par Guepi » 19 Sep 2003 14:58
<!-- BBCode Start --><B>Les logs : </B><!-- BBCode End -->
<BR>
<BR><!-- BBCode Start --><I>côté MNF : </I><!-- BBCode End -->
<BR>Maintenant, c'est principalement ça...
<BR><!-- BBCode Quote Start --><TABLE BORDER=0 ALIGN=CENTER WIDTH=85%><TR><TD><font size=-2>En réponse à:</font><HR></TD></TR><TR><TD><FONT SIZE=-2><BLOCKQUOTE> Sep 18
<BR>
<BR> 15:18:32 Pluto packet from 62.147.xxx.yyy:500: initial Main Mode message received on 10.0.0.210:500 but no connection has been authorized
<BR>
<BR>Sep 18
<BR>
<BR> 15:18:33 Pluto packet from 62.147.xxx.yyy:500: ignoring Vendor ID payload </BLOCKQUOTE></FONT></TD></TR><TR><TD><HR></TD></TR></TABLE><!-- BBCode Quote End -->
<BR>avant, ça donnait :
<BR><!-- BBCode Quote Start --><TABLE BORDER=0 ALIGN=CENTER WIDTH=85%><TR><TD><font size=-2>En réponse à:</font><HR></TD></TR><TR><TD><FONT SIZE=-2><BLOCKQUOTE> Sep 16 14:50:15 fwsp Pluto[4310]: packet from 62.147.139.31:500: ignoring Vendor
<BR> ID payload
<BR>Sep 16 14:50:15 fwsp Pluto[4310]: "sp-dell-p-02.savoirpro.fr" 62.147.139.31 #79:
<BR> responding to Main Mode from unknown peer 62.147.139.31
<BR>Sep 16 14:50:15 fwsp Pluto[4310]: "sp-dell-p-02.savoirpro.fr" 62.147.139.31 #79:
<BR> policy does not allow OAKLEY_RSA_SIG authentication. Attribute OAKLEY_AUTHENTI
<BR>CATION_METHOD
<BR>Sep 16 14:50:17 fwsp Pluto[4310]: "sp-dell-p-02.savoirpro.fr" 62.147.139.31 #80:
<BR> OAKLEY_DES_CBC is not supported. Attribute OAKLEY_ENCRYPTION_ALGORITHM
<BR>Sep 16 14:50:17 fwsp Pluto[4310]: "sp-dell-p-02.savoirpro.fr" 62.147.139.31 #80:
<BR> no acceptable Oakley Transform
<BR>Sep 16 14:50:17 fwsp Pluto[4310]: "sp-dell-p-02.savoirpro.fr" 62.147.139.31: del
<BR>eting connection "sp-dell-p-02.savoirpro.fr" instance with peer 62.147.139.31
<BR>Sep 16 14:50:18 fwsp Pluto[4310]: packet from 62.147.139.31:500: ignoring Vendor
<BR> ID payload
<BR>
<BR></BLOCKQUOTE></FONT></TD></TR><TR><TD><HR></TD></TR></TABLE><!-- BBCode Quote End -->
<BR>----------------------------------
<BR><!-- BBCode Start --><I>du côté client : </I><!-- BBCode End -->
<BR>( je rappelle que les logs sont à activer - en changeant une clé du registre, si je me souviens bien-, et qu'ils se trouvent dans C:WINNTDebugOakley.log )
<BR>
<BR><!-- BBCode Quote Start --><TABLE BORDER=0 ALIGN=CENTER WIDTH=85%><TR><TD><font size=-2>En réponse à:</font><HR></TD></TR><TR><TD><FONT SIZE=-2><BLOCKQUOTE> 9-19: 14:49:44:1dc SecMaxToken 12000
<BR> 9-19: 14:49:44:1dc FormatMessage from system
<BR> 9-19: 14:49:44:1dc Impossible d'obtenir les informations d'identification du serveur Kerberos pour le service ISAKMP/Oakley. L'authentification Kerberos ne fonctionnera pas. La raison la plus probable de ce problème est l'absence d'appartenance de domaine. Ceci est normal si votre ordinateur est membre d'un groupe de travail.
<BR>
<BR>
<BR> 9-19: 14:49:47:1dc Get DH Prov type failed 234
<BR> 9-19: 14:49:47:1dc MaxDHLength 512
<BR> 9-19: 14:49:47:1dc Get DH Prov type failed 234
<BR> 9-19: 14:49:47:1dc MaxDHLength 512
<BR> 9-19: 14:49:47:1dc DH Provider 3
<BR> 9-19: 14:49:47:1dc Reapertimer a9978
<BR> 9-19: 14:49:47:1dc Before processing
<BR> 9-19: 14:49:47:160 Acquire thread waiting
<BR> 9-19: 14:49:47:1dc After processing
<BR> 9-19: 14:49:47:1dc Oakley Init done
<BR> 9-19: 14:49:47:1dc Oakley group 2 from UI
<BR> 9-19: 14:49:47:1dc Isakmp policy (4 total): fb8c12ee-4212-4134-84059e4b76db9e42 PFS=0
<BR> 9-19: 14:49:47:1dc #0: C.Id = 3, H.ID= 2, A.ID = 0, Group = 2 LT=28800 QMs=0
<BR> 9-19: 14:49:47:1dc #1: C.Id = 3, H.ID= 1, A.ID = 0, Group = 2 LT=28800 QMs=0
<BR> 9-19: 14:49:47:1dc #2: C.Id = 1, H.ID= 2, A.ID = 0, Group = 1 LT=28800 QMs=0
<BR> 9-19: 14:49:47:1dc #3: C.Id = 1, H.ID= 1, A.ID = 0, Group = 1 LT=28800 QMs=0
<BR> 9-19: 14:49:47:1dc flush guid(isakmp): fb8c12ee-4212-4134-84059e4b76db9e42
<BR> 9-19: 14:49:47:1dc isadb_schedule_kill_oldPolicy_sas: fb8c12ee-4212-4134-84059e4b76db9e42 1
<BR> 9-19: 14:49:47:1dc Added Timeout b7440
<BR> 9-19: 14:49:47:1dc flush(isakmp): fb8c12ee-4212-4134-84059e4b76db9e42
<BR> 9-19: 14:49:47:1dc Oakley group 2 from UI
<BR> 9-19: 14:49:47:1dc Isakmp policy (4 total): 4b3a9959-e327-4191-8e59d8b9a07a5914 PFS=1
<BR> 9-19: 14:49:47:1dc #0: C.Id = 3, H.ID= 2, A.ID = 0, Group = 2 LT=28800 QMs=0
<BR> 9-19: 14:49:47:1dc #1: C.Id = 3, H.ID= 1, A.ID = 0, Group = 2 LT=28800 QMs=0
<BR> 9-19: 14:49:47:1dc #2: C.Id = 1, H.ID= 2, A.ID = 0, Group = 1 LT=28800 QMs=0
<BR> 9-19: 14:49:47:1dc #3: C.Id = 1, H.ID= 1, A.ID = 0, Group = 1 LT=28800 QMs=0
<BR> 9-19: 14:49:47:1dc flush guid(isakmp): 4b3a9959-e327-4191-8e59d8b9a07a5914
<BR> 9-19: 14:49:47:1dc isadb_schedule_kill_oldPolicy_sas: 4b3a9959-e327-4191-8e59d8b9a07a5914 1
<BR> 9-19: 14:49:47:1dc Added Timeout bada0
<BR> 9-19: 14:49:47:1dc Adding policy guid(ipsec): aea5eb81-f0d8-437e-b912cf6dd5ae513a
<BR> 9-19: 14:49:47:1dc Authentication Method[0] from UI 5
<BR> 9-19: 14:49:47:1dc Auth[0]: 5 Authinfosize: 0
<BR> 9-19: 14:49:47:1dc Flags from UI 0
<BR> 9-19: 14:49:47:1dc Ipsec policy (6 total): aea5eb81-f0d8-437e-b912cf6dd5ae513a PFS=10158044
<BR> 9-19: 14:49:47:1dc #0: Encrypt C.Id = 3, C.KeyLen = 64, I.ID = 2,
<BR> 9-19: 14:49:47:1dc #1: Encrypt C.Id = 3, C.KeyLen = 64, I.ID = 1,
<BR> 9-19: 14:49:47:1dc #2: Encrypt C.Id = 1, C.KeyLen = 64, I.ID = 2,
<BR> 9-19: 14:49:47:1dc #3: Encrypt C.Id = 1, C.KeyLen = 64, I.ID = 1,
<BR> 9-19: 14:49:47:1dc #4: Auth C.Id = 2, C.KeyLen = 64, I.ID = 0,
<BR> 9-19: 14:49:47:1dc #5: Auth C.Id = 1, C.KeyLen = 64, I.ID = 0,
<BR> 9-19: 14:49:47:1dc flush guid(ipsec): aea5eb81-f0d8-437e-b912cf6dd5ae513a
<BR> 9-19: 14:49:47:1dc Adding policy guid(ipsec): e4b26905-83dd-4958-85078512927c0d92
<BR> 9-19: 14:49:47:1dc Authentication Method[0] from UI 3
<BR> 9-19: 14:49:47:1dc Auth[0]: 3 Authinfosize: 129
<BR> 9-19: 14:49:47:1dc Flags from UI 2
<BR> 9-19: 14:49:47:1dc Ipsec policy (1 total): e4b26905-83dd-4958-85078512927c0d92 PFS=10158044
<BR> 9-19: 14:49:47:1dc #0: Encrypt C.Id = 3, C.KeyLen = 0, I.ID = 1,
<BR> 9-19: 14:49:47:1dc flush guid(ipsec): e4b26905-83dd-4958-85078512927c0d92
<BR> 9-19: 14:49:47:1dc Adding policy guid(ipsec): ddbaac8f-c15b-4b47-a016868d3a7df990
<BR> 9-19: 14:49:47:1dc Authentication Method[0] from UI 3
<BR> 9-19: 14:49:47:1dc Auth[0]: 3 Authinfosize: 83
<BR> 9-19: 14:49:47:1dc Flags from UI 2
<BR> 9-19: 14:49:47:1dc Ipsec policy (1 total): ddbaac8f-c15b-4b47-a016868d3a7df990 PFS=10158044
<BR> 9-19: 14:49:47:1dc #0: Encrypt C.Id = 3, C.KeyLen = 0, I.ID = 1,
<BR> 9-19: 14:49:47:1dc flush guid(ipsec): ddbaac8f-c15b-4b47-a016868d3a7df990
<BR> 9-19: 14:49:47:104 entered kill_old_policy_sas
<BR> 9-19: 14:49:47:104 entered kill_old_policy_sas
<BR> </BLOCKQUOTE></FONT></TD></TR><TR><TD><HR></TD></TR></TABLE><!-- BBCode Quote End -->
<BR>
<BR>=====================================================
<BR><!-- BBCode Start --><B>les fichiers config IPSec.conf</B><!-- BBCode End -->
<BR>
<BR><!-- BBCode Start --><I> Côté MNF :</I><!-- BBCode End -->
<BR><!-- BBCode Quote Start --><TABLE BORDER=0 ALIGN=CENTER WIDTH=85%><TR><TD><font size=-2>En réponse à:</font><HR></TD></TR><TR><TD><FONT SIZE=-2><BLOCKQUOTE> #--------------------------------------------------------------------------
<BR># DO NOT MODIFY THIS FILE! It is updated automatically
<BR># by the naat/backend. Modify the templates/etc/freeswan/ipsec.conf instead
<BR>#-------------------------------------------------------------------------
<BR>#
<BR># Copyright (C) 2002 Mandrakesoft
<BR># Author Florin Grad
<BR>#
<BR>#######################################################################
<BR>## /etc/ipsec.conf - FreeS/WAN IPsec configuration file
<BR>
<BR>config setup
<BR> interfaces=%defaultroute
<BR> klipsdebug=none
<BR> plutodebug=none
<BR> plutoload=%search
<BR> plutostart=%search
<BR> uniqueids=yes
<BR>
<BR>conn %default
<BR> pfs=yes
<BR> keyingtries=1
<BR> compress=yes
<BR> disablearrivalcheck=no
<BR> left=aaa.bbb.ccc.ddd
<BR> leftcert=savoirpro.com.crt
<BR> leftrsasigkey=%cert
<BR> leftsubnet=10.0.0.0/24
<BR> leftnexthop=10.0.0.238
<BR>
<BR>conn savoirpro.com-vpn
<BR> authby=rsasig
<BR> auto=add
<BR> right=0.0.0.0
<BR> rightcert=savoirpro.com.crt
<BR> rightrsasigkey=%cert
<BR> rightsubnet=0.0.0.0/0
<BR> rightnexthop=10.0.0.238
<BR>
<BR>conn sp-dell-p-02.savoirpro.fr
<BR> left=10.0.0.210
<BR> leftnexthop=10.0.0.238
<BR> leftsubnet=10.0.0.0/24
<BR> right=%any
<BR> network=auto
<BR> auto=add
<BR> pfs=yes
<BR> compress=yes
<BR># LAST LINE -- EOF
<BR> </BLOCKQUOTE></FONT></TD></TR><TR><TD><HR></TD></TR></TABLE><!-- BBCode Quote End -->
<BR>
<BR><!-- BBCode Start --><I> Côté Client : </I><!-- BBCode End -->
<BR><!-- BBCode Quote Start --><TABLE BORDER=0 ALIGN=CENTER WIDTH=85%><TR><TD><font size=-2>En réponse à:</font><HR></TD></TR><TR><TD><FONT SIZE=-2><BLOCKQUOTE> conn %default
<BR> dial=free
<BR>
<BR>conn sp-dell-p-02.savoirpro.fr
<BR> left=%any
<BR> right=aaa.bbb.ccc.ddd
<BR> rightsubnet=10.0.0.0/24
<BR> rightca="C=FR, S=France, L=Paris, O=SavoirPro, CN=fwsp, E=adresse-mail@domaine.com"
<BR> network=auto
<BR> auto=add
<BR> pfs=yes
<BR> </BLOCKQUOTE></FONT></TD></TR><TR><TD><HR></TD></TR></TABLE><!-- BBCode Quote End -->