyday racoon: DEBUG:
isakmp.c:2457:set_isakmp_payload(): add payload of len 12, next type 0\n
Jan 10 08:15:41 sunnyday racoon: DEBUG:
oakley.c:752:oakley_compute_hash1(): HASH with:\n
Jan 10 08:15:41 sunnyday racoon: DEBUG: plog.c:199:plogdump():
\n766e76a7 0a000050 00000001 00000001 00000044 01030402 01d84e96
0300001c\n01020000 80010001 80020708 80040001 80050001 80030005
0000001c 02020000\n80010001 80020708 80040001 80050002 80030005
04000014 8cff85b9 59ed4658\nf8bd2bf5 24cba9cb 050000c4 764e1119
daad3630 d773ca44 7d163814 fd735244\nbcf3b18a 4c7b78ae 2c3e225d
1bcdab8f 1a9e3c2f f57e513f fb2add11 073ce657\n5bfddfeb f25d0c67
811edbc5 45848390 3e4b9762 8e1b8ce3 7c639985 3d8cbe40\n7089edb4
6fd50f19 47f2256d 0a39e2d7 ee6ae265 02ea18b7 f057b4e7
18ff5fcc\n68f93184 8c95904a 4d93753d 8361dec0 5365272d 005298e5
7e85860d 3283b3f5\n50c31319 7f02ad7d 1a22eab2 a0b073be f6ee8ad1
58420fe6 e1aa6bfb 41c9dbd7\n20e0b0f0 382ada9c 6fc3d6a0 0500000c
01000000 0a010364 00000010 04000000\nc0a80100 ffffff00\n
Jan 10 08:15:41 sunnyday racoon: DEBUG:
algorithm.c:322:alg_oakley_hmacdef(): hmac(hmac_md5)\n
Jan 10 08:15:41 sunnyday racoon: DEBUG:
oakley.c:762:oakley_compute_hash1(): HASH computed:\n
Jan 10 08:15:41 sunnyday racoon: DEBUG: plog.c:199:plogdump(): \n9c2c2ffc
9af360c2 8193a055 d306a357\n
Jan 10 08:15:41 sunnyday racoon: DEBUG:
isakmp.c:2457:set_isakmp_payload(): add payload of len 16, next type 1\n
Jan 10 08:15:41 sunnyday racoon: DEBUG: oakley.c:2832:oakley_do_encrypt():
begin encryption.\n
Jan 10 08:15:41 sunnyday racoon: DEBUG:
algorithm.c:382:alg_oakley_encdef(): encription(des)\n
Jan 10 08:15:41 sunnyday racoon: DEBUG: oakley.c:2848:oakley_do_encrypt():
pad length = 8\n
Jan 10 08:15:41 sunnyday racoon: DEBUG: plog.c:199:plogdump():
\n01000014 9c2c2ffc 9af360c2 8193a055 d306a357 0a000050 00000001
Known Good Sonicwall TZ130 Settings
Known Good Sonicwall TZ130 Settings
by nunya biznas on 2005-12-31 17:42:53 +0100
If you have trouble, try removing the connection settings in IPSecuritas, quit
the application and start over by creating a New Connection. I do this
whenever I hit "Start IPSEC" in IPSecuritas and see "X_SPDDUMP failed: No
such file or directory" in the IPSecuritas log or nothing at all in the sonicwall
log, (they tend to happen at the same time).
I just got a sonicwall tz 170 to work with IPSecuritas on 10.4.3, here are the
settings.
Omitted items are blank or unchecked.
------IPSECURITAS-----:General
host to network / static ip at work
first three numbers of work network plus a zero (192.168.1.0)
24 / ip address of IPSecuritas machine / main / obey / 16
:Phase 1
28000 / mod1024(2) / 3des / sha1
:phase 2
28800 / mod768(1) / des / hmac md5
:id/auth
address / address
preshared secret from sonicwall
:options
ipsec doi / sit_identity_only / initial contact
generate policy / dhcp pass-through / establish ike immediatly
------SONICWALL-----:general
ike using pre-shared secret
groupvpn
your secret here
:proposals
:phase1
group 2 / 3des / sha1 / 28800
:phase2
esp / des / md5 / group 1 / 28800
:advanced
forward packets / 0.0.0.0 / lan
:Client
always / this gateway only / use dhcp
IPSecuritas & Checkpoint VPN-1 Pro R60
IPSecuritas & Checkpoint VPN-1 Pro R60
by perezcr1 on 2006-01-03 19:58:07 +0100
I have manage to connect to the VPN, I can even connect to the VPN web
console. But If i try to do a ping Remote desktop , the firewall gets the
packet but doesn't let it pass. Have any one been able to work with this
configuration. I have OSX 10.4.3 and the latest version of IP Securitas.
Any help will be greatly appreciated.
ANN: 10.4.4 Update Broke IPSecuritas 2.1?
ANN: 10.4.4 Update Broke IPSecuritas 2.1?
by Lawrence Bean on 2006-01-12 17:33:16 +0100
I have been using IPSecuritas with 5 IPCop firewalls happily for a number of
months. Great product. I just this morning installed the 10.4.4 update from
Apple. Now when I start IPSecuritas, it says everything is OK and I get green
chechmarks, but I get no connectivity. I cannot ping anything on the
network. Even more distressing, even with IPSecuritas quit I cannot ping the
IPCop firewall at its public address. I can ping the gateway to all 5
buildings, but trying to ping the firewalls results in 100% packet loss. On
another computer right beside this one that does not have IPSecuritas and
has never used VPN but it otherwise *exactly* the same including the
10.4.4 update, I can ping both the gateway and the firewall happily. On this
machine, I can ping anywhere else on the network except my five firewall
addresses. As it happened to all five firewalls in very physically separated
buildings, that pretty much rules out the firewalls being the trouble, and as
it works on a computer next to this one that pretty much rules out the
network between here and there, leaving the problem with this machine.
My suspicion is that a config file somewhere has blown up, but I'm not sure
where to even begin looking. My next step will be an uninstall/reinstall of
IPSecuritas. In the meantime, and suggestions of how else to "clean house"
would be greatly appreciated.
Re: 10.4.4 Update Broke IPSecuritas 2.1?
by Flo Wagner on 2006-01-13 11:48:40 +0100
I have the very same problem as Lawrence. After installing the 10.4.4
update I cannot reach any client in the network after establishing an IPSec
connection with IPSecuritas 2.1 (the firewall is IPCop, too). Yet, I can ping
the firewall when IPSec ist stopped. Last entry in the IPCop log is "IPSec SA
established". So it may be some kind of routing error?!
Any hint would be greatly appreaciated.
Regards,
Flo
Re: 10.4.4 Update Broke IPSecuritas 2.1?
by LBean on 2006-01-13 16:13:24 +0100
Update: Complete uninstall of IPSecuritas including pref files followed by
reboot set things back to "right" as far as normal, non-vpn functions are
concerned. I can now ping the public side of everything and get the firewall
web interfaces. Reinstall and reconfiguration of IPSecuritas vpn with
certificates to a single firewall gave green checkmarks on both my side and
the firewall side. Both logs look correct as a normal establishment of a vpn.
However, no joy being able to ping any device on the remote Green
network, even the private side of the firewall, no ability to "lookup" any
hardcoded FQDN of a private host in Green, and traceroute to the private
side of the firewall times out without yeilding any useful information. I am
now officially in over my head. Good news: OpenVPN (tunnelblick) is now
working where it wasn't before uninstall/reinstall of IPSecuritas.
Re: 10.4.4 Update Broke IPSecuritas 2.1?
by cnadig on 2006-01-16 17:32:55 +0100
Hello,
I could not find any problems after upgrading to 10.4.4 - but this might be
very depending on the specific configurations used. In order to investigate,
could you please give a descripton of you settings and of your network
setup. Also, please supply the ouput of the following commands while IPSec
is running (the green check mark is visible):
sudo setkey -DP
sudo setKey -D
netstat -nr
ifconfig -a
(please replace confidential information like your public IP address with
anynomized information).
Thanks,
Christoph
Re: 10.4.4 Update Broke IPSecuritas 2.1?
by Vincent on 2006-01-18 16:04:49 +0100
Hello,
I have the same problem since installation of 10.4.4 but the check mark
stay red.
I deleted the pref file without success.
Both setkey commands return nothing.
The firewall is CheckPoint/Gateway R60 (NGX) HFA-01.
Vincent
Re: 10.4.4 Update Broke IPSecuritas 2.1?
by Flo Wagner on 2006-01-18 19:48:01 +0100
Output of the commands is as follows:
[code]$ sudo setkey -DP
0.0.0.0/0[any] 192.168.254.199[any] any
in ipsec
esp/tunnel/192.168.254.254-192.168.254.199/require
spid=1 seq=1 pid=562
refcnt=1
192.168.254.199[any] 0.0.0.0/0[any] any
out ipsec
esp/tunnel/192.168.254.199-192.168.254.254/require
spid=2 seq=0 pid=562
refcnt=1[/code]
[code]$ sudo setkey -D
192.168.254.199 192.168.254.254
esp mode=tunnel spi=1228686566(0x493c44e6)
reqid=0(0x00000000)
E: 3des-cbc [...]
A: hmac-md5 [...]
replay=4 flags=0x00000000 state=mature seq=1 pid=566
created: Jan 18 19:21:34 2006 current: Jan 18 19:23:21 2006
diff: 107(s) hard: 28800(s) soft: 23040(s)
last: Jan 18 19:23:06 2006
hard: 0(s)
soft: 0(s)
current: 6832(bytes) hard: 0(bytes) soft: 0(bytes)
allocated: 45 hard: 0 soft: 0
refcnt=2
192.168.254.254 192.168.254.199
esp mode=tunnel spi=162150579(0x09aa38b3)
reqid=0(0x00000000)
E: 3des-cbc [...]
A: hmac-md5 [...]
replay=4 flags=0x00000000 state=mature seq=0 pid=566
created: Jan 18 19:21:34 2006 current: Jan 18 19:23:21 2006
diff: 107(s) hard: 28800(s) soft: 23040(s)
last:
hard: 0(s)
soft: 0(s)
current: 0(bytes)
hard: 0(bytes) soft: 0(bytes)
allocated: 0 hard: 0 soft: 0
refcnt=1[/code]
[code]$ netstat -nr
Routing tables
Internet:
Destination
Gateway
Flags Refs
Use Netif Expire
default
192.168.254.254 UGSc
2
5 en1
127
127.0.0.1
UCS
0
0 lo0
127.0.0.1
127.0.0.1
UH
63
6335 lo0
169.254
link#5
UCS
0
0 en1
192.168.254
link#5
UCS
2
0 en1
192.168.254.199 127.0.0.1
UHS
0
0 lo0
192.168.254.254 0:5:5d:a2:de:6
UHLW
5
59 en1
1046[/code]
[code]$ ifconfig -a
lo0: flags=8049<UP,LOOPBACK,RUNNING,MULTICAST> mtu 16384
inet 127.0.0.1 netmask 0xff000000
inet6 ::1 prefixlen 128
inet6 fe80::1%lo0 prefixlen 64 scopeid 0x1
gif0: flags=8010<POINTOPOINT,MULTICAST> mtu 1280
stf0: flags=0<> mtu 1280
en0: [...]
en1: flags=8863<UP,BROADCAST,SMART,RUNNING,SIMPLEX,MULTICAST>
mtu 1500
inet6 ****::***:****:****:****%en1 prefixlen 64 scopeid 0x5
Re: 10.4.4 Update Broke IPSecuritas 2.1?
by Olaf Seifert on 2006-01-19 17:11:58 +0100
The same here, since running Mac OS X v.10.4.4. When trying to establish a
VPN-connection in the used manner, IPSecuritas 2.1 shows green
checkmark but my Mac can not reach anything behind IPCop-firewall
v1.4.10 (ping-time-out etc.)
???
Re: 10.4.4 Update Broke IPSecuritas 2.1?
by Nick Rutter on 2006-01-19 19:48:11 +0100
I've had the same problem!
I was happily using IPsecuritas 2.1 on 10.4.3, on a network using IPsec, and
all was well until I updated to 10.4.4. Now only local things work, and the
windows machines on the network all are still working, so I know that it's
me. Other mac users have suffered the same problem as me. Anybody
know how to fix this? Is apple going to release a fix? Is IPsecuritas going to
be updated?
Re: 10.4.4 Update Broke IPSecuritas 2.1?
by Chris Haas on 2006-01-19 23:25:21 +0100
On my mac IPSecuritas is working. On a other mac its broken.
The thing what is different:
I did the combo update. On the other mac it was the delta update.
Any exp. with that?
Chris
Re: 10.4.4 Update Broke IPSecuritas 2.1?
by LBean on 2006-01-20 02:05:49 +0100
>could you please give a descripton of your settings and of your network
setup
I am connecting to an IPCop 1.4.10 firewall from home over cablemodem.
Here is the writeup I use to configure IPSecuritas, which has worked fine for
months and no changes have been made:
----In the General tab, set the following:
Mode of Operation: Host to Network
Remote IPSec Device: [firewall IP]
Remote Network: [remote IP/mask]
Local Address: [blank]
Exchange Mode: Main
Proposal Check: Obey
Nonce Size: 16
In the Phase-I tab, set the following:
Lifetime: 28800
DH Group: Mod1536 (5)
Encryption: 3DES
Authentication: SHA1
In the Phase-2 tab, set the following:
Lifetime: 28800
PFS Group: Mod1536 (5)
Encryption: check "3DES" and "AES 128", uncheck all others
Authentication: check "HMAC SHA1", uncheck all others
In the ID/Auth tab, set the following:
FIRST: select "Certificates" at the bottom, change Local: to the name of your
private certificate, change Remote from "Check CA" to the name of the
building
SECOND: above, set both "Local Identifier" and "Remote Identifier" to
"Certificate"
In the Options tab, check everything EXCEPT Passive and Auto-Start
Click OK
When you want to connect, click "Start IPSec". If all was done correctly, after
a few moments, the red X should change to a green checkmark. You can
now use your remote computer on the school network just as though you
were at school.
----I do get the green checkmark, and the IPCop also shows a connection
successfully made. I'm told my message is too long, so I will post output
separately.
Re: 10.4.4 Update Broke IPSecuritas 2.1?
by LBean on 2006-01-20 02:06:23 +0100
>please supply the ouput of the following commands while IPSec is running
>(the green check mark is visible)
>sudo setkey -DP
"*" used to mask real numbers, but all numbers are correct. My local
address is assigned dynamically by RoadRunner, so I left it as is.
192.168.*.*/*[any] 24.198.95.95[any] any
in ipsec
esp/tunnel/*.*.*.*-24.198.95.95/require
spid=1 seq=1 pid=284
refcnt=1
24.198.95.95[any] 192.168.*.*/*[any] any
out ipsec
esp/tunnel/24.198.95.95-*.*.*.*/require
spid=2 seq=0 pid=284
refcnt=1
> sudo setKey -D
24.198.95.95 *.*.*.*
esp mode=tunnel spi=1437978041(0x55b5cdb9)
reqid=0(0x00000000)
E: 3des-cbc 9c637e10 e4be7f47 ef9ddde9 def83280 036657ba
8b29c7a1
A: hmac-sha1 92d7e0ab d08d7b87 ce0a09f0 5fb22b4e 46988358
replay=4 flags=0x00000000 state=mature seq=1 pid=288
created: Jan 19 19:33:17 2006 current: Jan 19 19:55:09 2006
diff: 1312(s) hard: 28800(s) soft: 23040(s)
last: Jan 19 19:36:44 2006
hard: 0(s)
soft: 0(s)
current: 4080(bytes) hard: 0(bytes) soft: 0(bytes)
allocated: 30 hard: 0 soft: 0
refcnt=2
*.*.*.* 24.198.95.95
esp mode=tunnel spi=191312427(0x0b67322b)
reqid=0(0x00000000)
E: 3des-cbc 842f4747 51ce44f1 3aaa2acd 401eb533 8d00d4a6
9c53aaf7
A: hmac-sha1 ca79cf33 f049c230 be103704 b7f96b4a 56c5d5d0
replay=4 flags=0x00000000 state=mature seq=0 pid=288
created: Jan 19 19:33:17 2006 current: Jan 19 19:55:09 2006
diff: 1312(s) hard: 28800(s) soft: 23040(s)
last:
hard: 0(s)
soft: 0(s)
current: 0(bytes)
hard: 0(bytes) soft: 0(bytes)
allocated: 0 hard: 0 soft: 0
refcnt=1
>netstat -nr
Routing tables
Internet:
Destination
Gateway
Flags Refs
Use Netif Expire
default
24.198.80.1
UGSc
15
105 en1
24.198.80/20
link#5
UCS
2
0 en1
24.198.80.1
0:5:74:f2:90:8c UHLW
15
0 en1 1200
24.198.93.26
0:a:95:72:b:b4
UHLW
1
9 en1
24.198.95.95
127.0.0.1
UHS
0
0 lo0
127
127.0.0.1
UCS
0
0 lo0
127.0.0.1
127.0.0.1
UH
10
1969 lo0
169.254
link#5
UCS
0
0 en1
Re: 10.4.4 Update Broke IPSecuritas 2.1?
by busta on 2006-01-20 15:06:29 +0100
Same problem here, just installed IPSecuritas 2.1 under Mac os X 10.4.4
and it isnt working. I don't seem to get much log output either. Sometimes
it logs, and sometimes it doesen't.
If i use VPN-tracker it works ok. I'm connecting to a Zywall 70.
Re: 10.4.4 Update Broke IPSecuritas 2.1?
by LBean on 2006-01-28 20:42:31 +0100
RE:Chris Haas and 10.4.4 combo
I just installed the 10.4.4 combo update over my current 10.4.4, but no
change. Still green checkmarks and both ends log a good connection, but
pings are 100% packet loss and traceroute shows nothing.
Chris, did you use the 10.4.4 combo to update 10.4.3? Are you connecting
to IPCop? If so, could you post your IPSecuritas settings and prefs and IPCop
settings so I could compare for differences?
Re: 10.4.4 Update Broke IPSecuritas 2.1?
by Trevor Baker on 2006-01-29 21:57:31 +0100
Hi,
Like other posters, I have the same problem since updating OS X to 10.4.4
(using the combo updater). Thinking that I have messed up, I re-installled
OS X from the original media and used software update to bring myself
back up to 10.4.4. Nothing has changed on my IPCop box, nor my
IPSecuritas configuration. The only change has been updating from 10.4.3
to 10.4.4.
I use my VPN to secure my wireless connection (IPCop blue interface) to the
LAN and Internet (Host to Anywhere). When the VPN is not started, I can
ping the WLAN intarface on my access point (10.0.1.3), the Blue interface
on my IPCop Box (10.0.1.1) and the Green interface (10.0.0.1). When
started, I can ping the access point (10.0.1.3), but cannot ping any anything
else on my network/Internet.
Both IPSecuritas and my IPCop box register an open VPN but no traffic can
pass. I have been able to verify the IPCop side with another (wired)
workstation. I am including my results from the terminal commands asked
for by cnadig.
sudo setkey -DP
10.0.1.1[any] 10.0.1.10[any] any
in none
spid=1 seq=7 pid=224
refcnt=1
0.0.0.0/0[67] 10.0.1.10[any] any
in none
spid=3 seq=6 pid=224
refcnt=1
0.0.0.0/0[68] 10.0.1.10[any] any
in none
spid=5 seq=5 pid=224
refcnt=1
0.0.0.0/0[any] 10.0.1.10[any] any
in ipsec
esp/tunnel/10.0.1.1-10.0.1.10/require
spid=7 seq=4 pid=224
refcnt=1
10.0.1.10[any] 10.0.1.1[any] any
out none
spid=2 seq=3 pid=224
refcnt=1
10.0.1.10[67] 0.0.0.0/0[any] any
out none
spid=4 seq=2 pid=224
refcnt=1
10.0.1.10[68] 0.0.0.0/0[any] any
out none
spid=6 seq=1 pid=224
refcnt=1
10.0.1.10[any] 0.0.0.0/0[any] any
out ipsec
esp/tunnel/10.0.1.10-10.0.1.1/require
spid=8 seq=0 pid=224
refcnt=1
sudo setkey -D
No SAD entries.
Re: 10.4.4 Update Broke IPSecuritas 2.1?
by Trevor Baker on 2006-01-29 21:59:49 +0100
Sorry,
I forgot to close my prevoius post. Thank you for looking at my post, I
hope my information will be helpful in solving our problem.
Trevor
Re: 10.4.4 Update Broke IPSecuritas 2.1?
by Chris Haas on 2006-02-09 09:17:40 +0100
I noticed that the problem only exist if the ip adress of the mac is an
"official" ip adress and so the ip-adress of the mac is one end of the tunnel.
If I establish a tunnel when my Mac is behind a NAT-router (and so it has a
privat ip-adress) I can get traffic through the tunnel.
I tested it with 2 different Mac all with 10.4.4.
Chris
Re: 10.4.4 Update Broke IPSecuritas 2.1 WORKAROUND
by LBean on 2006-02-10 14:11:15 +0100
I can verify this! I just set my airport base station to "share a single IP
address using dhcp and nat" and my IPSecuritas worked perfectly. I went
back to having my base station as a "dumb hub" only and although I still
get the green connection checkmark I cannot connect to nor ping anything
on the remote network. Back to dhcp/nat on the airport, and I am pinging,
connecting to servers, and using Remote Desktop.
Now the BIG QUESTION .... *WHY*??? And what about those poor souls who
do not have an airport base station to carry around in their front pocket?
Does anyone from Lobotomo participate in this list? I've sent two emails to
their support address simply asking if they were aware of this thread, but
never got any reply, not even just a simple "yes" or "no".
Re: 10.4.4 Update Broke IPSecuritas 2.1?
by Erik Meitner on 2006-02-13 20:41:09 +0100
We have also run into this problem. Connecting to a Netscreen 5GT worked
great for our Macs until we updated them to 10.4.4. The Netscreen reports
that the phase-2 negotiations could not complete because there were no
acceptable phase-2 proposals.
The exact same VPN configuration works fine on non-10.4.4 Macs.
The Log shows the following after the VPN is brought up:
Feb 13 13:19:41 Horse-with-no-name-3 racoon: ERROR:
isakmp_inf.c:847:isakmp_info_recv_n(): unknown notify message, no
phase2 handle found.
Feb 13 13:19:41 Horse-with-no-name-3 racoon: DEBUG:
isakmp_inf.c:869:isakmp_info_recv_n(): notification message 14:NOPROPOSAL-CHOSEN, doi=1 proto_id=1 spi=0b57ba623078e122
279132308d30c6b6 (size=16).
Re: 10.4.4 Update Broke IPSecuritas 2.1?
by Erik Meitner on 2006-02-13 21:05:03 +0100
And in addition to my post above:
The generated racoon and setkey configs do not differ at all between our
Macs that work and those that don't(10.4.4).
Re: 10.4.4 Update Broke IPSecuritas 2.1?
by Jeremy cooke on 2006-02-14 12:35:46 +0100
I experienced the same problem and searched the web for a solution. I am
NON technical and didnt understand half of what was being said.Remote
connection for me was critical, so i decided to look for another VPN client
solution,connecting to an Exchange server. I downloaded and installed the
30 day demo of VPN tracker
and failed to configure it proerly because its way above my expertise. BUT
geuss what,almost immediately my IP securits connection came to life on a
hard wire connection and on the built in airport.dont know why or how but thats what happened.I geussi ts bad news for VPN Tracker sales, but
hey it did it for me.
Re: 10.4.4 Update Broke IPSecuritas 2.1?
by Erik Meitner on 2006-02-14 16:51:14 +0100
I tried the VPN Tracker demo on the same 10.4.4 box that IPSecuritas does
not work on. VPN Tracker worked fine. As I understand it, it does not use
the BSD native 'racoon' IKE daemon so it is no surprise that it works.
I manually configured racoon and tried to establish a VPN. Phase-2
negatiations still fail. This is a known good configuration.
I tried reconfiguring the VPN for various phase-2 authentication and
encryption types with no success. Apple broke something. I think we need
to just wait for them to fix it.
Re: 10.4.4 Update Broke IPSecuritas 2.1?
by mrfett on 2006-02-14 20:21:09 +0100
[quote author=Jeremy cooke link=1137083596/15#19 date=1139916946]I
downloaded and installed the 30 day demo of VPN tracker
and failed to configure it proerly because its way above my expertise. BUT
geuss what,almost immediately my IP securits connection came to life on a
hard wire connection and on the built in airport.[/quote]
wait you just installed this app and IPSecuritas started working? i know my
issue is a little different than the one discussed here, but i'll give that a
shot...
Re: 10.4.4 Update Broke IPSecuritas 2.1?
by cnadig on 2006-02-14 22:04:56 +0100
Hello all,
thank you very much for your logs and other hints - they helped a lot in
tracking down the problem.
There were indeed a lot of changes in racoon (the IKE daemon, responsible
for the key exchange and some part of kernel configuration for IPSec)
between 10.4.3 and 10.4.4.
Unfortunately, these changes make it necessary for us to supply a new
version of IPSecuritas which includes its own, working version of racoon,
which will take one or two more days. We're very sorry for all
inconveniences!
The new version will be labeled 2.2 and will be announced through the
usual channels (www.versiontracker.com, www.lobotomo.com)
Thanks again,
Christoph
(Lobotomo Software)
Re: ANN: 10.4.4 Update Broke IPSecuritas 2.1?
by Trevor Baker on 2006-02-15 02:38:28 +0100
Hi,
There's an update to Mac OS X (10.4.5) using Software Update. This fixed
my issue with IPSecuritas.
Thanks,
Trevor
Re: ANN: 10.4.4 Update Broke IPSecuritas 2.1?
by Flo Wagner on 2006-02-15 12:31:45 +0100
Thanks Trevor, installing the 10.4.5 update did it for me, too.
And thanks anyway to Christoph for his assistance!
Cheers,
Flo
Re: ANN: 10.4.4 Update Broke IPSecuritas 2.1?
by Vincent on 2006-02-17 14:03:27 +0100
I installed Combo 10.4.5 and no change.
I rebuild the preference file.
I have "IPSec started" but red X stay. No green check.
Re: ANN: 10.4.4 Update Broke IPSecuritas 2.1?
by Erik Meitner on 2006-02-17 19:17:26 +0100
I can verify that the 10.4.5 update did fix the problem.
Re: ANN: 10.4.4 Update Broke IPSecuritas 2.1?
by yon on 2006-02-17 20:23:44 +0100
I am using 10.4.5 and I can't get an IP address from IPCOP behind the VPN.
Any ideas? My setup looks like the normal IPCop/IPSecuritas setup.
Re: ANN: 10.4.4 Update Broke IPSecuritas 2.1?
by xdavid on 2006-02-19 09:57:59 +0100
Another confirmation: 10.4.5 fixed it.
From the update release notes:
"... includes general operating system fixes, as well as specific fixes for the
following applications and technologies: ... -VPN connections to Cisco
servers when using NAT"
Interestingly, I thought this was a misleading note since I only got a
problem when I was on a public IP and it worked fine behind a NAT router
(Netgear). However, on further analysing where it worked and where it did
not, my 'public' IPs were all dynamically assigned by the ISP, whereas the
LANs where I was behind a NAT router actually had a static external IP
assigned to them. This suggests to me that there was more of a general
routing bug in 10.4.4 than just NAT.
This was the specific error in the logs where it broke down an would not
complete phase 2 negotiations (although it seemed to get a fair way
through them)...
Feb 18 13:27:09 Redpaw racoon: DEBUG:
isakmp.c:1831:isakmp_ph2resend(): resend phase2 packet
dd03679ef51ce26e:ff15187961a5d0bf:2279bb6f\n
Feb 18 13:27:09 Redpaw racoon: ERROR: isakmp.c:196:isakmp_handler():
the length of the isakmp header is too big.\n
Feb 18 13:27:11 Redpaw racoon: ERROR: isakmp.c:183:isakmp_handler():
packet shorter than isakmp header size.\n
Anyway, all better now with the 10.4.5 update. ;D
Thanks Lobotomo for your continued support for IPSecuritas. I hope my
small contribution to your tip-jar allows you to continue your great work
for the Mac community!
-david
Re: ANN: 10.4.4 Update Broke IPSecuritas 2.1?
by Brian Reed on 2006-03-01 19:11:15 +0100
IPSecuritas 2.1 and MAC OS 10.4.5 is NOT working for us
Re: ANN: 10.4.4 Update Broke IPSecuritas 2.1?
by Vincent on 2006-03-01 21:33:28 +0100
[quote author=Brian Reed link=1137083596/15#29
date=1141236675]IPSecuritas 2.1 and MAC OS 10.4.5 is NOT working for
us[/quote]
I override /usr/sbin/racoon file with the 10.4.3 version and it's OK. I don't
know why...
Re: ANN: 10.4.4 Update Broke IPSecuritas 2.1?
by Trevor Baker on 2006-03-02 01:40:58 +0100
Hi,
Just thought I'd drop a quick note. The Apple security update breaks the
10.4.5 "fix" again. VPN is down. According to Apple this update fixes an
IPSec issue with regards to remote DoS attacks. The blurb from Apple's site
follow.
BTW, how's the update for IPSecuritas coming? <grin> I'll gladly be a tester
if you like.
Also, Vincent, where can one find /usr/sbin/racoon from 10.4.3?
Trevor
----------------------------------Taken from
docs.apple.com--------------------------IPSec
CVE-ID: CVE-2006-0383
Available for: Mac OS X v10.3.9, Mac OS X Server v10.3.9, Mac OS X
v10.4.5, Mac OS X Server v10.4.5
Impact: Remote denial of service against VPN connections
Description: Incorrect handling of error conditions for virtual private
networks based on IPSec may allow a remote attacker to cause a service
interruption. This update addresses the issues by correctly handling the
conditions that may cause crashes. Credit to OUSPG from the University of
Oulu, NISCC, and CERT-FI for coordinating and reporting this issue.
Re: ANN: 10.4.4 Update Broke IPSecuritas 2.1?
by Vincent on 2006-03-02 02:28:52 +0100
Hi Travor,
I try the update Update 2006-001 without success.
I had installed 10.4 and Combo 10.4.3 on a external disk to obtain racoon.
Vincent
Re: ANN: 10.4.4 Update Broke IPSecuritas 2.1?
by Flo Wagner on 2006-03-20 14:13:27 +0100
The Security Update did break my setup again, too. But if 10.4.5 worked for
you, you can simply extract the racoon executable from the 10.4.5 Combo
Update, available here: http://www.apple.com/support/downloads
/macosxupdate1045combo.html.
Mount the .dmg and choose 'Show package content' from the context menu
of the .pkg file. Next unpack 'Archive.pax.gz' from the Content subdir of
the package. Then just overwrite /usr/sbin/racoon with the one you just
extracted (you must be root to do that). You can always revert to the latest
racoon version by simply installing 'Security Update 002'
(http://www.apple.com/support/downloads
/securityupdate2006002v11macosx1045ppc.html).
Regards,
Flo
P.S.: Do this at you own risk. I wont take any liability for damage (e.g. you
Mac explodes or something ;)). Also be careful when working as root, as
one can easily breake some vital system files.
Re: ANN: 10.4.4 Update Broke IPSecuritas 2.1?
by Trevor Baker on 2006-04-04 01:38:10 +0200
Hi Gang,
The new OS X Tiger update, 10.4.6, again restores IPSecuritas functionality.
Just wanted to let everyone know. Any news on the update to 2.2 for
IPSecuritas?
Thanks,
Trevor
Re: ANN: 10.4.4 Update Broke IPSecuritas 2.1?
by Vincent on 2006-04-04 11:55:46 +0200
No success for me with 10.4.6 and CheckPoint NGX
Sometime it's work with 10.4.3 image of /usr/sbin/racoon
Vincent
Local Address with Sonicwall
Local Address with Sonicwall
by rtl on 2006-01-19 04:22:30 +0100
Hi,
I've been trying to get IPSecuritas 2.1 working with a Sonicwall TZ150. It
failed during Phase 2 with the following message...
"IKE Responder: No match for proposed remote network address"
I was able to resolve the issue by setting a remote address of 192.168.45.0
in the Sonicwall SA and setting my local address in IPSecuritas to
192.168.45.5, but I've never had to enter a local address for the settings
I've used for Netscreen firewalls.
Are there other Sonicwall/IPSecuritas users who have had this problem and
been able to resolve it? I've tried some of the setups listed on the boards
that say they work, but have not been able to get anything going until I
added the local address setup.
Thanks!
How to export a certificate that can go in to CM?
How to export a certificate that can go in to CM?
by GrandPA on 2006-02-01 23:26:33 +0100
Is there anyone who can tell me how to export a certificate (selsigned) from
the mac to one thats accepted by IPSecuritas?
Unable to Browse Network - BEFSX41
Unable to Browse Network - BEFSX41
by mrfett on 2006-02-06 21:44:34 +0100
I'm trying to use IPSecuritas to connect to a Linksys BEFSX41 running 1.52.9
firmware. My Mac is running OS X 10.4.4. I can successfully make a
connection (I get a green checkmark) but I am unable to see any of the
machines on the network. When I try to ping a machine, the message is "no
route to host". Can anyone offer some advice? I'm using 3DES and SHA if
that makes any difference. Thank you.
Re: Unable to Browse Network - BEFSX41
by mrfett on 2006-02-15 18:45:50 +0100
10.4.5 didn't help me, just FYI.
Re: Unable to Browse Network - BEFSX41
by yves_kayak on 2006-03-05 20:17:29 +0100
Hello,
If you get the green light and get a "no route to host" error, I think your
remote network config is wrong.
Edit your configuration. In the General tab, check the "remote network"
field. (If you're not sure, the network admin will provide you this
information). Also, check the other field on that line, the number of bits in
mask. If your mask is 255.255.255.0, use 24 bits; it your mask is
255.255.0.0 use 16 bits.
Hope this helps,
Yves
Re: Unable to Browse Network - BEFSX41
by mrfett on 2006-03-24 17:22:58 +0100
forgot to thank you for the advice. unfortunately, that config tip didn't help
either. i've gone over all the instructions pretty thoroughly, and can't see
what the issue could be. but thanks for the help.
Starting IPSec from command line
Starting IPSec from command line
by Peer Sandtner on 2006-02-08 20:57:43 +0100
How can I start/stop IPSec from the command line? It seems that IPSecuritas
is not scriptable. But perhaps there are other solutions out there.
Thanks,
Peer
Connecting to IPCOP IP Address (DHCP) Problem
Connecting to IPCOP IP Address (DHCP) Problem
by boblee on 2006-02-16 04:54:00 +0100
I am running OS X 10.4.5, and I am having the same issue with 10.4.4.
When connecting to IPCOP VPN I do not seem to get an IP address from
IPCOP via DHCP. Infact, I dont seem to have an IP address at my works
internal network at all.
Am I suppose to be getting an IP via DHCP from IPCOP? It's setup to give
out addresses, and when I plug in my laptop at work I get an address.
Once I am connected to through the VNP I can connect to pretty much any
machine in my works network, but every connection comes from my home's
private IP.
For example, if I ssh to one of our servers at its internal address of
192.168.1.158 and I check to see where I am connected from it'll show my
Home's NAT, so it would look something like 10.1.1.101
Any ideas? I'd like to get a private IP from IPCOP via DHCP just like I do
when I plug in my laptop at work.
Re: Connecting to IPCOP IP Address (DHCP) Problem
by Stephen on 2006-02-17 20:21:17 +0100
Are you suppose to get an IP from the VPN with IPSecuritas? So your system
has 2 IPS????
Re: Connecting to IPCOP IP Address (DHCP) Problem
by yon on 2006-03-10 23:45:59 +0100
I have the same problem with 10.4.5
Any solution??
IPSecuritas Working with Windows Server RRAS
IPSecuritas Working with Windows Server RRAS
by Jack Valko on 2006-02-16 08:16:06 +0100
Has anyone gotten IPSecuritas to connect to a Windows 2003 Server
running RRAS?
Universal Binary
Universal Binary
by Andreas Ley on 2006-02-20 02:06:30 +0100
Hey there. IPSecuritas rules - thanks for that!
I'm a proud owner of an Intel-based iMac, and as such I prefer using native
binaries (mostly for speed issues).
But, for the record, everything works completely fine under Rosetta, using
either 10.4.4 and 10.4.5.
As far as I understand, IPSecuritas is a GUI for the built-in "racoon" of
MacOS X, so the speed of the actual IPSec connection isn't affected by
IPSecuritas beeing PowerPC only. Since that may change with version 2.2, I
was wondering if I could provide any help to make IPSecuritas an universal
binary. I can do some compiles and tests, but my coding skills are below
average. :)
Also, I had a few ideas concerning interface enhancements (with some
additional icons, if you'd welcome that). Is it ok to drop you a mail with an
example?
Thanks for the great work; keep it up!
PS: I tried to register, but I couldn't get the forum script to actually send me
a mail in 15 minutes. But maybe it'll get to me later.
Re: Universal Binary
by cnadig on 2006-02-21 23:40:37 +0100
Hello Andreas,
thank you very much for your feedback - certainly I'd like to receive all of
your proposals, please just send me an e-mail to
[email protected].
I will start to port IPSecuritas 3.0 (which at the moment is in beta testing,
soon a public beta will be released) to the new Intel architecture as soon as
I can get hold of a Intel machine for a few days.
Cheers,
Christoph
checkpoint office mode IKE over TCP
checkpoint office mode IKE over TCP
by Yitz Jacob on 2006-02-21 10:34:21 +0100
I use checkpoint's secureclient (username & password, office mode, and IKE
over TCP being the only real configuration settings)
does this translate into something that can be configured in ipsecuritas..? i
would really love to use my ibook to do my work rather than my pc..
thanks :)
yitz
Sonicwall TZ170
Sonicwall TZ170
by w_grace on 2006-02-21 13:08:46 +0100
Hello,
I am trying to get connected to a Sonicwall TZ170 and I am getting the
following;
Feb 21 11:54:42 HDGroup-01 racoon: ERROR:
isakmp_inf.c:848:isakmp_info_recv_n(): unknown notify message, no
phase2 handle found.
Verify Identifyer is not selected and i have set the Remote Identifyer to the
IP address of the Sonicwall, both these suggestions I have seen in relation
to this error.
Any ideas?
Re: Sonicwall TZ170
by w_grace on 2006-02-21 17:42:33 +0100
I get the same thing with VPN Tracker, and they suggest going back to the
Default settings on the Sonicwall, but that would kill other clients that are
logging in OK. This is the only Mac Client I have and I get the following all
the time.
Phase-1
Group 1
3DES
MD5
28000
Phase-2
ESP
3DES
MD5
Feb 21 16:31:35 HDGroup-01 racoon: ERROR:
isakmp_inf.c:848:isakmp_info_recv_n(): unknown notify message, no
phase2 handle found.
Feb 21 16:31:35 HDGroup-01 racoon: ERROR:
isakmp_inf.c:848:isakmp_info_recv_n(): unknown notify message, no
phase2 handle found.
Feb 21 16:31:54 HDGroup-01 racoon: ERROR:
isakmp_inf.c:848:isakmp_info_recv_n(): unknown notify message, no
phase2 handle found.
Feb 21 16:32:04 HDGroup-01 racoon: ERROR:
pfkey.c:745:pfkey_timeover(): 80.169.171.194 give up to get IPsec-SA
to time up to wait.
Feb 21 16:31:54 HDGroup-01 racoon: ERROR:
isakmp_inf.c:848:isakmp_info_recv_n(): unknown notify message, no
phase2 handle found.
Feb 21 16:32:04 HDGroup-01 racoon: ERROR:
pfkey.c:745:pfkey_timeover(): 80.169.171.194 give up to get IPsec-SA
to time up to wait.
Feb 21 16:33:49 HDGroup-01 racoon: ERROR:
isakmp_inf.c:848:isakmp_info_recv_n(): unknown notify message, no
phase2 handle found.
Feb 21 16:33:49 HDGroup-01 racoon: ERROR:
isakmp_inf.c:848:isakmp_info_recv_n(): unknown notify message, no
phase2 handle found.
Feb 21 16:34:10 HDGroup-01 racoon: ERROR:
isakmp_inf.c:848:isakmp_info_recv_n(): unknown notify message, no
phase2 handle found.
Feb 21 16:34:19 HDGroup-01 racoon: ERROR:
pfkey.c:745:pfkey_timeover(): 80.169.171.194 give up to get IPsec-SA
to time up to wait.
Feb 21 16:34:10 HDGroup-01 racoon: ERROR:
isakmp_inf.c:848:isakmp_info_recv_n(): unknown notify message, no
phase2 handle found.
Feb 21 16:34:19 HDGroup-01 racoon: ERROR:
pfkey.c:745:pfkey_timeover(): 80.169.171.194 give up to get IPsec-SA
to time up to wait.
Any help would be great. Thanks
due
due
due
due
Watchguard Firebox Edge: USER_FQDN ID?
Watchguard Firebox Edge: USER_FQDN ID?
by jmaynard on 2006-02-24 04:56:44 +0100
I'm trying to get IPSecuritas running with a Watchguard Firebox Edge X5. I
know it can do IPSec, because it's talking with VPN Tracker. Unfortunately, I
can't get it to work with IPSecuritas.
The problem is that the local identifier needs to be a USER_FQDN string,
and I can't see how to set that in IPSecuritas. The underlying racoon config
file has it as a valid my_identifier type, but I can't see where IPSecuritas is
keeping its racoon.conf so I can see if it'll work at all.
Can i get there from here?
Re: Watchguard Firebox Edge: USER_FQDN ID?
by DDA on 2006-02-25 04:18:03 +0100
You can indeed get there from here; simply select DN for the Local
Identifier in the Id/Auth page and fill it is with [email protected] (or
even just @domain.com) and IPSecuritas will send a USER_FQDN ID.
Re: Watchguard Firebox Edge: USER_FQDN ID?
by jmaynard on 2006-02-25 05:19:23 +0100
[quote author=DDA link=1140753404/0#1 date=1140837483]You can
indeed get there from here; simply select DN for the Local Identifier in the
Id/Auth page and fill it is with [email protected] (or even just
@domain.com) and IPSecuritas will send a USER_FQDN ID.
[/quote]
Nice...except for one problem: it needs to be tagged as a USER_FQDN, but
it's just a user name with no @ or domain name attached. Is there a way I
can force it to USER_FQDN without that?
Re: Watchguard Firebox Edge: USER_FQDN ID?
by DDA on 2006-02-25 17:35:28 +0100
I believe if you put an @ in front of it, it will be sent as a USER_FQDN. So if it
would normally be "myusername", try "@myusername".
From the help:
[i]2. Domain Name (DN): This can either be a fully qualified distinguished
name (FQDN, e.g. lobotomo.com) or a user fully qualified distinguished
name (USER_FQDN, e.g. [email protected]). Normally, IPSecuritas
determines the type itself (i.e. if there is a @ character in the name it's
automatically considered a USER_FQDN. If you want to force IPSecuritas to
always send the consider the identification as USER_FQDN, prepend one @
character in front of the FQDN, e.g. @lobotomo.com)[/i]
I don't know if this will send the @ or just force it to say it is a USER_FQDN
but give it a try! :-)
Re: Watchguard Firebox Edge: USER_FQDN ID?
by jmaynard on 2006-02-25 22:15:18 +0100
[quote author=DDA link=1140753404/0#3 date=1140885328]If you want
to force IPSecuritas to always send the consider the identification as
USER_FQDN, prepend one @ character in front of the FQDN, e.g.
@lobotomo.com)[/quote]
It didn't work. I tried it with the @ both before and after the user name. I
think it's sending the @ while flagging it as a USER_FQDN.
The help quoted seems to say that you can send a domain name as
USER_FQDN. I need to send the user ID with no domain name or @
attached, as a USER_FQDN.
Netscreen 5XP login issues
Netscreen 5XP login issues
by Derek on 2006-02-27 16:58:54 +0100
I can connect from home to my Netscreen 5XP at work but I can only see a
few macs as active using Apple remote desktop. Most of them are NOT
visible. I can't even ping them. Any hints?
Re: Netscreen 5XP login issues
by TZ on 2006-03-30 20:40:09 +0200
Review your netscreen policies, there should be something there... ;)
Anyone using IPSecuritas/Mac OS X/Checkpoint VPN-1
Anyone using IPSecuritas/Mac OS X/Checkpoint VPN-1
by Jack sellers on 2006-02-28 01:53:42 +0100
I was told by someone at Checkpoint that IPSecuritas works connecting a
Mac running Panther or Tiger to a network running CheckPoint VPN-1. Is
there anyone out there who can help me?
Re: Anyone using IPSecuritas/Mac OS X/Checkpoint V
by Rolf Schmerder on 2006-03-05 17:43:11 +0100
Hi Jack! Yes - it can...or should I say ...under certain circumstances? I had a
connection running from my IBook with Tiger 10.4.x to our company LAN
beeing protected by CP-VPN-1 NGX. Unfortunately right now after an
update (my IBook to 10.4.5 it doesn' t work anymore. But I could give you
my config screenshots if you give me your email address.
Greets
Rolf, Hamburg - Northern Germany
Re: Anyone using IPSecuritas/Mac OS X/Checkpoint V
by Paul Donovan on 2006-03-05 18:55:30 +0100
I'm unable to get IPSecuritas 2.1 to connect to a CheckPoint VPN-1 network
either. I'm running 10.4.5.
I can connect successfully using the demo of VPN Tracker 4.6 but the demo
has an extremely annoying 3 minute timeout so I downloaded IPSecuritas.
I've only been using VPN since yesterday so I'm new to all this!
If you could give me the settings that used to work I can try those and see if
I can get anywhere.
I have a Mac mini still running 10.4.4 that I can test on too.
Thanks a lot,
Paul
(paul at donovansbrain dot co dot uk)
10.4.5 giveth, Security 2006-001 taketh away
10.4.5 giveth, Security 2006-001 taketh away
by Lawrence Bean on 2006-03-02 17:12:55 +0100
Saw IPSec listed in this Security Update released today by Apple, so I cloned
to a non-critical machine and tested. Same issue as with 10.4.4, but worse.
The NAT work-around works, so if your client running IPSecuritas is behind
a natted device and running in the 10.x.x.x, 192.x.x.x, or 172.x.x.x ranges
it works.
In the 10.4.4 trouble with a public address, I could get general internet but
could not ping/connect to the private network. Now in 10.4.5 with Security
Update 2006-001 applied and "Replace DNS ..." checkmarked, in addition
to not being able to ping/connect to the private network, I cannot get
general internet services.
Additional info: The client shows a green checkmark, and the IPCop firewall
shows an open connection with the client. It appears I can ping public IPs
by IP address. It appears I can lookup FQDNs and get their IP addresses. I
cannot ping the FQDN, though, and it times out with "could not resolve
host". I cannot ping the private network by IPAddress or FQDN, neither on
the inside private addresses, nor on the outside public address(es). I cannot
get any http, https, ftp, or ssh connections by FQDN. I can get ftp and ssh
by IPAddress. I seem to begin to load a web page by IPAddress, i.e. I get the
name of the page in the browser header, but loading stalls before the page
renders and I get a "You are not connected to the Internet" error. If I go to
IPSecuritas Preferences and uncheck "Replace DNS ...", this solves all the
general internet trouble and web, ftp, ssh are all back to normal, but still no
ping to private network on the inside or the outside addresses.
I'd be happy to provide any further info and run any further tests that the
Lobotomo team would like, including alphas and betas. Just ask.
Connection lost with SonicWall PRO 230
Connection lost with SonicWall PRO 230
by Yves Forget on 2006-03-05 18:04:54 +0100
Hello everyone,
I'm using IPSecuritas to connect to a SonicWall PRO 230 firewall/VPN Server.
It *does* work, but I lose the VPN connection every 10 minutes or so.
I have a Linksys BEFSR41 router on the client side, I don't know if it's part of
the problem.
When I use VPN Tracker 3 as the VPN Client it works fine. (on the same
Mac, connecting to the same server)
Re: Connection lost with SonicWall PRO 230
by Yves Forget on 2006-03-05 18:07:32 +0100
I'm on a PowerMac G5 with Mac OS X 10.4.5
Did anyone experience something similar ?
Thanks !
yves
Re: Connection lost with SonicWall PRO 230
by Tom Komadowski on 2006-06-07 20:00:17 +0200
It's dropping you because of the dead peer detection. turn that off on the
client and on the sonicwall and you will be fine.
Re: Connection lost with SonicWall PRO 230
by yves_kayak on 2006-10-07 04:40:15 +0200
Hi everyone,
A couple of months after posting this question, we found the problem !
I connect to work using the VPN. Many of my work colleagues have routers
too, and local IP addresses set the router's DHCP are often the same :
192.168.1.100
If someone is connected with that address and someone else comes it with
the same (local) IP address, the user that was logged on is kicked out.
Those who don't have a router are connecting with their Internet IP
address, which is obviously unique, so the problem only happens for people
having routers (or a really messy configuration...)
In a small business, users can manage to use different local IP addresses
(easily set on your router's config).
Our VPN server (SonicWall Pro 230) can be set to provide DHCP addresses to
users of the VPN, but see my post regarding that one....
Hope this may help,
Yves Forget
IPSecuritas to IPSecuritas in a server config?
IPSecuritas to IPSecuritas in a server config?
by Matt Warren on 2006-03-08 22:40:47 +0100
This seems like it should be obvious, but I've yet to find docs or info on it.
I'd like to set up a host to network vpn with IPSecuritas at both ends. Is this
possible? I'm looking to get access to my home network from various public
locations.
I assume the client is setup as Host to Network. But what's a proper setup
for the "server" end of things? And what ports would I forward on the home
network's router?
I've found all kinds of info on connecting to other devices, but little to none
on connecting to IPSecuritas its self.
Intel Mac minor problem
Intel Mac minor problem
by jmaynard on 2006-03-10 15:34:34 +0100
I've got a shiny new MacBook Pro. IPSecuritas runs and VPNs, but there's
one minor problem: the status icon next to the connection name is always
blank, making it somewhat difficult to tell if the VPN link is actually up.
I suspect this is just a matter of building a universal binary. Any idea when
that might happen?
Netgear DG834GB <- Connect to ?
Netgear DG834GB <- Connect to ?
by sukram33 on 2006-03-10 17:02:09 +0100
Hi,
has anyone experience with netgear dg834gb?
I am tryin to connect to this router, but do not succed ... anyway, I do not
really understand what I am doing ... ???
Here is my configuration:
In the office: router dg834gb, dyndns host name (dynamic ip adress), using
nat with lokal ip range.
at the remote location there is also a router with nat and i forwarded esp
and upd port 500 (router is a avm fritz box)
has anyone perhaps experiences with a connection between ipsecuritas and
the netgear dg834gb router with both sides using dynamic ip adresses ?
thanks markus
Re: Netgear DG834GB <- Connect to ?
by tghewett on 2006-04-10 13:01:30 +0200
I now have the DG834 router connecting with IPSecuritas. The DG834 VPN
service only responds to the IP address on the ADSL port, i.e. the one
usually negotiated with the ISP. If you set the IPSecuritas Remote IPSec
Device value to the LAN IP address of the DG834, it won't work.
Recommend a VPN router for home use
Recommend a VPN router for home use
by eullman on 2006-03-15 01:04:09 +0100
Greetings.
My Netgear WGR614 at home has died, and I'm looking to replace it with a
router that offers VPN client access from Tiger/IPSecuritas and Win XP
(built-in). I don't need Wi-Fi, and I'd like to spend less than $150 if
possible. QoS is not required, but would be an added benefit.
Anyone care to offer a recommendation?
Thanks in advance,
Eric
Re: Recommend a VPN router for home use
by DDA on 2006-03-17 03:57:05 +0100
Netgear FWG114Pv2 will do 2 IPSec tunnels, WPA2 and has a USB printserver port. I don't know if it will do PPTP (the WinXP VPN stuff) but it works
fine with IPSecuritas (PSK so far).
Around $100 at NewEgg.
Netscreen to Dlink VPN
Netscreen to Dlink VPN
by Kev on 2006-03-16 06:43:37 +0100
Has anyone managed to get a Dlink VPN router DI804 to talk to a Netscreen
using IKE. I am getting a "Received incorrect ID payload: ID type mismatch"
from the debug but I can't work out what is going wrong. It looks like the
peer id is wrong but I cant find where to set it on the Dlink. There is also
nothing on the Netscreen knowledge base about setting up VPNs to third
party routers.
Any help would be appreciated.
Kev. ???
Another user trying to match VPN Tracker settings
Another user trying to match VPN Tracker settings
by Phil Delaney on 2006-03-22 21:07:49 +0100
Hi,
i've checked google and these forums, i'm trying to connect using
IPSecuritas 2.1 on OSX 10.4.5 through a SonicWall2040 Pro.
The
Mar
Mar
Mar
Mar
Mar
Mar
Mar
Mar
Mar
log says:
20 23:28:33
20 23:28:33
20 23:28:33
20 23:28:33
20 23:28:33
20 23:28:33
20 23:28:34
20 23:28:34
20 23:28:34
pd-pb
pd-pb
pd-pb
pd-pb
pd-pb
pd-pb
pd-pb
pd-pb
pd-pb
IPSecuritas:
IPSecuritas:
IPSecuritas:
IPSecuritas:
IPSecuritas:
IPSecuritas:
IPSecuritas:
IPSecuritas:
IPSecuritas:
Parsing configuration
Setting up racoon.conf
Setting up setkey.conf
Setting up psk.txt
Setting up tunnel.conf
Parsing configuration done
Starting racoon...
Racoon is running
Set kernel keys
but i do not get a tunnel/connection - and there is a red cross on the main
window next to my setting name.
SonicWall Log says:
1
03/22/2006 20:03:11.336
Error
VPN IKE
SA -payload
processing error
84.XXX.XXX.XXX, 500 (admin)
82.XXX.XXX.XXX, 500
2
03/22/2006 20:03:11.336
Warning
VPN IKE
IKE Responder:
IKE proposal does not match (Phase 1)
84.XXX.XXX.XXX, 500 (admin)
82.XXX.XXX.XXX, 500
3
03/22/2006 20:03:11.336
Info
VPN IKE
IKE Responder:
Received Main Mode request (Phase 1)
84.XXX.XXX.XXX, 500 (admin)
82.XXX.XXX.XXX, 500
4
03/22/2006 20:02:44.880
Info
Authenticated Access
WAN
zone administrator login allowed
84.XXX.XXX.XXX, 0, X1 (admin)
82.XXX.XXX.XXX, 443, X1
82.XXX.XXX.XXX = public ip on sonic wall (router)
84.XXX.XXX.XXX = public ip on user (router)
If i connect using VPN Tracker and then connect using IPSecuritas i get the
green tick!
my IPSecuritas settings are:
Host to Network
Exchange Mode: Main
Proposal Check: Obey, size :16
Phase 1
Lifetime: 28800
DH Group: Mod768 (1)
Encryption: 3DES
Auth: SHA1
Phase 2
Lifetime: 28800
PFS Group: None (I know it is EPS on the SW)
Encryption: 3DES
Auth: SHA1
ID/Auth
Address for both and a preshared secret
Re: Another user trying to match VPN Tracker setti
by Josh Carlson on 2006-07-08 07:08:59 +0200
I more or less have the same problem with the same sonicwall model. Any
thoughts?
Re: Another user trying to match VPN Tracker setti
by Phil on 2006-07-17 15:38:20 +0200
Nothing.... still.....!!!!
Re: Another user trying to match VPN Tracker setti
by northben on 2006-07-31 15:27:19 +0200
You could try using the "debug level" logs or whatever they are called. It
might help you see what exactly is wrong.
I was able to get my setup working (TZ170) by more or less copying the
settings from the Sonicwall configuration page to the IPSecuritas pages.
HTH.
Re: Another user trying to match VPN Tracker setti
by yves_kayak on 2006-10-07 04:58:00 +0200
Hi,
Did you double-check that your IPSecuritas settings match the VPN Server's
settings ? Make sure there's not a typo in your secret key, and if you
copy/pasted it, make sure you don't bring an extra space.
I use exchange mode "agressive" instead of "main" to connect to our
SonicWall Pro 230.
Also, you can try a couple of things in the "options" tab.
Hope this helps,
Yves
Anyone using a Cyberguard endpoint?
Anyone using a Cyberguard endpoint?
by Demani on 2006-03-23 20:05:26 +0100
I'm trying to find the right setup, but I haven't had any luck so far. I have a
SG560 running the 3.1.2 firmware. Running v2.1 on OSX 10.4.5. I believe I
have all the settings matched but its stalling during the Phase one
negotiation.
Settings I have so far:
Host to Network
Aggressive Exchange mode
Proposal check: Claim
Phase 1
lifetime: 3600
DH Group 2
Encryption: 3DES
Authentication: SHA1
Phase 2
Lifetime: 3600
PFS Group 2
Encryption: 3DES
Authentication: HMAC SHA1
ID has the Local DN option set to the Required Remote Identifier on the
Cyberguard ("Outside" in this case)
The IPSec/IKE options that are checked are IPSec DOI, SIT_IDENTITY_ONLY,
MIP6, Initial Contact, and DHCP Pass-Through.
Establish IKE immediately is on.
The line in the IPSecuritas log I see when the connection isn't working is:
DEBUG: isakmp_ph1resend():resend phase1 packet.
I can provide more info if needed.
Re: Anyone using a Cyberguard endpoint?
by rugby on 2006-03-31 18:13:41 +0200
I have the same router, the same firmware and the same problem, although
it's with VPN Tracker.
I am going to contact Cyberguard and see if they can assist with this.
Here's a log of the issue I'm having:
2006-03-31 11:04:07: INFO: isakmp.c:2102:isakmp_post_acquire():
IPSec-SA request for X.X.X.X queued due to waiting for phase1 connection
to complete.
2006-03-31 11:04:07: DEBUG: isakmp.c:1807:isakmp_ph1resend(): resend
phase1 packet to X.X.X.X[500] (d909f677273dd58c:0000000000000000)
2006-03-31 11:04:10: DEBUG: pfkey.c:1793:pk_recvacquire(): ignore the
acquire because phase2 found
2006-03-31 11:04:18: DEBUG: pfkey.c:1793:pk_recvacquire(): ignore the
acquire because phase2 found
2006-03-31 11:04:27: DEBUG: isakmp.c:1807:isakmp_ph1resend(): resend
phase1 packet to X.X.X.X[500] (d909f677273dd58c:0000000000000000)
2006-03-31 11:04:27: DEBUG: pfkey.c:1793:pk_recvacquire(): ignore the
acquire because phase2 found
Adtran IPSEC
Adtran IPSEC
by Mikel King on 2006-03-30 03:01:38 +0200
Does anyone know if there has been any success with any of the Adtran
VPN products.
IPSecuritas says that IPSEC is UP but am unable to pass any traffic to the
remote LAN.
Any pointers would be helpful...
cheers,
m
intel
intel
by Shaddow on 2006-04-04 21:44:43 +0200
Does this software work on the new intel macs under rosetta or is it
universal already?
Linksys WRV54G: can't connect
Linksys WRV54G: can't connect
by tiffert on 2006-04-07 01:56:14 +0200
I have never been able to establish a VPN tunnel using IPsecuritas with my
Linksys WRV54G router (firmware 2.38.6). It is a VPN endpoint. I am using
the same, proven configuration that works for my Linksys BEFVP41.
Is this a known issue? Has anyone gotten it to work?
I *CAN* establish a tunnel without IPsecuritas, using a curl script from:
http://forums.macosxhints.com/showthread.php?t=40920
Any chance of adding support for this router? It is a popular device.
OS X 10.4.6
Thanks!
Re: Linksys WRV54G: no tunnels
by Francis Tanzella on 2006-04-16 21:58:46 +0200
Since you're using IPSECuritas, I presume you're using the passthrough. If
you're using the hardware tunnel you probably don't need IPSECuritas.
I was able to establish a tunnel with IPSECuritas using this router with no
real problem. I was connecting to a Checkpoint IPSEC server. I failed using
the hardware tunnel because I need to use a certificate, which it doesn't
support. So I turned off the hardware VPN, turned off the the other 2
passthroughs and only checked the IPSEC passthrough. I used the same
configuration that worked without the router and it went through first time.
Since I couldn't use the hardware VPN, I "downgraded" to a WRT54G, saved
$100, and it works fine.
Re: Linksys WRV54G: no tunnels
by tiffert on 2006-04-16 22:40:29 +0200
Just to clarify, I am not trying to establish a VPN between the BEFVP41 and
the WRV54G routers. Rather I am trying to use IPSecuritas from a third
location to establish tunnels to each of those routers in their capacities as
remote VPN endpoints. Put another way, the BEFVP41 and WRV54G are in
different parts of the US, and I am in another country all together with my
laptop and IPSecuritas. I can establish a tunnel to the BEFVP41, but cannot
to the WRV54G. It gets stuck at Phase 1.
Since I am trying to use the WRV54G as a remote VPN endpoint, with
IPSecuritas on the local end, I need to have the WRV54G's "hardware VPN"
turned on, right?
Any further suggestions?
Thanks!
Glenn
Re: Linksys WRV54G: can't connect
by Niels S. Eliasen on 2006-05-08 11:40:37 +0200
Hi
Just wanted to say "mee to!" if anyone can get a connection working to
WRV54G, then please ! share the info!...
Re: Linksys WRV54G: can't connect
by tiffert on 2006-05-14 21:32:37 +0200
I am the original poster to this thread. The following is just anecdotal and
circumstantial, but I hope helpful:
I have not tried to establish a VPN for about 3 weeks to my WRV54G. I had
previously not been able to use IPSecuritas (Phase 1 failures), only the curl
script mentioned in my initial post.
However, today my curl script stopped working, and the log revealed Phase
1 failures. Nothing on the remote side has changed, and the only thing I
can think of on the local side that has changed is the installation of Apple
Security Update 2006-003 (5/11/06). I decided to try IPSecuritas again out
of curiousity.
Amazingly, IPSecuritas now works with exactly the settings that would not
work last month and all of the months before. Perhaps the Security Update
changed something that was blocking IPSecuritas? Don't know. But I am
happy.
Can't view folder
Can't view folder
by Keith W on 2006-04-24 16:08:40 +0200
Hi There,
I'm having a problem getting access to one of my folders on the remote
server. The VPN connects fine and I can get into a number of other folders
without a problem but it seems that whenever I try and open this one folder
the finder gets stuck on the spinning wheel and ends up crashing.
I have checked my access rights and I should be able to access it without a
problem and was able to do so previously.
The only thing I could think of is that the folder I am trying to view is too
big, it has around 80 sub folders within so perhaps it has a problem with
this?
Any Thoughts?
Thanks,
Keith
ISA VPN to Sonicwall problems
ISA VPN to Sonicwall problems
by CybermonkeyCK on 2006-05-06 00:24:05 +0200
I have an ISA 2004 system trying to site-to-site VPN to a Sonicwall TZ 150
(IPSec). I have been going over all of the logs and session info on ISA and
Sonicwall. The Sonicwall says that the VPN tunnel is open and the ISA shows
a session of the remote computer. All the routing and firewall rules are in
place (On the ISA for sure and the Sonicwall… I think). But I can’t RDP,
telnet, Ping, browse, anything; both directions. I have the same type of VPN
with the same rules and everything the only difference is its to another ISA.
The ISA system does have multiple external IP’s… could this be a problem?
Has anyone ever had this problem?
CheckPoint NGX, can't connect (Aggressive mode)
CheckPoint NGX, can't connect (Aggressive mode)
by bgentry on 2006-05-10 22:54:37 +0200
We just upgraded our Checkpoint firewall from NG (R54) to NGX R60.
Checkpoint has removed support for Aggressive mode from Phase I
negotiations. This is a known security hole according to my VAR.
Apparently there are several publicly available exploits to allow one to
hijack IPSEC connections that use aggressive mode.
Consequently, IPSecuritas on OSX can no longer connect to our firewall. I
have tried using Basic and Main modes, as well as changing the NONCE size
to various values, changing options, and verifiying that the Phase I
encryption types were proper.
According to the logs, Checkpoint seems to not understand the IKE tunnel
probe that is being sent with NAT traversal. I'm trying to connect from
behind a consumer (Linksys) NAT router like you find at everyone's house.
So, I'm not sure where to go. Does the IPSEC support built in to OSX
include support for Main or Base ? If so, does IPSecuritas properly
implement those modes? Any ideas on how to get this working again?
Does anyone have OSX establishing a VPN connection to a CheckPoint NGX
firewall?
Thank you for any help or insight you can provide.
Brian.
Re: CheckPoint NGX, can't connect (Aggressive mode
by flruiz on 2006-06-30 11:39:32 +0200
Have you got it? I have the same problem
Regards
vpn certificate connection
vpn certificate connection
by johnlehardos on 2006-05-11 12:12:33 +0200
Hi,
I am trying to connect my macOSx to an Arkoon firewall VPN. We are
actually using the vpn connection on winXP hosts through a netscreen client
and it work perfectly with my certificate (not a pre-shared key).
But now I can't succeed th ipsecuritas working with the certificate.
my host is now configured with the ip address : 192.168.161.61
the vpn server address is : 213.41.xx.xx
the lan i want to connect is : 172.27.0.0 /16
I have converted my p12 certificate to a pem one, using an openssl
command (found on the internet). I have successfully imported the two
certificates in the certificate manager.
I have configured the ipsecuritas client as same as he netscreen windows
client was, phase1, phase2 and authentication. But when i try to connect I
get the following log debug :
[code]
May 11 11:08:54 playmobile racoon: DEBUG: pfkey.c:195:pfkey_handler():
get pfkey ACQUIRE message\n
May 11 11:08:54 playmobile racoon: DEBUG2: plog.c:199:plogdump():
\n02060003 00260000 00000033 00000000 00030005 ff200000
10020000
[...]
00000000\n
May 11 11:08:54 playmobile racoon: DEBUG: pfkey.c:1567:pk_recvacquire():
suitable outbound SP found: 192.168.161.61/32[0] 172.27.0.0/16[0]
proto=any dir=out.\n
May 11 11:08:54 playmobile racoon: DEBUG: policy.c:184:cmpspidxstrict():
sub:0xbffff970: 172.27.0.0/16[0] 192.168.161.61/32[0] proto=any
dir=in\n
May 11 11:08:54 playmobile racoon: DEBUG: policy.c:185:cmpspidxstrict():
db :0x306998: 172.27.0.0/16[0] 192.168.161.61/32[0] proto=any
dir=in\n
May 11 11:08:54 playmobile racoon: DEBUG: pfkey.c:1583:pk_recvacquire():
suitable inbound SP found: 172.27.0.0/16[0] 192.168.161.61/32[0]
proto=any dir=in.\n
May 11 11:08:54 playmobile racoon: DEBUG: pfkey.c:1622:pk_recvacquire():
new acquire 192.168.161.61/32[0] 172.27.0.0/16[0] proto=any dir=out\n
May 11 11:08:54 playmobile racoon: DEBUG: proposal.c:826:printsaproto():
(proto_id=ESP spisize=4 spi=00000000 spi_p=00000000
encmode=Tunnel reqid=0:0)\n
May 11 11:08:54 playmobile racoon: DEBUG: proposal.c:860:printsatrns():
(trns_id=3DES encklen=0 authtype=2)\n
May 11 11:08:54 playmobile racoon: DEBUG: remoteconf.c:118:getrmconf():
configuration found for 213.41.xx.xx.\n
May 11 11:08:54 playmobile racoon: INFO:
isakmp.c:2028:isakmp_post_acquire(): IPsec-SA request for 213.41.xx.xx
queued due to no phase1 found.\n
May 11 11:08:54 playmobile racoon: DEBUG:
isakmp.c:1009:isakmp_ph1begin_i(): ===\n
May 11 11:08:54 playmobile racoon: INFO:
isakmp.c:1014:isakmp_ph1begin_i(): initiate new phase 1 negotiation:
192.168.161.61[500]<=>213.41.xx.xx[500]\n
May 11 11:08:54 playmobile racoon: INFO:
isakmp.c:1019:isakmp_ph1begin_i(): begin Aggressive mode.\n
May 11 11:08:54 playmobile racoon: DEBUG:
isakmp.c:2340:isakmp_newcookie(): new cookie:\n5961a56996cec897 \n
May 11 11:08:54 playmobile racoon: DEBUG:
localconf.c:328:getpathname(): filename: /tmp/ipsecuritas_certs
/cert.pem.cert\n
Apple Keychain support for certs?
Apple Keychain support for certs?
by Bill Burns on 2006-05-16 01:06:41 +0200
I was disappointed to see that this program uses its OWN certificate
database. Are there any plans to support the mac OS X keychain instead?
Or support PKCS#11 security modules?
I have smartcard users that can use their certificates with the suite of Apple
applications (because their certs and keys show up in the Apple Keychain
via the tokend mechanism), and several Mozilla applications (because they
have a PKCS#11 module).
It seems that with minimal code changes, your application could choose to
use either native Keychain support or even a PKCS#11 module.
thanks,
bill
IPSec (setkey+racoon)
IPSec (setkey+racoon)
by BALEX on 2006-05-29 16:42:45 +0200
IPsec work with SETKEY and RACOON.
spdadd x.x.x.x y.y.y.y any -P out ipsec esp/tunnel/A.A.A.A-B.B.B.B/use;
spdadd y.y.y.y x.x.x.x any -P in ipsec esp/tunnel/B.B.B.B-A.A.A.A/use;
All traffic direct into tunnel
How to destroy tunnel, if remote address (B.B.B.B) unreachable?
How to Force all traffic thru tunnel
How to Force all traffic thru tunnel
by clay perreault on 2006-06-08 21:30:59 +0200
Hi. I've set up IPSecuritas on my mac os x and am successfully connecting
to a host and bringing a tunnel up.
I can ping and connect through the tunnel to devices on the internal tunnel
subnet, but I want to force ALL traffic from my laptop through the tunnel.
with the current config, only traffic destined for the internal network
traverses the tunnel and other traffic such as web surfing still goes out my
normal gateway.
Is there a setting somewhere to FORCE ALL traffic through the tunnel?
Re: How to Force all traffic thru tunnel
by who me on 2006-06-27 23:47:12 +0200
This is done on the vpn "server" side. Nothing can be done on the client.
Normally, a company does NOT want all traffic to go through their vpn.
Connected once but no more
Connected once but no more
by apu on 2006-06-13 17:10:41 +0200
IPSecuritas 2.1, Mac OS X 10.4.6, trying to connect to a Netgear FVS318
with v2.4 firmware.
My end of the tunnel is behind a Linksys router/access point right now
(same as when it worked) but is mobile; the other end of the tunnel is
connected directly to a DSL modem -- the IP address changes occassionally
but has a fixed dyndns.org host name (and has not changed since this
worked yesterday).
I got it to connect (green checkmark) once and was able to successful use
the tunnel. But, ever since, IPSecuritas continues to display the red X and I
am unable to use the IPsec tunnel that is created. However, on the FVS318,
the VPN Status page shows what appears to be a normal, active connection.
Re: Connected once but no more
by apu on 2006-06-13 17:25:41 +0200
p.s.
I have a "verbose" log file from IPSecuritas which I has going to post but its
too big and I would have to chop it up into pieces. I can if its of value. But,
the only error found in it is
[code]
racoon: ERROR: pfkey.c:756:pfkey_timeover(): PUB.LIC.IP.VPN give up to get
IPsec-SA due to time up to wait.
[/code]
where PUB.LIC.IP.VPN is the VPN gateway's public IP address.
Re: Connected once but no more
by yves_kayak on 2006-10-07 05:08:02 +0200
Did you get it to work while you were connected via a wired linksys router,
and now you're trying with a mobile connection (Linksys wireless router) ?
If so, check the router's settings. In particular, my Linksys router has a
"VPN Passthrough" option that needs to be turned on.
Hope this helps,
Yves
Can't get it to autostart at boot 10.4.6
Can't get it to autostart at boot 10.4.6
by Jason on 2006-06-22 01:03:48 +0200
I have it working great with an Ipsec tunnel to my monowall at the office,
however, I cannot get it to autostart. I have the option checked in the
options menu, but when I reboot, the tunnel is down until I manually start
the program.
Thoughts anyone? or, how can I script it to auto start the program and the
Ipsec tunnel?
Re: Can't get it to autostart at boot 10.4.6
by Jason on 2006-06-22 04:17:50 +0200
Well, I've found that you can't run a GUI program from cron so I guess I
need to figure out how to open the ipsec tunnel and close it all from the
command line, so my nightly backup can work without leaving an account
logged in.
IPSecuritas -> Linksys RV082
IPSecuritas -> Linksys RV082
by Rainer Kormann on 2006-06-27 22:13:09 +0200
Hi,
anyone ever connected IPSecuritas with an Linksys RV082 VPN Router? I am
trying for days now...
Any help would be great!!!
Thanks in advance,
Rainer.
Re: IPSecuritas -> Linksys RV082
by incognito on 2006-07-19 18:39:52 +0200
I have a Linksys RV016 and can't get it to work either.
In my logs, it shows this:
Jul 19 00:29:30 2006
VPN Log
Quick Mode I1 message is
unacceptable because it uses a previously used Message ID 0x53713ffa
(perhaps this is a duplicated packet)
Jul 19 00:29:10 2006
VPN Log
Cannot respond to IPsec SA
request because no connection is known for 192.168.1.0/24==="ip
address"
[[email protected]]...1.2.10.12[[email protected]]===192.168.1.101/32
Jul 19 00:29:10 2006
VPN Log
[Tunnel Negotiation Info] <<<
Responder Received Quick Mode 1st packet
Jul 19 00:29:09 2006
VPN Log
type IPSEC_INITIAL_CONTACT
Received informational payload,
Jul 19 00:29:09 2006
VPN Log
[Tunnel Negotiation Info]
Responder Cookies = bbd6 581f d355 338
Jul 19 00:29:09 2006
VPN Log
Cookies = c94a 10c2 8f9 8fbc
[Tunnel Negotiation Info] Initiator
Jul 19 00:29:09 2006
VPN Log
[Tunnel Negotiation Info]
Aggressive Mode Phase 1 SA Established
Jul 19 00:29:09 2006
VPN Log
ID_USER_FQDN: '[email protected]'
Aggressive mode peer ID is
Jul 19 00:29:09 2006
VPN Log
[Tunnel Negotiation Info] <<<
Responder Received Aggressive Mode 3rd packet
Jul 19 00:29:09 2006
VPN Log
[Tunnel Negotiation Info] >>>
Responder Send Aggressive Mode 2nd packet
Jul 19 00:29:09 2006
from 64.149.107.132
VPN Log
Jul 19 00:29:09 2006
VPN Log
ID_USER_FQDN: '[email protected]'
Responding to Aggressive Mode
Aggressive mode peer ID is
Jul 19 00:29:09 2006
VPN Log
[Tunnel Negotiation Info] <<<
Responder Received Aggressive Mode 1st packet
Jul 19 00:29:09 2006
VPN Log
= [draft-ietf-ipsec-nat-t-ike-02_n]
Ignoring Vendor ID payload Type
Jul 19 00:29:09 2006
VPN Log
= [draft-ietf-ipsec-nat-t-ike-02]
Ignoring Vendor ID payload Type
Jul 19 00:29:09 2006
[4df37928e9fc4fd1...]
VPN Log
Ignoring Vendor ID payload
Jul 19 00:29:09 2006
[4a131c8107035845...]
VPN Log
Ignoring Vendor ID payload
Re: IPSecuritas -> Linksys RV082
by truckstop on 2006-10-17 05:28:31 +0200
Hmm, my RV042 works without an issue.
I assume that you sorta know what you are doing so I am not going to trace
through every step. Here are the relevant settings:
*******
*RV042*
*******
Client to Gateway
FQDN: yourmac.local
PHASE1: Group5, AES-256, SHA, 3600s
PFS: enabled.
PHASE2: Group5, AES-256, SHA-1, 3600s
**********
* Your Mac *
**********
PHASE1: 3600s, Group5, AES-256, SHA, Agressive, Strict, 16
PHASE2: 3600s, Group5, AES-256, SHA-1
Local ID: yourmac.local
Remote ID: address
OPTIONS: IPSec DOI, SIT_IDENTITY_ONLY, Initial Contact, Generate Policy,
Support Proxy, Nat-T disabled. (All listed = checked - All others =
unchecked)
Basically the "Verify Identifier" option seems to break the tunnel when
enabled. You can do pretty much whatever else as long as it is off.
It kinda is lame that it requires aggresive mode, but watch are you gonna
do?
Re: IPSecuritas -> Linksys RV082
by cbo on 2006-11-30 17:12:00 +0100
Hi !
I would like to know how you can put some AES-256 in linksys RV042 / 082
?
If you look at the product spec, there's no support of AES (even 128)...
So truckstop, are you sure you are using a linksys RV042 ???
Thx
Cbo
PS : i have stopped trying to make ipsecuritas work with this product one
year ago... now i work with Zyxel product s which are more powerfull and
for professional use.
Re: IPSecuritas -> Linksys RV082
by truckstop on 2006-12-02 08:29:59 +0100
cbo - unless you are sure about something you shouldn't go spouting off. I
AM using AES-256 with an RV042. I have a screen capture but I am too lazy
to set up a flickr account just to prove a point. Maybe tomorrow I'll get to it.
You're right in the fact that it's not in the spec sheet. However the device
supports AES-128, AES-192, and AES-256. They must have been added to
the firmware after the specs were released. They are definately options in
1.3.7.10
Personally I use SonicWALL devices anywhere I need a "pro" device. And let's
face it with download speeds in my area now up to 25Mbps it is getting to
the point where you need a "pro" device at home just to handle your
connection.
[quote author=cbo link=1151439189/0#3 date=1164903120]Hi !
I would like to know how you can put some AES-256 in linksys RV042 / 082
?
If you look at the product spec, there's no support of AES (even 128)...
So truckstop, are you sure you are using a linksys RV042 ???
Thx
Cbo
PS : i have stopped trying to make ipsecuritas work with this product one
year ago... now i work with Zyxel product s which are more powerfull and
for professional use.
[/quote]
Always on IPSecuritas
Always on IPSecuritas
by iamchris on 2006-06-29 21:10:51 +0200
On OSX 10.4.2 I can't get IPSecuritas to autoload on boot.
If I could get it to autoload, I'd like it to autoconnect, and then to reconnect
if it gets disconnected, and if it can't reconnect, continue to retry at short
intervals until it succeeds. How can I get IPSecuritas to work that way?
Couldn't find the pskey
Couldn't find the pskey
by Ian on 2006-06-29 22:26:08 +0200
oakley.c:2146:oakley_skeyid(): couldn't find the pskey for x.x.x.x.
I have setup a Host -> Network profile in IPsecuritas, but whenever I try to
connect I find the error message above in the log file.
I entered a preshared key into the IPSecuritas GUI, but this makes it sound
like racoon can't find it?
Any help would be greatly appreciated.
Netgear FVS318 connects, no traffic. Routing?
Netgear FVS318 connects, no traffic. Routing?
by dfaulkner on 2006-07-04 19:22:51 +0200
Hi all,
I've browsed/searched here briefly and can't find the answer I need. So,
here goes:
I used Aaron Adams tutorial to set up IPSecuritas with my Netgear FVS318
(firmware version 2.4). When I click "Start IPSEC," everything appears to start
fine and a ping turns the red X into a green check, but the ping doesn't
return.
A traceroute reveals that my traffic is still going out to the Internet,
apparently though unencrypted channels:
$ traceroute 191.168.55.20
traceroute to 191.168.55.20 (191.168.55.20), 64 hops max, 40 byte
packets
1 192.168.1.1 (192.168.1.1) 5.650 ms 1.102 ms 1.102 ms
2 ip72-204-64-1.fv.ks.cox.net (72.204.64.1) 11.034 ms 10.766 ms
11.747 ms
3 wsip-70-182-122-97.ks.ks.cox.net (70.182.122.97) 11.410 ms
10.611 ms 35.684 ms
4 wsip-70-182-120-53.ks.ks.cox.net (70.182.120.53) 10.435 ms
13.787 ms 12.128 ms
5 wsip-70-182-120-49.ks.ks.cox.net (70.182.120.49) 13.693 ms
25.273 ms 10.975 ms
So, I run ifconfig, and see the following for gif0:
gif0: flags=8051<UP,POINTOPOINT,RUNNING,MULTICAST> mtu 1280
tunnel inet 10.1.1.1 --> 127.0.0.1
inet 10.1.1.1 --> 192.168.55.0 netmask 0xffffff00
From netstat -nr, I get
Destination
Gateway
default
192.168.1.1
192.168.43.0
10.1.1.1
192.168.43
gif0
Flags
UGSc
UH
USc
Refs
Use Netif Expire
38
2435 en1
0
1 gif0
1
202 gif0
Looks to me like a routing/gateway problem, but I'm not sure what to do to
fix this. Any thoughts?
IPSecuritas 3.0 Public Beta released
IPSecuritas 3.0 Public Beta released
by Forum Admin on 2006-07-05 23:51:28 +0200
We're proud to announce the release of the first public beta release of
IPSecuritas 3.0.
Please go to http://www.lobotomo.com/products/IPSecuritas/beta.html for
more information.
The IPSecuritas Team.
Re: IPSecuritas 3.0 Public Beta released
by Roberto Carlos Navas on 2006-07-07 08:55:30 +0200
Hello:
I'm testing the new Public Beta and it looks very promising.
However I found a problem trying to connect to my corporate network when
I'm behind a NAT router.
The error I get is:
Jul 07, 00:50:05 Info
APP IKE daemon started
Jul 07, 00:50:05 Info
APP IPSec started
Jul 07, 00:50:05 Debug APP State change from IDLE to RUNNING after
event START
Jul 07, 00:50:06 Info
IKE Foreground mode.
Jul 07, 00:50:06 Info
IKE @(#)ipsec-tools CVS (http://ipsectools.sourceforge.net)
Jul 07, 00:50:06 Info
IKE @(#)This product linked OpenSSL 0.9.7i 14 Oct
2005 (http://www.openssl.org/)
Jul 07, 00:50:06 Info
IKE Resize address pool from 0 to 255
Jul 07, 00:50:06 Debug IKE parse successed.
Jul 07, 00:50:06 Debug IKE my interface: 127.0.0.1 (lo0)
Jul 07, 00:50:06 Debug IKE my interface: ::1 (lo0)
Jul 07, 00:50:06 Debug IKE my interface: fe80::1%lo0 (lo0)
Jul 07, 00:50:06 Debug IKE my interface: fe80::211:24ff:fe84:7f3e%en0
(en0)
Jul 07, 00:50:06 Debug IKE my interface: 192.168.1.100 (en0)
Jul 07, 00:50:06 Debug IKE configuring default isakmp port.
Jul 07, 00:50:06 Debug IKE 5 addrs are configured successfully
Jul 07, 00:50:06 Info
IKE 192.168.1.100[500] used as isakmp port
(fd=6)
Jul 07, 00:50:06 Info
IKE fe80::211:24ff:fe84:7f3e%en0[500] used as
isakmp port (fd=7)
Jul 07, 00:50:06 Info
IKE fe80::1%lo0[500] used as isakmp port (fd=8)
Jul 07, 00:50:06 Info
IKE ::1[500] used as isakmp port (fd=9)
Jul 07, 00:50:06 Info
IKE 127.0.0.1[500] used as isakmp port (fd=10)
Jul 07, 00:50:06 Debug IKE get pfkey X_SPDDUMP message
Jul 07, 00:50:06 Debug IKE
Jul 07, 00:50:06 Debug IKE 02120200 00020000 00000000 000036fc
Jul 07, 00:50:06 Debug IKE pfkey X_SPDDUMP failed: No such file or
directory
I managed to narrow down when this happens:
My remote network is 192.168.0.0/16 and my local address is
192.168.1.100... if i try to connect to a different remote network (let's say
172.25.0.0/16) the VPN will be established. But if my local address overlaps
the remote network, then this error happens and NO VPN setup is ever
attempted.
This same scenaria works fine with IPSecuritas 2.1
I'm running MacOS X 10.4.7 in a Powerbook G4.
Regards,
Re: IPSecuritas 3.0 Public Beta released
by Philip on 2006-07-07 13:46:23 +0200
I get the following errors when trying to make a connection.
Am I doing somethins worng or is this a bug ?
Jul 07, 13:42:07 Error IKE /Library/Application Support/Lobotomo
Software/IPSecuritas/racoon.conf:58: ";" algorithm mismatched
Jul 07, 13:42:07 Error IKE fatal parse failure (1 errors)
Jul 07, 13:42:07 Error IKE racoon_vpn1: failed to parse configuration file.
Jul 07, 13:42:07 Error IKE Foreground mode.
Regards,
Philip
Re: IPSecuritas 3.0 Public Beta released
by Mini on 2006-07-10 16:12:55 +0200
Same error as above..
Please help
Re: IPSecuritas 3.0 Public Beta released
by Roberto Carlos Navas on 2006-07-10 23:36:54 +0200
Hello,
I noticed that the problem reported above:
Jul 07, 13:42:07 Error IKE /Library/Application Support/Lobotomo
Software/IPSecuritas/racoon.conf:58: ";" algorithm mismatched
Jul 07, 13:42:07 Error IKE fatal parse failure (1 errors)
happens when you create a new connection using the wizard... if you
re-create that connection manually, without using the wizard, then it
works.
Still... I have no workaround for the problem when using a local IP address
that overlaps the remote network.
Regards,
Re: IPSecuritas 3.0 Public Beta released
by cnadig on 2006-07-11 16:36:21 +0200
Hello,
I can confirm a bug in the wizard templates causing the error described
above. I will release a new beta version with updated wizard templates soon
(some more testing required this time I guess :-).
Many thanks to the numerous contributions helping to find this bug!
Christoph
Lobotomo Software
Re: IPSecuritas 3.0 Public Beta released
by cnadig on 2006-07-12 10:06:29 +0200
Hello,
Version 3.0b6 is available for download (see top posting for link).
IMPORTANT: connections created with the Wizard in earlier versions won't
work in 3.0b6 and need to be deleted! Please recreate them in 3.0b6.
Christoph
Lobotomo Software
Re: IPSecuritas 3.0 Public Beta released
by iamchris on 2006-07-21 20:19:33 +0200
I've tried unsuccessfully to connect correctly to a Symantec Gateway
Security (SGS) appliance... I spent several hours on the phone with a Level 2
tech trying to get it working properly. He offered to put an IPSecuritas
developer in touch with an SGS developer as to aid in getting the program
working properly.
Any takers?
Re: IPSecuritas 3.0 Public Beta released
by cnadig on 2006-07-24 15:49:52 +0200
Hello Chris,
could you please send me the contact details of the person that made you
the offer to [email protected] - I will then get in touch with
him/her.
Thanks a lot,
Christoph
Re: IPSecuritas 3.0 Public Beta released
by pchernoff on 2006-07-25 16:32:37 +0200
After upgrading our SonicWall 2040 (enhanced OS) our VPN stopped
working(IPSecuritas 2.1) so I decided to try out IPSecuritas 3.0b6 and it
worked great once I figured out the settings. We have installed IPSecuritas
3.0b6 on other Macs, I exported my settings and imported them onto other
Macs. The results have been mixed. I am using Mac OS X 10.4.7.
Another user also uses 10.4.7. Unfortunately he never gets the green
checkmark (he gets a yellow x) and was unable to mount a server volume
across the VPN. He sent me his log and it looks like he is connecting to our
VPN server. He also sent me screenshots of his IPSecuritas setup and it
looks OK. Here is the contents of his log:
IPSecuritas 3.0b6 build 534, Tue Jul 11 22:00:26 CEST 2006, nadig
Darwin 8.4.0 Darwin Kernel Version 8.4.0: Tue Jan 3 18:22:10 PST 2006;
root:xnu-792.6.56.obj~1/RELEASE_PPC Power Macintosh
Jul 24, 18:58:21 Info
APP IKE daemon started
Jul 24, 18:58:21 Info
APP IPSec started
Jul 24, 18:58:21 Info
IKE Foreground mode.
Jul 24, 18:58:21 Info
IKE @(#)ipsec-tools CVS (http://ipsectools.sourceforge.net)
Jul 24, 18:58:21 Info
IKE @(#)This product linked OpenSSL 0.9.7i 14 Oct
2005 (http://www.openssl.org/)
Jul 24, 18:58:21 Info
IKE Resize address pool from 0 to 255
Jul 24, 18:58:21 Info
IKE 10.0.0.4[4500] used as isakmp port (fd=6)
Jul 24, 18:58:21 Info
IKE 10.0.0.4[500] used as isakmp port (fd=7)
Jul 24, 18:58:23 Info
IKE IPsec-SA request for 216.194.197.194 queued
due to no phase1 found.
Jul 24, 18:58:23 Info
IKE initiate new phase 1 negotiation: 10.0.0.4[500]
<=>216.194.197.194[500]
Jul 24, 18:58:23 Info
IKE begin Aggressive mode.
Jul 24, 18:58:23 Info
IKE received Vendor ID: RFC 3947
Jul 24, 18:58:23 Info
IKE received Vendor ID: DPD
Jul 24, 18:58:23 Warning IKE No ID match.
Jul 24, 18:58:23 Info
IKE Selected NAT-T version: RFC 3947
Jul 24, 18:58:23 Info
IKE Hashing 10.0.0.4[500] with algo #2
Jul 24, 18:58:23 Info
IKE NAT-D payload #-1 doesn't match
Jul 24, 18:58:23 Info
IKE Hashing 216.194.197.194[500] with algo #2
Jul 24, 18:58:23 Info
IKE NAT-D payload #0 verified
Jul 24, 18:58:23 Info
IKE NAT detected: ME
Jul 24, 18:58:23 Info
IKE KA list add:
10.0.0.4[4500]->216.194.197.194[4500]
Jul 24, 18:58:23 Info
IKE couldn't find the proper pskey, try to get one
by the peer's address.
Jul 24, 18:58:23 Info
IKE Adding remote and local NAT-D payloads.
Jul 24, 18:58:23 Info
IKE Hashing 216.194.197.194[4500] with algo #2
Jul 24, 18:58:23 Info
IKE Hashing 10.0.0.4[4500] with algo #2
Jul 24, 18:58:23 Info
IKE ISAKMP-SA established
10.0.0.4[4500]-216.194.197.194[4500]
spi:668d5adfd265129f:fe2028ac928b6eda
Jul 24, 18:58:24 Info
IKE initiate new phase 2 negotiation:
10.0.0.4[4500]<=>216.194.197.194[4500]
Jul 24, 18:58:24 Info
IKE NAT detected -> UDP encapsulation
(ENC_MODE 1->3).
Jul 24, 18:58:24 Info
IKE Adjusting my encmode UDP-Tunnel->Tunnel
Jul 24, 18:58:24 Info
IKE Adjusting peer's encmode
UDP-Tunnel(3)->Tunnel(1)
Jul 24, 18:58:24 Info
IKE IPsec-SA established: ESP/Tunnel
216.194.197.194[4500]->10.0.0.4[4500] spi=134320294(0x80190a6)
Jul 24, 18:58:24 Info
IKE IPsec-SA established: ESP/Tunnel
10.0.0.4[4500]->216.194.197.194[4500] spi=960951546(0x3946f4fa)
Re: IPSecuritas 3.0 Public Beta releasedI am
by AaronA1975 on 2006-10-27 18:17:57 +0200
I am completely unable to get split DNS to work in 3.0b14. Are there any
troubleshooting steps I can try or is there any way to help you fix this
problem?
Re: IPSecuritas 3.0 Public Beta released
by kramericafsu on 2006-11-09 05:11:48 +0100
Has there been any headway with configuring the Symantec Gateway 320? I
have hit a road block!
Zyxel P-334WT anc IPSecuritas 3.0b5
Zyxel P-334WT anc IPSecuritas 3.0b5
by Thomas Thaler on 2006-07-10 23:47:23 +0200
Does anyone have sucssesfully setup IPSecuritas and a Zyxel P-334WT
Firewall to setup a IPSec tunnel?
It's hard to find out what on one side does compare to the same function
on the otherside.
If needed, I can provide snapshots of the Zyxel Settings.
Best regards for anyones help
Greetings from Switzerland
Thomas Thaler
Where is HMAC 3.0b6
Where is HMAC 3.0b6
by LittleDan on 2006-07-12 16:41:28 +0200
I have installed 3.0b6 and it keeps failing on Phase 2 with "No Proposal is
Chosen". I thought maybe it had something to do with HMAC not being
under authentication in the Phase 2 config optiosn. Anyone have any
suggestions?
Mac OS X 10.4.7 w/ SonicWall PRO 200 using XAUTH
Note: XAUTH is passing on the router log.
Re: Where is HMAC 3.0b6
by LittleDan on 2006-07-12 18:44:48 +0200
Made a good connection now what?
Forgive me ignorance this is my first mac since the IIe days, I have since
been a windows guy.
Log errors when trying to connect to home
Log errors when trying to connect to home
by CdtDelta on 2006-07-14 18:35:28 +0200
Hey all,
I've been using IPSecuritas for a while with my smoothwall firewall. It
worked fine with version 2.x, but I'm having some issues with 3.0b5 (and I
just tried it with b6 as well). I'm not sure if it's a configuration issue on my
part or not.
I've gotten it where it shows I'm connected to my home network. And I can
see on my firewall that the connection has been established. However, if I
try to ping any machines on my local network, I notice this error pop up:
"the length in the isakmp header is too big"
For each ping packet I send out. Now it is possible that the network I'm on
right now is part of the problem. Because this worked a couple of days ago
no problem at a hotel I was at. However I was back at the same hotel last
night and I had the issue I have now. I can get connected, but not access
anything on my home network.
So I'm looking for suggestions on where to look (I'm not entirely sure if all
my settings are correct).
Thanks ahead of time....
Re: Log errors when trying to connect to home
by cnadig on 2006-07-14 21:45:40 +0200
Hello,
this look like a problem with NAT-T - is it enabled in your configuration (if
it is, please try disabling it, if it isn't, please try enabling or even forcing it
[Options tab])
Hope this helps,
Christoph
IPsecuritas, Parallels and Internet Sharing
IPsecuritas, Parallels and Internet Sharing
by msolsona on 2006-07-16 01:13:29 +0200
I am having problems connecting to my company intranet using IP securitas
from the Parallels virtual Machine (XP).
Has anybody had this working?
IPsecuritas 3.0b6 installed and running in 10.4.7(Intel)
Airport connection to the world
Internet sharing from Airport to the Parallels interface (en2)
Parallels is connecting properly to the Internet (yahoo, google, etc) but it
cannot reach the Intranet.
Has anybody got it work?
Doing TCPdump on en1 (Airport, external interface) of Macbook, I do see
UDP-encap packets going out and coming back from GW. But they are not
reaching the virtual machine.
marc
Netgear FVS318v3
Netgear FVS318v3
by jscooper on 2006-07-22 20:46:05 +0200
Hi folks,
I've seen a bunch of postings about this, but no solutions. Does anyone
have the settings to get a working tunnel from a remote machine (roaming
user/dynamic IP) to a FVS318v3?
Thanks!
Jeff
ps - Cool app, go it working with a couple of different VPNs (just not the
netgear so far).
Re: Netgear FVS318v3
by jscooper on 2006-07-26 04:22:30 +0200
Update:
I was able to get it working, but I had it in a test environment: I made a
subnet for the router and had it's "WAN" be the main router of my LAN (a
dlink wireless). I was able to establish a VPN (green arrow and ping) the
netgear from a laptop wirelessly connected to the dlink.
I thought I was set until I put the netgear to use as a real router/gateway
(WAN->LAN). It's working fine as a gateway; traffic can get out. But, when I
try to establish a VPN to it from a different location (using the exact same
settings), it gets hung up on Phase 2. Below is the client log (actual WAN IP
replaced by x.x.x.x). It keeps trying to "initiate new phase 2 negotiation":
Jul 25, 14:31:50 Info
APP IKE daemon started
Jul 25, 14:31:50 Info
APP IPSec started
Jul 25, 14:31:50 Info
IKE Foreground mode.
Jul 25, 14:31:50 Info
IKE @(#)ipsec-tools CVS (http://ipsectools.sourceforge.net)
Jul 25, 14:31:50 Info
IKE @(#)This product linked OpenSSL 0.9.7i 14 Oct
2005 (http://www.openssl.org/)
Jul 25, 14:31:50 Info
IKE Resize address pool from 0 to 255
Jul 25, 14:31:50 Info
IKE 192.168.22.21[4500] used as isakmp port
(fd=6)
Jul 25, 14:31:50 Info
IKE 192.168.22.21[500] used as isakmp port
(fd=7)
Jul 25, 14:31:51 Info
IKE IPsec-SA request for x.x.x.x queued due to no
phase1 found.
Jul 25, 14:31:51 Info
IKE initiate new phase 1 negotiation:
192.168.22.21[500]<=>x.x.x.x[500]
Jul 25, 14:31:51 Info
IKE begin Aggressive mode.
Jul 25, 14:31:54 Info
IKE ISAKMP-SA established
192.168.22.21[500]-x.x.x.x[500]
spi:3238789ff58aba9f:9b586d8ffd398608
Jul 25, 14:31:55 Info
IKE initiate new phase 2 negotiation:
192.168.22.21[500]<=>x.x.x.x[500]
Jul 25, 14:32:07 Info
IKE initiate new phase 2 negotiation:
192.168.22.21[500]<=>x.x.x.x[500]
Jul 25, 14:32:19 Info
IKE initiate new phase 2 negotiation:
192.168.22.21[500]<=>x.x.x.x[500]
Jul 25, 14:32:25 Error IKE x.x.x.x give up to get IPsec-SA due to time up
to wait.
Jul 25, 14:32:37 Info
IKE initiate new phase 2 negotiation:
192.168.22.21[500]<=>x.x.x.x[500]
Jul 25, 14:32:37 Error IKE x.x.x.x give up to get IPsec-SA due to time up
to wait.
Jul 25, 14:32:49 Info
IKE initiate new phase 2 negotiation:
192.168.22.21[500]<=>x.x.x.x[500]
Jul 25, 14:32:49 Error IKE x.x.x.x give up to get IPsec-SA due to time up
to wait.
Jul 25, 14:33:01 Info
IKE initiate new phase 2 negotiation:
192.168.22.21[500]<=>x.x.x.x[500]
Jul 25, 14:33:07 Error IKE x.x.x.x give up to get IPsec-SA due to time up
to wait.
Jul 25, 14:33:19 Info
IKE initiate new phase 2 negotiation:
192.168.22.21[500]<=>x.x.x.x[500]
Jul 25, 14:33:19 Error IKE x.x.x.x give up to get IPsec-SA due to time up
to wait.
Jul 25, 14:33:31 Info
IKE initiate new phase 2 negotiation:
192.168.22.21[500]<=>x.x.x.x[500]
Jul 25, 14:33:31 Error IKE x.x.x.x give up to get IPsec-SA due to time up
to wait.
Re: Netgear FVS318v12
by bradisa on 2006-07-31 09:04:16 +0200
Got it working with the following settings:
Please note that I do not need to browse the Mac clients; I only needed them
to access a server behind the FVS318. I have not attempted to access the
macs, so you'll have to test it out:
[b][u]ON THE FVS318[/u][/b]
Local IPSec Identifier: 10.0.3.1 {local IP address of FVS318}
Remote IPSec Identifier: 192.168.1.2 {local IP address of Mac}
Tunnel can be accessed from: any local address
Tunnel can access: a subnet of remote addresses
Remote LAN start IP Address: 192.168.1.2 {local IP address of Mac}
Remote LAN IP Subnetmask: 255.255.255.0 {subnet of Mac}
Remote WAN IP or FQDN: xxxxx.dyndns.info {for dynamic ip of Mac; using
Dynamic DNS Host service}
Secure Association: Main Mode
Perfect Forward Secrecy: Enabled
Encryption Protocol: 3DES
PreShared Key: AnyKeyY0uCh00se
Key Life: 28800 Seconds
IKE Life Time: 28800 Seconds
Netbios: Enabled
[b][u]On the Mac using IPSecuritas[/u][/b]
[b][i]General[/i][/b]
Remote IPSec Device: XXXXXXXX.com {FQDN or Dynamic Host Service}
Local Side: Endpoint Mode: Network
Network Address: 192.168.1.1 {local IP address of router for Mac}
Remote Side: Endpoint Mode: Network
Network Address: 10.0.3.0
[b][i]Phase 1[/i][/b]
Lifetime: 2880 Seconds
DH Group: 1024(2)
Encryption: 3DES
Authentication: SHA1
Exchange Mode: Main
Proposal Check: Obey
Nonce Size: 16
[b][i]Phase 2[/i][/b]
Lifetime: 28800 Seconds
PFS Group: 1024(2)
Encryption: {Check box for 3DES ONLY}
Authentication: {Check box for SHA1 ONLY}
[b][i]ID[/i][/b]
Local Identifier: Address
Remote Identifier: Address
Authentication Method: Preshared Key
Preshared Key: AnyKeyY0uCh00se {of course must match entry on FVS318}
[b][i]Options[/i][/b]
Check boxes for:
IPSec DOI
SIT_IDENTITY_ONLY
Verify Identifier
Initial Contact
If anyone viewing this sees any serious flaws in this configuration, please post
Re: Netgear FVS318v3
by bradisa on 2006-07-31 17:48:14 +0200
FYI, Here are the log files:
[b][i]IPSecuritas:[/i][/b]
IPSecuritas 3.0b6 build 534, Tue Jul 11 22:00:26 CEST 2006, nadig
Darwin 8.4.0 Darwin Kernel Version 8.4.0: Tue Jan 3 18:22:10 PST 2006;
root:xnu-792.6.56.obj~1/RELEASE_PPC Power Macintosh
Jul 31, 08:09:04 Info
APP IKE daemon started
Jul 31, 08:09:04 Info
APP IPSec started
Jul 31, 08:09:04 Error IKE Foreground mode.
Jul 31, 08:09:04 Info
IKE @(#)ipsec-tools CVS (http://ipsectools.sourceforge.net)
Jul 31, 08:09:04 Info
IKE @(#)This product linked OpenSSL 0.9.7i 14 Oct
2005 (http://www.openssl.org/)
Jul 31, 08:09:04 Info
IKE Resize address pool from 0 to 255
Jul 31, 08:09:04 Info
IKE 192.168.1.2[4500] used as isakmp port (fd=6)
Jul 31, 08:09:04 Info
IKE 192.168.1.2[500] used as isakmp port (fd=7)
Jul 31, 08:09:05 Info
IKE IPsec-SA request for x.x.x.x queued due to no
phase1 found.
Jul 31, 08:09:05 Info
IKE initiate new phase 1 negotiation:
192.168.1.2[500]<=>x.x.x.x[500]
Jul 31, 08:09:05 Info
IKE begin Identity Protection mode.
Jul 31, 08:09:08 Info
IKE ISAKMP-SA established
192.168.1.2[500]-x.x.x.x[500] spi:xxxxx:xxxxxx
Jul 31, 08:09:09 Info
IKE initiate new phase 2 negotiation:
192.168.1.2[500]<=>x.x.x.x[500]
Jul 31, 08:09:12 Info
IKE IPsec-SA established: ESP/Tunnel
x.x.x.x[0]->192.168.1.2[0] spi=xxxxx
Jul 31, 08:09:12 Info
IKE IPsec-SA established: ESP/Tunnel
192.168.1.2[0]->x.x.x.x[0] spi=xxxxxx
[b][i]Netgear FVS318:[/i][/b]
Mon, 07/31/2006 07:08:51 - xxxxx IPsec:Receive Packet address:0x1807194
from x.x.x.x
Mon, 07/31/2006 07:08:51 - xxxx IPsec:main_inI1_outR1()
Mon, 07/31/2006 07:08:51 - xxxxx IKE: Peer Initialized IKE Main Mode
Mon, 07/31/2006 07:08:51 - xxxxx IKE:[Mac] RX << MM_I1 : x.x.x.x
Mon, 07/31/2006 07:08:51 - xxxxx IPsec:New State index:5, sno:32
Mon, 07/31/2006 07:08:51 - xxxxx IPsec:responding to Main Mode
Mon, 07/31/2006 07:08:51 - xxxxx IPsec: Oakley Transform 1 accepted
Mon, 07/31/2006 07:08:51 - xxxxx IKE:
OAKLEY_PRESHARED_KEY/OAKLEY_3DES_CBC/MODP1024
Mon, 07/31/2006 07:08:51 - xxxxx IKE:[Mac] TX >> MM_R1 : x.x.x.x
Mon, 07/31/2006 07:08:51 - xxxxx IPsec:inserting event
EVENT_RETRANSMIT, timeout in 10 seconds for #32
Mon, 07/31/2006 07:08:51 - xxxxx IPsec:Receive Packet address:0x1807194
from x.x.x.x
Mon, 07/31/2006 07:08:51 - xxx IPsec:main_inI2_outR2()
Mon, 07/31/2006 07:08:51 - xxxxx IKE:[Mac] RX << MM_I2 : x.x.x.x
Mon, 07/31/2006 07:08:51 - xxxxx IKE:[Mac] TX >> MM_R2 : x.x.x.x
Mon, 07/31/2006 07:08:51 - xxxx IPsec:inserting event EVENT_RETRANSMIT,
timeout in 10 seconds for #32
Mon, 07/31/2006 07:08:53 - xxxxx IPsec:Receive Packet address:0x1807194
from x.x.x.x
Mon, 07/31/2006 07:08:53 - xxxxx IPsec:main_inI3_outR3()
Mon, 07/31/2006 07:08:53 - xxxxx IKE:[Mac] RX << MM_I3 : x.x.x.x
Mon, 07/31/2006 07:08:53 - xxxxx IPsec: Decoded Peer's ID is
ID_IPV4_ADDR:192.168.1.2 and 192.168.1.2 in st
Mon, 07/31/2006 07:08:53 - xxxxx IKE:[Mac] TX >> MM_R3 : x.x.x.x
Mon, 07/31/2006 07:08:53 - xxxxx IPsec:inserting event EVENT_SA_EXPIRE,
timeout in 28980 seconds for #37
Re: Netgear FVS318v3
by truckstop on 2006-10-17 05:33:42 +0200
Whenever I enable a tunnel to an FVS318v3 like this it breaks the internet
connectivity on the FVS318v3 side. Looks like a more than dns thing
because pings disappear however traffic does go through the tunnel.
DHCP with SonicWall
DHCP with SonicWall
by yves_kayak on 2006-10-07 04:48:10 +0200
Hello everyone,
I'm using IPSecuritas for a while to connect to the office's SonicWall Pro 230
VPN server.
Our sysadmin changed the VPN Server's config to assign DHCP addresses to
the VPN clients. After that change, I can't connect anymore. In IPSecuritas
log, there's an error message "NO-PROPOSAL-CHOSEN" at phase 2.
Is that feature supported by IPSecuritas ? It seems to be a new feature in
version 4 of VPN Tracker. They call that "DHCP over IPSec".
Thanks,
Yves Forget
Re: DHCP with SonicWall
by Manuel on 2007-03-15 16:07:39 +0100
Same problem/question here: is DHCP over IPSec supported by IPSecuritas?
I am using 3.0RC and I'm only able to get it working if I enable "Virtual
adapter settings: DHCP Lease or manual configuration" on our Sonic Pro
3060 Enhanced.
Since I'm the sysadmin it doesn't really matter (to me), but it would be nice
if IPSecuritas could support DHCP somehow, also to avoid IP conflicts for
users who use NAT'ed IP addresses.
Re: DHCP with SonicWall
by jgrange on 2007-03-22 02:12:37 +0100
Okie, ive been trying to get version 3, to work with my 3060 Pro, but have
been unsuccesfull, I keep geting invalid ID messages, can someone share
with me how to properly set this up, as it seems i must be missing
something fairly simple if serveral people seem to have this working! Any
help or ideas would be very much apreacated!
XAuth not working?
XAuth not working?
by gdanko on 2006-10-09 16:44:22 +0200
Hi all,
I was helping to test 3.0b1 several months ago and I could get the
username/password prompt for my SonicWall 5060. The only thing not
working was the DHCP.
I am now trying 3.0b14 and I am no longer prompted for username and
password.
I use both a Cisco 3020 and a SonicWall 5060 and TZ170. Does someone
have a configuration example I can use for either of these? The Cisco 3020
uses Group Authentication. Can IPSecuritas accommodate this?
Thanks in advance!
Cannot connect to SonicWALL TZ170
Cannot connect to SonicWALL TZ170
by gdanko on 2006-10-09 19:32:03 +0200
==On the SonicWALL==
:General
Authentication Method: IKE using Preshared Secret
Name: WAN GroupVPN
Share Secret: xxxxx
-Proposals
Phase 1
DH Group: Group 2
Encryption: 3DES
Authentication: SHA1
Life Time (seconds): 28800
Phase 2
Protocol: ESP
Encryption: 3DES
Authentication: SHA1
Enable PFS: Disabled
Life Time (seconds): 28800
:Advanced
Enable Windows Networking Broadcase: Checked
Enable Multicast: Unchecked
Default Gateway: 0.0.0.0
Require Authentication of VPN Clients via XAUTH: Checked
User Group for XAUTH users: Trusted Users
:Client
Cache XAUTH User Name and Password on Client: Single Session
Virtual Adapter Settings: DHCP Lease
Allow Connections to: Split Tunnels
Set Default Route as this Gateway: Unchecked
Require Global Security Client for this Connection: Unchecked
Use Default Key for Simple Client Provisioning: Unchecked
==In IPSecuritas==
:General
Remote IPSec Device: xxxxx
Local Endpoint Mode Host:
Remote Endpoint Mode Network: 172.16.10.0/24
:Phase 1
Lifetime: 28800 seconds
DH Group: 1024(2)
Encryption: 3DES
Authentication: SHA-1
Exchange Mode: Main, Aggressive
Proposal Check: Obey
Nonce Size: 16
:Phase 2
Lifetime: 28800 seconds
PFS Group: None
Encryption: 3DES
Authentication: HMAC-SHA-1
:ID
Local Identifier: Address
Remote Identifier: Address
Authentication Method: XAuth PSK
Preshared Key: xxxxx
Re: Cannot connect to SonicWALL TZ170==SonicWALL L
by gdanko on 2006-10-09 19:33:39 +0200
==SonicWALL Log==
10/09/2006 10:26:06.704 - Info - VPN IKE IKE Responder: Received
Main Mode request (Phase 1) - [NAT'D IP], 139 (admin) [SONICWALL],
500 10/09/2006 10:26:07.352 - Info - VPN IKE NAT Discovery : Peer IPSec
Security Gateway behind a NAT/NAPT Device 0.0.0.0 0.0.0.0 10/09/2006 10:26:07.880 - Info - VPN IKE IKE Responder: Main Mode
complete (Phase 1) - [NAT'D IP], 43746 (admin) [SONICWALL], 4500 VPN Policy: WAN GroupVPN;3DES; SHA1; DH Group 2; lifetime=28800 secs
10/09/2006 10:26:27.720 - Warning - VPN IKE - Received packet
retransmission. Drop duplicate packet [NAT'D IP], 43746 (admin) [SONICWALL], 4500 VPN Policy: WAN GroupVPN
10/09/2006 10:26:27.736 - Warning - VPN IKE - Failed payload
validation - [NAT'D IP], 43746 (admin) [SONICWALL], 4500 VPN
Policy: WAN GroupVPN
10/09/2006 10:26:47.736 - Warning - VPN IKE - Received packet
retransmission. Drop duplicate packet [NAT'D IP], 43746 (admin) [SONICWALL], 4500 VPN Policy: WAN GroupVPN
10/09/2006 10:27:07.752 - Warning - VPN IKE - Received packet
retransmission. Drop duplicate packet [NAT'D IP], 43746 (admin) [SONICWALL], 4500 VPN Policy: WAN GroupVPN
10/09/2006 10:27:27.800 - Warning - VPN IKE - Received packet
retransmission. Drop duplicate packet [NAT'D IP], 43746 (admin) [SONICWALL], 4500 VPN Policy: WAN GroupVPN
==Connection Log from IPSecuritas==
IPSecuritas 3.0b14 build 1019, Wed Oct 4 15:19:10 CEST 2006, nadig
Darwin 8.8.1 Darwin Kernel Version 8.8.1: Mon Sep 25 19:42:00 PDT 2006;
root:xnu-792.13.8.obj~1/RELEASE_I386 i386
Oct 09, 10:22:24 Info
APP IKE daemon started
Oct 09, 10:22:24 Info
APP IPSec started
Oct 09, 10:22:24 Error IKE Foreground mode.
Oct 09, 10:22:24 Info
IKE @(#)ipsec-tools CVS (http://ipsectools.sourceforge.net)
Oct 09, 10:22:24 Info
IKE @(#)This product linked OpenSSL 0.9.7i 14 Oct
2005 (http://www.openssl.org/)
Oct 09, 10:22:24 Info
IKE Reading configuration from "/Library
/Application Support/Lobotomo Software/IPSecuritas/racoon.conf"
Oct 09, 10:22:24 Info
IKE Resize address pool from 0 to 255
Oct 09, 10:22:26 Error IKE Xauth mode config request but peer did not
declare itself as Xauth capable
Oct 09, 10:22:26 Error IKE Xauth mode config request but peer did not
declare itself as Xauth capable
Oct 09, 10:22:26 Error IKE Xauth mode config request but peer did not
declare itself as Xauth capable
Oct 09, 10:22:26 Error IKE ISAKMP mode config exchange with immature
phase 1
Oct 09, 10:22:46 Warning IKE No ID match.
Oct 09, 10:22:46 Error IKE No SIG was passed, hybrid auth is enabled, but
peer is no Xauth compliant
Oct 09, 10:22:46 Error IKE none message must be encrypted
Oct 09, 10:22:56 Error IKE phase2 negotiation failed due to time up
waiting for phase1. ESP [REMOTE][500]->172.16.129.16[500]
Oct 09, 10:23:08 Error IKE phase2 negotiation failed due to time up
waiting for phase1. ESP [REMOTE][4500]->172.16.129.16[4500]
Oct 09, 10:23:17 Error IKE phase2 negotiation failed due to time up
waiting for phase1. ESP [REMOTE][4500]->172.16.129.16[4500]
Oct 09, 10:23:27 Error IKE Xauth mode config request but peer did not
declare itself as Xauth capable
Oct 09, 10:23:27 Error IKE Xauth mode config request but peer did not
Re: Cannot connect to SonicWALL TZ170
by sibble-comp on 2007-06-12 00:54:04 +0200
Success!!! After about 4 or 5 days playing with this, several hours on the
phone with Sonicwall support, I can successfully connect to a TZ170 running
SonicOS Enhanced 3.1.0.14-49e. Box is using the GroupVPN for the pc users
using GVC in automated mode (end users type in ip address, username and
password in GVC to connect) with Xauth enabled. Also using DHCP relay so
clients get an address from the internal dhcp server, NOT the sonicwall box
itself.
I am using IPSecuritas 3.0 build 1693
After several hours on the phone with Sonicwall support today and the tech
finally saying he was out of ideas to try, I went back to basics,
removed/reverted all the changes we had been made during testing.
Sonicwall is setup thusly
Security Policy TAB
IPsec Keying Mode: Ike using preshared secret
Name: Wan GroupVPN
Shared Secret: xxxxxxxxxxxxxxxxxxxxxxxxxxx
Proposals TAB
IKE (phase 1) Proposal
DH Group: Group 2
Encryption: 3DES
Authentication: SHA1
Life Time: 28800
IPSEC (Phase 2) Proposal
Protocol: ESP
Encryption: 3DES
Authentication: SHA1
Enable PFS is checked
DH Group: Group 2
Life Time: 28800
Advanced TAB
Enable Windows Networking Broadcast is checked
Require Authentication of VPN Clients via XAUTH is checked
User Group for XAUTH users: Trusted Users
(clients authenticate against radius server on windows 2003 AD machine)
Client TAB
Cache XAUTH Username and Password on Client: Single Session
Virtual Adapter Settings: DHCP Lease or Manual Configuration
Use Default Key for Simple Client Provisioning.
If an item is not listed above or below, it's because it wasn't enabled or used
for this configuration.
Setup on IPSecuritas
General TAB
Remote Ipsec device: wan ip of sonicwall
Local Side Endpoint mode: host (ip address field blank)
Remote Side Endpoint Mode: Network address set to the lan behind the
sonicwall
Phase 1 TAB
Lifetime: 28800 seconds
DH Group: 1024 (2)
Re: Cannot connect to SonicWALL TZ170
by TimothyFerrell on 2007-06-12 05:31:25 +0200
I was very hopeful after reading how you got your connection to come up,
but very disappointeted to find your instructions don't quite work for me. I
adopted all your settings, and the VPN comes up, but disconnects after
about 2 minutes.
The log shows scrolling errors starting with
"No ID match"
"attribute has been modified"
"inappropriate sadb acquire message passed."
"attribute has been modified"
"libipsec failed pfkey check (Invalid SA type)"
""unknown information element received"
If anyone knows what settings and on which side I should be looking at
tinkering with, any suggestions would be appreciated. The client side is IP
Securitas 3.0. The Sonicwall hardware in my case is a Pro 2040 on Standard
2.1.0.1 firmware. Windows computers are not having any trouble
connecting with the SonicWall client. Hoping not to have to buy VPN
tracker to get this up.
Re: Cannot connect to SonicWALL TZ170
by sibble-comp on 2007-06-12 07:39:30 +0200
Hmm, there is some info in another thread about that unknown info
message involving turning up the logging level in ipsecuritas to debug to
find out what the unknown info actually is.
Also from what I understand, there's a fair bit of difference between
standard and enhanced firmware and also between 2.xx and 3.xx.
IIRC, when they went to 3.xx was when they dropped support for Safenet
based vpn clients, but don't quote me on that ;-)
Re: Cannot connect to SonicWALL TZ170
by TimothyFerrell on 2007-06-12 17:31:01 +0200
Thank you for you prompt reply. I will try to figure out where to go to
increase the logging level and get back with my results.
Re: Cannot connect to SonicWALL
by kduane on 2009-01-27 08:13:14 +0100
This worked for me on a Sonicwall 3060 with Enhanced OS and IPSecuritas
3.1 (build 1860)
Just a few diffs:
=== on sonicwall ==
Proposals TAB
IPSEC (Phase 2) Proposal
Enable PFS is unchecked
Advanced TAB
Enable Windows Networking Broadcast is unchecked
Client TAB
Virtual Adapter Settings: none
== in ipsecuritas ==
DNS TAB
Enable Domain Specific DNS servers is unchecked
Domains: blank
Name Server Addresses: blank
OPTIONS TAB
The following are (checked) enabled
IPSEC DOI
SIT_IDENTITY_ONLY
Initial Contact
Support Proxy
Request Certificate
Send Certificate
Unique SAs
IKE Fragmentation
DISABLE NAT-T
Thanks for all your work... I know there has to be a lot of people out there
looking for the same info... Screw VPN Tracker
[quote author=sibble-comp link=1160415123/0#2
date=1181602444]Success!!! After about 4 or 5 days playing with this,
several hours on the phone with Sonicwall support, I can successfully
connect to a TZ170 running SonicOS Enhanced 3.1.0.14-49e. Box is using
the GroupVPN for the pc users using GVC in automated mode (end users
type in ip address, username and password in GVC to connect) with Xauth
enabled. Also using DHCP relay so clients get an address from the internal
dhcp server, NOT the sonicwall box itself.
I am using IPSecuritas 3.0 build 1693
After several hours on the phone with Sonicwall support today and the tech
finally saying he was out of ideas to try, I went back to basics,
removed/reverted all the changes we had been made during testing.
Sonicwall is setup thusly
Security Policy TAB
IPsec Keying Mode: Ike using preshared secret
Name: Wan GroupVPN
Shared Secret: xxxxxxxxxxxxxxxxxxxxxxxxxxx
FVG318 examples?
FVG318 examples?
by machelp on 2006-10-16 21:22:51 +0200
Has anyone had any success using IPSecuritas to connect to a Netgear
FVG318?
I'd love to see some examples.
Thanks!
Beta 14 certificate bug.
Beta 14 certificate bug.
by truckstop on 2006-10-17 01:25:47 +0200
I am pretty sure that there is an error in the IPSecuritas Beta 14 where the
generated racoon.conf file uses the same certifcate identifier for both the
system cert and the peer cert.
For example this is what I have found in my racoon.conf:
certificate_type x509 "5e0963d3-ffe1-4c46-a389-6f6ac4136ad0.cert"
"5e0963d3-ffe1-4c46-a389-6f6ac4136ad0.priv";
peers_certfile x509 "5e0963d3-ffe1-4c46-a389-6f6ac4136ad0.cert";
So if you can't get Beta 14 to work with IPCOP that is why.
Re: Beta 14 certificate bug.
by bmc303 on 2006-10-19 22:13:37 +0200
I tried to find the entry in my racoon.conf. But it doesn't seem that
IPSecuritas changed anything.
When I for example search for my IPCops IP Adress or it's hostname nothing
is matched.
Do you have any idea what the reason for this could be?
Goodbye!
Re: Beta 14 certificate bug.
by bmc303 on 2006-10-19 22:44:01 +0200
Aaah! I finally found the menu entry to see the log and the configuration
file. I can confirm what the original poster stated.
certificate_type x509 ...
peers_certfile x509 ...
both rely on the same cert.
I'm back to version 2.2. Works nice! :-)
Re: Beta 14 certificate bug.
by houser on 2006-10-21 10:39:28 +0200
Hello,
Iposted a question regarding use of a Netscreen firewall and IPsecuritas
3.0b14
and it seems I have found the same issue as you guys.
2.2 works perfectly AFAIK...and our log indicates the very same bug as you
have reported.
FWIW.
all the best
Janne A.
DNS in IPSecuritas vs VPN Tracker
DNS in IPSecuritas vs VPN Tracker
by witchdoctor on 2006-10-19 21:58:32 +0200
I'd like to do a straight replacement of VPN Tracker with IPSecuritas 3.0b14
on my network for the Mac folk. Problem is, DNS lookups don't seem to
work. The search domain is ournetwork.local, and I've specified the local
DNS server address. VPN Tracker works fine, but IPSecuritas doesn't resolve
the names at all. Tried dig / traceroute and it simply doesn't resolve the
hostname under IPSecuritas' tunnel.
Any ideas?
Netscreen 5GT
Netscreen 5GT
by houser on 2006-10-20 13:37:50 +0200
Hello,
Thanx for a great freeware VPN client!
I am trying to set up IPSecuritas with a firewall from Juniper Netwoks,
namely a 5GT.
Any documentation / hints on how to set this up?
I have it working with version 2.2 and would ideally just need a config for
IPsecuritas 3 that works with the exisiting setup.
It seems there is a bug or at least a change in 3 from 2.2 that stops the
connection in middle of it.
I have copied the settings from 2.2 to 3 and get this error:
Oct 21, 10:42:57 Error IKE phase2 negotiation failed due to time up
waiting for phase1. ESP xxx.xxx.xxx.xx[500]->10.0.1.2[500]
greatful for any feedback or hints
TIA and regards
janne a.
Re: Netscreen 5GT
by Umeboshi on 2006-10-21 11:27:01 +0200
I had a very good experience with 3b-6 beta that was available just before
Lobotomo took their time out. I had to tweek the 2.1 config a little to get it
to work (the parameters and settings are not identical) but it worked really
well. After Lobotomo's return and the release of 3b-14 I was quick to try it
again (since the 3b-6 had expired) but to this point with the same config
that worked with 3b-6 it hasn't worked yet.
My environment is basically the same as yours: Netscreen 5GT. I can get the
current 2.2 version to work with no problems but not the 3b-14 version.
I am getting a PSK not found error in the logs so it seems that my problem
may be a little different.
I continue to work on this as time permits and will post again if I come
across anything that may be useful but ask you (and everone else with this
same type of problem) to post whatever you find as well.
Thanks
Re: Netscreen 5GT
by houser on 2006-10-21 18:47:10 +0200
Thanx for your reply.
Sure, I will try some trix too.
I get various errors but no success.
What would be the point of using 3 over 2 anyway at this point?
it does not offer anything important new, AFAIK?
ah well, best
Janne A.
Re: Netscreen 5GT
by Umeboshi on 2006-10-22 10:35:13 +0200
The things I saw in 3b-6 that I really liked were:
1. The auto connection feature. Currently 2.2 tells you that the system has
gone into sleep mode and the connection has been shutdown. 3b-6 just
reconnected when the network came back up as long as it was flamed-on.
Security wise possibly a little dangerous but a nice feature. I believe there is
also an on/off for this setting as well.
2. The XAuth support. Although the XAuth support didn't work as
anticipated - I had hoped for a popup window for username and password
entry (similar to the functionality of the Netscreen Windows client) - but it
did work which allowed a little more generic settings between Mac and
Windows on the Netscreen 5GT itself.
So if I can get the current 3b-14 beta to work I am sure to use it.
Thanks
Re: Netscreen 5GT
by houser on 2006-10-22 20:06:34 +0200
Allright, thanx.
I liked the menuitem that allows on off without opening the app.
Let me know if you get it to work, and I will do the same.
best
Janne A.
Fortinet, FortiGate100
Fortinet, FortiGate100
by Bones on 2006-10-20 14:36:42 +0200
Hi,
Anyone got good settings for FortiGate100, I have no problems getting it to
get the VPN runnign in VPN Tracker. I have set all the settings like in
Tracker but still no go...
Here is the log...
Oct 20, 19:12:47 Info
APP IKE daemon started
Oct 20, 19:12:47 Info
APP IPSec started
Oct 20, 19:12:47 Error IKE Foreground mode.
Oct 20, 19:12:47 Info
IKE @(#)ipsec-tools CVS (http://ipsectools.sourceforge.net)
Oct 20, 19:12:47 Info
IKE @(#)This product linked OpenSSL 0.9.7i 14
Oct 2005 (http://www.openssl.org/)
Oct 20, 19:12:47 Info
IKE Reading configuration from "/Library
/Application Support/Lobotomo Software/IPSecuritas/racoon.conf"
Oct 20, 19:12:47 Info
IKE Resize address pool from 0 to 255
Oct 20, 19:13:00 Info
IKE couldn't find the proper pskey, try to get one
by the peer's address.
Oct 20, 19:13:00 Error IKE Xauth mode config request but peer did not
declare itself as Xauth capable
Oct 20, 19:13:00 Warning IKE Ignored short attribute XAUTH_USER_NAME
Oct 20, 19:13:00 Warning IKE Ignored short attribute
XAUTH_USER_PASSWORD
Oct 20, 19:13:16 Info
APP IPSec stopping
Oct 20, 19:13:17 Info
APP IKE daemon terminated
Anyone :-)
/b
NetgearFVS124G<-->LinksysBEFSX41
NetgearFVS124G<-->LinksysBEFSX41
by SteveC on 2006-10-26 08:03:45 +0200
Using beta 3.
No matter what I do I get the dreaded "time out from phase 1" error.
What is the basic issue here?
Same with v2 of IPSecuritas AND VPNTracker4
TWRoadRunner is the ISP for both.
Is this a blocked port issue?
Help!
Steve
Connecting to Sonicwall
Connecting to Sonicwall
by surfer on 2006-11-05 02:15:25 +0100
Hi Guys,
I am having a battle with communicating ipsecuritas 3.0b14 to talk to
Sonicwall TZ170. after debugging the log seems like ipsecuritas doesn't
recognise Sonicwall as supporting Xauth authentication.
I was wondering if anyone's got Xauth working with Sonicwall? I mean both
software and hardware support it so it should work. I will keep trying to get
this working. I red the post where one of the guys got a username and
password prompt while authenticating using ipsecuritas 3.0b1 but that got
dissapared in 3.0b14.
If i have any luck i will post my findings.
Regards,
.
Re: Connecting to Sonicwall
by deanpence on 2006-11-27 19:49:32 +0100
Any luck on this? This is hat I'm getting:
No ID match.
couldn't find the proper pskey, try to get one by the peer's address.
fatal NO-PROPOSAL-CHOSEN notify message, phase1 should be deleted.
I'm on a Powerbook G4 connecting to a SonicWall TZ 170 with XAuth and
PSK.
Re: Connecting to Sonicwall
by yves_kayak on 2006-11-28 05:24:41 +0100
Hello,
I'm using a PowerMac G5 with OS X 10.4.8 and IPSecuritas 3.0b14 and
connecting to a SonicWall Pro 230.
I get the message "couldn't find the proper pskey, try to get one by the
peer's address." as part of a "normal" (working) connection process. (It's
the last message I get in the log, on a successful connection).
I used to have the "fatal NO-PROPOSAL-CHOSEN notify message, phase1
should be deleted." message too. After a while I was able to get our
sysadmin to set the SonicWall's DHCP optional, and now it works. I don't
remember exactly, but in the Sonic's config, it was the last tab on the right
(client config or something), and then the last thing at the bottom of the
page (client address via DHCP). Choices are "none", "DHCP", or "both".
At the beginning it was set to "NONE", and the clients were using their local
IP addresses (obtained from their ISP) but people with routers were
disconnected because of IP conflicts (with addresses obtained from the
router's DHCP).
Then the sysadmin changed the setting to DHCP. It solved the routers' IP
conflicts for people on Windows, but IPSecuritas was unable to connect.
(BTW, VPN Tracker 4.0 supports the DHCP setting).
Changing the setting to "both" allows IPSecuritas to connect, but Mac users
using routers must be careful to configure their routers to avoid IP conflicts
: do not use 10.0.1.100, since most people do...
By the way, be patient. After setting the DHCP to "both" on the server, it
often takes IPSecuritas 10 or 15 seconds before you get the green light. I
believe it was much faster before we use DHCP on the SonicWall's server.
I'm connecting with XAuth and PSK too.
Hope this helps,
Yves
what's new in IPSecuritas 2.2 ?
what's new in IPSecuritas 2.2 ?
by favincen on 2006-11-06 15:13:57 +0100
Hi,
IPSecuritas 2.2 is available for download, but both the web page and the
readme file need to be updated as both still refer to version 2.1.
Could you give some details about what's new in version 2.2?
thanks and regards
show version
show version
by niko on 2006-11-06 22:48:00 +0100
Hello Everyone
Am trying to find out if a netscreen 5gt that we want to setup in our office
in Brasil has the "export version" of the software but I can't - the command
show version doesn't work
Any idea?
Thanks Niko
Sonicwall Config
Sonicwall Config
by darken9999 on 2006-11-10 12:43:56 +0100
Wow, this message board software is falling apart. Images don't work,
profiles can't be adjusted.
Anyway, here's my config to connect to a Sonicwall 2040 using the 3.0 beta.
I figure it should be good for most current Sonicwall stuff. It's not
comprehensive, since I've been using VPNTracker for awhile, but it should
at least get you in the ballpark. I use XAUTH and DHCP for my config.
Start a new config. I'm only showing the things you have to change. I don't
use DNS on the VPN, so I'm leaving it alone.
--- On the Sonicwall --- Use the VPN wizard to get things started, using the defaults.
- In the general VPN settings, change the unique firewall identifier to the
Sonicwall's public IP.
- In the advanced VPN policy for the groupvpn, require XAUTH (trusted
users).
- In the client settings for the groupvpn, change virtual adapter settings to
DHCP Lease or Manual Configuration.
-- In IPSecuritas ----- General
- Remote Device: <Sonicwall IP>
- Remote side network address: <Remote VPN network>
--- Phase 1
- DH Group: 1024 (2)
- Encryption: 3DES
- Authentication: SHA-1
- Exchange Mode: Agressive
- Proposal Check: Claim
--- Phase 2
- PFS Group: None
- Encryption: Only DES & 3DES
- Authentication: Only MD5 & SHA-1
--- ID
- Authenticaiton Method: XAuth PSK
- Preshared Key: <from the Sonicwall>
- Username/Password: <the user/pass you created on the Sonicwall with
VPN priviledges>
Connect to Remote Client
Connect to Remote Client
by surfincajun on 2006-11-15 20:11:52 +0100
Hello,
I have no idea how to set this up to work correctly. I have tried setting it up
and all i get is on the last line:
Resize address pool from 0 to 255.
Settings I need are as follows (From remote Firewall)
shared secret: XXXXXX (This is have no problems with)
IKE negotiation every 1440 seconds
Phase 1:
3DES, SHA1, DH group 2
Pase 2:
AES-256, MD5, DH group 2
Our Networks inside the tunnel:
10.70/16
10.50/16
192.168.14.0/24
IP address of our firewall:
xx.xx.xx.xxx (Full IP Address of Firewall WAN)
If anyone can point me in the right direction or let me know what additional
settings I need to complete the tunnell I would greatly appreciate it.
Beta version will expire soon
Beta version will expire soon
by yves_kayak on 2006-11-28 05:00:58 +0100
Hello everybody,
I installed IpSecuritas 3.0 beta 14 on October 11. When I start the
application, I get a popup :
"This is a beta version of IPSecuritas, which will expire in 6 days. Please
download a more recent version from our web page."
I went to the web site, and it seems that Beta 14 is currently the most
recent version.
Did someone get this message a couple of days ago ? What happened after
the delay expired ? Is someone aware of a new version available within a
couple of days ? Can I reinstall beta 14 and use it until a new version
comes out ?
Thanks,
Yves Forget
Re: Beta version will expire soon
by Forum Admin on 2006-11-28 09:22:15 +0100
Hello,
we will make the release candidate available in the coming couple of days.
The release candidate will not expiry anymore and will be replaced by the
final version hopefully soon.
Cheers,
Christoph
Actiontec GT701-WG
Actiontec GT701-WG
by Cam on 2006-12-01 21:32:38 +0100
Does anyone have an experience using IPSecuritas through an Actiontec
GT701-WG to get into a Netscreen 5GT? We have a remote user who cannot
get VPN to work and I'm not having much luck connecting to her modem
remotely to attempt troubleshooting.
IPSecuritas 3.0 Release Candiate
IPSecuritas 3.0 Release Candiate
by Forum Admin on 2006-12-02 17:40:59 +0100
We're proud to announce the release candiate of IPSecuritas 3.0.
Please go to http://www.lobotomo.com/products/IPSecuritas/beta.html for
more information.
The IPSecuritas Team.
Re: IPSecuritas 3.0 Release Candiate
by robotguy on 2007-02-08 14:43:20 +0100
Thanks for the release candidate!
I am able to get this working with my firewall and love the changes. You
mention in your feature list that XAUTH will be included but there are some
forum posts that go both ways on this. Is it yet-to-be-included or is it
there and I can't find it. I would expect a username/password field
somewhere in the ID section or perhaps a popup requesting these when
logging in.
For now, I am not using XAUTH and things work but I will need to change
this in the long run to please our system administrator.
Any news on this?
Re: IPSecuritas 3.0 Release Candiate
by houser on 2007-02-09 16:44:33 +0100
Hello,
This version seems to work great for us, thanx for making a nice bit of
code!
Just a quick question:
Everything seems to work perfectly...
..but if I set log level to "warning" I get this when I logon:
[code]IPSecuritas 3.0rc build 1040, Fri Dec 1 21:00:13 CET 2006, nadig
Darwin 8.8.3 Darwin Kernel Version 8.8.3: Wed Oct 18 21:57:10 PDT 2006;
root:xnu-792.15.4.obj~4/RELEASE_I386 i386
Feb 09, 16:37:00 Warning IKE Foreground mode.
Feb 09, 16:37:07 Warning IKE ignore RESPONDER-LIFETIME notification.
Feb 09, 16:37:07 Warning IKE attribute has been modified.
[/code]
All seems to work as expected.
Is my VPN safe still?
Is there any setting I should tweak
thanx for your time!
best
Janne A.
Re: IPSecuritas 3.0 Release Candiate
by cnadig on 2007-02-09 18:02:05 +0100
Hi Janne,
don't worry - the notification is sent by the remote side to indicate that the
time your side proposes for phase is longer than what the remote side
allows. You might see some connection iterruption after the remote time
has bee reached.
Security is not affected.
To get rid of the warning, just lower the lifetime value in phase 2 to a value
that the remote side accepts.
Hope this helps,
Christoph
Re: IPSecuritas 3.0 Release Candiate
by houser on 2007-02-11 12:04:24 +0100
Thanx very much for that, I will give it a whirl...
I assume you mean the "lifetime" setting in phase 2?
It is now 28800secs.. and I can't find the appropriate setting on
the remoteside ( Juniper, NETSCREEN 5GT) to correspond to.
I can't get these things in the log to go away:
So I guess I can ignore that then for now......
Thanx so much for listening!
best
Janne A.
[code]IPSecuritas 3.0rc build 1040, Fri Dec 1 21:00:13 CET 2006, nadig
Darwin 8.8.3 Darwin Kernel Version 8.8.3: Wed Oct 18 21:57:10 PDT 2006;
root:xnu-792.15.4.obj~4/RELEASE_I386 i386
Feb 11, 11:58:19 Error IKE Foreground mode.
Feb 11, 11:58:24 Warning IKE attribute has been modified.
[/code]
Re: IPSecuritas 3.0 Release Candiate
by budy on 2007-02-22 15:39:36 +0100
Hi Christoph,
I am running 3.0rc on my MBP connecting to our VPN-1 NGX R62. As os in
Beta 14 of 3.0 it seems that I cannot get the DNS to work at all.
I have setp up our main domain jvm.de in the DNS section and have also
setup our internal DNS servers, but I am not able to lookup any internal
host.
I know that this wa sa bug in beta 14 and I hoped that it would have been
resolved in this version.
Thanks,
Budy
Re: IPSecuritas 3.0 Release Candiate
by budy on 2007-02-22 15:55:45 +0100
Hi,
I have to jump in here again. It seems that the problem is more related to
lookupd on my Mac OS X installation. As I have just noticed, IPSeciritas
places its <domain>.ipsecuritas file in /etc/resolvers but lookupd just
seems to ignore it.
Even after restarting lookupd I still can not look up any hosts from that
domain.
Any ideas, anyone?
Thanks,
Budy
Re: IPSecuritas 3.0 Release Candiate
by budy on 2007-02-22 17:21:27 +0100
Now, that's fun. It turns out that the only application that does not make
use of /etc/resolver/... seems to be the terminal.
And tobe hornest, that was the one I tried first. All other apps connect to
our internal server just fine.
Cheers,
Budy
Re: IPSecuritas 3.0 Release Candiate
by glamm on 2007-03-22 20:02:51 +0100
[quote author=robotguy link=1165077659/0#1 date=1170942200]Thanks
for the release candidate!
I am able to get this working with my firewall and love the changes. You
mention in your feature list that XAUTH will be included but there are some
forum posts that go both ways on this. Is it yet-to-be-included or is it
there and I can't find it. I would expect a username/password field
somewhere in the ID section or perhaps a popup requesting these when
logging in.
Any news on this?[/quote]
I would love to have XAUTH + Certificate authentication as supported by
Secure Computing's Sidewinder product. Any news on if this is possible or
expected?
Re: IPSecuritas 3.0 Release Candiate
by omega_red on 2007-03-26 00:08:46 +0200
Feature Request:
Select profile's from menu and widget.
Im using the profiles to connect to various company's, if i dont use the
profiles i will connect to all the company's eatch time i start ipsec. Or is
there a way to connect to only one connection if they are in the same
profile?
If this feature is included and the xauth problem with the zywall 5 is
solved(see my topic on the forum: [url]http://www.lobotomo.com/cgi-bin
/yabb/YaBB.pl?board=IPSecuritas;action=display;num=1173957250[/url]),
this is the absolute best ipsec software for the mac!
One issue with RC3
by coreyva on 2007-05-11 03:30:50 +0200
Exporting then importing a protected connection requires a password
before connection start even if unchecked.
Re: IPSecuritas 3.0 Release Candiate
by Forum Admin on 2007-05-12 11:25:36 +0200
Hi,
thank you very much for the bug report - I fixed it.
In the meantime, uncheck both 'Admin Password' and 'Query Password' and
you shoulnd't be asked for a password.
Cheers,
Christoph
XAuth bug in the 3.0RC build 1040
XAuth bug in the 3.0RC build 1040
by signal15 on 2006-12-06 19:56:41 +0100
When connecting to a Netscreen, I get the following error on the netscreen:
[code]
Rejected an IKE packet on untrust from y.y.y.y:2399 to x.x.x.x:4500 with
cookies e808852d932c2964 and b20e19b73074190d because a Phase 2
packet arrived while XAuth was still pending.
[/code]
Have others had this problem? It appears that it's not sending the
password.
[SOLVED] VPN to multiple networks
[SOLVED] VPN to multiple networks
by mtoivo on 2006-12-20 14:45:03 +0100
Hi all.
I'm trying to get IPSecuritas to route two remote networks (10.0.0.0/24 and
10.0.1.0/24) via the same connection. I've set them up in 'Connections' as
remote side endpoint mode (networks), but after connection is established,
only the upper network in the list gets routed. I tried increasing the
netmask to 23 (to cover addresses from 10.0.0.1 to 10.0.1.254) with no
luck. Funny enough, I couldn't get it work with vpntracker either. Firewall
(sonicwall tz170) isn't the problem, I'm sure of that, because it routes
similiar networks constantly. And if I'm fast enough, I'm able to ping the
other network too while connection is being established, but after that it
doesn't respond anymore. Is there any way of debugging the mac os x
ipsec-layer in a way that I could see routes and stuff?
Thanks!
Mikko Toivola
Re: [SOLVED] VPN to multiple networks
by mtoivo on 2006-12-20 15:55:24 +0100
Ah, I forgot to set 'Unique SAs' at the options tab. I must have disabled that
while trying to make it establish the connection at first. I'm kind of newbie
to these VPN-thingies, didn't even know what that meant.
IP range ...
IP range ...
by thegnorf on 2006-12-20 16:18:42 +0100
Hello !
Perhaps can someone help me in this trouble :
I used to play with IPSec 2 for a while, and I'm now testing the 3rd version
(3.0) ...
I found that I can't have a "local side host IP" in the same range my "Remote
Side Network IP".
This configuration used to work with the IPsec v.2 , but now only pop up a :
"collision between local and remote network" warning.
Did someone had the same difficulties ? Is it a bug or will this never work
again ?
Of course, I could change all my IP ranges but .... it wouldn't be fun ; -)
Thank you !
Re: IP range ...
by brlandy on 2006-12-26 23:12:05 +0100
I had the same problem, I'm using OpenBSD as my remote gateway. In the
end I reconfigured the OpenBSD side using the newer, easier, ipsec.conf
file. At that point it properly routed to my client address even if I specified
a client address outside of the remote network's range. This ended up
working a lot better than my old setup, which required something like arpd
on the gateway to route properly.
So, I decided the warning was reasonable and a better setup was needed to
avoid it.
3.0rc: XAuth and mode cfg working?
3.0rc: XAuth and mode cfg working?
by frankly on 2006-12-27 11:47:58 +0100
Hi,
is xauth and mode_cfg supposed to work? I cannot establish a connection
using it :(
(works with VPN tracker, if mode cfg is switched on)
Thanks
Frank
Re: 3.0rc: XAuth and mode cfg working?
by helium on 2007-01-20 22:09:58 +0100
I ran the version of racoon that ships with IPSecuritas manually and had it
dump the parsed config file, and rather than parse the xauth config
directive correctly racoon thinks it should use gss. Try it yourself with
racoon -C on the config file IPSecuritas generates - you can grab it by
starting a connection and making a copy of the racoon.conf and psk.txt
that end up in /Library/Application Support/Lobotomo/IPSecuritas while a
connection is running.
UPDATE: I grabbed the latest CVS of ipsec-tools, compiled them myself,
and found it followed the same behavior. In algorithms.[ch], there's a static
struct defined that contains mappings for the config tokens to functions
that implement each algorithm, and for reasons I've not yet uncovered the
wrong one is being selected when any of the hybrid_* or xauth_* directives
are being given.
racoon crash (with 3.0rc)
racoon crash (with 3.0rc)
by frankly on 2007-01-03 06:57:40 +0100
Hi,
still trying to use xauth togehter with mode_cfg.
racoon crashes during connection:
** racoon.crash.log:
Date/Time:
2007-01-03 06:34:42.826 +0100
OS Version:
10.4.8 (Build 8L127)
Report Version: 4
Command: racoon
Path: /Library/StartupItems/IPSecuritasDaemon/racoon
Parent: IPSecuritasDaemon [215]
Version: ??? (???)
PID: 5739
Thread: 0
Exception: EXC_BAD_ACCESS (0x0001)
Codes:
KERN_PROTECTION_FAILURE (0x0002) at 0x00000001
Thread 0 Crashed:
0 racoon
0x0002c3f0 getsockmyaddr + 76
1 racoon
0x00006120 isakmp_send + 260
2 racoon
0x00006454 isakmp_ph2resend + 152
3 racoon
0x00037240 schedular + 132
4 racoon
0x00002998 session + 520
5 racoon
0x00002468 main + 648
6 racoon
0x00001bfc _start + 392
7 dyld
0x8fe01048 _dyld_start + 60
Binary Images Description:
0x1000 - 0x69fff racoon
/Library/StartupItems/IPSecuritasDaemon
/racoon
0x8fe00000 - 0x8fe51fff dyld 45.3
/usr/lib/dyld
0x90000000 - 0x901bcfff libSystem.B.dylib
/usr/lib/libSystem.B.dylib
0x90214000 - 0x90219fff libmathCommon.A.dylib
/usr/lib/system
/libmathCommon.A.dylib
0x91a0c000 - 0x91ad3fff libcrypto.0.9.7.dylib
/usr/lib
/libcrypto.0.9.7.dylib
0x94f68000 - 0x94f85fff libresolv.9.dylib
/usr/lib/libresolv.9.dylib
** from the IPsecuritas log:
IPSecuritas 3.0rc build 1040, Fri Dec 1 21:00:13 CET 2006, nadig
Darwin 8.8.3 Darwin Kernel Version 8.8.3: Wed Oct 18 21:57:10 PDT 2006;
root:xnu-792.15.4.obj~4/RELEASE_I386 i386
Jan 03, 06:34:19 Info
APP IKE daemon started
Jan 03, 06:34:19 Info
APP IPSec started
Jan 03, 06:34:19 Debug APP State change from IDLE to RUNNING after
event START
Jan 03, 06:34:19 Debug APP Received SADB message type X_SPDUPDATE
- not interesting
Jan 03, 06:34:19 Debug APP Received SADB message type X_SPDUPDATE
- not interesting
Jan 03, 06:34:19 Error IKE Foreground mode.
Jan 03, 06:34:19 Info
IKE @(#)ipsec-tools CVS (http://ipsectools.sourceforge.net)
two simultaneous connections?
two simultaneous connections?
by zoomin on 2007-01-03 20:15:00 +0100
Hello,
I am using IPSecuritas v2.2 with Intel MacBook OSX 10.4.8.
It works really well with Fortigate-60 vpn firwalls from Fortinet, but I can
only establish one tunnel at a time. Is this by design or what am I missing? I
can connect to either one just fine but once connected, the other tunnel will
not connect. They are Host to Network tunnels and the remote networks
ARE different (192.168.24.0/24 and 192.168.31.0/24).
Thanks very much.
Re: two simultaneous connections?
by mtoivo on 2007-01-09 10:24:04 +0100
Stumbled to this same problem too, see my topic a bit lower here :).
Resolution was to set "Unique SAs" option for the connection. I'm using
3.0rc version, but I think that's the reason. After that I managed to set up
two individual tunnels or configure a connection with host to networks
mode. Remote endpoint is Sonicwall TZ170.
Re: two simultaneous connections?
by zoomin on 2007-01-15 17:49:03 +0100
[quote author=mtoivo link=1167851700/0#1 date=1168334644]Stumbled
to this same problem too, see my topic a bit lower here :). Resolution was
to set "Unique SAs" option for the connection. I'm using 3.0rc version, but I
think that's the reason. After that I managed to set up two individual
tunnels or configure a connection with host to networks mode. Remote
endpoint is Sonicwall TZ170.[/quote]
Thanks for the intel, but I think my situation is different, in that I am not
trying to setup a route to two subnets via a single ipsec connection, I am
trying to establish two or more IPSEC connections to different subnet (and
different endpoints) at the same time.
i.e. I am trying to get my IPSEC tunnel to a branch office in Burnaby to be up
at the same time as my IPSEC tunnel to Vancouver, etc.
IPSecuritas 3.0rc and Lookupd
IPSecuritas 3.0rc and Lookupd
by nickl on 2007-01-04 07:32:03 +0100
This is a Mac OS X 10.4.8 system on a MacBook Pro with IPSecuritas 3.0rc.
Has anyone had troube with IPSecuritas killing the resolver and
authentication services?
This appears to be a reproducible issue after having restarted a VPN session
multiple times. Lookupd will crash; manually restarting it doesn't help. Any
attempts at user authentication with sudo or programs requesting admin
access will fail. This can be really annoying when waking the computer from
sleep and it won't accept your password. A full reboot appears to be the
only solution.
Re: IPSecuritas 3.0rc and Lookupd
by mtoivo on 2007-01-09 10:19:03 +0100
I have exactly same issues with ne 3.0rc too, talkin' about annoying feature.
Didn't manage to trace it back to lookupd, allthough I saw it crashing in the
reports. I figured it had to be ipsecuritas fault, since after installing it this
started happening. I removed some other old services (like xgrid and such)
which also seemed to be crashing. Now the only solution is to kill all VPNs
before putting computer to sleep.
I came to this forum because I can't get /etc/resolver -thing to work at all.
IPSecuritas sets it up correctly (file named domain.tld, which contains
correct nameserver -statement) and queries to the server works with dig no
prob. Restarting lookupd or -flushcache doesn't help.
Re: IPSecuritas 3.0rc and Lookupd
by graabein on 2007-01-16 00:45:53 +0100
Exact same problem, exact same versions of Mac OS X and IPSecuritas
(10.4.8 and 3.0rc).
This problem has been driving me nuts and has caused me to have real
data loss. Needless to say I'd like to see it fixed... (not least because
IPSecuritas is a brilliant little utility).
I've been running with DNS resolver enabled for all my connections (and it
works for me, BTW), so I thought I'd try to disable that feature first and see
if that helps.
Anyone else who've seen this IPSecuritas/lookupd problem had any luck
with just disabling the DNS resolver functionality of IPSecuritas?
Gunnar
Re: IPSecuritas 3.0rc and Lookupd
by Forum Admin on 2007-01-16 22:58:13 +0100
Hello,
thank you very much for your feedback! I can confirm this behaviour and a
bug fix is currently in testing.
I will release another 3.0 Release Candidate fixing this and a few other
issues shortly.
Christoph
Re: IPSecuritas 3.0rc and Lookupd
by mtoivo on 2007-01-19 09:17:34 +0100
Glad to know this is known bug now. My /etc/resolver -issues was not a
problem after all. 'host' -command just didn't look from there, ping,
web-browser etc worked fine. I just might turn off DNS resolver-thing until
fix comes out, I have statically set /etc/resolver -file so there's no need for
ipsecuritas to set it.
3.0rc Host -> Anywhere Setup
3.0rc Host -> Anywhere Setup
by nickl on 2007-01-04 07:56:17 +0100
I've been having trouble getting packets to route over the VPN with a host
to anywhere configuration. The gif0 interface doesn't appear to have been
brought up and no routes are configured to send packets through the
tunnel. Should I be able to get this working?
If I change the IPSecuritas settings to use a fixed IP address (10.1.0.x) to
our 10.20/16 network, packets will be tunneled as expected. Other than
this change in the connection's general tab, the IPSecuritas settings are
identical.
I'm attaching two sets of setkey/netstat data below.
Host -> Anywhere Info
$ sudo setkey -DP
0.0.0.0[any] 172.16.1.7[any] any
in ipsec
esp/tunnel/xxx.xxx.xxx.xxx-172.16.1.7/require
spid=2 seq=3 pid=1182
refcnt=1
0.0.0.0[500] 172.16.1.7[500] any
in none
spid=4 seq=2 pid=1182
refcnt=1
172.16.1.7[any] 0.0.0.0[any] any
out ipsec
esp/tunnel/172.16.1.7-xxx.xxx.xxx.xxx/require
spid=1 seq=1 pid=1182
refcnt=1
172.16.1.7[500] 0.0.0.0[500] any
out none
spid=3 seq=0 pid=1182
refcnt=1
$ sudo setkey -D
172.16.1.7 xxx.xxx.xxx.xxx
esp mode=tunnel spi=1423428023(0x54d7c9b7)
reqid=0(0x00000000)
E: rijndael-cbc 5bd78fe6 d2a9caa6 8de03783 37d4a984
A: hmac-sha1 693c10b7 0e2045d9 fe5b9aa5 eee29d7d 946f218a
replay=4 flags=0x00000000 state=mature seq=1 pid=1449
created: Jan 3 20:07:27 2007 current: Jan 3 20:09:47 2007
diff: 140(s) hard: 28800(s) soft: 23040(s)
last: Jan 3 20:09:44 2007
hard: 0(s)
soft: 0(s)
current: 2128(bytes) hard: 0(bytes) soft: 0(bytes)
allocated: 14 hard: 0 soft: 0
refcnt=2
xxx.xxx.xxx.xxx 172.16.1.7
esp mode=tunnel spi=18373546(0x01185baa) reqid=0(0x00000000)
E: rijndael-cbc eb32ead6 62d69f39 b5c218f6 b344ad21
A: hmac-sha1 9c65fb38 c8ceed5b 4a5d71de 11fda7a2 6eaa729d
replay=4 flags=0x00000000 state=mature seq=0 pid=1449
created: Jan 3 20:07:27 2007 current: Jan 3 20:09:47 2007
diff: 140(s) hard: 28800(s) soft: 23040(s)
last:
hard: 0(s)
soft: 0(s)
current: 0(bytes)
hard: 0(bytes) soft: 0(bytes)
allocated: 0 hard: 0 soft: 0
refcnt=1
$ netstat -rn
Routing tables
Re: 3.0rc Host -> Anywhere Setup
by nickl on 2007-01-04 07:57:14 +0100
IP Address -> Subnet Info
$ sudo setkey -DP
10.20.0.0/16[any] 10.1.0.2[any] any
in ipsec
esp/tunnel/xxx.xxx.xxx.xxx-172.16.1.7/require
spid=2 seq=1 pid=13466
refcnt=1
10.1.0.2[any] 10.20.0.0/16[any] any
out ipsec
esp/tunnel/172.16.1.7-xxx.xxx.xxx.xxx/require
spid=1 seq=0 pid=13466
refcnt=1
$ sudo setkey -D
172.16.1.7 xxx.xxx.xxx.xxx
esp mode=tunnel spi=1690473783(0x64c29537) reqid=0(0x00000000)
E: rijndael-cbc 883a30eb f9cb44f4 8f27afb2 73065665
A: hmac-sha1 559fa16e 9815adde 2575519d 26b411b5 e6519408
replay=4 flags=0x00000000 state=mature seq=1 pid=13518
created: Jan 3 21:52:38 2007 current: Jan 3 21:53:39 2007
diff: 61(s)
hard: 28800(s) soft: 23040(s)
last: Jan 3 21:53:39 2007
hard: 0(s)
soft: 0(s)
current: 103144(bytes) hard: 0(bytes) soft: 0(bytes)
allocated: 813 hard: 0 soft: 0
refcnt=2
xxx.xxx.xxx.xxx 172.16.1.7
esp mode=tunnel spi=12559986(0x00bfa672) reqid=0(0x00000000)
E: rijndael-cbc d0f55e15 697e60e1 20ee4d91 41053bdb
A: hmac-sha1 6faff285 34ae44f3 06565f6e 5c5d3db7 c5bffcb0
replay=4 flags=0x00000000 state=mature seq=0 pid=13518
created: Jan 3 21:52:38 2007 current: Jan 3 21:53:39 2007
diff: 61(s)
hard: 28800(s) soft: 23040(s)
last: Jan 3 21:53:39 2007
hard: 0(s)
soft: 0(s)
current: 896592(bytes) hard: 0(bytes) soft: 0(bytes)
allocated: 781 hard: 0 soft: 0
refcnt=1
$ netstat -rn
Routing tables
Internet:
Destination
Gateway
Flags Refs
Use Netif Expire
default
172.16.1.1
UGSc
19
9 en1
10.20.0.0
10.1.0.2
UH
1
9 gif0
10.20/16
gif0
USc
2
0 gif0
127
127.0.0.1
UCS
0
0 lo0
127.0.0.1
127.0.0.1
UH
20
6430 lo0
169.254
link#5
UCS
0
0 en1
172.16.1/24
link#5
UCS
1
0 en1
172.16.1.1
0:3:93:e4:86:12 UHLW
19
147 en1 1031
172.16.1.7
127.0.0.1
UHS
0
2 lo0
Internet6:
Destination
Gateway
Flags
Netif Expire
::1
::1
UH
lo0
fe80::%lo0/64
fe80::1%lo0
Uc
lo0
fe80::1%lo0
link#1
UHL
lo0
fe80::%en1/64
link#5
UC
en1
fe80::216:cbff:fe05:cff%en1
0:16:cb:5:c:ff
UHL
lo0
ff01::/32
::1
U
lo0
Re: 3.0rc Host -> Anywhere Setup
by Keen on 2007-02-07 16:55:25 +0100
Hi!
it's bug in SPD entries: "any" must be set like 0.0.0.0/0[any], but we see
only host configuration: 0.0.0.0[any]. setkey use default mask /32 insted of
/0. Developers, read documentation attentively!
PS: Sorry for my english.
Re: 3.0rc Host -> Anywhere Setup
by cnadig on 2007-02-07 17:59:17 +0100
Thanks for the hint - fixed it and will be part of the release.
Thanks,
Christoph
Re: 3.0rc Host -> Anywhere Setup
by smpte on 2007-02-19 16:52:59 +0100
So for those of us trying to do a -> anywhere connection, for now, what do
we do prior to the release? Default route in the -> network set up?
Cannot connect to WatchGuard Firebox X550e
Cannot connect to WatchGuard Firebox X550e
by trehune on 2007-01-05 23:04:44 +0100
Hi,
I'm trying out the IPSecuritas 3.0rc but I can't get it to work with an
WatchGuard Firebox X550 running Fireware 8.3.
I have worked alot with VPN but I can't really get this up and running.
My private IP: 192.168.1.103
My firewalls IP: 222.250.45.240
X550e public IP: 213.85.37.3
The Firewall I'm behind is a WatchGuard Edge X5 Wireless, which support
IPSec passtrough.
Firebox log:
01-05 22:29:22 iked Searching ID: user domain - myData [MUVPN-Test]
peerId [MUVPN-Test]
01-05 22:29:22 Process INFO_EXCHANGE : EncryptBit set before SA
created new_msg=" Process INFO_EXCHANGE : EncryptBit set before SA
created"
01-05 22:29:22 CreateIsakmpSA : get rasUserGroupId=2 new_msg="
CreateIsakmpSA : get rasUserGroupId=2 "
01-05 22:29:22 iked Phase 1 started by peer with policy [MUVPN-Test_mu]
from 222.250.45.240:500 aggressive mode
01-05 22:29:22 iked Sending second message with policy [MUVPNTest_mu] to 222.250.45.240:500 aggressive mode
01-05 22:29:22 Process INFO_EXCHANGE : EncryptBit set before SA
created new_msg=" Process INFO_EXCHANGE : EncryptBit set before SA
created"
01-05 22:29:22 iked Cannot process the inform message from
222.250.45.240:500 cookies i=f38b8b37 c924f37c r=a81072e4 f2a7f6eb
01-05 22:29:28 Deny 222.250.45.240 213.85.37.3 icmp-Dest_Unreach
code(3) 0-External Firebox icmp error with data src_ip=213.85.37.3
dst_ip=192.168.1.103 pr=ike/udp src_port=500 dst_port=500
src_intf='0-External' dst_intf='0-External' can not match any flow, drop
this packet 56 50 (internal policy) src_user="testuser1@Firebox-DB"
01-05 22:29:34 iked Cannot process the inform message from
222.250.45.240:500 cookies i=f38b8b37 c924f37c r=a81072e4 f2a7f6eb
01-05 22:29:34 iked Drop negotiation due to peer 222.250.45.240:500
phase one retry timeout
IPSecuritas log:
IPSecuritas 3.0rc build 1040, Fri Dec 1 21:00:13 CET 2006, nadig
Darwin 8.8.3 Darwin Kernel Version 8.8.3: Wed Oct 18 21:57:10 PDT 2006;
root:xnu-792.15.4.obj~4/RELEASE_I386 i386
Jan 05, 22:29:20 Info
APP IKE daemon started
Jan 05, 22:29:20 Info
APP IPSec started
Jan 05, 22:29:20 Error IKE Foreground mode.
Jan 05, 22:29:20 Info
IKE @(#)ipsec-tools CVS (http://ipsectools.sourceforge.net)
Jan 05, 22:29:20 Info
IKE @(#)This product linked OpenSSL 0.9.7l 28
Sep 2006 (http://www.openssl.org/)
Jan 05, 22:29:20 Info
IKE Reading configuration from "/Library
/Application Support/Lobotomo Software/IPSecuritas/racoon.conf"
Jan 05, 22:29:20 Info
IKE Resize address pool from 0 to 255
Jan 05, 22:29:21 Info
IKE couldn't find the proper pskey, try to get one
by the peer's address.
Jan 05, 22:29:21 Error IKE No SIG was passed, hybrid auth is enabled,
but peer is no Xauth compliant
Jan 05, 22:29:24 Info
IKE couldn't find the proper pskey, try to get one
Re: Cannot connect to WatchGuard Firebox X550e
by cman on 2008-11-19 06:04:39 +0100
Did you ever solve this problem? I am having the same with a Watchguard
X700
Linksys WRV54G
Linksys WRV54G
by jrr316 on 2007-01-08 18:26:46 +0100
I am trying to connect to a link WRV54G from a Mac running OSX 10.4.8
using IPSecuritas. I am a little stuck. I can get the linksys utility to connect
from my Windows install, but on the mac it gets stuck on authentication.
Anyone get this working that would share screen shots of router
configuration and IPSecuritas?
[email protected]
Thanks!
-Justin
Re: Linksys WRV54G
by gogojohn on 2007-04-24 19:40:58 +0200
I'm working on this as well. I have both a WRV54g and a WRV200 which I
need to connect to.
Since 3.0rc has support for the WRV200, that's what I'm focusing on first. I
doubt that the WRV54g will be much different to get working afterward.
Once I have some success, I'll share what I find with you.
Re: Linksys WRV54G
by gogojohn on 2007-04-24 23:01:06 +0200
After spending about a day trying to figure out how to establish a
connection to the WRV54G, I tried out VPN Tracker. It worked. So this
confirms that it [i]is[/i] possible to connect to the unit with my PowerBook.
I'll keep trying to get IPSecuritas 3.0rc to work. But in the meantime, I'll use
the VPN Tracker solution, so that at least I can get on with my business.
If/when I do come across a solution, I will share it.
For sake of providing any useful details on the problems that I've been
experiencing though, here's the rundown:
[list]
[*] cannot get past phase1 of negotiating the connection
[*] using pre-shared key, but this isn't working
[*] have attempted in various ways to use the username and password that
can be created to provide individual accounts for QuickVPN (this is the
same set that I know works fine with my PC using QuickVPN), to no avail
[*] upon inspection the only difference between the settings for the two
tools is that VPN Tracker allows PFS (Perfect Forward Secrecy) to be enabled
and disabled
[*] apart from that, all the other configuration details appear to be the same
[*] during testing, I've been using a dial-up connection as I haven't had
access to a nearby open AP, or from another location (does IPSecuritas have
issues with PPP connections?)
[*] the profile in VPN Tracker that worked was for the Linksys BEFVP41
[/list]
And finally: I haven't yet had a chance to work with the WRV200. The one
that I use is at a remote location and appears to need a reboot... so I'll try it
later and provide success/failure details. Perhaps it will also help to shed
some light upon the WRV54G situation?
Where is the config saved?
Where is the config saved?
by praenti on 2007-01-10 23:58:28 +0100
Hi,
anybody here who can tell me where the configuration is saved?
Needed a new harddisk in my iBook and want to migrate the old config
from the old harddisk to the new one.
But I haven't found the configuration file and joping you can tell me, where
it is.
Cheers,
Mike
P.S.: The forum has some problems to access graphics and the profile so I
cannot change my password. Please correct that.
Re: Where is the config saved?
by mtoivo on 2007-01-11 01:28:56 +0100
Hi. I think the configs are in /Library/Application Support/Lobotomo
Software/IPSecuritas There seems to be file 'configuration.data', which I
thought might be the configuration file, but can't say since it's binary.
Strange way to save such configuration as system wide, in user's Library
there's nothing.
Re: Where is the config saved?
by praenti on 2007-01-11 09:26:29 +0100
Thank you for the quick response.
Sorry that I cannot give you any more information if this answer is correct,
because the expected headcrash of my old harddrive happened yesterday...
:-(.
(harddrive changed because of a bearing damage of the spin motor which
can result in a headcrash)
But a additional note. My VPN connection is running now again ;-).
Cheers,
Mike
3.0rc connecting to a Cisco PIX?
3.0rc connecting to a Cisco PIX?
by helium on 2007-01-18 23:42:42 +0100
Anyone had any luck connecting to a PIX with 3.0rc? I can't seem to get past
phase 1 negotiation.
On the PIX side, I'm using vpngroups for username/password
authentication. On the IPSecuritas side, I've selected Hybrid and entered the
username/password there.
My phase 1 settings on the client match those on the PIX, and yet for the
life of me I can't manage to make a connection.
I've looked through the racoon.conf and psk.txt file IPSecuritas temporarily
generates at runtime, and both look reasonable enough.
I've tried enabling/disabling MODE_CFG, situation identity only, DOI, unique
SA's and initial contact, but perhaps i'm missing the right combination.
All suggestions/feedback welcome.
Thanks.
Re: 3.0rc connecting to a Cisco PIX?
by helium on 2007-01-19 16:27:36 +0100
[quote author=helium link=1169160162/0#0 date=1169160162]Anyone
had any luck connecting to a PIX with 3.0rc? I can't seem to get past phase
1 negotiation.
On the PIX side, I'm using vpngroups for username/password
authentication. On the IPSecuritas side, I've selected Hybrid and entered the
username/password there.
My phase 1 settings on the client match those on the PIX, and yet for the
life of me I can't manage to make a connection.
I've looked through the racoon.conf and psk.txt file IPSecuritas temporarily
generates at runtime, and both look reasonable enough.
I've tried enabling/disabling MODE_CFG, situation identity only, DOI, unique
SA's and initial contact, but perhaps i'm missing the right combination.
All suggestions/feedback welcome.
Thanks.[/quote]
I manually figured out the issue. To connect, you need to use
pre_shared_key as the algorithm, and local identifier needs to be in the
form of 'my_identifier keyid tag "remote_username"'.
Any chance the interface for 3.0 could be updated to allow KeyID as one of
the selections, and then have the above config syntax output when it's
selected? Obviously, the "remote_username" would be whatever is entered
into the text field when KeyID is selected.
Thanks.
IPSec mobile clients and split horizon
IPSec mobile clients and split horizon
by lonnie on 2007-01-27 20:34:51 +0100
Hi,
Client: Mac OS 10.4, IPSecuritas 3.0rc
Server: m0n0wall 1.22, Soekris net4801, WAN, LAN, DMZ
I had a common problem with others here, using IPSec mobile clients and
the resulting split horizon, ie. only traffic to your local network is sent over
the tunnel, all other traffic is sent direct, un-encrypted.
The particular problem for me was my public POP3 and SMTP servers. One
solution would be to run some sort of local proxy for these services, but I
prefer that solution as last resort.
I have solved this problem, and all comments are welcome.
In my IPSec client (IPSecuritas 3.0 on Mac OS 10.4) I define my local
endpoint as "Host" and remote endpoint as "Networks" (plural).
I need to specify a local address for the "Host" (so the routing works), so I
use an unused address in the DMZ. (Would a static route be a better thing
to do?)
The Networks are:
10.10.10.0/24 # local LAN
216.x.y.z/32 # public POP3 server
68.a.b.c/32 # public SMTP server
The final 'trick' is in the 'Options' tab is to check "Unique SAs". This forces
m0n0wall to make policies for each of these networks.
In this scenario, remote traffic to the private LAN and public POP3 and SMTP
servers are included in the IPSec tunnels.
Hope this helps others.
Lonnie
IPSecuritas 3.0rc Menu
IPSecuritas 3.0rc Menu
by lonnie on 2007-01-27 20:57:27 +0100
First, I want express how wonderful IPSecuritas 3 is, definitely worth a
paypal donation.
May I make a suggestion (feature request) for the new menu bar menu.
Since I use both PPTP and IPSec, it would be nice, for the sake of
consistency, that they worked similarly.
My suggestion...
-/ /-----------------VPN: Idle / Connected / Authenticating (item Disabled)
-----------------Connect / Disconnect / Cancel
-----------------IPSec (item Disabled)
o Home VPN
o Office VPN
-----------------Profie (item Disabled)
Other (active profile checked)
Work
-----------------Open IPSecuritas...
------------------
Key points:
1) Change profiles via menu. Show active profile.
2) Open IPSecuritas application via menu.
3) Act similar to PPTP menu.
Any other ideas?
Lonnie
Netgear FVS338
Netgear FVS338
by superglu on 2007-01-30 01:05:32 +0100
Has anyone got the FVS338 to work with IPSecuritas? I know it supports
FVS328, but how about 338?
Thanks!
3.0rc "Connection Surveillance" Defaults
3.0rc "Connection Surveillance" Defaults
by lonnie on 2007-01-31 04:40:02 +0100
IPSecuritas -> Preferences -> "Connection Surveillance" [Ping Interval: and
Ping Timeout:]
Does anyone else think the defaults for 'Ping Interval' and 'Ping Timeout' are
reversed?
My suggestion is:
Ping Interval: 30 sec.
Ping Timeout: 3 sec.
If not, please tell me the error of my thinking.
Lonnie
Connection to Cisco VPN Concentrator 3000
Connection to Cisco VPN Concentrator 3000
by nacho319 on 2007-02-01 13:20:24 +0100
I'm trying to connect to a Cisco VPN Concentrator and I can't get past Phase
1. I've done network traces comparing what my Mac does to attempt to
connect versus what my Windows machine running the Cisco client does to
connect.
Right now, I think the problem is that I can't get the Mac to use an ID type
of KEY_ID, type 11. The options are Address, FQDN, User FQDN, and
Certificate. So I think that would be my stumbling block at this point.
Is there a way to make IPSecuritas use that identity type? Right now, the
Cisco won't even send a reply packet to me with the offer I send it.
thanks,
Chris
Re: Connection to Cisco VPN Concentrator 3000
by nacho319 on 2007-02-01 13:28:31 +0100
Ok, so the Cisco didn't really care about that at all. It just wanted me to
change my ID from Hybrid to Xauth-PSK. Stupid machine, I thought
Xauth-PSK isn't secure, and Hybrid is better......
lost packets connecting to SonicWall
lost packets connecting to SonicWall
by Dave on 2007-02-05 04:37:05 +0100
I've been having a consistent problem with 3.0RC when connecting to
work's SonicWall (TZ150, I think); the problem shows up as lost packets.
The connection is to a network using Xauth-PSK and while I get the "green
light" and can ping fine, I can't view internal websites if they contain a lot of
data; simple sites load fine. For example, I'll get a redirect response or a
authentication needed response fine but the full page won't load; it just sits
there waiting. It feels very similar to a problem I've seen before, namely
fragmented packets being dropped. So a small packet containing just a 30x
redirect will get through but the full website packets will all be fragmented
and dropped.
In the past (beta 6), simply setting my MTU would fix it and all would be
fine. But now, setting that doesn't seem to help at all; the page still stalls
(and eventually times out, sometimes).
So my question is, does IPsecuritas do automatic MTU adjustment? If not, is
there some way I can trace this to determine who, if anyone, is dropping
the packets? The logs don't really show anything interesting.
P.S. Thanks for fixing the icons and other aspects of the site. I can't register
with my preferred username because it is in that 1/2 registered state where
it was trying to send me the email but couldn't.
Re: lost packets connecting to SonicWall
by Manuel on 2007-03-15 16:10:40 +0100
That's interesting, I was having the same problem connecting to our Pro
3060 - it looked like an MTU size problem. What's even more interesting is
that the problem only showed up when I was opening a tunnel to multiple
networks, *and* when the networks were from both the LAN and the DMZ.
Opening a tunnel to the LAN or the DMZ only didn't trigger the problem.
Then I uninstalled everything and started from scratch, and it doesn't do it
anymore. I have no idea of what I did to fix it, but now it works... sorry I
can't help, it's just to tell you that the problem does exist, and that it can be
fixed - somehow.
Re: lost packets connecting to SonicWall
by Dave on 2007-03-17 22:26:37 +0100
[quote author=Manuel link=1170646625/0#1 date=1173971440]Then I
uninstalled everything and started from scratch, and it doesn't do it
anymore.[/quote]
I also installed VPN Tracker but was having the same issue so I uninstalled
IPSecuritas completely, including logging out. When I reinstalled, I had to
drop the MTU to 1400 but it would connect! I tried it yesterday with the
MTU at 1500 and it [i]still[/i] connects. Yay! :D The only issue I have now is
that an https connection still stalls but that isn't that big a deal since I can
get to that (internal) site in other ways.
The final test will be rebooting and seeing if things still work. But I think
they will so thanks! :-)
Re: lost packets connecting to SonicWall
by Dave on 2007-03-27 23:26:12 +0200
Update: I rebooted and it [i]didn't[/i] work; it stalled in the "usual" place.
However, setting the MTU down to 1400 allowed it to connect and then
setting it back to 1500 didn't change its ability to connect. So, for some
reason, the MTU has to be jiggled but it only appears to be required once
per login/reboot.
IPSecuritas / Firewall / Apple Remote Desktop
IPSecuritas / Firewall / Apple Remote Desktop
by mangobuzz on 2007-02-08 06:11:01 +0100
Hello,
Can anyone verify that ipsecuritas 3.0rc disables the firewall settings in
system prefs --- sharing--- firewall. Everytime I start the vpn, if I click on
the firewall tab in the sharing prefs I get a notice that "Other Firewall
software is running...." As soon as I disable the vpn tunnel, my firewall
settings go back to normal ( You will need to close system prefs and
re-open the sharing prefs). Can anyone verify that this is normal or not?
Can someone also verify if Apple Remote Desktop 3.1 works correctly with
ipsecuritas 3.0rc. Currently I am unable to use the upgrade client software
feature and i'm unable to copy files to the remote computer, however
everything else seems to work. I have a feeling that the firewall problem
might be causing Apple Remote Desktop to not work fully. Any
suggestions? Thanks
Re: IPSecuritas / Firewall / Apple Remote DesktopH
by cnadig on 2007-02-09 20:49:20 +0100
Hello,
IPSecuritas does not disable your firewall or any of the settings. It adds
rules for NAT-T to work (in a nutshell: MacOS X does not provide proper
NAT-T support and therefore IPSecuritas handles the NAT-T traffic. By
adding these rules NAT-T relevant traffic is routed through IPSecuritas).
The firewall prefpane does not allow editing while other applications have
set their own rules - that's why you get this (a bit misleading) error
message when you try.
You can list the active firewall rules with the following command (in a
Terminal window):
ipfw list
I might move the NAT-T code to a kernel extension one day, making the
additional rules obsolete.
If you prefer IPSecuritas not to make any of these additional rules, disable
NAT-T on all tunnels.
Hope this helps,
Christoph
Re: IPSecuritas / Firewall / Apple Remote Desktop
by houser on 2007-02-11 17:00:16 +0100
I can confirm that ARDT is working just fine here with Firewall switched on
in OSX.
Latest OSX and latest IP securitas RC.
I have noticed that these ports seem more"sensitive" to partially incorrect
settings, for lack of a better word, than others like 80 etc...
For example, I had my mobile 3G connection set with an outdated APN
and everything was working apart from ARDT.
Support updatredmy APN and now that works too, without changing
anything in IpSecuritas..
FWIW,YMMV
best
Janne A.
Linksys BEFSX41 Connection
Linksys BEFSX41 Connection
by jim_julian on 2007-02-12 01:45:20 +0100
Has anyone been able to establish a VPN with IPSecuritas 2 or 3 and the
subject VPN Endpoint router? I haven't :'(
With RC 3 I get Phase 1 timeout ...
IPSecuritas 3.0rc build 1040, Fri Dec 1 21:00:13 CET 2006, nadig
Darwin 8.8.3 Darwin Kernel Version 8.8.3: Wed Oct 18 21:57:10 PDT 2006;
root:xnu-792.15.4.obj~4/RELEASE_I386 i386
Feb 11, 16:21:17 <ISProperAPP IKE daemon started
Feb 11, 16:21:17 <ISProperAPP IPSec started
Feb 11, 16:21:17 <ISProperIKE Foreground mode.
Feb 11, 16:21:17 <ISProperIKE @(#)ipsec-tools CVS (http://ipsectools.sourceforge.net)
Feb 11, 16:21:17 <ISProperIKE @(#)This product linked OpenSSL 0.9.7l 28
Sep 2006 (http://www.openssl.org/)
Feb 11, 16:21:17 <ISProperIKE Reading configuration from "/Library
/Application Support/Lobotomo Software/IPSecuritas/racoon.conf"
Feb 11, 16:21:17 <ISProperIKE Resize address pool from 0 to 255
Feb 11, 16:22:00 <ISProperIKE phase2 negotiation failed due to time up
waiting for phase1. ESP xx.xxx.xxx.xxx[500]->10.0.1.3[500]
Feb 11, 16:22:02 <ISProperIKE phase2 negotiation failed due to time up
waiting for phase1. ESP xx.xxx.xxx.xxx[500]->10.0.1.3[500]
Feb 11, 16:22:28 <ISProperAPP IPSec stopping
Feb 11, 16:22:29 <ISProperAPP IKE daemon terminated
Re: Linksys BEFSX41 Connection
by BertMac on 2007-02-21 14:06:34 +0100
I'm trying the same thing with no luck. Everything matches on both sides so
I'm not sure where the break down is.
The little box says it is "up" however the red x never goes away, telling me
it didn't actually make a connection.
I suppose this wouldn't be so hard if I had access to the vpn router to look
at it's logs from where I am at. :-/
Any direction appreciated!
Re: Linksys BEFSX41 Connection
by jim_julian on 2007-02-21 15:36:08 +0100
It's hard to believe that Linksys doesn't really provide any support to help
with problems such as this ... sigh.
Re: Linksys BEFSX41 Connection
by BertMac on 2007-02-23 02:07:09 +0100
I just posted on the Linksys forum...we'll see how it goes.
I'll be sure to update this [i]when[/i] Ifinally figure this out. :-?
Re: Linksys BEFSX41 Connection
by mrfett on 2007-02-23 13:38:32 +0100
this has been frustrating me as well. interesting thing, when i connect from
my neighbors connection (next door, same cable provider) i can get in to
my network fine. from anywhere else though (Panera, campus network) i
get the timeout messages. dunno what to think. seems odd that it works in
the first instance.
Re: Linksys BEFSX41 Connection
by mrfett on 2007-02-23 14:32:47 +0100
i'm thinking my issue might have to do with setting the proper NAT
traversal settings. if anyone knows anything about this topic, please
enlighten :)
Re: Linksys BEFSX41 Connection
by mrfett on 2007-02-24 20:56:13 +0100
if anyone can comment on whether or not it's possible to run an ipsec
tunnel from a cable modem network (befsx41) to a laptop connected to a
public wifi network, please respond. i'm unsure if i'm wasting my time
trying to troubleshoot this or not. i tried all the NAT-T settings and none
did the trick. still got the error message posted up top.
Re: Linksys BEFSX41 Connection
by mrfett on 2007-03-01 00:49:40 +0100
no one has answers about this issue, huh? still a mystery to me. could it be
that things are timing out? should the timeout be made longer? seems
unnecessary to me... it seems odd more ppl aren't running into this.
Re: Linksys BEFSX41 Connection
by Dave on 2007-03-01 01:34:39 +0100
One thing I would suggest is to crank up the debug level so you perhaps
pinpoint why the phase 1 timeout is occurring. Do you have access to the
router at the other end to see if there is any info in its logs that might help?
Re: Linksys BEFSX41 Connection
by mrfett on 2007-03-01 03:41:09 +0100
ahh good idea. i'll try that tomorrow when i'm on another network. thanks!
Re: Linksys BEFSX41 Connection
by mrfett on 2007-03-01 17:44:00 +0100
ok so now i have big log files to share. hopefully they'll shed some light on
this:
From the Linksys BEFSX41:
2007-03-01 11:37:17 IKE[6] Tx >> MM_R1 : 129.2.175.20 SA
2007-03-01 11:37:17 IKE[6] ISAKMP SA CKI=[15519997 de5465d8]
CKR=[a58c90c7 9d7cae7a]
2007-03-01 11:37:17 IKE[6] ISAKMP SA DES / MD5 / PreShared /
MODP_768 / 28800 sec (*28800 sec)
2007-03-01 11:37:38 IKE[6] Rx << MM_I1 : 129.2.175.20 SA, VID, VID,
VID, VID, VID, VID, VID, VID, VID, VID, VID, VID
2007-03-01 11:37:38 IKE[6] Tx >> MM_R1 : 129.2.175.20 SA
2007-03-01 11:37:38 IKE[6] ISAKMP SA CKI=[15519997 de5465d8]
CKR=[50eecdd2 65f6de12]
2007-03-01 11:37:38 IKE[6] ISAKMP SA DES / MD5 / PreShared /
MODP_768 / 28800 sec (*28800 sec)
Re: Linksys BEFSX41 Connection
by mrfett on 2007-03-01 17:48:07 +0100
From IPSecuritas:
Mar 01, 11:35:10 Debug IKE msg 5 not interesting
Mar 01, 11:35:11 Debug IKE msg 5 not interesting
Mar 01, 11:35:11 Debug APP Send ping packet to 192.168.1.0/24 of
connection DB94
Mar 01, 11:35:12 Debug APP Send ping packet to 192.168.1.0/24 of
connection DB94
Mar 01, 11:35:13 Debug APP Send ping packet to 192.168.1.0/24 of
connection DB94
Mar 01, 11:35:14 Debug APP Send ping packet to 192.168.1.0/24 of
connection DB94
Mar 01, 11:35:15 Debug IKE 320 bytes from 10.105.5.212[500] to
68.50.31.23[500]
Mar 01, 11:35:15 Debug IKE sockname 10.105.5.212[500]
Mar 01, 11:35:15 Debug IKE send packet from 10.105.5.212[500]
Mar 01, 11:35:15 Debug IKE send packet to 68.50.31.23[500]
Mar 01, 11:35:15 Debug IKE 1 times of 320 bytes message will be sent
to 68.50.31.23[500]
Mar 01, 11:35:15 Debug IKE
Mar 01, 11:35:15 Debug IKE c805d786 20d54aeb 00000000 00000000
01100200 00000000 00000140 0d000034
Mar 01, 11:35:15 Debug IKE 00000001 00000001 00000028 01010001
00000020 01010000 800b0001 800c7080
Mar 01, 11:35:15 Debug IKE 80010001 80030001 80020001 80040001
0d000014 4a131c81 07035845 5c5728f2
Mar 01, 11:35:15 Debug IKE 0e95452f 0d000014 8f8d8382 6d246b6f
c7a8a6a4 28c11de8 0d000014 439b59f8
Mar 01, 11:35:15 Debug IKE ba676c4c 7737ae22 eab8f582 0d000014
4d1e0e13 6deafa34 c4f3ea9f 02ec7285
Mar 01, 11:35:15 Debug IKE 0d000014 80d0bb3d ef54565e e84645d4
c85ce3ee 0d000014 9909b64e ed937c65
Mar 01, 11:35:15 Debug IKE 73de52ac e952fa6b 0d000014 7d9419a6
5310ca6f 2c179d92 15529d56 0d000014
Mar 01, 11:35:15 Debug IKE cd604643 35df21f8 7cfdb2fc 68b6a448
0d000014 90cb8091 3ebb696e 086381b5
Mar 01, 11:35:15 Debug IKE ec427b1f 0d000014 16f6ca16 e4a4066d
83821a0f 0aeaa862 0d000014 4485152d
Mar 01, 11:35:15 Debug IKE 18b6bbcd 0be8a846 9579ddcc 00000014
afcad713 68a1f1c9 6b8696fc 77570100
Mar 01, 11:35:15 Debug IKE resend phase1 packet
c805d78620d54aeb:0000000000000000
Mar 01, 11:35:15 Debug APP Send ping packet to 192.168.1.0/24 of
connection DB94
Mar 01, 11:35:16 Debug APP Send ping packet to 192.168.1.0/24 of
connection DB94
Mar 01, 11:35:16 Debug IKE get pfkey ACQUIRE message
Mar 01, 11:35:16 Debug IKE
Re: Linksys BEFSX41 Connection
by mrfett on 2007-03-01 17:49:02 +0100
Mar 01, 11:35:16 Debug IKE 02060003 00260000 00000055 00000000
00030005 ff200000 10020000 0a6905d4
Mar 01, 11:35:16 Debug IKE 00000000 00000000 00030006 ff200000
10020000 44321f17 00000000 00000000
Mar 01, 11:35:16 Debug IKE 00020012 00020200 00000049 00000000
001c000d 20000000 00030000 00000000
Mar 01, 11:35:16 Debug IKE 01000800 00000000 00000001 00000001
00000000 00000000 00000000 00000000
Mar 01, 11:35:16 Debug IKE 00000000 00000000 00000000 00015180
00000000 00007080 00000000 00000000
Mar 01, 11:35:16 Debug IKE 00040000 00000000 010001c0 00000000
00000001 00000001 00000000 00000000
Mar 01, 11:35:16 Debug IKE 00000000 00000000 00000000 00000000
00000000 00015180 00000000 00007080
Mar 01, 11:35:16 Debug IKE 00000000 00000000 000c0000 00000000
01000100 00000000 00000001 00000001
Mar 01, 11:35:16 Debug IKE 00000000 00000000 00000000 00000000
00000000 00000000 00000000 00015180
Mar 01, 11:35:16 Debug IKE 00000000 00007080 00000000 00000000
Mar 01, 11:35:16 Debug IKE suitable outbound SP found:
10.105.5.212/32[0] 192.168.1.0/24[0] proto=any dir=out.
Mar 01, 11:35:16 Debug IKE sub:0xbffff560: 192.168.1.0/24[0]
10.105.5.212/32[0] proto=any dir=in
Mar 01, 11:35:16 Debug IKE db :0x308b48: 192.168.1.0/24[0]
10.105.5.212/32[0] proto=any dir=in
Mar 01, 11:35:16 Debug IKE suitable inbound SP found:
192.168.1.0/24[0] 10.105.5.212/32[0] proto=any dir=in.
Mar 01, 11:35:16 Debug IKE new acquire 10.105.5.212/32[0]
192.168.1.0/24[0] proto=any dir=out
Mar 01, 11:35:16 Debug IKE (proto_id=ESP spisize=4 spi=00000000
spi_p=00000000 encmode=Tunnel reqid=0:0)
Mar 01, 11:35:16 Debug IKE (trns_id=DES encklen=0
authtype=hmac-md5)
Mar 01, 11:35:16 Debug IKE (trns_id=3DES encklen=0
authtype=hmac-md5)
Mar 01, 11:35:16 Debug IKE (trns_id=AES encklen=256
authtype=hmac-md5)
Mar 01, 11:35:16 Debug IKE (trns_id=AES encklen=192
authtype=hmac-md5)
Mar 01, 11:35:16 Debug IKE (trns_id=AES encklen=128
authtype=hmac-md5)
Mar 01, 11:35:16 Debug IKE in post_acquire
Mar 01, 11:35:16 Debug IKE configuration found for 68.50.31.23.
Mar 01, 11:35:16 Info
IKE request for establishing IPsec-SA was queued
due to no phase1 found.
Mar 01, 11:35:17 Debug APP Send ping packet to 192.168.1.0/24 of
connection DB94
Mar 01, 11:35:18 Debug APP Send ping packet to 192.168.1.0/24 of
connection DB94
Mar 01, 11:35:19 Debug APP Send ping packet to 192.168.1.0/24 of
connection DB94
Mar 01, 11:35:20 Debug APP Send ping packet to 192.168.1.0/24 of
connection DB94
Mar 01, 11:35:21 Debug APP Send ping packet to 192.168.1.0/24 of
connection DB94
Mar 01, 11:35:22 Debug APP Send ping packet to 192.168.1.0/24 of
connection DB94
Mar 01, 11:35:23 Debug APP Send ping packet to 192.168.1.0/24 of
connection DB94
Mar 01, 11:35:24 Debug APP Send ping packet to 192.168.1.0/24 of
connection DB94
Re: Linksys BEFSX41 Connection
by mrfett on 2007-03-01 17:50:35 +0100
there's more, but i think it just starts repeating. hopefully someone finds
this insightful. thanks for any help you guys can give!
Re: Linksys BEFSX41 Connection
by Dave on 2007-03-02 16:42:33 +0100
Unfortunately, the ping lines make the log file HUGE; I really wish there was
a way to turn them off (and the fact it is pinging even when the check box
isn't checked is worrisome). But if you can strip those out, you might be
able to see what is going on. All the "queued" bit means is that Phase 1 isn't
done, which appears to be the entire problem.
Are you using MAIN mode? And is the laptop behind any kind of NAT
router? I've only been able to connect with Aggressive mode since I'm not
using certificates and I'm behind a NAT router.
Re: Linksys BEFSX41 Connection
by mrfett on 2007-03-02 20:08:48 +0100
I am using main mode, and I am behind a router. My whole issue is that I
can connect from my neighbor's wireless network next door, but when I go
to my campus or to a cafe, I cannot connect. In both instances I'm behind a
firewall, but something about the public places prevents a connection. I can
go try aggressive mode. Do I put both the router and the client in
aggressive mode? Thank you for your help. I've edited the log file and I'll
post that now.
Re: Linksys BEFSX41 Connection
by mrfett on 2007-03-02 20:09:15 +0100
Mar 01, 11:35:10 Debug IKE msg 5 not interesting
Mar 01, 11:35:11 Debug IKE msg 5 not interesting
Mar 01, 11:35:15 Debug IKE 320 bytes from 10.105.5.212[500] to
68.50.31.23[500]
Mar 01, 11:35:15 Debug IKE sockname 10.105.5.212[500]
Mar 01, 11:35:15 Debug IKE send packet from 10.105.5.212[500]
Mar 01, 11:35:15 Debug IKE send packet to 68.50.31.23[500]
Mar 01, 11:35:15 Debug IKE 1 times of 320 bytes message will be sent
to 68.50.31.23[500]
Mar 01, 11:35:15 Debug IKE
Mar 01, 11:35:15 Debug IKE c805d786 20d54aeb 00000000 00000000
01100200 00000000 00000140 0d000034
Mar 01, 11:35:15 Debug IKE 00000001 00000001 00000028 01010001
00000020 01010000 800b0001 800c7080
Mar 01, 11:35:15 Debug IKE 80010001 80030001 80020001 80040001
0d000014 4a131c81 07035845 5c5728f2
Mar 01, 11:35:15 Debug IKE 0e95452f 0d000014 8f8d8382 6d246b6f
c7a8a6a4 28c11de8 0d000014 439b59f8
Mar 01, 11:35:15 Debug IKE ba676c4c 7737ae22 eab8f582 0d000014
4d1e0e13 6deafa34 c4f3ea9f 02ec7285
Mar 01, 11:35:15 Debug IKE 0d000014 80d0bb3d ef54565e e84645d4
c85ce3ee 0d000014 9909b64e ed937c65
Mar 01, 11:35:15 Debug IKE 73de52ac e952fa6b 0d000014 7d9419a6
5310ca6f 2c179d92 15529d56 0d000014
Mar 01, 11:35:15 Debug IKE cd604643 35df21f8 7cfdb2fc 68b6a448
0d000014 90cb8091 3ebb696e 086381b5
Mar 01, 11:35:15 Debug IKE ec427b1f 0d000014 16f6ca16 e4a4066d
83821a0f 0aeaa862 0d000014 4485152d
Mar 01, 11:35:15 Debug IKE 18b6bbcd 0be8a846 9579ddcc 00000014
afcad713 68a1f1c9 6b8696fc 77570100
Mar 01, 11:35:15 Debug IKE resend phase1 packet
c805d78620d54aeb:0000000000000000
Mar 01, 11:35:16 Debug IKE get pfkey ACQUIRE message
Mar 01, 11:35:16 Debug IKE
Mar 01, 11:35:16 Debug IKE 02060003 00260000 00000055 00000000
00030005 ff200000 10020000 0a6905d4
Mar 01, 11:35:16 Debug IKE 00000000 00000000 00030006 ff200000
10020000 44321f17 00000000 00000000
Mar 01, 11:35:16 Debug IKE 00020012 00020200 00000049 00000000
001c000d 20000000 00030000 00000000
Mar 01, 11:35:16 Debug IKE 01000800 00000000 00000001 00000001
00000000 00000000 00000000 00000000
Mar 01, 11:35:16 Debug IKE 00000000 00000000 00000000 00015180
00000000 00007080 00000000 00000000
Mar 01, 11:35:16 Debug IKE 00040000 00000000 010001c0 00000000
00000001 00000001 00000000 00000000
Mar 01, 11:35:16 Debug IKE 00000000 00000000 00000000 00000000
00000000 00015180 00000000 00007080
Mar 01, 11:35:16 Debug IKE 00000000 00000000 000c0000 00000000
01000100 00000000 00000001 00000001
Mar 01, 11:35:16 Debug IKE 00000000 00000000 00000000 00000000
00000000 00000000 00000000 00015180
Mar 01, 11:35:16 Debug IKE 00000000 00007080 00000000 00000000
Mar 01, 11:35:16 Debug IKE suitable outbound SP found:
10.105.5.212/32[0] 192.168.1.0/24[0] proto=any dir=out.
Mar 01, 11:35:16 Debug IKE sub:0xbffff560: 192.168.1.0/24[0]
10.105.5.212/32[0] proto=any dir=in
Mar 01, 11:35:16 Debug IKE db :0x308b48: 192.168.1.0/24[0]
10.105.5.212/32[0] proto=any dir=in
Mar 01, 11:35:16 Debug IKE suitable inbound SP found:
192.168.1.0/24[0] 10.105.5.212/32[0] proto=any dir=in.
Re: Linksys BEFSX41 Connection
by mrfett on 2007-03-02 20:09:57 +0100
Mar 01, 11:35:28 Debug IKE 02060003 00260000 00000055 00000000
00030005 ff200000 10020000 0a6905d4
Mar 01, 11:35:28 Debug IKE 00000000 00000000 00030006 ff200000
10020000 44321f17 00000000 00000000
Mar 01, 11:35:28 Debug IKE 00020012 00020200 00000049 00000000
001c000d 20000000 00030000 00000000
Mar 01, 11:35:28 Debug IKE 01000800 00000000 00000001 00000001
00000000 00000000 00000000 00000000
Mar 01, 11:35:28 Debug IKE 00000000 00000000 00000000 00015180
00000000 00007080 00000000 00000000
Mar 01, 11:35:28 Debug IKE 00040000 00000000 010001c0 00000000
00000001 00000001 00000000 00000000
Mar 01, 11:35:28 Debug IKE 00000000 00000000 00000000 00000000
00000000 00015180 00000000 00007080
Mar 01, 11:35:28 Debug IKE 00000000 00000000 000c0000 00000000
01000100 00000000 00000001 00000001
Mar 01, 11:35:28 Debug IKE 00000000 00000000 00000000 00000000
00000000 00000000 00000000 00015180
Mar 01, 11:35:28 Debug IKE 00000000 00007080 00000000 00000000
Mar 01, 11:35:28 Debug IKE suitable outbound SP found:
10.105.5.212/32[0] 192.168.1.0/24[0] proto=any dir=out.
Mar 01, 11:35:28 Debug IKE sub:0xbffff560: 192.168.1.0/24[0]
10.105.5.212/32[0] proto=any dir=in
Mar 01, 11:35:28 Debug IKE db :0x308b48: 192.168.1.0/24[0]
10.105.5.212/32[0] proto=any dir=in
Mar 01, 11:35:28 Debug IKE suitable inbound SP found: 192.168.1.0/24[0]
10.105.5.212/32[0] proto=any dir=in.
Mar 01, 11:35:28 Debug IKE new acquire 10.105.5.212/32[0]
192.168.1.0/24[0] proto=any dir=out
Mar 01, 11:35:28 Debug IKE (proto_id=ESP spisize=4 spi=00000000
spi_p=00000000 encmode=Tunnel reqid=0:0)
Mar 01, 11:35:28 Debug IKE (trns_id=DES encklen=0
authtype=hmac-md5)
Mar 01, 11:35:28 Debug IKE (trns_id=3DES encklen=0
authtype=hmac-md5)
Mar 01, 11:35:28 Debug IKE (trns_id=AES encklen=256
authtype=hmac-md5)
Mar 01, 11:35:28 Debug IKE (trns_id=AES encklen=192
authtype=hmac-md5)
Mar 01, 11:35:28 Debug IKE (trns_id=AES encklen=128
authtype=hmac-md5)
Mar 01, 11:35:28 Debug IKE in post_acquire
Mar 01, 11:35:28 Debug IKE configuration found for 68.50.31.23.
Mar 01, 11:35:28 Info
IKE request for establishing IPsec-SA was queued
due to no phase1 found.
Mar 01, 11:35:34 Debug IKE msg 5 not interesting
Mar 01, 11:35:35 Debug IKE msg 5 not interesting
Mar 01, 11:35:35 Debug IKE 320 bytes from 10.105.5.212[500] to
68.50.31.23[500]
Mar 01, 11:35:35 Debug IKE sockname 10.105.5.212[500]
Mar 01, 11:35:35 Debug IKE send packet from 10.105.5.212[500]
Mar 01, 11:35:35 Debug IKE send packet to 68.50.31.23[500]
Mar 01, 11:35:35 Debug IKE 1 times of 320 bytes message will be sent to
68.50.31.23[500]
Mar 01, 11:35:35 Debug IKE
Mar 01, 11:35:35 Debug IKE c805d786 20d54aeb 00000000 00000000
01100200 00000000 00000140 0d000034
Mar 01, 11:35:35 Debug IKE 00000001 00000001 00000028 01010001
00000020 01010000 800b0001 800c7080
Mar 01, 11:35:35 Debug IKE 80010001 80030001 80020001 80040001
0d000014 4a131c81 07035845 5c5728f2
Re: Linksys BEFSX41 Connection
by mrfett on 2007-03-02 20:10:31 +0100
Mar 01, 11:35:37 Debug IKE suitable outbound SP found:
10.105.5.212/32[0] 192.168.1.0/24[0] proto=any dir=out.
Mar 01, 11:35:37 Debug IKE sub:0xbffff560: 192.168.1.0/24[0]
10.105.5.212/32[0] proto=any dir=in
Mar 01, 11:35:37 Debug IKE db :0x308b48: 192.168.1.0/24[0]
10.105.5.212/32[0] proto=any dir=in
Mar 01, 11:35:37 Debug IKE suitable inbound SP found: 192.168.1.0/24[0]
10.105.5.212/32[0] proto=any dir=in.
Mar 01, 11:35:37 Debug IKE new acquire 10.105.5.212/32[0]
192.168.1.0/24[0] proto=any dir=out
Mar 01, 11:35:37 Debug IKE (proto_id=ESP spisize=4 spi=00000000
spi_p=00000000 encmode=Tunnel reqid=0:0)
Mar 01, 11:35:37 Debug IKE (trns_id=DES encklen=0
authtype=hmac-md5)
Mar 01, 11:35:37 Debug IKE (trns_id=3DES encklen=0
authtype=hmac-md5)
Mar 01, 11:35:37 Debug IKE (trns_id=AES encklen=256
authtype=hmac-md5)
Mar 01, 11:35:37 Debug IKE (trns_id=AES encklen=192
authtype=hmac-md5)
Mar 01, 11:35:37 Debug IKE (trns_id=AES encklen=128
authtype=hmac-md5)
Mar 01, 11:35:37 Debug IKE in post_acquire
Mar 01, 11:35:37 Debug IKE configuration found for 68.50.31.23.
Mar 01, 11:35:37 Info
IKE request for establishing IPsec-SA was queued
due to no phase1 found.
Mar 01, 11:35:38 Error IKE phase2 negotiation failed due to time up
waiting for phase1. ESP 68.50.31.23[500]->10.105.5.212[500]
Mar 01, 11:35:38 Info
IKE delete phase 2 handler.
Mar 01, 11:35:41 Debug IKE msg 5 not interesting
Mar 01, 11:35:41 Debug IKE msg 5 not interesting
Mar 01, 11:35:48 Error IKE phase2 negotiation failed due to time up
waiting for phase1. ESP 68.50.31.23[500]->10.105.5.212[500]
Mar 01, 11:35:48 Info
IKE delete phase 2 handler.
Mar 01, 11:35:49 Debug IKE get pfkey ACQUIRE message
Mar 01, 11:35:49 Debug IKE
Mar 01, 11:35:49 Debug IKE 02060003 00260000 00000056 00000000
00030005 ff200000 10020000 0a6905d4
Mar 01, 11:35:49 Debug IKE 00000000 00000000 00030006 ff200000
10020000 44321f17 00000000 00000000
Mar 01, 11:35:49 Debug IKE 00020012 00020200 00000049 00000000
001c000d 20000000 00030000 00000000
Mar 01, 11:35:49 Debug IKE 01000800 00000000 00000001 00000001
00000000 00000000 00000000 00000000
Mar 01, 11:35:49 Debug IKE 00000000 00000000 00000000 00015180
00000000 00007080 00000000 00000000
Mar 01, 11:35:49 Debug IKE 00040000 00000000 010001c0 00000000
00000001 00000001 00000000 00000000
Mar 01, 11:35:49 Debug IKE 00000000 00000000 00000000 00000000
00000000 00015180 00000000 00007080
Mar 01, 11:35:49 Debug IKE 00000000 00000000 000c0000 00000000
01000100 00000000 00000001 00000001
Mar 01, 11:35:49 Debug IKE 00000000 00000000 00000000 00000000
00000000 00000000 00000000 00015180
Mar 01, 11:35:49 Debug IKE 00000000 00007080 00000000 00000000
Mar 01, 11:35:49 Debug IKE suitable outbound SP found:
10.105.5.212/32[0] 192.168.1.0/24[0] proto=any dir=out.
Mar 01, 11:35:49 Debug IKE sub:0xbffff560: 192.168.1.0/24[0]
10.105.5.212/32[0] proto=any dir=in
Mar 01, 11:35:49 Debug IKE db :0x308b48: 192.168.1.0/24[0]
10.105.5.212/32[0] proto=any dir=in
Re: Linksys BEFSX41 Connection
by mrfett on 2007-03-02 20:11:11 +0100
Mar 01, 11:35:55 Debug IKE c805d786 20d54aeb 00000000 00000000
01100200 00000000 00000140 0d000034
Mar 01, 11:35:55 Debug IKE 00000001 00000001 00000028 01010001
00000020 01010000 800b0001 800c7080
Mar 01, 11:35:55 Debug IKE 80010001 80030001 80020001 80040001
0d000014 4a131c81 07035845 5c5728f2
Mar 01, 11:35:55 Debug IKE 0e95452f 0d000014 8f8d8382 6d246b6f
c7a8a6a4 28c11de8 0d000014 439b59f8
Mar 01, 11:35:55 Debug IKE ba676c4c 7737ae22 eab8f582 0d000014
4d1e0e13 6deafa34 c4f3ea9f 02ec7285
Mar 01, 11:35:55 Debug IKE 0d000014 80d0bb3d ef54565e e84645d4
c85ce3ee 0d000014 9909b64e ed937c65
Mar 01, 11:35:55 Debug IKE 73de52ac e952fa6b 0d000014 7d9419a6
5310ca6f 2c179d92 15529d56 0d000014
Mar 01, 11:35:55 Debug IKE cd604643 35df21f8 7cfdb2fc 68b6a448
0d000014 90cb8091 3ebb696e 086381b5
Mar 01, 11:35:55 Debug IKE ec427b1f 0d000014 16f6ca16 e4a4066d
83821a0f 0aeaa862 0d000014 4485152d
Mar 01, 11:35:55 Debug IKE 18b6bbcd 0be8a846 9579ddcc 00000014
afcad713 68a1f1c9 6b8696fc 77570100
Mar 01, 11:35:55 Debug IKE resend phase1 packet
c805d78620d54aeb:0000000000000000
Mar 01, 11:35:57 Debug IKE msg 5 not interesting
Mar 01, 11:35:58 Debug IKE get pfkey ACQUIRE message
Mar 01, 11:35:58 Debug IKE
Mar 01, 11:35:58 Debug IKE 02060003 00260000 00000057 00000000
00030005 ff200000 10020000 0a6905d4
Mar 01, 11:35:58 Debug IKE 00000000 00000000 00030006 ff200000
10020000 44321f17 00000000 00000000
Mar 01, 11:35:58 Debug IKE 00020012 00020200 00000049 00000000
001c000d 20000000 00030000 00000000
Mar 01, 11:35:58 Debug IKE 01000800 00000000 00000001 00000001
00000000 00000000 00000000 00000000
Mar 01, 11:35:58 Debug IKE 00000000 00000000 00000000 00015180
00000000 00007080 00000000 00000000
Mar 01, 11:35:58 Debug IKE 00040000 00000000 010001c0 00000000
00000001 00000001 00000000 00000000
Mar 01, 11:35:58 Debug IKE 00000000 00000000 00000000 00000000
00000000 00015180 00000000 00007080
Mar 01, 11:35:58 Debug IKE 00000000 00000000 000c0000 00000000
01000100 00000000 00000001 00000001
Mar 01, 11:35:58 Debug IKE 00000000 00000000 00000000 00000000
00000000 00000000 00000000 00015180
Mar 01, 11:35:58 Debug IKE 00000000 00007080 00000000 00000000
Mar 01, 11:35:58 Debug IKE suitable outbound SP found:
10.105.5.212/32[0] 192.168.1.0/24[0] proto=any dir=out.
Mar 01, 11:35:58 Debug IKE sub:0xbffff560: 192.168.1.0/24[0]
10.105.5.212/32[0] proto=any dir=in
Mar 01, 11:35:58 Debug IKE db :0x308b48: 192.168.1.0/24[0]
10.105.5.212/32[0] proto=any dir=in
Mar 01, 11:35:58 Debug IKE suitable inbound SP found: 192.168.1.0/24[0]
10.105.5.212/32[0] proto=any dir=in.
Mar 01, 11:35:58 Debug IKE new acquire 10.105.5.212/32[0]
192.168.1.0/24[0] proto=any dir=out
Mar 01, 11:35:58 Debug IKE (proto_id=ESP spisize=4 spi=00000000
spi_p=00000000 encmode=Tunnel reqid=0:0)
Mar 01, 11:35:58 Debug IKE (trns_id=DES encklen=0
authtype=hmac-md5)
Mar 01, 11:35:58 Debug IKE (trns_id=3DES encklen=0
authtype=hmac-md5)
Mar 01, 11:35:58 Debug IKE (trns_id=AES encklen=256
Re: Linksys BEFSX41 Connection
by mrfett on 2007-03-02 20:14:41 +0100
I think posting more would be repeating what's already there.
Re: Linksys BEFSX41 Connection
by Dave on 2007-03-03 00:01:54 +0100
[quote author=mrfett link=1171241120/15#15 date=1172862528]I am
using main mode, and I am behind a router. My whole issue is that I can
connect from my neighbor's wireless network next door, but when I go to
my campus or to a cafe, I cannot connect. In both instances I'm behind a
firewall, but something about the public places prevents a connection.
[/quote]
Note that your neighbor's router probably has VPN-passthru enabled; most
home routers do this automatically. The cafe/campus router might not and
that will definitely prevent you from connecting. Or the Cafe/Campus might
have a limit on the number of passthru connections it can support and,
again, you might be over that limit.
For your campus, I'd suggest talking to the network admins and see if they
can tell you any info about VPN passthru or how to create a VPN connection
outbound.
I'd also suggest trying NAT-T Enable but you said you already did that,
right?
Re: Linksys BEFSX41 Connection
by mrfett on 2007-03-03 00:29:59 +0100
Yeah, I did try that. Hmm. So you think most public wifi spots block VPN
traffic? Has that been your experience? It just seems strange other people
aren't complaining about this. I'm tempted to get another brand of router to
try. Well, I appreciate your time. I'll report back if I do get another router to
work so people know not to use this one in this situation.
Re: Linksys BEFSX41 Connection
by Forum Admin on 2007-03-04 14:28:44 +0100
Hi,
I don't think a different router will work better. Telling from the logs, your
router receives the inital packet and sends a reply, which just never arrives,
most probably because it's filtered in the local firewall/router. If possible,
inquiry the local sysadmin about the handling of incoming UDP packets on
port 500.
VPN or IPSec passthru only comes into play once the connection is
established and doesn't work with more than one VPN client in the local
network, therefore I recommend using NAT-T whenever possible (NAT-T
encapsulates the VPN traffic in UDP packets, circumventing the need for
VPN passthru).
My experience with public hotspots differs: VPN with NAT-T works in
almost all cases. So far I only had trouble in hotspots that were part of a
larger network (and at some point in the network, there was a proper
firewall).
Hope this helps,
Christoph
Re: Linksys BEFSX41 Connection
by mrfett on 2007-03-04 17:06:01 +0100
Thanks so much for the explanation, Christoph. That does help explain
what's happening. I'll try out a few more locations and see if it'll work any
better. The campus network is part of a much larger one (I'm at the
University of Maryland in College Park, and there's wifi spread all over the
campus). One question: when I use NAT-T, does it matter if I use Enable,
Force, or Checkpoint?
Re: Linksys BEFSX41 Connection
by Forum Admin on 2007-03-04 23:27:44 +0100
Hi,
when set to enabled, the two peers try to find out if NAT-T is necessary and
supported (i.e. if one of the two peers are in a NATed network and the
remote peers supports NAT-T) - force enforces NAT-T, regardless if it is
really necessary (this is usually the better choice if you know the router
supports NAT-T).
Checkpoint makes only sense if the remote peer is a Checkpoint (VPN-1 for
example) router.
Cheers,
Christoph
Re: Linksys BEFSX41 Connection
by mrfett on 2007-03-05 19:07:29 +0100
Well all i have to say is YOU GUYS ROCK! Indeed, the campus network I was
connecting to did block VPN access. The solution was to use a newer
"secure" network the university set up recently. Once I configured my
system to use the correct network, I was able to connect with IPSecuritas
with no issues. If you hadn't nudged me to look into this, I never would've
found this out. Thanks so much. I still have to figure out the local Panera
(whose coffee I'm addicted to), but this is a huge first step. Many, many
thanks.
IPSecuritas 3.0rc doesn't work with Airport Update
IPSecuritas 3.0rc doesn't work with Airport Update
by bigboy on 2007-02-13 01:26:13 +0100
I have been using 3.0RC successfully until I did a system update to patch an
Airport vulnerability. Now 3.0RC doesn't work. It can log into my VPN server
(Zywall 2), but then as soon as I start exchanging data, the connection
freezes up and ends up taking down the Finder (darn single-threaded
Finder).
I have a MBP (Core Duo) 15" with 2GB of memory running MacOS X 10.4.8 +
all the updates.
Re: IPSecuritas 3.0rc doesn't work with Airport Up
by budy on 2007-02-22 15:34:42 +0100
Hi,
I have just downloaded and installed 3.0rc on my MBP running all updates
and I have no issue at all connecting to our CP VPN-1 via Airport.
Anything in the logs?
Cheers,
Budy
Cannot connect to IPCop
Cannot connect to IPCop
by worcester4x4 on 2007-02-14 09:54:52 +0100
Hi all.
A client wants a roadwarrior connection from his Macbook (OSX10.4.?) to
his office LAN. Firewall is IPCop 1.4.10 (similarish to Smoothwall if that
helps anyone) and the authorisation method is host and user certificates.
I have only recently started dabbling with Macs so am a bit of a novice.
The certificates generated OK on the IPCop box, were parsed OK via
terminal on the MB and imported OK into IPSecuritas.
IPSecuritas runs and IPSec is shown as "up" but the damned red cross won't
go away so there's obviously no connection.
Also whilst IPSecuritas is running the client reports that he cannot access
websites from the MB.
Can someone tell me where the IPSecuritas logfiles are located? And what to
look for in them once I find them?
Any other hints?
Many thanks for your help.
Pete
Re: Cannot connect to IPCop
by worcester4x4 on 2007-02-23 23:19:03 +0100
Update.
The VPN is now fine and the roadwarrior can see the email OK.
However we still can't access the document server because I can't see any
way of putting an IP address into Finder. Does anyone know how, or
alternatively can IPSecuritas preferences be set up to convert a share name
into an IP address?
Pete
Re: Cannot connect to IPCop
by Dave on 2007-02-23 23:46:04 +0100
I connect to Windows shares all the time using the "Connect to Server"
menu item under the Go menu in the Finder. I enter the address like this for
the share "myShare" on machine 192.168.0.232:
smb://192.168.0.232/myShare
You can also tell IPSecuritas to use an alternate DNS server for things inside
the tunnel. There have been some reports that this has problems but it
might do what you need.
Problem connecting to Juniper Netscreen
Problem connecting to Juniper Netscreen
by antg on 2007-02-18 01:09:35 +0100
Hi there,
I have setup a VPN connection between IPsecuritas and a Netscreen 25,
sometimes the connection works really well, and other times it seems to
stall a lot, and I have to disconnect and reconnect the tunnel. When this
happens I see the message "msg 'x' not interesting" in the Log, and most of
the time the msg number is 5.
Just wondering if anybody knows where to start looking to try and fix this,
and whether it's likely a problem with the NetScreen or with my config of
IPsecuritas.
When this happens, I can still ping the WAN interface of the netscreen, so I
don't think it's related to my internet connection..
Cheers,
Ant.
Re: Problem connecting to Juniper Netscreen
by houser on 2007-02-19 07:52:36 +0100
We had a VPN tunnel set up for VPN Tracker.
Setting the latest IP Securitas to exactly the same setting
works and is a good starting point.
you can probably d-loadmanuals for that at the VPN tracker site.
Hope this helps
jtm
Re: Problem connecting to Juniper Netscreen
by Rob_Z on 2007-03-21 20:59:31 +0100
[quote author=antg link=1171757375/0#0 date=1171757375]Hi there,
I have setup a VPN connection between IPsecuritas and a Netscreen 25,
sometimes the connection works really well, and other times it seems to
stall a lot, and I have to disconnect and reconnect the tunnel.[/quote]
Hello,
Can you share your Netscreen configuration ?
TIA
-Rob
Connect to Symantec VPN 200R
Connect to Symantec VPN 200R
by JCSF on 2007-02-22 13:14:21 +0100
I'm connecting to a network through a Symantec Firewall VPN 200R using
the client software in Windows, and I want to connect from a Mac, but the
setup of the client it's different than the IPSecuritas/Mac VPN. How can I
configure. Thanks.
Watchguard Firebox Success !!!
Watchguard Firebox Success !!!
by hb9wad on 2007-02-24 14:47:42 +0100
With help of an article from Watchguard support site
https://www.watchguard.com/support/advancedfaqs/mac_vpntrackerfb7x.asp#mac5f
I have managed to connect my
Apple iMac 24"
Mac OS X 10.4.8
with
IPsecuritas 3.0rc Build 1040
behinde a
Zyxel Prestige 652-R13 ADSL Router/Firewall
ZyNOS F/W Version: V3.40(FW.7) | 6/18/2003
DSL FW Version: Alcatel, Version 4.9.10
with NAT and dynamic external IP Address
to our
Watchguard Firebox X700
WFS 7.41
with NAT and fix public external IP Addres.
On the Firebox configure 'Network -> Branche Office VPN -> Manual
IPSec...' .
Create a new gateway with parameters:
Key Negotiation Type:
isakmp (dynamic)
Remote ID Type:
User Name
Gateway IP Address:
<empty>
Gateway Identifier:
[email protected]
Shared Key:
mypassword
Phase 1 Settings:
Local ID Type:
IP Address
Authentication:
SHA1-HMAC
Encryption:
DES-CBC
Diffie-hellmann Group:
1
Enable Perfect Forward Secrcy:
OFF
Enable Aggressive Mode:
ON
Negotiation Timeout:
0 kB ; 8 hours
Create a new tunnel and assign the gateway created before:
Phase 2 Settings:
Type:
ESP (Encapsulated Security Payload)
Authentication:
SHA1-HMAC
Encryption:
3DES-CBC
Foce key expiration:
ON
every
0 kB
every
24 hours
Create a new IPSec Routing Policy:
Local:
Network:
company network>
Remote:
Host:
<IP Subnet / SubnetBits of
<free IP Addr out of unused
Netgear FVG318
Netgear FVG318
by colinresys on 2007-02-25 18:52:39 +0100
Has anyone had any luck with the Netgear FVG318? If so, could you please
share your config?
Colin
problems connecting to rv042
problems connecting to rv042
by mstoops on 2007-02-26 06:49:48 +0100
I'm having a connection issue with IPSecuritas 3.0rc (Mac OS X 10.4.8) to a
Linksys rv042. I've successfully VPN'd over a dial-up account (thanks to
these forums); the issue is I cannot connect over a DSL connection from
behind a router using NAT. The main error I'm getting in the rv042 log file
is this:
Cannot respond to IPsec SA request because no connection is known for
10.0.1.0/24===111.222.333.444...555.666.777.888[@dusty.local]===192.168.0.2/32
(Obviously the central IP addresses are bogus to hide my network.)
I've tried enabling NAT-T with no effect.
Here are my IPSecuritas settings:
-----------------------------------General:
Remote IPSec Address: <rv041 address>
Local Side:
Endpoint Mode: Network
IP Address: <empty>
Remote Side:
Endpoint Mode: Network
Network Address 10.0.1.0/24
Phase 1:
Lifetime: 3600s
DH Group: (5)
Encryption: AES 256
Auth: SHA-1
Exch Mode: Aggressive
Proposal Check: Strict
Nonce Size: 16
Phase 2:
Lifetime: 3600s
PFS Group: (5)
Encryption: AES 256
Auth: SHA-1
ID:
Local ID: FQDN
dusty.local
Remote ID: Address
Auth Method: PSK
Options (checked):
IPSec DOI
SIT_IDENTITY_ONLY
Initial Contact
Generate Policy
Support Proxy
Req Cert
Send Cert
-------------------------------All the settings on the rv042 seem to be properly set (they work when I VPN
over dialup), so I don't think the issue lies there.
Any help would be greatly appreciated. I'm not an expert at this stuff so I'm
Working -- a new question
by mstoops on 2007-03-05 04:12:57 +0100
Ok, so I've gotten this working, although the solution not perfect. I found
that when I put the public IP address (public side of NAT router) into
IPSecuritas' "Local Side IP Address," everything connects perfectly. It's
round-about because I have to input the public IP every time I want to set
up a VPN, which is a little frustrating when I'm moving around to different
locations.
New Question: can anyone tell me how I can make this work without having
to find and enter the public IP every time? (I find it using a Dashboard
widget called Network Stat: http://www.widgetschmie.de/widgets
/NetworkStat/)
Re: problems connecting to rv042
by mstoops on 2007-03-06 22:36:57 +0100
This is fun, I seem to be having a great running dialog with myself on this.
Anyway, I seem to have figured the latest issue out -- no more need to put
in the local public IP address. This seems to require two (actually, 3) things:
0. Make sure you have the latest firmware update, currently 1.3.8.2. Not
sure if this is necessary but I don't remember the following config option.
1. On the rv042, within the VPN Tunnel configuration, click on the
"Advanced +" button at the bottom and check the "NAT Traversal"
checkbox.
2. In your IPSecuritas connection configuration, me sure that Options -->
NAT-T is Disabled.
Worked like a charm, connected from a local cafй without having to modify
IPSecuritas' configuration.
Now, I want to make this work using an Exchange Mode of Main, since it's
supposed to be more secure than Aggressive. Anyone? Yeah, I thought so
;D
Learning as I go. Hope this helps someone.
v3.0 RC Menu Item
v3.0 RC Menu Item
by psfolliesmis on 2007-02-26 22:42:28 +0100
I have installed the 3.0 RC on a couple of machines, and it seems that the
menu item will not stay on the menu bar after a logout. When I log back in,
the menubar item will be gone, and if I open IPSec and go to preferences,
the Show Status in Menubar is still checked. I have to check and uncheck to
get it to reappear, then it is gone the next time I restart. Is this just me?
Client Virtual IP address
Client Virtual IP address
by colinresys on 2007-02-28 11:37:54 +0100
It seesm that to connect to most ProSafe Netgear routers IPSecuritas has to
be configured with a virtual IP address that won't be hidden by any
intervening NAT device. I can't find instructions for this, using either
IPSecuritas or the command line. Has anyone any idea of how to do it?
Re: Client Virtual IP address
by senzex on 2007-04-20 19:16:35 +0200
in ipsecuritas enter anything you want in the field :
GENERALTAB->Local Side - Endpoint mode (HOST) : (192.168.0.6 or
10.10.2.3 or whatever)
in the Netgear (FVS124G for me) in the VPN POLICIES->traffic selector->
remote IP->choose single address and fill in the IP (192.168.0.6 or
10.10.2.3 or whatever).
by the way avoid same subnets : I means if at your location your are on
192.168.[b]X[/b].[b]z[/b], just choose anything but the [b]X[/b].
so if you have a local IP 192.168.[b]0[/b].1 then choose 192.168.[b]1[/b].1
for example.
that's all.
hope it helps.
Need L2TP Support
Need L2TP Support
by omnibyte on 2007-03-01 17:07:46 +0100
I have a Sonicwall Pro 3040 running, with L2TP VPN Server Setup... The
Windows Clients can establish the VPN connection without any problems
with their build-in VPN client...
I know, the build in VPN Client of the latest OS-X will just work with the OS
X Server...
Is there a way to get L2TP getting working on OS X with a SonicWall L2TP
Server?!?!
If someone can help me out, i would give support on the Sonicwall side to
test this stuff!!!!
Cheers
Thomas from Switzerland
Re: Need L2TP Support
by cwolf on 2007-03-22 03:32:19 +0100
Funny, I have the exact opposite issue connecting to my Sonicwall L2TP
Server.
L2TP works perfect on my 10.4.9 clients using the built-in client. Windows
boxes cannot connect.
Re: Need L2TP Support
by cwolf on 2007-03-22 03:35:48 +0100
you said :
I know, the build in VPN Client of the latest OS-X will just work with the OS
X Server... :
Umm, this couldn't be further from the truth. The built-in client on the mac
works with almost any PPTP or L2TP solution out there. It works way better
than the built in windows client, and is always consistent. I say almost
because I haven't tested all of them, but I have yet to have a VPN
(L2TP/PPTP using built-in, IPSec using IPSecuritas) that I can't connect to.
ZyXEL ZyWALL 5
ZyXEL ZyWALL 5
by omega_red on 2007-03-15 12:14:10 +0100
Does anyone know how to configure the ZyWALL?
Ive tried it with VPN Tracker and it worsk great! (For 3mins than the demo
version expieres the connection)
Ive copied all settings from VPN Tracker and connected IPsecuritas but i
keep getting the following errors:
[list][*]Warning: ignore INTIAL-CONTACT notification, becouse it is only
accepted after phase1[/list]
[list][*]Error: No SIG was passed, hybrid auth is enabled but peer is not
Xauth compliant[/list]
[list][*]Error: phase2 negotiation failed due to time up waiting for phase1.
ESP (remote vpn server internet-ip)[500]->(local internet-ip)[500][/list]
Can anyone help? thxx!!
Re: ZyXEL ZyWALL 5
by prahn on 2007-03-16 07:50:52 +0100
Hi!
Sounds definitely that IPSecuritas wants to connect with Xauth
authentication, but the ZyWall doesn't like it.
I searched for "Hybrid Auth" and "Xauth" in the IPSecuritas config, but
diddn't find anything.
I also have problems with my ZyWall 2 and do not find a solution.
See here: [url]http://www.lobotomo.com/cgi-bin
/yabb/YaBB.pl?board=IPSecuritas;action=display;num=1173990319[/url]
Maybe buying VPN Tracker is easier... but I want a manu item like
IPSecuritas provides!!
Greets,
prahn
Re: ZyXEL ZyWALL 5
by Forum Admin on 2007-03-17 01:36:06 +0100
Hi,
the following settings will work with Zyxel's ZyWall series:
General:
Exchange Mode: Main
Proposal Check: Obey
Nonce Size: 16
Phase 1:
Life time: 8 hours (or less)
DH Group: Mod768
Encryption: DES
Authentication: MD5
Phase 2:
Life time: 8 hours (or less)
PFS Group: Mod768
Encryption: 3DES
Authentication: SHA-1
Identification:
Local Identification: FQDN (enter a name)
Remote Identification: Address
Authentication: Preshared Key (enter a password)
Options:
IPSec DOI: Enabled
SIT_IDENTITY_ONLY: Enabled
Verify Identifier: Disabled
Initial Contact: Enabled
Passive: Disabled
MODE_CFG: Disabled
NAT-T: Enabled
Generate Policy: Disabled
Support Proxy: Disabled
Request Certificate: Enabled
Verify Certificate: Disabled
Send Certificate: Enabled
Unique SA: Disabled
On The ZyWall, use the following settings:
Gateway Policy:
NAT Traversal: Enabled
My ZyWALL Adress: 0.0.0.0
Remote Gateway Address: 0.0.0.0
Enabled Preshared Key (enter the same password as in IPSecuritas)
Local ID Type: IP (enter 0.0.0.0)
Peer ID Type: DNS (enter the same name as in IPSecuritas)
Negotiation Mode: Main
Encrption Algorithm: DES
Authentication Algorithm: MD5
SA Life Time: 28800
Key Group: DH1
Enabled Multiple Proposals: Disabled
Network Policy:
Active: Enabled
Name: anything
Protocol: 0
Re: ZyXEL ZyWALL 5
by Dave on 2007-03-17 22:29:50 +0100
[quote author=prahn link=1173957250/0#1 date=1174027852]I searched
for "Hybrid Auth" and "Xauth" in the IPSecuritas config, but diddn't find
anything.[/quote]
XAuth is in the release candidate for 3.0 (RC1) and can be found on the ID
tab as one of the choices in the Authentication Method dropdown. Both
Xauth PSK and Hybrid are there along with PSK and Certificate.
Re: ZyXEL ZyWALL 5
by omega_red on 2007-03-22 17:25:49 +0100
[quote author=Forum Admin link=1173957250/0#2 date=1174091766]Hi,
the following settings will work with Zyxel's ZyWall series:
General:
Exchange Mode: Main
Proposal Check: Obey
Nonce Size: 16
Phase 1:
Life time: 8 hours (or less)
DH Group: Mod768
Encryption: DES
Authentication: MD5
Phase 2:
Life time: 8 hours (or less)
PFS Group: Mod768
Encryption: 3DES
Authentication: SHA-1
Identification:
Local Identification: FQDN (enter a name)
Remote Identification: Address
Authentication: Preshared Key (enter a password)
Options:
IPSec DOI: Enabled
SIT_IDENTITY_ONLY: Enabled
Verify Identifier: Disabled
Initial Contact: Enabled
Passive: Disabled
MODE_CFG: Disabled
NAT-T: Enabled
Generate Policy: Disabled
Support Proxy: Disabled
Request Certificate: Enabled
Verify Certificate: Disabled
Send Certificate: Enabled
Unique SA: Disabled
On The ZyWall, use the following settings:
Gateway Policy:
NAT Traversal: Enabled
My ZyWALL Adress: 0.0.0.0
Remote Gateway Address: 0.0.0.0
Enabled Preshared Key (enter the same password as in IPSecuritas)
Local ID Type: IP (enter 0.0.0.0)
Peer ID Type: DNS (enter the same name as in IPSecuritas)
Negotiation Mode: Main
Encrption Algorithm: DES
Authentication Algorithm: MD5
SA Life Time: 28800
Key Group: DH1
Enabled Multiple Proposals: Disabled
Network Policy:
Active: Enabled
Name: anything
Protocol: 0
Re: ZyXEL ZyWALL 5
by omega_red on 2007-03-22 18:25:29 +0100
It works! But i had to turn of the xauth.
My settings: IPSecuritas 2.2
[img]http://www.vanheest.nl/pf/1.tiff[/img]
10.0.0.20 is a fake address ofcourse ;D
[img]http://www.vanheest.nl/pf/2.tiff[/img]
[img]http://www.vanheest.nl/pf/3.tiff[/img]
[img]http://www.vanheest.nl/pf/4.tiff[/img]
[img]http://www.vanheest.nl/pf/5.tiff[/img]
Re: ZyXEL ZyWALL 5
by omega_red on 2007-03-22 19:08:50 +0100
Ive managed to get it working on both 2.2 and 3.0rc, but i still had to
disable xauth in both versions, so that was the couse of the error's
described in my first post. I hope it will be able to use xauth when the final
version arrives.
thanks for the great app!
Re: ZyXEL ZyWALL 5
by nob on 2007-05-27 22:25:12 +0200
I didnt get it to work. I am behind a Zywall 5 on the net, trying to connect
to the destination Zywall. Used the Settings your Guys getting to work.
May 27, 22:21:20 Error IKE Foreground mode.
May 27, 22:21:21 Error IKE inappropriate sadb acquire message passed.
May 27, 22:21:22 Warning IKE ignore INITIAL-CONTACT notification,
because it is only accepted after phase1.
May 27, 22:21:22 Error IKE mismatched ID was returned.
May 27, 22:21:22 Error IKE failed to pre-process packet.
May 27, 22:21:22 Error IKE phase2 negotiation failed.
May 27, 22:21:26 Error IKE failed to pre-process packet.
May 27, 22:21:33 Error IKE inappropriate sadb acquire message passed.
May 27, 22:21:34 Error IKE failed to pre-process packet.
May 27, 22:21:43 Error IKE inappropriate sadb acquire message passed.
May 27, 22:21:50 Error IKE failed to pre-process packet.
May 27, 22:21:53 Error IKE 217.173.146.167 give up to get IPsec-SA
due to time up to wait.
I tried different Settings, mostly i get the mismatched ID.
Zywall Log says:
7
2007-05-27 21:21:19
Receive IPSec packet, but no corresponding
tunnel exists
87.175.225.55
217.173.146.167
IPSEC
8
2007-05-27 21:21:13
IKE Packet Retransmit
217.173.146.167
87.175.225.55
IKE
Re: ZyXEL ZyWALL 5
by bernard on 2007-07-01 00:37:19 +0200
After lots of trial-and-error, I managed to establish a VPN between my
MacBook Pro/IPsecuritas and remote Zywall 5. Very cool :).
However, there is one problem: while the VPN tunnel is established, the
Zywall log shows:
[code]Receive IPSec packet, but no corresponding tunnel exists[/code]
exactly every 20 seconds, even when I don't do anything with this tunnel.
These are the only errors in the Zywall log.
Here is the IPSecuritas log:
[code]
IPSecuritas 3.0 build 1693, Sun May 27 21:43:28 MVT 2007, nadig
Darwin 8.9.1 Darwin Kernel Version 8.9.1: Thu Feb 22 20:55:00 PST 2007;
root:xnu-792.18.15~1/RELEASE_I386 i386
Jun 30, 18:29:32 Info
APP IKE daemon started
Jun 30, 18:29:32 Info
APP IPSec started
Jun 30, 18:29:32 Error IKE Foreground mode.
Jun 30, 18:29:32 Info
IKE @(#)ipsec-tools CVS (http://ipsectools.sourceforge.net)
Jun 30, 18:29:32 Info
IKE @(#)This product linked OpenSSL 0.9.7l 28
Sep 2006 (http://www.openssl.org/)
Jun 30, 18:29:32 Info
IKE Reading configuration from "/Library
/Application Support/Lobotomo Software/IPSecuritas/racoon.conf"
Jun 30, 18:29:32 Info
IKE Resize address pool from 0 to 255
Jun 30, 18:29:33 Info
APP Initiated connection bernard-wpb
Jun 30, 18:29:33 Error IKE inappropriate sadb acquire message passed.
Jun 30, 18:29:33 Warning IKE ignore INITIAL-CONTACT notification,
because it is only accepted after phase1.
Jun 30, 18:29:35 Warning IKE attribute has been modified.
Jun 30, 18:32:47 Info
APP IPSec stopping
Jun 30, 18:32:48 Info
APP IKE daemon terminated
[/code]
Any idea? I did not enable connection check (of course).
Thanks,
Bernard
Re: ZyXEL ZyWALL 5
by nob on 2007-12-09 16:06:42 +0100
bump
Is there a possibility to get my errors why connecting via WLAN?
Re: ZyXEL ZyWALL 5
by rmarinheira on 2008-04-23 12:40:37 +0200
Hi!
I get this error on Zywall 5:
2008-04-23 10:39:06 vs. My Remote [0.0.0.0]-[0.0.0.0]
2008-04-23 10:39:06 Recv ID: SINGLE, [192.168.1.38]-[192.168.1.38]
2008-04-23 10:39:06 [ID] : Rule [] Verifying Remote ID failed:
2008-04-23 10:39:03 Receive IPSec packet, but no corresponding tunnel
exists (Repeated: 18)
2008-04-23 10:39:00 IKE Negotiation is in process
What should be wrong?
Regards
Re: ZyXEL ZyWALL 5
by inky on 2008-11-07 15:04:43 +0100
I get this same error on my P-662HW-D1 (not sure if this is a Zywall 5
device?)
The ID settings available on the Zyxel are only IP, DNS and Email.
Does anybody know what I need to use in IPSecuritas to align with any of
the above?
Ta.
IPSecuritas to Sonicwall doesn't delete IPSec SA
IPSecuritas to Sonicwall doesn't delete IPSec SA
by Manuel on 2007-03-15 17:54:01 +0100
I'm having a problem with connecting IPSecuritas 3.0RC to a Sonicwall Pro
3060 with Enhanced firmware 3.2.0.3. I'm connecting to the Sonic's "WAN
GroupVPN" policy using XAUTH and a pre-shared secret.
The connection works very well. The problem only shows up when
disconnecting (stopping) the tunnel: according to the firewall log,
IPSecuritas apparently only sends an "IKE SA delete request", without
sending an "IPSec SA delete request" first (OTOH, Sonic's Global VPN client
does). The result is that the tunnel remains active indefinitely on the
Sonicwall.
If I now try connecting again, it will somehow connect, but the connection
won't work, until I manually trigger a "renegotiate connection" on the
Sonicwall and try again.
Is there a way to tell IPSecuritas to send that "IPSec SA delete request" as
well? Maybe some checkbox in the "options" tab that I missed?
Thanks
-Manuel
RC1 and ZyWall P2
RC1 and ZyWall P2
by prahn on 2007-03-15 21:25:19 +0100
The new IPSecuritas looks very nice, especially the menu item!
Thanks for the good work!
When trying to connect to our new Zywall 2 Plus I get teh following errors:
Mar 15, 21:19:28 Error IKE Foreground mode.
Mar 15, 21:19:29 Warning IKE remote address mismatched.
db=2.3.4.5[500], act=2.3.4.5[58137]
Mar 15, 21:19:30 Warning IKE remote address mismatched.
db=2.3.4.5[500], act=2.3.4.5[58137]
Mar 15, 21:19:30 Error IKE ignore information because ISAKMP-SAhas
not been established yet.
Mar 15, 21:19:30 Warning IKE remote address mismatched.
db=2.3.4.5[500], act=2.3.4.5[58137]
Mar 15, 21:19:30 Error IKE ignore information because ISAKMP-SAhas
not been established yet.
Mar 15, 21:20:00 Error IKE phase2 negotiation failed due to time up
waiting for phase1. ESP 2.3.4.5[500]->2.3.4.5[500]
I replaced our public IP with "2.3.4.5"
What's wrong here? I tried so much varieties!
Connecting with the VPN Tracker Demo works!?!
Pls help! Thx.
Re: RC1 and ZyWall P2
by Forum Admin on 2007-03-17 01:36:27 +0100
Hi,
the following settings will work with Zyxel's ZyWall series:
General:
Exchange Mode: Main
Proposal Check: Obey
Nonce Size: 16
Phase 1:
Life time: 8 hours (or less)
DH Group: Mod768
Encryption: DES
Authentication: MD5
Phase 2:
Life time: 8 hours (or less)
PFS Group: Mod768
Encryption: 3DES
Authentication: SHA-1
Identification:
Local Identification: FQDN (enter a name)
Remote Identification: Address
Authentication: Preshared Key (enter a password)
Options:
IPSec DOI: Enabled
SIT_IDENTITY_ONLY: Enabled
Verify Identifier: Disabled
Initial Contact: Enabled
Passive: Disabled
MODE_CFG: Disabled
NAT-T: Enabled
Generate Policy: Disabled
Support Proxy: Disabled
Request Certificate: Enabled
Verify Certificate: Disabled
Send Certificate: Enabled
Unique SA: Disabled
On The ZyWall, use the following settings:
Gateway Policy:
NAT Traversal: Enabled
My ZyWALL Adress: 0.0.0.0
Remote Gateway Address: 0.0.0.0
Enabled Preshared Key (enter the same password as in IPSecuritas)
Local ID Type: IP (enter 0.0.0.0)
Peer ID Type: DNS (enter the same name as in IPSecuritas)
Negotiation Mode: Main
Encrption Algorithm: DES
Authentication Algorithm: MD5
SA Life Time: 28800
Key Group: DH1
Enabled Multiple Proposals: Disabled
Network Policy:
Active: Enabled
Name: anything
Protocol: 0
Re: RC1 and ZyWall P2
by prahn on 2007-03-17 08:29:50 +0100
Hi!
Thanks a lot for your detailed answer. But this did not help... :-[
No specific error, but also no connection! Here is the actual log:
Mar 17, 08:27:32 Info
APP IPSec started
Mar 17, 08:27:32 Error IKE Foreground mode.
Mar 17, 08:27:32 Info
IKE @(#)ipsec-tools CVS (http://ipsectools.sourceforge.net)
Mar 17, 08:27:32 Info
IKE @(#)This product linked OpenSSL 0.9.7l 28
Sep 2006 (http://www.openssl.org/)
Mar 17, 08:27:32 Info
IKE Reading configuration from "/Library
/Application Support/Lobotomo Software/IPSecuritas/racoon.conf"
Mar 17, 08:27:32 Info
IKE Resize address pool from 0 to 255
Mar 17, 08:27:38 Info
IKE the packet is retransmitted by
2.3.4.5[43397].
Mar 17, 08:27:38 Error IKE ignore information because ISAKMP-SAhas
not been established yet.
Mar 17, 08:27:38 Error IKE ignore information because ISAKMP-SAhas
not been established yet.
:'( :'( :'( :'(
Re: RC1 and ZyWall P2
by Forum Admin on 2007-03-17 20:11:06 +0100
Hello,
please set the log level to Debug (in IPSecuritas' preferences). Could you
also provide a log from the ZyWall?
Thanks,
Christoph
Re: RC1 and ZyWall P2
by prahn on 2007-03-17 20:38:33 +0100
Hi!
Thanks for your help, I will e-mail the Log-files to you.
Re: RC1 and ZyWall P2
by omega_red on 2007-03-23 22:58:45 +0100
concider reading my topic about the zywall 5, perhaps it helps.
xauth does not work in combination with te zywall in my case.
Netgear FVS114 and IPSecuritas
Netgear FVS114 and IPSecuritas
by ckofer on 2007-03-22 18:59:16 +0100
Does anyone here have these working together? I tried the search feature
on the forum but found nothing (not even on the term netgear).
Thanks in advance.
Chris in NH (USA)
Re: Netgear FVS114 and IPSecuritas
by uocooper on 2007-10-26 06:46:40 +0200
I have it working with firmware V1.1_01. I originally had problems getting
IPSecuritas to work because I had also installed VPN Tracker. Once I
completely uninstalled VPN Tracker it worked great.
Coneecting to a Linksys WRVS4400N?
Coneecting to a Linksys WRVS4400N?
by croatoan on 2007-03-24 15:55:06 +0100
Uhm, where to begin?
I am using the QuickVPN setup on the router and all I get is the yellow dot
on IPSecuritas.
Any ideas?
Re: Coneecting to a Linksys WRVS4400N?
by DistortedLoop on 2007-04-15 09:02:47 +0200
[quote author=croatoan link=1174748106/0#0 date=1174748106]Uhm,
where to begin?
I am using the QuickVPN setup on the router and all I get is the yellow dot
on IPSecuritas.
Any ideas?[/quote]
You cannot use QuickVPN settings.
I just finally got my WRVS4400N working with a MacBookPro by using
ipsecuritas.
The short version is: on the VPN tab, select IPSEC, and then create a new
tunnel entry with a unique name.
Local security group is your LAN ip series (ie., WRVS4400N defaults to
192.168.1.0 and 255.255.255.0).
Assuming your dialing in from various locations, set Remote Security group
and gateway to "any."
Key maanagement is Auto, Encryption 3DES, Authentication SHA1, PFS
enable, enter your preshared key, key lifetime 28800 secs.
Save the configuration, hit okay through the warning about using "any" not
working with QuickVPN.
Click Advanced Settings tab.
Operation mode = main.
Local and Remote identity use the ip address circles on both.
Phase 1 encryption = 3DES and SHA1 with 1024-bit and 3600 sec.
Phase 2 = #DES and SHA1, PFS enable, 768-bit, key life 28800.
Save settings.
In IPSECURITAS version 3 setup as follows:
General Tab - enter ip address of the WRVS4400N's internet presence.
Local side is Host, leav ip addres blank
Remot side is Network and input the 192.168.10, CIDR=24
Phase1 tab should match what's on the advanced settings of the router
listed above, you can leave proposal check on claim and nonce size as 16.
Phase2 tab match to the router as well.
ID tab = Address in both the identifiers; Authenitcation is your Presharked
Key and password.
Options tab you shouldn't need to touch, but you can enable NAT-T and
add a keep alive ping if you want.
That's good enough to get me a green light on the connection on the mac,
and an "up" status in the VPN's web interface.
I'm able to ping known ip addresses on the internal network, but no joy in
seeing network shares. I'll post about that in another thread.
Re: Coneecting to a Linksys WRVS4400N?
by croatoan on 2007-04-15 13:50:39 +0200
Thank you!
I ditched the Linsys WRVS4400N after calling them when two MacBooks in
our office were losing connectivity while the PCs were not. They only repled
"Well, I don't really know much about Macs" and without trying to transfer
me to someone who did.
I bought an Apple Express and it works great. I am going to use a G4
running IPSecuritas.
Your tips on the settings help a lot!
Re: Coneecting to a Linksys WRVS4400N?
by DistortedLoop on 2007-04-15 17:01:50 +0200
[quote author=croatoan link=1174748106/0#2 date=1176637839]Thank
you!
I ditched the Linsys WRVS4400N after calling them when two MacBooks in
our office were losing connectivity while the PCs were not. They only repled
"Well, I don't really know much about Macs" and without trying to transfer
me to someone who did.[/quote]
You're welcome; wish I'd been more timely in figuring this out for both our
sakes. They didn't offer to transfer you to someone who knows anything
about Macs because no one at Linksys knows, or even cares about Macs.
I've noticed that with the router set to mixed g/n speeds, that both our Mac
and PC laptops drop connections, or slow down to 1mbps connections,
which is very frustrating. We switched them to our old Linksys WRT54g
routers set up as Access Points (using DD-WRT firmware) and they get rock
solid connectons again. In N-only mode, the WRVS4400n doesn't seem to
have the problem.
To be fair to Linksys, from my web searches looking for an alternative to
the WRVS4400n, I don't think any brand does care about Macs for Draft-N
class devices. I could not find a single device to get N-speed service on my
MacBookPro - I had to resort to stealing the Airport Extreme 802.11n board
out of my MacPro desktop and taking apart my laptop to replace the older
model with that one (works great, but that's another story).
There's certainly a lack of interest in the Mac community for this
WRVS4400n device - and given some of the hassles of setting this thing up,
not sure many will bother with it. The built in VPN (ipsec) and gigabit make
it, in theory, a sweet 802.11n class device - much better than Apple's
Airport Extreme Base Station AEBS which lacks gigabit ethernet and only
does passthrough on the VPN. I was tempted to take mine back, but I think
I've had it longer than the return period, and with things started to gel, I'm
starting to be satisfied with it.
[quote]I bought an Apple Express and it works great. I am going to use a G4
running IPSecuritas.
Your tips on the settings help a lot![/quote]
Did you buy the Express or the new Airport Extreme Base Station (AEBS)?
The Express is the little $99 thing about the size of a deck of cards. I have
the new AEBS in our mix; this device only supports VPN passthrough, and
there appears to be issues with that as seen on this Apple Support Thread:
http://discussions.apple.com/thread.jspa?messageID=4046689
Depending on what you'll be using to actually host the VPN service, you
could probably just use OS X's built-in client rather than needing
ipsecuritas.
Re: Coneecting to a Linksys WRVS4400N?
by croatoan on 2007-04-17 01:28:15 +0200
Yeah, I got the AEBS in place of the WRVS4400n. I like the AEBS ALOT more
then the WRVS4400n. The set up interface is so much better. I knew about
the gigabit ethernet but I have a gigabit switch that they run through so
that was not a big deal. It is a 4 person real estate office.
I a Customer Support Engineer for Cisco Systems back in 1996-99. We used
to care about all our customers. Also Cisco was actually an all Apple outfit
back then but in 2000 they went to the dark side. If we did not know
something we used to walk around to findsomeone who did. I was hoping
since they bought Linksys they would have aquired some of that attitude. I
guess not.
Re: Coneecting to a Linksys WRVS4400N?
by DistortedLoop on 2007-04-18 15:45:47 +0200
So, was your purpose in trying the 4400N to get 802.11n, or to get a
hardware VPN solution. If 802.11, the AEBS sure works better with Macs in
terms of connection speed and data throughput, but if you were after VPN,
AEBS is only passthrough, so how are you protecting your LAN from the
WAN side?
p.s. - on a side note, I think yahoo mail is killing email notifications from
this forum as spam - they're not even making it into my junk folder. Can
someone post the email address they come from so I can add it to my
address book? Or does that feature not work here?
Re: Coneecting to a Linksys WRVS4400N?
by croatoan on 2007-04-18 15:59:02 +0200
>So, was your purpose in trying the 4400N to get 802.11n, or to get a
hardware VPN solution.
I wanted it all! I was hoping it would be a complete solution. The 4400N
said nothing about Macs not being able to connect. You would think that a
VPN was a VPN. :-? I remember the day when an RFC was an RFC.
As far as protection, I have not set up VPN or anything yet. The AEBS has a
decent firewall.
Re: Coneecting to a Linksys WRVS4400N?
by DistortedLoop on 2007-04-18 23:12:25 +0200
Yeah, we all want it all. ;-)
In retrospect, now that I've gotten VPN to work with the Mac and the
4400N, I have no regrets, and it seems easy now. IPsec has a bit of a
reputation as being "voodoo" or "black magic" to set it up. The problem
with our Macs is that the Mac only supports L2 or PPTP vpn out of the
operating system, hence the need the third party stuff. That's a Mac issue,
not the WRVS4400N's problem. Part of the allure of Linksys products was
the QuickVPN solution which is supposed to make it an idiot-proof
connection; and to Linksys's defense I'll say that the box does say Windows
under system requirements.
Like I said, once I figured out that the trick was just getting something like
IPSecuritas or VPNTracker on the same page as Linksys, it's a no-brainer
now. Hindsight is 20/20, though. I have to go to the Linksys forums and
correct some posts I made stating that IPsecuritas wouldn't work with the
4400N. It might not have worked with the old version; I am using the
newer one.
I have both the AEBS and 4400N in the mix. Both have issues, but both are
very good at what they do in terms of the things they do right.
Re: Coneecting to a Linksys WRVS4400N?
by mdaitzman on 2007-04-25 06:31:43 +0200
Thank you thank you thank you thank you thank you . . . . . .
I've been banging my head against this for a few weeks . . . . I'd just about
given up when I saw your post and - hurray!!!! It worked.
Thanks again!
Re: Coneecting to a Linksys WRVS4400N?
by mdaitzman on 2007-04-25 16:16:51 +0200
Hmm - worked last night from home (vpn and my PC on a switch both
running PPOE.)
When I got the office, different internet connectin (both Verizon FIOS) and
tried to connect I received the following:
IPSecuritas 3.0rc build 1040, Fri Dec 1 21:00:13 CET 2006, nadig
Darwin 8.8.3 Darwin Kernel Version 8.8.3: Wed Oct 18 21:57:10 PDT 2006;
root:xnu-792.15.4.obj~4/RELEASE_I386 i386
Apr 25, 09:55:58 Error IKE Foreground mode.
Apr 25, 09:56:09 Error IKE fatal INVALID-ID-INFORMATION notify
messsage, phase1 should be deleted.
Apr 25, 09:56:28 Error IKE fatal INVALID-MESSAGE-ID notify messsage,
phase1 should be deleted.
Apr 25, 09:56:33 Error IKE phase2 negotiation failed due to time up
waiting for phase1. ESP 71.248.163.15[500]->192.168.10.168[500]
Apr 25, 09:56:38 Error IKE 71.248.163.15 give up to get IPsec-SA due
to time up to wait.
Apr 25, 09:56:39 Error IKE fatal INVALID-ID-INFORMATION notify
messsage, phase1 should be deleted.
Apr 25, 09:57:00 Error IKE fatal INVALID-MESSAGE-ID notify messsage,
phase1 should be deleted.
Apr 25, 09:57:09 Error IKE 71.248.163.15 give up to get IPsec-SA due
to time up to wait.
Apr 25, 09:57:09 Error IKE fatal INVALID-ID-INFORMATION notify
messsage, phase1 should be deleted.
Apr 25, 09:57:38 Error IKE Foreground mode.
Apr 25, 09:57:41 Error IKE fatal INVALID-ID-INFORMATION notify
messsage, phase1 should be deleted.
Apr 25, 09:58:01 Error IKE fatal INVALID-MESSAGE-ID notify messsage,
phase1 should be deleted.
Apr 25, 10:01:27 Error IKE Foreground mode.
Apr 25, 10:01:30 Error IKE fatal INVALID-ID-INFORMATION notify
messsage, phase1 should be deleted.
Apr 25, 10:11:33 Error IKE Foreground mode.
Apr 25, 10:11:35 Error IKE fatal INVALID-ID-INFORMATION notify
messsage, phase1 should be deleted.
Apr 25, 10:11:53 Error IKE Foreground mode.
Apr 25, 10:11:57 Error IKE fatal INVALID-ID-INFORMATION notify
messsage, phase1 should be deleted.
Apr 25, 10:12:17 Error IKE fatal INVALID-MESSAGE-ID notify messsage,
phase1 should be deleted.
Apr 25, 10:12:27 Error IKE 71.248.163.15 give up to get IPsec-SA due
to time up to wait.
Any ideas on how to fix?
Thanks!
Re: Coneecting to a Linksys WRVS4400N?
by mdaitzman on 2007-05-07 22:39:41 +0200
I thought this was due to an issue with the actiontec router, it turns out that
it doens't work from anyplace except plugged into the same swtich as my
wrvs4400n - so, any ideas what causes those kinds of errors? (Note, I wil
ltry with newer RC to see if it helps and update. )
Re: Coneecting to a Linksys WRVS4400N?
by corbywan on 2007-06-22 05:40:03 +0200
OK, I'm going crazy. I'm new to the world of VPN but I had a CCNA and
CCDA back in the day, so I'm not totally clueless.
I've been trying to use the instructions above to get into my WRVS4400N
with no luck. Setup is exactly as described. Looking through the logs here
is what I've found.
I fought for a few hours with some messages I don't have anymore that
were to effect of my local IP subnet was the same as the remote IP subnet.
Here at my house I have a Linksys WRT54 setup to use 192.168.1.0 for IPs.
That's the same thing that is set up at the office. That must be a bad thing
because after I changed my network here at home to a 10net range I at
least started to get a yellow light. Are there any other givens I need to know
about, or should this not have been a problem?
I think I'm failing in phase 1. I tried VPNTracker and its log was helpful to
figure that out. Here is the log from IPSecuritas
[code]Jun 21, 20:26:08 Info
IKE Reading configuration from "/Library
/Application Support/Lobotomo Software/IPSecuritas/racoon.conf"
Jun 21, 20:26:08 Info
IKE Resize address pool from 0 to 255
Jun 21, 20:26:08 Info
APP Initiated connection huh
Jun 21, 20:26:08 Error IKE inappropriate sadb acquire message passed.
Jun 21, 20:26:09 Error IKE fatal INVALID-ID-INFORMATION notify
messsage, phase1 should be deleted.
Jun 21, 20:26:14 Error IKE fatal INVALID-MESSAGE-ID notify messsage,
phase1 should be deleted.
Jun 21, 20:26:15 Info
APP Initiated connection huh
Jun 21, 20:26:19 Error IKE fatal INVALID-MESSAGE-ID notify messsage,
phase1 should be deleted.
Jun 21, 20:26:22 Info
APP Initiated connection huh
Jun 21, 20:26:24 Error IKE OFFICE.IP.ADDRESS.HERE give up to get
IPsec-SA due to time up to wait.
Jun 21, 20:26:29 Info
APP Initiated connection huh
Jun 21, 20:26:29 Error IKE fatal INVALID-ID-INFORMATION notify
messsage, phase1 should be deleted.
Jun 21, 20:26:34 Error IKE fatal INVALID-MESSAGE-ID notify messsage,
phase1 should be deleted.
Jun 21, 20:26:36 Info
APP Initiated connection huh
Jun 21, 20:26:36 Error IKE inappropriate sadb acquire message passed.
Jun 21, 20:26:39 Error IKE fatal INVALID-MESSAGE-ID notify messsage,
phase1 should be deleted.
Jun 21, 20:26:41 Warning APP Connection huh timed out
Jun 21, 20:26:41 Warning APP Giving up
Jun 21, 20:26:41 Error IKE unknown Informational exchange received.
Jun 21, 20:26:44 Error IKE OFFICE.IP.ADDRESS.HERE give up to get
IPsec-SA due to time up to wait.
Jun 21, 20:27:24 Info
APP IPSec stopping
Jun 21, 20:27:25 Info
APP IKE daemon terminated[/code]
Can someone please help? Does this give anyone a clue? I recommended
the purchase of this box because I saw that people got it working with this
app on Macs. The office is an all Mac outfit so if I can't get this to work we
are going to have to figure something else out. Thanks in advance.
Re: Coneecting to a Linksys WRVS4400N?
by Forum Admin on 2007-06-22 10:58:54 +0200
Hello,
the INVALID-ID-INFORMATION notification you're getting means that either
the local or the remote endpoint address is not what the router expects.
Most probably the 10.x.x.x range you're using is not what the router
accepts - have a look at the router for the remote network range, choose an
address from that range and enter it into the local endpoint address field in
IPSecuritas to override the real local address which is taken if you leave the
field blank.
The reason you got the red dot before you changed your local LAN address
was a collision between the local endpoint address and the remote endpoint
network (both had the same range). If you want to do this, you have to
enable the 'Local IP in remote Network' option for this connection (please
note that it very much depends on the router if this is supported at all)
Hope this helps,
Christoph
Re: Coneecting to a Linksys WRVS4400N?
by corbywan on 2007-06-22 23:56:28 +0200
Thanks for the info. Still no joy. I set my home network back to a
192.168.1.0/24. Here's the deal.
Office Network: Behind the router it's a 192.168.1.0/24 network.
Home Network: Behind the router it's a 192.168.1.0/24 network.
At home I have assigned my laptop 192.168.1.50, an address I know that
no other machine on either network is using. I'm still getting basically the
same log as above with all the INVALID-MESSAGE-ID stuff.
Is the problem I'm having an IP addressing problem? I think all the security
stuff is working fine.
Re: Coneecting to a Linksys WRVS4400N?
by corbywan on 2007-06-23 16:48:30 +0200
I was doing some more testing with VPNTracker and it looks like I'm failing
phase 2.
Interestingly enough, it won't even try to connect if my local subnet is the
same as the remote subnet. I have to change it to anything other than
whatever the remote subnet is and it make an effort.
Also, this is an aside to anyone using the WRVS4400N. If you are using
Safari to manage your router, you need to turn "Block pop-up windows" off
or you won't be able to access the Advanced Settings options. The Log
pop-up works fine, every other pop-up works fine, but just that one won't.
Hope that helps someone because it killed me for a few hours.
Re: Coneecting to a Linksys WRVS4400N?
by Dave on 2007-06-24 01:24:34 +0200
[quote author=corbywan link=1174748106/0#14
date=1182610110]Interestingly enough, it won't even try to connect if my
local subnet is the same as the remote subnet. I have to change it to
anything other than whatever the remote subnet is and it make an effort.
[/quote]
The local and remote subnets [b]must[/b] be different or it will never work;
that is a requirement for any VPN client that I know of.
I'd suggest turning up the logging level with IP Securitas (in the
Preferences...) and then see if you can figure out why it is failing Phase 1.
Re: Coneecting to a Linksys WRVS4400N?
by corbywan on 2007-06-24 01:55:57 +0200
See, that's what I thought to until someone told me to turn on the option
for local IP on remote network, but the effects were still the same.
And it seems to be passing Phase 1 and choking on Phase 2. Here is a link
to the log file for the curious (link because it's too long to paste here). I
have replaced the IP of the Linksys for obvious reasons.
[url]http://www.stephensfam.net/ph2fails.txt[/url]
Re: Coneecting to a Linksys WRVS4400N?
by corbywan on 2007-06-24 06:14:47 +0200
Is there anything I need to do with my home router other that set it to VPN
passthrough? I'm not trying to bridge my home network to the office, just
one computer.
Re: Coneecting to a Linksys WRVS4400N?
by Dave on 2007-06-25 17:03:07 +0200
[quote author=corbywan link=1174748106/15#17 date=1182658487]Is
there anything I need to do with my home router other that set it to VPN
passthrough? I'm not trying to bridge my home network to the office, just
one computer.[/quote]
Did you enable NAT for this connection? If you are behind a home router
(and given the IP address you're using, it looks like you're doing NAT), this
has to be enabled for IP Securitas to work. From your log:
[i]phase2 negotiation failed due to time up waiting for phase1. ESP
71.59.168.142[500]->192.168.2.101[500]
[/i]
Phase 1 failed and given the connection ports, it looks like you aren't doing
NAT-T; when I enable this, it connects through port 4500 instead.
So try enabling NAT on the Options page, I believe, and see if that helps.
Re: Coneecting to a Linksys WRVS4400N?
by corbywan on 2007-06-25 20:30:05 +0200
Thanks for the suggestion. NAT-T is set to enable, and I set the Exchange
to mode Aggressive as well. I'm still seeing port 500 in the log. I even tried
NAT-T on force and no such luck.
Re: Coneecting to a Linksys WRVS4400N?
by corbywan on 2007-06-28 15:16:20 +0200
Christopher from Lobotomo was a HUGE help for me. Really too the time to
personally help me.
He found that you could not have the Remote Security Group set to any,
that it had to be set to your specific IP (your private one behind your local
LAN). If you set that, and then also enter that same IP in the General tab
under Host, you could connect. You can then create a tunnel for the various
IPs that will be able to connect in.
I tried setting mine to Subnet so I wouldn't have to worry about specific IPs
but that didn't seem to work either. It's curious that the same router can
work for some people with one set of settings and not for others.
Anyway, that's what did it for me. Cheers to Christopher!
Re: Coneecting to a Linksys WRVS4400N?
by corbywan on 2007-07-04 18:00:42 +0200
OK. This is getting a little irritating. I can get a green light every time I
connect, but I'm only really connected 25% of my attempts. I can have a
green light but the Status of my 4400 shows the tunnel as Down. I cannot
ping the internal IP of the 4400 nor any IP on the network.
Any ideas? Here is a sample from the log after a green connection. This
basically repeats.
[code]Jul 04, 08:59:06 Debug IKE ===
Jul 04, 08:59:06 Debug IKE 284 bytes message received from
71.59.168.142[4500] to 192.168.2.101[4500]
Jul 04, 08:59:06 Debug IKE 715c2b68 b5221021 a571a22a adb72c05
08102001 b73b8825 0000011c 00cdca15
Jul 04, 08:59:06 Debug IKE 5da4aea8 2dea5cbb 30630e5a 7da5a09b
8b49e65f 01420c81 129e7c9c 35c02772
Jul 04, 08:59:06 Debug IKE 71cf88d8 e3ff16cc 3e9c2f79 def46aef
c9d1a904 2ad32eab 66bda644 9174d6b7
Jul 04, 08:59:06 Debug IKE 72428a62 4ce56262 db6be7fb 9630b0bb
41d918b0 d3205e5a 86522942 88c7f078
Jul 04, 08:59:06 Debug IKE 3cdfa8fe 1e1cca63 64c384e7 fae3a92e
f76b0709 b18ae995 c2a4d7c6 bc797cb3
Jul 04, 08:59:06 Debug IKE 4fbfa4a6 5a90df19 7ec4d1fd 7d788f63
62d89fe1 206b3d09 e951d992 3ff25821
Jul 04, 08:59:06 Debug IKE 1f1cd1e5 6fdd8aca 4482beda 60eca6f2
971eeefd a89f8053 a2c799cc 1c234d3a
Jul 04, 08:59:06 Debug IKE 5f4f5630 1504ad97 9d8607cb 18ddea60
5f66bf50 336ff580 09bc244a 6f68cfdd
Jul 04, 08:59:06 Debug IKE 073470cc 6cea7b0d b541d062 83a2367c
5a90a295 c20c0adc dbf0d3c8
Jul 04, 08:59:06 Debug IKE configuration found for 71.59.168.142.
Jul 04, 08:59:06 Debug IKE new cookie:
Jul 04, 08:59:06 Debug IKE 4010463c6e3d15a1
Jul 04, 08:59:06 Debug IKE Marking ports as changed
Jul 04, 08:59:06 Debug IKE Adding NON-ESP marker
Jul 04, 08:59:06 Debug IKE 44 bytes from 192.168.2.101[4500] to
71.59.168.142[4500]
Jul 04, 08:59:06 Debug IKE sockname 192.168.2.101[4500]
Jul 04, 08:59:06 Debug IKE send packet from 192.168.2.101[4500]
Jul 04, 08:59:06 Debug IKE send packet to 71.59.168.142[4500]
Jul 04, 08:59:06 Debug IKE 1 times of 44 bytes message will be sent to
71.59.168.142[4500]
Jul 04, 08:59:06 Debug IKE 00000000 715c2b68 b5221021 4010463c
6e3d15a1 0b100500 ade98364 00000028
Jul 04, 08:59:06 Debug IKE 0000000c 00000001 01000004
Jul 04, 08:59:06 Debug IKE sendto Information notify.
Jul 04, 08:59:06 Error IKE can't start the quick mode, there is no
ISAKMP-SA, 715c2b68b5221021:a571a22aadb72c05:b73b8825
Jul 04, 08:59:15 Debug IKE ===
[/code]
Linksys RVS4000
Linksys RVS4000
by Kender on 2007-03-27 03:45:47 +0200
Has anyone had any success connecting to a Linksys RVS4000 VPN router?
Every time I try to connect I get the following log entries:
[code]
Mar 26, 16:36:11 Info
IKE @(#)ipsec-tools CVS (http://ipsectools.sourceforge.net)
Mar 26, 16:36:11 Info
IKE @(#)This product linked OpenSSL 0.9.7l 28
Sep 2006 (http://www.openssl.org/)
Mar 26, 16:36:11 Info
IKE Reading configuration from "/Library
/Application Support/Lobotomo Software/IPSecuritas/racoon.conf"
Mar 26, 16:36:11 Info
IKE Resize address pool from 0 to 255
Mar 26, 16:38:16 Info
APP IPSec stopping
Mar 26, 16:38:17 Info
APP IKE daemon terminated
Mar 26, 16:38:17 Info
APP IKE daemon started
Mar 26, 16:38:17 Info
APP IPSec started
Mar 26, 16:38:17 Info
IKE Foreground mode.
Mar 26, 16:38:17 Info
IKE @(#)ipsec-tools CVS (http://ipsectools.sourceforge.net)
Mar 26, 16:38:17 Info
IKE @(#)This product linked OpenSSL 0.9.7l 28
Sep 2006 (http://www.openssl.org/)
Mar 26, 16:38:17 Info
IKE Reading configuration from "/Library
/Application Support/Lobotomo Software/IPSecuritas/racoon.conf"
Mar 26, 16:38:17 Info
IKE Resize address pool from 0 to 255
Mar 26, 16:38:49 Error IKE phase2 negotiation failed due to time up
waiting for phase1. ESP 1.1.1.1[500]->2.1.1.2[500]
Mar 26, 16:39:01 Error IKE phase2 negotiation failed due to time up
waiting for phase1. ESP 1.1.1.1[500]->2.1.1.2[500][/code]
And then it repeats. Any ideas?
This happens from home (behind an Airport Extreme) and "barenaked" to
the Internet.
Re: Linksys RVS4000
by Dave on 2007-03-27 05:39:09 +0200
All that says is that the phase 1 negotiations failed; I'd suggest increasing
the log level in the Preferences to capture more info. While the log will get
rather large, you should be able to get a better idea why the phase 1 failed.
Re: Linksys RVS4000
by mrchew on 2007-04-23 16:53:12 +0200
Has anyone been able to get the Linksys RVS4000 working with IPSecuritas?
If yes, can you please post detailed configuration details.
thanks
Re: Linksys RVS4000
by Kender on 2007-06-02 15:37:34 +0200
Well I finally got around to this - here is the full debug log of the issue.
[code]IPSecuritas 3.0 build 1693, Sun May 27 21:43:28 MVT 2007, nadig
Darwin 8.9.1 Darwin Kernel Version 8.9.1: Thu Feb 22 20:55:00 PST 2007;
root:xnu-792.18.15~1/RELEASE_I386 i386
Jun 02, 09:30:25 Info
IKE Resize address pool from 0 to 255
Jun 02, 09:30:25 Debug IKE lifetime = 3600
Jun 02, 09:30:25 Debug IKE lifebyte = 0
Jun 02, 09:30:25 Debug IKE encklen=0
Jun 02, 09:30:25 Debug IKE p:1 t:1
Jun 02, 09:30:25 Debug IKE 3DES-CBC(5)
Jun 02, 09:30:25 Debug IKE MD5(1)
Jun 02, 09:30:25 Debug IKE 768-bit MODP group(1)
Jun 02, 09:30:25 Debug IKE pre-shared key(1)
Jun 02, 09:30:25 Debug IKE compression algorithm can not be checked
because sadb message doesn't support it.
...
Jun 02, 09:30:25 Info
APP Initiated connection Remax-GV
Jun 02, 09:30:25 Debug IKE get pfkey ACQUIRE message
...
Jun 02, 09:30:25 Error IKE inappropriate sadb acquire message passed.
Jun 02, 09:30:25 Debug IKE get pfkey ACQUIRE message
Jun 02, 09:30:25 Debug IKE 02060003 14000000 27000000 9f4b0000
03000500 ff200000 10020000 0a00012a
Jun 02, 09:30:25 Debug IKE 00000000 00000000 03000600 ff200000
10020000 42b853a2 00000000 00000000
Jun 02, 09:30:25 Debug IKE 0a000d00 20000000 000c0000 00000000
00010001 00000000 01000000 01000000
Jun 02, 09:30:25 Debug IKE 00000000 00000000 00000000 00000000
00000000 00000000 80510100 00000000
Jun 02, 09:30:25 Debug IKE 80700000 00000000 00000000 00000000
02001200 02000200 07000000 00000000
Jun 02, 09:30:25 Debug IKE suitable outbound SP found:
10.0.1.42/32[0] 192.168.10.0/24[0] proto=any dir=out.
Jun 02, 09:30:25 Debug IKE sub:0xbffff55c: 192.168.10.0/24[0]
10.0.1.42/32[0] proto=any dir=in
Jun 02, 09:30:25 Debug IKE db :0x308b78: 192.168.10.0/24[0]
10.0.1.42/32[0] proto=any dir=in
Jun 02, 09:30:25 Debug IKE suitable inbound SP found:
192.168.10.0/24[0] 10.0.1.42/32[0] proto=any dir=in.
Jun 02, 09:30:25 Debug IKE new acquire 10.0.1.42/32[0]
192.168.10.0/24[0] proto=any dir=out
Jun 02, 09:30:25 Debug IKE (proto_id=ESP spisize=4 spi=00000000
spi_p=00000000 encmode=Tunnel reqid=0:0)
Jun 02, 09:30:25 Debug IKE (trns_id=3DES encklen=0
authtype=hmac-sha)
Jun 02, 09:30:25 Debug IKE in post_acquire
Jun 02, 09:30:25 Debug IKE configuration found for xx.xxx.xx.162.
Jun 02, 09:30:25 Info
IKE IPsec-SA request for xx.xxx.xx.162 queued
due to no phase1 found.
Jun 02, 09:30:25 Debug IKE ===
Jun 02, 09:30:25 Info
IKE initiate new phase 1 negotiation:
10.0.1.42[500]<=>xx.xxx.xx.162[500]
Jun 02, 09:30:25 Info
IKE begin Base mode.
Jun 02, 09:30:25 Debug IKE new cookie:
Jun 02, 09:30:25 Debug IKE 88c9d13eecd614ad
Re: Linksys RVS4000
by Dave on 2007-06-03 03:53:03 +0200
One thing that is kind of odd is that it is doing BASE mode negotiation.
Most VPN endpoints do either Main (for certificates, I think) or Aggressive
(required if you're being a NAT router, I believe).
Try using Main, Aggressive or just Aggressive and see what you get.
Re: Linksys RVS400
by cheese2 on 2007-06-06 01:00:14 +0200
I am pretty much in the same boat - cant connect to my brand new rvs4000
for love nor money. My log looks just exactly like Kender's (except for the
ips of course...)
One question I do have - in the previous firmware for the 4000 you could
specify the remote security gateway as Any but in the most recent version
you must specify either an ip or an ip + domain name. You can specify the
remote group as any. By my understanding this means that it wont work
with a roaming endpoint (ie my macbook running IPSecuritas) or am I
confused? (Probably)
Even when I do put my ip address in still wont connect...
Re: Linksys RVS4000
by corbywan on 2007-06-25 08:52:14 +0200
I've posted in another thread on this and I know people are looking into it. I
have a WRSV4400N and am having the same issue. My log looks pretty
much identical.
Re: Linksys RVS4000
by corbywan on 2007-06-28 15:15:35 +0200
Christopher from Lobotomo was a HUGE help for me. Really too the time to
personally help me.
He found that you could not have the Remote Security Group set to any,
that it had to be set to your specific IP (your private one behind your local
LAN). If you set that, and then also enter that same IP in the General tab
under Host, you could connect. You can then create a tunnel for the various
IPs that will be able to connect in.
I tried setting mine to Subnet so I wouldn't have to worry about specific IPs
but that didn't seem to work either. It's curious that the same router can
work for some people with one set of settings and not for others.
Anyway, that's what did it for me. Cheers to Christopher!
Re: Linksys RVS4000
by jklinephd on 2007-07-04 08:23:09 +0200
Can you outline the settings both for the router and the settings for the
computer connecting to the server.
I cannot get this to work.
thanks
Jeff
Re: Linksys RVS4000
by cnadig on 2007-07-04 09:31:57 +0200
Hi,
basically, follow the setup description for the Linksys WRV200
(http://www.lobotomo.com/products/IPSecuritas/howto
/Linksys%20WRV200%20HOWTO.pdf), but don't set the Remote Secure
Group (page 3) to Any but any other address instead (preferrably any
private address from RFC 1918 like 10.x.x.x - should not be part of the
LAN behind the router). Enter the same address as a virtual IP address
IPSecuritas (page 6).
If multiple users need simultanous access, you need a seperate tunnel for
each (identical settings except for the remote secure group address preshared secret must be the same for all tunnels!)
Hope this helps,
Christoph
Re: Linksys RVS4000
by davewu on 2007-08-01 12:44:14 +0200
Hallo,
I have the same problem, but christophers succestions did not work for me.
Can some one please post a working setup.
thanks
David
Re: Linksys RVS4000
by rnoser on 2007-11-27 08:47:22 +0100
I would truly appreciate any info anyone can give regarding getting the
RVS4000 to work with IPSecuritas. It feels like I've been beating my head
against a wall trying to get it to work. It's probably something real easy,
but it feels like I've had every setting/option in every possible
configuration.
Thanks in advance!
Re: Linksys RVS4000
by roborino on 2007-11-28 12:34:27 +0100
I am in the same boat. I have tried just about anything and would really
appreciate some help. The notes above have been tried without success.
Any assistance would be much appreciated. I have tried to follow the
how-to-guide on the WRV200 to no avail.
Thanks!
Re: Linksys RVS4000
by roborino on 2008-02-28 15:27:26 +0100
Really hard to believe that no one has a working version of this with the
RVS4000. Is there a better solution? Desperately need a VPN solution that
works within a Mac environment?
Thanks in advance!!!
Re: Linksys RVS4000
by marcus178 on 2008-06-30 11:46:41 +0200
Has anyone found a way to connect to the rvs4000? Tried all sorts and just
can't get it to work.
Problem with connection
Problem with connection
by epoc1000 on 2007-03-31 13:08:23 +0200
Hi,
I have a problem, when I try to connect to our Sonicwall. I have this error
logs. I configured everything simular to VPN-Tracker where it worked
perfectly. Can anyone tell me, where I can track for errors or what I can do:
Mar 31, 13:00:48 Debug IKE suitable outbound SP found:
192.168.2.10/32[0] 192.168.1.0/24[0] proto=any dir=out.
Mar 31, 13:00:48 Debug IKE sub:0xbffff560: 192.168.1.0/24[0]
192.168.2.10/32[0] proto=any dir=in
Mar 31, 13:00:48 Debug IKE db :0x308958: 192.168.1.0/24[0]
192.168.2.10/32[0] proto=any dir=in
Mar 31, 13:00:48 Debug IKE suitable inbound SP found:
192.168.1.0/24[0] 192.168.2.10/32[0] proto=any dir=in.
Mar 31, 13:00:48 Debug IKE new acquire 192.168.2.10/32[0]
192.168.1.0/24[0] proto=any dir=out
Mar 31, 13:00:48 Error IKE failed to get sainfo.
Everytime it ends with "failed to get sainfo".
Bye
Re: Problem with connection
by Dave on 2007-04-01 03:36:22 +0200
The first thing I always suggest is to turn up the debugging level in the
Preferences; it might make it easier to see what is going on before things
fail. I'm guessing that sainfo is "Security Association Info" but I don't know
any more than that. Given that both of these addresses are "fake," might
you need to turn on NAT-T?
Anyone have success w/ xAuth yet?
Anyone have success w/ xAuth yet?
by leopard on 2007-04-13 02:59:39 +0200
Has anyone had success getting xAuth to work against any appliance? :-?
Re: Anyone have success w/ xAuth yet?
by Dave on 2007-04-13 04:17:39 +0200
I've got xAuth working against a SonicWall TZ170 (I think that is the model).
I have to drop the MTU down to 1400 manually to get the connect not to
fragment and drop packets but once it is working, I can bring it back up to
1500.
But the xAuth part works flawlessly.
Re: Anyone have success w/ xAuth yet?
by leopard on 2007-04-13 16:00:58 +0200
I have a FortiGate 100A that I can get VPN access to. But the second I
implement xAuth my phase 1 negation fails. FortiGate support can not
deduce what is failing. IPSecuritas log shows the following
Apr 09, 10:38:46 Info
IKE Resize address pool from 0 to 255
Apr 09, 10:38:47 Info
IKE couldn't find the proper pskey, try to get one
by the peer's address.
Apr 09, 10:38:47 Warning IKE Ignored short attribute XAUTH_USER_NAME
Apr 09, 10:38:47 Warning IKE Ignored short attribute
XAUTH_USER_PASSWORD
Anyone have any input?? Thanks.
Re: Anyone have success w/ xAuth yet?
by pingu on 2007-04-30 18:24:39 +0200
We've got it working with a Sonicwall 3060, finicky, but it works eventually.
No luck getting the Sonicwall to look up XAuth user info from
OpenDirectory though. Anybody had luck with this?
Dan
Re: Anyone have success w/ xAuth yet?
by lleung on 2007-05-23 08:26:37 +0200
Just to add my $.02 into the the pot..
I have 4 Fortigate's. 300A, 100A, 60ADSL and 60M. (they're all linked via
ipsec tunnels)
Like everyone else, everything works on all 4 of them except xauth.
it if means anything, I also have a vpn tracker. vpn tracker handles it fine in
aggressive mode, + xauth using pap
if anyone is lobotomo is interested, I can set up a test connection for you to
experiment on.
Re: Anyone have success w/ xAuth yet?
by cnadig on 2007-05-25 14:39:36 +0200
Hello,
the problem could be solved thanks to the great support from Lynda
(lleung) in providing a test account. The fix will be included in the final 3.0
release to be released coming Sunday, and will work on other types of
firewalls too, if any of the following log lines appeared when using XAUTH:
Ignored short attribute XAUTH_USER_NAME
Ignored short attribute XAUTH_USER_PASSWORD
Cheers,
Christoph
Using 3.0 to connect to Windows in transport mode
Using 3.0 to connect to Windows in transport mode
by Athanyel on 2007-04-13 21:44:24 +0200
I am aiming to establish IP Security in transport mode to a Windows 2003
server for just the standard SMB/CIFS ports (UDP 137 and 138, TCP 139 and
445).
I have built a Windows server that requires IPSec on these four ports and
uses certificates for authentication. All of my Windows machines (both on
my domain and off of my domain) are working just fine. I hope to use 3.0
as the primary IPSec UI for our Macintosh customers. The ability to easily
import both the configuration and PKCS#12 certificates in 3.0 would greatly
simplify the deployment of IPSec to my user community.
With 2.2, I am able to establish an IPSec connection to my Windows server
with certificate based authentication. I can then connect to the locked
down ports with IPSecuritas. Once the connection is established, 2.2 is
encrypting ALL traffic to the server. I haven't found a way (if there is) to
only encrypt traffic on the four ports.
With 3.0, I am able to connect (I get the little green ball) and the Windows
server declares that main mode and quick mode were successfully
negotiated and that a security association is in place. Once established, I
cannot actually connect to the secured ports on my server.
I am testing the IPSec connection to the server by pinging the server and
attempting to connect to both a port that I do not protect (WebDAV over
SSL on port 443) and a port I do protect (SMB/CIFS on port 139). When 2.2
is connected, the pings do not go through and I cannot connect to port 443
but can connect to 139. As soon I as stop IPSec on 2.2, the pings go
through, I can connect to the WebDAV share and lose my connection to port
139. With 3.0, I can ping the server and connect to port 443 but cannot to
port 139 regardless of what 3.0 declares the state of the IPSec connection
is.
My primary concern is making 3.0 work in a similar fashion to 2.2. I'm not
really worried about the client blindly attempting to encrypt all traffic to my
server. I just need to make sure that I am actually encrypting the data that I
need to have encrypted.
Does anyone know of anything I can modify/test? I am establishing my
connection as follows:
GENERAL
Remote IPSec device is set to the DNS name of the server I am attempting to
connect to.
Both the Local and Remote Side are set to Host with Transport Mode
checked.
PHASE 1
Lifetime
8 hours
DH Group
1024 (2)
Encryption
3DES
Authentication
SHA-1
Exchange Mode
Main
Proposal Check
Obey
Nonce Size
16
PHASE 2
Lifetime
8 hours
PFS Group
1024 (2)
Encryption
3DES
Authentication
HMAC SHA-1
Re: Using 3.0 to connect to Windows in transport m
by Dave on 2007-04-13 23:53:57 +0200
I'll recommend setting the MTU on the Mac down to 1400 and see if things
work then. I've had to do this once a connection is established to get
packets not to fragment and get dropped. Oddly enough, once packets are
flowing, I can boost up the MTU back to 1500 and it still works! :)
But try that and see if it lets you connect.
Re: Using 3.0 to connect to Windows in transport m
by Athanyel on 2007-04-14 00:24:06 +0200
I followed the instructions in http://docs.info.apple.com
/article.html?artnum=303192 and set the MTU to 1400. I then shut down
the 3.0 Daemon (Command+Option+Q) and restarted IPSecuritas 3.0. I
repeated my tests as outlined in the original post. No joy. :-[
Re: Using 3.0 to connect to Windows in transport m
by Dave on 2007-04-14 04:22:57 +0200
That's not what I did. I changed the MTU to 1400 [i]while[/i] the connection
was active; that seemed to "wake it up." Short of that, you can try pinging in
the Windows box using the "Do not Fragment" bit and increasingly higher
ping packet size until it fragments and see what happens.
I can't say if this will fix anything, only that it worked for me.
Re: Using 3.0 to connect to Windows in transport m
by Athanyel on 2007-04-16 17:13:59 +0200
Argh! No luck there either!
I toggled the MTU all over the map (every hundred from 500 to 1500) and
nothing at all. Next up, I bombarded it from the Windows server...nothing
(from tiny packets to packets bigger than the client's MTU). It's like the
policy on the IPSecuritas side is "don't encrypt anything" It's
negotiating...and then not encrypting!
Do you know of a way to view the active policy? In Windows, it's really
straight forward.
Thanks!
Re: Using 3.0 to connect to Windows in transport m
by Athanyel on 2007-04-17 21:11:22 +0200
I got it!
If you're using 3.0rc in Transport mode, you need to first clear the
"Transport Mode" checkbox on the General page for your connection.
Specify the IP address of the machine you want to connect to in the "IP
Address" field of the "Remote Side" area of the General page. Then check
"Transport Mode" option again.
In 2.2, setting the Mode of Operation to "Host To Host (Transport)" appears
to use the Remote IPSec Device to determine the IP address that data will be
encrypted to.
In my mind, 3.0 should be operating the same way as 2.2 (i.e. when 3.0 is
in Transport mode, the policy should be defined by the "Remote IPSec
Device" and not by the "IP Address" field in the "Remote Side" area of the
"General" page).
I'll be sending this along to the [email protected] address as well.
Re: Using 3.0 to connect to Windows in transport m
by Forum Admin on 2007-04-20 12:56:13 +0200
Hi,
this is indeed a bug, thank you very much! I have fixed this and it will have
to release a final release candidate soon.
Cheers,
Christoph
Re: Using 3.0 to connect to Windows in transport m
by Athanyel on 2007-05-30 23:38:02 +0200
Alright, I've now gone back and tried this with the final release...and it
stopped working!
My configuration has not changed since what I listed here. I've got two
Macs set up. Both are clean installs of 10.4 and updated to 10.4.9. One
has 3.0rc installed and the other 3.0 final.
In the 3.0rc build, I was able to establish the connection after:
[list][*]Clearing the "Transport Mode" checkbox on the General page for
your connection[*]Setting the IP address of the machine I want to connect to
in the "IP Address" field of the "Remote Side" area of the General
page.[*]Checking the "Transport Mode" option again.[/list]In 3.0 final, I click
"Start" and the main window shows "IPSec active" then very quickly "IPSec
inactive". The debug log shows that ISAKMP-SA is established between the
two hosts. Immediately after, it declares "begin QUICK mode" and then
reads "IKE daemon terminated" after "compute DH's private" and "compute
DH's public".
HELP!
Unable to see network shared drives
Unable to see network shared drives
by DistortedLoop on 2007-04-15 09:10:33 +0200
I did a bit of searching and can't find if this has been asked before - forgive
me if it's an asked and answered question,
I've managed to get my MacBookPro to connect into my LAN using
ipsecuritas v3rc.
The router is a Linksys WRVS4400N. The router shows a valid ipsec tunnel
in place, and I am able to ping all valid addresses on the internal network,
and I can access those devices (a network attached storage device and
several routers/acces points) that have webinterfaces by typing their ip
address into Safari.
The problem is I can't see any of my network drives, or other Mac machines
in Finder's Network. Should I be able to? The whole purpose of VPN into
the network is to have access to shared files while on the road.
Any ideas what I am doing wrong?
Should Bonjour work? I've read it doesn't through a VPN.
I do have "windows sharing" turned on in OSX system preferences, and the
network attached drive plugs straight into the router's ethernet ports.
UPDATE: If I look real close at Finder, just as my VPN connection finishes
negotians, I see the network shares flash momentarily in Finder, and then
disappear. I'm also able to get dir listings of SMB/CIFS shares by using the
smbclient command in Terminal, though the "get" command seems to fail
for actually transferring a file.
Any ideas?
Re: Unable to see network shared drives
by DistortedLoop on 2007-04-15 20:23:53 +0200
Okay! Figured out a workaround for this "problem" (if indeed it is a
problem and not a design feature) all on my own:
Once the VPN tunnel is established, I can go to the Finder Menu Bar, Select
Go, Connect To Server (Command-K), then type in the ip address of the
shared drive I am looking for. The normal connect menu from Finder then
pops up and allows you to select which particular share you're looking to
connect to.
I've loaded every drive on the network this way, except for one - the USB
drive that's shared on my Airport Extreme Base Station. This one may take
some more time to figure out.
profiles and mode_cfg
profiles and mode_cfg
by coreyva on 2007-04-17 08:09:56 +0200
Using 3.0rc, I created a few profiles for various connections. The problem is
I am unable to change the profile from the pulldown. Selecting it does
nothing. Anyone else seen this?
My bigger issue is with mode_cfg. I need to be able to specify a ippool on
my firewall (netscreen 25), but once I do, and enable mode_cfg, I can no
longer connect. I am able to with VPN tracker, using that configuration.
Aside from those two issues, it works great for me.
Re: profiles and mode_cfg
by coreyva on 2007-04-17 18:09:36 +0200
Actually, the pulldown does work, but it wil only activate at the very bottom
edge of the pulldown. Still not getting mode_cfg to function. XAUTH works
nicely though.
IPSECURITAS working everywhere but not on MACPRO
IPSECURITAS working everywhere but not on MACPRO
by senzex on 2007-04-20 19:05:47 +0200
Hello there,
I've set up some NETGEAR FVS124G, and I'm able to connect to them with
no pb in almost anywhere. My problem is, that I'm working 4 days a week at
a Office at which I'm happy to drive a MacPro.
I've entered the exact same settings on the MacPro and it is a NO GO.
Nothing, nada.
the red pill status stays [b] RED[/b], it does not even get [b]orange[/b]
(meaning something is going on). just to be sure I log on the web interface
to check the VPN STATUS window but, nothings happens everythings stays
IDLE.
I just don't understand.
I've installed Bootcamp and was, until not long only working on W$ ;(Not
MY choice).
For now on I'm using Parrallels with much Joy so I'm back at my favorite OS.
I thought first that some how parrallels was the culprit, but with or without
it nothing happens.
Another thing is that we are behind 2 IPCOP boxes (v3 !! I know it's just so
old.... as IPCOP is now at v10 or v11... but I can't make them change this
for now) -> so I was wondering if IPCOP may be the one(s) that tricks me.
again I don't know.
@ home or others oFFices, as soon as I'm connected it's just OK in a bunch
of seconds and I can see any of all the computers on the remote networks
(via apple Remotedesktop and or finder).
And here just nothing happens.
So if anyone has any idea, I'll be glad to read it ;)
Cause right I have to launch Apple remote desktop on the Macpro, then
remote connect to my "home" server, them from here start IPSECURITAS and
launch remote desktop and from there I can see what I want. but it's just
not very simple nor handy (it works but... U know I just want to get it from
here the Office I'm talking about).
Office1->remotedesktop->Server->IPSEC+remotedesktop->Target
Office(s) pfff many connections.
Hope I was clear enough and pardon my Bad english.
IPsecuritas 3 is just what I wanted and saved me some applescript coding to
switch settings ;), it just rocks....
IPSecuritas works /w Check Point VPN-1 NGX (R65)
IPSecuritas works /w Check Point VPN-1 NGX (R65)
by dantro on 2007-04-24 14:03:43 +0200
Hi,
after struggling with the software a bit I finally got IPSecuritas 3.0 rc
working with our Check Point VPN-1 NGX (R65) firewall. Respect to the
Lobotomo dev team. Now we are not limited anymore to Check Point's
aged SecureClient R65 for OSX. It always slowed down our hosts once
installed.
Best regards,
Danny Trommer
CCSA/CCSE/CCSE+
Re: IPSecuritas works /w Check Point VPN-1 NGX (R6
by skyb on 2007-05-21 13:36:56 +0200
Hi Danny,
currently I have problems to connect with our Checkpoint, too.
I would be great if you could tell me how it worked for you.
Christoph
Re: IPSecuritas works /w Check Point VPN-1 NGX (R6
by Mr.Bove on 2007-10-22 19:28:09 +0200
[quote author=dantro link=1177416223/0#0 date=1177416223]Hi,
after struggling with the software a bit I finally got IPSecuritas 3.0 rc
working with our Check Point VPN-1 NGX (R65) firewall. Respect to the
Lobotomo dev team. Now we are not limited anymore to Check Point's
aged SecureClient R65 for OSX. It always slowed down our hosts once
installed.
Best regards,
Danny Trommer
CCSA/CCSE/CCSE+[/quote]
I'm new to the MAC world, I would really like to know how to configure the
IP Securitas client to work with Checkpoint VPN-1 NGX. Without revealing
too much info can you send me what you did?
Re: IPSecuritas works /w Check Point VPN-1 NGX (R6
by pstouffer on 2007-11-02 22:06:02 +0100
trying to get IPSecuritas to talk to Checkpoint VPN-1. Has anyone gotten
this to work and if so what settings needed to be changed from the wizard
settings.
Pete
Re: IPSecuritas works /w Check Point VPN-1 NGX (R6
by asnow_hk on 2007-11-17 06:22:55 +0100
I am also trying to get this to work, but have not been able to. In my
CheckPoint setup I have the following:
Authentication:
Scheme:
SecurID
User name: <my username>
"Use Key FOB hard token"
Profile: Advanced:
"Office Mode"
Once connected I have the following in the Status:
Office Mode IP: 10.88.8.xxx (can I assume that the network is
10.88.8.0/24)
So essentially I use my username, password and tokencode to log in. I've
not noticed any tokencode prompt in IPSecuritas. Is there one!?
Is it possible for someone to help me please? I'd like to know how to
translate this seemingly simple setup into an IPSecuritas Connection.
Re: IPSecuritas works /w Check Point VPN-1 NGX (R6
by mangus on 2007-11-18 18:13:59 +0100
I have had both success and failures trying to connect to our Checkpoint
VPN-1 Firewall using the Wizard set up.
Once I achieved success connecting I thought my troubles were over, but
unfortunately this was not to be the case. Since the initial success I later
had problems connecting with the same settings. Not knowing much about
the technical aspects of VPN I decided to save a debug-log for the failed
attempts and then compare them to a successful attempt.
I just now managed to get a connection again, and here's my findings
comparing the two log-files. Please note that just before achieving success
again I had been connected to the firewall through the Checkpoint client
inside of VMware Fusion. This may or may not be the key to success. I have
still to verify this, when I'm back to failing.
Anyhow... Here's what I can see when I compare the log-files:
Just above the log-row that reads: "Initiated connection Checkpoint" I get a
"msg 5 not interesting" in the successful attempt. Not so in the failed
attempt.
Later, after negotiations on encryption, hash and authentication seem to be
finished, the log states: "Adding NON-ESP marker" and then the client
sends 88 bytes of data. In the successful attempt the firewall responds with
a 1652 bytes long message, while in the failed attempt only 76 bytes are
received. After this, things seem to go really bad in the failed attempt,
spawning messages like: "Short payload" and "mode config 6 from
xxx.xxx.xxx.xxx[4500], but we have no ISAKMP-SA."
As I said, I don't know anything about anything VPN, but maybe this could
help somehow...
(Update: Since finishing this post I was back to failing, so I launched
VMware and connected with the Checkpoint client to see if this would help
IPSecuritas, but it didn't. So WMware doesn't seem to have anything to do
with success/failure rates.)
Re: IPSecuritas works /w Check Point VPN-1 NGX (R6
by mmulin on 2007-12-11 12:45:45 +0100
Hey Guys,
at least for the ones who get partial success, could you please publish your
IPSecuritas settings?
Am not trying to be smart here but, 1st, other's might be able to help
better and for the ones, like me, who have no success at all, it might bring
them on the right path..
Thanks
Re: IPSecuritas works /w Check Point VPN-1 NGX (R6
by bugfish on 2007-12-13 00:35:19 +0100
Well, I upgraded to Leopard, which killed Secureclient. After some fiddling, I
got IPSecuritas working with our Checkpoint setup at work, and since
people are asking, here are all the settings I'm using. Of course some of
these are probably sepecific to my place of employment.
i usd the wizard and chose Checkpoint VPN-1, but i made a few changes.
here are the settings from each tab. I HOPE THIS HELPS SOMEONE!
General:
Remote IPSec Device: (our vpn ip at work)
Local Side:
Endpoint Mode: Host
remote Side:
Endpoint Mode: Anywhere
Phase1:
Lifetime: 10 minutes
DH Group: 1024 (2)
Encryption: 3DES
Authentication: SHA-1
Exchange Mode: Main
Proposal Check: Obey
Nonce Size: 16
Phase 2:
Lifetime: 10 minutes
PFS Grpoup:
768 (1)
Encryption: DES, 3DES, AES 256, AES 192, AES 128 (the rest are
unchecked)
Authentication: HMAC MD5, HMAC SHA-1 (the rest are unchecked)
ID:
Local Identifier: User FQDN
(filled in with my user name at work)
Remote Identifier: User FQDN
(filled in with my user name at work)
Authentication Method: XAuth RSA
Username: (filled in with my user name at work)
Password: (filled in with my current password at work)
DNS:
(all blank)
Options:
IPSec DOI, SIT_IDENTITY_ONLY, Initial Contact, Request Certificate,
Send Certificate, Unique SAs, IKE Fragmentation
NAT-T: Force
Action after connection timeout: Retry immediately
Re: IPSecuritas works /w Check Point VPN-1 NGX (R6
by mmulin on 2007-12-13 08:11:26 +0100
Thanks, that actually helped me too. I have one problem though. My routes
are not locally updated as it would happen with SecureClient. I need to
specify all 120 networks under the "remote networks" settings manually.
Now, I wonder, if I use the same configuration and choose the "Anywhere"
option it doesn't connect at all. Any thoughts there?
Re: IPSecuritas works /w Check Point VPN-1 NGX (R6
by travelguy2500 on 2007-12-29 23:51:16 +0100
I followed all of bugfish's suggestions and it connects just fine (thanks!!)
but I can't browse any web pages. I'm new to MAC (my first mac - have
always been a pc person) and was wondering if anybody has any assist on
how to get web pages to view.
Re: IPSecuritas works /w Check Point VPN-1 NGX (R6
by bugfish on 2007-12-30 01:10:33 +0100
The inability to get to web pages with my setup is probably because I left
the DNS settings all blank. I left mine blank because I don't need them for
what I connect to work for (it's all IP address based). But if you know the
DNS ip addresses at work and plug those in, you'll probably get the web
back.
Re: IPSecuritas works /w Check Point VPN-1 NGX (R6
by travelguy2500 on 2007-12-30 03:50:13 +0100
thanks for the prompt reply. tried adding in my local dns server ip
addresses but still no luck. i'm getting the green light to show a
connection but something isn't allowing me to get to any internet
addresses. I tried to ping the dns server but that's coming back failed. any
ideas?
Re: IPSecuritas works /w Check Point VPN-1 NGX (R6
by macman365 on 2008-01-18 08:16:26 +0100
Based on the setting posted by bugfish (thanks!), I can now connect to my
work VPN. I did specify "Anywhere" for the remote side endpoint and that
does allow me to see every network on my office LAN.
However, I need to access my local network at the same time (for printing),
but if I set the local side endpoint mode to "Network" rather than "Host" the
connection isn't even attempted.
Below is the full "Debug" log when I try to connect:
[font=Courier New]IPSecuritas 3.1 build 1860, Mon Oct 15 22:03:05 CEST
2007, nadig
Darwin 8.10.1 Darwin Kernel Version 8.10.1: Wed May 23 16:33:00 PDT
2007; root:xnu-792.22.5~1/RELEASE_I386 i386
Jan 18, 07:12:09 Info
APP IPSec authenticating
Jan 18, 07:12:09 Info
APP IKE daemon started
Jan 18, 07:12:09 Debug APP State change from AUTHENTICATING to
RUNNING after event TIMER
Jan 18, 07:12:09 Info
APP IPSec started
Jan 18, 07:12:09 Warning IKE Foreground mode.
Jan 18, 07:12:09 Info
IKE @(#)ipsec-tools CVS (http://ipsectools.sourceforge.net)
Jan 18, 07:12:09 Info
IKE @(#)This product linked OpenSSL 0.9.7l 28
Sep 2006 (http://www.openssl.org/)
Jan 18, 07:12:09 Info
IKE Reading configuration from "/Library
/Application Support/Lobotomo Software/IPSecuritas/racoon.conf"
Jan 18, 07:12:09 Info
IKE Resize address pool from 0 to 255
Jan 18, 07:12:09 Debug IKE parse successed.
Jan 18, 07:12:09 Debug IKE open /Library/Application
Support/Lobotomo Software/IPSecuritas/admin.sock as racoon
management.
Jan 18, 07:12:09 Debug IKE my interface: fe80::1%lo0 (lo0)
Jan 18, 07:12:09 Debug IKE my interface: 127.0.0.1 (lo0)
Jan 18, 07:12:09 Debug IKE my interface: ::1 (lo0)
Jan 18, 07:12:09 Debug IKE my interface: 172.16.1.14 (en1)
Jan 18, 07:12:09 Debug IKE my interface: fe80::21c:42ff:fe00:0%en2
(en2)
Jan 18, 07:12:09 Debug IKE my interface: 10.37.129.2 (en2)
Jan 18, 07:12:09 Debug IKE my interface: fe80::21c:42ff:fe00:1%en3
(en3)
Jan 18, 07:12:09 Debug IKE my interface: 10.211.55.2 (en3)
Jan 18, 07:12:09 Debug IKE configuring default isakmp port.
Jan 18, 07:12:09 Debug IKE 8 addrs are configured successfully
Jan 18, 07:12:09 Info
IKE 10.211.55.2[500] used as isakmp port (fd=6)
Jan 18, 07:12:09 Info
IKE fe80::21c:42ff:fe00:1%en3[500] used as
isakmp port (fd=7)
Jan 18, 07:12:09 Info
IKE 10.37.129.2[500] used as isakmp port (fd=8)
Jan 18, 07:12:09 Info
IKE fe80::21c:42ff:fe00:0%en2[500] used as
isakmp port (fd=9)
Jan 18, 07:12:09 Info
IKE 172.16.1.14[500] used as isakmp port
(fd=10)
Jan 18, 07:12:09 Info
IKE ::1[500] used as isakmp port (fd=11)
Jan 18, 07:12:09 Info
IKE 127.0.0.1[500] used as isakmp port (fd=12)
Jan 18, 07:12:09 Info
IKE fe80::1%lo0[500] used as isakmp port (fd=13)
Jan 18, 07:12:09 Debug IKE get pfkey X_SPDDUMP message
Jan 18, 07:12:09 Debug IKE 02120200 02000000 00000000 b50c0000
Jan 18, 07:12:09 Debug IKE pfkey X_SPDDUMP failed: No such file or
directory
[/font]
The last line of the log appears to be the real clue. What file or directory is
it looking for?
Re: IPSecuritas works /w Check Point VPN-1 NGX (R6
by brantwinter on 2008-01-20 14:05:27 +0100
I am having the same issue.
My VPN ( IPSecuritas -> Draytek 2800 ) was working fine yesterday, but
today keeps failing with error:
pfkey X_SPDDUMP failed: No such file or directory
Funny thing is, I have another profile in IPSecuritas set up that goes off to a
different VPN endpoint that continues to work fine.
I have used Frameseer to look at the outgoing traffic on both setups, the
one that works does a DNS lookup first, the failing VPN configuration sends
NO traffic out the interface at all.
Just out of interest, my psk.txt file in:
/Library/Application Support/Lobotomo Software/IPSecuritas/
is empty...
Obviously psk.txt gets overwritten each time the vm config loads. When I
use the vpn config for my working vpn I have entries in the psk.txt file. In
my non-working vpn setup, the psk.txt remains empty. WTF?????
As I said previousy, this same vpn config worked fine yesterday....
Re: IPSecuritas works /w Check Point VPN-1 NGX (R6
by macman365 on 2008-01-22 16:45:12 +0100
I've found this thread on another forum:
http://ubuntuforums.org/showthread.php?t=441078
Does this help anyone more knowledgeable than me...?
Re: IPSecuritas works /w Check Point VPN-1 NGX (R6
by gajos on 2008-01-29 22:50:39 +0100
Hi, my first time here.
I need to connect to CheckPoint Safe@Office but using Checkpoint VPN
client under Tiger was really problematic (if connection was successful then
I had connection only to LAN without Internet), now I have Leopard and
Checkpoint won't install. IPSecuritas 3.1 still doesn't connect.
I tried to configure connection as [b]bugfish[/b] suggested previously but
still nothing.
Here is log:
Jan 29, 20:50:56 Info
APP IPSec authenticating
Jan 29, 20:50:56 Info
APP IKE daemon started
Jan 29, 20:50:56 Debug APP State change from AUTHENTICATING to
RUNNING after event TIMER
Jan 29, 20:50:56 Info
APP IPSec started
Jan 29, 20:50:56 Debug APP Received SADB message type X_SPDUPDATE
- not interesting
Jan 29, 20:50:56 Debug APP Received SADB message type X_SPDUPDATE
- not interesting
Jan 29, 20:50:56 Debug APP Received SADB message type X_SPDUPDATE
- not interesting
Jan 29, 20:50:56 Debug APP Received SADB message type X_SPDUPDATE
- not interesting
Jan 29, 20:50:56 Debug APP Received SADB message type X_SPDUPDATE
- not interesting
Jan 29, 20:50:56 Debug APP Received SADB message type X_SPDUPDATE
- not interesting
Jan 29, 20:50:56 Error IKE Foreground mode.
Jan 29, 20:50:56 Info
IKE @(#)ipsec-tools CVS (http://ipsectools.sourceforge.net)
Jan 29, 20:50:56 Info
IKE @(#)This product linked OpenSSL 0.9.7l 28
Sep 2006 (http://www.openssl.org/)
Jan 29, 20:50:56 Info
IKE Reading configuration from "/Library
/Application Support/Lobotomo Software/IPSecuritas/racoon.conf"
Jan 29, 20:50:56 Info
IKE Resize address pool from 0 to 255
Jan 29, 20:50:56 Debug IKE lifetime = 600
Jan 29, 20:50:56 Debug IKE lifebyte = 0
Jan 29, 20:50:56 Debug IKE encklen=0
Jan 29, 20:50:56 Debug IKE p:1 t:1
Jan 29, 20:50:56 Debug IKE 3DES-CBC(5)
Jan 29, 20:50:56 Debug IKE SHA(2)
Jan 29, 20:50:56 Debug IKE 1024-bit MODP group(2)
Jan 29, 20:50:56 Debug IKE Hybrid RSA client(64221)
Jan 29, 20:50:56 Debug IKE compression algorithm can not be checked
because sadb message doesn't support it.
Jan 29, 20:50:56 Debug IKE parse successed.
Jan 29, 20:50:56 Debug IKE open /Library/Application
Support/Lobotomo Software/IPSecuritas/admin.sock as racoon
management.
Jan 29, 20:50:56 Info
IKE 192.168.1.2[4500] used as isakmp port
(fd=6)
Jan 29, 20:50:56 Info
IKE 192.168.1.2[500] used as isakmp port (fd=7)
Jan 29, 20:50:56 Debug IKE get pfkey X_SPDDUMP message
Jan 29, 20:50:56 Debug IKE 02120000 0f000200 05000000 720f0000
03000500 ff000000 10020000 00000000
Jan 29, 20:50:56 Debug IKE 00000000 00000000 03000600 ff200000
10020000 c0a80102 00000000 00000000
Jan 29, 20:50:56 Debug IKE 07001200 02000100 20000000 00000000
28003200 02035800 10020000 59ab6892
Jan 29, 20:50:56 Debug IKE 00000000 00000000 10020000 c0a80102
Problem with Fortinet Fortigate 50A
Problem with Fortinet Fortigate 50A
by mspr on 2007-04-27 13:16:54 +0200
Hello,
I hope that you can help me...
I have a problem with IPSecuritas 3.0 Release Candidate and my Fortinet
Fortigate 50A
I tried to configure a VPU with a preshared key and XAuth but every time I
receive a notify message "fatal NO-PROPOSAL-CHOSEN, phase1 should be
deleted" and I cannot start my VPN
I tried to disable the XAuth procedure and the VPN seems to work fine (only
Preshared key authentication)
These are my VPN parameters:
[b]IPSecuritas Preferences[/b]
[URL=http://img63.imageshack.us/my.php?image=07uu0.jpg][IMG]http:
//img63.imageshack.us/img63/3673/07uu0.th.jpg[/IMG][/URL]
[b]Connections General[/b]
[URL=http://img101.imageshack.us/my.php?image=01lr6.jpg][IMG]http:
//img101.imageshack.us/img101/7812/01lr6.th.jpg[/IMG][/URL]
[b]Connections Phase 1[/b]
[URL=http://img230.imageshack.us/my.php?image=02xl5.jpg][IMG]http:
//img230.imageshack.us/img230/3806/02xl5.th.jpg[/IMG][/URL]
[b]Connections Phase 2[/b]
[URL=http://img170.imageshack.us/my.php?image=03id8.jpg][IMG]http:
//img170.imageshack.us/img170/4381/03id8.th.jpg[/IMG][/URL]
[b]Connections ID[/b]
[URL=http://img230.imageshack.us/my.php?image=04sp3.jpg][IMG]http:
//img230.imageshack.us/img230/157/04sp3.th.jpg[/IMG][/URL]
I tried to insert Username/Psswd directly in this panel but I received the
same message error
If possible I would like that IPSecuritas asks me the Username/Psswd on
VPN login
[b]Connections DNS[/b]
[URL=http://img145.imageshack.us/my.php?image=05qs1.jpg][IMG]http:
//img145.imageshack.us/img145/7426/05qs1.th.jpg[/IMG][/URL]
[b]Connections Options[/b]
[URL=http://img291.imageshack.us/my.php?image=06ho1.jpg][IMG]http:
//img291.imageshack.us/img291/8168/06ho1.th.jpg[/IMG][/URL]
[b]This is the log:[/b]
IPSecuritas 3.0rc build 1040
Info
APP IKE daemon started
Info
APP IPSec started
Error IKE Foreground mode.
Info
IKE @(#)ipsec-tools CVS (http://ipsec-tools.sourceforge.net)
Info
IKE @(#)This product linked OpenSSL 0.9.7i 14 Oct 2005
(http://www.openssl.org/)
Info
IKE Reading configuration from "/Library/Application
Support/Lobotomo Software/IPSecuritas/racoon.conf"
Info
IKE Resize address pool from 0 to 255
Error IKE fatal NO-PROPOSAL-CHOSEN notify messsage, phase1 should
be deleted.
Error IKE fatal NO-PROPOSAL-CHOSEN notify messsage, phase1 should
be deleted.
Error IKE phase2 negotiation failed due to time up waiting for phase1.
ESP My server IP XXX.XXX.XXX.XXX[500]-> My computer IP
192.168.XXX.XXX[500]
Re: Problem with Fortinet Fortigate 50A
by Forum Admin on 2007-04-27 15:53:06 +0200
Hi,
have you tried 'Hybrid' instead of XAUTH PSK?
Christoph
Re: Problem with Fortinet Fortigate 50A
by mspr on 2007-04-27 16:01:35 +0200
[quote author=Forum Admin link=1177672614/0#1 date=1177681986]Hi,
have you tried 'Hybrid' instead of XAUTH PSK?
Christoph[/quote]
Hi, yes I tried to set "Hybrid" instead of XAuth but it doesn't work
Re: Problem with Fortinet Fortigate 50A
by Forum Admin on 2007-04-27 18:10:49 +0200
Hi again,
could you please provide logs with log level set to 'Verbose'?
Thanks alot,
Christoph
Re: Problem with Fortinet Fortigate 50A
by mspr on 2007-05-03 11:27:52 +0200
[quote author=Forum Admin link=1177672614/0#3 date=1177690249]Hi
again,
could you please provide logs with log level set to 'Verbose'?
Thanks alot,
Christoph[/quote]
Hi, Christoph,
I sent you by email the logs (XAuth and Hybrid)
Thank you
VPN Case Study.com has solution for VPN Client
VPN Case Study.com has solution for VPN Client
by jmizoguchi on 2007-05-03 18:59:04 +0200
I have two new documents using FVS124G
IPSecuritas 3 (Mac OS X) using Prosafe VPN/Firewall Router FVS124G
VPN Tracker 4 (Mac OS X) using Prosafe VPN/Firewall Router FVS124G
http://vpncasestudy.com/casestudy/others/casestudy.html
www.vpncasestudy.com
If these docuemens help you. please e-mail me at [email protected]
for your testimonials
Dynamic dns as host
Dynamic dns as host
by omega_red on 2007-05-04 13:01:09 +0200
when i set my dynamic dns hostname in the Remote IPSec Device field i
cannot connect to my ZyWALL 5 UTM but when i enter my remote ip(witch
changes every day) it works.
im using the beta client
thanks!
ping to remote site impossible
ping to remote site impossible
by Joe on 2007-05-05 14:38:11 +0200
I have installed ipsecuritas 3.0rc3 for the first time on my Macbook Pro (OS
X 10.4.9).
First of all: very nice and helpful tool !!
I established a connection to my remote site without problems, the light
shows 'green' and the router log tells me: ...connection established....
My problem: i am not able to ping any host at the remote site ?
Trying it with the exact same settings in a windows box (parallels session
with win xp on the same Mcbook) is working without any problems!
How can i manage this on the Mac OS site ?
Re: ping to remote site impossible
by Joe on 2007-05-05 16:17:35 +0200
Followup (is this the correct engl. expression ? sorry for my bad english):
if i take a look at my if-settings and routing tables i'm really wondering
about, that there are no settings at all for the established vpn connection ?!
After that, i tried this:
# ifconfig gif0 172.16.0.10 192.168.23.0 netmask 255.255.255.0
# route add 192.168.23.0 172.16.0.10
# ping 192.168.23.200
PING 192.168.23.200 (192.168.23.200): 56 data bytes
64 bytes from 192.168.23.200: icmp_seq=0 ttl=126 time=57.507 ms
64 bytes from 192.168.23.200: icmp_seq=1 ttl=126 time=56.945 ms
...
So, now it works.
My question is now: do i have to do it by hand with IPSecuritas after
establishing a connection, or are there any automatisms which i can use for
that?
Endpoint mode: anywhere still not work in 3.0rc3
Endpoint mode: anywhere still not work in 3.0rc3
by Keen on 2007-05-05 21:34:06 +0200
Last log messages:
May 05, 23:20:22 Debug
May 05, 23:20:22 Debug
May 05, 23:20:22 Debug
directory
IKE get pfkey X_SPDDUMP message
IKE 02120200 00020000 00000000 00003790
IKE pfkey X_SPDDUMP failed: No such file or
Re: Endpoint mode: anywhere still not work in 3.0r
by nickl on 2007-05-11 04:31:51 +0200
I got it to work with my configuration by enabling the "Local IP in Remote
Network" option.
Re: Endpoint mode: anywhere still not work in 3.0r
by Forum Admin on 2007-05-12 11:26:25 +0200
Hello,
thank you very much for this answer - I removed the necessity to enable
this option for host to anwhere mode.
Christoph
Phase 2 trouble
Phase 2 trouble
by ad_agent on 2007-05-16 03:01:27 +0200
When I initiate a connection, Phase 1 seems to complete but Phase 2 fails.
Below is a relevant portion of the IPSecuritas log.
Host is an iBook G4 running MacOS X 10.4.8. Testing is over Earthlink
dialup as representative of service offered in many hotels. Network router is
Netgear FVX538. Version of IPSecuritis is 3.0rc3. I would post my host and
network settings gladly, but am not doing so now since I hope to get
preliminary analysis of problem just posting log excerpts.
LOG EXCERPTS (certain IP addresses redacted)
May 15, 20:09:19 Debug IKE begin QUICK mode.
May 15, 20:09:19 Info
IKE initiate new phase 2 negotiation:
4.249.6.45[500]<=>x.x.x.x[500]
May 15, 20:09:19 Debug IKE compute IV for phase2
May 15, 20:09:19 Debug IKE phase1 last IV:
May 15, 20:09:19 Debug IKE 5be42a2e 67590499 e50b77d1
May 15, 20:09:19 Debug IKE hash(sha1)
May 15, 20:09:19 Debug IKE encryption(3des)
May 15, 20:09:19 Debug IKE phase2 IV computed:
May 15, 20:09:19 Debug IKE d1077c37 bd8058ce
May 15, 20:09:19 Debug IKE call pfkey_send_getspi
May 15, 20:09:19 Debug IKE pfkey GETSPI sent: ESP/Tunnel
x.x.x.x[0]->4.249.6.45[0]
May 15, 20:09:19 Debug IKE pfkey getspi sent.
May 15, 20:09:19 Debug IKE get pfkey ACQUIRE message
............
May 15, 20:09:19 Debug IKE 00000000 00000000 00000000 00000000
00000000 00000000 00000000 00015180
May 15, 20:09:19 Debug IKE 00000000 00007080 00000000 00000000
00020012 00020200 0000000d 00000000
May 15, 20:09:19 Debug IKE ignore the acquire because ph2 found
May 15, 20:09:19 Debug IKE get pfkey GETSPI message
May 15, 20:09:19 Debug IKE 02010003 000a0000 00000012 00000134
00020001 0b9edf00 40060000 7f000001
May 15, 20:09:19 Debug IKE 00030005 ff200000 10020000 44a34441
00000000 00000000 00030006 ff200000
May 15, 20:09:19 Debug IKE 10020000 04f9062d 00000000 00000000
May 15, 20:09:19 Debug IKE pfkey GETSPI succeeded: ESP/Tunnel
68.163.68.65[0]->4.249.6.45[0] spi=194961152(0xb9edf00)
May 15, 20:09:19 Debug IKE use local ID type IPv4_address
May 15, 20:09:19 Debug IKE use remote ID type IPv4_subnet
May 15, 20:09:19 Debug IKE IDci:
May 15, 20:09:19 Debug IKE 01000000 c0a83202
May 15, 20:09:19 Debug IKE IDcr:
May 15, 20:09:19 Debug IKE 04000000 c0a80100 ffffff00
May 15, 20:09:19 Debug IKE add payload of len 284, next type 10
May 15, 20:09:19 Debug IKE add payload of len 16, next type 5
May 15, 20:09:19 Debug IKE add payload of len 8, next type 5
May 15, 20:09:19 Debug IKE add payload of len 12, next type 0
May 15, 20:09:19 Debug IKE HASH with:
............
May 15, 20:09:19 Debug IKE hmac(hmac_sha1)
May 15, 20:09:19 Debug IKE HASH computed:
May 15, 20:09:19 Debug IKE add payload of len 20, next type 1
May 15, 20:09:19 Debug IKE begin encryption.
May 15, 20:09:19 Debug IKE encryption(3des)
May 15, 20:09:19 Debug IKE pad length = 8
...............
May 15, 20:09:19 Debug IKE 39bb3b63 ee17ccbd a4bcf648 0500000c
01000000 c0a83202 00000010 04000000
May 15, 20:09:19 Debug IKE c0a80100 ffffff00 104609a6 2903de07
NetScreen SSG5
NetScreen SSG5
by glancyguy on 2007-05-18 23:24:09 +0200
Hello,
I downloaded the latest stable version of IPSecuritas today from the main
site. I am trying to configure it for a NetScreen SSG5. This is a managed
firewall/VPN device that I do not have access to. We have a windows client
and corresponding policy file. Using the windows file, I believe I have
reverse engineered the settings. I also downloaded "VPN Tracker" and
configured it. It worked out of the box with our NetScreen. I copied the
settings from the VPN Tracker into the IPSecuritas config screen.
The only setting that did not map is the ID. The NetScreen uses an email
address for local ID and the VPN Tracker software makes that specification.
The IPSecuritas only allows for a DN. I am not sure if this makes a
difference. I used a the email address in the DN field of the IP Securitas
software.
I enabled verbose logging. And tried to connect to the NetScreen. I am
getting hung in Phase 1 and timing out. I have attached the log file to this
message. I am hoping that someone can pull something out of the debug
to help. I would much rather use this product than the VPN tracker.
Here are interesting erors from the log:
May 18 16:07:56 darren-hochs-computer racoon: DEBUG:
pfkey.c:210:pfkey_handler(): pfkey X_SPDDUMP failed: No such file or
directory\n
May 18 16:07:56 darren-hochs-computer racoon: DEBUG:
pfkey.c:195:pfkey_handler(): get pfkey REGISTER message\n
May 18 16:07:56 darren-hochs-computer racoon: DEBUG:
pfkey.c:234:pfkey_handler(): not supported command REGISTER\n
May 18 16:07:56 darren-hochs-computer racoon: DEBUG:
grabmyaddr.c:340:update_myaddrs(): msg 1 not interesting\n
May 18 16:07:56 darren-hochs-computer racoon: DEBUG:
grabmyaddr.c:340:update_myaddrs(): msg 1 not interesting\n
May 18 16:07:56 darren-hochs-computer racoon: INFO:
isakmp.c:2047:isakmp_post_acquire(): IPsec-SA request for 216.128.24.73
queued due to no phase1 found.\n
May 18 16:07:56 darren-hochs-computer racoon: DEBUG:
isakmp.c:1803:isakmp_ph1resend(): resend phase1 packet
75d194a46e9b155f:0000000000000000\n
May 18 16:07:58 darren-hochs-computer racoon: DEBUG:
grabmyaddr.c:340:update_myaddrs(): msg 16 not interesting\n
May 18 16:07:58 darren-hochs-computer racoon: DEBUG:
grabmyaddr.c:340:update_myaddrs(): msg 15 not interesting\n
May 18 16:08:16 darren-hochs-computer racoon: DEBUG:
sockmisc.c:421:sendfromto(): sockname 192.168.1.105[50]
May 18 16:08:27 darren-hochs-computer racoon: ERROR:
isakmp.c:2139:isakmp_chkph1there(): phase2 negotiation failed due to
time up waiting for phase1. ESP 216.128.24.73->192.168.1.105 \n
May 18 16:08:27 darren-hochs-computer racoon: INFO:
Re: NetScreen SSG5
by Dave on 2007-05-19 17:17:26 +0200
I'm not sure if it will help but in the ID section of IPSecuritas, you can select
FQDN which is basically an email address. Note that I'm using the RC3
version of 3.0; if you have 2.2, it might be called something else.
Fortigate 300A to optain DHCP on using IPSecuritas
Fortigate 300A to optain DHCP on using IPSecuritas
by lleung on 2007-05-23 12:53:45 +0200
Have anyone had problems with IPSecuritas getting a DHCP address from a
Fortigate 300A (Firmware 3.00, Build0477,070126) ?
I seem to have no problems getting the windows (Parallels VM) ipsec client
(Forticlient) to connect and request an address from it's DHCP server. But
no luck doing that natively. I can however get around this by defining a
static address for the connection. But of course, that's messy when there
are multiple users..
Re: Fortigate 300A to optain DHCP on using IPSecur
by varruss on 2007-07-21 23:02:01 +0200
I figured this one out yesterday. :) You need a rule on the FG
Inside--Your subnet--outside--all--DHCP---Encrypt.
Leave the rule after your inside-outside-any rule.
If you have any Fortigate questions don't hesitate ask.
Zyxel ZyWALL 35
Zyxel ZyWALL 35
by steffen on 2007-05-24 17:39:56 +0200
Hi All,
it took some time to make IPSecuritas work with our ZyWALL 35. So I've
decided to let you know a working configuration for both.
- ZyWALL 35 firmware: V4.01(WZ.3) | 12/04/2006
- IPSecuritas 3.0rc
- Mac OS X 10.4
The configuration works for dynamic client IP Adresses. You'll find the
screenshots of the ZyWALL's web configuration utilitity and the IPSecuritas
VPN client here: [url]http://www.semture.de/images/stories/external
/ipsecutitas-screenshots.zip[/url]
Re: Zyxel ZyWALL 35
by nob on 2007-05-27 18:20:55 +0200
This looks good, but did not work for me. I get a Error, tried different other
settings. But i canґt get it to work....
Error in IPSecuritas:
inappropriate sadb aquire message passed
Error in Zywall Log:
Recv:[HASH][NOTFY:ERR_ID_INFO]
IPSecuritas 3.0rc3
Zywall 5W, Firmware Version V4.01(XD.2)
NAT in VPN-Rule is off.
Re: Zyxel ZyWALL 35
by steffen on 2007-05-27 22:14:07 +0200
Hi nob,
the error indicates that you are using a different ID in IPSecuritas and the
Zywall. First check the FQDN entries (or what ever you choose for
identification/ID). Secondly even if you choose FQDN the adress ranges
must match too. So compare the "Remote side" entry for "Network Adress"
of IPSecuritas with the "Local Network" settings in the ZyWALL setup. Maybe
you've translatet the Subnet mask to a wrong CIDR, if so have a look at
[url]http://en.wikipedia.org/wiki/Classless_Inter-Domain_Routing[/url] for
computing it.
Hope it helps
Steffen
Re: Zyxel ZyWALL 35
by steffen on 2007-05-27 22:19:10 +0200
Hi all,
I've noticed that if your Mac OS client is behind a firewall too, you have to
switch the NAT-T to "Disabled" in IPSecuritas. You can (should?) leave
NAT-Traversal in the Zywall enabled.
Support Apple Keychain
Support Apple Keychain
by dbertolo on 2007-05-25 09:04:25 +0200
Hi
I am currently evaluating IPsec clients for Mac OS X. I came across
IPSecuritas which I find is doing great and is probably my favorite. But
unfortunately, one requirement is not met. Our new client should support
the Apple Keychain to store the user certificates.
Would be nice, if this feature will be implemented in the near future.
Regards,
Daniel Bertolo
Lost internet at VPN network...
Lost internet at VPN network...
by aklschnapps on 2007-05-25 20:17:41 +0200
I've run into an odd situation.
- Macbook Pro on external wifi network.
- Sonicwall Pro 2040 acting as firewall/dhcp/vpn for internal network.
I can connect to my sonicwall 2040 with VPN Tracker without any problems.
It took me a while to tweak the settings and get IPSecuritas to connect to
the VPN. However, when it succeeds all of the computers on the internal
network (connected to the sonicwall) lose their internet connection! As
soon as I disconnect IPSecuritas from the VPN the internet connection
resumes.
Any thoughts? Anything I should do to test further? I've looked in the
sonicwall logs but can't see anything odd after I've connected with
IPSecuritas. Unfortunately I can't leave it connected for long periods to test,
as it cuts off the entire office from the internet.
Any help would be much appreciated!
Here's my configuration in IPSecuritas:
Host to Network
Aggressive, Claim 16
Phase 1, Mod1024, 3DES, SHA1
Phase 2, None, 3DES, HMAC SHA1
Checked Options:
IPSec DOI
SIT_IDENTITY_ONLY
Initial Contact
MIP6
DHCP Pass-Through
Establish IKE immediately
IPSecuritas and racoon
IPSecuritas and racoon
by lithium on 2007-05-30 13:46:23 +0200
Is there a reason for IPSecuritas to install and use another version of
racoon?
-r-xr-xr-x 1 root wheel 877932 Jan 3 08:38 /usr/sbin/racoon
-rwxr-xr-x 1 root wheel 1232888 May 27 18:43 /Library/StartupItems
/IPSecuritasDaemon/racoon
Re: IPSecuritas and racoon
by cnadig on 2007-05-30 16:33:34 +0200
Hi,
yes, the version of racoon included with MacOS doesn't support XAUTH and
only offers limited, outdated NAT-T support as well as a few more things
that are available with the racoon version that comes with IPSecuritas.
Cheers,
Christoph
Re: IPSecuritas and racoon
by Athanyel on 2007-05-31 00:13:08 +0200
Does the version of racoon that ships with IPSecuritas support
GSSAPI/Kerberos? This would be ideal for large IPsec deployments.
Re: IPSecuritas and racoon
by cnadig on 2007-05-31 09:41:35 +0200
No, while there is support for it in the code, it is disabled.
According to the documentation, it is very experimental and will most
probably only work with very few firewalls.
Christoph
Re: IPSecuritas and racoon
by Athanyel on 2007-06-01 03:43:49 +0200
Well, for IPsec implementations in Transport mode (vs. Tunnel mode for
VPNs and firewalls), Kerberos would be a huge benefit for large
deployments. I'd love to see it long term. Thanks for all the great work on
this!
Re: IPSecuritas and racoon
by .guru on 2008-02-29 22:29:16 +0100
As racoon and the ipsec-tools are open source projects it would be great to
see your modifications to the code. Is it possible to publish your MacOS X
compatible version of racoon as sources?
.guru
Sonicwall & X-AUTH
Sonicwall & X-AUTH
by mpgough on 2007-05-30 18:13:09 +0200
Hi,
I have installed v3 today but am unable to connect to either of my two sites.
Both Sonicwall TZ-170's which I can connect to fine using VPN Tracker but
no IPSecuritas.
I have tried configuring both connections using the wizard and also copying
the config from VPN Tracker to IPSecuritas, also reducing my mtu to 1400
but no joy.
I have attached the error Im getting but my suspision is its something to do
with the handling of XAUTH??
IPSecuritas 3.0 build 1693, Sun May 27 21:43:28 MVT 2007, nadig
Darwin 8.9.1 Darwin Kernel Version 8.9.1: Thu Feb 22 20:55:00 PST 2007;
root:xnu-792.18.15~1/RELEASE_I386 i386
May 30, 17:12:51 Info
APP IKE daemon started
May 30, 17:12:51 Info
APP IPSec started
May 30, 17:12:51 Error IKE Foreground mode.
May 30, 17:12:51 Info
IKE @(#)ipsec-tools CVS (http://ipsectools.sourceforge.net)
May 30, 17:12:51 Info
IKE @(#)This product linked OpenSSL 0.9.7l 28
Sep 2006 (http://www.openssl.org/)
May 30, 17:12:51 Info
IKE Reading configuration from "/Library
/Application Support/Lobotomo Software/IPSecuritas/racoon.conf"
May 30, 17:12:51 Info
IKE Resize address pool from 0 to 255
May 30, 17:12:52 Info
APP Initiated connection KP Couriers
May 30, 17:12:52 Error IKE inappropriate sadb acquire message passed.
May 30, 17:12:52 Warning IKE No ID match.
May 30, 17:12:52 Info
IKE couldn't find the proper pskey, try to get one
by the peer's address.
May 30, 17:12:53 Error IKE fatal NO-PROPOSAL-CHOSEN notify
messsage, phase1 should be deleted.
May 30, 17:12:53 Error IKE Message: 'v No proposal is chosen'.
May 30, 17:12:54 Info
APP IPSec stopping
May 30, 17:12:55 Info
APP IKE daemon terminated
Re: Sonicwall & X-AUTH
by TimothyFerrell on 2007-06-12 17:30:03 +0200
Make sure your phase 1 is set to aggressive mode. If that doesn't do
anything for you, I'd try matching the settings from the post "Cannot
connect to Sonicwall TZ170."
I am getting the same error about no ID match even with copying his
settings. Good luck.
losing settings...
losing settings...
by lithium on 2007-06-03 21:41:34 +0200
Every time when I make some changes to a connection in IPSecuritas 3.0
(e.g. Change phase 1 information) it seems that my configuration is lost. I
don’t mean that my settings in the different menus are lost but whenever I
start an IPSEC connection I get an error mentioning a missing key file. I
understand the warning in the log because /Library/Application
Support/Lobotomo/IPsecuritas/psk.txt is empty and Library/Application
Support/Lobotomo/IPsecuritas/racoon.conf is missing some vital
information about just about everything (there is something mentioning
padding…and that is it).
The only solution I found is killing the IPSecuritas daemon, removing
everything from Library/Application Support/Lobotomo/IPsecuritas. After
restarting IPSecuritas and setting up a new connection everything works
fine…until I have the need to change some settings.
Any ideas about this problem?
Quick mode to Windows Server 2003 fails!
Quick mode to Windows Server 2003 fails!
by Athanyel on 2007-06-06 00:09:38 +0200
Please see the topic "Using 3.0 to connect to Windows in transport mode"
([url]http://www.lobotomo.com/cgi-bin/yabb/YaBB.pl?board=IPSecuritas;
action=display;num=1176493464[/url]) for a brief description of what I'm
trying to do.
The above worked in 3.0rc and 3.0rc3. In 3.0 Final, it's broken. The client
completes the main mode, begins quick mode and immediately fails.
Here's an excerpt from the connection log:
[code]Jun 05, 09:57:43 Info
IKE ISAKMP-SA established
x.x.x.x[500]-y.y.y.y[500] spi:04a82d40810af54e:142c9e35ad31af0b
Jun 05, 09:57:43 Debug IKE ===
Jun 05, 09:57:44 Debug IKE ===
Jun 05, 09:57:44 Debug IKE begin QUICK mode.
Jun 05, 09:57:44 Info
IKE initiate new phase 2 negotiation: x.x.x.x[500]
<=>y.y.y.y[500]
Jun 05, 09:57:44 Debug IKE compute IV for phase2
Jun 05, 09:57:44 Debug IKE phase1 last IV:
Jun 05, 09:57:44 Debug IKE 5699e40c ca453648 e41a1ab6
Jun 05, 09:57:44 Debug IKE hash(sha1)
Jun 05, 09:57:44 Debug IKE encryption(3des)
Jun 05, 09:57:44 Debug IKE phase2 IV computed:
Jun 05, 09:57:44 Debug IKE 54bdd941 4c341df1
Jun 05, 09:57:44 Debug IKE call pfkey_send_getspi
Jun 05, 09:57:44 Debug IKE pfkey GETSPI sent: ESP/Transport
y.y.y.y[0]->x.x.x.x[0]
Jun 05, 09:57:44 Debug IKE pfkey getspi sent.
Jun 05, 09:57:44 Debug IKE get pfkey GETSPI message
Jun 05, 09:57:44 Debug IKE 02010003 0a000000 01000000 07010000
02000100 0ae31793 00000000 00000000
Jun 05, 09:57:44 Debug IKE 03000500 ff200000 10020000 ac107c90
00000000 00000000 03000600 ff200000
Jun 05, 09:57:44 Debug IKE 10020000 803e5e12 00000000 00000000
Jun 05, 09:57:44 Debug IKE pfkey GETSPI succeeded: ESP/Transport
y.y.y.y[0]->x.x.x.x[0] spi=182654867(0xae31793)
Jun 05, 09:57:44 Debug IKE hmac(modp1024)
Jun 05, 09:57:44 Debug IKE hmac(modp1024)
Jun 05, 09:57:44 Debug IKE hmac(modp1024)
Jun 05, 09:57:44 Debug IKE compute DH's private.
Jun 05, 09:57:44 Debug IKE 4928d074 54d4d6e4 b2aa3856 9cc570c2
ca8aad46 3bbe69c1 80913006 43a81766
Jun 05, 09:57:44 Debug IKE b8d6c017 1d924020 cc701d58 8070c3eb
0d226a5c d422672a a8486b61 7f96ce81
Jun 05, 09:57:44 Debug IKE ac1e2050 06205d44 23ca1723 fc7926b2
5d9be4bf 15b8e4a2 f270e305 3684b9ee
Jun 05, 09:57:44 Debug IKE 6e677469 c7df9a57 611a6837 b24e51e5
e4358ee1 5a8deac4 8dab7505 ca1822f9
Jun 05, 09:57:44 Debug IKE compute DH's public.
Jun 05, 09:57:44 Debug IKE c3a4f9dc ffd616ca 650fcd03 1c7c1ad7
66cb5e88 b8694dc1 bb1ee61a bf521f56
Jun 05, 09:57:44 Debug IKE 418313d7 2073a766 f12b36ca 31274310
be9301ef 141564fc 565bdc95 76c95823
Jun 05, 09:57:44 Debug IKE c12ba88e 34ca7282 cb64b967 e0f231c5
053abf72 a547040a 8407d74c 9a5e7040
Jun 05, 09:57:44 Debug IKE efb70f61 bf2a9fc5 08ab2e1d 475687be
748c114d 3ea47a16 55827b84 2dc19c7c
Jun 05, 09:57:45 Info
APP IKE daemon terminated
Jun 05, 09:57:45 Debug APP State change from RUNNING to IDLE after
event RACOON TERMINATED
Jun 05, 09:57:45 Debug APP Received SADB message type X_SPDDELETE
Re: Quick mode to Windows Server 2003 fails!
by Athanyel on 2007-06-07 01:18:39 +0200
After a bit more digging, it appears that Racoon is crashing. I'm running on
a MacBook Pro with an Intel Core Duo. I'm going to try downloading the
application again...but I'm not sure what else I can do to try to fix this.
[code]Host Name:
alexs-computer
Date/Time:
2007-06-06 18:13:26.620 -0500
OS Version:
10.4.9 (Build 8P2137)
Report Version: 4
Command: racoon
Path: /Library/StartupItems/IPSecuritasDaemon/racoon
Parent: IPSecuritasDaemon [110]
Version: ??? (???)
PID: 255
Thread: 0
Exception: EXC_BAD_ACCESS (0x0001)
Codes:
KERN_PROTECTION_FAILURE (0x0002) at 0x00000004
Thread 0 Crashed:
0 racoon
0x00064f05 0x1000 + 409349
1 racoon
0x0003f739 0x1000 + 255801
2 racoon
0x00033d11 0x1000 + 208145
3 racoon
0x00018551 0x1000 + 95569
4 racoon
0x0000900f 0x1000 + 32783
5 racoon
0x000257a2 0x1000 + 149410
6 racoon
0x00023e37 0x1000 + 142903
7 racoon
0x00002de8 0x1000 + 7656
8 racoon
0x00002618 0x1000 + 5656
9 racoon
0x000021ee 0x1000 + 4590
10 racoon
0x00002115 0x1000 + 4373
Thread 0 crashed with X86 Thread State (32-bit):
eax: 0x00000004 ebx: 0x0003f703 ecx: 0x00000080 edx: 0x00309114
edi: 0x00000004 esi: 0x00000001 ebp: 0xbffff568 esp: 0xbffff530
ss: 0x0000001f efl: 0x00010206 eip: 0x00064f05 cs: 0x00000017
ds: 0x0000001f es: 0x0000001f fs: 0x00000000 gs: 0x00000037
Binary Images Description:
0x1000 - 0x86fff racoon
/Library/StartupItems/IPSecuritasDaemon
/racoon
0x8fe00000 - 0x8fe4afff dyld 46.12
/usr/lib/dyld
0x90000000 - 0x90170fff libSystem.B.dylib
/usr/lib/libSystem.B.dylib
0x901c0000 - 0x901c2fff libmathCommon.A.dylib
/usr/lib/system
/libmathCommon.A.dylib
0x90bd0000 - 0x90bd7fff libgcc_s.1.dylib
/usr/lib/libgcc_s.1.dylib
0x9193a000 - 0x919ecfff libcrypto.0.9.7.dylib
/usr/lib
/libcrypto.0.9.7.dylib
0x949d0000 - 0x949edfff libresolv.9.dylib
/usr/lib
/libresolv.9.dylib[/code]
Re: Quick mode to Windows Server 2003 fails!
by Forum Admin on 2007-06-07 09:51:29 +0200
Hello Athanyel,
this seems to be a bug in racoon - I will contact you by mail for further
investigation on this.
Thanks,
Christoph
Attempting to connect to Netscreen 5gt
Attempting to connect to Netscreen 5gt
by lysistbp on 2007-06-07 17:38:20 +0200
Hey guys,
I'm a Windows user that recently made the switch a month ago. I'm also an
IT guy who knows little about VPNs unfortunately when it comes to
troubleshooting (I use Netscreens with their software. It's pretty basic)
Below is a log of when I try to connect to one of my clients. Can somebody
explain what this is saying and tell me what changes should be made? The
"red dot" next to the connection name states "network collision". Thanks
in advance.
IPSecuritas 3.0 build 1693, Sun May 27 21:43:28 MVT 2007, nadig
Darwin 8.9.1 Darwin Kernel Version 8.9.1: Thu Feb 22 20:55:00 PST 2007;
root:xnu-792.18.15~1/RELEASE_I386 i386
Jun 07, 11:33:10 Debug APP State change from IDLE to
AUTHENTICATING after event START
Jun 07, 11:33:10 Info
APP IKE daemon started
Jun 07, 11:33:10 Info
APP IPSec started
Jun 07, 11:33:10 Debug APP State change from AUTHENTICATING to
RUNNING after event AUTHENTICATED
Jun 07, 11:33:10 Info
IKE Foreground mode.
Jun 07, 11:33:10 Info
IKE @(#)ipsec-tools CVS (http://ipsectools.sourceforge.net)
Jun 07, 11:33:10 Info
IKE @(#)This product linked OpenSSL 0.9.7l 28
Sep 2006 (http://www.openssl.org/)
Jun 07, 11:33:10 Info
IKE Reading configuration from "/Library
/Application Support/Lobotomo Software/IPSecuritas/racoon.conf"
Jun 07, 11:33:10 Info
IKE Resize address pool from 0 to 255
Jun 07, 11:33:10 Debug IKE parse successed.
Jun 07, 11:33:10 Debug IKE open /Library/Application
Support/Lobotomo Software/IPSecuritas/admin.sock as racoon
management.
Jun 07, 11:33:10 Debug IKE my interface: ::1 (lo0)
Jun 07, 11:33:10 Debug IKE my interface: fe80::1%lo0 (lo0)
Jun 07, 11:33:10 Debug IKE my interface: 127.0.0.1 (lo0)
Jun 07, 11:33:10 Debug IKE my interface: fe80::217:f2ff:feec:7f3c%en1
(en1)
Jun 07, 11:33:10 Debug IKE my interface: 10.10.1.109 (en1)
Jun 07, 11:33:10 Debug IKE my interface: fe80::201:23ff:fe45:6789%en2
(en2)
Jun 07, 11:33:10 Debug IKE my interface: 192.168.1.10 (en2)
Jun 07, 11:33:10 Debug IKE my interface: fe80::210:32ff:fe54:7698%en3
(en3)
Jun 07, 11:33:10 Debug IKE my interface: 10.211.55.2 (en3)
Jun 07, 11:33:10 Debug IKE configuring default isakmp port.
Jun 07, 11:33:10 Debug IKE 9 addrs are configured successfully
Jun 07, 11:33:10 Info
IKE 10.211.55.2[500] used as isakmp port (fd=7)
Jun 07, 11:33:10 Info
IKE fe80::210:32ff:fe54:7698%en3[500] used as
isakmp port (fd=8)
Jun 07, 11:33:10 Info
IKE 192.168.1.10[500] used as isakmp port
(fd=9)
Jun 07, 11:33:10 Info
IKE fe80::201:23ff:fe45:6789%en2[500] used as
isakmp port (fd=10)
Jun 07, 11:33:10 Info
IKE 10.10.1.109[500] used as isakmp port
(fd=11)
Jun 07, 11:33:10 Info
IKE fe80::217:f2ff:feec:7f3c%en1[500] used as
isakmp port (fd=12)
Jun 07, 11:33:10 Info
IKE 127.0.0.1[500] used as isakmp port (fd=13)
Jun 07, 11:33:10 Info
IKE fe80::1%lo0[500] used as isakmp port (fd=14)
Jun 07, 11:33:10 Info
IKE ::1[500] used as isakmp port (fd=15)
Jun 07, 11:33:10 Debug IKE get pfkey X_SPDDUMP message
Re: Attempting to connect to Netscreen 5gt
by lysistbp on 2007-06-07 17:54:03 +0200
Alright sweet . . . I got it working (green light) but I cannot ping or rdp into
anything. Below is a copy of the ping. The forum is yelling at me if I try to
paste my log . . . Any ideas guys?
steve-taylors-computer:~ Steve$ ping 192.168.0.2
PING 192.168.0.2 (192.168.0.2): 56 data bytes
36 bytes from 53.177.14.8.voipum.com (8.14.177.53): Communication
prohibited by filter
Vr HL TOS Len ID Flg off TTL Pro cks
Src
Dst
4 5 00 5400 3889 0 0000 3d 01 78ff 10.10.1.109 192.168.0.2
36 bytes from 53.177.14.8.voipum.com (8.14.177.53): Communication
prohibited by filter
Vr HL TOS Len ID Flg off TTL Pro cks
Src
Dst
4 5 00 5400 388b 0 0000 3d 01 78fd 10.10.1.109 192.168.0.2
36 bytes from 53.177.14.8.voipum.com (8.14.177.53): Communication
prohibited by filter
Vr HL TOS Len ID Flg off TTL Pro cks
Src
Dst
4 5 00 5400 388c 0 0000 3d 01 78fc 10.10.1.109 192.168.0.2
36 bytes from 53.177.14.8.voipum.com (8.14.177.53): Communication
prohibited by filter
Vr HL TOS Len ID Flg off TTL Pro cks
Src
Dst
4 5 00 5400 388f 0 0000 3d 01 78f9 10.10.1.109 192.168.0.2
36 bytes from 53.177.14.8.voipum.com (8.14.177.53): Communication
prohibited by filter
Vr HL TOS Len ID Flg off TTL Pro cks
Src
Dst
4 5 00 5400 3891 0 0000 3d 01 78f7 10.10.1.109 192.168.0.2
36 bytes from 53.177.14.8.voipum.com (8.14.177.53): Communication
prohibited by filter
Vr HL TOS Len ID Flg off TTL Pro cks
Src
Dst
4 5 00 5400 3893 0 0000 3d 01 78f5 10.10.1.109 192.168.0.2
36 bytes from 53.177.14.8.voipum.com (8.14.177.53): Communication
prohibited by filter
Vr HL TOS Len ID Flg off TTL Pro cks
Src
Dst
4 5 00 5400 3894 0 0000 3d 01 78f4 10.10.1.109 192.168.0.2
36 bytes from 53.177.14.8.voipum.com (8.14.177.53): Communication
prohibited by filter
Vr HL TOS Len ID Flg off TTL Pro cks
Src
Dst
4 5 00 5400 3896 0 0000 3d 01 78f2 10.10.1.109 192.168.0.2
36 bytes from 53.177.14.8.voipum.com (8.14.177.53): Communication
prohibited by filter
Vr HL TOS Len ID Flg off TTL Pro cks
Src
Dst
4 5 00 5400 3897 0 0000 3d 01 78f1 10.10.1.109 192.168.0.2
^Z
[4]+ Stopped
ping 192.168.0.2
Re: Attempting to connect to Netscreen 5gt
by cnadig on 2007-06-07 22:11:32 +0200
Hello,
the log probably won't show anything since the tunnel can be established
propetly. May I ask you to post the output of the following commands while
IPSec is active?
ifconfig -a
netstat -nr
The ICMP error is sent by 8.14.177.53 - what is this (the remote firewall or
your ISP)?
Cheers,
Christoph
Troubled while accessing Cisco PIX Firewalls
Troubled while accessing Cisco PIX Firewalls
by p0ddie on 2007-06-15 10:25:35 +0200
Hi there,
I have two Cisco Pix Firewalls (a 501 and a 515E) I would like to connect to.
The Cisco Client works smooth (of course), but I have trouble getting them
to connect with IPSecuritas. I'll try to be as detailed as possible about my
efforts to connect to the Pix 501.
I am quite new to Cisco VPN stuff and spoiled by less complex PPTP
connections with OS X / Windows' integrated clients... so please excuse my
n00by descriptions...
I set up a profile and connection and this is what I get in the log:
IPSecuritas 3.0 build 1693, Sun May 27 21:43:28 MVT 2007, nadig
Darwin 8.9.1 Darwin Kernel Version 8.9.1: Thu Feb 22 20:55:00 PST 2007;
root:xnu-792.18.15~1/RELEASE_I386 i386
Jun 15, 09:53:43 Info
APP IKE daemon started
Jun 15, 09:53:43 Info
APP IPSec started
Jun 15, 09:53:43 Error IKE Foreground mode.
Jun 15, 09:53:43 Info
IKE @(#)ipsec-tools CVS (http://ipsectools.sourceforge.net)
Jun 15, 09:53:43 Info
IKE @(#)This product linked OpenSSL 0.9.7l 28
Sep 2006 (http://www.openssl.org/)
Jun 15, 09:53:43 Info
IKE Reading configuration from "/Library
/Application Support/Lobotomo Software/IPSecuritas/racoon.conf"
Jun 15, 09:53:43 Info
IKE Resize address pool from 0 to 255
Jun 15, 09:53:43 Info
APP Initiated connection Pix 501
Jun 15, 09:53:50 Info
APP Initiated connection Pix 501
Jun 15, 09:53:50 Error IKE inappropriate sadb acquire message passed.
Jun 15, 09:53:57 Info
APP Initiated connection Pix 501
Jun 15, 09:53:59 Error IKE phase2 negotiation failed due to time up
waiting for phase1. ESP xx.xxx.xxx.xx[500]->172.30.17.31[500]
Jun 15, 09:54:04 Info
APP Initiated connection Pix 501
Jun 15, 09:54:06 Error IKE phase2 negotiation failed due to time up
waiting for phase1. ESP xx.xxx.xxx.xx[500]->172.30.17.31[500]
Jun 15, 09:54:11 Info
APP Initiated connection Pix 501
Jun 15, 09:54:11 Error IKE inappropriate sadb acquire message passed.
Jun 15, 09:54:13 Error IKE phase2 negotiation failed due to time up
waiting for phase1. ESP xx.xxx.xxx.xx[500]->172.30.17.31[500]
Jun 15, 09:54:14 Error IKE phase1 negotiation failed due to time up.
9cbf694fbedd0fa8:1234ed12347e918e
Jun 15, 09:54:16 Warning APP Connection Pix 501 timed out
Jun 15, 09:54:16 Warning APP Giving up
Jun 15, 09:54:20 Error IKE phase2 negotiation failed due to time up
waiting for phase1. ESP xx.xxx.xxx.xx[500]->172.30.17.31[500]
Jun 15, 09:54:27 Error IKE phase2 negotiation failed due to time up
waiting for phase1. ESP xx.xxx.xxx.xx[500]->172.30.17.31[500]
Jun 15, 09:54:49 Info
APP IPSec stopping
Jun 15, 09:54:50 Info
APP IKE daemon terminated
**************
The Pix is on a leased line with fixed IP and connects smoothly with Cisco
VPN clients. We use a pre-shared key (PSK) for authentication.
Apparently the Phase 1 negotiation failes. This is quite weird since I
checked with my Cisco expert to have the correct settings he applied to the
Pix for Phase 1:
Lifetime 1800 sec
Re: Troubled while accessing Cisco PIX Firewalls
by cnadig on 2007-06-17 23:19:42 +0200
Hello,
I received a Cisco PIX 501 a few days ago and just managed to find a
working configuration today (Main mode + preshared key, no XAUTH yet). I
will make a short description available within the next few days.
Cheers,
Christoph
Re: Troubled while accessing Cisco PIX Firewalls
by Forum Admin on 2007-07-02 11:17:00 +0200
Hello,
an updated wizard template is available for download at
http://www.lobotomo.com/products/IPSecuritas/howtoUpdates.html. It
includes templates and setup instructions for all PIX models.
Cheers,
Christoph
Re: Troubled while accessing Cisco PIX Firewalls
by ajscam on 2007-08-02 22:37:48 +0200
Hello Christoph,
I tried the new wizards against my PIX 515E. Unfortunately, on my PIX, the
IPSec rules are already established, and I can't use your recommendations
in the HOWTO.
In short, I have the following differences:
IPSec Rules for Remote Side Host/Network: 192.168.30.192/27.
Tunnel Policy for Transform Set: ESP-3DES-MD5
IKE Policies for Hash: md5
IKE Policies for D-H Group: 2
I think I have modified IPSecuritas Phase 1 settings to match the IKE Policies
above, but I'm not sure what I need to do to IPSecuritas for the IPSec Rules
& Tunnel Policy above.
In the log, I see the following errors:
<snip>
Error IKE inappropriate sadb acquire message passed.
<snip>
Error IKE phase2 negotiation failed due to time up waiting for phase1.
ESP xx.xxx.xxx.xx[500]->10.191.1888.160[500]
To me, it looks like the PIX doesn't like the sadb acquire message.... But
beyond that I have no idea...
Thanks for you help.
Re: Troubled while accessing Cisco PIX Firewalls
by cnadig on 2007-08-03 12:35:18 +0200
Hello,
you need to increase the log level to Debug in order to see the relevant
stuff. You may send me the log to [email protected] if you need
assistance.
Cheers,
Christoph
IPSecuritas 3.0 & Certificates
IPSecuritas 3.0 & Certificates
by deanjaz on 2007-06-18 19:40:54 +0200
Hello,
I have upgraded to IPSecuritas 3.0 from previous version (2.2?) and
imported the connection profile.
But the connection fails to authenticate properly using certificates. I've
verified the connection setup, and everything is properly setup. There just
seems to be some kind of issue with client/server certificate exchange.
This same profile worked fine with 2.2 of IPsecuritas, and the settings also
work fine in VPN Tracker Demo. I think there might be something funky
with the certificate manager and how it is dealing with Certificate/Key pairs?
If you need any further information please let me know.
Re: IPSecuritas 3.0 & Certificates
by deanjaz on 2007-06-19 02:28:41 +0200
Hi,
In case anyone was wondering :P
The problem i was having turned out to be ModeConfig. It seemed to be
interfering with the Authentication of the client ID somehow. Manually
specifying the ip address for the client works just fine.
I would be interested in helping to debug this problem if it would be of
interest or use to anyone.
hx
Re: IPSecuritas 3.0 & Certificates
by Forum Admin on 2007-06-19 16:22:45 +0200
Hello deanjaz,
thank you very much for your feedback and your assistance offer.
If possible, please send us exported logs to [email protected] once
with MODE_CFG [i]enabled[/i] and once with MODE_CFG [i]disabled[/i], both
with the log level set to [i]Verbose[/i].
Thanks a lot,
Christoph
Re: IPSecuritas 3.0 & Certificates
by deanjaz on 2007-06-19 20:07:25 +0200
Will do! :)
Ipsecuritas v3.0 and smoothwall
Ipsecuritas v3.0 and smoothwall
by richardk on 2007-06-19 18:55:05 +0200
Hi,
Has anbody had any success connecting v3 to a smoothwall corp server. My
version 2 setup works great but version three cannot connect.
Thanks
Richard Kingsley
Re: Ipsecuritas v3.0 and smoothwall
by barneygrice on 2007-06-27 12:56:32 +0200
Same problems here; v2 worked great but v3 does not.
I have tried quite a few permutations of the connection "Options" to no
avail.
The SmoothWall logs do not even show a connection attempt - it's as if
IPSecuritas 3.0 is not even trying to connect?!
I'm still looking into this; I'll post back with any updates.
In the mean time, please post here if you've had any luck.
Thanks,
Barney Grice.
Re: Ipsecuritas v3.0 and smoothwall
by richardk on 2007-06-27 18:21:32 +0200
Really had no luck. Bit ashamed to say that i am a certified smoothwall
reseller and had absolutely no luck at all.
Going to have another try getting it working tonight on a new smoothwall
installation using preshared keys instead of cetificate based connection to
see if it works that way.
I am also going to try connecting v3 to an ipcop vpn see if that helps.
BTW, I have tried using smoothwall advanced firewall 2 as well as
smoothwall corporate server 5 (not the free versions)
Thanks
Richard
Re: Ipsecuritas v3.0 and smoothwall
by barneygrice on 2007-06-27 18:30:16 +0200
Sorry, should have stated that I'm trying using CF4, for the record.
Still no luck, but I haven't given up - I'll look at it again when I have time.
Barney.
Re: Ipsecuritas v3.0 and smoothwall
by Forum Admin on 2007-06-27 22:29:02 +0200
Hi,
could you please send me an IPSecuritas log with log level set to Verbose to
[email protected] (from IPSecuritas 3.0 and 2.2, if possible)?
Thanks a lot,
Christoph
Re: Ipsecuritas v3.0 and smoothwall
by Forum Admin on 2007-06-28 20:09:29 +0200
Hello,
IPSecuritas checks the received identifier more strictly than IPSecritas 2.2
did. If the received a
different remote identifier from what is configured, an error will be logged
(invalid ID payload).
Try deselecting the option 'Verify Identifier' or check the configuration of
the firewall to see what identification is sent.
Hope this helps,
Christoph
Re: Ipsecuritas v3.0 and smoothwall
by richardk on 2007-06-28 21:07:39 +0200
Thank you very much for your help Christoph. I changed the remote
identifier to fqdn and the connection worked first time. I shall some time
this weekend take some screen grabs of my settings and created a mini
howto for ipsecuritas 3 and smoothwall
Best Regards
Richard
Re: Ipsecuritas v3.0 and smoothwall
by barneygrice on 2007-09-01 08:43:13 +0200
Hi all,
I actually got some grabs from Smoothwall that helped me get this working
this week. I'll post my own grabs online when I have a chance, but after
importing my old IPSecuritas settings I think the "Local IP in Remote
Network" was the checkbox that made the difference......
Barney.
Sonicwall: 'No proposal chose' error on 2nd netw..
Sonicwall: 'No proposal chose' error on 2nd netw..
by Banacek on 2007-06-20 01:10:26 +0200
Hello, you'll have to forgive me because I am new to all of this VPN business
:) We're using a Sonicwall Pro 2040 and I can successfully connect to the
VPN and ping machines on 10.0.10.x. Now, we also have a network at
10.0.20.x that we would like to have access too, but every time I try I get
the following:
Jun 19, 15:52:09 Error IKE
messsage, phase1 should be
Jun 19, 15:52:09 Error IKE
Jun 19, 15:52:24 Error IKE
to time up to wait.
fatal NO-PROPOSAL-CHOSEN notify
deleted.
Message: '2 No proposal is chosen'.
xxx.xxx.xxx.xxx give up to get IPsec-SA due
Does anyone have any ideas as to why this is happening? Thanks!
[m]: Fan Control on macbook
[m]: Fan Control on macbook
by on 2007-06-20 07:03:33 +0200
[moved] [link=http://www.lobotomo.com/cgi-bin
/yabb/YaBB.pl?num=1182315813/0]Others[/link] [move by] Forum Admin.
IPSecuritas 2.2 and video iChat?
IPSecuritas 2.2 and video iChat?
by villaged on 2007-06-20 20:08:04 +0200
So, I am trying to have two users running iChat and IPS2.2 video chat with
each other.
After a bunch of investigating, we can see what is happening. iChat is
looking for all of the network devices on the machine, and IPS hasn't
registered a device, and hence, never gets its VPN IP address. It just grabs
the public address, which then fails to initiate the video chat, since these
computers can not see each other outside of the VPN.
Is there a way to create a device with IPS so that its IP gets snagged?
Any ideas?
Thanks.
IPSecuritas and Linksys WRV54G
IPSecuritas and Linksys WRV54G
by lcortex on 2007-06-21 22:24:51 +0200
I recently purchased a Linksys WRV54G vpn router and I'm trying to setup
my vpn connection via IPSecuritas v. 3. I'm having the following problems in
my log and cannot get it to work. Can anyone suggest what to try to fix it?
Thanks!
IPSecuritas 3.0 build 1693, Sun May 27 21:43:28 MVT 2007, nadig
Darwin 8.9.1 Darwin Kernel Version 8.9.1: Thu Feb 22 20:55:00 PST 2007;
root:xnu-792.18.15~1/RELEASE_I386 i386
Jun 21, 13:03:42 Info
APP IKE daemon started
Jun 21, 13:03:42 Info
APP IPSec started
Jun 21, 13:03:42 Error IKE Foreground mode.
Jun 21, 13:03:42 Info
IKE @(#)ipsec-tools CVS (http://ipsectools.sourceforge.net)
Jun 21, 13:03:42 Info
IKE @(#)This product linked OpenSSL 0.9.7l 28
Sep 2006 (http://www.openssl.org/)
Jun 21, 13:03:42 Info
IKE Reading configuration from "/Library
/Application Support/Lobotomo Software/IPSecuritas/racoon.conf"
Jun 21, 13:03:42 Info
IKE Resize address pool from 0 to 255
Jun 21, 13:03:42 Info
APP Initiated connection NCT
Jun 21, 13:03:49 Info
APP Initiated connection NCT
Jun 21, 13:03:56 Info
APP Initiated connection NCT
Jun 21, 13:03:56 Error IKE inappropriate sadb acquire message passed.
Jun 21, 13:03:58 Error IKE phase2 negotiation failed due to time up
waiting for phase1. ESP 24.234.198.167[500]->10.51.21.30[500]
Jun 21, 13:04:03 Info
APP Initiated connection NCT
Jun 21, 13:04:05 Error IKE phase2 negotiation failed due to time up
waiting for phase1. ESP 24.234.198.167[500]->10.51.21.30[500]
Jun 21, 13:04:10 Info
APP Initiated connection NCT
Jun 21, 13:04:12 Error IKE phase1 negotiation failed due to time up.
78f8c8ae9fb0c975:0000000000000000
Jun 21, 13:04:12 Error IKE phase2 negotiation failed due to time up
waiting for phase1. ESP 24.234.198.167[500]->10.51.21.30[500]
Jun 21, 13:04:15 Warning APP Connection NCT timed out
Jun 21, 13:04:15 Warning APP Giving up
Jun 21, 13:04:19 Error IKE phase2 negotiation failed due to time up
waiting for phase1. ESP 24.234.198.167[500]->10.51.21.30[500]
Jun 21, 13:04:26 Error IKE phase2 negotiation failed due to time up
waiting for phase1. ESP 24.234.198.167[500]->10.51.21.30[500]
Jun 21, 13:04:27 Info
APP IPSec stopping
Jun 21, 13:04:28 Info
APP IKE daemon terminated
Any help will be greatly appreciated!
Thanks!
--Ross
Re: IPSecuritas and Linksys WRV54G
by tiffert on 2007-07-05 08:17:10 +0200
If you have found a solution or a configuration that works with the
WRV54G, please let me know. Thanks!!
Re: IPSecuritas and Linksys WRV54G
by tiffert on 2008-02-05 20:45:11 +0100
I have managed to setup a reliable VPN to my Linksys WRV54G (hardware
rev .02, firmware 2.39.2) using IPSecuritas 3.1 and MacOS X 10.5.1.
The WRV54G has rotten firmware. Sometimes saved changes to the VPN or
DYNDNS settings do not actually take effect, even though the changes
display in the browser window. After pointlessly trying every authentication
and encryption combination under the sun for phases 1 and 2, I just
deleted my existing tunnel and set one up from scratch. suddenly, the
settings stuck and the VPN connection worked.
I am using 3DES, SHA-1, 3600 sec., 1024, Main.
In IPSecuritas, my configuration has the following options checked: IPSec
DOI, SIT_IDENTITY_ONLY, Verify Identifier, IKE Fragmentation
i hope this helps.
Re: IPSecuritas and Linksys WRV54G
by tiffert on 2008-02-06 06:37:51 +0100
I spoke a moment too soon when I declared victory. The VPN is in fact
stable once connected. But when I returned home and tried to connect, I
discovered that I cannot negotiate Phase 1 from behind my router. I had
heard that the WRV54G has problems traversing a NAT router and this
seems to confirm it. But, to repeat, if my local client is not behind a NAT
router, the VPN works well.
fails with Leopard
fails with Leopard
by theagent on 2007-07-09 19:28:55 +0200
Is there an alpha or beta build that works? Can someone send me a
pointer?
Re: fails with Leopard
by dublezero on 2007-07-17 05:41:16 +0200
bump
Re: fails with Leopard
by cnadig on 2007-07-17 09:47:04 +0200
Working on it... a Beta will be releases this week.
Cheers,
Christoph
Re: fails with Leopard
by dublezero on 2007-07-17 13:37:35 +0200
Excellent. You guys do an excellent job on this software. Thanks.
Re: fails with Leopard
by theagent on 2007-07-17 16:12:51 +0200
Thanks a ton... really appreciate the effort.
fix and you can get it done quick.
Hopefully it's not that big of a
thanks again
Re: fails with Leopard
by theagent on 2007-07-19 23:36:56 +0200
Any idea how much longer for the beta that run on Leopard. I'm dead in
the water...
Re: fails with Leopard
by cnadig on 2007-07-22 21:22:36 +0200
Hello,
I just published a Leopard compatible version. Please download it from this
link: http://www.lobotomo.com/products/downloads
/IPSecuritas%20Leopard.dmg
Cheers,
Christoph
Re: fails with Leopard
by theagent on 2007-07-23 00:20:34 +0200
Thank... works like a charm to my SonicWall 2040 PRO
Re: fails with Leopard
by theagent on 2007-07-31 22:04:01 +0200
I have found an issue with host --> networks.
I am unable to get to my other subnets.
Three separate networks via permanent VPN's. I can get into my main but
not the other 3.
192.168.55.0/24 main
192.168.54.0/24
192.168.56.0/24
192.168.57.0/24
Re: fails with Leopard
by Forum Admin on 2007-08-01 00:11:00 +0200
Hello,
have you tried enabling the 'Unique SA' option?
Cheers,
Christoph
Re: fails with Leopard
by theagent on 2007-08-20 22:04:27 +0200
SA doesn't change a thing.... all other networks are inaccessible. What info
do you want from me to assist in debugging this?
Re: fails with Leopard
by dublezero on 2007-09-20 22:03:16 +0200
Looks like the beta just expired. Can we get an updated one?
Re: fails with Leopard
by Forum Admin on 2007-09-20 22:48:59 +0200
Hello,
3.0b2 is available for download.
Christoph
Re: fails with Leopard
by dublezero on 2007-09-20 22:59:47 +0200
Link?
Re: fails with Leopard
by Forum Admin on 2007-09-21 06:27:06 +0200
http://www.lobotomo.com/products/downloads
/IPSecuritas%20Leopard.dmg
Re: fails with Leopard
by dublezero on 2007-09-21 15:37:27 +0200
Thanks! I had tried that link earlier but I probably jumped the gun and got
it before you updated it.
Host to Anywhere with IPCOP connection problem
Host to Anywhere with IPCOP connection problem
by oortmanp on 2007-07-11 01:18:52 +0200
Hi all,
I managed to get ipsecuritas to work with ipcop. But only when I'm using a
specified range like 192.168.1.0/24.
When I try to connect with the endpoint mode "anywhere" setting, I don't
get a connection. (I'm using version 3, build 1693)
Both setups have also been tested in Windows with thegreenbow vpn, where
both setups work fine.
The debug of ipsecuritas wasn't much help for me either.
[code]IPSecuritas 3.0 build 1693, Sun May 27 21:43:28 MVT 2007, nadig
Darwin 8.9.1 Darwin Kernel Version 8.9.1: Thu Feb 22 20:55:00 PST 2007;
root:xnu-792.18.15~1/RELEASE_I386 i386
Jul 11, 01:01:55 Debug APP State change from IDLE to AUTHENTICATING
after event START
Jul 11, 01:01:55 Info
APP IKE daemon started
Jul 11, 01:01:55 Info
APP IPSec started
Jul 11, 01:01:55 Debug APP State change from AUTHENTICATING to
RUNNING after event AUTHENTICATED
Jul 11, 01:01:55 Debug APP Received SADB message type X_SPDUPDATE
- not interesting
Jul 11, 01:01:55 Debug APP Received SADB message type X_SPDUPDATE
- not interesting
Jul 11, 01:01:55 Debug APP Received SADB message type X_SPDUPDATE
- not interesting
Jul 11, 01:01:55 Debug APP Received SADB message type X_SPDUPDATE
- not interesting
Jul 11, 01:01:55 Debug IKE Foreground mode.
Jul 11, 01:01:55 Info
IKE @(#)ipsec-tools CVS (http://ipsectools.sourceforge.net)
Jul 11, 01:01:55 Info
IKE @(#)This product linked OpenSSL 0.9.7l 28 Sep
2006 (http://www.openssl.org/)
Jul 11, 01:01:55 Info
IKE Reading configuration from "/Library
/Application Support/Lobotomo Software/IPSecuritas/racoon.conf"
Jul 11, 01:01:55 Info
IKE Resize address pool from 0 to 255
Jul 11, 01:01:55 Debug IKE lifetime = 28800
Jul 11, 01:01:55 Debug IKE lifebyte = 0
Jul 11, 01:01:55 Debug IKE encklen=0
Jul 11, 01:01:55 Debug IKE p:1 t:1
Jul 11, 01:01:55 Debug IKE 3DES-CBC(5)
...
...
...
Jul 11, 01:01:56 Info
IKE ISAKMP-SA established
10.71.14.222[500]-217.120.247.4[500]
spi:8ff28b05d6afb4eb:de62ecd58bb1e726
Jul 11, 01:01:56 Debug IKE ===
Jul 11, 01:01:56 Debug IKE ===
Jul 11, 01:01:56 Debug IKE begin QUICK mode.
Jul 11, 01:01:56 Info
IKE initiate new phase 2 negotiation:
10.71.14.222[500]<=>217.120.247.4[500]
Jul 11, 01:01:56 Debug IKE compute IV for phase2
Jul 11, 01:01:56 Debug IKE phase1 last IV:
Jul 11, 01:01:56 Debug IKE c7c53315 1367dacb 81e4df67
Jul 11, 01:01:56 Debug IKE hash(sha1)
Jul 11, 01:01:56 Debug IKE encryption(3des)
Jul 11, 01:01:56 Debug IKE phase2 IV computed:
Re: Host to Anywhere with IPCOP connection problem
by richardk on 2007-07-20 00:48:33 +0200
Hi,
Any chance of sharing what connection settings you are using with IPCOP
and ipsecuritas.
Not sure what to enter in the authentication form on ipsecuritas when using
cert based roadwarrior connection
Thanks
Richard Kingsley
Re: Host to Anywhere with IPCOP connection problem
by oortmanp on 2007-08-19 15:25:46 +0200
@richardk
with boardsearch "ipcop" you would have found:
http://www.taupehat.com/vpn/
good luck setting up your certificate vpn
oortmanp
Frustrated with VPN on my new WRVS4400N
Frustrated with VPN on my new WRVS4400N
by Christian on 2007-07-15 03:08:13 +0200
I had VPN working on my WRT54G running DD-WRT, but I bricked it, so I
decided to buy a router with built-in VPN.
I've read through the other messages regarding the WRVS4400N and still
can not get my iBook to log in to my home network.
I've posted my debug log file here: [url]http://www.pariahware.com
/vpnlog.txt[/url]
Any help would be appreciated as I've spent way too much time butting my
head against this door. :(
Thank you very much.
Re: Frustrated with VPN on my new WRVS4400N
by Christian on 2007-07-15 19:18:11 +0200
I turned on VPN logging for my router. Here is what the router has logged:
[url]http://www.pariahware.com/routervpn.txt[/url]
Re: Frustrated with VPN on my new WRVS4400N
by cnadig on 2007-07-16 10:55:57 +0200
Hello Christian,
you need to set the Remote Security Group to a specific address, e.g.
10.1.1.1. Setting it to Any will for some reasons only Linksys knows not
work. You then need to enter the same address in IPSecuritas for the local
endpoint (Host Mode).
Hope this helps,
Christoph
Re: Frustrated with VPN on my new WRVS4400N
by Christian on 2007-07-16 18:34:47 +0200
Thank you for the tip, but that still didn't work. I've updated my two log
files, one from the router and the other from the app.
[url]http://www.pariahware.com/vpnlog.txt [/url]
[url]http://www.pariahware.com/routervpn.txt [/url]
To update, my router settings are:
IPsec VPN Tunnel: Enabled
Tunnel named: HomeVPN
Local Sec. Group Type: Subnet
IP Address: 192.168.2.x
Subnet: 255.255.255.0
Remote Sec. Group Type: IP Addr.
IP Address: 10.1.1.1
Remote Sec Gateway Type: Any
Key Exchange Method: Auto. (IKE)
Encryption: 3DES
Auth: SHA1
PFS: Enable
PSK: xxx
Key Life: 28800
NetBIOS: false
Phase1:
Op Mode: Main
Local ID: Name, HomeVPN
Remote ID: Remote IP
Encryptin: 3DES
Auth: SHA1
Group: 1024
Key Life Time: 3600
Phase2:
Enc: 3DES
Auth: SHA1
PFS: Enable
Group: 768
Key Life: 28800
IPSecuritas Settings:
General Tab:
Remote IPSec Device: DDNS address
IPv6: Disabled
Local Side:
Endpoint Mode: Host, IP: 10.1.1.1
Remote Side:
Endpoint Mode: Host, IP: Router's internal gateway address
Transpoirt Mode: Disabled
Phase1:
Lifetime: 3600
DH Group: 1024
Encrypt: 3DES
Auth: SHA-1
Exchange Mode: Main
Re: Frustrated with VPN on my new WRVS4400N
by Forum Admin on 2007-07-16 21:49:38 +0200
Hello Christian,
two more things you need to change:
In your router settings, change the local identification to address too
(required for main mode) and in IPSecuritas, change the remote endpoint
mode to Network (instead of host) and set the address to 192.168.2.0/24
Cheers,
Christoph
Re: Frustrated with VPN on my new WRVS4400N
by Christian on 2007-07-16 23:04:57 +0200
Thank you very much! I now have a green light and am on my LAN. ;D
The one remaining issue is that my web surfing (and I'm assuming e-mail)
are not going through my router, but rather, the router where I currently
have my iBook off-site. Can you please tell me how to remedy this last
piece of the puzzle? Thanks again!
problem with Netgear FVX538
problem with Netgear FVX538
by cenotaph on 2007-07-17 14:22:15 +0200
Hi,
I am totally excited about IPSecuritas as it seems like a really great piece of
software, and free too!
However, I am having trouble trying to connect to a Netgear FVX538. The
wizard had instructions for the FVS328 and also listed the FVX538 but the
settings are somewhat more advances, and I can't get past phase1 of
connecting.
I can post debug logs, but first of all, are there any more specific
instructions for configuring the FVX538?
Thanks!
Re: problem with Netgear FVX538
by cnadig on 2007-07-17 17:34:06 +0200
Hello,
have you had a look at the HOWTO yet? (in IPSecuritas->Windows->HowTo
List)
Or direct link: http://www.lobotomo.com/products/IPSecuritas/howto
/Netgear%20FVS114%20FVS328%20HOWTO.pdf
Cheers,
Christoph
Re: problem with Netgear FVX538
by cenotaph on 2007-07-18 17:52:05 +0200
Yep - the HOWTO is great for the FVS328 but I have the FVX538 which is a
bit different so I'm not sure if I'm setting it up right. I can send logs to
someone (I don't want to post them here for security reasons) if anyone is
up for helping.
Re: problem with Netgear FVX538
by ade76 on 2007-07-23 19:02:22 +0200
version 2 firmware is different on the FVX538 hence it not looking the
same, I've had ipsecuritas 2 working fine until recently, version 3 is giving a
few errors with connection failures I'll post up some logs later on.
last time i did it i just followed the wizard in how to and it worked fine
Sonicwall Pro2040 config with IPSecuritas
Sonicwall Pro2040 config with IPSecuritas
by coot on 2007-07-18 13:00:11 +0200
Hi all,
I spent lot's of wasted hours a few weeks ago trying to get IPSecuritas to
work with our Sonicwall Pro 2040 firewall. I was unsuccessful! >:(
Before I start to look at this again, has anybody successfully connected to a
Sonicwall Pro 2040 and would you be so kind as to let me know the
configurations both at the ipsecuritas side and the sonicwall side?
Here's hoping.
Regards..
Karl
Re: Sonicwall Pro2040 config with IPSecuritas
by JoeG on 2007-08-29 01:52:26 +0200
Same problem here, Karl. It seems I am able to connect just fine with VPN
Tracker but the settings don't quite translate directly. I will tell you that I
suspect that IPSecuritas does not support DHCP; you must get you admin to
assign a static IP and use that in you local connection... I think.
I would like to get this program working to avoid the high cost of VPN
Tracker.
Re: Sonicwall Pro2040 config with IPSecuritas
by matthewyoung on 2007-08-30 02:17:10 +0200
Have a similar problem with our SonicWall 4100 - does not have DHCP
therefore I am still struggling to get things to work - also strugging to get
the hosts set up correctly as I can connect to our firewall but cannot go
further.
Re: Sonicwall config with IPSecuritas
by netnoah on 2007-09-15 15:38:52 +0200
Hey Folks. I don't know if this helps y'all, but after 3 hours of trying to get
IPSecuritas to connect to my VPN (SonicWall) I have (partial) success! Since I
am not in the IT dept (just trying to replicate my VPN Tracker setup on
company laptop to my home desktop using a shared key), I've had to guess
that the SonicWall is configured as per Equinux's specs (phase 1:3DES &
SHA1; Phase 2:Strong Encrypt and Authenticate (ESP 3DES HMAC SHA1)
Frankly, this is a lot of Greek to me, but I can tell you that the following
settings connect with the same functionality as VPN tracker. (this is the
result of the export wizard template menu command) The only thing that
isn't working now is connecting to multiple subnets simultaneously...which
didn't work with VPN tracker either.
phase1.localEndpointMode: ISEndpointModeHost
phase1.remoteEndpointMode: ISEndpointModeNetworks
phase1.exchangeMode: ISExchangeModeAggressiveMain
phase1.proposalCheck: ISProposalCheckObey
phase1.nonceSize: 16
phase1.lifetimeValue: 28800
phase1.lifetimeUnit: ISLifetimeSeconds
phase1.dhGroup: ISDHGroupMod768
phase1.encryption: ISEncryption3DES
phase1.authentication: ISAuthenticationSHA1
phase2.lifetimeValue: 1800
phase2.lifetimeUnit: ISLifetimeSeconds
phase2.pfsGroup: ISPFSGroupNone
phase2.encryptions: ISEncryption3DES
phase2.authentications: ISAuthenticationHmacSHA1
localIdentification.mode: ISIdentificationName
remoteIdentification.mode: ISIdentificationName
authentication.mode: ISAuthenticationPresharedKey
options.ipsecDoi: 0
options.identityOnly: 0
options.verifyIdentifier: 0
options.initialContact: 0
options.generatePolicy: 0
options.supportProxy: 0
options.verifyCertificate: 0
options.sendCertificate: 0
options.sendCertificateRequest: 0
options.modeCfg: 0
options.uniqueSa: 0
options.ikeFragmentation: 0
options.nattMode: ISNATTDisable
options.dhcpPassThrough: 0
Re: Sonicwall Pro2040 config with IPSecuritas
by coot on 2007-09-17 11:34:35 +0200
I got this working. Here is my setup:
==On the SonicWALL==
:General
Authentication Method: IKE using Preshared Secret
Name: WAN GroupVPN
Share Secret: xxxxx
-Proposals
Phase 1
DH Group: Group 2
Encryption: 3DES
Authentication: MD5
Life Time (seconds): 9600
Phase 2
Protocol: ESP
Encryption: 3DES
Authentication: MD5
Enable PFS: Disabled
Life Time (seconds): 28800
:Advanced
Enable Windows Networking Broadcase: Unchecked
Apply NAT and Firewall Rules: Unchecked
Forward Packets to remote VPNS: unchecked
Default Gateway: 0.0.0.0
Terminated at: LAN/DMZ (I require DMZ access)
Require Authentication of VPN Clients via XAUTH: Checked
:Client
Cache XAUTH User Name and Password on Client: Single Session
Virtual Adapter Settings: DHCP Lease or Manual
Allow Connections to: Split Tunnels
Set Default Route as this Gateway: Unchecked
Require Global Security Client for this Connection: Unchecked
Use Default Key for Simple Client Provisioning: Checked
==In IPSecuritas==
:General
Remote IPSec Device: xxxxx
Local Endpoint Mode Host:
Remote Endpoint Mode Network: 10.5.1.1/16
Phase 1
Lifetime: 9600 seconds
DH Group: 1024(2)
Encryption: 3DES
Authentication: MD5
Exchange Mode: Main, Aggressive
Proposal Check: Claim
Nonce Size: 16
Phase 2
Lifetime: 28800 seconds
PFS Group: None
Encryption: DES, 3DES
Authentication: HMAC-SHA-1, MD5
:ID
Local Identifier: Address
Re: Sonicwall Pro2040 config with IPSecuritas
by deepstructure on 2007-09-19 19:46:10 +0200
hey coot,
i've used your exact same settings and can't get them to work! i keep
immediately getting:
error: IKE: foreground mode
error: IKE: inappropriate sadb acquire message passed
error: IKE: delete phase1 handle
anyone else able to make these settings work? my pc still connects fine
with the settings coot used for the server, but no dice for my macbookpro
with ipsecuritas.
Re: Sonicwall Pro2040 config with IPSecuritas
by coot on 2007-09-20 10:48:28 +0200
If you're using a Sonicwall that isn't a pro 2040 running standard firmware
then I'd guess there must be slight differences in the models.
I can't really help any further as I was in the same boat as you, I just tried
messing with the settings, Sorry! [smiley=sad.gif]
PS: My PC's also worked fine with no problems.
Re: Sonicwall Pro2040 config with IPSecuritas
by 16thnotes on 2007-10-05 12:47:49 +0200
I too get the same errors in my application log when trying to connect to
ZyWALL hardware. (alas VPN Tracker works fine)
see this thread... [url]http://www.lobotomo.com/cgi-bin
/yabb/YaBB.pl?num=1191350831[/url]
Re: Sonicwall Pro2040 config with IPSecuritas
by providence on 2007-10-10 16:56:42 +0200
What is Network Address Endpoint Mode or Network Mask (CIDR) ?
Is this something that I have to set up on my SonicWall?
Is there any way to get an update to the SonicWall instructions to take
advantage of the latest firmware update?
Problems importing certs for requests generated
Problems importing certs for requests generated
by pacronce on 2007-07-21 23:45:06 +0200
Hi all,
We've been using VPN Tracker for years with certificate authentication via
our own CA. I'm exploring using IPSecuritas as an alternative, but I'm
running into problems with certificates.
The problem is there doesn't seem to be a way to import a certificate the
corresponds to a certificate request generated in IPSecuritas. It looks like all
I can do is import a certificate with a private key. But since I generated the
request using IPSecuritas, and there isn't an option to export its
corresponding private key, I don't see how to make this work.
I would have thought that the workflow for processing requests would be
something like this:
1. Generate the request with IPSecuritas. Under the hood a key pair is also
created.
2. Send the request to the CA admin.
3. The CA admin generates the associated certificate and sends it back.
4. Import the certificate in IPSecuritas. The program should match the
certificate imported to the keypair/request generated and enable that
certificate for use in a connection.
The above is what happens with VPN Tracker. Note that the certificates
we're generating are in PEM format, in case that matters.
But I can't get the above to work with IPSecuritas. The only cert import
option that remotely matches my situation is "PEM/DER encoded foreign
certificate". But when I use that, the resulting certificate is not available for
selection in the connection. The other options fail to import at all.
If I bypass IPSecuritas for certificate request generation and instead import
a complete encrypted PKCS#12 file with a private key, then the resulting
certificate does work. But I don't like the idea of providing all of our VPN
clients with a key pair and cert. Because it opens up security issues like the
strength of the password, transport and secure disposal of the PKCS#12
file, etc.
Note that I have not tried converting the PEM certificate to a PKCS#12 file
without a private key. Maybe that would work, but it seems like an
unnecessary step. Why not just allow import of a PEM certificate that
matches a request?
Thanks in advance for any help you can provide.
Best regards,
-Allen Cronce
Re: Problems importing certs for requests generate
by cnadig on 2007-07-22 20:44:23 +0200
Hello Allen,
you're right, this is a misconception in IPSecuritas, which certainly needs to
be fixed.
I will get in touch with you once it's done.
Thanks a lot,
Christoph
Re: Problems importing certs for requests generate
by pacronce on 2007-08-22 20:56:27 +0200
[quote author=cnadig link=1185054306/0#1 date=1185129863]
you're right, this is a misconception in IPSecuritas, which certainly needs to
be fixed.
I will get in touch with you once it's done.
[/quote]
Thanks for getting back to me. Have you been able to make any progress
on the fix?
Thanks in advance!
Best regards,
-Allen Cronce
Re: Problems importing certs for requests generate
by cnadig on 2007-08-29 17:57:33 +0200
Hello Allen,
yes, this is fixed. Please let me know if you need a pre-release. Otherwise it
will be available with 3.1 in a couple of weeks.
Cheers,
Christoph
Re: Problems importing certs for requests generate
by pacronce on 2007-08-30 17:24:21 +0200
[quote author=cnadig link=1185054306/0#3 date=1188403053]
yes, this is fixed. Please let me know if you need a pre-release. Otherwise it
will be available with 3.1 in a couple of weeks.
[/quote]
Great! Thanks Christoph!
I'd be happy to beta test the pre-release, if you'd like to make it available.
Maybe you could PM me with the download URL?
Thanks in advance,
-Allen Cronce
Re: Problems importing certs for requests generate
by pacronce on 2007-09-18 01:57:35 +0200
Hi Christoph,
[quote author=cnadig link=1185054306/0#3 date=1188403053]yes, this
is fixed. Please let me know if you need a pre-release. Otherwise it will be
available with 3.1 in a couple of weeks.
[/quote]
I'm just checking in again to see if I can help test the pre-release.
Thanks in advance.
Best regards,
-Allen Cronce
Re: Problems importing certs for requests generate
by pacronce on 2008-01-05 19:10:13 +0100
Looks like this feature works, mostly. I tested it when 3.1 came out in
October and was able to generate requests, then import the corresponding
certificate. It's been successful for other users of ours also. Thanks for
implementing this feature.
But I had problems when I tried to use the feature today to renew several
certificates. What I did was generate 3 requests, then created the
corresponding 3 certificates, then imported the certificates into IPSecuritas.
I got a message each time indicating that the request was found and that
the private key was associated with the imported certificate.
But none of the new certificates worked. I looked at the log on our server
side and found digital signature errors.
It occurred to me that maybe if there are more than one request, IPSecuritas
gets confused at import time and associates the wrong private key with the
certificate.
So as an experiment, I deleted all of my requests and certs. Then I
generated the 3 certificates one at a time. After each import, I deleted the
corresponding request.
When I did it this way, all of the certificates were valid and I was able to
connect.
Would it be possible for you to take a look at the import code to see if
there's a bug with associating a certificate with a private key when there is
more than one request?
Re: Problems importing certs for requests generate
by pacronce on 2008-01-25 17:58:48 +0100
I hate to be a pest, but this is really becoming a problem. So far every user
of ours that needs multiple certificates has run into the bug.
The work around of deleting all requests before processing a new one
seems to work. But it's counterintuitive and our users don't seem to be able
to follow instructions (big surprise).
It would be *really* great if this bug could be fixed. Otherwise the support
headaches will force me to seek some alternative solution.
Thanks in advance,
-Allen Cronce
IPSecuritas NOT compatible with Mac OS X 10.5 Beta
IPSecuritas NOT compatible with Mac OS X 10.5 Beta
by galphanet on 2007-07-22 19:12:04 +0200
Hello,
I've tested your exellent software on Mac OS X 10.5 Beta (Build 9A466) and
IPSecuritas starts but continues jumping on the dock and say that he can't
connect to the deamon and after quit unexpectly !
But IPSecuritasDeamon is really running...
I think it'll be easy to adapt it for 10.5...
I can help you if you want to test it !
(sorry for my bad english..say if I do mistakes)
Re: IPSecuritas NOT compatible with Mac OS X 10.5
by cnadig on 2007-07-22 21:21:49 +0200
Hello,
I just published a Leopard compatible version. Please download it from this
link: http://www.lobotomo.com/products/downloads
/IPSecuritas%20Leopard.dmg
Cheers,
Christoph
Re: IPSecuritas NOT compatible with Mac OS X 10.5
by galphanet on 2007-07-22 21:25:20 +0200
Hello,
Thanks you very much for this ! 8-)
FortiGate 800 configuration problem
FortiGate 800 configuration problem
by dg on 2007-07-23 22:27:26 +0200
Hi,
my wife's workplace now uses FortiGate 800. Their support site explicitly
recommends Mac users to use IPsecuritas.
However, their IT guy claims that they use "two methods" authentication in
Phase 1. In IPsecuritas, you only have a popup menu with a single method
choice. Therefore he claims that IPsecuritas cannot be made to work on
their VPN.
Is this guy just giving me some B.S.?
Any help appreciated, thanks.
I have a FortiGate client profile. In theory, it should be possible to gather
the configuration options out of that profile, but it is not that easy.
Somebody here could do that?
Thanks.
Re: FortiGate 800 configuration problem
by varruss on 2007-07-24 06:20:50 +0200
I have 5 Fortigate firewalls working fine with IPSecuritas. They all use XAuth
and preshared secret. (In IPSecuritas under ID - Authentication Method).
Have him confirm what does he mean by 2 methods authentication.
Re: FortiGate 800 configuration problem
by dg on 2007-07-24 16:43:52 +0200
Well, this guy claims that in the Phase 1 authentication method, you need to
select multiple methods (same as you can do in the Phase 2 setup, where
you can check more than one method).
IPCOP and ipsecuritas
IPCOP and ipsecuritas
by richardk on 2007-07-23 23:45:36 +0200
Hi
Has anybody sucessfully used ipsecuritas to connect to ipcop? If so,please
post details of what to enter on the ID and option screen on ipsecurits.
Have been trying for about 2 days with no luck whatsover.
Thanks
Richard
Re: IPCOP and ipsecuritas
by cnadig on 2007-07-24 09:14:01 +0200
Hello,
please have a look at http://www.taupehat.com/vpn/
Although it describes the setup for the older version 2.x, it should be easy
enough to use it to configure 3.0 (the settings should be the same).
The Wizard plugin for IPCop could help, too.
Hope this helps,
Christoph
Trying to connect to Fortinet FGT-60
Trying to connect to Fortinet FGT-60
by zoomin on 2007-07-26 15:36:10 +0200
Hello, I am trying to connect to a Fortinet Fortigate 60 at work.
I have read Fortinet's instructions here:
http://kc.forticare.com/default.asp?SID=&Lang=1&id=2012
but they seem a bit contradictory.
At the top, it says "Authentication Method - Preshared Key (Note that the
Pre-shard key must be empty)" and then at the bottom it says to "Select
Id/Auth and enter the Pressured Secret (preshared key)."
I am trying to set it up in Host to Network mode.
Thanks for any tips.
Re: Trying to connect to Fortinet FGT-60
by cnadig on 2007-07-26 16:27:44 +0200
Hello,
although I don't have a Fortinet available here, I can't imagine that the
preshared key may be empty. I rather expect it to identical with the one
entered in IPSecuritas.
Please note XAUTH now also works with IPSecuritas and Fortinet (the
instructions refer to the older version 2.x) - once you have it running with
preshare key, you may try with XAUTH PSK (same preshared key, but per
user passwords).
Cheers,
Christoph
Re: Trying to connect to Fortinet FGT-60
by zoomin on 2007-07-26 19:23:32 +0200
I have upgraded to Ipsecuritas 3.0 but I am still unable to establish a
dial-up connection.
I do have some successful connections setup to different networks behind
the same hardware (FGT-60) using the static ip method but I am hoping to
downgrade my service here and will no longer have a static IP, so that is
why I am attempting to set this up with dial-up / roaming settings.
I am unsure what to put in the ID section so I left the defaults but I am
pretty sure that without a static IP I cannot use the ip address as local
identifier:
local identifier: address
remote identifier: address
authentication method: preshared key
and put in my preshared key from the fortinet.
Does "Mutual Authentication" work with cisco 3000?
Does "Mutual Authentication" work with cisco 3000?
by cwalter on 2007-07-27 17:35:44 +0200
Dear All,
I am trying to attach to a cisco 3000. It is running in Cisco's version of
Hybrid Auth, which they call "mutual authentication". It uses a certificate
for remote identification in the 1st phase and also uses xauth and a
pre-shared key.
I can't get it to work, and I can't figure out from the web page or the forums
if it is really supported. Can anyone tell me?
About the closest setup I can find is
local id:
key-id (set to group name)
remote-id: certificate
Auth method: Xauth RSA
user name: (set to xauth name)
password: (set to xauth password)
I have imported our root certificate into the certificate manager but there is
an "!" mark next to the connection name which if I hover over it says:
"remote identifier set to certificate but no XAUTH server certificate chosen."
However I can't find an option anywhere to "choose a certificate".
Does anyone have any ideas, or is this configuration not supported at all?
BTW, thanks for the work! I am using ipsecuritas to to attach to another
system not-using hybrid-auth and it is great!
-Chris
Problem Connecting With SonicWall TZ-170
Problem Connecting With SonicWall TZ-170
by jmarsan on 2007-07-30 17:23:29 +0200
I'm trying to setup IPSecuritas 3.0 to connect to a SonicWall TZ-170. Right
now when I try to connect, the indicator remains red and all I see is the
following in the debug log:
IPSecuritas 3.0 build 1693, Sun May 27 21:43:28 MVT 2007, nadig
Darwin 8.9.1 Darwin Kernel Version 8.9.1: Thu Feb 22 20:55:00 PST 2007;
root:xnu-792.18.15~1/RELEASE_I386 i386
Jul 28, 16:49:22 Debug APP State change from IDLE to AUTHENTICATING
after event START
Jul 28, 16:49:22 Info
APP IKE daemon started
Jul 28, 16:49:22 Info
APP IPSec started
Jul 28, 16:49:22 Debug APP State change from AUTHENTICATING to
RUNNING after event AUTHENTICATED
Jul 28, 16:49:22 Info
IKE Foreground mode.
Jul 28, 16:49:22 Info
IKE @(#)ipsec-tools CVS (http://ipsectools.sourceforge.net)
Jul 28, 16:49:22 Info
IKE @(#)This product linked OpenSSL 0.9.7l 28 Sep
2006 (http://www.openssl.org/)
Jul 28, 16:49:22 Info
IKE Reading configuration from "/Library
/Application Support/Lobotomo Software/IPSecuritas/racoon.conf"
Jul 28, 16:49:22 Info
IKE Resize address pool from 0 to 255
Jul 28, 16:49:22 Debug IKE parse successed.
Jul 28, 16:49:22 Debug IKE open /Library/Application
Support/Lobotomo Software/IPSecuritas/admin.sock as racoon
management.
Jul 28, 16:49:22 Debug IKE my interface: ::1 (lo0)
Jul 28, 16:49:22 Debug IKE my interface: 127.0.0.1 (lo0)
Jul 28, 16:49:22 Debug IKE my interface: fe80::21b:63ff:fe04:da0b%en1
(en1)
Jul 28, 16:49:22 Debug IKE my interface:
2002:d018:3087::21b:63ff:fe04:da0b (en1)
Jul 28, 16:49:22 Debug IKE my interface: 192.168.1.94 (en1)
Jul 28, 16:49:22 Debug IKE configuring default isakmp port.
Jul 28, 16:49:22 Debug IKE 5 addrs are configured successfully
Jul 28, 16:49:22 Info
IKE 192.168.1.94[500] used as isakmp port (fd=7)
Jul 28, 16:49:22 Info
IKE 2002:d018:3087::21b:63ff:fe04:da0b[500]
used as isakmp port (fd=8)
Jul 28, 16:49:22 Info
IKE fe80::21b:63ff:fe04:da0b%en1[500] used as
isakmp port (fd=9)
Jul 28, 16:49:22 Info
IKE 127.0.0.1[500] used as isakmp port (fd=10)
Jul 28, 16:49:22 Info
IKE ::1[500] used as isakmp port (fd=11)
Jul 28, 16:49:22 Debug IKE get pfkey X_SPDDUMP message
Jul 28, 16:49:22 Debug IKE 02120200 02000000 00000000 03050000
Jul 28, 16:49:22 Debug IKE pfkey X_SPDDUMP failed: No such file or
directory
Do you have any hints or suggestions as to either debug this or what I'm
missing in the setup?
Re: Problem Connecting With SonicWall TZ-170
by jmarsan on 2007-08-20 17:20:28 +0200
I got past this problem - my remote network uses (used) the same IP range
as the network I was trying to connect to - this apparently causes problems
for IPSecuritas.
Now I'm on to the next issue...the connection attempt gets much further
along but now my TZ-170 is reporting:
08/18/2007 21:19:29.192
IKE Responder: IPSec proposal does not
match (Phase 2)
xxx.xxx.xxx.xxx
xxx.xxx.xxx.xxx
xxx.x.xxx.xxx/32 -> xxx.xxx.x.x/16
08/18/2007 21:19:29.192
IKE Responder: Default LAN gateway is set
but peer is not proposing to use this SA as a default route
xxx.xx.xx.xxx
xxx.xxx.xxx.xxx
xxx.xxx.x.x/16
Re: Problem Connecting With SonicWall TZ-170
by BHunsaker on 2007-09-26 03:37:40 +0200
I got the "X_SPDDUMP failed" message when the value for "Remote IPSec
Device" under the General tab is a DNS string that won't translate. For
example, I used "me.dyndns.com" instead of "me.dyndns.[b]org[/b]".
Problem connecting to Exchange server via IMAP
Problem connecting to Exchange server via IMAP
by RobertF on 2007-07-30 17:47:54 +0200
I'm trying to connect to our Exchange server from home. It has IMAP turned
on and I can access it using Mail.app from work with no difficulty. However,
when I try to access it from home using the VPN, I get a message saying it
can't access the server. I am able to access internal network shares via the
VPN, so it's not a simple connectivity problem. I can access my mail account
via Web mail without difficulty.
The mail server is on a 192.168 address, while the servers I'm able to
access are on 10.0 addresses. However, the IP address I'm being assigned is
in the 192.168 range and I can ping 192.168.1.1.
Any troubleshooting ideas?
Netgear DG834
Netgear DG834
by robinb on 2007-08-10 12:19:55 +0200
Hi All
Noob question which hopefuly hasn't been answered (I have searched
forum)
Has anyone had any sucess connecting securitas on OS X to a Netgear
DG834?
I have used the Netgear Wizzard and the Securitas Wizzard using (what I
think) is going to be the nearest NG device on the list (124G) and the
connection fails on phase 1. Error is
Aug 10, 11:04:50 Info
APP Initiated connection XXX
Aug 10, 11:04:50 Error IKE inappropriate sadb acquire message passed.
Aug 10, 11:04:52 Error IKE phase2 negotiation failed due to time up
waiting for phase1. ESP 213.2.210.66[500]->10.20.30.39[500]
Aug 10, 11:04:57 Info
APP Initiated connection XXX
Aug 10, 11:04:59 Error IKE phase1 negotiation failed due to time up.
37646a8215af9cf4:0000000000000000
I am assuming that it is due to the device i chose but the 834 is not listed. I
did try a couple of others but no joy.
Can anyone point me in the right direction please
TIA
VPN and Gateway
VPN and Gateway
by Christian on 2007-08-14 22:34:26 +0200
So, it has been about a month and I'm in need of my VPN again. As I
mentioned back then, I can now connect to the VPN, but my home router is
not my gateway for web traffic. How do I set up my Mac so that when I'm
connected to my VPN, my home router is my gateway for all network traffic?
Thank you!
Spit DNS?
Spit DNS?
by phssec on 2007-08-22 11:13:34 +0200
Hello.
Has anyone got the Split DNS working with IPSecuritas 3.0?
My problem is that it seems to work [i]only[/i] when there is also a public
name.
Example:
a.example.fi has local address 10.0.0.1
b.example.fi has local address 10.0.0.2 [i]and[/i] public address
80.74.149.177
When I activate IPSecuritas' Split DNS feature for example.fi I can connet to
b.example.fi but not to a.example.fi.
With netstat I can check that b.example.fi connection really goes to
10.0.0.2 so it is using IPSec.
host command can not find any address for a.example.fi and only public
address for b.example.fi.
VPN Tracker seems to be able to handle split dns properly.
Remote Network Settings
Remote Network Settings
by matthewyoung on 2007-08-23 18:51:51 +0200
We have IP addresses of 172.x.0.0 and I am trying to set this up so I can
connect through to our SonicWall and into our network.
I have it so I can connect to the SonicWall as I can login to the firewall
management site but the network settings I have listed are not the same as
if I use sonicwall's own vpn software on my windows machine (they don't
make one for macs) - if on there I see the network as being 0.0.0.0 255.255.255.255 - how do I get that as the remote endpoint setting?
Also....using the fireall software my computer gets a dhcp ip address from
the firewall and I cannot see a setting for this in IPSecuritas. I can give
myself a manual setting (Local Endpoint) but one on the firewall I cannot
ping or connect to anything else on the network whether on 172.16.x.x
(which is the firewall's internal) or another 17 address we have.
any suggestions????
Linksys WRV200
Linksys WRV200
by rdfisher on 2007-09-05 06:03:03 +0200
I'm trying to establish a workstation to network VPN connection with a
Linksys WRV200 router. Through searching these forums I found reference
to an outdated guide (http://www.lobotomo.com/products/IPSecuritas
/howto/Linksys%20WRV200%20HOWTO.pdf) but I haven't been successful
at making a connection using these directions. Has anyone had success at
connecting to this router, specifically running (current) firmware 1.0.32.2? I
will certainly post logs etc if troubleshooting is necessary, but figured I'd
first start by looking for any known good configurations. Thanks for the
help.
rf
Re: Linksys WRV200
by dandor on 2007-09-07 07:02:15 +0200
Hi,
I've just been trying to get the same things working.
I think I managed to work around the outdated HowTo--- not too much
changed, luckily.
After putting in all the details, I've got a connection, according to "sudo
setkey -D" and "ifconfig".
However, the link doesn't work! Pinging the router returns silence.
In the next day or two I'll return to this forum either 1) to ask how to get it
working, or 2) explain how I sorted it out.
D.
Re: Linksys WRV200
by dandor on 2007-09-07 18:17:36 +0200
Hi,
using the HowTo as a guide, I got it working. Need the configuration
details? I can try to post a series of screenshots. Would that be helpful?
[b]UPDATE:[/b]
[url=http://www.flickr.com/photos/xandxor/1342694152/][img]http:
//farm2.static.flickr.com/1055/1342694152_906f7897b5_b.jpg[/img][/url]
I suspect the WRV200 settings are more useful. Next update.
Re: Linksys WRV200
by dandor on 2007-09-07 18:58:54 +0200
WRV settings:
(Note that the "Advanced Settings" should have the "Allow All" radio button
checked, but that is in fact the default.)
[url=http://www.flickr.com/photos/xandxor/1341846071/][img]http:
//farm2.static.flickr.com/1317/1341846071_77e7df7bdf_o.jpg[/img][/url]
Re: Linksys WRV200
by rdfisher on 2007-09-20 07:02:38 +0200
That worked! I tried your solution a few weeks ago and it didn't work at
that time. I don't know what I did different this time around but I'm
connected right now. Excellent help with the screenshots! Thanks for the
help.
IPSecuritas connecting to OS X Server 10.4
IPSecuritas connecting to OS X Server 10.4
by alex_schenkman on 2007-09-05 10:12:01 +0200
Hi:
Is is possible to connect to an OSX Server 10.4 with IPSecuritas?
I know that I can use the OSX built-in client, but I wonder if I can offer my
users a single interface for connecting to all our resources.
Thanks in advance!
IPSecuritas & Netgear DGFV338
IPSecuritas & Netgear DGFV338
by ridgedale on 2007-09-16 07:34:06 +0200
I wonder if anyone might be able to help. I'm trying to VPN into a Netgear
DGFV338 and am having no success. Would someone be able to tell me
where I am going wrong? I've provided a log of an attempted connection
below:
Sep 16, 06:06:52 Info
APP IKE daemon started
Sep 16, 06:06:53 Info
APP IPSec started
Sep 16, 06:06:53 Error IKE Foreground mode.
Sep 16, 06:06:53 Info
IKE @(#)ipsec-tools CVS (http://ipsectools.sourceforge.net)
Sep 16, 06:06:53 Info
IKE @(#)This product linked OpenSSL 0.9.7l 28
Sep 2006 (http://www.openssl.org/)
Sep 16, 06:06:53 Info
IKE Reading configuration from "/Library
/Application Support/Lobotomo Software/IPSecuritas/racoon.conf"
Sep 16, 06:06:53 Info
IKE Resize address pool from 0 to 255
Sep 16, 06:06:53 Info
APP Initiated connection <connectionName>
Sep 16, 06:06:53 Error IKE inappropriate sadb acquire message passed.
Sep 16, 06:06:54 Info
IKE couldn't find the proper pskey, try to get one
by the peer's address.
Sep 16, 06:07:00 Info
APP Initiated connection <connectionName>
Sep 16, 06:07:07 Info
APP Initiated connection <connectionName>
Sep 16, 06:07:09 Error IKE <routerIP> give up to get IPsec-SA due to
time up to wait.
Sep 16, 06:07:14 Info
APP Initiated connection <connectionName>
Sep 16, 06:07:14 Error IKE inappropriate sadb acquire message passed.
Sep 16, 06:07:21 Info
APP Initiated connection <connectionName>
Sep 16, 06:07:26 Warning APP Connection <connectionName> timed out
Sep 16, 06:07:26 Warning APP Giving up
Sep 16, 06:07:29 Error IKE <routerIP> give up to get IPsec-SA due to
time up to wait.
Sep 16, 06:08:29 Info
APP IPSec stopping
Sep 16, 06:08:30 Info
APP IKE daemon terminated
Thanks in advance.
Re: IPSecuritas & Netgear DGFV338
by cnadig on 2007-09-17 07:12:22 +0200
Hello,
could you please set the log level to Debug (in IPSecuritas' preferences) and
post such a log again (please make sure to remove your public address and
other confidential information from the output)?
Thanks,
Christoph
Re: IPSecuritas & Netgear DGFV338
by ridgedale on 2007-09-18 21:03:27 +0200
Christoph,
Thanks for your reply. I've managed to sort the issue out - everything's
working fine now.
I'll remember to heed your comments when posting in future.
Thanks again
Dene
Re: IPSecuritas & Netgear DGFV338
by AKirchner on 2007-09-21 12:49:00 +0200
Hey I have the same Hard- and Software but I can't fix it. Thats my log.
The Support-Hotline from Netgear is incompetent i think.
IPSecuritas 3.0 build 1693, Sun May 27 21:43:28 MVT 2007, nadig
Darwin 8.9.1 Darwin Kernel Version 8.9.1: Thu Feb 22 20:55:00 PST 2007;
root:xnu-792.18.15~1/RELEASE_I386 i386
Sep 21, 12:34:09 Info
APP IPSec stopping
Sep 21, 12:34:10 Info
APP IKE daemon terminated
Sep 21, 12:34:10 Info
APP IKE daemon started
Sep 21, 12:34:11 Info
APP IPSec started
Sep 21, 12:34:11 Info
IKE Foreground mode.
Sep 21, 12:34:11 Info
IKE @(#)ipsec-tools CVS (http://ipsectools.sourceforge.net)
Sep 21, 12:34:11 Info
IKE @(#)This product linked OpenSSL 0.9.7l 28
Sep 2006 (http://www.openssl.org/)
Sep 21, 12:34:11 Info
IKE Reading configuration from "/Library
/Application Support/Lobotomo Software/IPSecuritas/racoon.conf"
Sep 21, 12:34:11 Info
IKE Resize address pool from 0 to 255
Sep 21, 12:34:11 Info
APP Initiated connection Rudi Renner
Bellinghausen
Sep 21, 12:34:11 Error IKE inappropriate sadb acquire message passed.
Sep 21, 12:34:18 Info
APP Initiated connection Rudi Renner
Bellinghausen
Sep 21, 12:34:25 Info
APP Initiated connection Rudi Renner
Bellinghausen
Sep 21, 12:34:27 Error IKE phase2 negotiation failed due to time up
waiting for phase1. ESP xx.xxx.xxx.xxx[500]->192.168.2.20[500]
Sep 21, 12:34:32 Info
APP Initiated connection Rudi Renner
Bellinghausen
Sep 21, 12:34:34 Error IKE phase2 negotiation failed due to time up
waiting for phase1. ESP xx.xxx.xxx.xxx[500]->192.168.2.20[500]
Sep 21, 12:34:39 Info
APP Initiated connection Rudi Renner
Bellinghausen
Sep 21, 12:34:39 Error IKE inappropriate sadb acquire message passed.
Sep 21, 12:34:41 Error IKE phase1 negotiation failed due to time up.
fd391904457e4be8:0000000000000000
Sep 21, 12:34:41 Error IKE phase2 negotiation failed due to time up
waiting for phase1. ESP xx.xxx.xxx.xxx[500]->192.168.2.20[500]
Sep 21, 12:34:44 Warning APP Connection Rudi Renner Bellinghausen
timed out
Sep 21, 12:34:44 Warning APP Giving up
Sep 21, 12:34:48 Error IKE phase2 negotiation failed due to time up
waiting for phase1. ESP xx.xxx.xxx.xxx[500]->192.168.2.20[500]
Sep 21, 12:34:55 Error IKE phase2 negotiation failed due to time up
waiting for phase1. ESP xx.xxx.xxx.xxx[500]->192.168.2.20[500]
Sep 21, 12:35:50 Info
APP IPSec stopping
Sep 21, 12:35:51 Info
APP IKE daemon terminated
Sep 21, 12:35:53 Info
APP IKE daemon started
Sep 21, 12:35:53 Info
APP IPSec started
Sep 21, 12:35:53 Error IKE Foreground mode.
Sep 21, 12:35:53 Info
IKE @(#)ipsec-tools CVS (http://ipsectools.sourceforge.net)
Sep 21, 12:35:53 Info
IKE @(#)This product linked OpenSSL 0.9.7l 28
Sep 2006 (http://www.openssl.org/)
Sep 21, 12:35:53 Info
IKE Reading configuration from "/Library
/Application Support/Lobotomo Software/IPSecuritas/racoon.conf"
Sep 21, 12:35:53 Info
IKE Resize address pool from 0 to 255
Sep 21, 12:35:53 Info
APP Initiated connection Rudi Renner
Bellinghausen
Re: IPSecuritas & Netgear DGFV338
by gmandil on 2008-11-12 20:58:18 +0100
ridgedale
could you please explain us what have you done to make it work ?
thanks in advance
Guillaume
IPSecuritas - problem accessing the DMZ
IPSecuritas - problem accessing the DMZ
by coot on 2007-09-17 11:25:47 +0200
Hi all,
We have a problem accessing our DMZ from home using the IPSecuritas VPN
Client. We are connecting to a sonicwall pro 2040.
I have two remote endpoints. One is the DMZ and one is the LAN. I can
connect successfully to all LAN computers. I cannot connect to any
computers in the DMZ.
I have tested the Sonicwall VPN Client on a Windows PC and can access both
the LAN and DMZ computers.
Does anyone have an idea of what could be causing this problem? If you
need any extra info about this then just let me know.
Regards.. Karl
Re: IPSecuritas - problem accessing the DMZ
by coot on 2007-09-17 17:40:29 +0200
I'm really stumped on this. I think there may be a problem accessing the
second network.
In the scenario above, I had the DMZ listed as the second network in the
Remote Endpoint "Networks" section.
I changed it around so that the DMZ network is listed first and the LAN
network second. Now I can connect to the DMZ but not the LAN.
:-/ Any ideas?
Problems connecting to Sonicwall TZ-170
Problems connecting to Sonicwall TZ-170
by adacey on 2007-09-19 13:53:21 +0200
I had this working fine under 2.1 but with 3.0 I can't connect. I imported my
connection from 2.1 but when I connect the log shows "Id expected IP
address in main mode but received FQDN" (sorry, posting from work so I
don't have the exact message).
I have identifiers set to address for both sides of the connection, I've
checked the Sonicwall's configuration and can't find what it's using for
identifiers. The closest option I found was the firewall's unique firewall
identifier, which I did try inputting for it's identifier (as a FQDN) but that
also didn't work.
Any suggestions?
Fios Actiontec M1424-WR
Fios Actiontec M1424-WR
by headbaker on 2007-09-22 04:23:00 +0200
I have been using IPSecuritas on my Macbook Pro from home over a Linksys
WRK54G router while with Comcast to a Sonicwall 4060. I just switched to
Verizon FIOS with a Actiontec M1424-WR router and have had no luck. I
am using the same LAN IP on this new router as the old one. I can connect
from the MAC when booting into Vista and running Sonicwall's GlobalVPN
client.
Has anyone else experienced any difficulties switching over to FIOS or the
Actiontech router?
Re: Fios Actiontec M1424-WR
by headbaker on 2007-09-23 00:42:07 +0200
Well, with persistance I was able to get it working. The only configuration
change was to disable NAT-T. It is working fine now.
Addressing questions
Addressing questions
by Roger408 on 2007-09-28 19:51:01 +0200
I'm setting up IPSecuritas for the first time, using a Netgear FVS114 there
and a Mac mini here. I can get a connection established, but have trouble
reaching anything at the end with the router (there). Addressing on the
LAN there is 192.168.0.0/24. At present my Mac is on my home LAN (here)
and is 10.43.x.x. Attempting to ping anything on 192.168.0.x fails, since I
assume it is trying to ping on my home LAN.
I'm not clear on how to direct traffic through the IPsec link to the 192.168...
LAN. Can anyone clarify this for me?
Here is the log for this session. The last three lines are repeated many
times...
Sep 28, 09:35:41 Info
APP IKE daemon started
Sep 28, 09:35:41 Info
APP IPSec started
Sep 28, 09:35:41 Error IKE Foreground mode.
Sep 28, 09:35:41 Info
IKE @(#)ipsec-tools CVS (http://ipsectools.sourceforge.net)
Sep 28, 09:35:41 Info
IKE @(#)This product linked OpenSSL 0.9.7l 28
Sep 2006 (http://www.openssl.org/)
Sep 28, 09:35:41 Info
IKE Reading configuration from "/Library
/Application Support/Lobotomo Software/IPSecuritas/racoon.conf"
Sep 28, 09:35:41 Info
IKE Resize address pool from 0 to 255
Sep 28, 09:35:42 Info
APP Initiated connection SVCF
Sep 28, 09:35:42 Error IKE inappropriate sadb acquire message passed.
Sep 28, 09:35:45 Warning IKE trns_id mismatched: my:DES peer:3DES
Sep 28, 09:35:49 Info
IKE the packet is retransmitted by
76.210.165.xx[500]. $ xx inserted by me.
Sep 28, 09:35:54 Info
IKE the packet is retransmitted by
76.210.165.xx[500].
Sep 28, 09:35:59 Info
IKE the packet is retransmitted by
76.210.165.xx[500].
Sep 28, 09:36:44 Error IKE failed to get sainfo.
Sep 28, 09:36:44 Error IKE failed to get sainfo.
Sep 28, 09:36:44 Error IKE failed to pre-process packet.
Sep 28, 09:36:48 Error IKE failed to get sainfo.
Re: Addressing questions
by Forum Admin on 2007-10-01 17:36:52 +0200
Hello,
when a connection is established, traffic to the remote network is directed
automatically through the established tunnel, i.e. there is no need for an
extra route entry. If you can't get traffic to or from the remote network
although the connection is established (green dot), I see two possible
problems:
1. NAT problem: your local router might not support VPN-passthrough or
there are other IPSec tunnels active from the local network. Try enabling
NAT-T
2. The remote firewall is not the default route for the machine you try to
reach, the 10.x.x.x network is routed differently or not all. I'd try to specify
a different "virtual" local IP (enter the address into the local endpoint
address field), say from the 172.24.x.x range.
If this doesn't help, try to find out if the traffic you send is reaching the
other end at all, i.e. sniff the local network for traffic destined to the
machine you're trying to reach, to see which direction doesn't work.
Hope this helps,
Christoph
Connection speed issue
Connection speed issue
by wilfredoz on 2007-10-01 14:35:12 +0200
Hello,
Thank you for this great pice of software, I use it occasionaly with my
mackbook-gprs connection to a monowall ip-sec router to login to a
couple of servers at work via ssh and for a remote desktop machine.
Now I got one problem. when I use a gprs (slow) connection everything is
going well, when I connect with ssh I can control the remote servers
perfectly, but when I use a highspeed cable of adsl connection the ssh
session locks up when I try to use some commands like "ls".
The same happens with remote desktop on Mac os x, the remote screen
appears completly on a gprs connection but when I use a high speed
connection the remote screen even doesn't appears.
Is this a known problem and what can I do about it?
Thanks!
Re: Connection speed issue
by Forum Admin on 2007-10-01 17:26:53 +0200
Hello,
this looks like an issue with the MTU. IPSec encapsulates the original user
data into an ESP packet, probably making the resulting packet larger than
allowed.
Please try to decrease the MTU on the m0n0walls' WAN interface by 8 (no
NAT-T) or 28 (NAT-T enabled).
Hope this helps,
Christoph
Re: Connection speed issue
by wilfredoz on 2007-10-03 22:14:38 +0200
[quote author=Forum Admin link=1191242112/0#1
date=1191252413]Hello,
this looks like an issue with the MTU. IPSec encapsulates the original user
data into an ESP packet, probably making the resulting packet larger than
allowed.
Please try to decrease the MTU on the m0n0walls' WAN interface by 8 (no
NAT-T) or 28 (NAT-T enabled).
Hope this helps,
Christoph[/quote]
Thanks for your reply, I tried to decrease the MTU size but it did not solve
the problem.
I think when It was the other way around, it could be a MTU issue..
Re: Connection speed issue
by Dave on 2007-10-31 16:17:11 +0100
[quote author=wilfredoz link=1191242112/0#2 date=1191442478]Thanks
for your reply, I tried to decrease the MTU size but it did not solve the
problem.
I think when It was the other way around, it could be a MTU issue..[/quote]
When I connect to the SonicWall at work, I have to set the Mac's MTU down
to around 1400, do a couple of pings with no-fragment set, and then set it
back up to 1500. After doing all this, things will work. If I don't, the first
fragmented packet stalls the connection.
Is there some way to do this automagically when the connection starts?
MacBook Pro can't find VPN server.
MacBook Pro can't find VPN server.
by gmoon on 2007-10-01 18:35:54 +0200
My office set up a VPN mostly to be used by me when I'm out of the office. I
was given the .ipsc file to import, and I'm able to get connected in
IPSecuritas (it shows green), but when I try to connect to server from the
finder it says it's looking up the server, but then says it can't find it. A
coworker has essentially the same Mac as me, I copied his .ipsc file and he
is able to connect but I am not (from the same remote location).
I have also tried from home on my other 2 macs, each shows green, but
can't find the server.
We went through all of our network and sharing settings to see if anything
was different and it all appears the same. Is there a setting I may need to
change on my Mac?
When I'm at home I'm using an Airport extreme and I have to set NAT-T to
enable and check "Local IP in Remote Netwrok", but even from the cafe up
the street where we tried it, his works and mine won't! Any thoughts??
Thanks.
Re: MacBook Pro can't find VPN server.
by Forum Admin on 2007-10-01 21:04:11 +0200
Hello,
this seems odd... Have you tried to just ping a remote machine?
Could you please run the following commands in a Terminal window on
both your and your collueges machine, possibly from the same remote
location (one command per line):
ifconfig -a
netstat -nr
sudo setkey -DP
sudo setkey -D
(The second last command will ask you to enter your administrator
password). Could you please e-mail me the output to
[email protected]?
Thanks,
Christoph
Zywall 5 and XAUTH
Zywall 5 and XAUTH
by wf10 on 2007-10-02 20:47:10 +0200
Hi everyone
I use Zywall 5, Firmware Version 4.x and IPSecuritas Version 3. I want to
manage the access using Extended Authentication and PSK. I can't establish
a connection to my gateway. With PSK only, it runs fine.
Even with VPN Tracker, it runs also. Any hint? Thanks a lot!
Dave
Re: Zywall 5 and XAUTH
by 16thnotes on 2007-10-05 12:24:39 +0200
I too would like to do Xauth with the ZyWALL 35 and 70 models with the 4.X
firmware, but simply get following errors in the IP Securitas application
connection log:
[color=#990000]Oct 05, 19:07:53 Error IKE Xauth mode config request
but peer did not declare itself as Xauth capable
Oct 05, 19:07:53 Error IKE Hash verification failed
Oct 05, 19:07:53 Error IKE unknown Informational exchange received.
[/color]
Re: Zywall 5 and XAUTH
by 16thnotes on 2007-10-05 12:41:14 +0200
I discovered that there was the option under the ID tab for Xauth PSK. I did
not see that the first time, however, I still get the following errors in the IP
Securitas application log:
[color=#990000]Oct 05, 19:36:53 Error IKE inappropriate sadb acquire
message passed.
Oct 05, 19:36:54 Warning IKE ignore INITIAL-CONTACT notification,
because it is only accepted after phase1.
Oct 05, 19:36:54 Error IKE No SIG was passed, hybrid auth is enabled,
but peer is no Xauth compliant
Oct 05, 19:36:54 Warning IKE Short payload[/color]
IPSecuritas and XAUTH
IPSecuritas and XAUTH
by sohonet on 2007-10-03 13:19:19 +0200
Hi,
i am currently testing the final release of IPSecuritas adn i can't get xauth to
work.
The VPN connection is successful but i expected a pop up windows to come
up so that the users can authenticate to the remote Netwscreen in my case.
Any ideas anyone?
Re: IPSecuritas and XAUTH
by 16thnotes on 2007-10-05 12:42:25 +0200
I'm unable to get it working with my ZyWALL 35 hardware as well.
Did you try using the new option under the ID tab for Xauth PSK?
Draytek Vigor and "host to anywhere"
Draytek Vigor and "host to anywhere"
by wanabe_cool on 2007-10-03 15:23:51 +0200
Hi,
Anyone had any experience with connecting to a Draytek Vigor router with
IPSecuritas? I've set up a "host to network" which works fine, but not when
trying to route all traffic through the VPN (host to anywhere). The connection
seems to just die when trying to connect.
Below are a selection of details which I hope might help someone to
understand what is happening:
My system log shows:
Oct 3 14:12:57 CG-MBP crashdump[704]: racoon crashed
Oct 3 14:12:57 CG-MBP crashdump[704]: crash report written to: /Library
/Logs/CrashReporter/racoon.crash.log
the crash log shows this:
Exception: EXC_BAD_ACCESS (0x0001)
Codes:
KERN_PROTECTION_FAILURE (0x0002) at 0x00000004
I have the following settings:
Version = 3.0rc3 (build 1693)
General -> Remote Side -> Endpoint mode = Anywhere + DHCP
Pass-Through enabled
Phase 1 and Phase 2 should be OK as it works with the same config when
connecting "host to network"
ID -> Local Identifier = Address
ID -> Remote Identifier = Address
ID -> Authentication Method = Preshared Key
Options Selected:
IPSec DOI
SIT_IDENTITY_ONLY
Verify Identity
Local IP in Remote Network
Unique SAs
IKE Fragmentation
NAT-T = Enable (my client is behind a NAT firewall)
The connection appears to get through phase 1 and possibly phase 2 until
this happens:
Oct 03, 14:12:57 Info
APP IKE daemon terminated
Oct 03, 14:12:57 Debug APP State change from RUNNING to IDLE after
event RACOON TERMINATED
Oct 03, 14:12:57 Debug APP Received SADB message type X_SPDDELETE
not interesting
Oct 03, 14:12:57 Debug APP Received SADB message type X_SPDDELETE
not interesting
Oct 03, 14:12:57 Debug APP Received SADB message type X_SPDDELETE
not interesting
Oct 03, 14:12:57 Debug APP Received SADB message type X_SPDDELETE
not interesting
Oct 03, 14:12:57 Debug APP Received SADB message type X_SPDDELETE
not interesting
Oct 03, 14:12:57 Debug APP Received SADB message type X_SPDDELETE
not interesting
Oct 03, 14:12:57 Debug APP Received SADB message type X_SPDDELETE
not interesting
Oct 03, 14:12:57 Debug APP Received SADB message type X_SPDDELETE
-
IPSecuritas 3 and AVM Fritz Box
IPSecuritas 3 and AVM Fritz Box
by yap on 2007-10-09 16:56:50 +0200
Hallo,
I have an AVM Fritz!Box with the actual firmware "Labor-Version
29.04.34-7728" installed. With the version 2.2 of IPSecuritas I can use VPN
perfect. But it doesn't work with the new version of IPSecuritas. I had
imported my settings from version 2.2 to version 3 but I only get this log
entries:
[code]IPSecuritas 3.0 build 1693, Sun May 27 21:43:28 MVT 2007, nadig
Darwin 8.9.1 Darwin Kernel Version 8.9.1: Thu Feb 22 20:55:00 PST 2007;
root:xnu-792.18.15~1/RELEASE_I386 i386
Oct 09, 16:33:22 Info
APP Network configuration change detected
Oct 09, 16:33:37 Info
APP IKE daemon started
Oct 09, 16:33:38 Info
APP IPSec started
Oct 09, 16:33:38 Error IKE Foreground mode.
Oct 09, 16:33:38 Info
IKE @(#)ipsec-tools CVS (http://ipsectools.sourceforge.net)
Oct 09, 16:33:38 Info
IKE @(#)This product linked OpenSSL 0.9.7l 28
Sep 2006 (http://www.openssl.org/)
Oct 09, 16:33:38 Info
IKE Reading configuration from "/Library
/Application Support/Lobotomo Software/IPSecuritas/racoon.conf"
Oct 09, 16:33:38 Info
IKE Resize address pool from 0 to 255
Oct 09, 16:34:53 Info
APP IPSec stopping
Oct 09, 16:34:54 Info
APP IKE daemon terminated
Oct 09, 16:35:15 Info
APP Network configuration change detected
Oct 09, 16:35:46 Info
APP Network configuration change detected
[/code]
I don't know what's wrong. Can anyone help me?
These are my settings:
[quote]
General:
Remote IPSec Device: myadress.dyndns.org
Local Side, Endpoint Mode: Host
IP Adress (optional): 192.168.178.201
Remote Side, Endpoint Mode: Network
Network Address: 192.168.178.0
Network Mask (CIDR) 24
Phase 1:
28800 Seconds
1024 (2)
3DES
SHA-1
Aggressive
Claim
16
Phase 2:
Lifetime: 28800 Seconds
PFS Group: 1024 (2)
Encryption: AES 128
Authentication: HMAC MD5, HMAC SHA-1
ID:
User FQDN
[email protected]
Adress
Preshared Key
Re: IPSecuritas 3 and AVM Fritz Box
by Forum Admin on 2007-10-09 19:19:47 +0200
Hello,
could you possibly send me the log output of both versions 2.2 and 3.0
with log level set to debug to [email protected]?
Thank you very much,
Christoph
Re: IPSecuritas 3 and AVM Fritz Box
by yap on 2007-10-14 12:45:25 +0200
Hi,
thank you, but now it works. Just a few days ago AVM, the producer of the
Fritz!Box, wrote a howto to connect with IPSecuritas to the AVM Fritz Box.
Here the link to the HOWTO:
http://www.avm.de/de/Service/Service-Portale/Service-Portal
/VPN_Interoperabilitaet/box_zu_securitas.php?portal=VPN
thanks
Re: IPSecuritas 3 and AVM Fritz Box
by Forum Admin on 2007-10-16 15:15:21 +0200
Thank you very much for the link. IPSecuritas 3.1 now contains a wizard
template and a HOWTO for the FRITZ!Box.
Christoph
IPSecuritas and FVS318v3
IPSecuritas and FVS318v3
by fallous on 2007-10-18 04:53:25 +0200
ok, I've got a FVS318v3 sitting as the edge router for a local network that
uses the 192.168.16.x local block for internal servers. I'm trying to connect
with a remote client that's sitting in a 192.168.1.x NAT'd network. I went
through the IPSecuritas doc for setting this net up, and when I try and
connect the connect indicator turns green, but I can't ping anything or
connect to anything. In addition a connect seems to fubar the FVS so that
you can't web connect to the management page without power cycling the
router, which sucks. I do have a second router on the net that handles
traffic to other sites that are in the 192.168.x.x block and I'm wondering if
I'm running into a problem there.
Re: IPSecuritas and FVS318v3
by jdsmcroy on 2007-11-08 23:29:35 +0100
I would be interested to know if you found a solution to this problem. I am
experiencing the exact same issue.
Re: IPSecuritas and FVS318v3
by bstender on 2007-11-29 01:53:06 +0100
try setting the client ip to 10.0.0.1
IPSecuritas connecting to Netscreen NS25 XauthPSK
IPSecuritas connecting to Netscreen NS25 XauthPSK
by bence8810 on 2007-10-18 16:18:18 +0200
Hi
I am trying to connect to a Netscreen Firewall, NS5, and I am using
IPSecuritas. I am brand new to Mac, so I may be missing a lot of things.
Firstly, the Netscreen requires a Xauth - PSK authentication, a Pre Shared
key first, then a user supplied password, as we have multiple users on the
Netscreen. I tried my best to set up IPSecuritas, but I obviously was not
good enough. I have also set up a Client for Windows with the same PSK
and Xauth login, and it works like a charm. I am including logs from the
Netscreen when connecting successfully from Windows, and the error when
connecting from IPSecuritas. Both connections are made from the same
Wireless Router, so there is no difference between the two scenarrios,
except the OS and VPN client, and of course, the settings.
Successfull connection with Netscreen Remote Connect on Windows:
[code]
2007-10-17 22:21:23
info
IKE<MY WIFI LAN STATIC IP> Phase 2
msg ID <f90990ca>: Completed negotiations with SPI <78a068ee>, tunnel
ID <32770>, and lifetime <3600> seconds/<0> KB.
2007-10-17 22:21:23
info
IKE<MY WIFI LAN STATIC IP> Phase 2
msg-id <f90990ca>: Completed for user <[email protected]>.
2007-10-17 22:21:23
info
IKE<MY WIFI LAN STATIC IP> Phase 2
msg ID <f90990ca>: Responded to the peer's first message from user
<[email protected]>.
2007-10-17 22:21:21
info
IKE<MY WIFI LAN STATIC IP>: XAuth login
was passed for gateway <NETSCREEN-GW-NAME>, username <Xauth
Username>, retry: 0.
2007-10-17 22:21:16
info
IKE<MY WIFI LAN STATIC IP>: Received
initial contact notification and removed Phase 1 SAs.
2007-10-17 22:21:16
info
IKE<MY WIFI LAN STATIC IP> Phase 1:
Completed Aggressive mode negotiations with a <28800>-second lifetime.
2007-10-17 22:21:16
info
IKE<MY WIFI LAN STATIC IP> Phase 1:
Completed for user <[email protected]>.
2007-10-17 22:21:16
info
IKE<MY WIFI LAN STATIC IP>: Received
initial contact notification and removed Phase 2 SAs.
2007-10-17 22:21:16
info
IKE<MY WIFI LAN STATIC IP>: Received a
notification message for DOI <1> <24578> <INITIAL-CONTACT>.
[/code]
And the Unsuccessfull one from Mac OS X and IPSecuritas:
[code]2007-10-17 23:23:38
info
Rejected an IKE packet on untrust
from MY WIFI LAN STATIC IP:500 to NETSCREEN IP:500 with cookies
8d838541ab3c6dda and 0000000000000000 because an initial Phase 1
packet arrived from an unrecognized peer gateway.[/code]
I would appreciate any help with this,
Thanks
Ben
Re: IPSecuritas connecting to Netscreen NS25 Xauth
by Forum Admin on 2007-10-18 18:40:53 +0200
Hello Ben,
which version of IPSecuritas did you use? Only 3.1 (or any beta of 3.1) is
able to talk to Juniper's XAuth implementation. If you were using 3.1, could
you send me a log output from IPSecuritas (with log level set to Debug) to
[email protected]?
Thanks,
Christoph
Re: IPSecuritas connecting to Netscreen NS25 Xauth
by bence8810 on 2007-10-18 22:19:23 +0200
Hi Cristoph,
I am happy to announce that I found a couple of mistakes, and after fixing
those, I am now able to connect, and stay connected. I must say, although I
havent used it that much all together, it seems rather stable.
Thanks for all the effort, its a unique tool, and it finally FINALLY allows me
to not have a Windows box at home. I want to send you a bottle of
champagne :)
Cheers
Ben
Re: IPSecuritas connecting to Netscreen NS25 Xauth
by gr33d on 2007-10-31 18:26:19 +0100
What did you finally come up with?
I'm having a similar problem creating a simple policy-based VPN between
my Juniper SSG5 and a Cisco PIX 501.
IKE<cisco static ip>: Received initial contact notification and removed Phase
1 SAs
IKE<cisco static ip>: Received initial contact notification and removed Phase
2 SAs
IKE<cisco static ip>: Received a notification message for DOI <1>
<24578> <INITIAL-CONTACT>.
IKE<cisco static ip>: Phase 2: Initiated negotiations.
IKE<cisco static ip>: Phase 1: Completed Main mode negotiations with a
<28800>-second lifetime.
I wasn't even getting negotiations yesterday, but these started today when
I'm test pinging to bring the VPN up.
Thanks in advance
Re: IPSecuritas connecting to Netscreen NS25 Xauth
by bence8810 on 2007-11-01 08:58:42 +0100
Hi
Actually I had the PSK wrong :( I know this is such an amature mistake, but
that is what I had.
From your logs though, you are showing a successfull or at least very near
to successful connection. Those are the exact same logs I was getting when
connecting successfuly from the windows PC.
I guess you can fine tune some timings, delays, and timeouts, etc.
Cheers
Ben
IP Securitas Startup
IP Securitas Startup
by Tacitus on 2007-10-19 21:15:00 +0200
I run as user rather than admin. Every time I start IPSecuritas it asks for an
Admin name & password. I think it does this because it is not connected to
the Daemon. Is there anyway the connection can be made automaticaly or
the Daemon run as a startup item? Would there be a security risk with this?
I notice there are two IPSecuritas processes running already, ID 1407 and
769. They are using 0% cpu but around 8.5Mb memory.
Re: IP Securitas Startup
by Tacitus on 2007-10-25 08:55:53 +0200
Any help out there? Please... :-)
no LAN IP when connected to RV042
no LAN IP when connected to RV042
by foilpan on 2007-10-22 15:48:54 +0200
i finally got a working connection between a client's linksys RV042
(firmware 1.3.8.2) and ipsecuritas 3.1, but i don't get an IP in the LAN when
connected.
the linksys config is basically the defaults for a client-to-gateway setup,
and ipsecuritas config mirrors this.
i've tried enabling NAT-T on both sides and NETBIOS and keepalive on the
linksys. with these options enabled or disabled, i'm able to connect but
can't ping or otherwise access anything on the client's LAN.
any ideas?
Re: no LAN IP when connected to RV042
by sortofdumb on 2007-10-24 14:08:50 +0200
Hello,
Have you had any luck getting this to work? I've got an RV042 as well and
I'm curious to know if I can use IPSecuritas with it.
Thanks!
Re: no LAN IP when connected to RV042
by foilpan on 2007-10-30 13:40:23 +0100
[quote author=sortofdumb link=1193060934/0#1
date=1193227730]Hello,
Have you had any luck getting this to work? I've got an RV042 as well and
I'm curious to know if I can use IPSecuritas with it.
Thanks![/quote]
no, i haven't gotten it to work, but i haven't tested much in the past week.
i'll post back with an update as soon as i have one.
Re: no LAN IP when connected to RV042
by foilpan on 2007-11-13 22:04:26 +0100
has anyone gotten this to work? i'm still unsuccessful getting ipsecuritas to
connect properly. may thanks for any tips.
mode_cfg not getting IP address from remote host
mode_cfg not getting IP address from remote host
by farlander on 2007-10-27 00:04:04 +0200
I'm using Juniper NetScreen SSG520 (similar to NetScreen-50 in all regards,
when it comes to VPN), set up to use XAuth and Mode_Config, with "Host to
Everywhere" set up. I can log in just fine, and I can ping remote gateway,
however I'm not getting an IP address from a remote host and when I log
into Juniper web GUI I can see that it shows that I'm logging in from a
public IP address, not from an internal IP I'm supposed to get from
Mode_Config.
Bascially, there's no new interface created, and no aliases assigned to any
of the existing ones on my Mac. When I use VPN Tracker, it creates a new
point-to-point interface with an IP address from 172.x.x.x subnet (the
subnet I use for dial-up VPN connections).
Any ideas? Is this a bug in IPSecuritas or am I missing something?
m0n0wall to m0n0wall connection
m0n0wall to m0n0wall connection
by wilfredoz on 2007-10-31 13:58:00 +0100
Hello,
A few weeks ago I posted a message with the subject "connection speed
issue", and I disscoverd that the problem is that I cannot get the connection
right like this: (I CAN connect but network sessions like ssh and vnc hangs
immediately)
computer
(ipsecuritas)---->m0n0wall(ipsec)---->INTERNET---->m0n0wall(ipsec)---->computer
(reversed also fails)
But this configuration works fine:
computer (ipsecuritas)----> any brand
router---->INTERNET---->m0n0wall(ipsec)---->computer
computer (ipsecuritas)----> GPRS/3G via
phone---->INTERNET---->m0n0wall(ipsec)---->computer
Both m0n0walls are a soekris 4501 board with m0n0wall ver. 1.21, NATed
and some basic firewall rules.
Does anyone had the same problem and came up with a solution?
Help much appreciated, thanks!
Netgrar FVS124G connection problem
Netgrar FVS124G connection problem
by robinb on 2007-10-31 14:56:37 +0100
Hi All
I have seen this error msg posted on here but the user then just said sorted
thanks without saying what they did!
I have a Netgear FVS124G and 3.1 IPSecuritas. I have followed to the letter
the installtion guid provided but had no sucess. always with the same error.
I have deleted all settings and tried again but always the same
here is IPS log
IPSecuritas 3.1 build 1860, Mon Oct 15 22:03:05 CEST 2007, nadig
Darwin 8.10.1 Darwin Kernel Version 8.10.1: Wed May 23 16:33:00 PDT
2007; root:xnu-792.22.5~1/RELEASE_I386 i386
Oct 31, 13:54:51 Info
APP IPSec authenticating
Oct 31, 13:54:51 Info
APP IKE daemon started
Oct 31, 13:54:51 Info
APP IPSec started
Oct 31, 13:54:51 Info
APP Initiated connection JIA
Oct 31, 13:54:51 Error IKE Foreground mode.
Oct 31, 13:54:51 Info
IKE @(#)ipsec-tools CVS (http://ipsectools.sourceforge.net)
Oct 31, 13:54:51 Info
IKE @(#)This product linked OpenSSL 0.9.7l 28
Sep 2006 (http://www.openssl.org/)
Oct 31, 13:54:51 Info
IKE Reading configuration from "/Library
/Application Support/Lobotomo Software/IPSecuritas/racoon.conf"
Oct 31, 13:54:51 Info
IKE Resize address pool from 0 to 255
Oct 31, 13:54:58 Info
APP Initiated connection JIA
Oct 31, 13:55:05 Info
APP Initiated connection JIA
Oct 31, 13:55:12 Info
APP Initiated connection JIA
Oct 31, 13:55:12 Error IKE inappropriate sadb acquire message passed.
Oct 31, 13:55:17 Error IKE 87.194.169.58 give up to get IPsec-SA due to
time up to wait.
Oct 31, 13:55:19 Info
APP Initiated connection JIA
Oct 31, 13:55:24 Warning APP Connection JIA timed out
Oct 31, 13:55:24 Warning APP Giving up
Oct 31, 13:55:29 Info
APP IPSec stopping
Oct 31, 13:55:30 Info
APP IKE daemon terminated
Oct 31, 13:55:30 Info
APP IPSec stopped
Anyone know what I need to do please? I am sure it will be easy
TIA
Robin Bateman
ipsecuritas -> FGT-60
ipsecuritas -> FGT-60
by zoomin on 2007-10-31 17:04:38 +0100
I am using Ipsecuritas 3.0 build 1693 to connect to a dozen different
FGT-60 in our network.
The FGT-60 are all on the same firmware: Fortigate-60
3.00,build0247,060417
The settings are exactly the same on both ends for ALL connections, save,
of course, the things that must be different(networking bits).
All tunnels are established as far as Ipsecuritas is concerned, however on
just some of the FGT-60s, traffic travels from my Mac to the FGT-60 but
not back again.
In these cases, the FGT-60 shows *many* IPSEC connections being made in
the Monitor screen:
erik_161 123.123.123.123:4500
192.168.33.220
erik_152 123.123.123.123:4500
192.168.33.220
erik_143 123.123.123.123:4500
192.168.33.220
erik_134 123.123.123.123:4500
192.168.33.220
erik_180 123.123.123.123:4500
192.168.33.220
erik_171 123.123.123.123:4500
192.168.33.220
erik_162 123.123.123.123:4500
192.168.33.220
erik_153 123.123.123.123:4500
192.168.33.220
erik_144 123.123.123.123:4500
192.168.33.220
erik_135 123.123.123.123:4500
192.168.33.220
erik_181 123.123.123.123:4500
192.168.33.220
erik_172 123.123.123.123:4500
192.168.33.220
erik_163 123.123.123.123:4500
192.168.33.220
erik_154 123.123.123.123:4500
192.168.33.220
erik_145 123.123.123.123:4500
192.168.33.220
[email protected] 926 192.168.71.*
[email protected] 596 192.168.71.*
[email protected] 291 192.168.71.*
[email protected] 2 192.168.71.*
[email protected] 1552 192.168.71.*
[email protected] 1264 192.168.71.*
[email protected] 958 192.168.71.*
[email protected] 628 192.168.71.*
[email protected] 328 192.168.71.*
[email protected] 35 192.168.71.*
[email protected] 1583 192.168.71.*
[email protected] 1296 192.168.71.*
[email protected] 995 192.168.71.*
[email protected] 692 192.168.71.*
[email protected] 366 192.168.71.*
Any direction appreciated.
NOTE: The few tunnels that will now not pass traffic in both directions used
to work, and there have been no changes to configuration of either
endpoint.
The ipsecuritas logs have a few errors in them in regards to the failing
tunnels:
Error IKE inappropriate sadb acquire message passed.
Error IKE phase2 negotiation failed due to time up waiting for phase1. ESP
123.123.123.123[4500]->192.168.33.220[4500]
issue with leopard?
issue with leopard?
by spectre on 2007-10-31 18:12:53 +0100
So I got Leopard on my Macbook and had version 2.2 of IpSecuritas and for
some reason when I connected to my Netscreen VPN it would connect fine
but I wouldn't have any access to the remote network. Upgraded
IPSecuritas to 3.1 and imported the old connection and it worked without a
hitch. Just thought I would post this incase people were having issues with
the old version.
What does "inappropriate sadb acquire message" ?
What does "inappropriate sadb acquire message" ?
by palouis on 2007-11-02 07:14:38 +0100
can someone at least tell me what this cryptic response means?
I have spent days trying to get IPsecuritas working with my NetGear DG834
Put me out of my misery please.
paul
Re: What does "inappropriate sadb acquire message"
by robinb on 2007-11-08 21:31:27 +0100
I too have posted about this but had no reply but just to let you know you
are not alone in having the problem
Re: What does "inappropriate sadb acquire message"
by palouis on 2007-11-09 04:37:55 +0100
Oh well looks like VPN Tracker for me - no support is no good to me.
Thanks anyway.
Re: What does "inappropriate sadb acquire message"
by Forum Admin on 2007-11-09 11:58:21 +0100
Hello,
the sadb message is sent by the kernel to the IKE daemon racoon, whenever
a new tunnel needs to be established or when an established tunnel is
about to expire. Some of these messages are not used and therefore
ignored by racoon, leading to this log entry.
I will remove or rename this log entry, since it seems to cause confusion.
Cheers,
Christoph
Connection becomes available - NETSCREEN 5GT
Connection becomes available - NETSCREEN 5GT
by houser on 2007-11-05 13:16:54 +0100
Dear all,
Using IP Securitas 3.1 under OSX 10.5.
Works fine...but the connection becomes unavailable after a while...
I am connecting to a Juniper, NETSCREEN 5GT
and after a while, I can not connect.
Restart fixes it every time..
Any idea of where to tweak a setting?
best
Janne A.
Re: Connection becomes available - NETSCREEN 5GT
by Forum Admin on 2007-11-05 14:15:42 +0100
Hello Janne,
by restart you mean restarting IPSec or rebooting the computer?
Christoph
Re: Connection becomes available - NETSCREEN 5GT
by houser on 2007-11-05 14:16:47 +0100
Thanx for reply,
Sorry to be unclear, I meant rebooting the computer, as restarting Ip Sec
does not help.
TIA and regards
Janne A.
[quote author=Forum Admin link=1194265014/0#1
date=1194268542]Hello Janne,
by restart you mean restarting IPSec or rebooting the computer?
Christoph[/quote]
Re: Connection becomes available - NETSCREEN 5GT
by Forum Admin on 2007-11-08 09:54:48 +0100
Hello Janne,
could you please check the following? Once the connection becomes
unavailable and a restart of IPSec won't re-establish it, could you run the
command 'sudo ipfw list' and see if there is more than one entry?
Thanks a lot,
Christoph
Re: Connection becomes available - NETSCREEN 5GT
by houser on 2007-11-08 11:40:14 +0100
I get this line when I type that:
"65535 allow ip from any to any"
sorry, not fluent in Unix...
best
Janne A.
[quote author=Forum Admin link=1194265014/0#3
date=1194512088]Hello Janne,
could you please check the following? Once the connection becomes
unavailable and a restart of IPSec won't re-establish it, could you run the
command 'sudo ipfw list' and see if there is more than one entry?
Thanks a lot,
Christoph[/quote]
IPsecuritas 3.1 and Firebox X700
IPsecuritas 3.1 and Firebox X700
by chimera on 2007-11-06 22:07:43 +0100
Hi there,
I'm hardly trying to setup a vpn-connection to a firebox x700. It works
great with VPN-Tracker, so I duplicated the settings from VPN-tracker. I get
the following messages in the logfile:
IPSecuritas 3.1 build 1860, Mon Oct 15 22:03:05 CEST 2007, nadig
Darwin 8.10.1 Darwin Kernel Version 8.10.1: Wed May 23 16:33:00 PDT
2007; root:xnu-792.22.5~1/RELEASE_I386 i386
Nov 06, 22:03:54 Info
APP IPSec authenticating
Nov 06, 22:03:54 Error APP Tunnel creation failed with errno 39
Nov 06, 22:03:54 Error APP Activation of connection test01 failed
Nov 06, 22:03:54 Info
APP IKE daemon started
Nov 06, 22:03:54 Info
APP IPSec started
Nov 06, 22:03:54 Info
IKE Foreground mode.
Nov 06, 22:03:54 Info
IKE @(#)ipsec-tools CVS (http://ipsectools.sourceforge.net)
Nov 06, 22:03:54 Info
IKE @(#)This product linked OpenSSL 0.9.7l 28
Sep 2006 (http://www.openssl.org/)
Nov 06, 22:03:54 Info
IKE Reading configuration from "/Library
/Application Support/Lobotomo Software/IPSecuritas/racoon.conf"
Nov 06, 22:03:54 Info
IKE Resize address pool from 0 to 255
Nov 06, 22:03:59 Info
APP IPSec stopping
Nov 06, 22:04:00 Info
APP IKE daemon terminated
Nov 06, 22:04:00 Info
APP IPSec stopped
I did not follow the configuration instructions on lobotomo's website,
because it took a long time to get the tunnel work with vpn-tracker and I
don't see a reason, why the settings shouldn't work with IPsecuritas.
Can anybody help?
Thanks!
Need Help Dubugging Connection with Cisco PIX 501
Need Help Dubugging Connection with Cisco PIX 501
by yodarunamok on 2007-11-07 16:52:54 +0100
Hello All,
I'm working on setting up a connection to a Cisco PIX 501, and though I've
looked at the log, I'm not sure what it's telling me. Basically, I try to
connect, but the attempt eventually times out. When I look at the log, I see
apparently the same process repeated over and over...
[code]
Nov 05, 09:41:02 Info
IKE initiate new phase 1 negotiation:
192.168.2.8[500]<=>71.216.36.206[500]
Nov 05, 09:41:02 Info
IKE begin Identity Protection mode.
Nov 05, 09:41:02 Debug IKE new cookie:
Nov 05, 09:41:02 Debug IKE 444600aba4c7d84b
Nov 05, 09:41:02 Debug IKE add payload of len 52, next type 13
Nov 05, 09:41:02 Debug IKE add payload of len 16, next type 13
Nov 05, 09:41:02 Debug IKE add payload of len 16, next type 13
Nov 05, 09:41:02 Debug IKE add payload of len 16, next type 13
Nov 05, 09:41:02 Debug IKE add payload of len 16, next type 13
Nov 05, 09:41:02 Debug IKE add payload of len 16, next type 13
Nov 05, 09:41:02 Debug IKE add payload of len 16, next type 13
Nov 05, 09:41:02 Debug IKE add payload of len 16, next type 13
Nov 05, 09:41:02 Debug IKE add payload of len 16, next type 13
Nov 05, 09:41:02 Debug IKE add payload of len 16, next type 13
Nov 05, 09:41:02 Debug IKE add payload of len 16, next type 13
Nov 05, 09:41:02 Debug IKE add payload of len 16, next type 13
Nov 05, 09:41:02 Debug IKE add payload of len 20, next type 13
Nov 05, 09:41:02 Debug IKE add payload of len 16, next type 0
Nov 05, 09:41:02 Debug IKE 348 bytes from 192.168.2.8[500] to
71.216.36.206[500]
Nov 05, 09:41:02 Debug IKE sockname 192.168.2.8[500]
Nov 05, 09:41:02 Debug IKE send packet from 192.168.2.8[500]
Nov 05, 09:41:02 Debug IKE send packet to 71.216.36.206[500]
Nov 05, 09:41:02 Debug IKE 1 times of 348 bytes message will be sent
to 71.216.36.206[500]
Nov 05, 09:41:02 Debug IKE 444600ab a4c7d84b 00000000 00000000
01100200 00000000 0000015c 0d000038
Nov 05, 09:41:02 Debug IKE 00000001 00000001 0000002c 01010001
00000024 01010000 800b0001 000c0004
Nov 05, 09:41:02 Debug IKE 00015180 80010005 80030001 80020002
80040001 0d000014 4a131c81 07035845
Nov 05, 09:41:02 Debug IKE 5c5728f2 0e95452f 0d000014 8f8d8382
6d246b6f c7a8a6a4 28c11de8 0d000014
Nov 05, 09:41:02 Debug IKE 439b59f8 ba676c4c 7737ae22 eab8f582
0d000014 4d1e0e13 6deafa34 c4f3ea9f
Nov 05, 09:41:02 Debug IKE 02ec7285 0d000014 80d0bb3d ef54565e
e84645d4 c85ce3ee 0d000014 9909b64e
Nov 05, 09:41:02 Debug IKE ed937c65 73de52ac e952fa6b 0d000014
7d9419a6 5310ca6f 2c179d92 15529d56
Nov 05, 09:41:02 Debug IKE 0d000014 cd604643 35df21f8 7cfdb2fc
68b6a448 0d000014 90cb8091 3ebb696e
Nov 05, 09:41:02 Debug IKE 086381b5 ec427b1f 0d000014 16f6ca16
e4a4066d 83821a0f 0aeaa862 0d000014
Nov 05, 09:41:02 Debug IKE 4485152d 18b6bbcd 0be8a846 9579ddcc
0d000018 4048b7d5 6ebce885 25e7de7f
Nov 05, 09:41:02 Debug IKE 00d6c2d3 80000000 00000014 afcad713
68a1f1c9 6b8696fc 77570100
Nov 05, 09:41:02 Debug IKE resend phase1 packet
444600aba4c7d84b:0000000000000000
Nov 05, 09:41:09 Info
APP Initiated connection Nifty West
Nov 05, 09:41:09 Debug IKE get pfkey ACQUIRE message
Nov 05, 09:41:09 Debug IKE 02060003 14000000 45000000 73410000
03000500 ff200000 10020000 c0a80208
Problems With Securitas and VPN-1 Edge X ADSL
Problems With Securitas and VPN-1 Edge X ADSL
by yakuzah on 2007-11-07 21:03:25 +0100
I have just discovered this software on Macupdate and am testing it at the
moment. If it works for me I would be happy to donate via Paypal, but I am
experiencing some weird problems, and was wondering if anyone could
help?
I am using a Checkpoint VPN-1 Edge X (Safe@office) device on a UK ADSL
Broadband service and have enabled VPN on the router to allow remote
access to my home network.
I initially tried the "Checkpoint VPN-1" Profile using the supplied wizard,
but could never get past Phase One authentication. So I thought I would try
Safe@Office, and to my surprise I got a green light in the IPSecuritas Status
window.
The problem is even though I can connect, I can not ping anything through
the established tunnel?
If I use a windoze machine using Checkpoint Secure Client I get connected
fine and can ping through the tunnel to devices on the other side, but I can
not ping when using the tunnel and IPSecuritas.
Can anyone possibly advise or help? If I type netstat -rn on the command
line, the right IP addresses appear to be there, just can't get connected.
I am running Leopard 10.5
Thanks
G ;)
Re: Problems With Securitas and VPN-1 Edge X ADSL
by yakuzah on 2007-11-12 16:58:57 +0100
Well no one has replied no I guess this software does not work for me?
I am looking at the routes on the Mac when a VPN is established with
Securitas and then comparing them with Checkpoint under windows, and
the allocated IP address and default gateway that Securitas thinks is correct
is all Wrong!!
I can not seem to correct the route entries either, so I am stuck with a
workin tunnel with no IP connectivity...
Oh well guess I will have to wait for Xmas 2020 for Checkpoint to release
their client... :(
Openswan Connection fails
Openswan Connection fails
by gerritche on 2007-11-08 11:58:25 +0100
Hello, there,
I'm trying unsuccessfully to connect with Version 3.x to a FreeSWAN/
openSWAN Gateway. Version 2.1 works beautifully and importing the details
into 3.x succeeds but connection fails. IPSecuritas claims a collision of local
host and remote network addresses and refuses to start a connection. The
firewall admin doesn't find any connection attempts in his logs.
In "Firewalladdress" I enter the address of the IPSec Gateway.
In "Local IP for Host" I enter the address I got from the administrator of the
VPN Gateway.
In "Remote Network" I set 10.0.0.0/8.
IPSecuritas seems to be unhappy with these settings though they work fine
in the older version.
Any ideas?
Best regards :)
Gerrit
Re: Openswan Connection fails
by Forum Admin on 2007-11-08 13:01:52 +0100
Hello Gerrit,
enabling the option 'Local IP in remote network' should resolve this issue.
Hope this helps,
Christoph
Tunnelling from DrayTek Vigor to Sonicwall Pro
Tunnelling from DrayTek Vigor to Sonicwall Pro
by DerekF on 2007-11-09 19:12:48 +0100
Hi,
I've got IPSecuritas set up on my MacBook to connect to one of my clients'
VPNs, which is hosted on a Sonicwall Pro 2040. I generally have no
problems accessing the 2040. However, I often encounter intermittent
problems when my MacBook is behind a DrayTek Vigor 2910 router. What
seems to happen is the VPN tunnel, for some reason, cannot be
re-established at some point, then I have to actually stop the VPN in
IPSecuritas, wait at least 15 minutes, then try connecting again. Sometimes
it works, sometimes it doesn't. Rebooting the DrayTek seems to do the
trick, but this is obviously not an ideal solution since that affects everyone
in our office. We are running the latest DrayTek firmware for this model
(3.1.0.1).
I realize this sounds like an issue with the DrayTek router, but has anyone
else encountered this problem before? I haven't found any configuration
options in the DrayTek web interface that might be causing these
problems...
Thanks in advance!
Re: Tunnelling from DrayTek Vigor to Sonicwall Pro
by DerekF on 2007-11-09 23:44:23 +0100
I was able to reproduce this condition just now. Here is a snippet of the
debug log if it helps:
Nov 09, 17:36:17 Info
IKE initiate new phase 1 negotiation:
192.168.1.112[500]<=>xxx.xxx.xxx.xxx[500]
Nov 09, 17:36:17 Info
IKE begin Aggressive mode.
Nov 09, 17:36:17 Debug IKE new cookie:
Nov 09, 17:36:17 Debug IKE 33b733c8f62a4ebe
Nov 09, 17:36:17 Debug IKE use ID type of IPv4_address
Nov 09, 17:36:17 Debug IKE compute DH's private.
Nov 09, 17:36:17 Debug IKE 4b4e15df b841bd78 d8b4ea02 f8612e55
906bafe6 3e56b3ba afcb2090 f2a5db7d
Nov 09, 17:36:17 Debug IKE ac6a2312 bde6c528 9ca12ee2 b3a29284
6f16b16d 165807f2 c7daee43 ad5ff4d5
Nov 09, 17:36:17 Debug IKE 7d52a343 df805b3b 733de06a f4352bef
0e7c71a0 2d8fdfa2 f02ae55a 97ecb912
Nov 09, 17:36:17 Debug IKE 748c3244 fba8af07 b8092555 5f355a16
5f64d545 efc078eb ff50e35a d5498311
Nov 09, 17:36:17 Debug IKE compute DH's public.
Nov 09, 17:36:17 Debug IKE 2ddd8cc6 8a74e8bd 706967d9 190e8b8b
2304340f a60bfc7f 13921143 d3b2cc0b
Nov 09, 17:36:17 Debug IKE 5c8c298c c8a3de89 75808fc7 2a334099
26d3bbbb 5916caf0 db95c838 4be219b8
Nov 09, 17:36:17 Debug IKE 9abc94c1 1cd42aee 19394d40 f7cd1fa3
ec374bb3 0cb35396 8e5838b0 455c4d2c
Nov 09, 17:36:17 Debug IKE de2068b0 b1907a53 c4e3db8f c7811f77
ba7801a5 0490bb63 965a7a1c 0ff974f6
Nov 09, 17:36:17 Debug IKE authmethod is pre-shared key
Nov 09, 17:36:17 Debug IKE add payload of len 48, next type 4
Nov 09, 17:36:17 Debug IKE add payload of len 128, next type 10
Nov 09, 17:36:17 Debug IKE add payload of len 16, next type 5
Nov 09, 17:36:17 Debug IKE add payload of len 8, next type 13
Nov 09, 17:36:17 Debug IKE add payload of len 16, next type 0
Nov 09, 17:36:17 Debug IKE 264 bytes from 192.168.1.112[500] to
xxx.xxx.xxx.xxx[500]
Nov 09, 17:36:17 Debug IKE sockname 192.168.1.112[500]
Nov 09, 17:36:17 Debug IKE send packet from 192.168.1.112[500]
Nov 09, 17:36:17 Debug IKE send packet to xxx.xxx.xxx.xxx[500]
Nov 09, 17:36:17 Debug IKE 1 times of 264 bytes message will be sent
to xxx.xxx.xxx.xxx[500]
Nov 09, 17:36:17 Debug IKE 33b733c8 f62a4ebe 00000000 00000000
01100400 00000000 00000108 04000034
Nov 09, 17:36:17 Debug IKE 00000001 00000001 00000028 01010001
00000020 01010000 800b0001 800c7080
Nov 09, 17:36:17 Debug IKE 80010005 80030001 80020002 80040002
0a000084 2ddd8cc6 8a74e8bd 706967d9
Nov 09, 17:36:17 Debug IKE 190e8b8b 2304340f a60bfc7f 13921143
d3b2cc0b 5c8c298c c8a3de89 75808fc7
Nov 09, 17:36:17 Debug IKE 2a334099 26d3bbbb 5916caf0 db95c838
4be219b8 9abc94c1 1cd42aee 19394d40
Nov 09, 17:36:17 Debug IKE f7cd1fa3 ec374bb3 0cb35396 8e5838b0
455c4d2c de2068b0 b1907a53 c4e3db8f
Nov 09, 17:36:17 Debug IKE c7811f77 ba7801a5 0490bb63 965a7a1c
0ff974f6 05000014 ec6a0571 16d9677d
Nov 09, 17:36:17 Debug IKE f1e0ee58 300bb493 0d00000c 011101f4
c0a80170 00000014 afcad713 68a1f1c9
Nov 09, 17:36:17 Debug IKE 6b8696fc 77570100
Nov 09, 17:36:17 Debug IKE resend phase1 packet
33b733c8f62a4ebe:0000000000000000
...
Nov 09, 17:36:31 Info
APP Initiated connection HTC
Re: Tunnelling from DrayTek Vigor to Sonicwall Pro
by DerekF on 2007-11-15 16:59:34 +0100
FWIW, ever since I assigned a static (internal) IP address for my MacBook to
the DrayTek router a couple of days ago, I've not seen a recurrence of this
problem. *crosses fingers*
If this is the solution, then I hope it helps someone out!
Re: Tunnelling from DrayTek Vigor to Sonicwall Pro
by DerekF on 2007-11-19 16:21:00 +0100
Just a followup: I thought this "solution" was working, but it is no longer. :'(
Nobody can offer any clues?
Re: Tunnelling from DrayTek Vigor to Sonicwall Pro
by DerekF on 2007-11-23 09:03:36 +0100
Well, in case this helps anyone, downgrading the firmware from 3.1.2 to
3.0.7 appears to have at least temporarily solved my VPN issues. In fact,
since upgrading to the 3.1.2 version that was released a couple of days
ago, I had been completely unable to use my VPN. IPSecuritas would show
a green light as if everything was okay, but no traffic was going through the
VPN. However, in the last few hours since I've downgraded the firmware, all
seems okay so far...
Re: Tunnelling from DrayTek Vigor to Sonicwall Pro
by racoon on 2007-11-23 10:57:02 +0100
Where can you download the archived version from?
Re: Tunnelling from DrayTek Vigor to Sonicwall Pro
by DerekF on 2007-11-23 18:31:04 +0100
[quote author=racoon link=1194631968/0#5 date=1195811822]Where
can you download the archived version from? [/quote]
Click the "more edition" link in the bottom left corner of the "Firmware of
Vigor 2910..." box [url]http://www.draytek.com/support/download
/Vigor2910.php#Firmware[/url]. It'll take you to their FTP site where they
store previous versions of the firmware.
Re: Tunnelling from DrayTek Vigor to Sonicwall Pro
by wailaki on 2007-11-27 21:21:50 +0100
Derek, I work for SonicWALL and we have a customer needing expert help
with ipsecuritas connecting to a similar SonicWALL Pro Model. What version
of SonicOS are you running (version # and Standard vs. Enhanced)?
Thanks in advance.
Re: Tunnelling from DrayTek Vigor to Sonicwall Pro
by DerekF on 2007-11-28 17:54:38 +0100
[quote author=wailaki link=1194631968/0#7 date=1196194910]Derek, I
work for SonicWALL and we have a customer needing expert help with
ipsecuritas connecting to a similar SonicWALL Pro Model. What version of
SonicOS are you running (version # and Standard vs. Enhanced)?
Thanks in advance.[/quote]
Hi,
We are running SonicOS Enhanced 3.2.3.0-6e.
FYI, since downgrading our Draytek's firmware as previously mentioned, I
have had no further connection issues to our Sonicwall.
FYI #2: I never had any issues connecting to our Sonicwall through my
Linksys router at home.
Re: Tunnelling from DrayTek Vigor to Sonicwall Pro
by wailaki on 2007-11-28 18:19:29 +0100
Thanks Derek. I'll search upthread, but I believe you had this working with
NAT-Traversal enabled on the ipsecuritas side?
Re: Tunnelling from DrayTek Vigor to Sonicwall Pro
by DerekF on 2007-11-28 18:30:57 +0100
[quote author=wailaki link=1194631968/0#9 date=1196270369]Thanks
Derek. I'll search upthread, but I believe you had this working with
NAT-Traversal enabled on the ipsecuritas side?[/quote]
NAT-Traversal never made a difference either way. When it was working
(including now), it was working with or without NAT-T enabled. When it
wasn't working, enabling NAT-T didn't make a difference..
Re: Tunnelling from DrayTek Vigor to Sonicwall Pro
by wailaki on 2007-11-28 18:41:35 +0100
Thanks Derek. PM me with your account on www.mysonicwall.com and I'll
give you a gift for your efforts.
Not connecting in Leopard
Not connecting in Leopard
by syber on 2007-11-12 02:51:47 +0100
I did a clean install of Leopard and used Export/ Import to copy my
configuration from Tiger and now it seems that Ipsecuritas no longer
connects to my VPN. It says that the connection times out. However, it
seems to timeout long before the set timeout ( in seconds ). Phase 1 is
supposed to timeout in 360 seconds.
Log
IPSecuritas 3.1 build 1860, Mon Oct 15 22:03:05 CEST 2007, nadig
Darwin 8.10.1 Darwin Kernel Version 8.10.1: Wed May 23 16:33:00 PDT
2007; root:xnu-792.22.5~1/RELEASE_I386 i386
Nov 11, 20:48:38 Info
APP Smart Environment Detection enabled
Nov 11, 20:48:39 Info
APP IKE daemon started
Nov 11, 20:48:39 Info
APP IPSec starting
Nov 11, 20:48:39 Info
APP Smart Environment Detection: Start
Nov 11, 20:48:39 Error IKE Foreground mode.
Nov 11, 20:48:39 Info
IKE @(#)ipsec-tools CVS (http://ipsectools.sourceforge.net)
Nov 11, 20:48:39 Info
IKE @(#)This product linked OpenSSL 0.9.7l 28
Sep 2006 (http://www.openssl.org/)
Nov 11, 20:48:39 Info
IKE Reading configuration from "/Library
/Application Support/Lobotomo Software/IPSecuritas/racoon.conf"
Nov 11, 20:48:39 Info
IKE Resize address pool from 0 to 255
Nov 11, 20:48:39 Info
APP Initiated connection Office
Nov 11, 20:48:39 Error IKE inappropriate sadb acquire message passed.
Nov 11, 20:48:46 Info
APP Initiated connection Office
Nov 11, 20:48:53 Info
APP Initiated connection Office
Nov 11, 20:49:00 Info
APP Initiated connection Office
Nov 11, 20:49:00 Error IKE inappropriate sadb acquire message passed.
Nov 11, 20:49:07 Info
APP Initiated connection Office
Nov 11, 20:49:09 Error IKE phase1 negotiation failed due to time up.
7ce6c32f663c8b06:0000000000000000
Nov 11, 20:49:10 Error IKE phase2 negotiation failed due to time up
waiting for phase1. ESP ***********[500]->192.168.1.175[500]
Nov 11, 20:49:14 Info
APP Initiated connection Office
Nov 11, 20:49:17 Error IKE phase2 negotiation failed due to time up
waiting for phase1. ESP ***********[500]->192.168.1.175[500]
Nov 11, 20:49:21 Info
APP Initiated connection Office
Nov 11, 20:49:21 Error IKE inappropriate sadb acquire message passed.
Nov 11, 20:49:24 Error IKE phase2 negotiation failed due to time up
waiting for phase1. ESP ***********[500]->192.168.1.175[500]
Nov 11, 20:49:28 Info
APP Initiated connection Office
Nov 11, 20:49:31 Error IKE phase2 negotiation failed due to time up
waiting for phase1. ESP ***********[500]->192.168.1.175[500]
Nov 11, 20:49:35 Info
APP Initiated connection Office
Nov 11, 20:49:38 Error IKE phase2 negotiation failed due to time up
waiting for phase1. ESP ***********[500]->192.168.1.175[500]
Nov 11, 20:49:42 Warning APP Connection Office timed out
Nov 11, 20:49:42 Warning APP Giving up
Nov 11, 20:49:45 Error IKE phase2 negotiation failed due to time up
waiting for phase1. ESP ***********[500]->192.168.1.175[500]
Nov 11, 20:49:52 Error IKE phase2 negotiation failed due to time up
waiting for phase1. ESP ***********[500]->192.168.1.175[500]
Nov 11, 20:49:59 Error IKE phase2 negotiation failed due to time up
waiting for phase1. ESP ***********[500]->192.168.1.175[500]
Nov 11, 20:50:06 Error IKE phase2 negotiation failed due to time up
waiting for phase1. ESP ***********[500]->192.168.1.175[500]
Re: Not connecting in Leopard
by syber on 2007-11-12 18:56:13 +0100
I've confirmed that this issue only exists when connecting via WLAN.
Connecting via WLAN on my macbook works fine but not on my macbook
pro.
Re: Not connecting in Leopard
by planetzeos on 2007-12-12 18:10:52 +0100
We've duplicated the same issue.
Same cert on tiger and leopard.
Same configuration on fresh installs of tiger and leopard.
Tiger connects using wifi
Leopard does not connect using wifi -- it times out on phase1 from the log
Checkpoint VPN-1 with Certificates on macbook pro's
Re: Not connecting in Leopard
by cottard on 2008-01-31 15:35:07 +0100
I've also run across this issue: Leopard and Wifi. Currently forced to run
Windows XP in Parallels and connect with Checkpoint SecureClient - as I
share a connection with my neighbours via Wifi. I'm really looking forward
to using IPSecuritas (free, vendor-agnostic) to connect to my work VPN!
Re: Not connecting in Leopard
by jrsharp on 2008-08-08 18:25:51 +0200
Can anyone comment on the current status of this issue?
XAuth + RSA mutual authentication
XAuth + RSA mutual authentication
by Daniel on 2007-11-14 21:57:30 +0100
Hey guys,
I'm trying to set-up IPSecuritas 3.1 to connect to our corporate Netscreen
SSG140 firewall. Mutual authentication with RSA certificates works like a
charm. However, when I try to add XAuth I run into an issue. It seems like
IPSecuritas doesn't support XAuth with RSA mutual authentication?
Unfortunately, hybrid mode is not supported by Netscreen, and I really like
the thought of using certificates (we already have our own company-wide
PKI).
On the ID page I've got the following selected:
- Local ID: certificate
- Remote ID: certificate
- Authentication method: XAuth RSA
The GUI seems to accept this selection, even though I'm unable to select my
local and peer certificate. The debug log shows:
IPSecuritas 3.1 build 1860, Mon Oct 15 22:03:05 CEST 2007, nadig
Darwin 8.10.1 Darwin Kernel Version 8.10.1: Wed May 23 16:33:00 PDT
2007; root:xnu-792.22.5~1/RELEASE_I386 i386
Nov 14, 21:54:59 Debug APP State change from IDLE to
AUTHENTICATING after event START
Nov 14, 21:54:59 Info
APP IPSec authenticating
Nov 14, 21:54:59 Info
APP IKE daemon started
Nov 14, 21:54:59 Debug APP State change from AUTHENTICATING to
RUNNING after event TIMER
Nov 14, 21:54:59 Info
APP IPSec started
Nov 14, 21:54:59 Debug APP Received SADB message type
X_SPDUPDATE - not interesting
Nov 14, 21:54:59 Debug APP Received SADB message type
X_SPDUPDATE - not interesting
Nov 14, 21:54:59 Info
IKE Foreground mode.
Nov 14, 21:55:00 Info
IKE @(#)ipsec-tools CVS (http://ipsectools.sourceforge.net)
Nov 14, 21:55:00 Info
IKE @(#)This product linked OpenSSL 0.9.7l 28
Sep 2006 (http://www.openssl.org/)
Nov 14, 21:55:00 Info
IKE Reading configuration from "/Library
/Application Support/Lobotomo Software/IPSecuritas/racoon.conf"
Nov 14, 21:55:00 Info
IKE Resize address pool from 0 to 255
Nov 14, 21:55:00 Error IKE /Library/Application Support/Lobotomo
Software/IPSecuritas/racoon.conf:55: "}" ASN1 ID not specified and no CERT
defined!
Nov 14, 21:55:00 Error IKE
Nov 14, 21:55:00 Error IKE fatal parse failure (1 errors)
Nov 14, 21:55:00 Error IKE racoon: failed to parse configuration file.
Nov 14, 21:55:00 Info
APP IKE daemon terminated
Nov 14, 21:55:00 Debug APP State change from RUNNING to IDLE after
event RECONFIGURE
Nov 14, 21:55:00 Info
APP IPSec terminated
Nov 14, 21:55:00 Debug APP Received SADB message type X_SPDDELETE
- not interesting
Nov 14, 21:55:00 Debug APP Received SADB message type X_SPDDELETE
- not interesting
Nov 14, 21:55:00 Debug APP Received SADB message type X_SPDFLUSH
- not interesting
Nov 14, 21:55:00 Debug APP Received SADB message type FLUSH
Nov 14, 21:55:00 Debug APP SA change detected
Re: XAuth + RSA mutual authentication
by Daniel on 2007-11-15 22:19:06 +0100
I did some more diggin' on this and it seems the generated config is indeed
for XAuth + RSA hybrid authentication:
Part of the /Library/Application Support/Lobotomo Software/IPSecuritas
/racoon.conf file:
# Connection "test"
remote X.X.X.X
{
verify_cert on;
verify_identifier on;
initial_contact on;
passive off;
support_proxy off;
generate_policy off;
verify_cert on;
send_cert on;
send_cr on;
mode_cfg off;
ike_frag off;
doi ipsec_doi;
situation identity_only;
nat_traversal on;
exchange_mode main;
proposal_check obey;
nonce_size 16;
my_identifier asn1dn;
peers_identifier asn1dn;
xauth_login "daniel";
proposal
{
lifetime time 28800 seconds;
encryption_algorithm aes 128;
hash_algorithm sha1;
authentication_method hybrid_rsa_client; <=== the GUI needs to
change this to xauth_rsa_client
dh_group modp1024;
}
}
It does seem that the version of racoon IPSecuritas uses already supports
XAuth + RSA mutual authentication:
bash-3.2# strings /Applications/IPSecuritas.app/Contents/Resources
/racoon | grep xauth_rsa
xauth_rsa_server
xauth_rsa_client
Sooo, any chance you guys can add this option to the GUI ? Shoudn't be too
hard to add, no? :)
Thanks.
Re: XAuth + RSA mutual authentication
by Daniel on 2007-11-15 22:20:01 +0100
And of course the GUI needs to add the "certificate_type" parameter to the
above config :)
Re: XAuth + RSA mutual authentication
by Forum Admin on 2007-11-16 10:35:50 +0100
Hi Daniel,
thank you very much for your investigation. I will have a look at racoon and
what's possible
Cheers,
Christoph
Re: XAuth + RSA mutual authentication
by Forum Admin on 2007-11-16 21:20:22 +0100
Hello Daniel,
done - do you want to test it?
Cheers,
Christoph
Re: XAuth + RSA mutual authentication
by Daniel on 2007-11-19 22:23:06 +0100
Hell yeah! If you drop me an email where I can download it, I'd be more
than happy to give it a shot! :)
Re: XAuth + RSA mutual authentication
by markguz on 2007-11-26 11:48:41 +0100
Hi there, we're also using Xauth-rsa with netscreen isg2000s. I wonder if it
would be possible to have access to this test verison you mention here to
test against our setup as we are very keen to start using this software.
Kind regards
Mark Guz
RIPE NCC
http://www.ripe.net
Re: XAuth + RSA mutual authentication
by Forum Admin on 2007-11-26 22:54:28 +0100
Hello,
a preview version of 3.1.1 is available from [url]http://www.lobotomo.com
/products/downloads/IPSecuritas311p1.dmg[/url].
Please report and problems (and successes too, please) to
[email protected]
Cheers,
Christoph
Re: XAuth + RSA mutual authentication
by markguz on 2007-11-29 14:36:29 +0100
Hi there,
This preview version is a step closer to working with our setup. However
closer inspection of our VPN Tracker configuration shows that we are using
Certificates + XAuth. At present there doesn't seem to be an option for this
within ipsecuritas, or the racoon version underneath it. Is this a hard
change or an easy change to implement?
Thanks for your support so far guys
Cheers
Mark Guz
RIPE NCC
http://www.ripe.net
FVS318 setup
FVS318 setup
by kamikaze2112 on 2007-11-20 16:42:53 +0100
I purchased an FVS318 V1 (running the 2.4 firmware) to use on my home
network so I can securely access my files and use VNC, but I can't seem to
get it working with IPSecuritas. This is way more complicated than I was
expecting. Here's all the info that I think is relevant:
I'm using DSL with a dynamic IP, however I am using a DDNS service and it's
setup and working properly. DDNS hostname is kiddt.homeip.net. My LAN
is 10.1.35.0. The computer that I will be using to connect to the VPN is
behind a NAT router and all the VPN protocols are allowed for pass-thru.
I'm not sure what other info is necessary, but whatever is needed to get this
working I'll try my best to provide.
Thanks in advance.
Re: FVS318 setup
by bstender on 2007-11-29 01:46:57 +0100
wish i had an answer for you, bc it would be because i had successfully
solved the identical problem. well, same box and same software, after that
it is a very large set of variables.
waaaaaay too complicated for 2007 it seems to me. last time i faced this (2
yrs ago) i ended up buying vpntracker and i was up and running in no time.
i would do that now but the vpntracker isnt ready for leopard yet so i'm
trying again to make it work. sigh. i used to enjoy these challenges, but i'm
getting too old to watch my life drain away for this!
but it is really cool that this product exists and gives me a fighting chance.
an amazing amount of effort and a nice looking piece of software. is this
thing all volunteer?
-newbie bill
MODE_CFG not working?
MODE_CFG not working?
by gswallow on 2007-11-20 17:49:56 +0100
Hi,
I just got started with IPSecuritas today, in response to my Checkpoint not
working in Leopard. Everything seems to go peachy with IPSecuritas, save
for "Office Mode"/MODE_CFG. My Checkpoint Firewall reports that I've
authenticated using my certificate (!! -- nice job!), then reports that I've
gone successfully through IKE quick mode, and hands off SA's.
According to my firewall, I'm in. However, I try to initiate TCP connections
and I see rejects with source = IP address of my laptop (not Office mode
address). Also, the connection beacon for my connection goes green, but
the logs window reports that Phase 2 failed due to a Phase 1 timeout.
I've tried this using DHCP for my wireless setup, and using a static IP
address as I've seen some people suggest. I also looked at the files in
/Library/Application Support/Lobotomo... but they appear to be volatile,
disappearing when I start / stop IPSec connections. Any ideas? I'd be more
than willing to test / report issues.
Re: MODE_CFG not working?
by Daniel on 2007-11-20 19:01:45 +0100
once connected, open up Terminal and type 'ifconfig gif0'. This should be
your 'virtual' tunnel interface with the IP address you received through
mode_cfg.
Re: MODE_CFG not working?
by gswallow on 2007-11-20 22:48:33 +0100
dhcp-88:~ gswallow$ ifconfig gif0
gif0: flags=8010<POINTOPOINT,MULTICAST> mtu 1280
That's it. I get plenty of these with TCPdump:
16:49:01.013330 IP 172.16.42.88 > vpn.xxx.com:
ESP(spi=0x734cd09f,seq=0x41), length 124
16:49:01.128750 IP 172.16.42.88 > vpn.xxx.com:
ESP(spi=0x734cd09f,seq=0x42), length 124
I also get plenty of rejects on my firewall from connection attempts from
my original address. The tunnel's coming up, but gif0 isn't being assigned
an IP address?
Re: MODE_CFG not working?
by racoon on 2007-11-22 10:11:48 +0100
Has any one resolved this issue as im getting the same problems.
No ip being assiged to the adapter!!. gif0
Re: MODE_CFG not working?
by phila on 2007-11-24 23:05:57 +0100
same problem here. 10.5.1 and a checkpoint firewall on the other side.
Re: MODE_CFG not working?
by gswallow on 2007-11-26 15:49:12 +0100
Hey again,
I'm on the verge of downgrading OS X back to 10.4.x since I can't do critical
things out of the office, like manage my servers. Any chance someone is
looking at this issue, first?
Thanks.
Re: MODE_CFG not working?
by Forum Admin on 2007-11-26 17:20:56 +0100
Hello,
could you please send me an IPSecuritas log with lo level set t Debug to
[email protected]? It seems that MODE_CFG is never run or fails.
Cheers,
Christoph
Repair Permissions deleted config?
Repair Permissions deleted config?
by starlir on 2007-11-21 07:55:41 +0100
Been using V3 for a number of months and recently upgraded to Leopard
with no problems. Yesterday decided to do a Repair Permissions for first
time, afterwards my IPSecuritas config had completely disappeared,
including my certificate in certificate manager. I was able to reimport the
config from V2.x. I cannot be certain that Repair Permissions has caused
this problem but the co-incidence is suspicious and I don't see what else
could have deleted the config.
D-Link DFL-1600
D-Link DFL-1600
by Gunverth on 2007-11-29 12:08:45 +0100
Hi all!
I've been trying IPSecuritas on a DFL-1600 for a couple of days now. No
success!
VPN Tracker works fine with the included DFL-800 preset.
Anybody out there with fresh ideas what to try next in the IPSecuritas
config?
XAUTH is mandatory. Unfortunately I'm not in the position to manage the
firewall itself. Just using it.
Openswan with transport mode
Openswan with transport mode
by rmoore on 2007-12-01 00:21:16 +0100
I am connecting to a Linux server running Openswan in transport mode.
Upgrading the client from Tiger to Leopard broke that connection, which
led me to try IPSecuritas. At first, this didn't work either; I would always get
the red status indicator for the connection, even though I set it for a
transport connection and matched settings, parameter for parameter, with
the host computer.
I found that switching the connection from a host-to-host transport
connection, to a host-to-anywhere connection, caused the status indicator
to go yellow, indicating partial progress towards a connection, but still no
dice. I noticed that the psk.txt file generated by IPSecuritas was empty, even
though I specified a preshared key.
Finally, after playing with every other option, I switched back to a
host-to-host connection. Strangely, the check box to select a transport
mode connection was gone. However, equally strangely, the connection was
working! So now I'm happy, but does anybody know what happened there?
One other comment. When I boot up and log in, the IPSecuritas button is in
the menu bar, but I have to manually start the connection. Is there any way
to make it start automatically?
Re: Openswan with transport mode
by rmoore on 2007-12-10 17:59:16 +0100
I should report that the problem of not having the connection automatically
established on login seems to have gone away on its own.
However, after getting IPSecuritas working on our Leopard machine, I
decided to try it on our other MacBook, which is still running Tiger. By
setting it up field for field to match the Leopard configuration, I couldn't get
a connection to my Openswan server no matter how many times I tried.
Then I exported the configuration from the Leopard MacBook and imported
it on the Tiger MacBook, and now both are working.
It's troubling that I was only able to get this configuration working on Tiger
by importing from Leopard, and that I was only able to get it working on
Leopard by shear luck. On the plus side, both systems seem to be stable
now.
Next I will try comparing the outputs from "setkey -P -D" resulting from a
manual configuration and from the imported configuration, and if I see any
interesting differences I will post those here.
RV042 - any successful connections?
RV042 - any successful connections?
by [email protected] on 2007-12-04 18:35:57 +0100
Has anyone been able to successfully connect to the Linksys RV042?
I just made the switch to Apple, and was used to the luxury of the Linksys
QuickVPN client.
Does anyone have *detailed* instructions for configuring both sides to
make this work? Firmware 1.3.8.2.
I found a couple of other posts via google, but had no success after
following instructions, including this post - http://www.linksysinfo.org
/forums/showthread.php?t=49879.
I'm probably missing a couple of extra details I should know about, but
don't unfortunately.
Thanks so much for any help Paul
WG Fireware Pro with IPSecuritas and Securid (RSA)
WG Fireware Pro with IPSecuritas and Securid (RSA)
by gorstein on 2007-12-11 12:29:33 +0100
Trying to get this combination to work, but still no success
Here is a doc how to set it up: http://www.lobotomo.com/products
/IPSecuritas/howto/WatchGuard%20Firebox%20HOWTO.pdf
But if I put it up like that I cannot use Xauth (at least no in any way I can
figure out), ok then I try to put it up in "normal way" like the way you set up
a VPN client in this box, and now I got problem with authentication of the
client (see below (IP's are changed))
2007-12-11 10:54:31 iked WARNING: Rejected phase 1 aggressive mode
from 100.5.33.196 to 100.5.33.212 (no matching policy) cookies
i=eab20266 65142077 r=00000000 00000000
2007-12-11 10:54:31 iked Searching ID: user domain - myData [vpn]
peerId [vpn_mu]
2007-12-11 10:54:31 iked Searching ID: user domain - myData [vpn_mu]
peerId [vpn_mu]
2007-12-11 10:54:31 iked ike_match_proxy_id: peer ID type (0) not
supported 5
2007-12-11 10:54:31 iked CreateIsakmpSA : get rasUserGroupId=3
Look at: "peer ID type (0) not supported 5".
And: "The MUVPN on Fireware expects the client software to use Full
qualified Username as the ID of the Client, the remote ID (Firebox) is IP
Address."
So how to tell the Ipsecuritas to use "Full qualified Username as the ID", is it
possible?
any answer welcome best reg /Goran
Problem with Ipsecuritas "Full qualified Username"
Problem with Ipsecuritas "Full qualified Username"
by gorstein on 2007-12-13 08:47:35 +0100
Trying again with another topic :-) guess my old thread were misleading
WG Fireware Pro with IPSecuritas and Securid (RSA)
11. Dec 2007 at 12:29
Trying to get this combination to work, but still
no success
Here is a doc how to set it up: http://www.lobotomo.com/products
/IPSecuritas/howto/WatchGuard%20Firebox%20HOWTO. pdf
But if I put it up like that I cannot use Xauth (at least no in any way I can
figure out), ok then I try to put it up in "normal way" like the way you set up
a VPN client in this box, and now I got problem with authentication of the
client (see below (IP's are changed))
2007-12-11 10:54:31 iked WARNING: Rejected phase 1 aggressive mode
from 100.5.33.196 to 100.5.33.212 (no matching policy) cookies
i=eab20266 65142077 r=00000000 00000000
2007-12-11 10:54:31 iked Searching ID: user domain - myData [vpn]
peerId [vpn_mu]
2007-12-11 10:54:31 iked Searching ID: user domain - myData [vpn_mu]
peerId [vpn_mu]
2007-12-11 10:54:31 iked ike_match_proxy_id: peer ID type (0) not
supported 5
2007-12-11 10:54:31 iked CreateIsakmpSA : get rasUserGroupId=3
Look at: "peer ID type (0) not supported 5".
And: "The MUVPN on Fireware expects the client software to use Full
qualified Username as the ID of the Client, the remote ID (Firebox) is IP
Address."
So how to tell the Ipsecuritas to use "Full qualified Username as the ID", is it
possible?
IPSecuritas + Linksys RVS4000
IPSecuritas + Linksys RVS4000
by abalamut on 2007-12-13 14:30:25 +0100
Hello everybody, yestoday I bought Linksys RVS4000 & fund that I cant easy
setup vpn connection beetwen Linksys RVS4000 & my macintosh (10.5.1). I
ask at linksys forum, but they told me that I should ask here.
So, can anybody help me how setup vpn connection? I have tried but can
not.
FREE 1 GB Resell Rights eGoods as bonus?
FREE 1 GB Resell Rights eGoods as bonus?
by sacxooo on 2007-12-14 00:57:06 +0100
web-packages.com
Download FREE 548 ebooks from 19 categories!
Among them:
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
Arts
Automobiles
Business
Computers
Education
Fiction
Games
Health & Beauty
Home & Family
Internet Marketing
Kids & Teens
Music
Real Estate
Reference
Self-Improvement
Shopping
Society
Sports
Travel & Recreation
Also much more Web Sites, Scripts and a lot of SOFT for you site!
Visit NOW!
web-packages.com
IPCOMP with IPSecuritas
IPCOMP with IPSecuritas
by rodknocker on 2007-12-14 11:43:21 +0100
Hello!
I can't found an option to turn IPCOMP on :(
Where is this option (in the GUI)?
Greetings
David
Leopard and/or SonicWall
Leopard and/or SonicWall
by matthewyoung on 2007-12-16 17:30:48 +0100
I had a load of problems setting up IPSecuritas to work with our SonicWall
4100 Pro at work but eventually it did work perfectly. Since upgrading my
MacBook to Leopard though I have not been able to connect....or at the
most I can connect and ping the SonicWall but nothing else on the remote
network.
I have not changed the config file, and I tried a complete removal and
reinstall of IPSecuritas but it doesn't make a difference. Has anyone else
had this problem with Leopard and/or a SonicWall. As far as I can tell
everything I have entered that can match the settings on the Sonicwall does
match...here are my settings:
Remote IPSec Device: Sonicwall IP
Local Endpoint: Host (left blank as dhcp on sonicwall)
Remote Endpoint: Networks (have added all internal network ranges)
Phase 1
Lifetime: 28800
DH Group: 1024 (2)
Encryption: 3DES
Authentification: SHA-1
Exchange Mode: Aggressive, Main
Proposal Check: Claim
Nonce Size: 16
Phas 2
Lifetime: 28800
PFS Group: 1024 (2)
Encryption: 3DES
Authentification: HMAC SHA-1
ID
Local Identifier: Address
Remote Identifier: FWDN (with number from sonicwall)
Authentification Method: XAuth PSK (with preshared key and
username/password entered)
DNS
Internal (remote) domains and dns servers entered
Options
IPSec DOI
SIT_IDENTIFY_ONLY
Initial Contact
Local IP in Remote Network
Generate Policy
Request Certificate
Send Certificate
Unique SAs
WG Firebox with XAUTH
WG Firebox with XAUTH
by mellander on 2007-12-30 21:41:23 +0100
I've done some extensive testing to get IPSecuritas to work with the
WatchGuard Firebox using external authentication to a RADIUS server
(XAUTH).
If I specify the local tunnel IP statically in the client, it works. But there is no
XAUTH happning. (Seems like sort of a bug in the Firebox which allows me
establish a tunnel anyway, but it can be discussed, since firewall rules
defined on usergroup of Filter-IDs returned by the RADIUS server don't
work anyway... Perhaps IKE/IPSec/XAUTH is designed this way, that a tunnel
actually can be defined even before the XAUTH is accepted.)
If I try and set it up as a local client (user account local in the Firebox)
instead, it works. But that is more or less the same thing as defining it in a
L2L tunnel, as described by your guide. But that's only handy for a handful
of clients or so. If XAUTH would work, it would bring alot of advantages, if
REM_CFG works that is...
I've done a detailed comparision with WatchGuards own OEM VPN client
(they recently changed from SafeNet to NCP).
I don't know why the XAUTH is not initiated properly, but I'm hoping that
you find something out from the logs and packet traces that I've sent.
There's both logs from the Firebox, the VPN client(s) and packet captures at
the client.
Thanks in advance.
Connection problems with SonicWall PRO1060
Connection problems with SonicWall PRO1060
by shadowman on 2008-01-05 17:13:54 +0100
[font=Verdana]Hello
I'm trying to connect with Mac OSX Leopard to a network with an SonicWall
PRO1060. I followed the wizard to set up my connection in IPSecuritas and
read trough the template manual of SonicWall PRO,deliverd with the
application. I cannot connect.
This is what i'm seeing in my logging of IpSecuritas:[/font]
[font=Courier]Error
for phase1[/font]
[font=Courier]Info
IKE phase2 negotiation failed due to time up waiting
IKE delete phase 2 handler.[/font]
[font=Verdana]And this is what i'm seeing in my SonicWall logs:[/font]
[font=Courier]IKE Responder: IKE proposal does not match (Phase 1)[/font]
Does anyone know a method that i connect and doesnt't see this errors
anymore.If more information is needed, just ask me and i will post it in this
topic. Thanks for the help in advance.
Guido
Manually removing IPsecuritas
Manually removing IPsecuritas
by antonij on 2008-01-06 03:05:10 +0100
Hi,
The uninstaller that comes with the program fails to uninstall it from my
machine. Any advise on removing it manually?
Antoni J.
Re: Manually removing IPsecuritas
by Forum Admin on 2008-01-07 00:12:28 +0100
Hello Antoni,
sorry that the uninstaller is not working. To manually remove all
components of IPSecuritas, you will need to remove the following
directories and folders
/Library/StartupItems/IPsecuritasDaemon
/Library/Application Support/Lobotomo Software/IPSecuritas
~/Library/Preferences/com.lobotomo.IPSecuritas.plist (in your home
folder)
~/Library/Widgets/IPSecuritas.wdgt
The application itself.
To stop the menu bar item, press and hold the Alt key while opening the
menu. A Quit item will appear as the last entry in the menu,
Hope this helps,
Christoph
Checkpoint VPN-1 with SecurID
Checkpoint VPN-1 with SecurID
by kridan on 2008-01-10 05:45:27 +0100
I've searched the forums, newgroups, and manuals and can't seem to find
anyone using Checkpoint with SecurID. With our setup at work, I use a
usernname, a PIN, and then current SecurID token.
I know I'm close though, since I'm getting a bad un/pw message from the
remote site. Here is the log:
IPSecuritas 3.1 build 1860, Mon Oct 15 22:03:05 CEST 2007, nadig
Darwin 8.10.1 Darwin Kernel Version 8.10.1: Wed May 23 16:33:00 PDT
2007; root:xnu-792.22.5~1/RELEASE_I386 i386
[code]Jan 09, 23:21:11 Info
APP IPSec authenticating
Jan 09, 23:21:11 Info
APP IKE daemon started
Jan 09, 23:21:11 Info
APP IPSec started
Jan 09, 23:21:11 Warning IKE Foreground mode.
Jan 09, 23:21:11 Info
IKE @(#)ipsec-tools CVS (http://ipsectools.sourceforge.net)
Jan 09, 23:21:11 Info
IKE @(#)This product linked OpenSSL 0.9.7l 28
Sep 2006 (http://www.openssl.org/)
Jan 09, 23:21:11 Info
IKE Reading configuration from "/Library
/Application Support/Lobotomo Software/IPSecuritas/racoon.conf"
Jan 09, 23:21:11 Info
IKE Resize address pool from 0 to 255
Jan 09, 23:21:11 Info
APP Initiated connection Cognos
Jan 09, 23:21:11 Error IKE inappropriate sadb acquire message passed.
Jan 09, 23:21:12 Warning IKE ignore 2nd CERT payload.
Jan 09, 23:21:12 Warning IKE No ID match.
Jan 09, 23:21:12 Warning IKE Ignored attribute XAUTH_CHALLENGE_VPN1
Jan 09, 23:21:13 Warning IKE Ignored attribute XAUTH_CHALLENGE_VPN1
Jan 09, 23:21:15 Error IKE Xauth authentication failed
Jan 09, 23:21:15 Info
IKE XAUTH Message: 'Access denied - wrong user
name or password (msg_obj :format (1.0) :id (VPN_CUMULATE_PROMPT)
:def_msg ("Access denied - wrong user name or password ") :arguments ( :0
( :type (msg_obj) :val (msg_obj :format (1.0) :id
(CPSC_SECURID_USER_DENIED) :def_msg ("Access denied - wrong user
name or password ") :arguments () ) :def_text ("Access denied - wrong user
name or password ") ) ) ) '.
Jan 09, 23:21:15 Warning IKE Ignored attribute XAUTH_MESSAGE_VPN1
Jan 09, 23:21:17 Info
APP IKE daemon terminated
Jan 09, 23:21:17 Info
APP IPSec terminated
[/code]
So am I wrong in thinking that this means (since it knows the pw is wrong)
that it must at least be communicating with the remote site?
This doesn't surprise me though, since it never prompts me for the token,
so how could it possibly authenticate properly. In the Authentication
Method drop down I've selected XAuth RSA....is this right? If so, why am I
not getting prompted for the token?
Any help is VERY MUCH appreciated.
Dwayne
Re: Checkpoint VPN-1 with SecurID
by mellander on 2008-01-10 20:51:10 +0100
"XAUTH_CHALLENGE_VPN1" makes me think that CheckPoint have made
their own modifications to the protocol.
The problem with XAUTH seems to be that there is no "official" RFC for it.
At least not listed on the RFC pages at IETF.
I found thins among many [url]http://tools.ietf.org/html/draft-ietf-ipsecisakmp-xauth-06[/url] where "XAUTH_CHALLENGE" is listed. But the suffix
VPN1 smells like CheckPoint Proprietary all the way...
Re: Checkpoint VPN-1 with SecurID
by kridan on 2008-01-14 04:57:14 +0100
Anyone else here successfully using Checkpoint with SecurID?
DK
Re: Checkpoint VPN-1 with SecurID
by siromega on 2008-01-15 13:34:15 +0100
I followed the instructions in [url=http://www.lobotomo.com/cgi-bin
/yabb/YaBB.pl?num=1177416223/7#7]this post,[/url] and I was able to
successfully connect. However once I connected I wasn't able to get
anywhere in the corporate network, and my ability to access the internet
stopped working completely until I disconnected.
The only other addition I have was is the password field in the ID tab, I put
my pin and the secureid token value and I was able to successfully
authenticate.
private dns not working
private dns not working
by pong on 2008-01-12 17:31:55 +0100
i don't know if it'S leopard related but i can't get the private dns to work.
system is 10.5.1, ipsecuritas is 3.1, firewall is a fortigate 60.
the vpn connection works, i cann also connect to all servers inside the vpn
but only via ip-adress. the dns is set for the internal domain private.lan but
even if i set the private domain to * the private names don't resolve. but i
can ping and connect to the internal dns.
but it seems that it isn't involved in name resolving.
Translation needed
Translation needed
by Forum Admin on 2008-01-14 12:41:51 +0100
Hello,
we are looking for people who could translate a few sentences from English
into their native language for a few extensions of IPSecuritas. We need
translations to the following languages: French, Italian, Spanish, Portugiese,
Dutch, Norwegian and Japanese.
If you are interested to support IPSecuritas in this way, please e-mail me at
[email protected]
Christoph, Lobotomo Software
Cannot import PKCS#12 Certs
Cannot import PKCS#12 Certs
by franziskaner on 2008-01-17 12:31:19 +0100
Hi there,
i'm trying to connect my MacBook over IPSec with an Linux based
Firewall/VPN-Gateway.
I have generated Certificates on the Linux Appliance and exported them to
the Mac.
When i try to import them in IPSecuritas, i get an error message, that it is
either not
an PKCS#12 Cert or the passphrase ist incorrect.
I have tested the same Certificate with my NCP IPSec Client on a WinXP
Machine,
it works fine there.
IPSecuritas V3.1 Build 1860 on a MacBook Intel, running Leopard 10.5.1,
VPN has worked
fine with Preshared-Key Authentication, but i would prefer to use Certs.
Anyone any idea?
Re: Cannot import PKCS#12 Certs
by e-baba on 2008-04-02 14:29:47 +0200
Hello Everyone,
I've got the same problem importing signed certs (pkcs#12) made with
openssl on WinXP. I am running ipsecuritas 3.1 build 1860 using osx
leopard.
The same certs have been working on previous releases of ipsecuritas an
osx.
Are there any restrictions using pkcs#12-certs? Or is it a known bug wich is
getting fixed in future releases?
Regards
Jьrgen
Re: Cannot import PKCS#12 Certs
by cnadig on 2008-04-10 15:53:11 +0200
Hello,
there is no known restrictions, so this is probably a bug. Is it possible to
send an example of such a certificate to [email protected] (a test
certificate, not a production one of course)?
Cheers,
Christoph
Re: Cannot import PKCS#12 Certs
by franziskaner on 2008-04-10 18:01:15 +0200
hello Christoph,
the certificate is on the way to you.
regards,
Hartmut
Re: Cannot import PKCS#12 Certs
by benjconrad on 2008-04-25 12:25:46 +0200
I don't know if this applies, but certainly p12 files from Smoothwall can not
be imported directly from the firewall in to IPSecuritas. I have no idea why
not! This is taken from the smoothwall website:
Notes on IPSecuritas configuration
To configure IPSecuritas the CA can be exported from the Smoothwall in a
PEM format and imported into IPSecuritas using the certificate manager.
The client certificate needs to be exported in a PKCS12 format, but before
importing into IPSecuritas first convert it into a certificate public key and
private key components by typing the following commands in an OS X
terminal:
openssl pkcs12 -in cert.p12 -nokeys -clcerts -out cert.pem
cert.pem will contain the public key part.
openssl pkcs12 -in cert.p12 -nodes -nocerts -out key.pem
key.pem will contain the private key part.
Substituting cert.p12 with the name of the pkcs12 certificate exported.
The certificate public and private key can then be imported using the
certificate manager. Note that both public and private keys will be asked for
in succession when selecting the import 'personal certificate with private
key' option.
I hope this helps. Obviously you need to cd in Terminal to the folder that
contains the VPN certs.
Re: Cannot import PKCS#12 Certs
by artemide on 2008-04-25 15:48:08 +0200
I read this on the SW site, but I have imported the P12 keys directly into
IPSecuritas .. but it only works once and while .. I have not idea why .. I have
one key that imported immediately, one key that took like 3 tries .. and now
I have another one that will not import at all .. the interesting thing is, my
connections fail with some cert errors .. I wonder ..
I am going to split the P12 up and try again ..
Re: Cannot import PKCS#12 Certs
by artemide on 2008-04-25 16:21:16 +0200
I tried with a new test cert and split out the key, set it all back up .. and I
still have the same issues with my connections .. so that doesn't help
I keep getting unable to get certificate CRL(3)
and libipsec failed pfkey check ( invalid sa type )
Re: Cannot import PKCS#12 Certs
by benjconrad on 2008-04-25 18:11:09 +0200
I imagine you have done all this correctly - but when you get the P12 file
split in to two .pem files, one the cert, and one the key - you then need to
import them in to the Certificate Manager - choosing .pem with key. You
select the cert.pem first, and then the key.pem - I don't think you need to
provide the password, but you do need it to split the p12 file. Then
obviously you need to select the correct certificate in the actual connection
setup.
At least, that is how I did it.
Re: Cannot import PKCS#12 Certs
by artemide on 2008-04-25 21:59:26 +0200
[quote author=benjconrad link=1200569480/0#7 date=1209139869]I
imagine you have done all this correctly - but when you get the P12 file
split in to two .pem files, one the cert, and one the key - you then need to
import them in to the Certificate Manager - choosing .pem with key. You
select the cert.pem first, and then the key.pem - I don't think you need to
provide the password, but you do need it to split the p12 file. Then
obviously you need to select the correct certificate in the actual connection
setup.
At least, that is how I did it.[/quote]
Yup did all that .. the connection goes green .. but it never actually comes
up .. I can't ping across the network .. and the logs complain about invalid
SA
Re: Cannot import PKCS#12 Certs
by artemide on 2008-04-25 22:57:24 +0200
The certs need to have subjectAltname ( ID ) set in order for them to import
correctly. It is a Mac thing not an IPSecuritas thing
Re: Cannot import PKCS#12 Certs
by artemide on 2008-04-25 23:07:28 +0200
lol .. well .. the ID does need to be there .. but the importing is still hit or
miss.
IPSecuritas with a Juniper Netscreen SSG20 F-wall.
IPSecuritas with a Juniper Netscreen SSG20 F-wall.
by rosshuts on 2008-01-17 13:25:13 +0100
Good afternoon!
I was wondering if anyone could help with a Netscreen Firewall Query.
I am in the process of setting up VPN dialup for a Mac user using the
IPSecuritas software.
We use a Netscreen SSG20 Firewall and its not listed in the supported
models. Looking at the setup guide it mentions Netscreen SSG models in
general and therefore was hoping that it would still work? The Netscreens
tend to use the same sort of firmware or ScreenOS files and was really
hoping that it would work.
Does anyone know if this will be ok or not? There is also the Equinux VPN
Tracker although its not free, but works with Netscreens, however again,
they don't list the SSG's in the list.
Any help in this matter would be greatly appreciated.
Regards,
Ross.
Re: IPSecuritas with a Juniper Netscreen SSG20 F-w
by Daniel on 2008-01-25 21:53:42 +0100
IPSecuritas works like a charm with ScreenOS, including the SSG series.
Re: IPSecuritas with a Juniper Netscreen SSG20 F-w
by Forum Admin on 2008-01-28 01:05:27 +0100
Hello,
I use IPSecuritas with a Juniper SSG140 with Xauth. The firmware of all
Juniper models are identical or similar, there should be not problem to use
it with a SSG20. Please email me at [email protected] if you need
more information.
Cheers,
Christoph
Stop IPSecuritas daemon from launching at startup.
Stop IPSecuritas daemon from launching at startup.
by techess on 2008-01-17 20:02:41 +0100
I have IPSecuritas 3.1 installed on a Leopard MacBook Pro. So far it works
great, but I don't want the daemon to automatically start at reboot. It
interferes with other software I need to run. I tried removing /Library
/StartupItems/IPSecuritasDaemon but at reboot the daemon still starts.
I still have to open IPSecuritas and manually choose the quit and terminate
daemon. Then the other software I need will run. The only thing that
removing /Library/StartupItems/IPSecuritasDaemon seems to do is to stop
the menu bar item for IPSecuritas from launching.
Anyone have a way of stopping the daemon from starting other than
uninstalling?
Re: Stop IPSecuritas daemon from launching at star
by Forum Admin on 2008-01-28 01:08:58 +0100
Hello,
the daemon is an essential part of IPSecuritas and needs to run in order to
establish a connection. It is installed and started every time you start
IPSecuritas and asked for the administrator's password.
Maybe you could tell me with what other software it interferes so that I
could do something about this?
Thanks a lot,
Christoph
Re: Stop IPSecuritas daemon from launching at star
by techess on 2008-01-28 17:06:57 +0100
One of the pieces is the Mac OS X built in VPN. The other software that
doesn't work is a custom Citrix client needed for secure accounting/student
info transactions.
Everything works fine if I open IPSecuritas,quit the daemon and then launch
the software. Then if I need to connect to the checkpoint firewall I can start
it up again and this works really well. I was hoping that there would be an
easy way of not having the service start on boot, and then manually launch
it when I needed it.
Thanks!
Re: Stop IPSecuritas daemon from launching at star
by hkirschk on 2008-04-22 09:22:52 +0200
Just wanted to state that I would also be interested in having a global
preference which defines if the IPSecuritas daemon should be automatically
started at system startup. It interferes with the Apani Contivity client, I also
have to switch off the IPSecuritas daemon and restart the Apani Contivity
client.
Heiko
Re: Stop IPSecuritas daemon from launching at star
by .guru on 2008-04-22 10:57:13 +0200
By the way, what exactly is the daemon for? I thought IPSecuritas relies on
the racoon IKE service only?
.guru
Re: Stop IPSecuritas daemon from launching at star
by Forum Admin on 2008-04-23 20:35:44 +0200
Hello,
the daemon fulfills a number of purposes:
1. Control of the IPSec kernel configuration and control of racoon and its
configuration file
2. Autostart, for when no GUI is running
3. Detection of environment changes (network, user etc.)
4. NAT-T implementation, since Apple's implementation is old and broken.
Hope this answers your question,
Christoph
Re: Stop IPSecuritas daemon from launching at star
by hkirschk on 2008-04-29 14:38:32 +0200
[quote author=hkirschk link=1200596561/0#3 date=1208848972]Just
wanted to state that I would also be interested in having a global preference
which defines if the IPSecuritas daemon should be automatically started at
system startup. It interferes with the Apani Contivity client, I also have to
switch off the IPSecuritas daemon and restart the Apani Contivity client.
Heiko[/quote]
Sorry for the noise, some further investigation showed that the IPSecuritas
daemon itself does not interfere with the Apani Contivity client. Unless
there is no VPN connection initiated by IPSecuritas, there are no problems,
and IMHO it does not make sense trying to have both an active IPSecuritas
client and an active Apani Contivity client.
Heiko
Weird - this was working - pfkey X_SPDDUMP failed
Weird - this was working - pfkey X_SPDDUMP failed
by brantwinter on 2008-01-20 14:33:46 +0100
My VPN ( IPSecuritas -> Draytek 2800 ) was working fine yesterday, but
today keeps failing with error:
pfkey X_SPDDUMP failed: No such file or directory
Funny thing is, I have another profile in IPSecuritas set up that goes off to a
different VPN endpoint that continues to work fine.
I have used Frameseer to look at the outgoing traffic on both setups, the
one that works does a DNS lookup first, the failing VPN configuration sends
NO traffic out the interface at all.
Just out of interest, my psk.txt file in:
/Library/Application Support/Lobotomo Software/IPSecuritas/
is empty...
Obviously psk.txt gets overwritten each time the vpn config loads. When I
use the vpn config for my working vpn I have entries in the psk.txt file. In
my non-working vpn setup, the psk.txt remains empty. WTF?????
As I said previously, this exact same vpn config worked fine yesterday....
Re: Weird - this was working - pfkey X_SPDDUMP fai
by cnadig on 2008-01-22 00:27:31 +0100
Hello,
the empty psk.txt is an indication that the connection isn't even started,
therefore you
don't see any network activity either. This is usually the case if the
connection definition is
incomplete or when there are conflicts in the definition.
Can you see a red dot next to the connection in the main window after you
started the non-working
connection? If so, please hoover the mouse over the red icon and wait for
the
tooltip to appear. If it says 'Connection definition incomplete', please open
the connection
manager and hoover the mouse over the grey exclamation mark symbol
next to the connection to
see what's wrong.
I hope this helps,
Christoph
Re: Weird - this was working - pfkey X_SPDDUMP fai
by brantwinter on 2008-01-24 13:01:57 +0100
This did not help unfortunately. The red dot appears as soon as the VPN is
dialed, but it has no tool tip when hovered over, and hence no grey dot in
the connection manager screen.
Re: Weird - this was working - pfkey X_SPDDUMP fai
by brantwinter on 2008-01-26 00:29:56 +0100
Update: I can also confirm that an uninstall / re-install does nothing to help
the situation....
This is quite frustrating ! Is there anyone that can give me a hand ??
Re: Weird - this was working - pfkey X_SPDDUMP fai
by brantwinter on 2008-01-27 12:57:41 +0100
Can anyone help out here ?? I have moved 2000km's from home and need
to be able to VPN to my mother to assist some probs she is having. As I
said in the first post - this was working fine. It just stopped working.
Re: Weird - this was working - pfkey X_SPDDUMP fai
by brantwinter on 2008-01-28 11:07:43 +0100
This gets even better !!!!!!
I just uninstalled IPSecuritas 3.1 - I used the uninstaller which actually
reported failing......but anyway
I re-installed IPSECURITAS VERSION 2.2 and put in all the same setting for
my broken VPN and walla !!!! It connected and I can access the network on
the other end.
Si I have now confirmed that only this one tunnel is broken in v3.1 and the
whole thing works an v2.2 and I have also installed a demo copy of
VPNTracker which works as well.
I can not for the life of me work out why this would / could be the case......
I did some other investigation and found that the racoon.conf file is not
being written properly/fully on the broken VPN. I copied the file under both
the working and broken configurations and they look totally different. I
dont know how to troubleshoot any further however.
I would love to have 3.1 working but at present v2.2 is my only option !
Re: Weird - this was working - pfkey X_SPDDUMP fai
by cnadig on 2008-01-28 12:47:37 +0100
Hello,
this is indeed interesting. Could you send me the two racoon.conf files and
the connection log with log level set to debug (from the working and the
non-working configuration) to [email protected]?
Please replace any confident information like the public IP and please do
not send the psk.txt file!
Thank you alot,
Christoph
Re: Weird - this was working - pfkey X_SPDDUMP fai
by brantwinter on 2008-01-28 14:22:36 +0100
Sent.....
Re: Weird - this was working - pfkey X_SPDDUMP fai
by brantwinter on 2008-01-30 14:28:16 +0100
Hi Christoph - any luck with the logs I sent through on this issue ?? Thanks
in advance.
Re: Weird - this was working - pfkey X_SPDDUMP fai
by brantwinter on 2008-02-02 08:43:19 +0100
I can now confirm that this issue has something to do with the "Remote
Side" config item in the VPN setup. If I change this option to "Endpoint
mode - Anywhere" I get past the pfkey error. The VPN still does not
connect, but I do get a racoon.conf file created and a psk.txt file populated.
When I change the config back to "Endpoint mode - Network" ( or any other
option ) I get the pfkey issue again.
Like always, any help is appreciated.
Re: Weird - this was working - pfkey X_SPDDUMP fai
by Forum Admin on 2008-02-03 20:09:33 +0100
Hello Brant,
thank you very much for the log file. In your case, no connection is started,
most probably because of a configuration fault or a network conflict.
Does the local network and remote network overlap, or did you enter a local
IP address that is part of the remote network by any chance? If so, please
enable the 'Local IP in Remote Network' option in the Options section of
your connection. This would also explain your success connecting with the
remote mode set to Anywhere, as you describe in another post.
Please note that such network overlaps should be avoided since there might
be undesired side effects.
Hope this helps,
Christoph
Re: Weird - this was working - pfkey X_SPDDUMP fai
by brantwinter on 2008-02-05 12:09:13 +0100
Hi there Christoph - I can;t help but think that there is a bug causing this
behavior.
The output of an ifconfig is such:
lo0: flags=8049<UP,LOOPBACK,RUNNING,MULTICAST> mtu 16384
inet6 fe80::1%lo0 prefixlen 64 scopeid 0x1
inet 127.0.0.1 netmask 0xff000000
inet6 ::1 prefixlen 128
gif0: flags=8051<UP,POINTOPOINT,RUNNING,MULTICAST> mtu 1280
stf0: flags=0<> mtu 1280
en0: flags=8822<BROADCAST,SMART,SIMPLEX,MULTICAST> mtu 1500
ether 00:1b:63:a1:88:b2
media: autoselect status: inactive
supported media: autoselect 10baseT/UTP <half-duplex> 10baseT/UTP
<full-duplex> 10baseT/UTP <full-duplex,hw-loopback> 10baseT/UTP
<full-duplex,flow-control> 100baseTX <half-duplex> 100baseTX <fullduplex> 100baseTX <full-duplex,hw-loopback> 100baseTX <fullduplex,flow-control> 1000baseT <full-duplex> 1000baseT <fullduplex,hw-loopback> 1000baseT <full-duplex,flow-control> none
fw0: flags=8802<BROADCAST,SIMPLEX,MULTICAST> mtu 4078
lladdr 00:1d:4f:ff:fe:5f:4c:74
media: autoselect <full-duplex> status: inactive
supported media: autoselect <full-duplex>
en1: flags=8863<UP,BROADCAST,SMART,RUNNING,SIMPLEX,MULTICAST>
mtu 1500
ether 00:1c:b3:bc:9a:11
media: autoselect (<unknown type>) status: inactive
supported media: autoselect
en2: flags=8822<BROADCAST,SMART,SIMPLEX,MULTICAST> mtu 1500
ether 00:1c:42:00:00:00
media: autoselect status: inactive
supported media: autoselect
en3: flags=8822<BROADCAST,SMART,SIMPLEX,MULTICAST> mtu 1500
ether 00:1c:42:00:00:01
media: autoselect status: inactive
supported media: autoselect
gif1: flags=8010<POINTOPOINT,MULTICAST> mtu 1280
ppp0: flags=8051<UP,POINTOPOINT,RUNNING,MULTICAST> mtu 1500
inet 10.164.45.63 --> 10.6.6.6 netmask 0xff000000
When I set the 'Remote Endpoint' to anything BUT 10.0.10.0/24 it works.
As soon as I enter a subnet that begins with 10.x.x.x it fails. The above
network for the ppp0 adapter is a class A subnet.
The only think I can think of is that somehow IPSecuritas is ignoring the fact
that I am setting the Remote Endpoint to 10.0.10.0/24 and assuming the
10. subnet is a class A ??????
If I set the Remote endpoint to somethign random, say, 11.0.11.0/24 it
creats the racoon.conf / psk.txt files and dials up.
It is ONLY the 10.x.x.x network thing that is causing all the problems.
Does this help in troubleshooting ??
Re: Weird - this was working - pfkey X_SPDDUMP fai
by Forum Admin on 2008-02-13 22:56:15 +0100
Hello Brant,
the problem is indeed that the two networks 10.0.0.0/24 and 10.0.10.0/24
overlap. This is
not recommended (and probably also against the specification) for various
reasons (one being that
other computers will not be reachable anymore, another that there might
an address conflict between
the local address and a machine in the remote network with the same
address).
However, I will add an option to disable these collision checks or simply
ignore the remote address for PPP interfaces, since several people asked for
it.
For now, the easiest (and cleanest anyway) solution is to change her local
network range to a different private range, please have a look at RFC 1918,
section 3 (<http://www.faqs.org/rfcs/rfc1918.html>)
Cheers,
Christoph
Re: Weird - this was working - pfkey X_SPDDUMP fai
by brantwinter on 2008-02-14 08:36:00 +0100
Not sure if I wrote the last post incorrectly or if it has been interpreted
wrong, but the two 10.x.x.x addresses ARE on DIFFERENT subnets.
The ISP address is a /8 address and the remote VPN subnet is a /24
What I am postulating is that IPSecuritas is interpreting the remote VPN
subnet as a /8 ( Class A ) subnet by virtue of the 10.x.x.x subnet ( if you
are going by RFC 1918 part 3 - Private address space ) it is true that
10.x.x.x subnets SHOULD be numbered as Class A subnets, but they can
be applied in a Class C address space.
I am not sure I am making sense....
Re: Weird - this was working - pfkey X_SPDDUMP fai
by Forum Admin on 2008-02-15 21:53:32 +0100
Hello Brant,
sorry, I was quoting the addresses incorrectly. The remote network of your
ppp0 interface is 10.0.0.0/8, which includes the smaller remote network
10.0.10.0/24 you're trying to access. IPSecuritas does these checks to avoid
indetermined (or at least unexpected) behaviour, but I will add an option to
bypass these checks for the brave among you.
Cheers,
Christoph
Re: Weird - this was working - pfkey X_SPDDUMP fai
by brantwinter on 2008-02-18 11:39:41 +0100
Thanks for that Christoph - I will wait for an update.
IPSecuritas vs. Netvanta 7100
IPSecuritas vs. Netvanta 7100
by NotThatLuke on 2008-01-20 20:24:31 +0100
Hi,
I'm trying to use IPSecuritas 3.1 build 1860 to connect to my company's
firewall, an Adtran Netvanta 7100 and it's no joy every time. I don't even
seem to be getting past Phase 1. I'm pretty sure I have all the settings
correct except for the Phase 2 Authentication (set to Null) and the Options
(DOI, Initial Contact, Local IP, Support Proxy, Unique SAs, IKE Frag are
selected, NAT-T enabled)--not sure what those should be so I've been
using trial and error. Here's a log example:
Info
APP IPSec authenticating
Info
APP IKE daemon started
Info
APP IPSec started
Info
IKE Foreground mode.
Info
IKE @(#)ipsec-tools CVS (http://ipsec-tools.sourceforge.net)
Info
IKE @(#)This product linked OpenSSL 0.9.7l 28 Sep 2006
(http://www.openssl.org/)
Info
IKE Reading configuration from "/Library/Application
Support/Lobotomo Software/IPSecuritas/racoon.conf"
Info
IKE Resize address pool from 0 to 255
Info
APP Initiated connection Work
Error IKE inappropriate sadb acquire message passed.
Error IKE delete phase1 handle.
Info
APP Initiated connection Work
Info
APP Initiated connection Work
Error IKE phase2 negotiation failed due to time up waiting for phase1.
ESP (IP Obscured by me)[500]->10.0.1.198[500]
Info
APP Initiated connection Work
Error IKE inappropriate sadb acquire message passed.
Error IKE phase2 negotiation failed due to time up waiting for phase1.
ESP (IP Obscured by me)[500]->10.0.1.198[500]
Error IKE phase2 negotiation failed due to time up waiting for phase1.
ESP (IP Obscured by me)[500]->10.0.1.198[500]
Info
APP Initiated connection Work
Error IKE phase1 negotiation failed due to time up.
20d32e7094980c58:0000000000000000
Error IKE phase2 negotiation failed due to time up waiting for phase1.
ESP (IP Obscured by me)[500]->10.0.1.198[500]
Error IKE phase2 negotiation failed due to time up waiting for phase1.
ESP (IP Obscured by me)[500]->10.0.1.198[500]
Warning APP Connection Work timed out
Warning APP Suspending for 30 seconds
Info
APP IPSec stopping
Info
APP IKE daemon terminated
Info
APP IPSec stopped
Anyone ever try this with a Netvanta? Any ideas? Any help is very welcome.
Thanks!
Luke
Cannot connect to AFP server
Cannot connect to AFP server
by TedA on 2008-01-23 14:36:21 +0100
I have IPSecuritas connected to a Netgear FVS318, and I'm able to connect
to the vpn, but I'm unable to connect to a afp server on the vpn network. I
can ping the machine and I can control the machine using Apple Remote
Desktop, but I can't connect via afp.
When I go to "Go To Server.." all I get is "Connecting to
afp://192.168.0.201" until it eventually times out. I have connected to this
afp server in the past when it was on the same network as the vpn.
Computers on the internal network can still connect to the afp server and
computers on a separate vpn (via another Netgear FVS318) can connect to
the afp server.
Re: Cannot connect to AFP server
by TedA on 2008-01-24 21:03:56 +0100
I fixed the problem, the firewall was filtering any non 192.168.0.0
addresses.
Re: Cannot connect to AFP server
by esailor on 2008-04-11 15:21:35 +0200
Did you turn on the apple Talk flag in the network preferences?
Re: Cannot connect to AFP server
by mann on 2008-04-23 06:08:02 +0200
How do you know if the router is filtering addresses as I am having the
same problem only certain places does the AFP work over the VPN.
IPSecuritas and Checkpoint FW-1 - timeout
IPSecuritas and Checkpoint FW-1 - timeout
by StefanVollmar on 2008-01-23 23:50:29 +0100
Hello,
I am new to this forum and have just started using IPSecuritas 3.1 Build
1860 on MacOS X Leopard. Connecting to systems through a Checkpoint
FW-1 firewall works fine. However, during ssh connections the terminal
freezes if there was not any traffic for a number of minutes. Pressing a key
sometimes continues the session (with a delay off several seconds after the
key was pressed), more often than not I need to create a new connection. Is
there a way to keep a connection open even if there is no traffic for a
considerable amount of time, maybe by setting up "keep alive" messages
(or equivalent)?
Many thanks in advance,
Stefan
Re: IPSecuritas and Checkpoint FW-1 - timeout
by cnadig on 2008-01-25 10:14:04 +0100
Hello Stefan,
please enable the connection check in the options tab and enter an IP
address, that replies to pink requests.
Hope this helps,
Christoph
Re: IPSecuritas and Checkpoint FW-1 - timeout
by StefanVollmar on 2008-01-25 11:50:22 +0100
Dear Christoph,
as far as I can see, this solved my problem beautifully.
Thanks,
Stefan
only remote DNS works when connected
only remote DNS works when connected
by prahn on 2008-01-24 22:02:55 +0100
Hi!
When I connect to my VPN the resolution of the local DNS does not work
anymore.
Remote DNS works perfect, but nothing more local.
If I switch the DNS of in the IPSecuritas profile local DNS works.
Even when the VPN is down.
Do I need to set a local searchdomain in Network control panel?
Leopard IPsecuritas 3.1 not working with Leopard
Leopard IPsecuritas 3.1 not working with Leopard
by Rommel on 2008-01-26 20:51:03 +0100
We had IPSecuritas 2.1 OS X.4 behind a Netopia R910 working well.
Upgraded to IPSecuritas 2.1 OS X.5 – would not work.
Upgraded to IPSecuritas 3.1 OS X.5 – would not work. Had imported the
settings from IPSecuritas 2.1.
This is the log file.
IPSecuritas 3.1 build 1860, Mon Oct 15 22:03:05 CEST 2007, nadig
Darwin 8.10.1 Darwin Kernel Version 8.10.1: Wed May 23 16:33:00 PDT
2007; root:xnu-792.22.5~1/RELEASE_I386 i386
Jan 25, 13:49:52 Info
APP IPSec restarting
Jan 25, 13:49:53 Info
APP IKE daemon terminated
Jan 25, 13:49:53 Info
APP IPSec restarting
Jan 25, 13:49:53 Info
APP IKE daemon started
Jan 25, 13:49:53 Info
APP IPSec started
Jan 25, 13:49:53 Error IKE Foreground mode.
Jan 25, 13:49:53 Info
IKE @(#)ipsec-tools CVS (http://ipsectools.sourceforge.net)
Jan 25, 13:49:53 Info
IKE @(#)This product linked OpenSSL 0.9.7l 28
Sep 2006 (http://www.openssl.org/)
Jan 25, 13:49:53 Info
IKE Reading configuration from "/Library
/Application Support/Lobotomo Software/IPSecuritas/racoon.conf"
Jan 25, 13:49:53 Info
IKE Resize address pool from 0 to 255
Jan 25, 13:49:54 Info
APP Initiated connection Kodak DirectView
Jan 25, 13:49:54 Error IKE inappropriate sadb acquire message passed.
Jan 25, 13:50:01 Info
APP Initiated connection Kodak DirectView
Jan 25, 13:50:08 Info
APP Initiated connection Kodak DirectView
Jan 25, 13:50:10 Error IKE phase2 negotiation failed due to time up
waiting for phase1. ESP 216.197.193.153[500]->192.168.123.103[500]
Jan 25, 13:50:15 Info
APP Initiated connection Kodak DirectView
Jan 25, 13:50:15 Error IKE inappropriate sadb acquire message passed.
Jan 25, 13:50:17 Error IKE phase2 negotiation failed due to time up
waiting for phase1. ESP 216.197.193.153[500]->192.168.123.103[500]
Jan 25, 13:50:22 Info
APP Initiated connection Kodak DirectView
Jan 25, 13:50:24 Error IKE phase1 negotiation failed due to time up.
c746ba12283e6bfd:0000000000000000
Jan 25, 13:50:24 Error IKE phase2 negotiation failed due to time up
waiting for phase1. ESP 216.197.193.153[500]->192.168.123.103[500]
Jan 25, 13:50:27 Warning APP Connection Kodak DirectView timed out
Jan 25, 13:50:27 Warning APP Giving up
Jan 25, 13:50:31 Error IKE phase2 negotiation failed due to time up
waiting for phase1. ESP 216.197.193.153[500]->192.168.123.103[500]
Jan 25, 13:50:38 Error IKE phase2 negotiation failed due to time up
waiting for phase1. ESP 216.197.193.153[500]->192.168.123.103[500]
Any ideas?
Re: Leopard IPsecuritas 3.1 not working with Leopa
by ask on 2008-02-02 01:29:18 +0100
I have almost the same history / problem. I had IPsecuritas working fine
pre-OSX 10.5 and pre IPSecuritas 3.1 with my Juniper NS25, NS5XP, etc...
but since the upgrade to OSX 10.5.x and the migration to the new
IPSecuritas, I can't get anything to connect. I have tried the wizards and
instructional PDFs... no luck.
Anyone have any ideas?
Re: Leopard IPsecuritas 3.1 not working with Leopa
by Rommel on 2008-02-02 18:37:55 +0100
Changed Exchange Mode from Aggressive to Main, Aggressive. This did not
get transferred properly in the importation. Works just fine now. :)
Re: Leopard IPsecuritas 3.1 not working with Leopa
by ask on 2008-02-08 21:51:02 +0100
Tried that... still not working for me.
IPSecuritas Stopped Working After Leopard Upgrade
IPSecuritas Stopped Working After Leopard Upgrade
by ask on 2008-01-29 02:50:09 +0100
I have been using IPSecuritas with my Juniper firewalls for a couple years
now. I recently upgraded my OS to Leopard and my existing VPN would not
connect. I tried upgrading to the latest IPSecuritas and importing my
existing VPN configs... bu tstill no luck. I have tried recreating my VPNS
with the wizards on my firewall and in IPSecuritas according to the Juniper
Netscreen HOWTO.pdf... no luck.
as anyone had any luck getting IPSecuritas on Leopard to connect to and
Juniper/Netscreen firewalls?
Thanks!
Spencer
Re: IPSecuritas Stopped Working After Leopard Upgr
by brantwinter on 2008-01-29 12:06:25 +0100
I don't know if I am having the same issues, but totally uninstall IPSecuritas
3.1 and install the older 2.2 version. When I did this mine worked. If this
does work please let Christoph know and he will probably ask for some
logs etc.
Re: IPSecuritas Stopped Working After Leopard Upgr
by mribiz on 2008-01-30 15:44:45 +0100
I can't seem to get 3.1 to work on Leopard as well. Where can I get the old
version?
Re: IPSecuritas Stopped Working After Leopard Upgr
by ask on 2008-02-03 01:16:01 +0100
I tried using IPSecuritas v2.2 again... still no luck.
Re: IPSecuritas Stopped Working After Leopard Upgr
by brantwinter on 2008-02-03 06:03:00 +0100
I fixed my issues under Leopard by setting the Endpoint Mode to Anywhere
rather than Network.
Still not good, but at least I can get a tunnel up now.
Re: IPSecuritas Stopped Working After Leopard Upgr
by ask on 2008-02-08 21:52:01 +0100
That did not fix the issue for me. Anyone else?
Re: IPSecuritas Stopped Working After Leopard Upgr
by 2fs2ns on 2008-03-07 21:08:01 +0100
Same issue, installed IPSecuritas on 5 macbooks running pre-lepoard OS,
all work just fine. The one Leopard machine we have, it doesn't work. I've
tried all the above suggestions with no luck.
Re: IPSecuritas Stopped Working After Leopard Upgr
by Cucumber on 2008-03-17 04:20:59 +0100
i just discovered IPSecuritas hoping that it would allow me to connect to a
clients NetScreen 5GT. i went through the Wizards and while it said it
connected. pings or anything else would just hang (and finally timeout). i
tried all the above suggestions, and resorted to randomly changing the
options (one at a time)
disabling NAT-T was the winner for me :)
i'm using IPSecuritas 3.1 on 10.5.2
Re: IPSecuritas Stopped Working After Leopard Upgr
by 2fs2ns on 2008-03-19 17:32:49 +0100
Just got it to work, checked the "Local IP in Remote Network" check box in
Options...
:-/
3.1 Does not work, 2.2 does
3.1 Does not work, 2.2 does
by rghiglianovich on 2008-01-29 19:58:11 +0100
Hi,
I have IPSecuritas 2.2 connecting to an IPCop box and it works quite good
(using preshared key), OSX 10.4.11 on my site
Now I have downloaded 3.1 ; copied the configuratione parameters and so
on... The new version does not work.
Why?
Is there something to do?
Thanks,
RIc
Re: 3.1 Does not work, 2.2 does
by brantwinter on 2008-01-31 12:36:58 +0100
Set your log to Debug in 3.2 and post the output here ( please remove
destination IP address ) - I am having similar issues as well. I have sent logs
and configs to the author but haven't heard back as yet.
Trouble Exporting
Trouble Exporting
by BladesAway on 2008-02-01 02:36:45 +0100
I have no idea what I am doing wrong....I have build up a connection that is
working perfectly. I need to export it to use on another machine. When I
go to Edit Connections and then select Export I enter a file name to export
to and then click on Export. I then get prompted with Missing Import
Password Please enter an Import password. Even if I put something in the
Import Password field I get the error. Any ideas of what I might be doing
wrong?
Thanks
Scott
Re: Trouble Exporting
by Forum Admin on 2008-02-01 09:52:44 +0100
Hello Scott,
this is probably due to the Leopard related bug (see
http://www.lobotomo.com/cgi-bin/yabb/YaBB.pl?num=1195575910).
Please press TAB one more time after you entered a password and the
export should just work fine.
Hope this helps,
Christoph
Re: Trouble Exporting
by BladesAway on 2008-02-01 12:11:43 +0100
That was it. Thank you. That was driving me crazy! Being new to Mac OS
and being a veteran of PC for over 20 years I couldn't help but wonder if it
was me!
Thanks again.
can connect to ipsec vpn, other subnet unreachable
can connect to ipsec vpn, other subnet unreachable
by blst on 2008-02-05 06:09:25 +0100
i have a tunnel between a fortigate firewall and a dlink firewall which works
fine. i have a vpn connection remotely to the fortigate, but cannot reach
resources on the other subnet.
has anyone solved this problem before? can't seem to figure out if it's
firewall issues or client issues.
thanks!
Where is the Wizard?
Where is the Wizard?
by jscooper on 2008-02-06 12:53:39 +0100
OK, it's early, so I must just be beery-eyed. But just downloaded this app
and cannot find this "wizard" icon anywhere. Not on the menu. in the app.
Where is it?
Thanks,
Jeff
Re: Where is the Wizard?
by jscooper on 2008-02-07 03:50:12 +0100
Nevermind, I found it. Looks like when you choose Open IPSecuras form the
menubar, it opens version 2.1 but when you click the application icon, you
get v3.1. Is this a bug or did I miss some setting somewhere?
Thanks,
Jeff
ps- used this app a couple years ago and loved it. The site vanished for a
while -- I'm very happy to see it back! :)
Re: Where is the Wizard?
by jscooper on 2008-02-07 04:08:25 +0100
Nevermind, I found it. Looks like when you choose Open IPSecuras form the
menubar, it opens version 2.1 but when you click the application icon, you
get v3.1. Is this a bug or did I miss some setting somewhere?
Thanks,
Jeff
ps- used this app a couple years ago and loved it. The site vanished for a
while -- I'm very happy to see it back! :)
Netgear G834GT
Netgear G834GT
by andy on 2008-02-07 22:00:44 +0100
Been having difficulty getting into my remote network remotely. Do I need
to make alterations on the pass through on the router?
Re: Netgear G834GT
by Tanster on 2008-02-19 01:27:26 +0100
Pass through to *WHAT*? IPSecuritas is acting as the client side. You must
have a server side. If your router doesn't have a VPN server built-in (and
the Netgear G834GT doesn't from the specs I see on the Netgear website),
then what are you connecting to behind it? Do you have a VPN server
sitting there? Otherwise, you're barking up the wrong tree.
Re: Netgear G834GT
by andy on 2008-02-19 09:51:27 +0100
Yes, was a bit cryptic.
But you have helped on other post. First job - get a new VPN server able
locally router.
Thanks
not creating racoon.conf completely
not creating racoon.conf completely
by coreyva on 2008-02-08 21:22:42 +0100
I'm having issues with IPSecuritas 3.1 on a 10.5.1 intel system. The log
stops at Resize address pool. Looking at the created racoon.conf, it is
incomplete. It contains no connection setting. I've tried removing and
reinstalling IPSecuritas, creating new profiles and connections, and creating
a new user. No change. Below is the contents of of the created racoon.conf.
# Racoon configuration created by IPSecuritas
log notify;
path pre_shared_key "/Library/Application Support/Lobotomo
Software/IPSecuritas/psk.txt";
path certificate "/Library/Application Support/Lobotomo
Software/IPSecuritas/certs";
padding
{
maximum_length 20;
randomize on;
strict_check off;
exclusive_tail on;
}
timer
{
counter 5;
interval 5 seconds;
persend 1;
phase1 15 seconds;
phase2 15 seconds;
}
listen
{
adminsock "/Library/Application Support/Lobotomo Software/IPSecuritas
/admin.sock";
}
Anyone else seen this happen?
Re: not creating racoon.conf completely
by brantwinter on 2008-02-09 08:29:29 +0100
Yes - I have been battling with exactly the same issue, but have had no real
response or fix for the issue from these boards. I got around mine by
changing the 'Endpoint Mode' to 'Anywhere'
In my case I was routing to a 10.x.x.x subnet, although I was using a Class
C subnet mask ( /24 ) I think IPSecuritas was applying the standard Class A
subnet mask to this subnet. This is the only explanation I can come up with
as my Telstra NextG internet connection always gives me a 10.x.x.x/8 IP
address.
As I said, nobody has replied to my issues so I am only speculating.
Try changing the endpoint mode and get back to me.
Re: not creating racoon.conf completely
by coreyva on 2008-02-11 17:36:50 +0100
I'll give that a try, but what's strange, is it's only one system having that
issue. My laptop works fine. Both are intel systems for what it's worth.
Re: not creating racoon.conf completely
by Forum Admin on 2008-02-13 22:50:07 +0100
Hello,
hovering the mouse over the red indicator in the main window should give
you a short indication of what's wrong. In your case, the connection is
considered 'not runnable' for some reason, hence the empty racoon.conf
file.
Hope this helps,
Christoph
Re: not creating racoon.conf completely
by brantwinter on 2008-02-14 08:55:10 +0100
When I was having issues ( Intel MBP 10.5.1 ) hovering over the red dot did
nothing. I never got any help text...
Re: not creating racoon.conf completely
by coreyva on 2008-02-22 20:35:54 +0100
[quote author=Forum Admin link=1202502162/0#3
date=1202939407]Hello,
hovering the mouse over the red indicator in the main window should give
you a short indication of what's wrong. In your case, the connection is
considered 'not runnable' for some reason, hence the empty racoon.conf
file.
Hope this helps,
Christoph[/quote]
Thanks, but no go. Hovering over the dot produces nothing. I am using a
working exported policy. Double checked all of the settings, and they are
identical on the system that works and the one that doesn't. In fact, I can
not get it to make a connection to any of my VPN's. One difference between
the two systems is that the working one was an upgrade to leopard, and the
non-working one was a fresh install. Not sure if that is contributing to the
issue or not. The fact that it is only one system I'm seeing an issue with,
makes me believe it's something with that system rather than ipsecuritas,
but I've not found it.
Connection successful, but can't reach network
Connection successful, but can't reach network
by gould on 2008-02-09 20:23:23 +0100
I can establish a connection to the remote Lancom 1722 VPN gateway
(green status dot), but besides the gateway I can't ping any computer in the
remote network.
This is my configuration:
Host 192.168.223.232 to network 192.168.223.0/24
I can only ping 192.168.223.0 and 192.168.223.254, no other server in the
same network. I suppose no data come back from the remote side. First I
thought the router on the local part, where my Mac is, blocks the packages,
but when I use my Linux PC everything is fine - without changing the router
configuration.
Ergo: Linux with Shrew VPN Manager works, IPSecurtias (VPN Tracker
neither) on Mac not. Leopard firewall is off.
I really have no idea whats wrong with my Mac configuration. Is there a
routing problem? Any suggestions what I can do?
By the way: MODE_cfg never works, while I get a IP from the gateway on my
Linux PC. Really weird.
Re: Connection successful, but can't reach network
by Forum Admin on 2008-02-13 22:53:35 +0100
Hello,
please try to change the local (virtual) IP to an address that's outside the
remote network (interpreting the IPSec standard strictly, this is nor allowed,
although some router allow it).
Hope this helps,
Christoph
Re: Connection successful, but can't reach network
by gould on 2008-02-13 23:18:40 +0100
An IP address outside the remote network is not allowed. Furthermore, I
was told that I shouldn't give an IP myself, because IKE config mode is
configured. Due to the fact, that MODE_CFG in IPSecuritas doesn't work for
me, the Lancom gateway has no MAC address of the local interface and
can't reach my local machine. My system administrator adviced my to use a
client that supports IKE config. Are there any known problems with the
MODE_CFG option in IPSecuritas?
Re: Connection successful, but can't reach network
by gould on 2008-02-15 15:37:54 +0100
In the meantime I'm pretty sure: The config mode is the problem. Is there a
way to proof wheather MODE_CFG in IPSecuritas works correctly? I think
there must be something wrong the this option.
Re: Connection successful, but can't reach network
by Tanster on 2008-02-19 01:54:43 +0100
Just curious but is "Local IP in Remote Network" checked under the
"Options" tab?
Re: Connection successful, but can't reach network
by gould on 2008-02-21 14:33:36 +0100
Yes, it's checked. Otherwise I'd get a collision error.
What do you reckon?
What do you reckon?
by andy on 2008-02-10 17:40:24 +0100
I run a newspaper and want my journalists to roam and link to network. A
friend recommended Lobo's software, saying it was very easy to set up.
So I took a MacBook pro with MacOSX 10.5.1
The local work router is a Netgear DG834GT fronting a Mac and PC network
that we want to get into. The remote router is a Netgear DG834G. I have
been told that we cannot configure the firewall on the DG834GT (no IKE etc
etc), while the DG834G has VPN policies available. VPN Tracker's network
environment checker shows both routers to be functional for IPSec and
NAT. Should I buy a new office router? What would you recommend?
Re: What do you reckon?
by Tanster on 2008-02-19 01:44:17 +0100
Insufficient data to work with. Could you give us more info about your
intended network topology (i.e., what and where do you want to connect to
what: connect the dots for us a bit more than you have thus far)? The
Netgear DG843GT doesn't have a VPN server (according to the Netgear
website) while the Netgear DG834G does (5 endpoints, again according to
the Netgear website). But it's on the remote end. Which doesn't make
sense. And where does IPSecuritas fit into the whole shebang you've
described above? Note that "VPN traversal" does *NOT* mean VPN-server
capable--it just means that it allows VPN packets to get through to a
separate VPN server sitting somewhere on the back end on the local side.
Normally, if you don't have a separate VPN server sitting on the back end,
you'd have a VPN server-capable router at the local end (i.e., use the
Netgear DG834G and toss the Netgear DG834GT) with all the roaming,
remote laptops having IPSecuritas installed on them and connecting to the
local end (i.e., the Netgear DG834G) from the outside via broadband or
similar. And that's just the 30,000 foot view with really broad strokes of
the paintbrush. I don't know if this is all you want or you have something
else in mind.
Hope it helps.
Re: What do you reckon?
by andy on 2008-02-19 09:40:53 +0100
Yup, sorry :-/ I'm a novice but we can't afford a techie
I will firstly get a VPN server router fitted locally.
Then I'll get IPSecuritas loaded onto the remote laptops.
Basically, I need them to run 'anywhere to local network'
But you have confirmed what I wasn't sure about, that the local router is not
capable.
Thanks for that.
Andy
IP collision between local and remote networks
IP collision between local and remote networks
by blst on 2008-02-13 17:15:29 +0100
i have set up a an ipsec tunnel to a fortigate 60B with three users and only
one seems to work.
everything works fine for me (leopard), but on the users' machine (tiger)
she started getting this message.
my network at home is 10.0.1.0 and hers at home is 192.168.7.0 and the
remote network is 192.168.0.0.
i have a feeling it is probably not related to the client software but i am not
really sure.
does anyone have any idea why this is happening?
thanks so much,
jason
Re: IP collision between local and remote networks
by Forum Admin on 2008-02-13 22:48:11 +0100
Hello Jason,
the problem is indeed that the two networks 192.168.7.0 and 192.168.0.0
overlap. This is
not recommended (and probably also against the specification) for various
reasons (one being that
other computers will not be reachable anymore, another that there might
an address conflict between
the local address and a machine in the remote network with the same
address).
However, I will add an option to disable these collision checks, since several
people asked for it.
For now, the easiest (and cleanest anyway) solution is to change her local
network range to a different private range, please have a look at RFC 1918,
section 3 (<http://www.faqs.org/rfcs/rfc1918.html>)
Hope this helps,
Christoph
Re: IP collision between local and remote networks
by blst on 2008-02-13 23:29:08 +0100
christoph,
turns out that local ip in remote network became unchecked.
is there an explanation of what this setting means some where in the docs?
thanks so much for the quick reply.
--jason
Re: IP collision between local and remote networks
by Tanster on 2008-02-18 21:28:15 +0100
[quote author=Forum Admin link=1202919329/0#1 date=1202939291]
the problem is indeed that the two networks 192.168.7.0 and 192.168.0.0
overlap.
[/quote]
I was just reading through this thread and noticed that the original poster
didn't provide subnet mask or CIDR info. I'm curious as to what clued you
in to the two networks overlapping. Is there any other info that's not
showing up here?
Re: IP collision between local and remote networks
by blst on 2008-02-18 21:42:18 +0100
my original post:
IP collision between local and remote networks
13. Feb 2008 at 17:15 Quote
i have set up a an ipsec tunnel to a fortigate 60B with three users and only
one seems to work.
everything works fine for me (leopard), but on the users' machine (tiger)
she started getting this message.
my network at home is 10.0.1.0 and hers at home is 192.168.7.0 and the
remote network is 192.168.0.0.
i have a feeling it is probably not related to the client software but i am not
really sure.
does anyone have any idea why this is happening?
thanks so much,
jason
Re: IP collision between local and remote networks
by Tanster on 2008-02-19 01:02:56 +0100
It kinda looks exactly the same to me. There's still no subnet mask (e.g.,
255.255.255.0) or CIDR (e.g. /24) info.
Now, if your subnet mask was, say, 255.255.0.0 (i.e., CIDR of /16) or
255.0.0.0 (i.e., CIDR of /8), then I can see where 192.168.0.0 and
192.168.7.0 would overlap. But if your subnet mask was 255.255.255.0
(i.e., CIDR of /24), which is what most class C subnets would use, then
192.168.0.0 and 192.168.7.0 would not overlap.
Since you didn't provide this info, there's no way to tell as far as I could see
just from network addresses alone. That's why I was wondering if there
was something I wasn't seeing here.
Re: IP collision between local and remote networks
by blst on 2008-02-19 04:50:30 +0100
sorry, i see what you mean now.
acually, this didn't seem to be the problem after all. what ended up being
wrong is that the "local IP in remote network" option was not checked. once
i changed this, it was all fine.
this doesn't make sense to me though. is the local address the one you
define in host endpoint or is it your local address outside the vpn?
thanks for any light you could shed on this. we used to have a less
sophisticated firewall and the mac vpn connections we sufficient and had
far less options.
--jason
Sonicwall tz170w and non-standard VPN Profile
Sonicwall tz170w and non-standard VPN Profile
by russ990 on 2008-02-16 17:03:40 +0100
I have a tz170w running enhanced OS. The default GroupVPN policy has
been configured to be used as our default L2TP server for windows clients.
I am trying to get IP Securitas to connect to a different VPN Profile, but I
can't figure out how to specify the VPN Profile to use. When I connect to
the Sonicwall, the logs indicate that is is always trying to connect to the
WAN GroupVPN. Is there a way to specify to IPSecuritas to tell it to use a
different profile?
I have attempted to configure the IPSecuritas side with the same parameters
as our default groupVPN, but that doesn't seem to want to connect.
Re: Sonicwall tz170w and non-standard VPN Profile
by JimPBarber on 2008-06-07 01:25:58 +0200
On the ID Tab set the Local Identifier to Key ID and enter the VPN Group ID
If you were connecting to the default group id it would be GroupVPN Just
enter the name of the new VPN you created.
Recommend me a VPN server
Recommend me a VPN server
by andy on 2008-02-19 11:23:56 +0100
Can you recommend a VPN server with firewall that IPSecuritas likes and is
featured in the preloads?
Thanks
Andy
Re: Recommend me a VPN server
by Forum Admin on 2008-02-21 21:12:50 +0100
Hello Andy,
I can recommend the following models, all of them can be setup very easily,
work very reliably in my test environment and support NAT-T (which is
important, if you want to connect from public W-LAN or mobile phone
networks):
- Zyxel ZyWall (e.g. P1 or ZyWall 5)
- Linksys WRV200
- Juniper Netscreen 5x or SSG models
- m0n0Wall (http://www.m0n0.ch) , for example on this platform
(http://www.pcengines.ch/alix.htm) - very flexible and powerful, needs
some tinkering, though
There is quite a range in price and features (besides VPN capability), best
choose what you need.
Please feel free to get in touch with me again if you need further
information.
Hope this helps,
Christoph
Re: Recommend me a VPN server
by andy on 2008-02-22 08:51:38 +0100
Thanks Christoph. I will be looking at several today. I might run some spec
by you if I may.
Cheers
Andy
Re: Recommend me a VPN server
by Forum Admin on 2008-02-22 19:58:22 +0100
Sure, anytime
Cheers,
Christoph
Connection Green, but not working - Leopard
Connection Green, but not working - Leopard
by neil456 on 2008-02-23 00:02:23 +0100
Mac os x 10.5.2. Can not ping or otherwise use the connection. Nothing
seems to work. Have tried all of the things mentioned in the forum for
Leopard. Reused the wizard to create a new connection.
If it helps I am out of the country, but can IM and Audio Conference without
the vpn to the home network. It was also working prior to upgrade to
Leopard and has worked from the same hotel outside the country prior to
leopard for sure. It also worked using my WAN cellular card prior to leaving
the country with Leopard. My WAN card does not work internationally so I
am trying to use the same config with wired ethernet.
How do I troubleshoot the problem?
Log:
IPSecuritas 3.1 build 1860, Mon Oct 15 22:03:05 CEST 2007, nadig
Darwin 8.10.1 Darwin Kernel Version 8.10.1: Wed May 23 16:33:00 PDT
2007; root:xnu-792.22.5~1/RELEASE_I386 i386
Feb 22, 16:55:42 Info
APP IPSec authenticating
Feb 22, 16:55:43 Info
APP IKE daemon started
Feb 22, 16:55:43 Info
APP IPSec started
Feb 22, 16:55:43 Error IKE Foreground mode.
Feb 22, 16:55:43 Info
IKE @(#)ipsec-tools CVS (http://ipsectools.sourceforge.net)
Feb 22, 16:55:43 Info
IKE @(#)This product linked OpenSSL 0.9.7l 28
Sep 2006 (http://www.openssl.org/)
Feb 22, 16:55:43 Info
IKE Reading configuration from "/Library
/Application Support/Lobotomo Software/IPSecuritas/racoon.conf"
Feb 22, 16:55:43 Info
IKE Resize address pool from 0 to 255
Feb 22, 16:55:43 Info
APP Initiated connection Bloomingdale AT&T Card
Feb 22, 16:55:43 Error IKE inappropriate sadb acquire message passed.
Feb 22, 16:55:47 Warning IKE No ID match.
Feb 22, 16:55:47 Info
IKE couldn't find the proper pskey, try to get one
by the peer's address.
Feb 22, 16:55:50 Info
APP Initiated connection Bloomingdale AT&T Card
Feb 22, 16:55:51 Info
IKE the packet is retransmitted by
76.223.254.88[500].
Feb 22, 16:55:57 Info
IKE the packet is retransmitted by
76.223.254.88[500].
Feb 22, 16:55:57 Info
IKE the packet is retransmitted by
76.223.254.88[500].
Feb 22, 16:56:02 Error IKE libipsec failed pfkey check (Invalid SA type)
Feb 22, 16:56:02 Info
IKE the packet is retransmitted by
76.223.254.88[500].
Feb 22, 16:56:02 Info
IKE the packet is retransmitted by
76.223.254.88[500].
Feb 22, 16:56:08 Info
IKE the packet is retransmitted by
76.223.254.88[500].
Feb 22, 16:56:08 Info
IKE the packet is retransmitted by
76.223.254.88[500].
Re: Connection Green, but not working - Leopard
by neil456 on 2008-02-24 15:19:42 +0100
OK, Touch down in Miami and everything works.
I am going back in 3 weeks and need to have this working. How do I
troubleshoot this?
Could be one of several possibilities?
1. Network is being filtered and some part of the VPN does not work. The
hotel network provider indicates they allow VPNs and have not had any
problems.
2. The method of securing internet access keeps the VPN from working.
You know the problem, browser comes up and you have to put in code to
get access to the hotel network.
3. Leopard is unreliable.
Any Ideas?
Re: Connection Green, but not working - Leopard
by neil456 on 2008-03-21 14:11:35 +0100
Solved :)
Need to get public IP from ISP. Now it works.
Why couldn't IP Securitas tell me it needed a public IP address?
Neil
Connecting to Nortel Contivity (DreamHost)
Connecting to Nortel Contivity (DreamHost)
by tuatara on 2008-02-23 02:19:45 +0100
DreamHost offers a VPN for customers. They're using Nortel Contivity.
There are a few mentions of this VPN type in the forums here, but mainly
seem to be unresolved issues. Has anyone successfully connected to this
VPN?
Nortel Contivity doesn't appear in IPSecuritas' setup wizard, so I'm trying to
configure it manually, using the rather brief info at the DreamHost wiki,
[url]http://wiki.dreamhost.com/KB_/_Account_Control_Panel_
/_VPN_Users[/url]. The main info they give is that it uses IPSec, ESP
(Encapsulated Security Payload) and AH (Authentication Header), encryption
is 3DES, key length is 168 bits (56 bits per DES cipher). (Is that key length
related to the DH Group option in IPSecuritas?) I've tried a few different
permutations with no luck so far.
Most recently, I tried it with the General tab set with IPSec Device
ant.cloudconnector.com, a dimmed-out local Endpoint Mode, a remote
Endpoint Mode set to Anywhere and DHCP Pass-Through enabled. The
Phase 1 tab has Lifetime of 1800 seconds, DH Group as 1024 (2),
Encryption as 3DES, Authentication as SHA-1 (I've also tried MD5), and the
rest left at their defaults (Main, Obey, and Nonce Size of 16).
I never seem to get past Phase 1. This is from the connection log, with
some hex data stripped (just in case my password is in there). I'm not
familiar with VPN setup so I may have missed something obvious. Hopefully
there's some data here that's useful. Thanks for any help!
Matt
[code]Feb 23, 14:01:11 Info
APP Initiated connection DreamHost VPN
Feb 23, 14:01:11 Debug IKE get pfkey ACQUIRE message
(Stripped hex data ...)
Feb 23, 14:01:11 Debug IKE suitable outbound SP found:
192.168.0.2/32[0] 0.0.0.0/0[0] proto=any dir=out.
Feb 23, 14:01:11 Debug IKE sub:0xbffff35c: 0.0.0.0/0[0]
192.168.0.2/32[0] proto=any dir=in
Feb 23, 14:01:11 Debug IKE db :0x108bf8: 0.0.0.0/0[0]
192.168.0.2/32[0] proto=any dir=in
Feb 23, 14:01:11 Debug IKE suitable inbound SP found: 0.0.0.0/0[0]
192.168.0.2/32[0] proto=any dir=in.
Feb 23, 14:01:11 Debug IKE new acquire 192.168.0.2/32[0] 0.0.0.0/0[0]
proto=any dir=out
Feb 23, 14:01:11 Debug IKE (proto_id=ESP spisize=4 spi=00000000
spi_p=00000000 encmode=Tunnel reqid=22:21)
Feb 23, 14:01:11 Debug IKE (trns_id=DES encklen=0
authtype=hmac-md5)
Feb 23, 14:01:11 Debug IKE (trns_id=3DES encklen=0
authtype=hmac-md5)
Feb 23, 14:01:11 Debug IKE (trns_id=AES encklen=256
authtype=hmac-md5)
Feb 23, 14:01:11 Debug IKE (trns_id=AES encklen=192
authtype=hmac-md5)
Feb 23, 14:01:11 Debug IKE (trns_id=AES encklen=128
authtype=hmac-md5)
Feb 23, 14:01:11 Debug IKE in post_acquire
Feb 23, 14:01:11 Debug IKE configuration found for 66.33.195.193.
Feb 23, 14:01:11 Info
IKE request for establishing IPsec-SA was queued
due to no phase1 found.
Re: Connecting to Nortel Contivity (DreamHost)
by tuatara on 2008-03-06 08:44:09 +0100
Any other info I can give? Is it reasonable to think IPSecuritas might work
with the Contivity system?
iPhone support?
iPhone support?
by unhitched on 2008-02-26 01:39:34 +0100
hey guys,
Will IPSECURITAS ever work on an iPhone or iPod touch?
cheers
Re: iPhone support?
by cnadig on 2008-02-26 18:39:44 +0100
Hello,
this depends on the capabilities and availability of the Apple's iPhone SDK.
There are definitely intentions to port IPSecuritas to the iPhone.
Cheers,
Christoph
Re: iPhone support?
by unhitched on 2008-02-26 23:46:58 +0100
hey,
thanks for the quick reply. I am a little confused over how the IPSECURITAS
product is... 'written'. Does it use the 'builtin' osx client which appears to
me to be only L2TP/PPTP or have you guys written some funky pure-IPSEC
feature-set to interact with or work over the top of OSX?
The reason I ask is I have a few Apple engineers I may be able to help
depending on the answers.
cheers
Re: iPhone support?
by cnadig on 2008-02-29 19:24:13 +0100
Hello,
IPSecuritas comes with its own version of racoon, the IKE daemon, and does
not use Apple's standard version of racoon (with 3.0, that is). The version
supplied with IPSecuritas is based on the ipsec-tools rather than the KAME
project and has a few extensions for NAT-T, ModeCfg support for certain
firewall vendors as well as Checkpoint specific extensions.
The rest of IPSecuritas is written in Objective-C using Cocoa.
Any help for porting this to the iPhone is highly appreciated, of course.
Cheers,
Christoph
Netgear FVG318
Netgear FVG318
by Tanster on 2008-02-28 00:07:44 +0100
Does anybody out there have an Netgear FVG318 that can help me? I'm
getting this issue where a setting of 0.0.0.0 or "Any" for the remote IP in
the VPN policy (for traveling users whose IPs cannot be determined until
activation time) results in everybody in the LAN losing connectivity to the
Internet and each other. But all of them can ping the remote user using
IPSecuritas 3.1. According to all the articles I've read in the Netgear KB, the
remote IP setting of "Any" is correct. But it doesn't quite work in reality.
The problem smacks to me of a routing issue but I can't figure out how to
rectify on the FVG318 side since this problem occurs even if I just activate
the VPN Policy but without any VPN tunnels active. Basically, I think I
somehow need to specify that all packets intended for the remote user go
through the VPN but everything else go through the FVG318's LAN port
(and thereby either resent through the local LAN or out through the WAN
port). But no other router such as ZyWALL or SonicWall has ever required
me to do this manually. Does the FVG318 require special static routes set
up manually?
Sonicwall 3060 Enhanced
Sonicwall 3060 Enhanced
by TeckboyNY on 2008-02-29 02:20:03 +0100
Anyone get it to work with a 3060 enhanced model?
Just curious.
Re: Sonicwall 3060 Enhanced
by megamiles on 2008-03-07 23:00:21 +0100
Hello TeckboyNY
Suffering with the same problem on our SonicWall Pro box. Have started a
new post, but solution if found will certainly assist you in connecting.
Regards
Re: Sonicwall 3060 Enhanced
by el_doctor on 2008-03-18 14:46:20 +0100
I'm working with a 2040 Pro Enhanced. If I follow the setup wizard with
SonicWall model and Sonic Pro selection, it dosen't work. I tried with the
TZ170 pre-configuration setup wizard and it works!!!
Re: Sonicwall 3060 Enhanced
by andyfram on 2008-03-21 19:24:04 +0100
I'm also using the 3060Pro Enhanced and can't get it to work.
I have the following in the logs if this means anything to anyone:
ERROR IKE inappropriate sadb acquire message passed.
ERROR IKE delete phase1 handle.
ERROR IKE delete phase1 handle.
Initiated Connection
delete phase1 handle
Initiated Connection
delete phase1 handle
ERROR IKE phase2 negotiation failed due to time up waiting for phase1.
It repeats that a few times and then says:
Warning APP giving up.
Re: Sonicwall 3060 Enhanced
by JimPBarber on 2008-06-07 00:44:03 +0200
You can get it working but you have to drop XAUTH.... It is broken between
sonicwall and ipsecuratas and causes a hang in phase2 negotiation.
Just turn off xauth.
I am a CSSA and it took me a couple of days to work it all out.
Here are the settings.
[color=#003366]SonicWall WAN GroupVPN:[/color]
[color=#003399][b]General Tab:[/b][i][/i][highlight][/highlight][/color]
Authentication Method: IKE using Preshared Secret
Name: WAN GroupVPN
Shared Secret: <your shared secret>
[color=#003366][b]Proposals Tab:[/b][/color]
[u][color=#003399][b]IKE (Phase 1) Proposal[/b][/color][/u]
[u]DH Group:[/u] Group 2
[u]Encryption:[/u] 3DES
[u]Athentication:[/u] Sha1
[u]Lifetime: [/u]28800
[color=#003399][u][b]Ipsec (Phase 2) Proposal[/b][/u][/color]
[u]Protocol: [/u]ESP
[u]Encryption:[/u] 3DES
[u]Authentication:[/u] Sha1
[b]Enable Perfect Forward Secrecy [unchecked][/b]
[u]Life Time[/u] (seconds): 28800
[color=#003366][u][b]Advanced Settings Tab:[/b][/u][/color]
[i][color=#003366][u](Optional)[/u][/color][/i]
[x]Enable Windows Networking (NetBIOS) Broadcast
[x]Enable Multicast
Management via this SA: [] HTTP [] HTTPS [] SSH
Default Gateway:
0.0.0.0
Client Authentication
[] Require Authentication of VPN Clients via XAUTH
User Group for XAUTH users: Greyed out
Allow Unauthenticated VPN Client Access: <network of your choice>
[u][color=#003366][b]Client Tab:[/b][/color][/u]
[u][color=#003366]User Name and Password Caching[/color][/u]
Cache XAUTH User Name and Password on Client: How you want it. <mine
Re: Sonicwall 3060 Enhanced
by jessica on 2008-09-17 03:53:11 +0200
I was able to get this to work with XAuth. Here's my setup:
SonicWALL Pro3060, OS Enhanced 4.0.0.2-51e
DHCP on, WAN GroupVPN with default settings (shown in detail in
[URL="http://www.equinux.com/cms_components/media
/vpnt/VPNT_Interop_Howtos/1065/SonicOS_Enhanced-5-EN.pdf"]VPN
Tracker's guide[/URL])
IPSecuritas 3.1, running on OS 10.5.4, settings as follows:
Remote IPSec Device: SonicWALL's external address
Local Endpoint Mode: Host, blank
Remote Endpoint Mode: Network, 10.1.10.0, 24 (of course yours will be
different)
Phase 1: 28800 sec, 1024(2), 3DES, SHA-1, Agressive, Claim, 16
Phase 2: 28800 sec, none, checked: DES, 3DES, HMAC MD5, HMAC SHA-1
ID: Address, Address, XAuth PSK, with my info entered
Options Checked: IPSec, SIT, Initial Cont, Request Cert, Send Cert, Unique
SAs, IKE Frag; NAT-T Enabled
I got it working without XAuth first, then crossed my fingers and re-enabled
it, and it worked. Hopefully it will work for others, as well. Saves me $120
for VPN Tracker!
AT&T Global Network Client
AT&T Global Network Client
by drgonzo2k2 on 2008-03-04 05:38:20 +0100
Greetings,
My company makes us use AT&T Global Network Client on PCs to connect
remotely to their VPN. They offer absolutely no Mac support, and those of
us with Mac laptops are left out in the cold. I was wondering if anyone had
used this software as a replacement for the AT&T software, and if so how
did you set it up to work properly? Any help would be appreciated.
Work with IPSecuritas from the command line
Work with IPSecuritas from the command line
by sologroupmc on 2008-03-04 23:28:49 +0100
Is it possible to work with IPS from the command line?
We do a lot of remote terminal work and it would be nice to be able to
initiate/sever a connection using terminal. We could also then use bash
scripting to automate tasks.
Thanks!
Re: Work with IPSecuritas from the command line
by Forum Admin on 2008-03-04 23:35:46 +0100
Hello,
we were actually thinking about a command line version, but would
appreciate any input on the requirements of such a tool (how would you
want to use it etc.)
Thank you very much,
Christoph
Re: Work with IPSecuritas from the command line
by sologroupmc on 2008-03-05 00:12:35 +0100
A CLI version would be fantastic. I'll post some usage/feature requests
here, let me know if you would like me to post them elsewhere (issue
tracker, etc.)
We use IPS for some of our client installations of software, establishing a
VPN to our servers for subversion and file xfer access.
So for us, a typical use would be to create the SA, export to a file, deploy to
client workstation and configure IPS. It would be good if this was a CLI
procedure, but not critical. It would be nice to create a package installer
and deploy with ARD, or using SSH, but again, not critical.
The crucial part for us is deployment and updates to software. We would
like to ssh to the client machine (or have a script perform) a vpn connection
to our servers. then we could perform via CLI the svn updates, etc. When
done, we could tear-down the tunnel and close ssh.
So in this case, the CLI version would only have to create and tear-down the
tunnel. Some feedback on the connection would be good. But really, just
the basics to start out.
It would be much better for us to not have to use ARD/Timbuktu each time
we need to connect.
Thanks Christoph for a truly wonderful piece of software.
SonicWall connections
SonicWall connections
by megamiles on 2008-03-06 23:28:57 +0100
Hello all,
I am trying to make a connection to a SonicWall Pro Firewall (could be any
SonicWall Pro model, 2040, 3060 etc) using Lobomoto 3.1 on Mac 10.5.2
(Intel)
Have followed configurations, have correct VPN parameters etc, but fails
Phase 1.
Transcript of log follows if anyone can help......
IPSecuritas 3.1 build 1860, Mon Oct 15 22:03:05 CEST 2007, nadig
Darwin 8.10.1 Darwin Kernel Version 8.10.1: Wed May 23 16:33:00 PDT
2007; root:xnu-792.22.5~1/RELEASE_I386 i386
Mar 06, 20:45:18 Info
APP Smart Environment Detection enabled
Mar 06, 20:45:18 Info
APP Smart Environment Detection: No
environment found, reconfiguration
Mar 06, 22:13:06 Info
APP IPSec authenticating
Mar 06, 22:13:06 Info
APP IKE daemon started
Mar 06, 22:13:06 Info
APP IPSec started
Mar 06, 22:13:06 Info
APP Initiated connection XXXXX VPN
Mar 06, 22:13:06 Error IKE Foreground mode.
Mar 06, 22:13:06 Info
IKE @(#)ipsec-tools CVS (http://ipsectools.sourceforge.net)
Mar 06, 22:13:06 Info
IKE @(#)This product linked OpenSSL 0.9.7l 28
Sep 2006 (http://www.openssl.org/)
Mar 06, 22:13:06 Info
IKE Reading configuration from "/Library
/Application Support/Lobotomo Software/IPSecuritas/racoon.conf"
Mar 06, 22:13:06 Info
IKE Resize address pool from 0 to 255
Mar 06, 22:13:13 Info
APP Initiated connection XXXXX VPN
Mar 06, 22:13:20 Info
APP Initiated connection XXXXX VPN
Mar 06, 22:13:27 Info
APP Initiated connection XXXXX VPN
Mar 06, 22:13:34 Info
APP Initiated connection XXXXX VPN
Mar 06, 22:13:34 Error IKE inappropriate sadb acquire message passed.
Mar 06, 22:13:39 Warning APP Connection XXXXX VPN timed out
Mar 06, 22:13:39 Warning APP Giving up
Mar 06, 22:14:47 Info
APP IPSec stopping
Mar 06, 22:14:48 Info
APP IKE daemon terminated
Mar 06, 22:14:48 Info
APP IPSec stopped
Have tried with VPN Tracker 5 in demo mode, and made a connection
immediately and could browse remote network, use the beta Microsoft RDP
client to link to a Windows Terminal Server.
Looked at VPN Tracker Log, and could see a lot of stuff going on, I can post
this if this would help find a solution.
Clearly, I would like to use the Lobotomo IPSecuritas
Thanks
Re: SonicWall connections
by cnadig on 2008-03-07 10:13:08 +0100
Hello,
setting the log level to debug (in IPSecuritas' preferences) will reveal more
information. From what I see in this log, there does not seem to be an
answer from the remote side, but the detailed log will give more
information on which part the negotiation fails.
Cheers,
Christoph
Re: SonicWall connections
by megamiles on 2008-03-07 22:57:15 +0100
Hello Christophe,
Many thanks for the quick post.
A little bit of info, which may be obvious, the remote network and my home
network are NAT'ed
The remote network firewall is a SonicWall Pro 2040 (Enhanced software)
which has a public IP, which has been replaced with xxx.xxx.xxx.xxx, but
is reachable by the software.
As advised VPN Tracker 5 works straight of the bat, with the same Phase 1 /
Phase 2 settings and basic IP info. Also my Windows XP system (using the
SonicWall Global VPN Client) connects no problems.
Debug log is too long to attach, and exceeds the 5500 character limit...
please advise how to attach this. Can offer to send via e-mail as a PDF
Many thanks
Re: SonicWall connections
by diwa on 2008-04-06 16:28:10 +0200
Hi,
since I am facing the same error, I am posting in this thread instead of
creating a new one.
I have a SonicWall Pro 230, to which I was able to connect using my
Macbook Pro running OS 10.4 and an older version of IPSecuritas.
After upgrading to Leopard (now 10.5.2), I was installing IPSecuritas 3.1
(Build 1860), but I fail to connect to my SonicWall.
As megamiles describes, I am able to connect using VPN Tracker 5 with the
same settings as for IPSecuritas...
Here's my debug-level log:
IPSecuritas 3.1 build 1860, Mon Oct 15 22:03:05 CEST 2007, nadig
Darwin 8.10.1 Darwin Kernel Version 8.10.1: Wed May 23 16:33:00 PDT
2007; root:xnu-792.22.5~1/RELEASE_I386 i386
Apr 06, 16:20:16 Debug APP State change from IDLE to
AUTHENTICATING after event START
Apr 06, 16:20:16 Info
APP IPSec authenticating
Apr 06, 16:20:16 Info
APP IKE daemon started
Apr 06, 16:20:16 Debug APP State change from AUTHENTICATING to
RUNNING after event TIMER
Apr 06, 16:20:16 Info
APP IPSec started
Apr 06, 16:20:16 Debug APP Received SADB message type
X_SPDUPDATE - not interesting
Apr 06, 16:20:16 Debug APP Received SADB message type
X_SPDUPDATE - not interesting
Apr 06, 16:20:16 Info
IKE Foreground mode.
Apr 06, 16:20:16 Info
IKE @(#)ipsec-tools CVS (http://ipsectools.sourceforge.net)
Apr 06, 16:20:16 Info
IKE @(#)This product linked OpenSSL 0.9.7l 28
Sep 2006 (http://www.openssl.org/)
Apr 06, 16:20:16 Info
IKE Reading configuration from "/Library
/Application Support/Lobotomo Software/IPSecuritas/racoon.conf"
Apr 06, 16:20:16 Info
IKE Resize address pool from 0 to 255
Apr 06, 16:20:16 Debug IKE lifetime = 28800
Apr 06, 16:20:16 Debug IKE lifebyte = 0
Apr 06, 16:20:16 Debug IKE encklen=0
Apr 06, 16:20:16 Debug IKE p:1 t:1
Apr 06, 16:20:16 Debug IKE 3DES-CBC(5)
Apr 06, 16:20:16 Debug IKE SHA(2)
Apr 06, 16:20:16 Debug IKE 1024-bit MODP group(2)
Apr 06, 16:20:16 Debug IKE pre-shared key(1)
Apr 06, 16:20:16 Debug IKE hmac(modp1024)
Apr 06, 16:20:16 Debug IKE compression algorithm can not be checked
because sadb message doesn't support it.
Apr 06, 16:20:16 Debug IKE parse successed.
Apr 06, 16:20:16 Debug IKE open /Library/Application
Support/Lobotomo Software/IPSecuritas/admin.sock as racoon
management.
Apr 06, 16:20:16 Info
IKE 192.168.0.202[4500] used as isakmp port
(fd=6)
Apr 06, 16:20:16 Info
IKE 192.168.0.202[500] used as isakmp port
(fd=7)
Apr 06, 16:20:16 Debug IKE get pfkey X_SPDDUMP message
Apr 06, 16:20:16 Debug IKE 02120000 0f000200 01000000 bb050000
03000500 ff180000 10020000 c0a80200
Apr 06, 16:20:16 Debug IKE 00000000 00000000 03000600 ff200000
10020000 c0a800ca 00000000 00000000
Re: SonicWall connections
by diwa on 2008-04-06 16:28:52 +0200
Apr 06, 16:20:17 Debug IKE suitable outbound SP found:
192.168.0.202/32[0] 192.168.2.0/24[0] proto=any dir=out.
Apr 06, 16:20:17 Debug IKE sub:0xbffff67c: 192.168.2.0/24[0]
192.168.0.202/32[0] proto=any dir=in
Apr 06, 16:20:17 Debug IKE db :0x108c28: 192.168.2.0/24[0]
192.168.0.202/32[0] proto=any dir=in
Apr 06, 16:20:17 Debug IKE suitable inbound SP found: 192.168.2.0/24[0]
192.168.0.202/32[0] proto=any dir=in.
Apr 06, 16:20:17 Debug IKE new acquire 192.168.0.202/32[0]
192.168.2.0/24[0] proto=any dir=out
Apr 06, 16:20:17 Debug IKE (proto_id=ESP spisize=4 spi=00000000
spi_p=00000000 encmode=Tunnel reqid=0:0)
Apr 06, 16:20:17 Debug IKE (trns_id=3DES encklen=0
authtype=hmac-sha)
Apr 06, 16:20:17 Debug IKE in post_acquire
Apr 06, 16:20:17 Debug IKE configuration found for 192.168.0.220.
Apr 06, 16:20:17 Info
IKE IPsec-SA request for 192.168.0.220 queued due
to no phase1 found.
Apr 06, 16:20:17 Debug IKE ===
Apr 06, 16:20:17 Info
IKE initiate new phase 1 negotiation:
192.168.0.202[500]<=>192.168.0.220[500]
Apr 06, 16:20:17 Info
IKE begin Aggressive mode.
Apr 06, 16:20:17 Debug IKE new cookie:
Apr 06, 16:20:17 Debug IKE 152f943f37bb765a
Apr 06, 16:20:17 Debug IKE use ID type of IPv4_address
Apr 06, 16:20:17 Debug IKE compute DH's private.
Apr 06, 16:20:17 Debug IKE 4cbdf7e5 6b3d95a2 7f74fb3b 4d59c9dc
546fbe97 846eb042 bfe382d0 bdd5067c
Apr 06, 16:20:17 Debug IKE f81af96f dfd5a1a3 f58077f7 988fe2fd
8ff2aa78 50e0337a 24f6b86f 2b798d08
Apr 06, 16:20:17 Debug IKE abddfc0a cb1b4eb6 37f49011 c10b8a79
be73ec5a 1c915b15 77b50d3c b6559693
Apr 06, 16:20:17 Debug IKE 188dff70 6348f6d0 74acd4bb 5492305f
334abeb5 5c801a01 19ea9fb0 eddd6fde
Apr 06, 16:20:17 Debug IKE compute DH's public.
Apr 06, 16:20:17 Debug IKE 0e2ce8b4 e7bd1302 a9be84f8 16c827b9
ab07327e e30199a7 efe2cd3c 345b2676
Apr 06, 16:20:17 Debug IKE cf97d6a5 73fcad2c 842e35b7 e9b27f77
03631fbd 112137f8 fd260e80 8a6c8c31
Apr 06, 16:20:17 Debug IKE 53b391fd 63179c33 0605f5a9 6f04b37e
aa375613 bf953f87 a1ba5ba7 9d5f956a
Apr 06, 16:20:17 Debug IKE a0bee2e3 0be905dd a9d801fb 3b3b45b8
419ac03e c6ed1d3f 5129fda7 d1ddc34d
Apr 06, 16:20:17 Debug IKE authmethod is pre-shared key
Apr 06, 16:20:17 Debug IKE add payload of len 48, next type 4
Apr 06, 16:20:17 Debug IKE add payload of len 128, next type 10
Apr 06, 16:20:17 Debug IKE add payload of len 16, next type 5
Apr 06, 16:20:17 Debug IKE add payload of len 8, next type 13
Apr 06, 16:20:17 Debug IKE add payload of len 16, next type 13
Apr 06, 16:20:17 Debug IKE add payload of len 16, next type 13
Apr 06, 16:20:17 Debug IKE add payload of len 16, next type 13
Apr 06, 16:20:17 Debug IKE add payload of len 16, next type 13
Apr 06, 16:20:17 Debug IKE add payload of len 16, next type 13
Apr 06, 16:20:17 Debug IKE add payload of len 16, next type 13
Apr 06, 16:20:17 Debug IKE add payload of len 16, next type 13
Apr 06, 16:20:17 Debug IKE add payload of len 16, next type 13
Apr 06, 16:20:17 Debug IKE add payload of len 16, next type 13
Apr 06, 16:20:17 Debug IKE add payload of len 16, next type 13
Apr 06, 16:20:17 Debug IKE add payload of len 16, next type 13
Apr 06, 16:20:17 Debug IKE add payload of len 16, next type 0
Apr 06, 16:20:17 Debug IKE 484 bytes from 192.168.0.202[500] to
Re: SonicWall connections
by diwa on 2008-04-06 16:30:09 +0200
Apr 06, 16:20:17 Debug IKE 02060003 26000000 7a000000 00000000
03000500 ff200000 10020000 c0a800ca
Apr 06, 16:20:17 Debug IKE 00000000 00000000 03000600 ff200000
10020000 c0a800dc 00000000 00000000
Apr 06, 16:20:17 Debug IKE 02001200 02000200 9b000000 00000000
1c000d00 20000000 00030000 00000000
Apr 06, 16:20:17 Debug IKE 00010008 00000000 01000000 01000000
00000000 00000000 00000000 00000000
Apr 06, 16:20:17 Debug IKE 00000000 00000000 80510100 00000000
80700000 00000000 00000000 00000000
Apr 06, 16:20:17 Debug IKE 00040000 00000000 0001c001 00000000
01000000 01000000 00000000 00000000
Apr 06, 16:20:17 Debug IKE 00000000 00000000 00000000 00000000
80510100 00000000 80700000 00000000
Apr 06, 16:20:17 Debug IKE 00000000 00000000 000c0000 00000000
00010001 00000000 01000000 01000000
Apr 06, 16:20:17 Debug IKE 00000000 00000000 00000000 00000000
00000000 00000000 80510100 00000000
Apr 06, 16:20:17 Debug IKE 80700000 00000000 00000000 00000000
Apr 06, 16:20:17 Debug IKE ignore the acquire because ph2 found
Apr 06, 16:20:17 Debug IKE ===
Apr 06, 16:20:17 Debug IKE 360 bytes message received from
192.168.0.220[500] to 192.168.0.202[500]
Apr 06, 16:20:17 Debug IKE 152f943f 37bb765a 82a0c6e5 960b3c7c
01100400 00000000 00000168 04000034
Apr 06, 16:20:17 Debug IKE 00000001 00000001 00000028 01010001
00000020 01010000 80010005 80020002
Apr 06, 16:20:17 Debug IKE 80040002 80030001 800b0001 800c7080
0d000084 0f0d72dc 606be9c1 ec45b697
Apr 06, 16:20:17 Debug IKE 2aa873b0 a4ee9911 13047e1a aa28344a
c39d2792 51e4618c ec69b354 6af345f1
Apr 06, 16:20:17 Debug IKE 652b12ac f72b550b 1fc9f0c3 c888a710
14dbc636 5eebe9a7 ca885aad b0d0fbf3
Apr 06, 16:20:17 Debug IKE 933552e8 ec9cdbfe 6ec80536 548f9b3b
c5917c67 167a2680 73555427 37b5f211
Apr 06, 16:20:17 Debug IKE 92e08bc1 f8f11379 a74be7ba 6e7ccc17
8d3dc51d 82000014 4485152d 18b6bbcd
Apr 06, 16:20:17 Debug IKE 0be8a846 9579ddcc 82000018 fe2f1c61
46808848 594cf99a a084781f 31831a0a
Apr 06, 16:20:17 Debug IKE 0a000018 ec6f0e75 925e5b1e 682c239f
435d5834 032c003d 05000018 ad2b0f4d
Apr 06, 16:20:17 Debug IKE 3cc39629 0196fcaf 0f1711c2 5280ae2f
0d000014 03000000 30303430 31303138
Apr 06, 16:20:17 Debug IKE 36333631 0800000c 404bf439 522ca3f6
00000018 c348eaf2 8063e979 e5df3b17
Apr 06, 16:20:17 Debug IKE 3d890a8b 2f492be1
Apr 06, 16:20:17 Debug IKE begin.
Apr 06, 16:20:17 Debug IKE seen nptype=1(sa)
Apr 06, 16:20:17 Debug IKE seen nptype=4(ke)
Apr 06, 16:20:17 Debug IKE seen nptype=13(vid)
Apr 06, 16:20:17 Debug IKE seen nptype=130(nat-d)
Apr 06, 16:20:17 Debug IKE seen nptype=130(nat-d)
Apr 06, 16:20:17 Debug IKE seen nptype=10(nonce)
Apr 06, 16:20:17 Debug IKE seen nptype=5(id)
Apr 06, 16:20:17 Debug IKE seen nptype=13(vid)
Apr 06, 16:20:17 Debug IKE seen nptype=8(hash)
Apr 06, 16:20:17 Debug IKE succeed.
Apr 06, 16:20:17 Info
IKE received Vendor ID: draft-ietf-ipsec-nat-tike-00
Apr 06, 16:20:17 Debug IKE received unknown Vendor ID
Apr 06, 16:20:17 Debug IKE 404bf439 522ca3f6
Re: SonicWall connections
by diwa on 2008-04-06 16:31:17 +0200
Apr 06, 16:20:17 Debug IKE hashtype = SHA:SHA
Apr 06, 16:20:17 Debug IKE authmethod = pre-shared key:pre-shared key
Apr 06, 16:20:17 Debug IKE dh_group = 1024-bit MODP group:1024-bit
MODP group
Apr 06, 16:20:17 Debug IKE an acceptable proposal found.
Apr 06, 16:20:17 Debug IKE hmac(modp1024)
Apr 06, 16:20:17 Debug IKE agreed on pre-shared key auth.
Apr 06, 16:20:17 Info
IKE Selected NAT-T version: draft-ietf-ipsec-nat-tike-00
Apr 06, 16:20:17 Info
IKE Hashing 192.168.0.202[500] with algo #2
Apr 06, 16:20:17 Debug IKE hash(sha1)
Apr 06, 16:20:17 Info
IKE NAT-D payload #-1 verified
Apr 06, 16:20:17 Info
IKE Hashing 192.168.0.220[500] with algo #2
Apr 06, 16:20:17 Debug IKE hash(sha1)
Apr 06, 16:20:17 Info
IKE NAT-D payload #0 verified
Apr 06, 16:20:17 Info
IKE NAT not detected
Apr 06, 16:20:17 Debug IKE compute DH's shared.
Apr 06, 16:20:17 Debug IKE bab5179f 23f21b7d 0a451794 63586729
19364cdf 824ec5c4 bd6bc3c9 37ff151c
Apr 06, 16:20:17 Debug IKE db6ca3ec d525de68 71ca6cbf d738e5db
8ccb7028 951eefcb 44e56113 ecc0aed7
Apr 06, 16:20:17 Debug IKE 57c4ecf1 e3a43504 921734ec 8ef93f5b
d8f127b0 f8016084 ed2c3a7a 80b119f5
Apr 06, 16:20:17 Debug IKE 30d6ad5c 71a4c038 5caad69d c487b164
c8b84613 f07398a0 4442ad9e fa242f92
Apr 06, 16:20:17 Info
IKE couldn't find the proper pskey, try to get one by
the peer's address.
Apr 06, 16:20:17 Debug IKE the psk found.
Apr 06, 16:20:17 Debug IKE psk: 2008-04-06 16:20:17: DEBUG2:
Apr 06, 16:20:17 Debug IKE 4c656e6e 61726439 39
Apr 06, 16:20:17 Debug IKE nonce 1: 2008-04-06 16:20:17: DEBUG:
Apr 06, 16:20:17 Debug IKE ce256712 97667fd8 9deaf391 8e9903e2
Apr 06, 16:20:17 Debug IKE nonce 2: 2008-04-06 16:20:17: DEBUG:
Apr 06, 16:20:17 Debug IKE ad2b0f4d 3cc39629 0196fcaf 0f1711c2
5280ae2f
Apr 06, 16:20:17 Debug IKE hmac(hmac_sha1)
Apr 06, 16:20:17 Debug IKE SKEYID computed:
Apr 06, 16:20:17 Debug IKE af696726 5a8b7477 7168bc1a f926fd04
cd546421
Apr 06, 16:20:17 Debug IKE hmac(hmac_sha1)
Apr 06, 16:20:17 Debug IKE SKEYID_d computed:
Apr 06, 16:20:17 Debug IKE 60d88d5f addadb88 29f703ed c950571f
61db2d67
Apr 06, 16:20:17 Debug IKE hmac(hmac_sha1)
Apr 06, 16:20:17 Debug IKE SKEYID_a computed:
Apr 06, 16:20:17 Debug IKE ffd3212f 9167c672 2666decb 2115b219
f4bfe04c
Apr 06, 16:20:17 Debug IKE hmac(hmac_sha1)
Apr 06, 16:20:17 Debug IKE SKEYID_e computed:
Apr 06, 16:20:17 Debug IKE 4c17b236 dbd6f454 92233793 f54a27aa
91dcbf1d
Apr 06, 16:20:17 Debug IKE encryption(3des)
Apr 06, 16:20:17 Debug IKE hash(sha1)
Apr 06, 16:20:17 Debug IKE len(SKEYID_e) < len(Ka) (20 < 24), generating
long key (Ka = K1 | K2 | ...)
Apr 06, 16:20:17 Debug IKE hmac(hmac_sha1)
Apr 06, 16:20:17 Debug IKE compute intermediate encryption key K1
Apr 06, 16:20:17 Debug IKE 00
Apr 06, 16:20:17 Debug IKE 71689e10 67bbc8f4 f659fab4 42669621
9626574c
Apr 06, 16:20:17 Debug IKE hmac(hmac_sha1)
Re: SonicWall connections
by diwa on 2008-04-06 16:32:04 +0200
Apr 06, 16:20:17 Debug IKE HASH (init) computed:
Apr 06, 16:20:17 Debug IKE c348eaf2 8063e979 e5df3b17 3d890a8b
2f492be1
Apr 06, 16:20:17 Debug IKE HASH for PSK validated.
Apr 06, 16:20:17 Debug IKE ===
Apr 06, 16:20:17 Debug IKE generate HASH_I
Apr 06, 16:20:17 Debug IKE HASH with:
Apr 06, 16:20:17 Debug IKE 0e2ce8b4 e7bd1302 a9be84f8 16c827b9
ab07327e e30199a7 efe2cd3c 345b2676
Apr 06, 16:20:17 Debug IKE cf97d6a5 73fcad2c 842e35b7 e9b27f77
03631fbd 112137f8 fd260e80 8a6c8c31
Apr 06, 16:20:17 Debug IKE 53b391fd 63179c33 0605f5a9 6f04b37e
aa375613 bf953f87 a1ba5ba7 9d5f956a
Apr 06, 16:20:17 Debug IKE a0bee2e3 0be905dd a9d801fb 3b3b45b8
419ac03e c6ed1d3f 5129fda7 d1ddc34d
Apr 06, 16:20:17 Debug IKE 0f0d72dc 606be9c1 ec45b697 2aa873b0
a4ee9911 13047e1a aa28344a c39d2792
Apr 06, 16:20:17 Debug IKE 51e4618c ec69b354 6af345f1 652b12ac
f72b550b 1fc9f0c3 c888a710 14dbc636
Apr 06, 16:20:17 Debug IKE 5eebe9a7 ca885aad b0d0fbf3 933552e8
ec9cdbfe 6ec80536 548f9b3b c5917c67
Apr 06, 16:20:17 Debug IKE 167a2680 73555427 37b5f211 92e08bc1
f8f11379 a74be7ba 6e7ccc17 8d3dc51d
Apr 06, 16:20:17 Debug IKE 152f943f 37bb765a 82a0c6e5 960b3c7c
00000001 00000001 00000028 01010001
Apr 06, 16:20:17 Debug IKE 00000020 01010000 800b0001 800c7080
80010005 80030001 80020002 80040002
Apr 06, 16:20:17 Debug IKE 011101f4 c0a800ca
Apr 06, 16:20:17 Debug IKE hmac(hmac_sha1)
Apr 06, 16:20:17 Debug IKE HASH (init) computed:
Apr 06, 16:20:17 Debug IKE f3a7b6cf 36279e72 6dec6ac3 7fa23fac
f00ec507
Apr 06, 16:20:17 Info
IKE Adding remote and local NAT-D payloads.
Apr 06, 16:20:17 Info
IKE Hashing 192.168.0.220[500] with algo #2
Apr 06, 16:20:17 Debug IKE hash(sha1)
Apr 06, 16:20:17 Info
IKE Hashing 192.168.0.202[500] with algo #2
Apr 06, 16:20:17 Debug IKE hash(sha1)
Apr 06, 16:20:17 Debug IKE add payload of len 20, next type 130
Apr 06, 16:20:17 Debug IKE add payload of len 20, next type 130
Apr 06, 16:20:17 Debug IKE add payload of len 20, next type 0
Apr 06, 16:20:17 Debug IKE 100 bytes from 192.168.0.202[500] to
192.168.0.220[500]
Apr 06, 16:20:17 Debug IKE sockname 192.168.0.202[500]
Apr 06, 16:20:17 Debug IKE send packet from 192.168.0.202[500]
Apr 06, 16:20:17 Debug IKE send packet to 192.168.0.220[500]
Apr 06, 16:20:17 Debug IKE 1 times of 100 bytes message will be sent to
192.168.0.220[500]
Apr 06, 16:20:17 Debug IKE 152f943f 37bb765a 82a0c6e5 960b3c7c
08100400 00000000 00000064 82000018
Apr 06, 16:20:17 Debug IKE f3a7b6cf 36279e72 6dec6ac3 7fa23fac
f00ec507 82000018 ec6f0e75 925e5b1e
Apr 06, 16:20:17 Debug IKE 682c239f 435d5834 032c003d 00000018
fe2f1c61 46808848 594cf99a a084781f
Apr 06, 16:20:17 Debug IKE 31831a0a
Apr 06, 16:20:17 Debug IKE compute IV for phase2
Apr 06, 16:20:17 Debug IKE phase1 last IV:
Apr 06, 16:20:17 Debug IKE e45ad0b6 44d229a5 bcdf2e11
Apr 06, 16:20:17 Debug IKE hash(sha1)
Apr 06, 16:20:17 Debug IKE encryption(3des)
Apr 06, 16:20:17 Debug IKE phase2 IV computed:
Apr 06, 16:20:17 Debug IKE c6fc9684 98910dcf
Re: SonicWall connections
by megamiles on 2008-04-06 16:47:07 +0200
Hello Diwa,
Thanks for the contribution. I have in fact sent a copy of my full debug log
to the Lobotomo support e-mail, as I faced a post log limit. Clearly I could
have spanned a few reply posts as you did ;)
It would be good to know if OS X 10.5.2 can be made to work with
SonicWall Pro devices as this could point to problems with the OS. Other
posts seem to imply 10.4.x was OK, and only Leopard users have problems.
As stated, VPN Tracker 5 does work, but uses its own XAUTH extended
authentication routine, so this is where I suspect problems are for
Lobotomo. Only problem now is my evaluation phase on VPN Tracker has
finished, so I'm back connecting via a Windows box :(
Some relief may be hand, if your SonicWall Pro is connected to a SonicWall
SSL Appliance. Firmware version 2.5 (released 22 October 07) allows Mac
OS X to also use NetExtender.
It would seem the problem can be solved as VPN Tracker does work. If the
developers need a SonicWall Pro box to try and connect to, let me know and
I will see what can be done.
Many thanks, megamiles
Re: SonicWall connections
by diwa on 2008-04-06 17:10:54 +0200
[quote author=megamiles link=1204842537/0#8 date=1207493227]
As stated, VPN Tracker 5 does work, but uses its own XAUTH extended
authentication routine, so this is where I suspect problems are for
Lobotomo.
[/quote]
I unmarked the "Use Extended Authentication" box...
[quote author=megamiles link=1204842537/0#8 date=1207493227]
Some relief may be hand, if your SonicWall Pro is connected to a SonicWall
SSL Appliance.
[/quote]
My SonicWall is connected to a Netgear DG834GB WLAN DSL ROUTER
But It doesn't matter.
VPN using IPSecuritas is not working if I try to connect from the Internet,
nor if I connect the WAN-Port of the sonicwall to my LAN...
Ciao
Dirk
Re: SonicWall connections
by megamiles on 2008-04-06 17:36:30 +0200
Hello Diwa,
Just comparing my VPN Tracker 5 logs when connection to the company
SonicWall Pro, does show that there is an extended authentication phase
occurring, so I concluded it is necessary to check this option.
The SonicWall SSL Appliance, is another 19" rack unit that sits with the
SonicWall Pro Firewall, and hands off the SSL activity to the SSL Appliance
box. Its not an attractive solution, and I just don't know why the basic
SonicWall Pro's can be updated (firmwave and some $$$) to run IPSec or
SSL. It just seems to me the SSL Appliance is away of getting more $$$.
Anyway, this does not resolve the Lobotomo connection issues via IPSec to
a SonicWall Pro.
It would be good to know if anyone has been successful using OS X 10.5.x
(10.5.2 ideally)
Many thanks, megamiles
Re: SonicWall connections
by cshander on 2008-04-08 05:20:09 +0200
I am using a Sonicwall Pro 2040 v3.1.5.0-2s firmware with IP Securitas 3.1
on Mac OS 10.5.2 successfully. I found it very difficult to get the right
combination of settings for this to work, but have it working so I took
screenshots of all the related Sonicwall pages and the IP Securitas config. If
you want, you can download the screenshots here:
http://idisk.mac.com/cshander/Public/VPN%20Screenshots.zip
I hope this helps.
Re: SonicWall connections
by diwa on 2008-04-08 08:29:37 +0200
[quote author=cshander link=1204842537/0#11 date=1207624809]
If you want, you can download the screenshots here:
http://idisk.mac.com/cshander/Public/VPN%20Screenshots.zip
I hope this helps.[/quote]
I am asked to enter a username and password for the zip on mac.com...
Thanks
Dirk
Re: SonicWall connections
by megamiles on 2008-04-08 15:16:57 +0200
Hello cshander,
Also having the same trouble as Diwa, needing user & password to access...
I would be good to understand just what setting you had used.
Many thanks, megamiles
Re: SonicWall connections
by diwa on 2008-04-15 09:33:07 +0200
Sorry for moving this up, without anything new from my side...
cshander, could you please provide us the password for your idisk?
Or is there anything, I can do to help solving this problem?
Thanks
Dirk
Re: SonicWall connections
by megamiles on 2008-04-15 17:58:22 +0200
Hello cshander,
Just adding to Dirk's / diwa request to have a look at your config settings.
Your iDisk is locked, so neither of us can access. Please if you can shed
light on the tricks you used to connect to a SonicWall box it would be very
much appreciated.
I am sure that both Dirk and I are in the same boat, along with many other
SonicWall Pro users !
Many thanks, megamiles
Re: SonicWall connections
by gofuse on 2008-04-15 20:07:45 +0200
Just adding to this issue. I'm also having similar connection problems
connecting to SonicWall 3060 on os 10.5.2. Works fine with VPN Tracker 5.
Would be great if we can view the screenshots and recommend a solution.
Re: SonicWall connections
by diwa on 2008-04-16 22:20:54 +0200
Hi and Guten Abend ;-)
I was able to establish a connection to my SonicWALL Pro 320...
I changed the "Entfernter Endpunkt" Mode in the "General" Tab from
"Network" to host - and put in an IP address from the remote network...
The Tunnel is also comming up, if I set the Mode to "Networks" and put in
the "real" network, here 192.168.0.0/24 and a not existing one like
192.168.1.0/24...
If I remove the non existing one, the tunnel not came up...
Ciao
dirk
Re: SonicWall connections
by diwa on 2008-04-17 13:00:28 +0200
I could start crying... :'(
Yesterday it worked, but today it doesn't...
Needless to say, that I didn't changed anything.
Ciao
Dirk
Re: SonicWall connections
by cshander on 2008-05-14 23:51:31 +0200
Thanks to a user emailing me and letting me know I had a password on the
screenshots, I went and removed the password. I am sorry to those who
tried to download the file - I thought I had set the file as public AND I
thought I set my preferences to notify me when replies were posted to this
thread...
Here is the link again:
http://idisk.mac.com/cshander/Public/VPN%20Screenshots.zip
One note of caution. My company just installed the latest firmware update
for our sonicwall pro 2040 going from v3 to v4 and now these settings do
not work. I have been unable to get a connection with the v4 firmware, and
tried varying settings with no luck "yet"...
Re: SonicWall connections
by diwa on 2008-05-15 19:08:57 +0200
[quote author=cshander link=1204842537/15#19 date=1210801891]
Here is the link again:
http://idisk.mac.com/cshander/Public/VPN%20Screenshots.zip
[/quote]
Now it worked
Thanks.
These settings look a little bit different then mine (because of a different
sonicwall), but basicly I do have the same settings in
encryption/authentication etc.
While playing around a little bit, I found, that my parallels installation forces
some problems.
I have the parallels NAT-Adapter active and set to DHCP.
This adapter will keep the ip-address - and if this has been one from the
same subnet as my internal one, ipSecuritas cannot establish a tunnel...
I have to deactivate the adapter manually to get the tunnel established.
Ciao
dirk
Netgear DG834v2 setup
Netgear DG834v2 setup
by bergert on 2008-03-09 13:26:24 +0100
hello,
Finally, I managed to get a connection to my 834. But the connection only
remains up for a few minutes (60 seconds ?) and then stops to work. As
soon as I restart IPSecuritas it comes back, but only for a minute or so. I
check using PING and TRACEROUTE.
NOTE to other Netgear users:
- dont try to use SHA-1; it does not work, use MD5
- using FQDN user strings did not work for me; this is why I am using IPs
now
Can anybody offer suggestions ?
thanks,
Tom
1) My setup:
MacMini on pulic IP (IP securitas) <-- Internet --> DG834v2 (ADSL2+,
dyndns IP)
2) DG834 Configuration:
Remote IP, single address, MacMini
Local subnet, 192.168.1.0
IKE: Initiater and Responder
Mode: Main-Mode
DH Group: 2 (1024)
Local ID: WAN IP
Remote IP: IP Address
Encryption: DES
Authentication: MD5
sa Life time: 28800
PFS Enabled
3) Logs:
IPSecuritas 3.1 build 1860, Mon Oct 15 22:03:05 CEST 2007, nadig
Darwin 8.10.1 Darwin Kernel Version 8.10.1: Wed May 23 16:33:00 PDT
2007; root:xnu-792.22.5~1/RELEASE_I386 i386
Mar 09, 05:01:48 Info
IKE @(#)ipsec-tools CVS (http://ipsectools.sourceforge.net)
Mar 09, 05:01:48 Info
IKE @(#)This product linked OpenSSL 0.9.7l 28
Sep 2006 (http://www.openssl.org/)
Mar 09, 05:01:48 Info
IKE Reading configuration from "/Library
/Application Support/Lobotomo Software/IPSecuritas/racoon.conf"
Mar 09, 05:01:48 Info
IKE Resize address pool from 0 to 255
Mar 09, 05:01:55 Info
APP Initiated connection Netgear
Mar 09, 05:01:56 Error IKE not support transform-id=9 in ESP.
Mar 09, 05:01:56 Error IKE not support transform-id=9 in ESP.
Mar 09, 05:01:56 Error IKE not support transform-id=9 in ESP.
Mar 09, 05:02:01 Error IKE failed to get sainfo.
Mar 09, 05:02:01 Error IKE failed to get sainfo.
Mar 09, 05:02:01 Error IKE failed to pre-process packet.
Mar 09, 05:02:11 Error IKE failed to get sainfo.
Mar 09, 05:02:11 Error IKE failed to get sainfo.
Mar 09, 05:02:11 Error IKE failed to pre-process packet.
Mar 09, 05:02:31 Error IKE failed to get sainfo.
Mar 09, 05:02:31 Error IKE failed to get sainfo.
Mar 09, 05:02:31 Error IKE failed to pre-process packet.
Log from Netgear DG834
Sun, 2008-03-09 12:01:29 - [USA] initiating Main Mode
Feature Request: Setting the MTU on start
Feature Request: Setting the MTU on start
by next2you on 2008-03-13 11:02:34 +0100
Hi,
my VPN will only work reliably when I set the MTU on my airport (en1) to
1400 (instead of 1500).
I have to do a sudo ifconfig en1 mtu 1400 every time before starting up the
VPN.
I haven't found an easy way to make this stick on the OSX level besides the
Terminal or
writing my own startup script. Would there be a way to incoroprate this into
IPSecuritas?
Or am I the rare case of MTU performance problem?
Christian
P.S.: In the consequence I suspect my mobile account freezes after the sudo
if the VPN is up and "unreliable" and the
computer is already bound to the OSX Server (10.5, OpenDirectory)
IPSecuritas reports 'Not Connected to daemon"
IPSecuritas reports 'Not Connected to daemon"
by rooney1111 on 2008-03-13 22:43:03 +0100
I am running OS 10.5.2 with latest version of IPSec. It works perfectly to 2
separate sites for a day or two then breaks. Now when I launch it it reports
"Not connected to daemon" and all I can do is Force Quit. If I uninstall and
re-install/setup it works again for a couple of days then breaks again. Is
there a command line to re-connect it to the daemon or re-start the
daemon, or any other ideas appreciated. When it works it's just great!
Linksys WRVS4400N firmware 1.1.03 woes
Linksys WRVS4400N firmware 1.1.03 woes
by jfippin on 2008-03-14 02:11:39 +0100
Thanks to the wizard, I had been able to set up a VPN tunnel successfully
between my MacBook Pro and the Linksys. That is, until I updated the
firmware on the Linksys to the current version 1.1.03.
Now, I can't get past Phase 1 for love nor money. I completely reset the
Linksys to factory defaults after the firmware upgrade, and then manually
set up the tunnel, but no joy. I've spent far too many hours on this already,
tweaking everything I can think of. Anybody had success with this new
firmware? I could revert to 1.0.16, but there are a couple new non-VPN
capabilities in the new release that I'd like to hang on to.
For the time being, Hamachi is getting me through, but I'd really like to
have my Linksys tunnel back!
Thanks in advance for any insight.
Problems connecting to Draytek 2800
Problems connecting to Draytek 2800
by macfanguy on 2008-03-17 22:10:11 +0100
Okay, 5 hours into it, I'm getting a bit frustrated... I have setup several
Drayteks in combination with IPS, specifically 2 2900's and 3 2510's. I
recently installed 2 2800's, and guess what... I cannot get VPN to work! For
the first time in 4 years... The 2800's are updated with the latest firmware
(2.8).
I have off course set up the Draytek's the way I have allways done so, and
the same goes for IPS. As this didn't work , I re-read the instructions for
setup, even though these are for an older FW-version. Used the Wizard
instead of manually entering the settings, just in case I missed something,
but no go. Downloaded VPN Tracker (Sorry! ;-) ) just to test, and used their
wizard, exactly the same problem. There error tells me that it at least gets
past Phase one, which I can confirm, as IPS's log gives no time-out waiting
for Phase 1.
Having traced it to phase 2, I changed all settings, turning things on and
off. Having read some post here, tried changing the Endpoint Mode, and
turning NAT on and off... No luck. I'm lost!
As I am not on site, I have no way of using Draytek's Syslog tools to check
the Draytek end of the VPN setup, not even sure if it will show anything
worthwhile.
Off-course, I have log output, should anybody be interested. I just don't
inderstand enough of IPSec's process to figure out where it goes wrong.
Any help is greatly appreciated!
Re: Problems connecting to Draytek 2800
by macfanguy on 2008-04-17 12:15:11 +0200
Doesn't anybody have ANY clue... :o
I'm almost desperate here, and Draytek support is wel, Draytek support. :'(
Sonicwall TZ170
Sonicwall TZ170
by mcclint on 2008-03-24 14:39:40 +0100
I'm trying to get IPSecuritas to work with a Sonicwall TZ170. I've gone
through the router's VPN setup line by line and every setting is identical to
how I have the IPSecuritas connection file setup but every time I try to
establish a connection I get "No Proposal Chosen". I've tried using the
IPSecuritas connection wizard for the TZ170 but that doesn't work either.
As a test I used the demo version of VPNtracker and it actually works! So I
compared the settings in VPNTracker to how I have IPSecuritas setup and
once again, they are identical. Is there some magic, hidden button I need to
click in IPSecuritas to make it work with this router? I have no problems
getting it to work with a ZyWall 35.
Re: Sonicwall TZ170
by next2you on 2008-04-02 15:03:12 +0200
Just to assure you, IPSecuritas plus TZ170 works fine for me.
I've configured the Group VPN with IKE using Preshared Secret, the proposal
is group2, 3DES, SHA1, LIfetime 28800 seconds,
IPSEc Phase 2 is ESP, 3DES and SHA1, perfect forward secrecy is not enabled
and the lifetime is 28800.
In the advanced section it is only "Forward packets to removte VPNs
checked, I'm also using client authentication using XAuth, but that is
probably a few steps later.
Christian
Re: Sonicwall TZ170
by bertg on 2008-04-14 17:50:10 +0200
Hi,
I tried and tried and in the log of the TZ170, I keep getting this:
6
UTC 04/14/2008 15:11:10.048
IKE Responder: IPSec proposal
does not match (Phase 2)
Pleas see this flash movie for what I did:
[URL=http://www.hotshare.net/flash
/49209-4764030799.html]IPSecuritas.swf (1.00 MB)[/URL]
(right click on video and uncheck "Play" to pause...)
DHCP is NOT enabled in the TZ170.
As you see in the PNG screenshot below, locally the TZ170 sits on IP
address 10.0.0.2:
[img]http://i26.tinypic.com/332m8ae.png[/img]
What am I doing wrong?
I thank you in advance,
Bert
Re: Sonicwall TZ170
by cnadig on 2008-04-15 08:58:51 +0200
Hello Bert,
in the logs you sent me I can see that phase 1 is completed successfully,
but phase 2 fails with no proposal chosen (meaning the settings on both
sides for phase 2 don't match). Please change the remote network to
10.0.0.0/24 instead of 10.0.0.2/25 and disable PFS in phase 2 in
IPSecuritas (or enable it on the firewall and set it to group 1).
Hope this helps,
Christoph
Re: Sonicwall TZ170
by rpc_rodgers on 2008-05-23 01:52:37 +0200
Several colleagues and I have been working with IPSecuritas 3.1 (Build
1860) under Mac OS X 10.5.2, going against a SonicWall TX 170 SP.
We have succeeded in connecting, but never with XAUTH enabled.
We were particularly helped by the 12 June 2007 posting of sibble-comp. I
want to contact him and lobotomo support, but this
forum apparently requires at least one posting to allow personal
messages to be sent to other members, which prompts this posting.
If anyone has pointers to very precise setup instructions for this
configuration, or is willing to engage us via email or over the phone,
we'd be grateful to hear from you! Good luck to all...
Re: Sonicwall TZ170
by sibble-comp on 2008-05-25 00:34:16 +0200
What's the question you have rpc_rodgers? Ironic that I just happened to be
checking this forum a day later.
Racoon with NAT-T?!
Racoon with NAT-T?!
by .guru on 2008-03-25 07:42:59 +0100
I am really trying hard to compile racoon by hand from the sources. I am
close to breakthrough, but I still have problems with NAT-T support... it
does not let me set --enable-natt while compiling? How do you handle
this?
Help With WatchGuard Firebox...
Help With WatchGuard Firebox...
by mikemiller on 2008-03-27 17:53:55 +0100
Hi guys,
I'm a bit new to OSX and to IPSec in general, so please bear with me being
dumb and slow. We're a design/development house in the UK and currently
have a mix of OSX and Windows boxes. We bought a new MacBook as the
support laptop with the plan being to run Bootcamped Windows and OSX on
it. I've used MUVPN in the windows partition to connect to our
[b]WatchGuard Firebox Edge X15[/b] using the wgx file that is produced via
the Firebox configuration. This works fine.
I then stumbled upon IPSecuritas and tried to get this working in the OSX
partition. I downloaded the Help PDF and noticed that there is a desktop
configuration program being used and not the web interface I am lumped
with. I've tried to work through the instructions via the web interface,
however it is quite different and I got nowhere, if anyone could offer any
help it would be greatly appreciated.
Mike.
Re: Help With WatchGuard Firebox...
by itsm-support on 2008-04-03 14:55:34 +0200
I use MUVPN for Windows, too. I configured IPSecuritas like it was described
in the Help PDF. If you change the Mode to "Aggressive" the connection will
work. But after 9 minutes the VPN connection disconnect and you must
connect again. Maybe anybody can help me with this problem. Here the
Log-File:
Mar 29, 15:48:33 Info
APP IPSec authenticating
Mar 29, 15:48:33 Info
APP IKE daemon started
Mar 29, 15:48:33 Info
APP IPSec started
Mar 29, 15:48:33 Error IKE Foreground mode.
Mar 29, 15:48:33 Info
IKE @(#)ipsec-tools CVS
(http://ipsec-tools.sourceforge.net)
Mar 29, 15:48:33 Info
IKE @(#)This product linked OpenSSL 0.9.7l 28
Sep 2006 (http://www.openssl.org/)
Mar 29, 15:48:33 Info
IKE Reading configuration from
"/Library/Application Support/Lobotomo Software/IPSecuritas/racoon.conf"
Mar 29, 15:48:33 Info
IKE Resize address pool from 0 to 255
Mar 29, 15:48:33 Info
APP Initiated connection Sogeti
Mar 29, 15:48:33 Error IKE inappropriate sadb acquire message passed.
Mar 29, 15:48:33 Info
IKE couldn't find the proper pskey, try to get
one by the peer's address.
Mar 29, 15:51:32 Error IKE unhandled notify message 32768, no phase2
handle found.
Mar 29, 15:54:31 Error IKE unhandled notify message 32768, no phase2
handle found.
Mar 29, 15:57:31 Error IKE unhandled notify message 32768, no phase2
handle found.
Re: Help With WatchGuard Firebox...
by itsm-support on 2008-04-09 12:22:23 +0200
I activate the debug modus and I can see there is something else:
Apr 08, 20:36:39 Debug IKE 68 bytes message received from
xxx.xxx.xxx.xxx[4500] to 192.168.178.11[4500]
Apr 08, 20:36:39 Debug IKE 83859376 97274c48 97a06b3f 69fbb063
08100501 5eb31459 00000044 59f7af51
Apr 08, 20:36:39 Debug IKE 22633302 54ff1026 ce420ca5 299bd048
9c5ee278 d0466696 aa0ed8ff 6d2316fd
Apr 08, 20:36:39 Debug IKE d22166ea
Apr 08, 20:36:39 Debug IKE receive Information.
Apr 08, 20:36:39 Debug IKE compute IV for phase2
Apr 08, 20:36:39 Debug IKE phase1 last IV:
Apr 08, 20:36:39 Debug IKE 14465d4d fc06e38c 5eb31459
Apr 08, 20:36:39 Debug IKE hash(sha1)
Apr 08, 20:36:39 Debug IKE encryption(des)
Apr 08, 20:36:39 Debug IKE phase2 IV computed:
Apr 08, 20:36:39 Debug IKE 9b3e8f1b 56a79fb0
Apr 08, 20:36:39 Debug IKE begin decryption.
Apr 08, 20:36:39 Debug IKE encryption(des)
Apr 08, 20:36:39 Debug IKE IV was saved for next processing:
Apr 08, 20:36:39 Debug IKE 6d2316fd d22166ea
Apr 08, 20:36:39 Debug IKE encryption(des)
Apr 08, 20:36:39 Debug IKE with key:
Apr 08, 20:36:39 Debug IKE 898b0884 a7c0c219
Apr 08, 20:36:39 Debug IKE decrypted payload by IV:
Apr 08, 20:36:39 Debug IKE 9b3e8f1b 56a79fb0
Apr 08, 20:36:39 Debug IKE decrypted payload, but not trimed.
Apr 08, 20:36:39 Debug IKE 0b000018 c0e4c815 102335ab 338e0b64
2aefba42 06bf0b24 0000000c 00000001
Apr 08, 20:36:39 Debug IKE 01008000 00000000
Apr 08, 20:36:39 Debug IKE padding len=1
Apr 08, 20:36:39 Debug IKE skip to trim padding.
Apr 08, 20:36:39 Debug IKE decrypted.
Apr 08, 20:36:39 Debug IKE 83859376 97274c48 97a06b3f 69fbb063
08100501 5eb31459 00000044 0b000018
Apr 08, 20:36:39 Debug IKE c0e4c815 102335ab 338e0b64 2aefba42
06bf0b24 0000000c 00000001 01008000
Apr 08, 20:36:39 Debug IKE 00000000
Apr 08, 20:36:39 Debug IKE IV freed
Apr 08, 20:36:39 Debug IKE HASH with:
Apr 08, 20:36:39 Debug IKE 5eb31459 0000000c 00000001 01008000
Apr 08, 20:36:39 Debug IKE hmac(hmac_sha1)
Apr 08, 20:36:39 Debug IKE HASH computed:
Apr 08, 20:36:39 Debug IKE c0e4c815 102335ab 338e0b64 2aefba42
06bf0b24
Apr 08, 20:36:39 Debug IKE hash validated.
Apr 08, 20:36:39 Debug IKE begin.
Apr 08, 20:36:39 Debug IKE seen nptype=8(hash)
Apr 08, 20:36:39 Debug IKE seen nptype=11(notify)
Apr 08, 20:36:39 Debug IKE succeed.
Apr 08, 20:36:39 Error IKE unhandled notify message 32768, no phase2
handle found.
After 3 times all 3 minutes
Apr 08, 20:48:43 Debug
Apr 08, 20:48:43 Debug
Apr 08, 20:48:44 Debug
Apr 08, 20:48:44 Debug
Apr 08, 20:48:46 Debug
Apr 08, 20:48:46 Debug
Apr 08, 20:48:46 Debug
Apr 08, 20:48:46 Debug
(maybe Entourage checks for emails) i get this:
IKE msg 5 not interesting
IKE msg 5 not interesting
IKE msg 5 not interesting
IKE msg 5 not interesting
IKE msg 5 not interesting
IKE msg 5 not interesting
IKE msg 5 not interesting
IKE msg 5 not interesting
IPSecuritas 3.1 with Fortigate 3.0
IPSecuritas 3.1 with Fortigate 3.0
by edcor123 on 2008-04-01 15:57:11 +0200
Hi all,
Did some succeed to connect IPSEcuritas 3.1 to a Fortigate V3.0 IOS release
?
I need to connect a couple of users with dynamic IP Adress
The Fortigate has a public IP address but I can make it work (even after
several tests)
I tried to activate Xauth and IPSEC DHCP with no success ....
Is someone able to send me back some config ?
Thanks
Re: IPSecuritas 3.1 with Fortigate 3.0
by edcor123 on 2008-04-01 16:01:04 +0200
... for a best description;
The Fortigate is configured in NAT mode
LAN IP address: 192.168.3.1 /24
IP WAN address: 195.115.112.56 /29
Do I need to activate Xauth in the Fortigate?
Do I need to configure Xauth-PSK on IPSecuritas?
Do I need to force NAT-T since users are behind ADSL routers ?
Thanks for any tip.
Re: IPSecuritas 3.1 with Fortigate 3.0
by lleung on 2008-05-02 04:56:19 +0200
[quote author=edcor123 link=1207058231/0#1 date=1207058464]... for
a best description;
The Fortigate is configured in NAT mode
LAN IP address: 192.168.3.1 /24
IP WAN address: 195.115.112.56 /29
Do I need to activate Xauth in the Fortigate?
Do I need to configure Xauth-PSK on IPSecuritas?
Do I need to force NAT-T since users are behind ADSL routers ?
Thanks for any tip.[/quote]
No,
No,
Yes.
Also something to note. Evidently firmware 3.0 MR5 and MR6 broke xauth
compatibility with IP securitas.
Linksys WRVS4400N - No connection
Linksys WRVS4400N - No connection
by ravensolutions on 2008-04-02 04:09:09 +0200
Hi - running 10.5.2, and have tried everything I can to get a working VPN
connection. IPSecuritas is my last straw... What's odd is that I was able to
connect using the Linksys QuickVPN on the same Mac running Windows
Vista under VMWare, so I know that this should work. I chose the Linksys
WRVS4400N from the wizard and added what I believed to be the correct
settings. Here's the regular log:
IPSecuritas 3.1 build 1860, Mon Oct 15 22:03:05 CEST 2007, nadig
Darwin 8.10.1 Darwin Kernel Version 8.10.1: Wed May 23 16:33:00 PDT
2007; root:xnu-792.22.5~1/RELEASE_I386 i386
Apr 01, 20:01:16 Info
APP IPSec authenticating
Apr 01, 20:01:16 Info
APP IKE daemon started
Apr 01, 20:01:16 Info
APP IPSec started
Apr 01, 20:01:16 Error IKE Foreground mode.
Apr 01, 20:01:16 Info
IKE @(#)ipsec-tools CVS (http://ipsectools.sourceforge.net)
Apr 01, 20:01:16 Info
IKE @(#)This product linked OpenSSL 0.9.7l 28
Sep 2006 (http://www.openssl.org/)
Apr 01, 20:01:16 Info
IKE Reading configuration from "/Library
/Application Support/Lobotomo Software/IPSecuritas/racoon.conf"
Apr 01, 20:01:16 Info
IKE Resize address pool from 0 to 255
Apr 01, 20:01:16 Info
APP Initiated connection MAHVPN
Apr 01, 20:01:16 Error IKE inappropriate sadb acquire message passed.
Apr 01, 20:01:23 Info
APP Initiated connection MAHVPN
Apr 01, 20:01:30 Info
APP Initiated connection MAHVPN
Apr 01, 20:01:32 Error IKE phase2 negotiation failed due to time up
waiting for phase1. ESP 66.224.240.74[500]->192.168.0.3[500]
Apr 01, 20:01:37 Info
APP Initiated connection MAHVPN
Apr 01, 20:01:37 Error IKE inappropriate sadb acquire message passed.
Apr 01, 20:01:39 Error IKE phase2 negotiation failed due to time up
waiting for phase1. ESP 66.224.240.74[500]->192.168.0.3[500]
Apr 01, 20:01:44 Info
APP Initiated connection MAHVPN
Apr 01, 20:01:46 Error IKE phase1 negotiation failed due to time up.
68b4db46769c3ccf:0000000000000000
Apr 01, 20:01:46 Error IKE phase2 negotiation failed due to time up
waiting for phase1. ESP 66.224.240.74[500]->192.168.0.3[500]
Apr 01, 20:01:49 Warning APP Connection MAHVPN timed out
Apr 01, 20:01:49 Warning APP Giving up
Apr 01, 20:01:53 Error IKE phase2 negotiation failed due to time up
waiting for phase1. ESP 66.224.240.74[500]->192.168.0.3[500]
Apr 01, 20:02:00 Error IKE phase2 negotiation failed due to time up
waiting for phase1. ESP 66.224.240.74[500]->192.168.0.3[500]
Apr 01, 20:02:04 Info
APP IPSec stopping
Apr 01, 20:02:05 Info
APP IKE daemon terminated
Apr 01, 20:02:05 Info
APP IPSec stopped
I'd send the debug log if I had enough space. ANY help would be
appreciated.
Steve
Trying to get set up
Trying to get set up
by andy on 2008-04-04 14:22:02 +0200
MacbookPro/Core 2duo/Leopard 10.5.2
Local (me) [ch8594]wireless[ch8594] my Local gateway (Netgear DG834G)
[ch8594] work remote (Netgear DGFV338) [ch8594] subnet 192.168.0.0/24
The remote gateway has an auto policy setup for a local VPN client
When I try to log in I get:
IPSecuritas 3.1 build 1860, Mon Oct 15 22:03:05 CEST 2007, nadig
Darwin 8.10.1 Darwin Kernel Version 8.10.1: Wed May 23 16:33:00 PDT
2007; root:xnu-792.22.5~1/RELEASE_I386 i386
Apr 04, 13:12:08 Info
APP IPSec authenticating
Apr 04, 13:12:08 Info
APP IKE daemon started
Apr 04, 13:12:08 Info
APP IPSec started
Apr 04, 13:12:08 Error IKE Foreground mode.
Apr 04, 13:12:08 Info
IKE @(#)ipsec-tools CVS (http://ipsectools.sourceforge.net)
Apr 04, 13:12:08 Info
IKE @(#)This product linked OpenSSL 0.9.7l 28
Sep 2006 (http://www.openssl.org/)
Apr 04, 13:12:08 Info
IKE Reading configuration from "/Library
/Application Support/Lobotomo Software/IPSecuritas/racoon.conf"
Apr 04, 13:12:08 Info
IKE Resize address pool from 0 to 255
Apr 04, 13:12:08 Info
APP Initiated connection CHHomer
Apr 04, 13:12:08 Error IKE inappropriate sadb acquire message passed.
Apr 04, 13:12:15 Info
APP Initiated connection CHHomer
Apr 04, 13:12:22 Info
APP Initiated connection CHHomer
Apr 04, 13:12:29 Info
APP Initiated connection CHHomer
Apr 04, 13:12:29 Error IKE inappropriate sadb acquire message passed.
Apr 04, 13:12:36 Info
APP Initiated connection CHHomer
Apr 04, 13:12:41 Warning APP Connection CHHomer timed out
Apr 04, 13:12:41 Warning APP Giving up
Am I close or don't I know what I'm doing? :o
Anyone's wisdom would be gratefully received
Cheers
Andy
Limit in number of connection
Limit in number of connection
by fabien.magagnosc on 2008-04-08 19:00:35 +0200
Actually, I'm using IPSecuritas (thanks a lot for this beautiful software) to
connect to my company VPN ... but the fact is that we have a lot of VPN ...
and actually, after 5 connections within one profile, the lastest connection
is always not configured in racoon.conf, and not started (stay in red in the
menubar item list)
Is there any limitation in term of conccurent VPN running, if no, how can i
force IPsecuritas to open more connection as needed ?
Thanks a lot,
Fabien.
cant connect
cant connect
by Flare on 2008-04-08 19:17:30 +0200
Hello,
i have a strange problem. btw im new to mac.
i have 2x the same macbookpro.. same model etc.
i installed ipsecuritas on one of them and it works fine..i can connect to my
branchoffice firewall.
on the other macbookpro i got a problem.. i installed and configured it the
same way.
i taked a look at the protocoll at this is all what i see.
nothing more.. the light is red and nothing happens..
whats wrong here.. i take a look at the taskmanager and i see that no
ipsecurtasdaemon is running..
very strange .. can someone help me
Apr 04, 13:12:08 Info
APP IPSec authenticating
Apr 04, 13:12:08 Info
APP IKE daemon started
Apr 04, 13:12:08 Info
APP IPSec started
Apr 04, 13:12:08 Error IKE Foreground mode.
Apr 04, 13:12:08 Info
IKE @(#)ipsec-tools CVS (http://ipsectools.sourceforge.net)
Apr 04, 13:12:08 Info
IKE @(#)This product linked OpenSSL 0.9.7l 28
Sep 2006 (http://www.openssl.org/)
Apr 04, 13:12:08 Info
IKE Reading configuration from "/Library
/Application Support/Lobotomo Software/IPSecuritas/racoon.conf"
Apr 04, 13:12:08 Info
IKE Resize address pool from 0 to 255
greets
rene
Re: cant connect
by Flare on 2008-04-11 07:49:22 +0200
hello,
found the problem,
there was a vmnet8 interface configured with the same adress as the
destinationnetwork.
now it works.
greets rene
Re: cant connect
by noidea on 2008-07-23 04:47:20 +0200
Hello Rene,
Can you explain how you resolved this issue is a bit more? I am totally new
to this and I am having the same problem but I don't know how to fix it.
Jul 22, 22:40:50 Info
APP IPSec authenticating
Jul 22, 22:40:50 Info
APP IKE daemon started
Jul 22, 22:40:50 Info
APP IPSec started
Jul 22, 22:40:50 Info
IKE Foreground mode.
Jul 22, 22:40:50 Info
IKE @(#)ipsec-tools CVS (http://ipsectools.sourceforge.net)
Jul 22, 22:40:50 Info
IKE @(#)This product linked OpenSSL 0.9.7l 28 Sep
2006 (http://www.openssl.org/)
Jul 22, 22:40:50 Info
IKE Reading configuration from "/Library
/Application Support/Lobotomo Software/IPSecuritas/racoon.conf"
Jul 22, 22:40:50 Info
IKE Resize address pool from 0 to 255
XAUTH + RSA Status?
XAUTH + RSA Status?
by yongel on 2008-04-11 21:16:31 +0200
Hello,
as I am currently investigating IPSecuritas to serve as my default MAC OS
VPN client, I'm very interested what the implementation status auf XAUTH +
RSA is?
I found an older thread where you offered a 3.1.1 Prerelease that should be
able to handle this szenario correctly. So I downloaded that version and
tried to configure it. Sady the required combination of settings is not
allowed. When I select "Local Authentication Certificate" & "XAUTH + RSA" &
my imported certificate I always get an yellow exclamation mark indicating,
that the I my config does not provide an certificate. Switching back to RSA
only everything is error free again.
Can you tell me what is going wrong here and if I can expect a corrected
version.
Thanks in advance and best regards.
Markus
Tunnel Established but cannot Ping or use ARD
Tunnel Established but cannot Ping or use ARD
by rooney1111 on 2008-04-15 15:32:12 +0200
Am using 10.5.2 and IpSecuritas 3.1. It's just stopped working - I get a
Green connection but cannot Ping the remote network nor use ARD. A
colleague has no problem with a similar configuration.
Re: Tunnel Established but cannot Ping or use ARD
by artemide on 2008-04-17 23:58:05 +0200
I am having the same issue. OSX 10.5.2, IPSecuritas 3.1, the tunnel is active
on both sides, but I can not ping.
The other end is Smoothwall Advanced Firewall 2008.
Re: Tunnel Established but cannot Ping or use ARD
by rooney1111 on 2008-04-18 11:28:37 +0200
My remote unit is a ZyXEL ZyWALL - it all works fine from my Mac but not
my colleagues but as far as we can tell the setup is identical. He has deleted
and reinstalled IPSec - still no ping
Re: Tunnel Established but cannot Ping or use ARD
by artemide on 2008-04-18 15:06:44 +0200
I have a support contract with smoothwall, so I opened a case with them. I
think the problem is with IPSecuritas, but they are pretty good at tracking
down issues. I'll let you know what they find.
Re: Tunnel Established but cannot Ping or use ARD
by thorlock on 2008-04-24 12:43:23 +0200
@artemide: could the Smoothwall team help you solve this issue? I'm in a
similair situation and it's driving me nuts...
Anyone else have any ideas? Thanks a bunch.
Re: Tunnel Established but cannot Ping or use ARD
by artemide on 2008-04-24 17:34:01 +0200
not yet, they sent me some screen shots they had from someone that did
get it working and it was somewhat of a help.
It seems like even though both sides think the tunnel is up it is really not.
The IPSecuritas side sees an invalid ID. But I can't figure out what the
problem is because the tunnel does come up.
I just sent the smoothwall teem some screen shots and some log files. I am
hoping to hear back from the soon.
This is very frustrating.
On a different note I sent an email to IPSecuritas and have received no
response as of yet. I am even trying the trial version of VPN Tracker .. and
that crashes ... joy
Re: Tunnel Established but cannot Ping or use ARD
by rooney1111 on 2008-04-24 22:29:38 +0200
Don't know if this helps but I have been out of office on client's sites the
past couple of days and wasn't even able to 'go green' with IPSecuritas. Now
I'm back in my office everything is OK again so could the issue be with the
local firewall?
Re: Tunnel Established but cannot Ping or use ARD
by thorlock on 2008-04-25 09:24:02 +0200
@artemide: Alright, no possibility that you could post those screenshots
provided from the Smoothwall team? Thanks.
@rooney1111: yeah, I think it might be an issue with some local firewall in
some specific cases, but I doubt it is an firewall issue when the connection
goes green and everything seems to be up and running according to the
logs!
Re: Tunnel Established but cannot Ping or use ARD
by benjconrad on 2008-04-25 12:21:45 +0200
Specifically with Smoothwall, you should check the Zone Bridging options.
You need to allow bi-directional traffic from IPSEC to Green. If you do not,
then you get the exact problem you describing - tunnel is up, but no traffic
can pass.
Re: Tunnel Established but cannot Ping or use ARD
by artemide on 2008-04-25 14:59:20 +0200
[quote author=benjconrad link=1208266332/0#8
date=1209118905]Specifically with Smoothwall, you should check the Zone
Bridging options. You need to allow bi-directional traffic from IPSEC to
Green. If you do not, then you get the exact problem you describing tunnel is up, but no traffic can pass.[/quote]
yes I know thank you though. I have about a dozen other connections, ipsec
subents and L2TP road warriors all working, the problem is on the
IPSecuritas side and with my keys. It seems to be having problems verifying
the keys.
I will post everything I have.
edit: I have a zip file to post of screen shots and log files .. but .. and this is
going to sound stupid but .. can I post it here? Or do I need to through it on
my web server and give a link?
Re: Tunnel Established but cannot Ping or use ARD
by artemide on 2008-04-25 23:17:03 +0200
It seems that the Keys need to had the ID value set in them, and the ID has
to be the address of the server ( either IP or FQDN, then then also needs to
be the ID of the endpoints as well.
I am trying with 2 new keys, both with IDs set and I am specifying them on
both sides, so I imported both keys on the OSC side . the tunnel comes up
and with much less warnings on the SW side. I also get different errors now
on the Mac side
inappropriate sadb acquire message passed.
unknown informational exchange received
VPN-1: connect ok, problem: office mode/mode_cfg
VPN-1: connect ok, problem: office mode/mode_cfg
by marcz on 2008-04-17 13:07:16 +0200
Hi,
i am trying to connect a corporate network (Checkpoint VPN-1).
I exported the profile from the windows machine. it looks like this:
[code](HTTPS_COMPANY
:attributes (
:description ("blabla")
:read_only (true)
)
:options (
:force_udp_encapsulation (false)
:support_ip_assignment (true)
:support_tcp_ike (false)
:sr_route_through_gw (true)
:support_tcpt (true)
:ps_ha_scheme (no_ha)
)
:site (company_blabla)
:gateways (
: (somecompany.somenetwork-fwblabla
:name (somecompany.somenetwork-fwblabla)
:ipaddr (111.111.111.111)
:active (true)
)
)
:policy_servers (
: (somecompany.somenetwork-fwblabla
:name (somecompany.somenetwork-fwblabla)
:ipaddr (111.111.111.111)
:active (true)
)
)
)
[/code]
i configured ipsecuritas like this:
General:
FirewallIP: 111.111.111.111
Local Modus: dropdown is greyed out "MODE-CFG is enabled. lokal ip is
retrieved from firewall"
Remote Endpoint "Everywhere"
Phase 1:
10 min
1024(2)
3DES
SHA-1
Main
Obey
16
Phase 2:
10 Minutes
768 (1)
Enc: DES, 3DES, AES 256, AES 192, AES 128
Auth: HMAC MD5, HMAC SHA-1
ID:
Re: VPN-1: connect ok, problem: office mode/mode_c
by marcz on 2008-04-19 16:50:21 +0200
Noone able to help?
I already had a look at the commercial software vpn tracker, too.
but unfortunately vpn tracker supports no mode_cfg/office mode with
checkpoint vpn, too.
Re: VPN-1: connect ok, problem: office mode/mode_c
by marcz on 2008-04-24 20:59:59 +0200
bump
One hour timeout
One hour timeout
by Frank_Renner on 2008-04-21 10:08:24 +0200
Hi,
I have a problem with connecting to a client site. Everything works fine, but
after exactly one hour the connection does not work anymore. Although I
strongly assume that this is a problem with some timeout in the firewall at
the client site, I want to know if it is possible that the problem may be
caused on my side. I have MacOS X 10.5.2, IP Securitas 3.1 and no firewall
enabled on my Mac. Did anyone else experience this behaviour?
Thank you,
Frank Renner
Re: One hour timeout
by Cucumber on 2008-04-23 03:59:25 +0200
Howdy,
i have the same problem (same version of OSX and IPS). IPS thinks it is still
connected (green dot). but all communication abruptly stops after an hour.
i'm connecting to a NetScreen 5GT.
same thing happens if i use IPS 2.2
\\//_
Re: One hour timeout
by Frank_Renner on 2008-04-25 11:23:33 +0200
What can we do? Accept fate?
Re: One hour timeout
by benjconrad on 2008-04-25 12:19:12 +0200
I had this problem before, connecting IP Securitas on Tiger to a Smoothwall
Firewall.
On that firewall, where you set up the IPSEC Roadwarriors, there is a "Key
Life" setting, which by default was 60 minutes. The key is presumably
supposed to be reissued in some way, but I couldn't work out what was
wrong, so in the end just increased the key life setting to 360 - 6 Hours
being more than enough for the users.
Not sure how much this information helps, but there should be a setting on
the firewall you are connecting to, rather than on IP Securitas.
Re: One hour timeout
by kamikaze2112 on 2008-05-08 20:59:18 +0200
I am having the exact same issue. After an hour, everything drops but the
tunnel says it's still up. I am running Leopard 10.5.2, IPSecuritas 3.1, and a
Linksys RV042 with the latest firmware. I have a pretty good feeling that
it's the Phase 2 key that's not being renewed properly. I've bumped the
phase 2 key life to 28800 seconds (8 hours) to see if it helps.
Hopefully we can get a fix for this issue.
Re: One hour timeout
by Frank_Renner on 2008-05-08 21:24:16 +0200
To add another weirdness which makes it difficult to convince the client
about his firewall doing wrong: others are connection to the same firewall
without any problems (with the same version of MacOS, IPSecuritas and the
same settings of course). So the issue might have something to do with the
Mac settings as well...still not solved on my side.
Re: One hour timeout
by cnadig on 2008-05-09 12:51:00 +0200
Hello,
it is possible that the rekeying is initiated by the firewall shortly before the
first key expires after the specified life time (probably one hour). This could
be problematic if your client is behind a NAT router or a firewall.
Try lowering both life times to a smaller value, say 30 minutes instead of
one hour.
Hope this helps,
Christoph
Re: One hour timeout
by kamikaze2112 on 2008-05-14 18:20:05 +0200
I tried decreasing the Phase 2 lifetime to 1800 seconds (30 min) but left the
phase 1 lifetime at 28800 seconds (8 hours). All this did was caused the
traffic to come to a halt after 30 minutes instead of the original hour. I've
just tried setting both phases to 30 minutes to see how that affects things,
and I'll update this post with my findings.
Update: with both phases set for 1800 seconds, the pings stopped after 30
minutes. I don't think this is a problem with my VPN router. it's possible
that the NAT router that the client is behind could be the culprit, but I
doubt that's the case.
Re: One hour timeout
by Ingo on 2008-06-06 11:19:39 +0200
I'm seeing exactly the same problem with IPSecuritas 3.1 on Leopard
connecting to a Checkpoint VPN-1. This seems to be a Leopard problem, as
the same configuration works flawlessly with IPSecuritas 3.1 on Tiger.
VPN on only one interface
VPN on only one interface
by swhitman on 2008-04-29 23:28:52 +0200
I have IPSEC working on the wireless interface. When a cable is attached to
the ethernet and the wireless is turned off, networking does not work
unless I turn off IPSecuritas. How do I setup IPSecuritas so that it is only
active for the wireless interface?
Problems with CISCO VPN
Problems with CISCO VPN
by MBC on 2008-04-30 15:51:25 +0200
Dear friends,
I have a big problem using IPSecuritas with my company firewall CISCO. The
problem is, that IPSecuritas wanted a preshared secret and my company is
not working with this. We are working with a group name and group
password and then with personal name and personal password. How can I
solve this problem and configurate IPSecuritas?
Thanks,
Michael
Can anyone hand-hold my newbie setup?
Can anyone hand-hold my newbie setup?
by slightly on 2008-05-02 14:53:05 +0200
Hi
I've never set up a VPN before, although I have used IPSecuritas to connect
at a previous employer.
So, any help or advice would be hugely appreciated!
I'm trying to connect my home 10.5 Powerbook running IPSecuritas to a
Linksys RVS4000 VPN router/firewall at work. So it's a host-to-network
connection.
The RVS4000 is at [b]68.167.x.x[/b].
It creates a private network of [b]192.168.1.0/24[/b].
My home Mac is at [b]74.66.y.y[/b]. (Cable internet, dynamic IP, but it
should be the same address for a while.)
Its private address is [b]192.168.0.103[/b], within a [b]192.168.0.0/24[/b]
network. (Served by a D-Link EBR-2310 with IPSec passthrough enabled.
L2TP and PPTP are not passed through. I'm also connected to an interim
Airport Express, if that makes any difference.)
Here's what I have set up on the router's tunnel configuration:
[b]Local Security Gateway type: IP Only
IP address: 68.167.x.x.
Local security group type: IP addr.
IP address: 192.168.2.1[/b]
First question: is that "192.168.2.1" sane? I'm guessing that what this refers
to is the IP address that my Mac will be assigned once within the local
network, and I don't want it to clash with the existing subnet. Is that
correct?
[b]Remote Security Gateway Type: IP Only
IP address: 74.66.y.y.
Remote security group type: subnet
IP address: 192.168.0.103
Mask: 255.255.255.0
Key mode: IKE/preshared
Phase1:
Encrypt: 3DES
Authenticate: MD5
Group: 768-bit
Life: 28800 secs
Phase2:
Encrypt: 3DES
Authenticate: MD5
PFS: Enable
Key: *******
Group: 768-bit
Life: 28800 secs[/b]
Now, on IPSecuritas:
[b]Remote IPSec device: 68.167.x.x
Local Endpoint mode: Host
Remote Endpoint mode: Network
Phase1:
Life: 28800 secs
XAuth doesn't honor the IP handed out by server
XAuth doesn't honor the IP handed out by server
by signal15 on 2008-05-05 21:54:12 +0200
It's sending the packets with a source address of the one physically
assigned to my local interface, not the one that I'm handing to it via an IP
Pool for XAuth. Is there a way to change this behavior?
I noticed I can optionally hard set the IP address under the "General" tab,
and I can assign a static to each user in the firewall via Xauth options. This
would probably work, however, it would be nice to avoid that extra config
especially for multiple users.
I am assuming since it's not honoring the IP I'm handing it, it probably
doesn't take the DNS servers I'm giving it either.
Re: XAuth doesn't honor the IP handed out by serve
by Forum Admin on 2008-05-05 22:13:20 +0200
Hello,
XAuth doesn't provide a way to handing out IP addresses or other client
configuration. Please try enabling MODE_CFG, which was meant for this
purpose. Please note that MODE_CFG was never officially released as a RFC,
therefore there are many different proprietery implementations. So it might
or it might nor work. In the latter case, I'd be very interested to make the
necessary software changes to support your firewall's implementation. Let
me know.
Hope this helps,
Christoph
Re: XAuth doesn't honor the IP handed out by serve
by signal15 on 2008-05-05 22:31:30 +0200
Works! Thanks!
FYI, this is on a Juniper SSG5 running ScreenOS 6.0r2.
Fortigate-100
Fortigate-100
by anev on 2008-05-06 16:12:20 +0200
Hey,
I've been trying to set up a VPN connection to my office with little success.
The logs show the following;
IPSecuritas 3.1 build 1860, Mon Oct 15 22:03:05 CEST 2007, nadig
Darwin 8.10.1 Darwin Kernel Version 8.10.1: Wed May 23 16:33:00 PDT
2007; root:xnu-792.22.5~1/RELEASE_I386 i386
May 06, 14:35:04 Info
APP System wake up event received
May 06, 14:36:00 Info
APP Network configuration change detected
May 06, 14:36:00 Info
APP Smart Environment Detection: Off,
reconfiguration
May 06, 14:58:24 Info
APP IPSec authenticating
May 06, 14:58:24 Info
APP IKE daemon started
May 06, 14:58:24 Info
APP IPSec started
May 06, 14:58:24 Error IKE Foreground mode.
May 06, 14:58:24 Info
IKE @(#)ipsec-tools CVS (http://ipsectools.sourceforge.net)
May 06, 14:58:24 Info
IKE @(#)This product linked OpenSSL 0.9.7l 28
Sep 2006 (http://www.openssl.org/)
May 06, 14:58:24 Info
IKE Reading configuration from "/Library
/Application Support/Lobotomo Software/IPSecuritas/racoon.conf"
May 06, 14:58:24 Info
IKE Resize address pool from 0 to 255
And doesn't get much further than that. Does anyone have a config they
should send me for a Fortigate-100? If necessary, I can post the details
here re our set up.
Kind Regards,
A
Re: Fortigate-100
by cnadig on 2008-05-06 18:06:39 +0200
Hello,
this looks like no negotiation is started at all. Do you get a red dot next to
the connection name in the main window? If so, what does it say when you
hover your mouse pointer over it?
Cheers,
Christoph
Re: Fortigate-100
by anev on 2008-05-06 20:26:47 +0200
When i hover the mouse above it, it says "connection definition error". I'm
assuming then I have done something wrong during the configuration
process. I can export the connection settings and paste them if if it helps?
Re: Fortigate-100
by cnadig on 2008-05-07 11:30:17 +0200
Hello,
please open the connection manager and hover the mouse over the
exclamation mark symbol next to the connection. This will show a list of
things to correct in the connection.
Hope this helps,
Christoph
Problems on Mac OSX V10.4.11
Problems on Mac OSX V10.4.11
by dash on 2008-05-07 14:56:43 +0200
IPSecuritas will connect to our firewall (Juniper SSG-20 with V6.1 firmware)
automatically after restarting the Mac, but after closing the connection it
will fail when you try to start the connection again. It will work sometimes,
but mostly you have to restart the laptop to get it to work.
Also, I have the connect on startup checkbox unchecked in the IPSecuritas
preferences, but it connects anyway when you restart the Mac.
The laptop is a MacBook Pro 15" with Core 2 Duo, 2.16GHz and 1GB
memory.
Thanks,
Darren
Re: Problems on Mac OSX V10.4.11
by dash on 2008-05-12 03:21:25 +0200
Anyone else with this problem on Tiger?
SHA-2 support for phase 1 negotiation?
SHA-2 support for phase 1 negotiation?
by hori on 2008-05-07 15:48:00 +0200
Is there any possibility to to manually edit the configuration files that are
created by ipsecuritas? I need SHA-2 support during the phase 1
negotiation but ipsecuritas only offers MD5 and SHA-1.
As far as I know racoon supports SHA-2.
Re: SHA-2 support for phase 1 negotiation?
by cnadig on 2008-05-09 12:53:24 +0200
Hello,
racoon indeed supports SHA-1 with different hash sizes. I will add support
for this (unfortunately I can't see a way to edit the configuration files to
support this). What about SHA-2 in phase2 (raccon does support it, not so
sure whether MacOS X does as well)?
Cheers,
Christoph
Re: SHA-2 support for phase 1 negotiation?
by hori on 2008-05-13 12:08:28 +0200
Hello,
I cannot find any information if the Mac OS kernel supports IPSec in
conjuction with SHA-2. I hope it does because the userspace tools racoon
and setkey do so. And they are delivered by Apple.
Regards, Holger
Re: SHA-2 support for phase 1 negotiation?
by cnadig on 2008-05-13 13:40:02 +0200
Hello,
I had a look at the kernel and it offers support for SHA-2 (which are
officially called SHA-256, SHA-384, SHA-512, since there are variations
with different digest lengths) for phase 2 too. SHA-224 is not supported by
neither racoon (phase 1) nor the kernel (phase 2).
I will add support for those hashes to both phases.
Cheers,
Christoph
NAT issues
NAT issues
by rjzzleep on 2008-05-15 10:44:21 +0200
Hello,
At work we have a wireless router connected to our internal network. Now
when i use ipsecuritas from within my home router everything works fine,
however, when i try to connect to the vpn from the public wlan at work i
can't connect anymore.
I don't have the logs handy but i just wanted to let you know that replacing
the racoon version inside the ipsecuritas bundle with the stock 10.5.2
version of racoon solves everything.
Also would it be possible to add an option launch the menu item and the
daemon whenever i plan to connect to the vpn?
Either way thanks for ipsecuritas.
IPSecuritas and Smartcard?
IPSecuritas and Smartcard?
by TauTau on 2008-05-19 12:28:10 +0200
Hi,
I will receive my MacBookPro soon, and it will replace a Windows Laptop
then. Until now, I used the Checkpoint-1 Client with Nexus Software and a
Smartcard containing my certificate to access company network. Is there
some way to get this working with IPSecuritas? What would I use to handle
the smartcard?
Lars
Launch2Net, IPSecuritas and Zywall 2 Plus
Launch2Net, IPSecuritas and Zywall 2 Plus
by winnall on 2008-05-21 02:24:32 +0200
I have managed to get a VPN up and running from my MacBook Pro running
Mac OS X 10.5.2 through to my Zywall 2 Plus firewall. I'm using IPSecuritas
3.1 together with Launch2Net, which drives a Novatel Merlin XU870 HSDPA
card.
I would have liked to have perfectly clean log files, but I get the impression
from googling around that certain suspicious-looking log entries in the
IPSecuritas log are normal, e.g.
[i]Warning IKE ignore INITIAL-CONTACT notification, because it is only
accepted after phase1.
Error IKE phase2 negotiation failed due to time up waiting for phase1.
ESP <Zywall-IP>[500]-><Laptop-IP>[500]
Error IKE inappropriate sadb acquire message passed.[/i] etc.
Similarly, I get an error in the Zywall log which is well-documented but
doesn't seem to have a solution:
[i]Receive IPSec packet, but no corresponding tunnel exists[/i]
At the basic TCP/IP level I have a functioning connection from my laptop to
my Zywall (as an endpoint).
However, IPSecuritas has not set up my local DNS server although I made
what I think is an appropriate entry under the DNS tab in the connections
dialogue. I am not the first person to report this: is it still a known bug, or
should I go back and look at it again? The result is that I have to use IP
numbers all the time, which is obviously not nice. I tried adding the address
of the DNS server to the Network configuration in System Preferences, but
that did not help.
Bonjour doesn't seem to work across the VPN either (measured with Bonjour
Browser). I have a number of services on my Linux servers advertised with
Avahi, which show up in Bonjour on my local Macs but don't make it across
the VPN to my laptop. As far as I can tell, the VPN places no restrictions on
packets transfered from the LAN to the VPN so I don't understand why
Bonjour doesn't work.
If anyone can help me with these problems, I'd be very grateful.
Other things I want to do later are to make my AFP and NFS mounts visible
(using Avahi/Bonjour). I know some of the issues there, but if anyone has
an hints, I'd would also apppreciate that.
Steve
Re: Launch2Net, IPSecuritas and Zywall 2 Plus
by winnall on 2008-05-23 13:19:52 +0200
Further research reveals that a VPN will not route multicast packets, so
Bonjour will not work without some extra work. This means having
something at either end of the VPN which tunnels Bonjour's multicast
packets though the VPN. There is something called mtunnel which purports
to do this, but it is no longer available at its author's site.
Why DNS doesn't work remains a mystery to me. I tried VPN Tracker too,
but DNS doesn't work with that either.
Steve
Connecting MacBook to OpenSwan on CentOs Linux
Connecting MacBook to OpenSwan on CentOs Linux
by angelocr on 2008-05-22 16:21:59 +0200
Hi to everybody here!
I am trying to access an OpenSwan Firewall with an OSX 10.4.11 MacBook
(soon to become 10.5.2). Not being so knowledgeable I have made several
attempts trying to understand settings and log results to no avail.
I get the errors:
IKE 508:error:0407006A:rsa
routines:RSA_padding_check_PKCS1_type_1:block type is not
01:rsa_pk1.c:100: 508:error:04067072:rsa
routines:RSA_EAY_PUBLIC_DECRYPT:padding check failed:rsa_eay.c:707:
IKE Invalid SIG.
IKE none message must be encrypted
IKE inappropriate sadb acquire message passed.
IKE phase2 negotiation failed due to time up waiting for phase1. ESP
55.113.55.186[4500]->192.168.1.105[4500]
Beyond this, I see that IPsesuritas wisely has "suggested settings" for
several firewalls. Is there anything like that to connect to an openswan
based linux machine?
Thanks for any hint, I am eager to learn!
Angelo.
IPSecuritas
IPSecuritas
by vdubvr6 on 2008-05-28 15:54:45 +0200
Good Morning,
I have been handed a task to help an end user with VPN connectivity. I am
not familiar with this software and need some advise. Our typical user uses
//shame Windows with a CheckPoint client, anyway this user is on a direct
connected connection on a comcast home account. They connect but it
automatically puts a red dot next to the connection. What could this mean,
I'm sure a lot? Is there a log file or can I enable logging? This is a remote
machine so if I could do this from SSH that would be wonderful.
If not, is there a supplied manual.
-- Thank you
Re: IPSecuritas
by angelocr on 2008-06-03 00:24:42 +0200
I am no expert, just a beginner glad to be able to help :)
1) The red dot says that the connection had no success. So there is
something in the settings to tweak;
2) Yes, you can enable logs and see it through menus. Thay help a lot, in
fact!
3) The whole purpose of IPSecuritas is to put an user interface to make
racoon (the native IPsec of Mac & BSD) easier. I am quite sure you coud use
racoon through SSH, being geeky enough, but not IPSecuritas.
4) Yes, there is a manual included in the product.
Disclaimer: See the beginning!
How to direct all traffic through the VPN
How to direct all traffic through the VPN
by consi on 2008-06-05 10:41:33 +0200
I have successfully set up a VPN in host to network mode so that I can reach
private IPs in the remote network.
All my traffic to websites however still goes out directly instead of going
through the router in the remote network.
How can I tunnel my traffic through the remote network, either all or
selectively, perhaps on a by application basis?
Thanks!
Re: How to direct all traffic through the VPN
by consi on 2008-06-11 00:59:00 +0200
Nobody knows?
It is an option in Apple's built-in VPN client... which is lacking in other areas
though.
How can it be done with IPSecuritas?
I don't have to mention that this is vital if you want to protect your web
usage from a public hotspot.
Re: How to direct all traffic through the VPN
by Forum Admin on 2008-06-11 18:47:11 +0200
Hello,
select Anywhere for the remote endpoint. However, it very much depends
on your firewall and its configuration if this is working.
Cheers,
Christoph
Re: How to direct all traffic through the VPN
by consi on 2008-06-12 01:10:13 +0200
Thanks for the tip. Unfortunately with the 'anywhere' setting, my connection
lamp stays yellow, DCHP pass-through enabled or not. My os x firewall is
set to allow all incoming connections. I suppose I need to open some ports
on my router? Which are those?
Re: How to direct all traffic through the VPN
by consi on 2008-06-18 10:43:44 +0200
A hint from somebody?
Certificate request import error
Certificate request import error
by domodomo on 2008-06-06 22:38:38 +0200
Hello,
I am trying to import a DER request file I generated in IPSecuritas's
Certificate Manager, into Windows Server Certificate Authority.
When I import the submit the request to windows CA I get a 'ASN1 bad tag
value met. 0x8009310b (ASN: 267)' error.
Does anyone know what this is about?
Thanks,
Ian
Help with Nortel 1800/2800
Help with Nortel 1800/2800
by enygma on 2008-06-07 13:42:47 +0200
Has anyone had any luck setting up a connection (user/pass auth) on a
Nortel 1800 or 2800 remote vpn machine? I've been messing with settings
for a while now and I can't seem to get it. Any help would be appreciated!
Local-Network to Remote-Network
Local-Network to Remote-Network
by LinkNet on 2008-06-08 03:21:45 +0200
Hi,
I have used, very successfully, IPSecuritas to connect a single
machine (my MacBook Pro) in host mode to a remote network.
Great job, Christoph, and many thanks. I particularly enjoy
using an ExpressCard to access the Internet via cellular broadband.
I also use Airport to access WiFi broadband.
IPSecuritas is working great as an "emulator" of the [b]hardware[/b]
Linksys BEFVP41 VPN client that I have used for years and that
I hope to be able to leave at home (in honorable retirement) for
the rest of its days.
Unfortunately, there is one (very important) case that forces me
to still travel with the Linksys BEFVP41 VPN client (and to find
hotels that have wired Internet access, to be able to connect
the Linksys's WAN port to the Internet). If you could please
help me solve this challenge, it would be wonderful. Specifically:
For local printing via VPN (using a print server at the remote
network and an HP LaserJet as a networked printer next to my
MacBook Pro), I have not found a way to configure IPSecuritas
to connect a local "network" (consisting of the LaserJet, directly
connected to the Ethernet port of my MacBook Pro) to the remote
network.
Please recall that I prefer to use an ExpressCard to access the Internet
via cellular broadband (or Airport to access WiFi broadband).
So, in these two cases, I have the Ethernet port available for the
LaserJet. How can I connect the Ethernet "network" (consisting of
just the LaserJet in this case) to the remote network via IPSecuritas
(connected to the remote network via an ExpressCard or via
Airport)?
On page 10, the IPSecuritas Manual does not explicitly say how
to connect a local network -- unless I am missing something:
------------------------------------------------------------------------[b]Local Side[/b]: This determines whether you want to connect a single
machine (Host), one (Network) or multiple (Networks) local
networks to the remote end. Most usually you connect a single
machine.
In Host mode, you may define a virtual local IP address. All traffic
sent to the remote end will have this address as the sender address. If
you leave the field empty, the address of the default network
interface is used instead. Please clarify this with your system
administrator if in doubt.
-------------------------------------------------------------------------
How do you define the meaning of "the default network interface"?
Thank you.
Re: Local-Network to Remote-Network
by Forum Admin on 2008-06-09 23:08:19 +0200
Hello,
I'm not sure if I understand your setup completely. If I understand you
correctly, you are travelling with your printer, which is attached to your
MBP's ethernet port. The print server, however, is not on your machine but
in the remote network that you access through the VPN (basically, sending
the print job through the VPN twice). Is this correct?
Cheers,
Christoph
Re: Local-Network to Remote-Network
by LinkNet on 2008-06-18 19:33:24 +0200
[quote author=Forum Admin link=1212888105/0#1
date=1213045699]Hello,
... If I understand you correctly, you are travelling with your printer, which is
attached to your MBP's ethernet port. The print server, however, is not on
your machine but in the remote network that you access through the VPN
(basically, sending the print job through the VPN twice). Is this correct?
Cheers,
Christoph[/quote]
Your interpretation is correct, but the print job does not go through the
VPN twice. The print job does not originate on my Mac: It originates on a
remote print server, which just blasts it to a given IP address of my choice
(which happens to be a printer on the "corporate" network when I am at
home, or a printer on my "hotel network" when I am on the road). I issue
commands from my MBP to the print server via a specialized variant of the
Telnet protocol.
Here is a specific example. Let's assume the following addresses, which
work great when I specify an Endpoing Mode of "Host" for the [b]local[/b]
side:
The Cellular broadband ExpressCard assigns some public address to my
MBP: 111.122.133.144.
My MacBook Pro's VPN IP Address, as specified in "IPSecuritas
Connections=>General Local Side Endpoint Mode := Host" is
192.168.202.17.
So far, so good. I can connect from my MBP to the remote network via the
IPSecuritas VPN tunnel (and any host from the remote network can access
my MBP, using 192.168.202.17, via the IPSecuritas VPN tunnel) without any
problem.
Now, the challenge: If I set "IPSecuritas Connections=>General Local Side
Endpoint Mode := Network" (with specifications along the lines of
192.168.202.17 / CIDR 24 -- and I have tried several kinds, including
192.168.202.0) I get a lot of debugging log entries (which I'll be happy to
email to you) but no connection ever happens.
If I simply change the local endpoint mode back to "Host", IPSecuritas
immediately connects and all is well.
The printer's manually-configured IP address is 192.168.202.22. I would
love to be able to -- somehow -- "include" the printer as part of the VPN
tunnel as established by my MBP via IPSecuritas.
I use this printer all the time when I travel with the Linksys BEFVP41 VPN
client, which connects to the remote network via its WAN port and handles
up to 4 local hardwired Ethernet addresses (my MBP, with 192.168.202.17,
the printer, with 192.168.202.22, and up to two other machines, if I wish to
do so).
With the Linksys VPN client, I am forced to use a hardwired Ethernet
connection to the Internet. With IPSecuritas, I can use Cellular broadband
with my Express card, or I can use WiFi. IPSecuritas is obviously better.
Thanks!
Juniper Netscreen isg-1000 support
Juniper Netscreen isg-1000 support
by jarlt on 2008-06-19 01:53:10 +0200
Does ipsecuritas support the Juniper Netscreen isg-1000? I am unable to
connect.
Here is the log:
IPSecuritas 3.1 build 1860, Mon Oct 15 22:03:05 CEST 2007, nadig
Darwin 8.10.1 Darwin Kernel Version 8.10.1: Wed May 23 16:33:00 PDT
2007; root:xnu-792.22.5~1/RELEASE_I386 i386
Jun 18, 16:23:23 Info
APP IPSec authenticating
Jun 18, 16:23:23 Info
APP IKE daemon started
Jun 18, 16:23:23 Info
APP IPSec started
Jun 18, 16:23:23 Error IKE Foreground mode.
Jun 18, 16:23:23 Info
IKE @(#)ipsec-tools CVS (http://ipsectools.sourceforge.net)
Jun 18, 16:23:23 Info
IKE @(#)This product linked OpenSSL 0.9.7l 28
Sep 2006 (http://www.openssl.org/)
Jun 18, 16:23:23 Info
IKE Reading configuration from "/Library
/Application Support/Lobotomo Software/IPSecuritas/racoon.conf"
Jun 18, 16:23:23 Info
IKE Resize address pool from 0 to 255
Jun 18, 16:23:24 Info
APP Initiated connection MLML
Jun 18, 16:23:24 Error IKE inappropriate sadb acquire message passed.
Jun 18, 16:23:24 Warning IKE No ID match.
Jun 18, 16:23:24 Info
IKE couldn't find the proper pskey, try to get one
by the peer's address.
Jun 18, 16:23:25 Error IKE fatal NO-PROPOSAL-CHOSEN notify
messsage, phase1 should be deleted.
Jun 18, 16:23:25 Error IKE Message: '] '.
Jun 18, 16:23:30 Error IKE fatal NO-PROPOSAL-CHOSEN notify
messsage, phase1 should be deleted.
Jun 18, 16:23:30 Error IKE Message: '] '.
Jun 18, 16:23:30 Info
APP IPSec stopping
Jun 18, 16:23:31 Info
APP IKE daemon terminated
Jun 18, 16:23:31 Info
APP IPSec stopped
Jun 18, 16:26:25 Info
APP Network configuration change detected
Jun 18, 16:26:25 Info
APP IKE daemon started
Jun 18, 16:26:25 Info
APP IPSec starting
Jun 18, 16:26:25 Info
APP Smart Environment Detection: Start
Jun 18, 16:26:25 Error IKE Foreground mode.
Jun 18, 16:26:25 Info
IKE @(#)ipsec-tools CVS (http://ipsectools.sourceforge.net)
Jun 18, 16:26:25 Info
IKE @(#)This product linked OpenSSL 0.9.7l 28
Sep 2006 (http://www.openssl.org/)
Jun 18, 16:26:25 Info
IKE Reading configuration from "/Library
/Application Support/Lobotomo Software/IPSecuritas/racoon.conf"
Jun 18,16:26:25 Info
IKE Resize address pool from 0 to 255
Jun 18, 16:26:26 Info
APP Initiated connection MLML
Jun 18, 16:26:26 Error IKE inappropriate sadb acquire message passed.
Jun 18, 16:26:33 Info
APP Initiated connection MLML
Jun 18, 16:26:40 Info
APP Initiated connection MLML
Jun 18, 16:26:42 Error IKE phase2 negotiation failed due to time up
waiting for phase1. ESP 205.155.73.9[500]->169.254.237.206[500]
Jun 18, 16:26:47 Info
APP Initiated connection MLML
Jun 18, 16:26:49 Error IKE phase2 negotiation failed due to time up
waiting for phase1. ESP 205.155.73.9[500]->169.254.237.206[500]
Jun 18, 16:26:51 Error IKE sendfromto failed
Jun 18, 16:26:54 Info
APP Initiated connection MLML
Jun 18, 16:26:54 Error IKE inappropriate sadb acquire message passed.
Jun 18, 16:26:56 Error IKE phase1 negotiation failed due to time up.
a3aa741a87214ef9:0000000000000000
Jun 18, 16:26:56 Error IKE phase2 negotiation failed due to time up
Re: Juniper Netscreen isg-1000 support
by cnadig on 2008-06-19 08:49:21 +0200
Hello,
I'd expect it to as I made good experiences with other models and I'd
imagine Juniper is using the same IPSec software for all of their models.
In the log you attached I can see that the phase 1 proposal is not accepted
by the firewall - most probably a detail is different on both sides (like
encryption, authentication or ID setting). Please verify the settings of
firewall and IPSecuritas exactly.
You may also send me a log with log level set to Debug to
[email protected] and I will probably be able to help you further
(please make sure to strip confidential information like IP address and IDs
from the log)
Cheers,
Christoph
Re: Juniper Netscreen isg-1000 support
by jarlt on 2008-06-20 01:06:39 +0200
I made configuration changes that enabled me to connect: Phase 2 PFS
None (was 1024 (2)), and Options
disable NAT-T. I can now connect to a single network.
Connecting to multiple networks fails with "msg 5 not interesting"
IPSecuritas and IPComp (LZS)
IPSecuritas and IPComp (LZS)
by rodknocker on 2008-06-21 12:16:41 +0200
Hello,
i would like to use IPSecuritas with IPCOMP (LZS), but I think in the gui there
are no possibilities for settings.
Are there ways to use IPCOMP in IPSecuritas?
Many thanks in advance ;)
Best greetings
David
Re: IPSecuritas and IPComp (LZS)
by cnadig on 2008-06-23 10:35:26 +0200
Hello,
the kernel of MacOS X only supports the deflate compression method, LZS
and OUI are not supported. IPCOMP deflate is therefore always enabled by
IPSecuritas.
Cheers,
Christoph
VPN always "on," would like to be prompted for pwd
VPN always "on," would like to be prompted for pwd
by blst on 2008-06-24 00:12:25 +0200
IPSecuritas is great, but I can't seem to figure out how to make it ask you
for your VPN password rather that your connection always being available.
Is this possible?
Thanks so much!
IPSecuritas, Netgear FVS318v3, AEBS, and NAT-T
IPSecuritas, Netgear FVS318v3, AEBS, and NAT-T
by filterban on 2008-06-24 05:20:47 +0200
I finally got my Netgear FVS318v3 VPN to work with IPSecuritas 3.1,
Leopard, and an Apple Airport Extreme Base Station.
My network looks like this:
MacBook (IPSecuritas) 10.0.1.2 ---> AEBS ---> |||| INTERNET |||| --->
Netgear FVS318v3 ---> Servers (192.168.0.X)
For the most part, the default instructions worked, but I was running into a
problem where IPSecuritas would say it was successfully connected (green
light) but I was unable to ping my servers.
Here's what I found:
1) The client comp has to have a fixed IP behind the AEBS. This is easy to
set up in your Airport Settings - just assign a specific IP (in my case
10.0.1.2) to your Mac by DHCP Client ID.
2) Set up everything else as described in the manual, except in IPSecuritas,
be sure to DISABLE "NAT-T".
Once I did that, everything worked like a charm.
Thanks for the great software... this is really neat stuff. One more thing...
this was with the latest FVS firmware of 3.0_26.
Export connections requests import password
Export connections requests import password
by jarlt on 2008-07-01 23:34:58 +0200
I have 5 connections. When I exported the first one I was asked for an
import password, and put one in. I can not export any additional
connections because I now get "Missing Import Password Please enter an
import password for the exported connection." This is regardless of what I
type in to the the Import password field. -Sidebar- the reason I have 5
connections is because I can not connect with Networks having more than 1
entry. I do not see any docs on Export.
Thanks
Re: Export connections requests import password
by cnadig on 2008-07-03 13:13:00 +0200
Hello,
please download a prerelease of 3.2 from here:
www.lobotomo.com/products/downloads/IPSecuritas32b1.dmg
The included Readme lists the enhancements and new features. Feedback is
welcome!
Cheers,
Christoph
Re: Export connections requests import password
by jarlt on 2008-07-03 19:35:04 +0200
Thanks. I downloaded and installed. The Export works. The multi
networks in connections is buggy. I am connecting to a Juniper ISG-1000.
I have networks: 192.190.45.0/24, 198.189.27.0/24, 205.155.73.32/27,
205.155.73.128/27, 205.155.74.0/24 and 205.155.75.0/24. If I just have
the 192.190.. and 198.189.. I can connect but if I add all 6 networks the log
shows that there are 3 networks configured and I cannot connect them and
the status light is red.
Here is the log
Jul 03, 10:27:09 Debug APP All connections authenticated
Jul 03, 10:27:09 Debug APP State change from IDLE to AUTHENTICATING
after event START
Jul 03, 10:27:09 Info
APP IPSec authenticating
Jul 03, 10:27:09 Error APP Connection MLML 27-45 is not started
because no route to remote host was found
Jul 03, 10:27:09 Info
APP IKE daemon started
Jul 03, 10:27:09 Debug APP State change from AUTHENTICATING to
RUNNING after event TIMER
Jul 03, 10:27:09 Info
APP IPSec started
Jul 03, 10:27:09 Info
IKE Foreground mode.
Jul 03, 10:27:09 Info
IKE @(#)ipsec-tools CVS (http://ipsectools.sourceforge.net)
Jul 03, 10:27:09 Info
IKE @(#)This product linked OpenSSL 0.9.7l 28 Sep
2006 (http://www.openssl.org/)
Jul 03, 10:27:09 Info
IKE Reading configuration from "/Library
/Application Support/Lobotomo Software/IPSecuritas/racoon.conf"
Jul 03, 10:27:09 Info
IKE Resize address pool from 0 to 255
Jul 03, 10:27:09 Debug IKE parse successed.
Jul 03, 10:27:09 Debug IKE open /Library/Application
Support/Lobotomo Software/IPSecuritas/admin.sock as racoon
management.
Jul 03, 10:27:09 Debug IKE my interface: fe80::1%lo0 (lo0)
Jul 03, 10:27:09 Debug IKE my interface: 127.0.0.1 (lo0)
Jul 03, 10:27:09 Debug IKE my interface: ::1 (lo0)
Jul 03, 10:27:09 Debug IKE configuring default isakmp port.
Jul 03, 10:27:09 Debug IKE 3 addrs are configured successfully
Jul 03, 10:27:09 Info
IKE ::1[500] used as isakmp port (fd=6)
Jul 03, 10:27:09 Info
IKE 127.0.0.1[500] used as isakmp port (fd=7)
Jul 03, 10:27:09 Info
IKE fe80::1%lo0[500] used as isakmp port (fd=8)
Jul 03, 10:27:09 Debug IKE get pfkey X_SPDDUMP message
Jul 03, 10:27:09 Debug IKE 02120200 02000000 00000000 46080000
Jul 03, 10:27:09 Debug IKE pfkey X_SPDDUMP failed: No such file or
directory
Re: Export connections requests import password
by cnadig on 2008-07-04 13:19:31 +0200
Hello,
what does the tooltip say when you hover the mouse over the red dot?
Cheers,
Christoph
Re: Export connections requests import password
by jarlt on 2008-07-07 20:14:43 +0200
I connected this morning and the dot is green and the mouse over is
connected. When I attempt to connect to a server on the 192.190.45.0/24
network it fails. I'll send you the connection log.
Thanks
Re: Export connections requests import password
by jarlt on 2008-07-07 20:22:19 +0200
I am getting "msg 5 not interesting" when I attempt to connect to servers
on the different networks. When I use the connection for the individual
network I am able to connect.
odd issue
odd issue
by tmcnicho on 2008-07-02 21:40:01 +0200
I hadn't used IPSecuritas in a while, had since updated to 10.5.3. Went to
connect and it just sits there doing nothing. I've found troubleshooting that
if change the remote settings from "network" to "anywhere" it connects just
fine, but then of course sends ALL my traffic down the tunnel. Any ideas
here?
I'm connecting a checkpoint vpn.
Thanks,
Tom
Re: odd issue
by tmcnicho on 2008-07-02 22:10:47 +0200
OK...
maybe my notation is just way off here.
I was previously using 172.16.0.0/12 as the remote side.
if i define the networks on the other end i need to connect to manually, it
works fine.
such as.
172.16.19.0/24
172.16.225.0/24...
etc.. I have previously used 172.16.0.0/12 without a problem... :|
tom
Re: odd issue
by dbc on 2008-07-03 04:23:48 +0200
172.16.0.0/12
is the same as 172.0.0.0/12, as the /12 specifies a netmask of 255.240.0.0
I suspect you mean 172.16.0.0/16
which would be a netmask of 255.255.0.0
-dave
Works wired, fails wireless
Works wired, fails wireless
by dbc on 2008-07-03 03:33:56 +0200
Search did not turn up any similar problems.
IPsecuritas 3.1 on OS X 10.4.11, Netgear FVS318r3
I configured and tested everything perfectly well through the wired Ethernet
port.
Today I tried with Airport for the first time. IPSecuritas came right up to the
"green ball" stage with no hitches. But.. no connectivity either. Could not
ping my home network or the router. Yet, I come back to the wired
network and IPsecuritas works perfectly. All the time on wireless,
IPSecuritas is perfectly happy to start and stop and the log messages are all
normal, as far as I can tell. Yet, no pings back to router.
Is there something that needs to be configured differently? Clearly from the
log messages IPSecuritas is finding the wireless network and is connecting
to the Netgear box without any problem. Yet no traffic flows that way.
My home network is a 192.168.0.0/24 network, and the wireless network
that I was on served a DHCP address from the 192.168.1.0/24 range. So,
there should not be a conflict there since both networks use netmask
255.255.255.0.
IPSecuritas is configured to tunnel traffic to 192.168.0.0/24 only. All other
traffic was going out correctly. Again, IPSecuritas appears to think it is
working correctly, but doesn't seem to pass any traffic.
Re: Works wired, fails wireless
by dbc on 2008-07-04 18:12:20 +0200
Update: This appears to be a problem with the hot spot infrastructure, not
ipsecuritas, but hopefully people here can shed some light on what may be
happening.
After reading the documentation, it seems that when you get a "green ball
connect" but no traffic passes that it is a symptom of NAT traversal
problems. My original configuration was set for "enable" NAT-T. I created
another configuration set for "force" NAT-T.
Also, I went to another hot spot to test, and both the "enable" and "force"
NAT-T configurations worked perfectly. At the problematic hot spot, both
the "enable" and "force" configurations gave a "green ball connect" but
would not pass traffic. At this point, I suspect that there is some
configuration issue in the hot spot, and would like to help diagnose the
problem there. What should I look for? There are several boxes in the path,
a wireless access point of course, and also a firewall box. Something
somewhere is serving DHCP addresses. What can I do to provide additional
diagnosis?
Re: Works wired, fails wireless
by Forum Admin on 2008-07-05 12:41:17 +0200
Hello,
I public hotspots you will usually need NAT-T. IPSec traffic is transported in
ESP packets, which is not NAT aware (incoming ESP packets cannot be
uniquely assigned to a host in a NATed network, which hotspots usually
are. Some NAT routers will send incoming ESP packets to the host that last
sent out an ESP paket, problematic if you are not the only user using IPSec
in this hotspot. Other router do not pass on ESP at all or it is disabled by its
oprator).
NAT-T encapsulates the ESP traffic in UDP packets, which is NAT aware and
incoming traffic can be assigned to the right host by any router.
Please note that the firewall you connect to needs to support NAT-T (not to
be confused with IPSec pass-through).
The reason why you get the greed dot but cannot connect to any remote
host is that the tunnel could be established successfully (the tunnel
negotiation is done with UDP as well), but traffic is silently dropped by the
hotspot.
Hope this helps,
Christoph
Re: Works wired, fails wireless
by dbc on 2008-07-05 18:29:20 +0200
Yes, that helps, it clarifies a lot. I'm still unclear on what may be causing the
packets to be dropped by the hot spot. With NAT-T enabled, how does the
tunnel negotiation traffic differ from payload traffic? It would seem that the
hot spot is dropping the payload UDP packets but passing the negotiation
UDP packets.
Re: Works wired, fails wireless
by Forum Admin on 2008-07-10 10:15:00 +0200
Hello,
this depends on the NAT versions that your firewall supports, but basically
there is not a lot of differences. In some NAT versions, the UDP port is
different between IKE (connection negotiation, ports 500 and 4500) and
payload (a free port number agreed on during connection negotiation).
If you can establish a connection but payload is blocked, chances are high
that no NAT-T was agreed even if NAT-T was forced in IPSecuritas. The
best way to check this is to sniff your network traffic with tcpdump, e.g.
sudo tcpdump -i en1 (or en0 when connected with Ethernet). If the
command only shows ESP traffic going to your firewall, no NAT-T was
negotiated and your firewall most probably does not support it.
Hope this helps,
Christoph
Re: Works wired, fails wireless
by dbc on 2008-07-11 07:44:10 +0200
OK, very good. I will try that the next time I am at that hotspot.
Re: Works wired, fails wireless
by uocooper on 2008-11-25 22:01:44 +0100
Similar setup here with the same issues. 10.5.5, IPSecuritas 3.1, Netgear
FVS318v3. Airport network is on 172.16.33.x and the VPN is on
192.168.1.x. It works fine if I'm directly connected to my cable modem but
if I use an Airport Extreme (802.11 g) with firmware 5.7 it shows that it's
connected but nothing actually works. I can't ping an IP on the VPN
network. This is the Airport Extreme that looks like a white mushroom. I've
tried going through the various NAT-T options in IPSecuritas but no dice.
I've also modifying the NAT options of the basestation but it doesn't matter
how it's set. Is using this version of the Airport Extreme known to not work
with IPSecuritas or is there anything else I can try to get it working?
VPN connections with same local and remote netaddr
VPN connections with same local and remote netaddr
by TStewart on 2008-07-03 20:09:09 +0200
I have a SonicWall Pro 100 at work that I connect to from outside our LAN.
The internal private address scheme is 192.168.0.x /24. When I was first
setting up my VPN client, I couldn't connect from home, as my home
network had a matching network address scheme—192.168.0.x. I then
changed the network address to 192.168.1.x, and all has worked fine.
However, there are times when I need to connect to my work VPN from
remote networks where the local private network address matches the same
private network address as work. I have been unsuccessful at coming up
with a solution around this? Is there anything I can do? Am I just missing a
simple setting?
Thanks!
TStewart
Here are screenshots of my settings:
[img]http://www.gigafiles.co.uk/files/2130/Picture%202.jpg[/img]
[img]http://www.gigafiles.co.uk/files/2130/Picture%203.jpg[/img]
[img]http://www.gigafiles.co.uk/files/2130/Picture%204.jpg[/img]
[img]http://www.gigafiles.co.uk/files/2130/Picture%205.jpg[/img]
[img]http://www.gigafiles.co.uk/files/2130/Picture%206.jpg[/img]
[img]http://www.gigafiles.co.uk/files/2130/Picture%207.jpg[/img]
Re: VPN connections with same local and remote net
by TStewart on 2008-07-09 01:01:32 +0200
Disregard! This was a kind of stupid question I asked. How can you route
between duplicate IP spaces. Doesn't work. . .
Tyler
Re: VPN connections with same local and remote net
by joostvdl on 2008-12-15 08:42:00 +0100
It isn't a stupid question. Because a lot of companies select the same
private address range for their local network. So when they need to be
connected it gives conflicts. I found that the ZyWALL Firewalls have the
option to use NAT over IPSEC (Virtual Address Mapping) to solve this
problem.
I tried it with IPSecuritas 3.1 but I could get it working. So if anyone has got
it working please let me know.
Re: VPN connections with same local and remote net
by Forum Admin on 2008-12-16 14:56:05 +0100
Hello,
there is an option to disable the address collision check altogehter in 3.2
(see latest beta). Please note, however, that using the same network locally
and remotely will hide the local network (since all traffic will be routed
through the tunnel to the remote side). Therefore, hosts (machines, printers
etc.) in the local lan will be unavailable when IPSec is active with such a
configuration.
Hope this helps,
Christoph
Run as Non-Admin user
Run as Non-Admin user
by gibbsjoh on 2008-07-10 11:43:14 +0200
Hi All,
We are hoping to deploy IPSecuritas in lieu of VPN Tracker to around 5
remote users. These users are not currently admin users on their company
laptops - and I'd prefer to keep it that way.
My question: is there any way to run IPSecuritas without needing an admin
username and password? I suspect not as it's a racoon issue from what I
can see.
I've tried using an AppleScript, using "do shell script" with the path to the
executable, and the "with administrator privileges" flag with no luck.
Any info would be much appreciated.
John
Re: Run as Non-Admin user
by cnadig on 2008-07-16 11:46:16 +0200
Hello,
it should work finde for non-admin users, you should need to enter the
admin password at first run only. However, if you run it as a non-admin
user for the first time, you'll need to reboot the machine afterwards.
Otherwise the user will be prompted for the admin password again he logs
in for the next time and runs IPSecuritas (this is due to a limitation/bug in
MacOS which we have no way to change).
Hope this helps,
Christoph
Network Collision
Network Collision
by mudiam on 2008-07-17 21:37:07 +0200
Hello,
I am trying to setup my vpn to my work and I get a red light when I connect.
Here is the log
IPSecuritas 3.1 build 1860, Mon Oct 15 22:03:05 CEST 2007, nadig
Darwin 8.10.1 Darwin Kernel Version 8.10.1: Wed May 23 16:33:00 PDT 2007;
root:xnu-792.22.5~1/RELEASE_I386 i386
Jul 17, 12:21:05 Debug APP State change from IDLE to AUTHENTICATING
after event START
Jul 17, 12:21:05 Info
APP IPSec authenticating
Jul 17, 12:21:05 Info
APP IKE daemon started
Jul 17, 12:21:05 Debug APP State change from AUTHENTICATING to
RUNNING after event TIMER
Jul 17, 12:21:05 Info
APP IPSec started
Jul 17, 12:21:05 Info
IKE Foreground mode.
Jul 17, 12:21:05 Info
IKE @(#)ipsec-tools CVS (http://ipsectools.sourceforge.net)
Jul 17, 12:21:05 Info
IKE @(#)This product linked OpenSSL 0.9.7l 28 Sep
2006 (http://www.openssl.org/)
Jul 17, 12:21:05 Info
IKE Reading configuration from "/Library/Application
Support/Lobotomo Software/IPSecuritas/racoon.conf"
Jul 17, 12:21:05 Info
IKE Resize address pool from 0 to 255
Jul 17, 12:21:05 Debug IKE parse successed.
Jul 17, 12:21:05 Debug IKE open /Library/Application Support/Lobotomo
Software/IPSecuritas/admin.sock as racoon management.
Jul 17, 12:21:05 Debug IKE my interface: ::1 (lo0)
Jul 17, 12:21:05 Debug IKE my interface: fe80::1%lo0 (lo0)
Jul 17, 12:21:05 Debug IKE my interface: 127.0.0.1 (lo0)
Jul 17, 12:21:05 Debug IKE my interface: fe80::217:f2ff:fed4:dab6%en0
(en0)
Jul 17, 12:21:05 Debug IKE my interface: 192.168.1.100 (en0)
Jul 17, 12:21:05 Debug IKE my interface: fe80::21c:42ff:fe00:0%en2 (en2)
Jul 17, 12:21:05 Debug IKE my interface: 10.37.129.3 (en2)
Jul 17, 12:21:05 Debug IKE my interface: fe80::21c:42ff:fe00:1%en3 (en3)
Jul 17, 12:21:05 Debug IKE my interface: 10.211.55.3 (en3)
Jul 17, 12:21:05 Debug IKE configuring default isakmp port.
Jul 17, 12:21:05 Debug IKE 9 addrs are configured successfully
Jul 17, 12:21:05 Info
IKE 10.211.55.3[500] used as isakmp port (fd=7)
Jul 17, 12:21:05 Info
IKE fe80::21c:42ff:fe00:1%en3[500] used as isakmp
port (fd=8)
Jul 17, 12:21:05 Info
IKE 10.37.129.3[500] used as isakmp port (fd=9)
Jul 17, 12:21:05 Info
IKE fe80::21c:42ff:fe00:0%en2[500] used as isakmp
port (fd=10)
Jul 17, 12:21:05 Info
IKE 192.168.1.100[500] used as isakmp port (fd=11)
Jul 17, 12:21:05 Info
IKE fe80::217:f2ff:fed4:dab6%en0[500] used as
isakmp port (fd=12)
Jul 17, 12:21:05 Info
IKE 127.0.0.1[500] used as isakmp port (fd=13)
Jul 17, 12:21:05 Info
IKE fe80::1%lo0[500] used as isakmp port (fd=14)
Jul 17, 12:21:05 Info
IKE ::1[500] used as isakmp port (fd=15)
Jul 17, 12:21:05 Debug IKE get pfkey X_SPDDUMP message
Jul 17, 12:21:05 Debug IKE 02120200 02000000 00000000 ff110000
Jul 17, 12:21:05 Debug IKE pfkey X_SPDDUMP failed: No such file or
directory
My local network is 192.168.1.xxx
and my office network is 10.0.0.0/8
Re: Network Collision
by mudiam on 2008-07-18 07:17:01 +0200
Ok, so, I got rid of the interfaces that were conflicting.. as I was running
parallels interfaces, I disabled them, as they were in the 10. network as well.
Now I am getting a different error, Connection timed out.
Here is the debug log..
IPSecuritas 3.1 build 1860, Mon Oct 15 22:03:05 CEST 2007, nadig
Darwin 8.10.1 Darwin Kernel Version 8.10.1: Wed May 23 16:33:00 PDT 2007;
root:xnu-792.22.5~1/RELEASE_I386 i386
Jul 17, 22:10:52 Debug APP State change from IDLE to AUTHENTICATING
after event START
Jul 17, 22:10:52 Info
APP IPSec authenticating
Jul 17, 22:10:52 Info
APP IKE daemon started
Jul 17, 22:10:52 Debug APP State change from AUTHENTICATING to
RUNNING after event TIMER
Jul 17, 22:10:52 Info
APP IPSec started
Jul 17, 22:10:52 Debug APP Received SADB message type X_SPDUPDATE not interesting
Jul 17, 22:10:52 Debug APP Received SADB message type X_SPDUPDATE not interesting
Jul 17, 22:10:52 Debug IKE Foreground mode.
Jul 17, 22:10:52 Info
IKE @(#)ipsec-tools CVS (http://ipsectools.sourceforge.net)
Jul 17, 22:10:52 Info
IKE @(#)This product linked OpenSSL 0.9.7l 28 Sep
2006 (http://www.openssl.org/)
Jul 17, 22:10:52 Info
IKE Reading configuration from "/Library/Application
Support/Lobotomo Software/IPSecuritas/racoon.conf"
Jul 17, 22:10:52 Info
IKE Resize address pool from 0 to 255
Jul 17, 22:10:52 Debug IKE lifetime = 28800
Jul 17, 22:10:52 Debug IKE lifebyte = 0
Jul 17, 22:10:52 Debug IKE encklen=0
Jul 17, 22:10:52 Debug IKE p:1 t:1
Jul 17, 22:10:52 Debug IKE 3DES-CBC(5)
Jul 17, 22:10:52 Debug IKE SHA(2)
Jul 17, 22:10:52 Debug IKE 1536-bit MODP group(5)
Jul 17, 22:10:52 Debug IKE XAuth pskey client(65001)
Jul 17, 22:10:52 Debug IKE hmac(modp1536)
Jul 17, 22:10:52 Debug IKE compression algorithm can not be checked
because sadb message doesn't support it.
Jul 17, 22:10:52 Debug IKE parse successed.
Jul 17, 22:10:52 Debug IKE open /Library/Application Support/Lobotomo
Software/IPSecuritas/admin.sock as racoon management.
Jul 17, 22:10:52 Info
IKE 192.168.1.100[4500] used as isakmp port (fd=7)
Jul 17, 22:10:52 Info
IKE 192.168.1.100[500] used as isakmp port (fd=8)
Jul 17, 22:10:52 Debug IKE get pfkey X_SPDDUMP message
Jul 17, 22:10:52 Debug IKE 02120000 0f000100 01000000 ed130000
03000500 ff080000 10020000 0a000000
Jul 17, 22:10:52 Debug IKE 00000000 00000000 03000600 ff200000
10020000 c0a80164 00000000 00000000
Jul 17, 22:10:52 Debug IKE 07001200 02000100 34000000 00000000
28003200 02020000 10020000 3fe55d05
Jul 17, 22:10:52 Debug IKE 00000000 00000000 10020000 c0a80164
00000000 00000000
Jul 17, 22:10:52 Debug IKE get pfkey X_SPDDUMP message
Jul 17, 22:10:52 Debug IKE 02120000 0f000100 00000000 ed130000
03000500 ff200000 10020000 c0a80164
Jul 17, 22:10:52 Debug IKE 00000000 00000000 03000600 ff080000
10020000 0a000000 00000000 00000000
Jul 17, 22:10:52 Debug IKE 07001200 02000200 33000000 00000000
28003200 02020000 10020000 c0a80164
Re: Network Collision
by mudiam on 2008-07-18 07:21:03 +0200
well, the main errors are..
Jul 17, 22:10:52 Info
APP Initiated connection Vcommerce VPN
Jul 17, 22:10:52 Debug IKE get pfkey ACQUIRE message
Jul 17, 22:10:52 Debug IKE 02060003 24000000 e9000000 00000000
03000500 ff200000 10020000 c0a80164
Jul 17, 22:10:52 Debug IKE 00000000 00000000 03000600 ff200000
10020000 3fe55d05 00000000 00000000
Jul 17, 22:10:52 Debug IKE 1c000d00 20000000 00030000 00000000
00010008 00000000 01000000 01000000
Jul 17, 22:10:52 Debug IKE 00000000 00000000 00000000 00000000
00000000 00000000 80510100 00000000
Jul 17, 22:10:52 Debug IKE 80700000 00000000 00000000 00000000
00040000 00000000 0001c001 00000000
Jul 17, 22:10:52 Debug IKE 01000000 01000000 00000000 00000000
00000000 00000000 00000000 00000000
Jul 17, 22:10:52 Debug IKE 80510100 00000000 80700000 00000000
00000000 00000000 000c0000 00000000
Jul 17, 22:10:52 Debug IKE 00010001 00000000 01000000 01000000
00000000 00000000 00000000 00000000
Jul 17, 22:10:52 Debug IKE 00000000 00000000 80510100 00000000
80700000 00000000 00000000 00000000
Jul 17, 22:10:52 Error IKE inappropriate sadb acquire message passed.
Jul 17, 22:10:52 Debug IKE get pfkey ACQUIRE message
Jul 17, 22:10:52 Debug IKE 02060003 14000000 e7000000 51130000
03000500 ff200000 10020000 c0a80164
Jul 17, 22:10:52 Debug IKE 00000000 00000000 03000600 ff200000
10020000 3fe55d05 00000000 00000000
Jul 17, 22:10:52 Debug IKE 0a000d00 20000000 000c0000 00000000
00010001 00000000 01000000 01000000
Jul 17, 22:10:52 Debug IKE 00000000 00000000 00000000 00000000
00000000 00000000 80510100 00000000
Jul 17, 22:10:52 Debug IKE 80700000 00000000 00000000 00000000
02001200 02000200 33000000 00000000
Jul 17, 22:10:52 Debug IKE suitable outbound SP found:
192.168.1.100/32[0] 10.0.0.0/8[0] proto=any dir=out.
Jul 17, 22:10:52 Debug IKE sub:0xbffff4fc: 10.0.0.0/8[0]
192.168.1.100/32[0] proto=any dir=in
Jul 17, 22:10:52 Debug IKE db :0x308cb8: 10.0.0.0/8[0]
192.168.1.100/32[0] proto=any dir=in
Jul 17, 22:10:52 Debug IKE suitable inbound SP found: 10.0.0.0/8[0]
192.168.1.100/32[0] proto=any dir=in.
Jul 17, 22:10:52 Debug IKE new acquire 192.168.1.100/32[0]
10.0.0.0/8[0] proto=any dir=out
Jul 17, 22:10:52 Debug IKE (proto_id=ESP spisize=4 spi=00000000
spi_p=00000000 encmode=Tunnel reqid=0:0)
Jul 17, 22:10:52 Debug IKE (trns_id=3DES encklen=0 authtype=hmac-sha)
--Jul 17, 22:10:53
Jul 17, 22:10:53
Jul 17, 22:10:53
Jul 17, 22:10:53
------
Debug IKE Configuration exchange type mode config SET
Debug IKE Attribute XAUTH_STATUS
Error IKE Xauth authentication failed
Debug IKE Sending MODE_CFG ACK
Re: Network Collision
by mudiam on 2008-07-18 07:26:10 +0200
well, there was too much logging when in debug, so I am just doing info..
PSecuritas 3.1 build 1860, Mon Oct 15 22:03:05 CEST 2007, nadig
Darwin 8.10.1 Darwin Kernel Version 8.10.1: Wed May 23 16:33:00 PDT 2007;
root:xnu-792.22.5~1/RELEASE_I386 i386
Jul 17, 22:23:26 Info
APP IPSec started
Jul 17, 22:23:26 Error IKE Foreground mode.
Jul 17, 22:23:26 Info
IKE @(#)ipsec-tools CVS (http://ipsectools.sourceforge.net)
Jul 17, 22:23:26 Info
IKE @(#)This product linked OpenSSL 0.9.7l 28 Sep
2006 (http://www.openssl.org/)
Jul 17, 22:23:26 Info
IKE Reading configuration from "/Library/Application
Support/Lobotomo Software/IPSecuritas/racoon.conf"
Jul 17, 22:23:26 Info
IKE Resize address pool from 0 to 255
Jul 17, 22:23:27 Info
APP Initiated connection Vcommerce VPN
Jul 17, 22:23:27 Error IKE inappropriate sadb acquire message passed.
Jul 17, 22:23:27 Warning IKE No ID match.
Jul 17, 22:23:27 Info
IKE couldn't find the proper pskey, try to get one by
the peer's address.
Jul 17, 22:23:27 Error IKE Xauth authentication failed
Jul 17, 22:23:27 Error IKE unknown Informational exchange received.
Jul 17, 22:23:27 Error IKE unknown Informational exchange received.
Jul 17, 22:23:34 Info
APP Initiated connection Vcommerce VPN
Jul 17, 22:23:41 Info
APP Initiated connection Vcommerce VPN
Jul 17, 22:23:43 Error IKE phase2 negotiation failed due to time up waiting
for phase1. ESP 63.229.93.5[0]->192.168.1.100[0]
Jul 17, 22:23:48 Info
APP Initiated connection Vcommerce VPN
Jul 17, 22:23:48 Warning IKE No ID match.
Jul 17, 22:23:48 Info
IKE couldn't find the proper pskey, try to get one by
the peer's address.
Jul 17, 22:23:48 Error IKE Xauth authentication failed
Jul 17, 22:23:48 Error IKE unknown Informational exchange received.
Jul 17, 22:23:48 Error IKE unknown Informational exchange received.
Jul 17, 22:23:55 Info
APP Initiated connection Vcommerce VPN
Jul 17, 22:23:55 Error IKE inappropriate sadb acquire message passed.
Jul 17, 22:24:00 Warning APP Connection Vcommerce VPN timed out
Jul 17, 22:24:00 Warning APP Suspending for 15 seconds
Jul 17, 22:24:04 Error IKE phase2 negotiation failed due to time up waiting
for phase1. ESP 63.229.93.5[0]->192.168.1.100[0]
Jul 17, 22:24:16 Warning APP Connection Vcommerce VPN reactivated after
suspension
Jul 17, 22:24:16 Error IKE such policy does not already exist:
"192.168.1.100/32[0] 10.0.0.0/8[0] proto=any dir=out"
Jul 17, 22:24:16 Error IKE such policy does not already exist:
"10.0.0.0/8[0] 192.168.1.100/32[0] proto=any dir=in"
Jul 17, 22:24:19 Info
APP Initiated connection Vcommerce VPN
Jul 17, 22:24:19 Error IKE inappropriate sadb acquire message passed.
Jul 17, 22:24:19 Warning IKE No ID match.
Jul 17, 22:24:19 Info
IKE couldn't find the proper pskey, try to get one by
the peer's address.
Jul 17, 22:24:19 Error IKE Xauth authentication failed
Jul 17, 22:24:19 Error IKE unknown Informational exchange received.
Jul 17, 22:24:19 Error IKE unknown Informational exchange received.
Jul 17, 22:24:26 Info
APP Initiated connection Vcommerce VPN
Jul 17, 22:24:33 Info
APP Initiated connection Vcommerce VPN
Jul 17, 22:24:35 Error IKE phase2 negotiation failed due to time up waiting
for phase1. ESP 63.229.93.5[0]->192.168.1.100[0]
Jul 17, 22:24:40 Info
APP Initiated connection Vcommerce VPN
Jul 17, 22:24:40 Warning IKE No ID match.
Jul 17, 22:24:40 Info
IKE couldn't find the proper pskey, try to get one by
smb, ssh drops after few minutes
smb, ssh drops after few minutes
by ejbcommander on 2008-07-18 14:36:57 +0200
Hi,
everything here works fine (after 3 days of trial & error) with Ceckpoint
SecureClient NGX VPN-1 and IPSecuritas 3.2b1 on 10.4.11 - except
smb-shares and ssh-Sessions.
Mounted smb-shares are dropped after a few Minutes, same with ssh.
Is that a known issue?
Is there a solution?
I often have to start long running build-processes on remote servers, now I
can only complete them by starting them nohup.
Thanks in advance,
Michael
Linksys WVRS4400N - Any Secrets???
Linksys WVRS4400N - Any Secrets???
by Beavis on 2008-07-19 01:52:47 +0200
So I have a Linksys WVRS4400N that I know is set up right because I can
connect via QuickVPN with XP from my mac at home. Did the connection
wizard with ipsecuritas and no dice : {
Been reading posts here but still can't find any detailed instructions to get
this working. Even following the advice of setting the Remote Security
Group to a specific IP. Am I missing something?
Their are still a lot of acronyms and things I don't fully understand, but I
know I'm ALMOST there.
Does anyone have some detailed instructions.
Thanks in advance!
Beavis McSleavis :-/
WRVS 4400N Setup
WRVS 4400N Setup
by Beavis on 2008-07-21 22:51:00 +0200
We have this linksys router with these specs...
[img]http://www.boxwrench.net/images/posts/VPN.png[/img]
[img]http://www.boxwrench.net/images/posts/Advanced.png[/img]
[img]http://www.boxwrench.net/images/posts/General.png[/img]
And this is how we have it setup in IPSecuritas...
[img]http://www.boxwrench.net/images/posts/Phase_1.png[/img]
[img]http://www.boxwrench.net/images/posts/Phase_2.png[/img]
[img]http://www.boxwrench.net/images/posts/ID.png[/img]
[img]http://www.boxwrench.net/images/posts/DNS.png[/img]
[img]http://www.boxwrench.net/images/posts/Options.png[/img]
We still can't get a connection. We purchased a static IP thru our ISP and it
is correctly set up to passthrough VPN with NAT disabled.
Can anyone see what is wrong?
Thanks in advance 8-)
Re: WRVS 4400N Setup
by cnadig on 2008-07-22 15:19:43 +0200
Hello,
I helped configuring a WRVS4400N a while ago and found it had a rather
peculiar speciality - connecting with a random IP address would not work.
We got it working by specifying an IP address for 'Remote Security Group
Type' (like 10.10.1.1, please copy this address to the local endpoint IP
address field in IPSecuritas).
This also means, that you need to setup more than one connections if more
than one user wants to connect at the same time.
Hope this helps,
Christoph
Re: WRVS 4400N Setup
by Beavis on 2008-07-22 20:40:18 +0200
Thanks Christoph,
For clarification, what is the local host IP? Is that the local LAN IP of the
departure router from the remote location?
Example: I'm at a coffee shop with my laptop, I don't know the local IP of
the shops router. This is my remote departure point.
I'm attempting to connect to my router at my home office which is behind a
statip IP.
I know the static IP, DNS, LAN IP, and subnet mask at my office.
Again I do not know the coffee shops LAN.
Does their router need to have VPN enabled?
Is it possible to use IPSecuritas to make an IPSec connection without
knowing your departure LAN IP?
The connection works fine with the Linksys Quick VPN on a PC in the above
scenario. Hoping IPSecuritas will enable my Macbook Pros the same access!
Thanks again! :)
Re: WRVS 4400N Setup
by DistortedLoop on 2008-12-04 18:56:12 +0100
The WRVS4400N is temperamental with Macs and IPSecuritas, but you can
establish a working tunnel to get onto your network. I figured this out a
couple of years ago and posted settings here on this forum. I also see that
the newer versions of IPSecuritas include auto-configuration file for the
4400N.
Looking at the particular settings you set, the first thing I see you have set
wrong is in the Advanced Settings on the Linksys. Both your local and
remote identifiers have to be set to ip address, not name. If you use name,
it must be a domain name (ie., www.mydomain.com), and any DNS lookup
on that name must resolve to your current ip address on that end of the
connection.
Also, use Main, not Aggressive.
I've found that dissecting the WRVS4400N's VPN log can really help in
figuring out what settings you have that are wrong.
One caveat about the connection: I've just learned after a couple of years of
using IPSecuritas --> WRVS4400N that not all network traffic goes over the
VPN (https, mail, chat, etc - they aren't on the VPN). I'm trying to research
that right now, which is why I came back to the forum here and ran across
your older post.
At this point, you've probably given up or figured it out, but maybe my
information above will help others who are trying to figure out getting a
connection going.
Re: WRVS 4400N Setup
by DistortedLoop on 2008-12-04 21:49:53 +0100
Oops! Forgot to mention that you have to use Firmware V1.00.16 or earlier.
I spent a good 12 hours trying to get the new firmware (V1.03?) working
without success. Pretty frustrating.
The issue with the new firmware is that you must use a domain name or
specific ip address to identify the client; the use of "any" never worked. I
verified this by using a Spring Aircard to attempt to VPN while sitting in
front of my router. If I put in the dynamic ip address of the Aircard as the
remote identifier, connection establishes. This won't work if you're on the
road unless you jump through some hoops.
One way to do it would be to enable remote administration of your
WRVS4400N over the WAN. You could log in via the web interface, and
change the VPN settings on the router to match your current ip address.
Ugly workaround in my opinion.
Another method that might work for the Aircard user, which I haven't tried
because I am not interested at this time in upgrading the firmware back to
V1.03 to test it out, would be to register an account with DYNDNS.ORG for
your laptop/remote system, then use their OS X widget that dynamically
updates your ip address on their DNS servers. You would then use the
domain name in the remote identifier (i.e. mymobilename.dyndns.org).
Should work, but again, I haven't tested it. I may have to if trying to get all
network traffic to go over the VPN forces me to try the newer firmware.
Re: WRVS 4400N Setup
by DistortedLoop on 2008-12-05 16:02:49 +0100
[quote author=DistortedLoop link=1216673460/0#4 date=1228423793]
Another method that might work for the Aircard user, which I haven't tried
because I am not interested at this time in upgrading the firmware back to
V1.1.03 to test it out, would be to register an account with DYNDNS.ORG
for your laptop/remote system, then use their OS X widget that dynamically
updates your ip address on their DNS servers. You would then use the
domain name in the remote identifier (i.e. mymobilename.dyndns.org).
Should work, but again, I haven't tested it. I may have to if trying to get all
network traffic to go over the VPN forces me to try the newer firmware.
[/quote]
Desperately trying to figure out another problem, I bit the bullet and
upgraded back to Firmware v1.1.03. My method above does work in terms
of allowing you to use a domain name as the mobile user's ip address. This
is pretty handy if your system is stable with v1.1.03. Unfortunately I had to
downgrade back to v1.00.16 because the newer firmware leaves the router
in a corrupt state after IPSecuritas connections to it disconnect. ;-(
Linksys VS Netgear
Linksys VS Netgear
by Beavis on 2008-07-22 20:57:26 +0200
I'm having problems with my linksys WRVS4400N, and have been looking
into a Netgear FVS336G. Can anyone recommend one over the other while
using IPSecuritas? Or any other brand or model for that matter.
The Netgear seems to have some better specs.
Any advice is appreciated.
Thanks!
Re: Linksys VS Netgear
by mann on 2008-09-09 05:38:59 +0200
I have installed 3 Netgear FVS338's and have had zero problems.
Re: Linksys VS Netgear
by DistortedLoop on 2008-12-04 18:29:46 +0100
[quote author=Beavis link=1216753046/0#0 date=1216753046]I'm having
problems with my linksys WRVS4400N, and have been looking into a
Netgear FVS336G. Can anyone recommend one over the other while using
IPSecuritas? Or any other brand or model for that matter.
The Netgear seems to have some better specs.[/quote]
Did you take the plunge? Are you happy with the results? I'm actually
looking at the same device to replace/supplement my WRVS4400N right
now. The WRVS4400N is a tempermental beast when dealing with Mac
IPSEC.
[quote author=mann link=1216753046/0#1 date=1220931539]I have
installed 3 Netgear FVS338's and have had zero problems.[/quote]
Do you actually get all network services routed through the VPN when using
your Netgear with IPSecuritas? I've got few problems connecting with my
Linksys to access the internal network, but web and email and other
protocols are not routed over the Linksys (that will be the subject of a
different post, I'm just wondering if the Netgear works properly in that
regard.
Wizard | Updated Choices
Wizard | Updated Choices
by NeilMcG on 2008-07-23 02:48:32 +0200
Hi, after experimenting, with mixed success - I think it's time to ask for
help.
In the wizard, what are the appropriate choices for the FVS338 & FVG318?
Given the FVS318 is now obsolete or deleted from Netgears product range could the wizard choices be updated?
I'm not sure of the product families for FVS318v3, FVS3128, FVS338,
FVS538, etc.
Thanks in advance.
Netgear FVS338
Netgear FVS338
by NeilMcG on 2008-07-23 02:51:43 +0200
Is the Netgear FVS338 - closer to the FVS318v3 or the FVS328?
Is it possible the start a topic (stickie) with updates on the latest hardware
available?
Thanks in advance.
Re: Netgear FVS338
by blue68f100 on 2008-08-19 22:31:48 +0200
The 338 is closer to the 328 but it has a lot of features like a 538 if your
using the latest firmware.
I'm here seeking help on getting my FVS338 to connect up to my MBP. I did
not have time to test before I left and I could not connect.
Re: Netgear FVS338
by NeilMcG on 2008-08-30 11:32:46 +0200
I successfully got both an FVS338 & FVG318 to connect, using the latest
firmware for each and the 3.2b1 IPsecuritas
I generated Connection Wizard Templates and emailed them to lobotomo.
Re: Netgear FVS338
by digitalscanner on 2008-09-23 10:40:49 +0200
hallo
is it possible to send me the wizard template for the FVS338 cause itґs still
not included in the b2
thanx
digital
Juniper Netscreen wizard hole
Juniper Netscreen wizard hole
by douger on 2008-07-25 21:01:59 +0200
I am trying to set up a VPN to a Netscreen 5XT from a machine running
leopard. I downloaded the instructions for Juniper Netscreen / Juniper SSG
and followed them, using the two wizards (IPSecuritas and Netscreen). I fire
up the connection, and it doesn't seem to connect - red light. However, I
ping the server I am trying to reach and it gets there. Not sure what is
going on at this point, but if it is working and the light doesn't turn green
so who cares - well, probably my user who will be confused. So I quit and
exit the daemon, and still can ping the server. Hmm, maybe something left
on - reboot. Try and ping the server again - sure, no problem. ??? OK,
something on the firewall - oh here it is. The new policy added for the VPN
allows everything in! So I check the document again and there it is, the last
line in the configuration from the wizard is:
set policy top from "Untrust" to "Trust" "Any" "192.168.215.0/24' Permit
This allows all traffic from the untrust port to the trust port.
Bad idea. Like having no firewall at all.
OK, so what I did that worked was use this document http://kb.juniper.net
/kb/documents/public/ApplicationNotes/Technical/ScreenOS%204.0.0
/VPN_Vaporsec.htm
and adapt it to the IPSecuritas screens.
I had to turn off Nat-T on the IPSecuritas side as I was using a static IP
address for testing, may need to turn that back on.
I did turn on Nat Traversal on the firewall.
I started out to post a question about the VPN working but the red light on,
but figured it out and decided to post this one as a warning.
Hope it helps - Doug
IP Securitas From Mac book Pro to Fortinet 800
IP Securitas From Mac book Pro to Fortinet 800
by Yuseff on 2008-07-31 05:40:41 +0200
Hi everybody, I have an issue with a MAC Book Pro running IPSecuritas. The
VPN connection to a Fortigate 800 drops in some cases every 20-30 min
but in the mayority of time evey 5 min. I have more MACs running the
IPSecuritas and they don't have this problem.
Does anybody have a clue to what may be causing this problem?
Thank you
Re: IP Securitas From Mac book Pro to Fortinet 800
by chris-in-sf on 2008-08-01 23:28:27 +0200
We are having a similar issue, but I'm not sure if it's a Fortigate problem or
a VLAN problem on our switch. Also 2 of 3 MacBook Pros are having the
issue, but mine has not shown the issue. We are using a Fortigate 300a.
Our problem more specifically is the VPN connection itself doesn't seem to
drop, but you get disconnected from machines on the LAN after about 30
minutes. Particularly if you are using remote desktop which most of us do.
You can't ping those machines on that subnet anymore. Then you have to
disconnect VPN connection, and reconnect, and then you can get back to
the LAN.
The error message that IP Securitas throws up when the LAN drops is:
"Jul 28, 23:03:08 Error IKE fatal INVALID-SPI notify messsage, phase1
should be deleted.
Jul 28, 23:03:12 Error IKE fatal INVALID-SPI notify messsage, phase1
should be deleted."
etc, etc...
Any ideas?
Fritzbox 3270 VPN problems
Fritzbox 3270 VPN problems
by ivan on 2008-08-08 11:26:45 +0200
I have a FritzBox 3270 wlan DSL router, NAT, including a VPN gateway. I
have configured it as explained here:
http://www.avm.de/de/Service/Service-Portale/Service-Portal
/VPN_Interoperabilitaet/box_zu_securitas.php
On my internal network I have a MacMini with shares and remote screen
sharing activated.
I connect to the network with a Macbook with IPSecuritas configured as
described above.
When I connect with my Macbook to the wired network or the Wifi network
at home (no VPN) I can see the Mac Mini machine and other shares.
When I connect through a foreign (wifi) network with an internal IP I can
access the shares of the MacMini if I do "Connect to computer" in the Finder
and type the IP, but the Macbook does not see the names of the computers
with shares on the local network, neither can it resolve the computername
of the MacMini. If I type the computername instead of the IP, it does not get
resolved. I cannot do screen sharing either as this relies of the resolution of
the computername.
Now I know that Macs advertise themselves on the local network with a Mac
specific Bonjour protocol, and I guess that for some reason that traffic does
not pass through the VPN. Anybody has an idea how to solve this? The only
computer I see in Finder with shares is "localhost" which is a loopback to
my macbook I guess.
I tried to switch the use_nat_t parameter to yes, to check if this has
anything to do with NAT translation, but it did not solve the problem (was a
shot in the dark anyway)
Re: Fritzbox 3270 VPN problems
by deltanine on 2008-09-09 00:44:37 +0200
you could try:
http://www.macosxhints.com/article.php?story=20080626194901370
<< create the illusion that Bonjour works over a VPN >>
regards
delta
Checkpoint VPN-1 connection drops all others
Checkpoint VPN-1 connection drops all others
by mpdg on 2008-08-08 16:55:57 +0200
I have a work PC and Mac at home. When I connect to my work Checkpoint
VPN with IPSecuritas from the mac it kills the VPN connection between the
Checkpoint and my work PC (which has checkpoint's software on it). If I
connect two PCs with the checkpoint software I can connect to both fine.
Anyone had this issue?/knows a way around it?
was working, now is not.
was working, now is not.
by eylisian on 2008-08-12 21:56:01 +0200
Hi,
Have a user with OS X 10.5 and IPSecuritas 3.*
This was working until approx a month ago, and then the gateway started
getting PACKET_MALFORMED messages when he'd try and connect. I
figured something got munged and generated a new cert/key pair and
installed them. Now the gateway throws different errors and the connection
log locally states that IKE cant find certificates or keys.
Any ideas?
I can and will post some logs, the user had to fly the coop and I'll get him to
forward them on.
Thanks,
Robert
Re: was working, now is not.
by eylisian on 2008-08-20 23:21:37 +0200
Finally got got the Connection Log from the user
IPSecuritas 3.1 build 1860, Mon Oct 15 22:03:05 CEST 2007, nadig
Darwin 8.10.1 Darwin Kernel Version 8.10.1: Wed May 23 16:33:00 PDT
2007; root:xnu-792.22.5~1/RELEASE_I386 i386
<snip>
Aug 20, 13:40:14 Debug IKE filename: /Library/Application
Support/Lobotomo Software/IPSecuritas/certs
/aab01961-75e9-40f0-9c15-2ad51224602d.cert
Aug 20, 13:40:14 Error IKE failed to get my CERT.
Aug 20, 13:40:14 Error IKE failed to get own CERT.
Aug 20, 13:40:14 Error IKE failed get my ID
Aug 20, 13:40:14 Error IKE failed to process packet.
Aug 20, 13:40:14 Error IKE phase1 negotiation failed.
Aug 20, 13:40:14 Debug IKE IV freed
Aug 20, 13:40:20 Debug IKE ===
Aug 20, 13:40:20 Debug IKE 244 bytes message received from
*.*.*.*[500] to 192.168.0.18[500]
Aug 20, 13:40:20 Debug IKE 3c491ae8 5ab88c4b 7a68aaa4 28e5d263
04100200 00000000 000000f4 0a0000c4
Aug 20, 13:40:20 Debug IKE 82aa60e6 25e77bd5 b25340a0 21ae9410
e15d820d fc6c0f29 3edb2f33 6228871b
Aug 20, 13:40:20 Debug IKE 00b930be 9a74d311 64e76c6c 25230920
e2bdaee3 fadfd4cf 7f3a4925 d9d02853
Aug 20, 13:40:20 Debug IKE 2e67ebfc 9c72d332 a2512b6f 8b44ba73
f1f63591 d519ccdf 7dccc4ac d498230e
Aug 20, 13:40:20 Debug IKE 3dd7d88f f036ec63 52e894f8 2094dfa0
aeffec47 73bfb8d9 042b702c bd74a54f
Aug 20, 13:40:20 Debug IKE 5cd3f40e 0893c14e 65650fe3 2478a200
ebdca70d 75fb8bd9 a40730d8 0d5e382f
Aug 20, 13:40:20 Debug IKE 87b87354 61e09c7f 50c68257 237a0419
77f481eb 58ba7e68 c235710d 72afce34
Aug 20, 13:40:20 Debug IKE 00000014 c7deff2a acb9acf7 dc886f3b
5ec5f427
Aug 20, 13:40:20 Debug IKE malformed cookie received or the spi
expired.
Aug 20, 13:40:21 Info
APP Initiated connection Outside of Rulespace
Aug 20, 13:40:21 Debug IKE get pfkey ACQUIRE message
Aug 20, 13:40:21 Debug IKE 02060003 24000000 06000000 00000000
03000500 ff200000 10020000 c0a80012
Aug 20, 13:40:21 Debug IKE 00000000 00000000 03000600 ff200000
10020000 cea37bcf 00000000 00000000
Aug 20, 13:40:21 Debug IKE 1c000d00 20000000 00030000 00000000
00010008 00000000 01000000 01000000
Aug 20, 13:40:21 Debug IKE 00000000 00000000 00000000 00000000
00000000 00000000 80510100 00000000
Aug 20, 13:40:21 Debug IKE 80700000 00000000 00000000 00000000
00040000 00000000 0001c001 00000000
Aug 20, 13:40:21 Debug IKE 01000000 01000000 00000000 00000000
00000000 00000000 00000000 00000000
Aug 20, 13:40:21 Debug IKE 80510100 00000000 80700000 00000000
00000000 00000000 000c0000 00000000
Aug 20, 13:40:21 Debug IKE 00010001 00000000 01000000 01000000
00000000 00000000 00000000 00000000
Aug 20, 13:40:21 Debug IKE 00000000 00000000 80510100 00000000
80700000 00000000 00000000 00000000
Aug 20, 13:40:21 Error IKE inappropriate sadb acquire message passed.
Aug 20, 13:40:21 Debug IKE get pfkey ACQUIRE message
Aug 20, 13:40:21 Debug IKE 02060003 14000000 12000000 53000000
03000500 ff200000 10020000 c0a80012
Strange connections of Daemon
Strange connections of Daemon
by abfdx279 on 2008-08-22 00:27:37 +0200
Little Snitch reports on Leopard the following inbound connections for the
Daemon. IPSecuritas was is not active. Could this be some kind of "spill
over" from remote Skype clients trying to connect? Skype is running at the
same time.
Verbindungsverlauf fьr: IPSecuritasDaemon (/Library/StartupItems
/IPSecuritasDaemon/IPSecuritasDaemon)
Gesamt: 0 Bytes gesendet, 0.6kB empfangen
###.netcologne.de (###.###.243.214), Port 0 (1024/tcp), Protokoll 1
(ICMP), 0 Bytes gesendet, 170 Bytes empfangen
###.hrz.fh-zwickau.de (###.###.72.1), Port 0 (1024/tcp), Protokoll 1
(ICMP), 0 Bytes gesendet, 56 Bytes empfangen
###.pools.arcor-ip.net (###.###.16.47), Port 0 (1024/tcp), Protokoll 1
(ICMP), 0 Bytes gesendet, 77 Bytes empfangen
###.adsl.alicedsl.de (###.###.174.3), Port 0 (1024/tcp), Protokoll 1
(ICMP), 0 Bytes gesendet, 89 Bytes empfangen
###.zaq.ne.jp (###.###.113.26), Port 0 (1024/tcp), Protokoll 1 (ICMP), 0
Bytes gesendet, 91 Bytes empfangen
###.###.144.95 (###.###.144.95), Port 0 (1024/tcp), Protokoll 1 (ICMP),
0 Bytes gesendet, 86 Bytes empfangen
###.TU-Berlin.DE (###.###.8.19), Port 0 (1024/tcp), Protokoll 1 (ICMP),
0 Bytes gesendet, 56 Bytes empfangen
Second question: Someone has asked similar question before, but how can
you generally route all traffic through the VPN? Do you have to have this
feature on both the client (like IPSecuritas) and the server or is that just a
feature IPSecuritas could implement (or has already) on its own?
Thanks to the developer! The connection works (to some degree) for an
AVM Fritz!Box 7170. Though, it would be nice if you could route the
websurfing through the VPN.
Re: Strange connections of Daemon
by cnadig on 2008-08-24 21:55:55 +0200
Hello,
this traffic looks strange indeed. IPSecuritas sends ICMP ping packets if the
connection surveillance is enabled and only to the configured hosts while
connected. The traffic could also be ICMP unreachable replies, but then I
could not imagine why they are addresses to IPSecuritasDaemon.
Would it be possible to tcpdump the traffic for further analysis (as root, run
'tcpdump -i en0 -s1500 -w ~/Desktop/traffic.pcap' for a while)?
Cheers,
Christoph
Re: Strange connections of Daemon
by abfdx279 on 2008-08-25 17:59:35 +0200
Hi again!
Just tried MacSniffer (uses tcpdump) together with Little Snitch.
After closing down all other programs (including Skype), IPSecuritas'
Daemon doesn't seem to get any more inbound connects. Guess I have to
look further into that. But Skype will produce significant traffic when
launched...
In my opinion that has something to do with skype. Could someone try that
on his Mac (Leopard)?
(running Skype, LittleSnitch as shareware version and just the Deamon
without IPSecuritas itself and without any IPSec connection).
The IPs look like they are dynamic (for example Alice is a German provider)
and Skype uses a decentral system of connections...
Re: Strange connections of Daemon
by abfdx279 on 2008-08-30 15:03:46 +0200
Has anyone else tested this thing?
OS X Leopard - Skype - IPSecuritas - LittleSnitch (or some other monitoring
software)
Christoph?
route add issue
route add issue
by deltanine on 2008-08-27 19:40:42 +0200
I have successfully established an IPSEC VPN connection from a
MacBook Pro to a Draytek Vigor 2820 using IPSecuritas's Wizard.
The remote router (net 192.168.10.0) can establish VPN connections to
other networks.
When using PPTP or L2TP for the same connection I was able to
[code]sudo route -n add -net 192.168.30.0 192.168.10.1
255.255.255.0[/code]
in order to allow applications on the MacBook to access network
192.168.30.0 via 192.168.10.1 .
The same approach fails when using IPSEC with IPSecuritas.
Is there a way to make this work?
Thanks in advance.
Delta
MacOS: 10.4.11
IPSecuritas: 3.1
Router: Draytek Vigor 2820 with Firmware 3.2.1_2111112
New 3.2 Beta version released
New 3.2 Beta version released
by cnadig on 2008-08-31 10:47:36 +0200
Good morning,
a new beta version has been release to replace the expiring 3.2b1. Please
download it from [url]http://www.lobotomo.com/products/downloads
/IPSecuritas32b2.dmg[/url]. The included Readme file contains a list of
enhancements and bug fixes.
Cheers,
Christoph
Problem connecting to VPN with Netgear DGFV338
Problem connecting to VPN with Netgear DGFV338
by greyloki on 2008-09-02 17:41:06 +0200
Hey folks,
I'm trying to set up a roadwarrior VPN using a Mac laptop connecting to a
Netgear DGFV338. I've found a tutorial that I followed (I can't remember the
link for it, but the first page shows it's for IPSecuritas 3.x by Lobotomo
Software and a Netgear DGFV338, written Oct 15th 2007), but i'm having
trouble in connecting - all of the settings in both IPSecuritas and the
Netgear appear to be correct, but my log seems to say otherwise, and I get
a yellow dot next to my connection's name, too.
Here's the log:
http://pastebin.com/m4a12da21
Any help would be greatly appreciated :)
Edit: The tutorial talks about matching 'local' and 'remote' IKE policy
identifiers - on the router, i have the remote identifier set as
remote_roadwarrior, since this is theoretically the laptop, and the local
identifier is esw_office.com. In IPSecuritas, I have these reversed - local is
remote_roadwarrior, and remote is esw_office.com - is that correct?
Problem installing IPSecuritas
Problem installing IPSecuritas
by marconcini on 2008-09-03 00:14:33 +0200
hi all, I'm new to the Mac world and am having trouble loading the
IPSecuritas software. I get an error message saying that i am trying to load
to a read only file system. I am trying to instal to the applications folder so I
don't understand. I'm frustrated :-[
Nortel VPN
Nortel VPN
by rambling_rebel on 2008-09-05 04:08:39 +0200
just downloaded this vpn software.....I'm trying to get MAC's into my
customer base instead of MS based stuff. I have this customer and 4 more
behind him all wanting MACS and VPN's. I Favour Nortel VPN's and need to
get this working on a contivity. I have the s/w loaded and it sayz its
working (IPSEC service started) but I don't ever see it on the contivity trying
to connect, and I can't seem to get my head around where to begin to
figure out where to look for solving this problem, any suggestions....
Re: Nortel VPN
by rambling_rebel on 2008-09-05 04:23:32 +0200
ok, I'm a knucklehead, I found the user guide.....ill read through it, but if
anyone has info that could help me, it would be appreciated...
Can't Connect to SonicWall Pro
Can't Connect to SonicWall Pro
by Philodox on 2008-09-09 03:15:03 +0200
Hi all,
I'm trying to set up IPSecuritas to give me access to a SonicWall Pro vpn
network. I can't connect and unfortunately the logs are rather cryptic so I'm
not sure where to look. I'm running this on the latest rev Macbook Pro.
[quote]
IPSecuritas 3.1 build 1860, Mon Oct 15 22:03:05 CEST 2007, nadig
Darwin 8.10.1 Darwin Kernel Version 8.10.1: Wed May 23 16:33:00 PDT
2007; root:xnu-792.22.5~1/RELEASE_I386 i386
Sep 08, 17:59:39 Info
APP IPSec authenticating
Sep 08, 17:59:39 Info
APP IKE daemon started
Sep 08, 17:59:39 Info
APP IPSec started
Sep 08, 17:59:39 Error IKE Foreground mode.
Sep 08, 17:59:39 Info
IKE @(#)ipsec-tools CVS (http://ipsectools.sourceforge.net)
Sep 08, 17:59:39 Info
IKE @(#)This product linked OpenSSL 0.9.7l 28
Sep 2006 (http://www.openssl.org/)
Sep 08, 17:59:39 Info
IKE Reading configuration from "/Library
/Application Support/Lobotomo Software/IPSecuritas/racoon.conf"
Sep 08, 17:59:39 Info
IKE Resize address pool from 0 to 255
Sep 08, 17:59:39 Info
APP Initiated connection tre
Sep 08, 17:59:39 Error IKE inappropriate sadb acquire message passed.
Sep 08, 17:59:39 Error IKE delete phase1 handle.
Sep 08, 17:59:44 Error IKE delete phase1 handle.
Sep 08, 17:59:46 Info
APP Initiated connection tre
Sep 08, 17:59:49 Error IKE delete phase1 handle.
Sep 08, 17:59:53 Info
APP Initiated connection tre
Sep 08, 17:59:54 Error IKE delete phase1 handle.
Sep 08, 17:59:55 Error IKE phase2 negotiation failed due to time up
waiting for phase1. ESP 24.16.134.55[500]->192.168.1.2[500]
Sep 08, 17:59:59 Error IKE delete phase1 handle.
Sep 08, 18:00:00 Info
APP Initiated connection tre
Sep 08, 18:00:00 Error IKE inappropriate sadb acquire message passed.
Sep 08, 18:00:02 Error IKE phase2 negotiation failed due to time up
waiting for phase1. ESP 24.16.134.55[500]->192.168.1.2[500]
Sep 08, 18:00:04 Error IKE delete phase1 handle.
Sep 08, 18:00:07 Info
APP Initiated connection tre
Sep 08, 18:00:09 Error IKE phase1 negotiation failed due to time up.
3dfec7ca41ce9d94:0000000000000000
Sep 08, 18:00:09 Error IKE phase2 negotiation failed due to time up
waiting for phase1. ESP 24.16.134.55[500]->192.168.1.2[500]
Sep 08, 18:00:12 Warning APP Connection tre timed out
Sep 08, 18:00:12 Warning APP Giving up
Sep 08, 18:00:16 Error IKE phase2 negotiation failed due to time up
waiting for phase1. ESP 24.16.134.55[500]->192.168.1.2[500]
Sep 08, 18:00:23 Error IKE phase2 negotiation failed due to time up
waiting for phase1. ESP 24.16.134.55[500]->192.168.1.2[500] [/quote]
[quote]# Racoon configuration created by IPSecuritas
log notify;
path pre_shared_key "/Library/Application Support/Lobotomo
Software/IPSecuritas/psk.txt";
path certificate "/Library/Application Support/Lobotomo
Software/IPSecuritas/certs";
padding
{
maximum_length 20;
Re: Can't Connect to SonicWall Pro
by Philodox on 2008-09-10 08:18:02 +0200
Edit: I've got a little bit farther, I had my DH group set incorrectly for phase 1.
My current log looks like:
[quote]
IPSecuritas 3.2b2 build 2391, So 31 Aug 2008 10:13:21 CEST, nadig
Darwin 9.4.0 Darwin Kernel Version 9.4.0: Mon Jun 9 19:30:53 PDT 2008;
root:xnu-1228.5.20~1/RELEASE_I386 i386
Sep 10, 00:02:16 Info
APP IPSec authenticating
Sep 10, 00:02:16 Info
APP Connection tre is started
Sep 10, 00:02:16 Info
APP IKE daemon started
Sep 10, 00:02:16 Info
APP IPSec started
Sep 10, 00:02:16 Info
APP Initiated connection tre
Sep 10, 00:02:16 Error IKE Foreground mode.
Sep 10, 00:02:16 Info
IKE @(#)ipsec-tools CVS (http://ipsectools.sourceforge.net)
Sep 10, 00:02:16 Info
IKE @(#)This product linked OpenSSL 0.9.7l 28 Sep
2006 (http://www.openssl.org/)
Sep 10, 00:02:16 Info
IKE Reading configuration from "/Library
/Application Support/Lobotomo Software/IPSecuritas/racoon.conf"
Sep 10, 00:02:16 Info
IKE Resize address pool from 0 to 255
Sep 10, 00:02:23 Info
APP Initiated connection tre
Sep 10, 00:02:23 Error IKE ISAKMP mode config exchange with immature
phase 1
Sep 10, 00:02:28 Error IKE the length in the isakmp header is too big.
Sep 10, 00:02:30 Info
APP Initiated connection tre
Sep 10, 00:02:33 Error IKE the length in the isakmp header is too big.
Sep 10, 00:02:37 Info
APP Initiated connection tre
Sep 10, 00:02:38 Error IKE the length in the isakmp header is too big.
Sep 10, 00:02:39 Error IKE phase2 negotiation failed due to time up
waiting for phase1. ESP [remote][4500]->192.168.1.2[4500]
Sep 10, 00:02:43 Error IKE the length in the isakmp header is too big.
Sep 10, 00:02:44 Info
APP Initiated connection tre
Sep 10, 00:02:46 Error IKE phase2 negotiation failed due to time up
waiting for phase1. ESP [remote][4500]->192.168.1.2[4500]
Sep 10, 00:02:48 Error IKE the length in the isakmp header is too big.
Sep 10, 00:02:49 Warning APP Connection tre timed out
Sep 10, 00:02:49 Warning APP Giving up
Sep 10, 00:02:53 Error IKE phase2 negotiation failed due to time up
waiting for phase1. ESP [remote][4500]->192.168.1.2[4500] [/quote]
I'm using XAuth PSK. If I turn off XAuth PSK I get this log, does anybody know
which one is "better"?
[quote]IPSecuritas 3.2b2 build 2391, So 31 Aug 2008 10:13:21 CEST, nadig
Darwin 9.4.0 Darwin Kernel Version 9.4.0: Mon Jun 9 19:30:53 PDT 2008;
root:xnu-1228.5.20~1/RELEASE_I386 i386
Sep 10, 00:05:02 Info
APP IPSec restarting
Sep 10, 00:05:03 Info
APP IKE daemon terminated
Sep 10, 00:05:03 Info
APP IPSec restarting
Sep 10, 00:05:03 Info
APP Connection tre is started
Sep 10, 00:05:03 Info
APP IKE daemon started
Sep 10, 00:05:03 Info
APP IPSec started
Sep 10, 00:05:03 Error IKE Foreground mode.
Sep 10, 00:05:03 Info
IKE @(#)ipsec-tools CVS (http://ipsectools.sourceforge.net)
Sep 10, 00:05:03 Info
IKE @(#)This product linked OpenSSL 0.9.7l 28 Sep
2006 (http://www.openssl.org/)
Sep 10, 00:05:03 Info
IKE Reading configuration from "/Library
/Application Support/Lobotomo Software/IPSecuritas/racoon.conf"
Sep 10, 00:05:03 Info
IKE Resize address pool from 0 to 255
Re: Can't Connect to SonicWall Pro
by cnadig on 2008-09-11 18:01:58 +0200
Hello,
I'd try normal PSK first since XAuth isn't strictly standardized and there are
many vendor-specific implementations around. In main mode,
identification is usually only possible by IP address (you set it to FQDN) and
may or may not work for road warriors depending on the implementation of
your firewall firmware. For road warriors, aggressive mode is usually the
better way, especially if there is more than one user.
Please set the log level to Debug to get more detailed information.
Hope this helps,
Christoph
Re: Can't Connect to SonicWall Pro
by Philodox on 2008-09-13 03:48:08 +0200
Thanks :)
I changed it to address but I'm still getting the same errors. How do I set
the log level to debug? I tried doing it through System
Preferences/Network but that hasn't seem to have done anything.
My current config:
[quote]# Racoon configuration created by IPSecuritas
log notify;
path pre_shared_key "/Library/Application Support/Lobotomo
Software/IPSecuritas/psk.txt";
path certificate "/Library/Application Support/Lobotomo
Software/IPSecuritas/certs";
padding
{
maximum_length 20;
randomize on;
strict_check off;
exclusive_tail on;
}
timer
{
counter 5;
interval 5 seconds;
persend 1;
phase1 15 seconds;
phase2 15 seconds;
}
# Connection "tre"
remote x.x.x.x
{
verify_cert off;
verify_identifier off;
initial_contact on;
passive off;
support_proxy off;
generate_policy off;
verify_cert off;
send_cert on;
send_cr on;
mode_cfg off;
ike_frag on;
doi ipsec_doi;
situation identity_only;
nat_traversal on;
exchange_mode main;
proposal_check obey;
nonce_size 16;
my_identifier address;
peers_identifier address;
proposal
{
lifetime time 1800 seconds;
encryption_algorithm 3des;
hash_algorithm sha1;
authentication_method pre_shared_key;
Re: Can't Connect to SonicWall Pro
by Philodox on 2008-09-15 01:20:44 +0200
Found the debug log option, it was under preferences :-[
Anyways here's the debug log[quote]IPSecuritas 3.2b2 build 2391, So 31 Aug
2008 10:13:21 CEST, nadig
Darwin 9.4.0 Darwin Kernel Version 9.4.0: Mon Jun 9 19:30:53 PDT 2008;
root:xnu-1228.5.20~1/RELEASE_I386 i386
Sep 14, 16:14:21 Debug APP All connections authenticated
Sep 14, 16:14:21 Debug APP State change from IDLE to AUTHENTICATING
after event START
Sep 14, 16:14:21 Info
APP IPSec authenticating
Sep 14, 16:14:21 Info
APP Connection tre is started
Sep 14, 16:14:21 Info
APP IKE daemon started
Sep 14, 16:14:21 Debug APP State change from AUTHENTICATING to
RUNNING after event AUTHENTICATED
Sep 14, 16:14:21 Info
APP IPSec started
Sep 14, 16:14:21 Debug APP Received SADB message type X_SPDUPDATE not interesting
Sep 14, 16:14:21 Debug APP Received SADB message type X_SPDUPDATE not interesting
Sep 14, 16:14:21 Info
IKE Foreground mode.
Sep 14, 16:14:21 Info
IKE @(#)ipsec-tools CVS (http://ipsectools.sourceforge.net)
Sep 14, 16:14:21 Info
IKE @(#)This product linked OpenSSL 0.9.7l 28 Sep
2006 (http://www.openssl.org/)
Sep 14, 16:14:21 Info
IKE Reading configuration from "/Library
/Application Support/Lobotomo Software/IPSecuritas/racoon.conf"
Sep 14, 16:14:21 Info
IKE Resize address pool from 0 to 255
Sep 14, 16:14:21 Debug IKE lifetime = 1800
Sep 14, 16:14:21 Debug IKE lifebyte = 0
Sep 14, 16:14:21 Debug IKE encklen=0
Sep 14, 16:14:21 Debug IKE p:1 t:1
Sep 14, 16:14:21 Debug IKE 3DES-CBC(5)
Sep 14, 16:14:21 Debug IKE SHA(2)
Sep 14, 16:14:21 Debug IKE 1024-bit MODP group(2)
Sep 14, 16:14:21 Debug IKE pre-shared key(1)
Sep 14, 16:14:21 Debug IKE compression algorithm can not be checked
because sadb message doesn't support it.
Sep 14, 16:14:21 Debug IKE parse successed.
Sep 14, 16:14:21 Debug IKE open /Library/Application Support/Lobotomo
Software/IPSecuritas/admin.sock as racoon management.
Sep 14, 16:14:21 Info
IKE 192.168.1.2[4500] used as isakmp port (fd=6)
Sep 14, 16:14:21 Info
IKE 192.168.1.2[500] used as isakmp port (fd=7)
Sep 14, 16:14:21 Debug IKE get pfkey X_SPDDUMP message
Sep 14, 16:14:21 Debug IKE 02120000 0f000200 01000000 2e030000
03000500 ff180000 10020000 0a0a0a00
Sep 14, 16:14:21 Debug IKE 00000000 00000000 03000600 ff200000
10020000 c0a80102 00000000 00000000
Sep 14, 16:14:21 Debug IKE 07001200 02000100 08000000 00000000
28003200 02030e00 10020000 18108637
Sep 14, 16:14:21 Debug IKE 00000000 00000000 10020000 c0a80102
00000000 00000000
Sep 14, 16:14:21 Debug IKE get pfkey X_SPDDUMP message
Sep 14, 16:14:21 Debug IKE 02120000 0f000200 00000000 2e030000
03000500 ff200000 10020000 c0a80102
Sep 14, 16:14:21 Debug IKE 00000000 00000000 03000600 ff180000
10020000 0a0a0a00 00000000 00000000
Sep 14, 16:14:21 Debug IKE 07001200 02000200 07000000 00000000
28003200 02030d00 10020000 c0a80102
Sep 14, 16:14:21 Debug IKE 00000000 00000000 10020000 18108637
00000000 00000000
Re: Can't Connect to SonicWall Pro
by Philodox on 2008-09-15 01:22:24 +0200
[quote]Sep 14, 16:14:21 Debug IKE add payload of len 16, next type 13
Sep 14, 16:14:21 Debug IKE add payload of len 16, next type 13
Sep 14, 16:14:21 Debug IKE add payload of len 16, next type 13
Sep 14, 16:14:21 Debug IKE add payload of len 16, next type 13
Sep 14, 16:14:21 Debug IKE add payload of len 16, next type 13
Sep 14, 16:14:21 Debug IKE add payload of len 16, next type 13
Sep 14, 16:14:21 Debug IKE add payload of len 16, next type 13
Sep 14, 16:14:21 Debug IKE add payload of len 16, next type 13
Sep 14, 16:14:21 Debug IKE add payload of len 16, next type 13
Sep 14, 16:14:21 Debug IKE add payload of len 16, next type 13
Sep 14, 16:14:21 Debug IKE add payload of len 20, next type 13
Sep 14, 16:14:21 Debug IKE add payload of len 16, next type 0
Sep 14, 16:14:21 Debug IKE 344 bytes from 192.168.1.2[500] to
x.x.x.x[500]
Sep 14, 16:14:21 Debug IKE sockname 192.168.1.2[500]
Sep 14, 16:14:21 Debug IKE send packet from 192.168.1.2[500]
Sep 14, 16:14:21 Debug IKE send packet to x.x.x.x[500]
Sep 14, 16:14:21 Debug IKE 1 times of 344 bytes message will be sent to
x.x.x.x[500]
Sep 14, 16:14:21 Debug IKE 5dd654cd bfed7735 00000000 00000000
01100200 00000000 00000158 0d000034
Sep 14, 16:14:21 Debug IKE 00000001 00000001 00000028 01010001
00000020 01010000 800b0001 800c0708
Sep 14, 16:14:21 Debug IKE 80010005 80030001 80020002 80040002
0d000014 4a131c81 07035845 5c5728f2
Sep 14, 16:14:21 Debug IKE 0e95452f 0d000014 8f8d8382 6d246b6f
c7a8a6a4 28c11de8 0d000014 439b59f8
Sep 14, 16:14:21 Debug IKE ba676c4c 7737ae22 eab8f582 0d000014
4d1e0e13 6deafa34 c4f3ea9f 02ec7285
Sep 14, 16:14:21 Debug IKE 0d000014 80d0bb3d ef54565e e84645d4
c85ce3ee 0d000014 9909b64e ed937c65
Sep 14, 16:14:21 Debug IKE 73de52ac e952fa6b 0d000014 7d9419a6
5310ca6f 2c179d92 15529d56 0d000014
Sep 14, 16:14:21 Debug IKE cd604643 35df21f8 7cfdb2fc 68b6a448
0d000014 90cb8091 3ebb696e 086381b5
Sep 14, 16:14:21 Debug IKE ec427b1f 0d000014 16f6ca16 e4a4066d
83821a0f 0aeaa862 0d000014 4485152d
Sep 14, 16:14:21 Debug IKE 18b6bbcd 0be8a846 9579ddcc 0d000018
4048b7d5 6ebce885 25e7de7f 00d6c2d3
Sep 14, 16:14:21 Debug IKE 80000000 00000014 afcad713 68a1f1c9
6b8696fc 77570100
Sep 14, 16:14:21 Debug IKE resend phase1 packet
5dd654cdbfed7735:0000000000000000
Sep 14, 16:14:21 Debug IKE ===
Sep 14, 16:14:21 Debug IKE 112 bytes message received from x.x.x.x[500]
to 192.168.1.2[500]
Sep 14, 16:14:21 Debug IKE 5dd654cd bfed7735 59ae89f0 711e7f3e
01100200 00000000 00000070 0d000034
Sep 14, 16:14:21 Debug IKE 00000001 00000001 00000028 01010001
00000020 01010000 80010005 80020002
Sep 14, 16:14:21 Debug IKE 80040002 80030001 800b0001 800c0708
0d00000c 5b362bc8 20f60006 00000014
Sep 14, 16:14:21 Debug IKE 4a131c81 07035845 5c5728f2 0e95452f
Sep 14, 16:14:21 Debug IKE begin.
Sep 14, 16:14:21 Debug IKE seen nptype=1(sa)
Sep 14, 16:14:21 Debug IKE seen nptype=13(vid)
Sep 14, 16:14:21 Debug IKE seen nptype=13(vid)
Sep 14, 16:14:21 Debug IKE succeed.
Sep 14, 16:14:21 Debug IKE received unknown Vendor ID
Sep 14, 16:14:21 Debug IKE 5b362bc8 20f60006
Sep 14, 16:14:21 Info
IKE received Vendor ID: RFC 3947
Re: Can't Connect to SonicWall Pro
by Philodox on 2008-09-15 01:23:29 +0200
[quote]Sep 14, 16:14:21 Debug IKE (lifebyte = 0:0)
Sep 14, 16:14:21 Debug IKE enctype = 3DES-CBC:3DES-CBC
Sep 14, 16:14:21 Debug IKE (encklen = 0:0)
Sep 14, 16:14:21 Debug IKE hashtype = SHA:SHA
Sep 14, 16:14:21 Debug IKE authmethod = pre-shared key:pre-shared key
Sep 14, 16:14:21 Debug IKE dh_group = 1024-bit MODP group:1024-bit
MODP group
Sep 14, 16:14:21 Debug IKE an acceptable proposal found.
Sep 14, 16:14:21 Debug IKE hmac(modp1024)
Sep 14, 16:14:21 Debug IKE agreed on pre-shared key auth.
Sep 14, 16:14:21 Debug IKE ===
Sep 14, 16:14:21 Debug IKE compute DH's private.
Sep 14, 16:14:21 Debug IKE 6d19d366 249a109c 36b021cd b3107c47
3914824e df5ea643 ef185e07 1823fbe1
Sep 14, 16:14:21 Debug IKE 497aabf9 10104106 5848a852 358c239c
a0bdd736 b1019038 08d9de94 e866a799
Sep 14, 16:14:21 Debug IKE 804237ef 5bce8aec 3709d370 5e63c132
c3406398 d0741fc6 40776d07 b6cee87c
Sep 14, 16:14:21 Debug IKE 6ca1af6c 87d09681 7218df0f 18be22fb
88320cf3 9c25db6b a43e0c0d 096398e7
Sep 14, 16:14:21 Debug IKE compute DH's public.
Sep 14, 16:14:21 Debug IKE 970dd812 1a62895a ab5cb04b 843e04d7
06aabb36 dd897189 a2307b08 ed6b7735
Sep 14, 16:14:21 Debug IKE 7a552f68 d3e7b588 1c4613ad 28a9bf2a
3eebce18 7215c3ad 48e3b5c1 c33f42b1
Sep 14, 16:14:21 Debug IKE 4f7752b5 961f9ba2 1179335e 09fc7e7e
7e664936 016c5444 2e885254 fd76339b
Sep 14, 16:14:21 Debug IKE 727cc1cb 70f23bcf e1fee811 17eca979
c3bb190d 8915b374 02ba17a1 0c0f2ad2
Sep 14, 16:14:21 Info
IKE Hashing x.x.x.x[500] with algo #2
Sep 14, 16:14:21 Debug IKE hash(sha1)
Sep 14, 16:14:21 Info
IKE Hashing 192.168.1.2[500] with algo #2
Sep 14, 16:14:21 Debug IKE hash(sha1)
Sep 14, 16:14:21 Info
IKE Adding remote and local NAT-D payloads.
Sep 14, 16:14:21 Debug IKE add payload of len 128, next type 10
Sep 14, 16:14:21 Debug IKE add payload of len 16, next type 20
Sep 14, 16:14:21 Debug IKE add payload of len 20, next type 20
Sep 14, 16:14:21 Debug IKE add payload of len 20, next type 0
Sep 14, 16:14:21 Debug IKE 228 bytes from 192.168.1.2[500] to
x.x.x.x[500]
Sep 14, 16:14:21 Debug IKE sockname 192.168.1.2[500]
Sep 14, 16:14:21 Debug IKE send packet from 192.168.1.2[500]
Sep 14, 16:14:21 Debug IKE send packet to x.x.x.x[500]
Sep 14, 16:14:21 Debug IKE 1 times of 228 bytes message will be sent to
x.x.x.x[500]
Sep 14, 16:14:21 Debug IKE 5dd654cd bfed7735 59ae89f0 711e7f3e
04100200 00000000 000000e4 0a000084
Sep 14, 16:14:21 Debug IKE 970dd812 1a62895a ab5cb04b 843e04d7
06aabb36 dd897189 a2307b08 ed6b7735
Sep 14, 16:14:21 Debug IKE 7a552f68 d3e7b588 1c4613ad 28a9bf2a
3eebce18 7215c3ad 48e3b5c1 c33f42b1
Sep 14, 16:14:21 Debug IKE 4f7752b5 961f9ba2 1179335e 09fc7e7e
7e664936 016c5444 2e885254 fd76339b
Sep 14, 16:14:21 Debug IKE 727cc1cb 70f23bcf e1fee811 17eca979
c3bb190d 8915b374 02ba17a1 0c0f2ad2
Sep 14, 16:14:21 Debug IKE 14000014 9c8ed4a5 d1653546 a7b0d169
82d56448 14000018 bfad97a7 acc7f714
Sep 14, 16:14:21 Debug IKE 1174bbe3 eabd4651 e92c2300 00000018
00360655 a1fd4d3f f68c07a6 29ff959e
Sep 14, 16:14:21 Debug IKE 2a842026
Sep 14, 16:14:21 Debug IKE resend phase1 packet
Re: Can't Connect to SonicWall Pro
by Philodox on 2008-09-15 01:24:11 +0200
[quote]
Sep 14, 16:14:21 Info
IKE KA list add: 192.168.1.2[4500]->x.x.x.x[4500]
Sep 14, 16:14:21 Debug IKE ===
Sep 14, 16:14:21 Debug IKE compute DH's shared.
Sep 14, 16:14:21 Debug IKE a397f573 07369726 f5cde748 422998c4
704ace1b bf96c581 9294b1e8 990d0dd7
Sep 14, 16:14:21 Debug IKE b5b6f45c b7adaea9 a2c70199 7e5a8162
88e18344 f1939812 615df1ea bf531d62
Sep 14, 16:14:21 Debug IKE ba03b1a6 1f2a7652 8b3d5224 acc599a3
6012f54b 38ddee03 5eaf86ed 0112d0de
Sep 14, 16:14:21 Debug IKE 5a5664ae 2672534b 6cc6fe04 97f0dbb4
37c12eea c095d2ba 905f57be 61589745
Sep 14, 16:14:21 Debug IKE the psk found.
Sep 14, 16:14:21 Debug IKE psk: 2008-09-14 16:14:21: DEBUG2:
Sep 14, 16:14:21 Debug IKE 45304343 43394338 42394236 38364637
Sep 14, 16:14:21 Debug IKE nonce 1: 2008-09-14 16:14:21: DEBUG:
Sep 14, 16:14:21 Debug IKE 9c8ed4a5 d1653546 a7b0d169 82d56448
Sep 14, 16:14:21 Debug IKE nonce 2: 2008-09-14 16:14:21: DEBUG:
Sep 14, 16:14:21 Debug IKE 71603fde 2e350ff6 1f9fdf6b 0588c60f
2151080a
Sep 14, 16:14:21 Debug IKE hmac(hmac_sha1)
Sep 14, 16:14:21 Debug IKE SKEYID computed:
Sep 14, 16:14:21 Debug IKE 21425a9a d9d29890 23b41dae bc80c129
6299ebbf
Sep 14, 16:14:21 Debug IKE hmac(hmac_sha1)
Sep 14, 16:14:21 Debug IKE SKEYID_d computed:
Sep 14, 16:14:21 Debug IKE 40a8f852 117dbf35 681434f9 7234ecc2
1301d50d
Sep 14, 16:14:21 Debug IKE hmac(hmac_sha1)
Sep 14, 16:14:21 Debug IKE SKEYID_a computed:
Sep 14, 16:14:21 Debug IKE 56898368 ae8a501c 1a6b4523 133e704b
0025d46b
Sep 14, 16:14:21 Debug IKE hmac(hmac_sha1)
Sep 14, 16:14:21 Debug IKE SKEYID_e computed:
Sep 14, 16:14:21 Debug IKE e8ba7e4e 77ce21be 04e56ddc 8c7094cf
4562e6a1
Sep 14, 16:14:21 Debug IKE encryption(3des)
Sep 14, 16:14:21 Debug IKE hash(sha1)
Sep 14, 16:14:21 Debug IKE len(SKEYID_e) < len(Ka) (20 < 24), generating
long key (Ka = K1 | K2 | ...)
Sep 14, 16:14:21 Debug IKE hmac(hmac_sha1)
Sep 14, 16:14:21 Debug IKE compute intermediate encryption key K1
Sep 14, 16:14:21 Debug IKE 00
Sep 14, 16:14:21 Debug IKE e0f43032 2960130d 4d3c200d 09204dcd
1c4daa82
Sep 14, 16:14:21 Debug IKE hmac(hmac_sha1)
Sep 14, 16:14:21 Debug IKE compute intermediate encryption key K2
Sep 14, 16:14:21 Debug IKE e0f43032 2960130d 4d3c200d 09204dcd
1c4daa82
Sep 14, 16:14:21 Debug IKE 5c44252e a8f6897c 4d505519 1c3a78c3
f9a3c728
Sep 14, 16:14:21 Debug IKE final encryption key computed:
Sep 14, 16:14:21 Debug IKE e0f43032 2960130d 4d3c200d 09204dcd
1c4daa82 5c44252e
Sep 14, 16:14:21 Debug IKE hash(sha1)
Sep 14, 16:14:21 Debug IKE encryption(3des)
Sep 14, 16:14:21 Debug IKE IV computed:
Sep 14, 16:14:21 Debug IKE 76b4a289 4d986ea9
Sep 14, 16:14:21 Debug IKE use ID type of IPv4_address
Sep 14, 16:14:21 Debug IKE HASH with:
Sep 14, 16:14:21 Debug IKE 970dd812 1a62895a ab5cb04b 843e04d7
Re: Can't Connect to SonicWall Pro
by Philodox on 2008-09-15 01:25:13 +0200
[quote]Sep 14, 16:14:21 Debug IKE 1 times of 72 bytes message will be
sent to x.x.x.x[4500]
Sep 14, 16:14:21 Debug IKE 00000000 5dd654cd bfed7735 59ae89f0
711e7f3e 05100201 00000000 00000044
Sep 14, 16:14:21 Debug IKE a553b0ff d11baa03 0f1b4d4a a393f28c
f4e6506e 18c6aebc b5a95620 2c032e4b
Sep 14, 16:14:21 Debug IKE 3e0f94ab 847c7586
Sep 14, 16:14:21 Debug IKE resend phase1 packet
5dd654cdbfed7735:59ae89f0711e7f3e
Sep 14, 16:14:21 Debug IKE ===
Sep 14, 16:14:21 Debug IKE 76 bytes message received from x.x.x.x[4500]
to 192.168.1.2[4500]
Sep 14, 16:14:21 Debug IKE 5dd654cd bfed7735 59ae89f0 711e7f3e
05100201 00000000 0000004c e7b56bd6
Sep 14, 16:14:21 Debug IKE 5b7dd040 8ebb5c37 1f50211a 1aef5e8b
f8e37816 876c612d 7926a0c8 a86e0e7c
Sep 14, 16:14:21 Debug IKE 9790da4c 2f789bdc e9b130ad
Sep 14, 16:14:21 Debug IKE begin decryption.
Sep 14, 16:14:21 Debug IKE encryption(3des)
Sep 14, 16:14:21 Debug IKE IV was saved for next processing:
Sep 14, 16:14:21 Debug IKE 2f789bdc e9b130ad
Sep 14, 16:14:21 Debug IKE encryption(3des)
Sep 14, 16:14:21 Debug IKE with key:
Sep 14, 16:14:21 Debug IKE e0f43032 2960130d 4d3c200d 09204dcd
1c4daa82 5c44252e
Sep 14, 16:14:21 Debug IKE decrypted payload by IV:
Sep 14, 16:14:21 Debug IKE 3e0f94ab 847c7586
Sep 14, 16:14:21 Debug IKE decrypted payload, but not trimed.
Sep 14, 16:14:21 Debug IKE 08000014 02000000 30303036 42313131
36333838 00000018 70bdb824 15d12217
Sep 14, 16:14:21 Debug IKE 851cf849 61538c22 df7b05fc 00000003
Sep 14, 16:14:21 Debug IKE padding len=4
Sep 14, 16:14:21 Debug IKE skip to trim padding.
Sep 14, 16:14:21 Debug IKE decrypted.
Sep 14, 16:14:21 Debug IKE 5dd654cd bfed7735 59ae89f0 711e7f3e
05100201 00000000 0000004c 08000014
Sep 14, 16:14:21 Debug IKE 02000000 30303036 42313131 36333838
00000018 70bdb824 15d12217 851cf849
Sep 14, 16:14:21 Debug IKE 61538c22 df7b05fc 00000003
Sep 14, 16:14:21 Debug IKE begin.
Sep 14, 16:14:21 Debug IKE seen nptype=5(id)
Sep 14, 16:14:21 Debug IKE seen nptype=8(hash)
Sep 14, 16:14:21 Debug IKE succeed.
Sep 14, 16:14:21 Error IKE Expecting IP address type in main mode, but
FQDN.
Sep 14, 16:14:21 Error IKE invalid ID payload.
Sep 14, 16:14:26 Debug IKE Adding NON-ESP marker
Sep 14, 16:14:26 Debug IKE 72 bytes from 192.168.1.2[4500] to
x.x.x.x[4500]
Sep 14, 16:14:26 Debug IKE sockname 192.168.1.2[4500]
Sep 14, 16:14:26 Debug IKE send packet from 192.168.1.2[4500]
Sep 14, 16:14:26 Debug IKE send packet to x.x.x.x[4500]
Sep 14, 16:14:26 Debug IKE 1 times of 72 bytes message will be sent to
x.x.x.x[4500]
Sep 14, 16:14:26 Debug IKE 00000000 5dd654cd bfed7735 59ae89f0
711e7f3e 05100201 00000000 00000044
Sep 14, 16:14:26 Debug IKE a553b0ff d11baa03 0f1b4d4a a393f28c
f4e6506e 18c6aebc b5a95620 2c032e4b
Sep 14, 16:14:26 Debug IKE 3e0f94ab 847c7586
Sep 14, 16:14:26 Debug IKE resend phase1 packet
5dd654cdbfed7735:59ae89f0711e7f3e
Re: Can't Connect to SonicWall Pro
by Philodox on 2008-09-15 01:25:55 +0200
[quote]Sep 14, 16:14:28 Debug IKE 02060003 24000000 04000000
00000000 03000500 ff200000 10020000 c0a80102
Sep 14, 16:14:28 Debug IKE 00000000 00000000 03000600 ff200000
10020000 18108637 00000000 00000000
Sep 14, 16:14:28 Debug IKE 1c000d00 20000000 00030000 00000000
00010008 00000000 01000000 01000000
Sep 14, 16:14:28 Debug IKE 00000000 00000000 00000000 00000000
00000000 00000000 80510100 00000000
Sep 14, 16:14:28 Debug IKE 80700000 00000000 00000000 00000000
00040000 00000000 0001c001 00000000
Sep 14, 16:14:28 Debug IKE 01000000 01000000 00000000 00000000
00000000 00000000 00000000 00000000
Sep 14, 16:14:28 Debug IKE 80510100 00000000 80700000 00000000
00000000 00000000 000c0000 00000000
Sep 14, 16:14:28 Debug IKE 00010001 00000000 01000000 01000000
00000000 00000000 00000000 00000000
Sep 14, 16:14:28 Debug IKE 00000000 00000000 80510100 00000000
80700000 00000000 00000000 00000000
Sep 14, 16:14:28 Debug IKE get pfkey ACQUIRE message
Sep 14, 16:14:28 Debug IKE 02060003 14000000 07000000 73000000
03000500 ff200000 10020000 c0a80102
Sep 14, 16:14:28 Debug IKE 00000000 00000000 03000600 ff200000
10020000 18108637 00000000 00000000
Sep 14, 16:14:28 Debug IKE 0a000d00 20000000 000c0000 00000000
00010001 00000000 01000000 01000000
Sep 14, 16:14:28 Debug IKE 00000000 00000000 00000000 00000000
00000000 00000000 80510100 00000000
Sep 14, 16:14:28 Debug IKE 80700000 00000000 00000000 00000000
02001200 02000200 07000000 00000000
Sep 14, 16:14:28 Debug IKE suitable outbound SP found:
192.168.1.2/32[0] 10.10.10.0/24[0] proto=any dir=out.
Sep 14, 16:14:28 Debug IKE sub:0xbffff67c: 10.10.10.0/24[0]
192.168.1.2/32[0] proto=any dir=in
Sep 14, 16:14:28 Debug IKE db :0x108b78: 10.10.10.0/24[0]
192.168.1.2/32[0] proto=any dir=in
Sep 14, 16:14:28 Debug IKE suitable inbound SP found: 10.10.10.0/24[0]
192.168.1.2/32[0] proto=any dir=in.
Sep 14, 16:14:28 Debug IKE new acquire 192.168.1.2/32[0]
10.10.10.0/24[0] proto=any dir=out
Sep 14, 16:14:28 Debug IKE (proto_id=ESP spisize=4 spi=00000000
spi_p=00000000 encmode=Tunnel reqid=14:13)
Sep 14, 16:14:28 Debug IKE (trns_id=3DES encklen=0
authtype=hmac-sha)
Sep 14, 16:14:28 Debug IKE in post_acquire
Sep 14, 16:14:28 Debug IKE configuration found for x.x.x.x.
Sep 14, 16:14:28 Info
IKE request for establishing IPsec-SA was queued
due to no phase1 found.
Sep 14, 16:14:31 Debug IKE Adding NON-ESP marker
Sep 14, 16:14:31 Debug IKE 72 bytes from 192.168.1.2[4500] to
x.x.x.x[4500]
Sep 14, 16:14:31 Debug IKE sockname 192.168.1.2[4500]
Sep 14, 16:14:31 Debug IKE send packet from 192.168.1.2[4500]
Sep 14, 16:14:31 Debug IKE send packet to x.x.x.x[4500]
Sep 14, 16:14:31 Debug IKE 1 times of 72 bytes message will be sent to
x.x.x.x[4500]
Sep 14, 16:14:31 Debug IKE 00000000 5dd654cd bfed7735 59ae89f0
711e7f3e 05100201 00000000 00000044
Sep 14, 16:14:31 Debug IKE a553b0ff d11baa03 0f1b4d4a a393f28c
f4e6506e 18c6aebc b5a95620 2c032e4b
Sep 14, 16:14:31 Debug IKE 3e0f94ab 847c7586
Sep 14, 16:14:31 Debug IKE resend phase1 packet
Re: Can't Connect to SonicWall Pro
by Philodox on 2008-09-15 01:26:33 +0200
[quote]
Sep 14, 16:14:35 Debug IKE 80700000 00000000 00000000 00000000
02001200 02000200 07000000 00000000
Sep 14, 16:14:35 Debug IKE suitable outbound SP found:
192.168.1.2/32[0] 10.10.10.0/24[0] proto=any dir=out.
Sep 14, 16:14:35 Debug IKE sub:0xbffff67c: 10.10.10.0/24[0]
192.168.1.2/32[0] proto=any dir=in
Sep 14, 16:14:35 Debug IKE db :0x108b78: 10.10.10.0/24[0]
192.168.1.2/32[0] proto=any dir=in
Sep 14, 16:14:35 Debug IKE suitable inbound SP found: 10.10.10.0/24[0]
192.168.1.2/32[0] proto=any dir=in.
Sep 14,