Hi, All
I''m into my 2nd day of trying to diagnose why my IPSEC setup
isn''t
working, and I was hoping somebody would have some insight. Me
repeatedly banging my head against the wall doesn''t seem to be working
(this time). ;)
I''m trying to set up Super Freeswan (with x.509 certificates) +
Shorewall to build IPSEC tunnels between both (1) the Internet
(zone=net, eth0) and (2) a wireless network (zone=air, eth4), to (3) the
corporate LAN (zone=loc, eth1). This is a "roadwarrior" setup,
connecting Win2k to Super Freeswan. I''m using Marcus Muller''s
Win2k
IPSEC tool from <http://vpn.ebootis.de/>.
Involved interfaces:
NET ZONE
eth0 Link encap:Ethernet HWaddr 00:05:5D:30:08:08
inet addr:<PUBLIC_IP_1> Bcast:<PUBLIC_IP_2>
Mask:255.255.255.224
LOC ZONE
eth1 Link encap:Ethernet HWaddr 00:05:5D:30:15:1C
inet addr:192.168.0.1 Bcast:192.168.0.255 Mask:255.255.255.0
AIR ZONE
eth4 Link encap:Ethernet HWaddr 00:C0:4F:79:55:F1
inet addr:192.168.30.1 Bcast:192.168.30.255
Mask:255.255.255.0
VPN ZONE
ipsec0 Link encap:Ethernet HWaddr 00:05:5D:30:08:08
inet addr:<PUBLIC_IP_2> Mask:255.255.255.224
When I create an IPSEC tunnel from a host in the air zone, the traffic
is dropped by Shorewall, which believes the packet is originating from
the air zone -- not the vpn zone I created (configuration details are
below). I can''t figure out why that traffic is not being considered
part of the vpn zone, even though the KLIPS debug logs show the packets
coming into KLIPS, being de-encapsulated, etc. So, I allowed all
traffic from air to loc. I can now see a complete flow between the
involved physical interfaces (using tcpdump), and I can see the
de-encapsulation/re-encapsulation of packets by KLIPS. However, I never
get a response back at the client when I send ICMP pings. I''m getting
similar results from an IP in the net zone that the firewall is not
using. I''m waiting on a laptop that''s been borrowed so I can
try from
an IP in the wild that''s not in our ISP-assigned block, by using a
dialup service.
This is the sequence I''m trying:
(1) Start the IPSEC tunnel from the host in the air zone to the
firewall''s public IP -- successful, certificate works, SA is good.
(2) Ping a host in the loc zone -- Win2k ping comes back and says
"Negotiating IP Security"
(3) Wait a few seconds...
(4) Ping that same host again -- "request timed out"
Below is my configuration:
--> I''ve set up a vpn zone in /etc/shorewall/zones:
#ZONE DISPLAY COMMENTS
net Net Internet
loc Local Local networks (Corporate Network)
dmz DMZ Web Server DMZ
dat DATA-NET Data server Network
air 802.11b 802.11b Network
vpn ipsec0 IPSEC VPN tunnels
--> In /etc/shorewall/policy, I have these lines:
air loc ACCEPT info **
loc air ACCEPT info **
vpn loc ACCEPT info
** ONLY PRESENT BECAUSE IPSEC TRAFFIC ISN''T BEING CLASSIFIED IN
''VPN''
ZONE
--> I added these rules in /etc/shorewall/rules:
##################################################
# ipsec vpn rules #
##################################################
ACCEPT net fw udp 500
ACCEPT fw net udp 500 --> unnecessary?
ACCEPT air fw udp 500
ACCEPT fw air udp 500 --> unnecessary?
ACCEPT net fw 50
ACCEPT air fw 50
ACCEPT net fw 51
ACCEPT air fw 51
--> /etc/shorewall/interfaces:
net eth0 detect
dropunclean,routefilter,norfc1918,blacklist
loc eth1 detect dropunclean
dmz eth2 detect dropunclean,routeback
dat eth3 detect dropunclean
air eth4 detect dropunclean
vpn ipsec0
--> /etc/shorewall/tunnels:
# TYPE ZONE GATEWAY GATEWAY ZONE PORT
ipsec air 192.168.30.0/24 vpn
ipsec net 0.0.0.0/0 vpn
The logging from the Win2k IPSEC client (oakley.log) is very
uninteresting -- it''s not giving any errors.
I''ve provided some logging below.
Thanks in advance!
Regards,
Mike
--
Logging stuff: (note -- public IP replaced by XX.YY.ZZ.162)
Jan 14 22:27:02 firewall pluto[22877]: | *received 216 bytes from
192.168.30.99:500 on eth0
Jan 14 22:27:02 firewall pluto[22877]: packet from 192.168.30.99:500:
ignoring Vendor ID payload [MS NT5 ISAKMPOAKLEY 00000002]
Jan 14 22:27:02 firewall pluto[22877]: | instantiated
"w2k-road-warriors-mferraro" for 192.168.30.99
Jan 14 22:27:02 firewall pluto[22877]: "w2k-road-warriors-mferraro"[1]
192.168.30.99 #1: responding to Main Mode from unknown peer
192.168.30.99
Jan 14 22:27:02 firewall pluto[22877]: | sending 84 bytes for
STATE_MAIN_R0 through eth0 to 192.168.30.99:500:
Jan 14 22:27:02 firewall pluto[22877]: | *received 184 bytes from
192.168.30.99:500 on eth0
Jan 14 22:27:02 firewall pluto[22877]: | sending 188 bytes for
STATE_MAIN_R1 through eth0 to 192.168.30.99:500:
Jan 14 22:27:02 firewall pluto[22877]: | *received 1932 bytes from
192.168.30.99:500 on eth0
Jan 14 22:27:02 firewall pluto[22877]: | received encrypted packet from
192.168.30.99:500
Jan 14 22:27:03 firewall pluto[22877]: "w2k-road-warriors-mferraro"[1]
192.168.30.99 #1: Main mode peer ID is ID_DER_ASN1_DN: ''C=US,
ST=California, L=My Town, O=MyComPanYnAmE, OU=Technical Operations,
CN=Michael Ferraro, E=my@email.com''
Jan 14 22:27:04 firewall pluto[22877]: | sending 1764 bytes for
STATE_MAIN_R2 through eth0 to 192.168.30.99:500:
Jan 14 22:27:04 firewall pluto[22877]: "w2k-road-warriors-mferraro"[1]
192.168.30.99 #1: sent MR3, ISAKMP SA established
Jan 14 22:27:04 firewall pluto[22877]: | *received 1932 bytes from
192.168.30.99:500 on eth0
Jan 14 22:27:05 firewall pluto[22877]: "w2k-road-warriors-mferraro"[1]
192.168.30.99 #1: retransmitting in response to duplicate packet;
already STATE_MAIN_R3
Jan 14 22:27:05 firewall pluto[22877]: | sending 1764 bytes for
retransmit in response to duplicate through eth0 to 192.168.30.99:500:
Jan 14 22:27:05 firewall pluto[22877]: | *received 308 bytes from
192.168.30.99:500 on eth0
Jan 14 22:27:06 firewall kernel: klips_debug:pfkey_address_process:
found address family=2, AF_INET, 192.168.30.99.
Jan 14 22:27:06 firewall kernel: klips_debug:pfkey_address_build: found
address=192.168.30.99:0.
Jan 14 22:27:06 firewall kernel: klips_debug:pfkey_address_process:
found address family=2, AF_INET, 192.168.30.99.
Jan 14 22:27:06 firewall kernel: klips_debug:pfkey_ipsec_sa_init: (pfkey
defined) IPIP tdb set for 192.168.30.99->XX.YY.ZZ.162.
Jan 14 22:27:06 firewall kernel: klips_debug:pfkey_address_build: found
address=192.168.30.99:0.
Jan 14 22:27:06 firewall kernel: klips_debug: IP: ihl:20 ver:4 tos:0
tlen:112 id:2048 frag_off:0 ttl:128 proto:50 chk:63570
saddr:192.168.30.99 daddr:XX.YY.ZZ.162
Jan 14 22:27:06 firewall kernel: klips_debug:ipsec_rcv:
SA:esp0x67a15c15@XX.YY.ZZ.162, src=192.168.30.99 of pkt agrees with
expected SA source address policy.
Jan 14 22:27:05 firewall pluto[22877]: | received encrypted packet from
192.168.30.99:500
Jan 14 22:27:05 firewall pluto[22877]: | peer client is 192.168.30.99/32
Jan 14 22:27:05 firewall pluto[22877]: "w2k-road-warriors-mferraro"[1]
192.168.30.99 #2: responding to Quick Mode
Jan 14 22:27:06 firewall pluto[22877]: | finish_pfkey_msg: SADB_ADD
message 6 for Add IPIP SA tun.1001@192.168.30.99
Jan 14 22:27:06 firewall pluto[22877]: | sending 300 bytes for
STATE_QUICK_R0 through eth0 to 192.168.30.99:500:
Jan 14 22:27:06 firewall pluto[22877]: | *received 308 bytes from
192.168.30.99:500 on eth0
Jan 14 22:27:06 firewall pluto[22877]: "w2k-road-warriors-mferraro"[1]
192.168.30.99 #2: discarding duplicate packet; already STATE_QUICK_R1
Jan 14 22:27:06 firewall pluto[22877]: | *received 52 bytes from
192.168.30.99:500 on eth0
Jan 14 22:27:06 firewall kernel: klips_debug:ipsec_rcv: packet from
192.168.30.99 received with seq=1 (iv)=0x3af1f109600ba8f8 iplen=112
esplen=80 sa=esp0x67a15c15@XX.YY.ZZ.162
Jan 14 22:27:06 firewall kernel: klips_debug:ipsec_rcv: packet decrypted
from 192.168.30.99: next_header = 4, padding = 2
Jan 14 22:27:06 firewall kernel: klips_debug: IP: ihl:20 ver:4 tos:0
tlen:80 id:2048 frag_off:0 ttl:128 proto:4 chk:63648 saddr:192.168.30.99
daddr:XX.YY.ZZ.162
Jan 14 22:27:06 firewall kernel: klips_debug: IP: ihl:20 ver:4 tos:0
tlen:60 id:293 frag_off:0 ttl:128 proto:1 (ICMP) chk:39370
saddr:192.168.30.99 daddr:192.168.0.30 type:code=8:0
Jan 14 22:27:06 firewall kernel: Shorewall:air2loc:ACCEPT:IN=eth4
OUT=eth1 SRC=192.168.30.99 DST=192.168.0.30 LEN=60 TOS=0x00 PREC=0x00
TTL=127 ID=293 PROTO=ICMP TYPE=8 CODE=0 ID=512 SEQ=5888
Jan 14 22:27:06 firewall kernel: klips_debug:pfkey_address_process:
found address family=2, AF_INET, 192.168.30.99.
Jan 14 22:27:06 firewall kernel: klips_debug:pfkey_address_process:
tdb_said.dst set to 192.168.30.99.
Jan 14 22:27:06 firewall kernel: klips_debug:gettdb: linked entry in tdb
table for hash=196 of SA:esp0x350b79e4@192.168.30.99 requested.
Jan 14 22:27:06 firewall kernel: klips_debug:gettdb: no entries in tdb
table for hash=196 of SA:esp0x350b79e4@192.168.30.99.
Jan 14 22:27:06 firewall kernel: klips_debug:pfkey_add_parse: existing
Tunnel Descriptor Block not found (this is good) for
SAesp0x350b79e4@192.168.30.99, out-bound, allocating.
Jan 14 22:27:06 firewall kernel: klips_debug:pfkey_ipsec_sa_init: (pfkey
defined) called for SA:esp0x350b79e4@192.168.30.99
Jan 14 22:27:06 firewall kernel: klips_debug:pfkey_address_build: found
address=192.168.30.99:0.
Jan 14 22:27:06 firewall kernel: klips_debug:pfkey_add_parse: successful
for SA: esp0x350b79e4@192.168.30.99
Jan 14 22:27:06 firewall kernel: klips_debug:pfkey_address_process:
found address family=2, AF_INET, 192.168.30.99.
Jan 14 22:27:06 firewall kernel: klips_debug:pfkey_address_process:
tdb_said.dst set to 192.168.30.99.
Jan 14 22:27:06 firewall kernel: klips_debug:gettdb: linked entry in tdb
table for hash=230 of SA:tun0x1002@192.168.30.99 requested.
Jan 14 22:27:06 firewall kernel: klips_debug:gettdb: no entries in tdb
table for hash=230 of SA:tun0x1002@192.168.30.99.
Jan 14 22:27:06 firewall kernel: klips_debug:pfkey_add_parse: existing
Tunnel Descriptor Block not found (this is good) for
SAtun0x1002@192.168.30.99, out-bound, allocating.
Jan 14 22:27:06 firewall kernel: klips_debug:pfkey_ipsec_sa_init: (pfkey
defined) called for SA:tun0x1002@192.168.30.99
Jan 14 22:27:06 firewall kernel: klips_debug:pfkey_ipsec_sa_init: (pfkey
defined) IPIP tdb set for XX.YY.ZZ.162->192.168.30.99.
Jan 14 22:27:06 firewall kernel: klips_debug:pfkey_address_build: found
address=192.168.30.99:0.
Jan 14 22:27:06 firewall kernel: klips_debug:pfkey_add_parse: successful
for SA: tun0x1002@192.168.30.99
Jan 14 22:27:06 firewall kernel: klips_debug:pfkey_address_process:
found address family=2, AF_INET, 192.168.30.99.
Jan 14 22:27:06 firewall kernel: klips_debug:pfkey_address_process:
tdb_said.dst set to 192.168.30.99.
Jan 14 22:27:06 firewall kernel: klips_debug:pfkey_address_process:
found address family=2, AF_INET, 192.168.30.99.
Jan 14 22:27:06 firewall kernel: klips_debug:pfkey_address_process:
tdb_said.dst set to 192.168.30.99.
Jan 14 22:27:06 firewall kernel: klips_debug:gettdb: linked entry in tdb
table for hash=230 of SA:tun0x1002@192.168.30.99 requested.
Jan 14 22:27:06 firewall kernel: klips_debug:gettdb: linked entry in tdb
table for hash=196 of SA:esp0x350b79e4@192.168.30.99 requested.
Jan 14 22:27:06 firewall kernel: klips_debug:pfkey_address_build: found
address=192.168.30.99:0.
Jan 14 22:27:06 firewall kernel: klips_debug:pfkey_address_build: found
address=192.168.30.99:0.
Jan 14 22:27:06 firewall kernel: klips_debug:pfkey_address_process:
found address family=2, AF_INET, 192.168.30.99.
Jan 14 22:27:07 firewall kernel: klips_debug:pfkey_address_process:
tdb_said.dst set to 192.168.30.99.
Jan 14 22:27:07 firewall kernel: klips_debug:pfkey_address_process:
found address family=2, AF_INET, 192.168.30.99.
Jan 14 22:27:07 firewall kernel: klips_debug:pfkey_address_parse:
extr->eroute set to 192.168.0.0/0:0->192.168.30.99/0:0
Jan 14 22:27:07 firewall kernel: klips_debug:pfkey_address_parse:
extr->eroute set to 192.168.0.0/24:0->192.168.30.99/0:0
Jan 14 22:27:07 firewall kernel: klips_debug:pfkey_address_parse:
extr->eroute set to 192.168.0.0/24:0->192.168.30.99/32:0
Jan 14 22:27:07 firewall kernel: klips_debug:pfkey_x_addflow_parse:
calling breakeroute and/or makeroute for
192.168.0.0/24->192.168.30.99/32
Jan 14 22:27:07 firewall kernel: klips_debug:ipsec_makeroute: attempting
to insert eroute for 192.168.0.0/24:0->192.168.30.99/32:0 0, SA:
tun0x1002@192.168.30.99, PID:22877, skb=00000000, ident:NULL->NULL
Jan 14 22:27:07 firewall kernel: klips_debug:pfkey_address_build: found
address=192.168.30.99:0.
Jan 14 22:27:07 firewall kernel: klips_debug:pfkey_address_build: found
address=192.168.30.99:0.
Jan 14 22:27:06 firewall pluto[22877]: | received encrypted packet from
192.168.30.99:500
Jan 14 22:27:06 firewall pluto[22877]: | finish_pfkey_msg: SADB_ADD
message 8 for Add ESP SA esp.350b79e4@192.168.30.99
Jan 14 22:27:06 firewall pluto[22877]: | finish_pfkey_msg: SADB_ADD
message 9 for Add IPIP SA tun.1002@192.168.30.99
Jan 14 22:27:06 firewall pluto[22877]: | grouping tun.1002@192.168.30.99
and esp.350b79e4@192.168.30.99
Jan 14 22:27:06 firewall pluto[22877]: | finish_pfkey_msg: SADB_X_GRPSA
message 10 for group tun.1002@192.168.30.99
Jan 14 22:27:06 firewall pluto[22877]: | add eroute 192.168.0.0/24:0 ->
192.168.30.99/32:0 => tun.1002@192.168.30.99:0
Jan 14 22:27:06 firewall pluto[22877]: | finish_pfkey_msg:
SADB_X_ADDFLOW message 11 for flow tun.1002@192.168.30.99
Jan 14 22:27:06 firewall pluto[22877]: | executing up-client: 2>&1
PLUTO_VERSION=''1.1'' PLUTO_VERB=''up-client''
PLUTO_CONNECTION=''w2k-road-warriors-mferraro''
PLUTO_NEXT_HOP=''XX.YY.ZZ.161''
PLUTO_INTERFACE=''ipsec0''
PLUTO_ME=''XX.YY.ZZ.162'' PLUTO_MY_ID=''C=US,
ST=California, L=My Town,
O=MyComPanYnAmE, OU=Technical Operations, CN=FiReWaLLnAmE.here.com,
E=my@email.com'' PLUTO_MY_CLIENT=''192.168.0.0/24''
PLUTO_MY_CLIENT_NET=''192.168.0.0''
PLUTO_MY_CLIENT_MASK=''255.255.255.0''
PLUTO_MY_PORT=''0'' PLUTO_MY_PROTOCOL=''0''
PLUTO_PEER=''192.168.30.99''
PLUTO_PEER_ID=''C=US, ST=California, L=My Town, O=MyComPanYnAmE,
OU=Technical Operations, CN=Michael Ferraro, E=my@email.com''
PLUTO_PEER_CLIENT=''192.168.30.99/32''
PLUTO_PEER_CLIENT_NET=''192.168.30.99''
PLUTO_PEER_CLIENT_MASK=''255.255.255.255''
PLUTO_PEER_PORT=''0''
PLUTO_PEER_PROTOCOL=''0'' PLUTO_PEER_CA=''C=US,
ST=California, L=My Town,
O=MyComPanYnAmE, OU=Technical Operations, E=my@email.com'' ipsec _updown
Jan 14 22:27:06 firewall pluto[22877]: | executing prepare-client: 2>&1
PLUTO_VERSION=''1.1''
PLUTO_VERB=''prepare-client''
PLUTO_CONNECTION=''w2k-road-warriors-mferraro''
PLUTO_NEXT_HOP=''XX.YY.ZZ.161''
PLUTO_INTERFACE=''ipsec0''
PLUTO_ME=''XX.YY.ZZ.162'' PLUTO_MY_ID=''C=US,
ST=California, L=My Town,
O=MyComPanYnAmE, OU=Technical Operations, CN=FiReWaLLnAmE.here.com,
E=my@email.com'' PLUTO_MY_CLIENT=''192.168.0.0/24''
PLUTO_MY_CLIENT_NET=''192.168.0.0''
PLUTO_MY_CLIENT_MASK=''255.255.255.0''
PLUTO_MY_PORT=''0'' PLUTO_MY_PROTOCOL=''0''
PLUTO_PEER=''192.168.30.99''
PLUTO_PEER_ID=''C=US, ST=California, L=My Town, O=MyComPanYnAmE,
OU=Technical Operations, CN=Michael Ferraro, E=my@email.com''
PLUTO_PEER_CLIENT=''192.168.30.99/32''
PLUTO_PEER_CLIENT_NET=''192.168.30.99''
PLUTO_PEER_CLIENT_MASK=''255.255.255.255''
PLUTO_PEER_PORT=''0''
PLUTO_PEER_PROTOCOL=''0'' PLUTO_PEER_CA=''C=US,
ST=California, L=My Town,
O=MyComPanYnAmE, OU=Technical Operations, E=my@email.com'' ipsec _updown
Jan 14 22:27:06 firewall pluto[22877]: | executing route-client: 2>&1
PLUTO_VERSION=''1.1''
PLUTO_VERB=''route-client''
PLUTO_CONNECTION=''w2k-road-warriors-mferraro''
PLUTO_NEXT_HOP=''XX.YY.ZZ.161''
PLUTO_INTERFACE=''ipsec0''
PLUTO_ME=''XX.YY.ZZ.162'' PLUTO_MY_ID=''C=US,
ST=California, L=My Town,
O=MyComPanYnAmE, OU=Technical Operations, CN=FiReWaLLnAmE.here.com,
E=my@email.com'' PLUTO_MY_CLIENT=''192.168.0.0/24''
PLUTO_MY_CLIENT_NET=''192.168.0.0''
PLUTO_MY_CLIENT_MASK=''255.255.255.0''
PLUTO_MY_PORT=''0'' PLUTO_MY_PROTOCOL=''0''
PLUTO_PEER=''192.168.30.99''
PLUTO_PEER_ID=''C=US, ST=California, L=My Town, O=MyComPanYnAmE,
OU=Technical Operations, CN=Michael Ferraro, E=my@email.com''
PLUTO_PEER_CLIENT=''192.168.30.99/32''
PLUTO_PEER_CLIENT_NET=''192.168.30.99''
PLUTO_PEER_CLIENT_MASK=''255.255.255.255''
PLUTO_PEER_PORT=''0''
PLUTO_PEER_PROTOCOL=''0'' PLUTO_PEER_CA=''C=US,
ST=California, L=My Town,
O=MyComPanYnAmE, OU=Technical Operations, E=my@email.com'' ipsec _updown
Jan 14 22:27:06 firewall pluto[22877]: "w2k-road-warriors-mferraro"[1]
192.168.30.99 #2: IPsec SA established
Jan 14 22:27:12 firewall kernel: klips_debug: IP: ihl:20 ver:4 tos:0
tlen:112 id:2304 frag_off:0 ttl:128 proto:50 chk:63314
saddr:192.168.30.99 daddr:XX.YY.ZZ.162
Jan 14 22:27:12 firewall kernel: klips_debug:ipsec_rcv:
SA:esp0x67a15c15@XX.YY.ZZ.162, src=192.168.30.99 of pkt agrees with
expected SA source address policy.
Jan 14 22:27:12 firewall kernel: klips_debug:ipsec_rcv: packet from
192.168.30.99 received with seq=2 (iv)=0x5f6b516537032fc2 iplen=112
esplen=80 sa=esp0x67a15c15@XX.YY.ZZ.162
Jan 14 22:27:12 firewall kernel: klips_debug:ipsec_rcv: packet decrypted
from 192.168.30.99: next_header = 4, padding = 2
Jan 14 22:27:12 firewall kernel: klips_debug: IP: ihl:20 ver:4 tos:0
tlen:80 id:2304 frag_off:0 ttl:128 proto:4 chk:63392 saddr:192.168.30.99
daddr:XX.YY.ZZ.162
Jan 14 22:27:12 firewall kernel: klips_debug: IP: ihl:20 ver:4 tos:0
tlen:60 id:301 frag_off:0 ttl:128 proto:1 (ICMP) chk:39362
saddr:192.168.30.99 daddr:192.168.0.30 type:code=8:0
Jan 14 22:27:12 firewall kernel: Shorewall:air2loc:ACCEPT:IN=eth4
OUT=eth1 SRC=192.168.30.99 DST=192.168.0.30 LEN=60 TOS=0x00 PREC=0x00
TTL=127 ID=301 PROTO=ICMP TYPE=8 CODE=0 ID=512 SEQ=6144
Jan 14 22:27:12 firewall kernel: klips_debug: IP: ihl:20 ver:4 tos:0
tlen:60 id:51413 frag_off:0 ttl:63 proto:1 (ICMP) chk:4890
saddr:192.168.0.30 daddr:192.168.30.99 type:code=0:0
Jan 14 22:27:12 firewall kernel: klips_debug:ipsec_findroute:
192.168.0.30:0->192.168.30.99:0 1
Jan 14 22:27:12 firewall kernel: klips_debug:gettdb: linked entry in tdb
table for hash=230 of SA:tun0x1002@192.168.30.99 requested.
Jan 14 22:27:12 firewall kernel: klips_debug:ipsec_tunnel_start_xmit:
found Tunnel Descriptor Block -- SA:<IPIP> tun0x1002@192.168.30.99
Jan 14 22:27:12 firewall kernel: klips_debug:ipsec_tunnel_start_xmit:
calling room for <IPIP>, SA:tun0x1002@192.168.30.99
Jan 14 22:27:12 firewall kernel: klips_debug:ipsec_tunnel_start_xmit:
calling room for <ESP_3DES_HMAC_MD5>, SA:esp0x350b79e4@192.168.30.99
Jan 14 22:27:12 firewall kernel: klips_debug: IP: ihl:20 ver:4 tos:0
tlen:60 id:51413 frag_off:0 ttl:63 proto:1 (ICMP) chk:4890
saddr:192.168.0.30 daddr:192.168.30.99 type:code=0:0
Jan 14 22:27:12 firewall kernel: klips_debug:ipsec_tunnel_start_xmit:
calling output for <IPIP>, SA:tun0x1002@192.168.30.99
Jan 14 22:27:12 firewall kernel: klips_debug:ipsec_tunnel_start_xmit:
after <IPIP>, SA:tun0x1002@192.168.30.99:
Jan 14 22:27:12 firewall kernel: klips_debug: IP: ihl:20 ver:4 tos:0
tlen:80 id:17916 frag_off:0 ttl:64 proto:4 chk:64164 saddr:XX.YY.ZZ.162
daddr:192.168.30.99
Jan 14 22:27:12 firewall kernel: klips_debug:ipsec_tunnel_start_xmit:
calling output for <ESP_3DES_HMAC_MD5>, SA:esp0x350b79e4@192.168.30.99
Jan 14 22:27:12 firewall kernel: klips_debug:ipsec_tunnel_start_xmit:
after <ESP_3DES_HMAC_MD5>, SA:esp0x350b79e4@192.168.30.99:
Jan 14 22:27:12 firewall kernel: klips_debug: IP: ihl:20 ver:4 tos:0
tlen:112 id:17916 frag_off:0 ttl:64 proto:50 chk:64086
saddr:XX.YY.ZZ.162 daddr:192.168.30.99
Jan 14 22:27:12 firewall kernel: klips_debug:ipsec_findroute:
XX.YY.ZZ.162:0->192.168.30.99:0 50
Jan 14 22:27:12 firewall kernel: klips_debug: IP: ihl:20 ver:4 tos:0
tlen:112 id:17916 frag_off:0 ttl:64 proto:50 chk:64086
saddr:XX.YY.ZZ.162 daddr:192.168.30.99
Jan 14 22:27:17 firewall kernel: klips_debug: IP: ihl:20 ver:4 tos:0
tlen:96 id:54110 DF frag_off:0 ttl:64 proto:17 (UDP) chk:11557
saddr:XX.YY.ZZ.162:500 daddr:192.168.30.99:500
Jan 14 22:27:17 firewall kernel: klips_debug:ipsec_findroute:
XX.YY.ZZ.162:500->192.168.30.99:500 17
Jan 14 22:27:17 firewall kernel: klips_debug: IP: ihl:20 ver:4 tos:0
tlen:96 id:54110 DF frag_off:0 ttl:64 proto:17 (UDP) chk:11557
saddr:XX.YY.ZZ.162:500 daddr:192.168.30.99:500
Jan 14 22:27:17 firewall kernel: klips_debug:pfkey_address_process:
found address family=2, AF_INET, 192.168.30.99.
Jan 14 22:27:17 firewall kernel: klips_debug:pfkey_address_process:
tdb_said.dst set to 192.168.30.99.
Jan 14 22:27:17 firewall kernel: klips_debug:gettdb: linked entry in tdb
table for hash=196 of SA:esp0x350b79e4@192.168.30.99 requested.
Jan 14 22:27:17 firewall kernel: klips_debug:deltdbchain: passed
SA:esp0x350b79e4@192.168.30.99
Jan 14 22:27:17 firewall kernel: klips_debug:deltdbchain: unlinking and
delting SA:esp0x350b79e4@192.168.30.99<6>,
inext=tun0x1002@192.168.30.99<6>.
Jan 14 22:27:17 firewall kernel: klips_debug:deltdb: deleting
SA:esp0x350b79e4@192.168.30.99, hashval=196.
Jan 14 22:27:17 firewall kernel: klips_debug:deltdbchain: unlinking and
delting SA:tun0x1002@192.168.30.99<6>.
Jan 14 22:27:17 firewall kernel: klips_debug:deltdb: deleting
SA:tun0x1002@192.168.30.99, hashval=230.
Jan 14 22:27:17 firewall kernel: klips_debug:pfkey_address_build: found
address=192.168.30.99:0.
Jan 14 22:27:17 firewall kernel: klips_debug:pfkey_address_process:
found address family=2, AF_INET, 192.168.30.99.
Jan 14 22:27:17 firewall pluto[22877]: | *received 68 bytes from
192.168.30.99:500 on eth0
Jan 14 22:27:17 firewall pluto[22877]: | received encrypted packet from
192.168.30.99:500
Jan 14 22:27:17 firewall pluto[22877]: "w2k-road-warriors-mferraro"[1]
192.168.30.99 #1: received Delete SA payload: deleting IPSEC State #2
Jan 14 22:27:17 firewall pluto[22877]: | sending 68 bytes for delete
notify through eth0 to 192.168.30.99:500:
Jan 14 22:27:17 firewall pluto[22877]: | executing down-client: 2>&1
PLUTO_VERSION=''1.1'' PLUTO_VERB=''down-client''
PLUTO_CONNECTION=''w2k-road-warriors-mferraro''
PLUTO_NEXT_HOP=''XX.YY.ZZ.161''
PLUTO_INTERFACE=''ipsec0''
PLUTO_ME=''XX.YY.ZZ.162'' PLUTO_MY_ID=''C=US,
ST=California, L=My Town,
O=MyComPanYnAmE, OU=Technical Operations, CN=FiReWaLLnAmE.here.com,
E=my@email.com'' PLUTO_MY_CLIENT=''192.168.0.0/24''
PLUTO_MY_CLIENT_NET=''192.168.0.0''
PLUTO_MY_CLIENT_MASK=''255.255.255.0''
PLUTO_MY_PORT=''0'' PLUTO_MY_PROTOCOL=''0''
PLUTO_PEER=''192.168.30.99''
PLUTO_PEER_ID=''C=US, ST=California, L=My Town, O=MyComPanYnAmE,
OU=Technical Operations, CN=Michael Ferraro, E=my@email.com''
PLUTO_PEER_CLIENT=''192.168.30.99/32''
PLUTO_PEER_CLIENT_NET=''192.168.30.99''
PLUTO_PEER_CLIENT_MASK=''255.255.255.255''
PLUTO_PEER_PORT=''0''
PLUTO_PEER_PROTOCOL=''0'' PLUTO_PEER_CA=''C=US,
ST=California, L=My Town,
O=MyComPanYnAmE, OU=Technical Operations, E=my@email.com'' ipsec _updown
Jan 14 22:27:17 firewall pluto[22877]: | replace with shunt eroute
192.168.0.0/24:0 -> 192.168.30.99/32:0 => %trap:0
Jan 14 22:27:17 firewall pluto[22877]: | delete
esp.350b79e4@192.168.30.99
Jan 14 22:27:17 firewall pluto[22877]: | finish_pfkey_msg: SADB_DELETE
message 13 for Delete SA esp.350b79e4@192.168.30.99
Jan 14 22:27:17 firewall pluto[22877]: | *received 84 bytes from
192.168.30.99:500 on eth0
Jan 14 22:27:17 firewall pluto[22877]: | received encrypted packet from
192.168.30.99:500
Jan 14 22:27:17 firewall kernel: klips_debug:pfkey_address_build: found
address=192.168.30.99:0.
Jan 14 22:27:17 firewall kernel: klips_debug: IP: ihl:20 ver:4 tos:0
tlen:112 id:40735 DF frag_off:0 ttl:64 proto:17 (UDP) chk:24916
saddr:XX.YY.ZZ.162:500 daddr:192.168.30.99:500
Jan 14 22:27:17 firewall kernel: klips_debug:ipsec_findroute:
XX.YY.ZZ.162:500->192.168.30.99:500 17
Jan 14 22:27:17 firewall kernel: klips_debug: IP: ihl:20 ver:4 tos:0
tlen:112 id:40735 DF frag_off:0 ttl:64 proto:17 (UDP) chk:24916
saddr:XX.YY.ZZ.162:500 daddr:192.168.30.99:500
Jan 14 22:27:17 firewall kernel: klips_debug:pfkey_address_process:
found address family=2, AF_INET, 192.168.30.99.
Jan 14 22:27:17 firewall kernel: klips_debug:pfkey_address_parse:
extr->eroute set to 192.168.0.0/0:0->192.168.30.99/0:0
Jan 14 22:27:17 firewall kernel: klips_debug:pfkey_address_parse:
extr->eroute set to 192.168.0.0/24:0->192.168.30.99/0:0
Jan 14 22:27:17 firewall kernel: klips_debug:pfkey_address_parse:
extr->eroute set to 192.168.0.0/24:0