par fgth » 27 Sep 2003 13:19
Bon je vais être clair : AU SECOOOOURS.
<BR>Je viens de passer 2 jours à tenter un VPN entre une MNF et un client Win2000 RTC, et je craque.
<BR>J'ai épluché tous les posts, je me suis conformé à la doc de louis en version 02, rien à faire, je ne trouve pas.
<BR>La config :
<BR>
<BR>Win2000 RTC (Tiscali) -> internet -> ADSL / modem ST ethernet -> eth2 sur MNF
<BR>Je suis en phase de test, j'utilise un ADSL Wanadoo avec adresse dynamique pour l'instant, tant qu'elle ne change pas je prend l'adresse qu'ils m'ont attribué comme si c'était une statique.
<BR>
<BR>sur la MNF, eth0 (lan) en 192.168.1.254, eth1 (DMZ), eth2 sans adresse pour attaquer le speedtouch en direct.
<BR>Internet fonctionne, j'y accède depuis le réseau local.
<BR>J'ai paramétré le VPN, le tunnel, la règle par défaut et l'exception. J'ai créé les clés, mis à jour l'ipsec.conf :
<BR>
<BR>config setup
<BR> interfaces=%defaultroute
<BR> klipsdebug=none
<BR> plutodebug=none
<BR> plutoload=%search
<BR> plutostart=%search
<BR> uniqueids=yes
<BR>
<BR>conn %default
<BR> keyingtries=1
<BR> compress=yes
<BR> disablearrivalcheck=no
<BR> authby=rsasig
<BR> leftrsasigkey=%cert
<BR> rightrsasigkey=%cert
<BR>
<BR>conn systeaport-net
<BR> leftsubnet=192.168.1.0/24
<BR> also=systeaport
<BR>
<BR>conn systeaport
<BR> left=%defaultroute
<BR> right=%any
<BR> rightsubnet=0/0
<BR> leftcert=<nom de ma machine MNF>.pem
<BR> auto=add
<BR> pfs=yes
<BR>
<BR>Sur le client VPN, win2000, connexion modem sur Tiscali, internet fonctionne.
<BR>J'ai installé ipsecpol et ipsec.exe, mis à jour l'ipsec.conf :
<BR>
<BR>conn %default
<BR>
<BR> dial=Tiscali
<BR>
<BR>
<BR>
<BR>conn systeaport
<BR>
<BR> left=%any
<BR>
<BR> right=<adresse
<BR>Wanadoo 81.xx.xx.xx>
<BR> rightca="C=FR, S=France, L=<ville>, O=<société>, CN=<nom machine MNF>"
<BR>
<BR> network=auto
<BR>
<BR> auto=start
<BR>
<BR> pfs=yes
<BR>
<BR>
<BR>
<BR>conn systeaport-net
<BR>
<BR> left=%any
<BR>
<BR> right=<adresse Wanadoo 81.xx.xx.xx>
<BR> rightsubnet=192.168.1.0/24
<BR>
<BR> rightca="C=FR, S=France, L=<ville>, O=<société>, CN=<nom machine MNF>"
<BR>
<BR> network=auto
<BR>
<BR> auto=start
<BR>
<BR> pfs=yes
<BR>
<BR>
<BR>Je connecte tout ça en lançant ipsec sur win2000. Je tente un ping vers une adresse du 192.168.1.xx, je n'ai que 4 fois "Négociation de sécurité IP", et 4 paquets perdus...
<BR>
<BR>Ce que je ne pige pas, c'est que je n'ai aucun message dans /var/log/message : pas de paquet rejeté ayant l'adresse du client, rien...
<BR>
<BR>Sur le client, dans le oakley.log, ce qui me gêne le plus c'est ça :
<BR>
<BR> 9-27: 11:39:10:4ec Received no valid CRPs. Using all configured
<BR> 9-27: 11:39:10:4ec failed to get chain -2146885628
<BR> 9-27: 11:39:10:4ec ProcessFailure: sa:002394A0 centry:00000000 status:cbad0326
<BR>
<BR>et ça :
<BR>
<BR> 9-27: 11:39:10:4ec Mode d'échange de clés (Mode principal)
<BR> 9-27: 11:39:10:4ec Adresse IP source213.36.89.101
<BR>Masque d'adresse IP source 255.255.255.255
<BR>Adresse IP de destination 81.xx.xx.xx
<BR>Masque d'adresse IP de destination 255.255.255.255
<BR>Protocole 0
<BR>Port source 0
<BR>Port de destination 0
<BR> 9-27: 11:39:10:4ec Moi
<BR> 9-27: 11:39:10:4ec IKE n'a pas trouvé de certificat ordinateur valide
<BR> 9-27: 11:39:10:4ec ProcessFailure: sa:002394A0 centry:00000000 status:cbad0326
<BR>
<BR>Quelqu'un at-il une idée ? Au secours, les gars les filles, il faut que je mette ça en route rapidement maintenant, je dois faire des tests en réèl la semaine prochaine ! Et je n'aimerai vraiment pas avoir à me rabattre sur un win2000 parce que je n'y arrive pas avec la MNF !!! J'en mourrerai.
<BR>
<BR>
<BR>Au cas où, voilà le log complet :
<BR>
<BR>9-27: 11:39:09:3b8 Posting acquire: op=816BAF88 src=213.36.89.101.0 dst=192.168.1.11.0 proto = 0, SrcMask=255.255.255.255, DstMask=255.255.255.0, Tunnel 1, TunnelEndpt=81.xx.xx.xx Inbound TunnelEndpt=213.36.89.101
<BR>
<BR> 9-27: 11:39:09:3b8 Acquire thread waiting
<BR>
<BR> 9-27: 11:39:09:4ec find(ipsec): d240512d-3fcb-47be-8ff9c771baf4395f
<BR>
<BR> 9-27: 11:39:09:4ec outstanding_kernel_req returned 0
<BR>
<BR> 9-27: 11:39:09:4ec Created new SA 2394a0
<BR>
<BR> 9-27: 11:39:09:4ec Acquire: src = 213.36.89.101.0000, dst = 81.xx.xx.xx.62465, proto = 00, context = 816BAF88, ProxySrc = 213.36.89.101.0000, ProxyDst = 192.168.1.0.0000 SrcMask = 0.0.0.0 DstMask = 255.255.255.0
<BR>
<BR> 9-27: 11:39:09:4ec constructing ISAKMP Header
<BR>
<BR> 9-27: 11:39:09:4ec constructing SA (ISAKMP)
<BR>
<BR> 9-27: 11:39:09:4ec find(isakmp): d240512d-3fcb-47be-8ff9c771baf4395f
<BR>
<BR> 9-27: 11:39:09:4ec Setting group desc
<BR>
<BR> 9-27: 11:39:09:4ec Setting group desc
<BR>
<BR> 9-27: 11:39:09:4ec Setting group desc
<BR>
<BR> 9-27: 11:39:09:4ec Setting group desc
<BR>
<BR> 9-27: 11:39:09:4ec Constructing Vendor
<BR>
<BR> 9-27: 11:39:09:4ec Throw: State mask=1
<BR>
<BR> 9-27: 11:39:09:4ec Added Timeout 9cd00
<BR>
<BR> 9-27: 11:39:09:4ec Setting Retransmit: sa 2394a0 handle 9cd00 context 23b0d8
<BR>
<BR> 9-27: 11:39:09:4ec
<BR>
<BR> 9-27: 11:39:09:4ec Sending: SA = 0x002394A0 to 81.xx.xx.xx
<BR>
<BR> 9-27: 11:39:09:4ec ISAKMP Header: (V1.0), len = 216
<BR>
<BR> 9-27: 11:39:09:4ec I-COOKIE 23a02bd45b0c1eb1
<BR>
<BR> 9-27: 11:39:09:4ec R-COOKIE 0000000000000000
<BR>
<BR> 9-27: 11:39:09:4ec exchange: Oakley Main Mode
<BR>
<BR> 9-27: 11:39:09:4ec flags: 0
<BR>
<BR> 9-27: 11:39:09:4ec next payload: SA
<BR>
<BR> 9-27: 11:39:09:4ec message ID: 00000000
<BR>
<BR> 9-27: 11:39:09:4ec
<BR>
<BR> 9-27: 11:39:09:4ec Resume: (get) SA = 0x002394a0 from 81.xx.xx.xx
<BR> 9-27: 11:39:09:4ec ISAKMP Header: (V1.0), len = 84
<BR>
<BR> 9-27: 11:39:09:4ec I-COOKIE 23a02bd45b0c1eb1
<BR>
<BR> 9-27: 11:39:09:4ec R-COOKIE a74ee8c9fb6506f5
<BR>
<BR> 9-27: 11:39:09:4ec exchange: Oakley Main Mode
<BR>
<BR> 9-27: 11:39:09:4ec flags: 0
<BR>
<BR> 9-27: 11:39:09:4ec next payload: SA
<BR>
<BR> 9-27: 11:39:09:4ec message ID: 00000000
<BR>
<BR> 9-27: 11:39:09:4ec Stopping RetransTimer sa:002394A0 centry:00000000 handle:0009CD00
<BR>
<BR> 9-27: 11:39:09:4ec processing payload SA
<BR>
<BR> 9-27: 11:39:09:4ec Received Phase 1 Transform 1
<BR>
<BR> 9-27: 11:39:09:4ec Encryption Alg Triple DES CBC(5)
<BR>
<BR> 9-27: 11:39:09:4ec Hash Alg SHA(2)
<BR>
<BR> 9-27: 11:39:09:4ec Oakley Group 2
<BR>
<BR> 9-27: 11:39:09:4ec Auth Method Signature RSA avec les certificats(3)
<BR>
<BR> 9-27: 11:39:09:4ec Life type in Seconds
<BR>
<BR> 9-27: 11:39:09:4ec Life duration of 28800
<BR>
<BR> 9-27: 11:39:09:4ec Phase 1 SA accepted: transform=1
<BR>
<BR> 9-27: 11:39:09:4ec SA - Oakley proposal accepted
<BR>
<BR> 9-27: 11:39:09:4ec In state OAK_MM_SA_SETUP
<BR>
<BR> 9-27: 11:39:09:4ec constructing ISAKMP Header
<BR>
<BR> 9-27: 11:39:09:4ec constructing KE
<BR>
<BR> 9-27: 11:39:09:4ec constructing NONCE (ISAKMP)
<BR>
<BR> 9-27: 11:39:09:4ec Throw: State mask=7
<BR>
<BR> 9-27: 11:39:09:4ec
<BR>
<BR> 9-27: 11:39:09:4ec Sending: SA = 0x002394A0 to 81.xx.xx.xx
<BR> 9-27: 11:39:09:4ec ISAKMP Header: (V1.0), len = 184
<BR>
<BR> 9-27: 11:39:09:4ec I-COOKIE 23a02bd45b0c1eb1
<BR>
<BR> 9-27: 11:39:09:4ec R-COOKIE a74ee8c9fb6506f5
<BR>
<BR> 9-27: 11:39:09:4ec exchange: Oakley Main Mode
<BR>
<BR> 9-27: 11:39:09:4ec flags: 0
<BR>
<BR> 9-27: 11:39:09:4ec next payload: KE
<BR>
<BR> 9-27: 11:39:09:4ec message ID: 00000000
<BR>
<BR> 9-27: 11:39:10:4ec
<BR>
<BR> 9-27: 11:39:10:4ec Resume: (get) SA = 0x002394a0 from 81.xx.xx.xx
<BR>
<BR> 9-27: 11:39:10:4ec ISAKMP Header: (V1.0), len = 188
<BR>
<BR> 9-27: 11:39:10:4ec I-COOKIE 23a02bd45b0c1eb1
<BR>
<BR> 9-27: 11:39:10:4ec R-COOKIE a74ee8c9fb6506f5
<BR>
<BR> 9-27: 11:39:10:4ec exchange: Oakley Main Mode
<BR>
<BR> 9-27: 11:39:10:4ec flags: 0
<BR>
<BR> 9-27: 11:39:10:4ec next payload: KE
<BR>
<BR> 9-27: 11:39:10:4ec message ID: 00000000
<BR>
<BR> 9-27: 11:39:10:4ec Stopping RetransTimer sa:002394A0 centry:00000000 handle:0009CD00
<BR>
<BR> 9-27: 11:39:10:4ec processing payload KE
<BR>
<BR> 9-27: 11:39:10:4ec Generated 128 byte Shared Secret
<BR>
<BR> 9-27: 11:39:10:4ec KE processed; DH shared secret computed
<BR>
<BR> 9-27: 11:39:10:4ec processing payload NONCE
<BR>
<BR> 9-27: 11:39:10:4ec processing payload CR
<BR>
<BR> 9-27: 11:39:10:4ec Processing Cert request
<BR>
<BR> 9-27: 11:39:10:4ec In state OAK_MM_Key_EXCH
<BR>
<BR> 9-27: 11:39:10:4ec skeyid generated; crypto enabled (initiator)
<BR>
<BR> 9-27: 11:39:10:4ec constructing ISAKMP Header
<BR>
<BR> 9-27: 11:39:10:4ec constructing ID
<BR>
<BR> 9-27: 11:39:10:4ec Received no valid CRPs. Using all configured
<BR>
<BR> 9-27: 11:39:10:4ec failed to get chain -2146885628
<BR>
<BR> 9-27: 11:39:10:4ec ProcessFailure: sa:002394A0 centry:00000000 status:cbad0326
<BR>
<BR> 9-27: 11:39:10:4ec isadb_set_status sa:002394A0 centry:00000000 status cbad0326
<BR>
<BR> 9-27: 11:39:10:4ec Mode d'échange de clés (Mode principal)
<BR>
<BR>
<BR>
<BR>
<BR> 9-27: 11:39:10:4ec Adresse IP source213.36.89.101
<BR>
<BR>
<BR>Masque d'adresse IP source 255.255.255.255
<BR>
<BR>
<BR>Adresse IP de destination 81.xx.xx.xx
<BR>Masque d'adresse IP de destination 255.255.255.255
<BR>
<BR>
<BR>Protocole 0
<BR>
<BR>
<BR>Port source 0
<BR>
<BR>
<BR>Port de destination 0
<BR>
<BR>
<BR>
<BR>
<BR> 9-27: 11:39:10:4ec Moi
<BR>
<BR>
<BR>
<BR>
<BR> 9-27: 11:39:10:4ec IKE n'a pas trouvé de certificat ordinateur valide
<BR>
<BR>
<BR>
<BR>
<BR> 9-27: 11:39:10:4ec ProcessFailure: sa:002394A0 centry:00000000 status:cbad0326
<BR>
<BR> 9-27: 11:39:10:4ec constructing ISAKMP Header
<BR>
<BR> 9-27: 11:39:10:4ec constructing HASH (null)
<BR>
<BR> 9-27: 11:39:10:4ec constructing NOTIFY 28
<BR>
<BR> 9-27: 11:39:10:4ec constructing HASH (ND)
<BR>
<BR> 9-27: 11:39:10:4ec Construct ND hash message len = 28 pcklen=80 hashlen=20
<BR>
<BR> 9-27: 11:39:10:4ec Construct ND Hash mess ID 53b12fb3
<BR>
<BR> 9-27: 11:39:10:4ec ND Hash skeyid_a e12ce535236a93c1bb402da80ffd7662
<BR>
<BR> 9-27: 11:39:10:4ec 9f94fc63
<BR>
<BR> 9-27: 11:39:10:4ec ND Hash message 0000001c000000010110001c23a02bd4
<BR>
<BR> 9-27: 11:39:10:4ec 5b0c1eb1a74ee8c9fb6506f5
<BR>
<BR> 9-27: 11:39:10:4ec Throw: State mask=200110f
<BR>
<BR> 9-27: 11:39:10:4ec Doing tripleDES
<BR>
<BR> 9-27: 11:39:10:4ec
<BR>
<BR> 9-27: 11:39:10:4ec Sending: SA = 0x002394A0 to 81.xx.xx.xx
<BR> 9-27: 11:39:10:4ec ISAKMP Header: (V1.0), len = 84
<BR>
<BR> 9-27: 11:39:10:4ec I-COOKIE 23a02bd45b0c1eb1
<BR>
<BR> 9-27: 11:39:10:4ec R-COOKIE a74ee8c9fb6506f5
<BR>
<BR> 9-27: 11:39:10:4ec exchange: ISAKMP Informational Exchange
<BR>
<BR> 9-27: 11:39:10:4ec flags: 1 ( encrypted )
<BR>
<BR> 9-27: 11:39:10:4ec next payload: HASH
<BR>
<BR> 9-27: 11:39:10:4ec message ID: 53b12fb3
<BR>
<BR> 9-27: 11:39:20:4ec
<BR>
<BR> 9-27: 11:39:20:4ec Resume: (get) SA = 0x002394a0 from 81.xx.xx.xx
<BR> 9-27: 11:39:20:4ec ISAKMP Header: (V1.0), len = 188
<BR>
<BR> 9-27: 11:39:20:4ec I-COOKIE 23a02bd45b0c1eb1
<BR>
<BR> 9-27: 11:39:20:4ec R-COOKIE a74ee8c9fb6506f5
<BR>
<BR> 9-27: 11:39:20:4ec exchange: Oakley Main Mode
<BR>
<BR> 9-27: 11:39:20:4ec flags: 0
<BR>
<BR> 9-27: 11:39:20:4ec next payload: KE
<BR>
<BR> 9-27: 11:39:20:4ec message ID: 00000000
<BR>
<BR> 9-27: 11:39:20:4ec received an unencrypted packet when crypto active
<BR>
<BR> 9-27: 11:39:20:4ec GetPacket failed cbad0324
<BR>
<BR> 9-27: 11:39:40:4ec
<BR>
<BR> 9-27: 11:39:40:4ec Resume: (get) SA = 0x002394a0 from 81.xx.xx.xx
<BR>
<BR> 9-27: 11:39:40:4ec ISAKMP Header: (V1.0), len = 188
<BR>
<BR> 9-27: 11:39:40:4ec I-COOKIE 23a02bd45b0c1eb1
<BR>
<BR> 9-27: 11:39:40:4ec R-COOKIE a74ee8c9fb6506f5
<BR>
<BR> 9-27: 11:39:40:4ec exchange: Oakley Main Mode
<BR>
<BR> 9-27: 11:39:40:4ec flags: 0
<BR>
<BR> 9-27: 11:39:40:4ec next payload: KE
<BR>
<BR> 9-27: 11:39:40:4ec message ID: 00000000
<BR>
<BR> 9-27: 11:39:40:4ec received an unencrypted packet when crypto active
<BR>
<BR> 9-27: 11:39:40:4ec GetPacket failed cbad0324
<BR>
<BR> 9-27: 11:41:14:4ec SA Dead. sa:002394A0 status:cbad0328
<BR>
<BR> 9-27: 11:41:14:4ec constructing ISAKMP Header
<BR>
<BR> 9-27: 11:41:14:4ec constructing HASH (null)
<BR>
<BR> 9-27: 11:41:14:4ec constructing DELETE
<BR>
<BR> 9-27: 11:41:14:4ec constructing HASH (ND)
<BR>
<BR> 9-27: 11:41:14:4ec Construct ND hash message len = 28 pcklen=80 hashlen=20
<BR>
<BR> 9-27: 11:41:14:4ec Construct ND Hash mess ID 7bd81096
<BR>
<BR> 9-27: 11:41:14:4ec ND Hash skeyid_a e12ce535236a93c1bb402da80ffd7662
<BR>
<BR> 9-27: 11:41:14:4ec 9f94fc63
<BR>
<BR> 9-27: 11:41:14:4ec ND Hash message 0000001c000000010110000123a02bd4
<BR>
<BR> 9-27: 11:41:14:4ec 5b0c1eb1a74ee8c9fb6506f5
<BR>
<BR> 9-27: 11:41:14:4ec Throw: State mask=110f
<BR>
<BR> 9-27: 11:41:14:4ec Doing tripleDES
<BR>
<BR> 9-27: 11:41:14:4ec
<BR>
<BR> 9-27: 11:41:14:4ec Sending: SA = 0x002394A0 to 81.xx.xx.xx
<BR> 9-27: 11:41:14:4ec ISAKMP Header: (V1.0), len = 84
<BR>
<BR> 9-27: 11:41:14:4ec I-COOKIE 23a02bd45b0c1eb1
<BR>
<BR> 9-27: 11:41:14:4ec R-COOKIE a74ee8c9fb6506f5
<BR>
<BR> 9-27: 11:41:14:4ec exchange: ISAKMP Informational Exchange
<BR>
<BR> 9-27: 11:41:14:4ec flags: 1 ( encrypted )
<BR>
<BR> 9-27: 11:41:14:4ec next payload: HASH
<BR>
<BR> 9-27: 11:41:14:4ec message ID: 7bd81096
<BR>
<BR> 9-27: 11:41:14:4ec Deleting SA 002394A0
<BR>
<BR> 9-27: 11:41:14:4ec Cancelling Timeout 9cd00
<BR>
<BR> 9-27: 11:43:40:54c Interface change event
<BR>
<BR> 9-27: 11:43:40:54c Added Timeout 9cd00
<BR>
<BR> 9-27: 11:43:40:4ec Deregister wait d51c8
<BR>
<BR> 9-27: 11:43:40:4ec removing socket to 655924d5
<BR>
<BR> 9-27: 11:43:53:54c Interface change event
<BR>
<BR> 9-27: 11:43:53:54c RegisterSocket: Socket 1200, Event 1184
<BR>
<BR>
<BR>
<BR> 9-27: 11:43:53:54c Register wait d51c8
<BR>
<BR> 9-27: 11:43:53:54c Adding socket: 1200 addr: 192.168.1.20
<BR>
<BR> 9-27: 11:43:53:54c Referenced Socket 1401a8c0
<BR>
<BR>
Il faut repousser l'envie d'hurler avec les loups de peur de n'être qu'un mouton.