Package: openswan
Version: 1:2.4.4-3.1
Severity: normal

This is probably very likely to be reported upstream and maybe even known
from upstream (available docs are unclear about this).

When I use the following connection settings:

conn onera
    left=%defaultroute
    leftrsasigkey=%cert
    leftcert=mykerinos.cer
    leftsendcert=always
    right=144.204.128.1
    rightsubnet=125.1.0.0/16
    rightid="[EMAIL PROTECTED], C=FR, ST=Ile de France, L=CHATILLON, O=ONERA, 
OU=DRIS, CN=144.204.48.1"
    rightxauthserver=yes
    ike=aes256-md5
    auto=start

I can initiate the conneciton with my peer:

Mar 13 10:36:52 mykerinos pluto[16411]: "onera" #1: initiating Main Mode
Mar 13 10:36:52 mykerinos pluto[16411]: "onera" #1: received Vendor ID payload 
[Dead Peer Detection]
Mar 13 10:36:52 mykerinos pluto[16411]: "onera" #1: ignoring unknown Vendor ID 
payload [afca071368a1f1c96b8696fc77570100]
Mar 13 10:36:52 mykerinos pluto[16411]: "onera" #1: ignoring unknown Vendor ID 
payload [1d6e178f6c2c0be284985465450fe9d4]
Mar 13 10:36:52 mykerinos pluto[16411]: "onera" #1: transition from state 
STATE_MAIN_I1 to state STATE_MAIN_I2
Mar 13 10:36:52 mykerinos pluto[16411]: "onera" #1: STATE_MAIN_I2: sent MI2, 
expecting MR2
Mar 13 10:36:52 mykerinos pluto[16411]: "onera" #1: I am sending my cert
Mar 13 10:36:52 mykerinos pluto[16411]: "onera" #1: I am sending a certificate 
request
Mar 13 10:36:52 mykerinos pluto[16411]: "onera" #1: transition from state 
STATE_MAIN_I2 to state STATE_MAIN_I3
Mar 13 10:36:52 mykerinos pluto[16411]: "onera" #1: STATE_MAIN_I3: sent MI3, 
expecting MR3
Mar 13 10:36:53 mykerinos pluto[16411]: "onera" #1: Main mode peer ID is 
ID_DER_ASN1_DN: '[EMAIL PROTECTED], C=FR, ST=Ile de France, L=CHATILLON, 
O=ONERA, OU=DRIS, CN=144.204.48.1'
Mar 13 10:36:53 mykerinos pluto[16411]: "onera" #1: no crl from issuer "C=FR, 
ST=92, L=CHATILLON, O=onera, CN=lip6" found (strict=no)
Mar 13 10:36:53 mykerinos pluto[16411]: "onera" #1: transition from state 
STATE_MAIN_I3 to state STATE_MAIN_I4
Mar 13 10:36:53 mykerinos pluto[16411]: "onera" #1: STATE_MAIN_I4: ISAKMP SA 
established {auth=OAKLEY_RSA_SIG cipher=aes_256 prf=oakley_md5 group=modp1024}
Mar 13 10:36:53 mykerinos pluto[16411]: "onera" #2: initiating Quick Mode 
RSASIG+ENCRYPT+TUNNEL+PFS+UP {using isakmp#1}
Mar 13 10:36:53 mykerinos pluto[16411]: "onera" #1: received MODECFG message 
when in state STATE_MAIN_I4, and we aren't xauth client
Mar 13 10:37:35 mykerinos last message repeated 3 times

but it stops there because my peer uses XAUTH for authentication.

Then I add "xauthclient=yes" to my connection settings:

Mar 13 11:32:17 mykerinos pluto[18839]: "onera" #1: initiating Main Mode
Mar 13 11:32:17 mykerinos pluto[18839]: packet from 144.204.128.1:500: ignoring 
informational payload, type NO_PROPOSAL_CHOSEN
Mar 13 11:32:17 mykerinos pluto[18839]: packet from 144.204.128.1:500: received 
and ignored informational message
Mar 13 11:32:27 mykerinos pluto[18839]: packet from 144.204.128.1:500: ignoring 
informational payload, type NO_PROPOSAL_CHOSEN
Mar 13 11:32:27 mykerinos pluto[18839]: packet from 144.204.128.1:500: received 
and ignored informational message
Mar 13 11:32:35 mykerinos pluto[18839]: shutting down
Mar 13 11:32:35 mykerinos pluto[18839]: forgetting secrets
Mar 13 11:32:35 mykerinos pluto[18839]: "onera": deleting connection

Here, it appear that IKE negotiation immediately fails because the two peers
do not agree on IKE settings, just like it happens if I don't use the
"ike=aes256-md5" line.

I suspect that "xauthclient=yes" somewhat overrides the "ike=" settings,
making it impossible to use both at the same time. Some online documentation
report this was a bug in Openswan 2.2.* but, well, we're now with 2.4...:-)



-- System Information:
Debian Release: testing/unstable
  APT prefers unstable
  APT policy: (500, 'unstable'), (500, 'testing'), (500, 'stable')
Architecture: i386 (i686)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.15-1-686
Locale: LANG=fr_FR.UTF-8, LC_CTYPE=fr_FR.UTF-8 (charmap=UTF-8) (ignored: LC_ALL 
set to fr_FR.UTF-8)

Versions of packages openswan depends on:
ii  bind9-host [host]             1:9.3.2-2  Version of 'host' bundled with BIN
ii  bsdmainutils                  6.1.3      collection of more utilities from 
ii  debconf [debconf-2.0]         1.4.72     Debian configuration management sy
ii  debianutils                   2.15.3     Miscellaneous utilities specific t
ii  iproute                       20051007-3 Professional tools to control the 
ii  ipsec-tools                   1:0.6.5-1  IPsec tools for Linux
ii  libc6                         2.3.6-4    GNU C Library: Shared libraries an
ii  libcurl3                      7.15.3-1   Multi-protocol file transfer libra
ii  libgmp3c2                     4.1.4-11   Multiprecision arithmetic library
ii  libldap2                      2.1.30-13  OpenLDAP libraries
ii  libpam0g                      0.79-3.1   Pluggable Authentication Modules l
ii  libssl0.9.8                   0.9.8a-8   SSL shared libraries
ii  makedev                       2.3.1-80   creates device files in /dev
ii  openssl                       0.9.8a-8   Secure Socket Layer (SSL) binary a

openswan recommends no packages.

-- debconf information:
  openswan/existing_x509_key_filename:
* openswan/x509_state_name: Hauts de Seine
* openswan/rsa_key_length: 2048
* openswan/restart: true
* openswan/start_level: earliest
* openswan/enable-oe: false
* openswan/existing_x509_certificate: false
  openswan/existing_x509_certificate_filename:
* openswan/create_rsa_key: true
* openswan/x509_email_address: [EMAIL PROTECTED]
* openswan/x509_country_code: FR
* openswan/x509_self_signed: false
* openswan/x509_organizational_unit: Département Réseaux et Informatique 
Scientifique
* openswan/x509_locality_name: Châtillon
* openswan/x509_common_name: mykerinos.onera
* openswan/rsa_key_type: x509
* openswan/x509_organization_name: ONERA

Reply via email to