IPSec established, no Traffic passing.
-
Also, are you trying to reach host on the internal network or internet? I had to configure outbound NAT for 192.168.103.0/24 before I could reach internet from iPhone.
-
i was trying to reach pfsense's internal lan ip.
racoon.conf:
This file is automatically generated. Do not edit
path pre_shared_key "/var/etc/psk.txt";
path certificate "/var/etc";
listen
{
adminsock "/var/db/racoon/racoon.sock" "root" "wheel" 0660;
isakmp 192.168.1.17 [500];
isakmp_natt 192.168.1.17 [4500];
}mode_cfg
{
auth_source system;
group_source system;
pool_size 253;
network4 192.168.3.1;
netmask4 255.255.255.0;
dns4 192.168.2.1;
default_domain "workgroup";
}remote anonymous
{
ph1id 1;
exchange_mode aggressive;
my_identifier address 192.168.1.17;
peers_identifier fqdn "iphone";
ike_frag on;
generate_policy = unique;
initial_contact = off;
nat_traversal = on;dpd_delay = 10;
dpd_maxfail = 5;
support_proxy on;
proposal_check claim;proposal
{
authentication_method xauth_psk_server;
encryption_algorithm aes 256;
hash_algorithm sha1;
dh_group 2;
lifetime time 28800 secs;
}
}sainfo anonymous
{
remoteid 1;
encryption_algorithm aes 256;
authentication_algorithm hmac_sha1;lifetime time 3600 secs;
compression_algorithm deflate;
}ipsec_log:
May 18 00:56:09 pfSense racoon: INFO: respond new phase 1 negotiation: 192.168.1.17[500]<=>192.168.1.7[500]
May 18 00:56:09 pfSense racoon: INFO: begin Aggressive mode.
May 18 00:56:09 pfSense racoon: INFO: received Vendor ID: RFC 3947
May 18 00:56:09 pfSense racoon: INFO: received Vendor ID: draft-ietf-ipsec-nat-t-ike-08
May 18 00:56:09 pfSense racoon: INFO: received Vendor ID: draft-ietf-ipsec-nat-t-ike-07
May 18 00:56:09 pfSense racoon: INFO: received Vendor ID: draft-ietf-ipsec-nat-t-ike-06
May 18 00:56:09 pfSense racoon: INFO: received Vendor ID: draft-ietf-ipsec-nat-t-ike-05
May 18 00:56:09 pfSense racoon: INFO: received Vendor ID: draft-ietf-ipsec-nat-t-ike-04
May 18 00:56:09 pfSense racoon: INFO: received Vendor ID: draft-ietf-ipsec-nat-t-ike-03
May 18 00:56:09 pfSense racoon: INFO: received Vendor ID: draft-ietf-ipsec-nat-t-ike-02
May 18 00:56:09 pfSense racoon: INFO: received Vendor ID: draft-ietf-ipsec-nat-t-ike-02
May 18 00:56:09 pfSense racoon: INFO: received Vendor ID: draft-ietf-ipsra-isakmp-xauth-06.txt
May 18 00:56:09 pfSense racoon: INFO: received Vendor ID: CISCO-UNITY
May 18 00:56:09 pfSense racoon: INFO: received Vendor ID: DPD
May 18 00:56:09 pfSense racoon: INFO: Selected NAT-T version: RFC 3947
May 18 00:56:09 pfSense racoon: INFO: Adding remote and local NAT-D payloads.
May 18 00:56:09 pfSense racoon: INFO: Hashing 192.168.1.7[500] with algo #2
May 18 00:56:09 pfSense racoon: INFO: Hashing 192.168.1.17[500] with algo #2
May 18 00:56:09 pfSense racoon: INFO: Adding xauth VID payload.
May 18 00:56:09 pfSense racoon: INFO: Hashing 192.168.1.17[500] with algo #2
May 18 00:56:09 pfSense racoon: INFO: NAT-D payload #0 verified
May 18 00:56:09 pfSense racoon: INFO: Hashing 192.168.1.7[500] with algo #2
May 18 00:56:09 pfSense racoon: INFO: NAT-D payload #1 verified
May 18 00:56:09 pfSense racoon: ERROR: notification INITIAL-CONTACT received in aggressive exchange.
May 18 00:56:09 pfSense racoon: INFO: NAT not detected
May 18 00:56:09 pfSense racoon: INFO: Sending Xauth request
May 18 00:56:09 pfSense racoon: INFO: ISAKMP-SA established 192.168.1.17[500]-192.168.1.7[500] spi:c52ad072fefeec7a:e2d97b50d90eed6b
May 18 00:56:13 pfSense racoon: INFO: Using port 0
May 18 00:56:13 pfSense racoon: INFO: login succeeded for user "sydney"
May 18 00:56:13 pfSense racoon: WARNING: Ignored attribute INTERNAL_ADDRESS_EXPIRY
May 18 00:56:13 pfSense racoon: WARNING: Ignored attribute 28683
May 18 00:56:13 pfSense racoon: INFO: respond new phase 2 negotiation: 192.168.1.17[500]<=>192.168.1.7[500]
May 18 00:56:13 pfSense racoon: INFO: no policy found, try to generate the policy : 192.168.3.1/32[0] 0.0.0.0/0[0] proto=any dir=in
May 18 00:56:13 pfSense racoon: INFO: IPsec-SA established: ESP 192.168.1.17[500]->192.168.1.7[500] spi=184685857(0xb021521)
May 18 00:56:13 pfSense racoon: INFO: IPsec-SA established: ESP 192.168.1.17[500]->192.168.1.7[500] spi=103635710(0x62d5afe)
May 18 00:56:13 pfSense racoon: ERROR: such policy does not already exist: "192.168.3.1/32[0] 0.0.0.0/0[0] proto=any dir=in"
May 18 00:56:13 pfSense racoon: ERROR: such policy does not already exist: "0.0.0.0/0[0] 192.168.3.1/32[0] proto=any dir=out"
May 18 00:56:14 pfSense racoon: INFO: initiate new phase 2 negotiation: 192.168.1.17[500]<=>192.168.1.7[500]
May 18 00:56:14 pfSense racoon: INFO: IPsec-SA established: ESP 192.168.1.17[500]->192.168.1.7[500] spi=193249986(0xb84c2c2)
May 18 00:56:14 pfSense racoon: INFO: IPsec-SA established: ESP 192.168.1.17[500]->192.168.1.7[500] spi=108727917(0x67b0e6d)
May 18 00:56:14 pfSense racoon: INFO: generated policy, deleting it.
May 18 00:56:14 pfSense racoon: INFO: purged IPsec-SA proto_id=ESP spi=103635710. -
eazydor, start racoon in debug mode with the command I posted earlier and post log with more info. In your case racoon deletes policies right after they are created so there is something else going on there.
-
yes, it seems like.. log says generating policy & deleting it.. webinterface says bidirectional spd's are created..
anyhow, i'm not a pro when it comes to ipsec..
btw: thanks for your help..
heres the debug-log from before, forgotten to post. the log end's, where the other's post log began..May 18 00:53:44 pfSense racoon: DEBUG: ===
May 18 00:53:44 pfSense racoon: DEBUG: 92 bytes message received from 192.168.1.7[500] to 192.168.1.17[500]
May 18 00:53:44 pfSense racoon: DEBUG: d02d7505 994c3a77 17abc41b 30d5f9cb 08100501 8687228d 0000005c f7bbc7d9 1b8ac1c5 ef95e2e7 7088ffe8 24ff2767 e4c1d632 316840cf 5289f3bb b7054faa b9ba4dee e0094fb0 d0c76b9d c7b6cbdd d2873584 28a9f94f 7c2a53f0
May 18 00:53:44 pfSense racoon: DEBUG: receive Information.
May 18 00:53:44 pfSense racoon: DEBUG: compute IV for phase2
May 18 00:53:44 pfSense racoon: DEBUG: phase1 last IV:
May 18 00:53:44 pfSense racoon: DEBUG: 191bba75 9d7f37f7 9b5799d6 1b161b98 8687228d
May 18 00:53:44 pfSense racoon: DEBUG: hash(sha1)
May 18 00:53:44 pfSense racoon: DEBUG: encryption(aes)
May 18 00:53:44 pfSense racoon: DEBUG: phase2 IV computed:
May 18 00:53:44 pfSense racoon: DEBUG: ebb44c15 995f764a fb86e417 e73722ac
May 18 00:53:44 pfSense racoon: DEBUG: begin decryption.
May 18 00:53:44 pfSense racoon: DEBUG: encryption(aes)
May 18 00:53:44 pfSense racoon: DEBUG: IV was saved for next processing:
May 18 00:53:44 pfSense racoon: DEBUG: c7b6cbdd d2873584 28a9f94f 7c2a53f0
May 18 00:53:44 pfSense racoon: DEBUG: encryption(aes)
May 18 00:53:44 pfSense racoon: DEBUG: with key:
May 18 00:53:44 pfSense racoon: DEBUG: a1e7f77c 6e221db6 b5b319bb b18c223a 6a4288c7 811293a7 e5201056 4e647fdb
May 18 00:53:44 pfSense racoon: DEBUG: decrypted payload by IV:
May 18 00:53:44 pfSense racoon: DEBUG: ebb44c15 995f764a fb86e417 e73722ac
May 18 00:53:44 pfSense racoon: DEBUG: decrypted payload, but not trimed.
May 18 00:53:44 pfSense racoon: DEBUG: 0b000018 0ef1fdb0 4594cff9 7153f598 140e3973 4c2fec77 00000020 00000001 01108d29 d02d7505 994c3a77 17abc41b 30d5f9cb 000001fa 00000000 00000008
May 18 00:53:44 pfSense racoon: DEBUG: padding len=9
May 18 00:53:44 pfSense racoon: DEBUG: skip to trim padding.
May 18 00:53:44 pfSense racoon: DEBUG: decrypted.
May 18 00:53:44 pfSense racoon: DEBUG: d02d7505 994c3a77 17abc41b 30d5f9cb 08100501 8687228d 0000005c 0b000018 0ef1fdb0 4594cff9 7153f598 140e3973 4c2fec77 00000020 00000001 01108d29 d02d7505 994c3a77 17abc41b 30d5f9cb 000001fa 00000000 00000008
May 18 00:53:44 pfSense racoon: DEBUG: IV freed
May 18 00:53:44 pfSense racoon: DEBUG: HASH with:
May 18 00:53:44 pfSense racoon: DEBUG: 8687228d 00000020 00000001 01108d29 d02d7505 994c3a77 17abc41b 30d5f9cb 000001fa
May 18 00:53:44 pfSense racoon: DEBUG: hmac(hmac_sha1)
May 18 00:53:44 pfSense racoon: DEBUG: HASH computed:
May 18 00:53:44 pfSense racoon: DEBUG: 0ef1fdb0 4594cff9 7153f598 140e3973 4c2fec77
May 18 00:53:44 pfSense racoon: DEBUG: hash validated.
May 18 00:53:44 pfSense racoon: DEBUG: begin.
May 18 00:53:44 pfSense racoon: DEBUG: seen nptype=8(hash)
May 18 00:53:44 pfSense racoon: DEBUG: seen nptype=11(notify)
May 18 00:53:44 pfSense racoon: DEBUG: succeed.
May 18 00:53:44 pfSense racoon: DEBUG: DPD R-U-There-Ack received
May 18 00:53:44 pfSense racoon: DEBUG: received an R-U-THERE-ACK
May 18 00:53:54 pfSense racoon: DEBUG: DPD monitoring….
May 18 00:53:54 pfSense racoon: DEBUG: compute IV for phase2
May 18 00:53:54 pfSense racoon: DEBUG: phase1 last IV:
May 18 00:53:54 pfSense racoon: DEBUG: 191bba75 9d7f37f7 9b5799d6 1b161b98 d4f0852d
May 18 00:53:54 pfSense racoon: DEBUG: hash(sha1)
May 18 00:53:54 pfSense racoon: DEBUG: encryption(aes)
May 18 00:53:54 pfSense racoon: DEBUG: phase2 IV computed:
May 18 00:53:54 pfSense racoon: DEBUG: 8275876d d53aec3a 20f20372 a86b0ad9
May 18 00:53:54 pfSense racoon: DEBUG: HASH with:
May 18 00:53:54 pfSense racoon: DEBUG: d4f0852d 00000020 00000001 01108d28 d02d7505 994c3a77 17abc41b 30d5f9cb 000001fb
May 18 00:53:54 pfSense racoon: DEBUG: hmac(hmac_sha1)
May 18 00:53:54 pfSense racoon: DEBUG: HASH computed:
May 18 00:53:54 pfSense racoon: DEBUG: 06ecf3cb d1ba85c9 e33ef9a6 6a33169c 101b95d3
May 18 00:53:54 pfSense racoon: DEBUG: begin encryption.
May 18 00:53:54 pfSense racoon: DEBUG: encryption(aes)
May 18 00:53:54 pfSense racoon: DEBUG: pad length = 8
May 18 00:53:54 pfSense racoon: DEBUG: 0b000018 06ecf3cb d1ba85c9 e33ef9a6 6a33169c 101b95d3 00000020 00000001 01108d28 d02d7505 994c3a77 17abc41b 30d5f9cb 000001fb 809cf693 aeb8fe07
May 18 00:53:54 pfSense racoon: DEBUG: encryption(aes)
May 18 00:53:54 pfSense racoon: DEBUG: with key:
May 18 00:53:54 pfSense racoon: DEBUG: a1e7f77c 6e221db6 b5b319bb b18c223a 6a4288c7 811293a7 e5201056 4e647fdb
May 18 00:53:54 pfSense racoon: DEBUG: encrypted payload by IV:
May 18 00:53:54 pfSense racoon: DEBUG: 8275876d d53aec3a 20f20372 a86b0ad9
May 18 00:53:54 pfSense racoon: DEBUG: save IV for next:
May 18 00:53:54 pfSense racoon: DEBUG: 33907334 562172df 5ef9df74 52ea5936
May 18 00:53:54 pfSense racoon: DEBUG: encrypted.
May 18 00:53:54 pfSense racoon: DEBUG: 92 bytes from 192.168.1.17[500] to 192.168.1.7[500]
May 18 00:53:54 pfSense racoon: DEBUG: sockname 192.168.1.17[500]
May 18 00:53:54 pfSense racoon: DEBUG: send packet from 192.168.1.17[500]
May 18 00:53:54 pfSense racoon: DEBUG: send packet to 192.168.1.7[500]
May 18 00:53:54 pfSense racoon: DEBUG: 1 times of 92 bytes message will be sent to 192.168.1.7[500]
May 18 00:53:54 pfSense racoon: DEBUG: d02d7505 994c3a77 17abc41b 30d5f9cb 08100501 d4f0852d 0000005c b60b7b2a a0045fe7 68612a04 eb0b46ba 7b47d633 63be9cd8 9d88bcd1 5eed3243 693f0866 6595fc38 1f57a013 fb3da34f 33907334 562172df 5ef9df74 52ea5936
May 18 00:53:54 pfSense racoon: DEBUG: sendto Information notify.
May 18 00:53:54 pfSense racoon: DEBUG: IV freed
May 18 00:53:54 pfSense racoon: DEBUG: DPD R-U-There sent (0)
May 18 00:53:54 pfSense racoon: DEBUG: rescheduling send_r_u (5).
May 18 00:53:55 pfSense racoon: DEBUG: ===
May 18 00:53:55 pfSense racoon: DEBUG: 92 bytes message received from 192.168.1.7[500] to 192.168.1.17[500]
May 18 00:53:55 pfSense racoon: DEBUG: d02d7505 994c3a77 17abc41b 30d5f9cb 08100501 8a92b90d 0000005c f0c46d19 5cb6c703 81c1b21f df953996 209e50b2 7f760ab9 544b924e b46339c4 16685840 4b164e74 5c968790 89847014 0c9a6b97 9af19916 5ebc4d94 2a00fe3d
May 18 00:53:55 pfSense racoon: DEBUG: receive Information.
May 18 00:53:55 pfSense racoon: DEBUG: compute IV for phase2
May 18 00:53:55 pfSense racoon: DEBUG: phase1 last IV:
May 18 00:53:55 pfSense racoon: DEBUG: 191bba75 9d7f37f7 9b5799d6 1b161b98 8a92b90d
May 18 00:53:55 pfSense racoon: DEBUG: hash(sha1)
May 18 00:53:55 pfSense racoon: DEBUG: encryption(aes)
May 18 00:53:55 pfSense racoon: DEBUG: phase2 IV computed:
May 18 00:53:55 pfSense racoon: DEBUG: 49138853 ee0d92e8 ca7f9bd7 c7f8a69d
May 18 00:53:55 pfSense racoon: DEBUG: begin decryption.
May 18 00:53:55 pfSense racoon: DEBUG: encryption(aes)
May 18 00:53:55 pfSense racoon: DEBUG: IV was saved for next processing:
May 18 00:53:55 pfSense racoon: DEBUG: 0c9a6b97 9af19916 5ebc4d94 2a00fe3d
May 18 00:53:55 pfSense racoon: DEBUG: encryption(aes)
May 18 00:53:55 pfSense racoon: DEBUG: with key:
May 18 00:53:55 pfSense racoon: DEBUG: a1e7f77c 6e221db6 b5b319bb b18c223a 6a4288c7 811293a7 e5201056 4e647fdb
May 18 00:53:55 pfSense racoon: DEBUG: decrypted payload by IV:
May 18 00:53:55 pfSense racoon: DEBUG: 49138853 ee0d92e8 ca7f9bd7 c7f8a69d
May 18 00:53:55 pfSense racoon: DEBUG: decrypted payload, but not trimed.
May 18 00:53:55 pfSense racoon: DEBUG: 0b000018 ab5e2b9b 8d954f99 45ca9503 55050216 652192cb 00000020 00000001 01108d29 d02d7505 994c3a77 17abc41b 30d5f9cb 000001fb 00000000 00000008
May 18 00:53:55 pfSense racoon: DEBUG: padding len=9
May 18 00:53:55 pfSense racoon: DEBUG: skip to trim padding.
May 18 00:53:55 pfSense racoon: DEBUG: decrypted.
May 18 00:53:55 pfSense racoon: DEBUG: d02d7505 994c3a77 17abc41b 30d5f9cb 08100501 8a92b90d 0000005c 0b000018 ab5e2b9b 8d954f99 45ca9503 55050216 652192cb 00000020 00000001 01108d29 d02d7505 994c3a77 17abc41b 30d5f9cb 000001fb 00000000 00000008
May 18 00:53:55 pfSense racoon: DEBUG: IV freed
May 18 00:53:55 pfSense racoon: DEBUG: HASH with:
May 18 00:53:55 pfSense racoon: DEBUG: 8a92b90d 00000020 00000001 01108d29 d02d7505 994c3a77 17abc41b 30d5f9cb 000001fb
May 18 00:53:55 pfSense racoon: DEBUG: hmac(hmac_sha1)
May 18 00:53:55 pfSense racoon: DEBUG: HASH computed:
May 18 00:53:55 pfSense racoon: DEBUG: ab5e2b9b 8d954f99 45ca9503 55050216 652192cb
May 18 00:53:55 pfSense racoon: DEBUG: hash validated.
May 18 00:53:55 pfSense racoon: DEBUG: begin.
May 18 00:53:55 pfSense racoon: DEBUG: seen nptype=8(hash)
May 18 00:53:55 pfSense racoon: DEBUG: seen nptype=11(notify)
May 18 00:53:55 pfSense racoon: DEBUG: succeed.
May 18 00:53:55 pfSense racoon: DEBUG: DPD R-U-There-Ack received
May 18 00:53:55 pfSense racoon: DEBUG: received an R-U-THERE-ACK
May 18 00:53:58 pfSense racoon: DEBUG: ===
May 18 00:53:58 pfSense racoon: DEBUG: 92 bytes message received from 192.168.1.7[500] to 192.168.1.17[500]
May 18 00:53:58 pfSense racoon: DEBUG: d02d7505 994c3a77 17abc41b 30d5f9cb 08100501 f8f5ad12 0000005c 0c4a69d5 3456047f f697c87b b5fe2433 c0ab868c a0eb3671 fd56381f d57759a3 11bcb4b3 dd19935a 6e2472c9 64050207 5899857c 6e2f1278 0b15e6dc 2e49fe18
May 18 00:53:58 pfSense racoon: DEBUG: receive Information.
May 18 00:53:58 pfSense racoon: DEBUG: compute IV for phase2
May 18 00:53:58 pfSense racoon: DEBUG: phase1 last IV:
May 18 00:53:58 pfSense racoon: DEBUG: 191bba75 9d7f37f7 9b5799d6 1b161b98 f8f5ad12
May 18 00:53:58 pfSense racoon: DEBUG: hash(sha1)
May 18 00:53:58 pfSense racoon: DEBUG: encryption(aes)
May 18 00:53:58 pfSense racoon: DEBUG: phase2 IV computed:
May 18 00:53:58 pfSense racoon: DEBUG: 3d2b1859 6e879b36 6f4c3d51 5e8423f0
May 18 00:53:58 pfSense racoon: DEBUG: begin decryption.
May 18 00:53:58 pfSense racoon: DEBUG: encryption(aes)
May 18 00:53:58 pfSense racoon: DEBUG: IV was saved for next processing:
May 18 00:53:58 pfSense racoon: DEBUG: 5899857c 6e2f1278 0b15e6dc 2e49fe18
May 18 00:53:58 pfSense racoon: DEBUG: encryption(aes)
May 18 00:53:58 pfSense racoon: DEBUG: with key:
May 18 00:53:58 pfSense racoon: DEBUG: a1e7f77c 6e221db6 b5b319bb b18c223a 6a4288c7 811293a7 e5201056 4e647fdb
May 18 00:53:58 pfSense racoon: DEBUG: decrypted payload by IV:
May 18 00:53:58 pfSense racoon: DEBUG: 3d2b1859 6e879b36 6f4c3d51 5e8423f0
May 18 00:53:58 pfSense racoon: DEBUG: decrypted payload, but not trimed.
May 18 00:53:58 pfSense racoon: DEBUG: 0b000018 773820b3 b096d012 25d26b6d d8f140e4 3de296d3 00000020 00000001 01108d28 d02d7505 994c3a77 17abc41b 30d5f9cb 00000d70 00000000 00000008
May 18 00:53:58 pfSense racoon: DEBUG: padding len=9
May 18 00:53:58 pfSense racoon: DEBUG: skip to trim padding.
May 18 00:53:58 pfSense racoon: DEBUG: decrypted.
May 18 00:53:58 pfSense racoon: DEBUG: d02d7505 994c3a77 17abc41b 30d5f9cb 08100501 f8f5ad12 0000005c 0b000018 773820b3 b096d012 25d26b6d d8f140e4 3de296d3 00000020 00000001 01108d28 d02d7505 994c3a77 17abc41b 30d5f9cb 00000d70 00000000 00000008
May 18 00:53:58 pfSense racoon: DEBUG: IV freed
May 18 00:53:58 pfSense racoon: DEBUG: HASH with:
May 18 00:53:58 pfSense racoon: DEBUG: f8f5ad12 00000020 00000001 01108d28 d02d7505 994c3a77 17abc41b 30d5f9cb 00000d70
May 18 00:53:58 pfSense racoon: DEBUG: hmac(hmac_sha1)
May 18 00:53:58 pfSense racoon: DEBUG: HASH computed:
May 18 00:53:58 pfSense racoon: DEBUG: 773820b3 b096d012 25d26b6d d8f140e4 3de296d3
May 18 00:53:58 pfSense racoon: DEBUG: hash validated.
May 18 00:53:58 pfSense racoon: DEBUG: begin.
May 18 00:53:58 pfSense racoon: DEBUG: seen nptype=8(hash)
May 18 00:53:58 pfSense racoon: DEBUG: seen nptype=11(notify)
May 18 00:53:58 pfSense racoon: DEBUG: succeed.
May 18 00:53:58 pfSense racoon: DEBUG: DPD R-U-There received
May 18 00:53:58 pfSense racoon: DEBUG: compute IV for phase2
May 18 00:53:58 pfSense racoon: DEBUG: phase1 last IV:
May 18 00:53:58 pfSense racoon: DEBUG: 191bba75 9d7f37f7 9b5799d6 1b161b98 806b0404
May 18 00:53:58 pfSense racoon: DEBUG: hash(sha1)
May 18 00:53:58 pfSense racoon: DEBUG: encryption(aes)
May 18 00:53:58 pfSense racoon: DEBUG: phase2 IV computed:
May 18 00:53:58 pfSense racoon: DEBUG: 5a253a10 cb6ea9df 6c7b522c 50d0beca
May 18 00:53:58 pfSense racoon: DEBUG: HASH with:
May 18 00:53:58 pfSense racoon: DEBUG: 806b0404 00000020 00000001 01108d29 d02d7505 994c3a77 17abc41b 30d5f9cb 00000d70
May 18 00:53:58 pfSense racoon: DEBUG: hmac(hmac_sha1)
May 18 00:53:58 pfSense racoon: DEBUG: HASH computed:
May 18 00:53:58 pfSense racoon: DEBUG: ec630f5f cd50249e 6bf469d8 eac01234 3d9c50b7
May 18 00:53:58 pfSense racoon: DEBUG: begin encryption.
May 18 00:53:58 pfSense racoon: DEBUG: encryption(aes)
May 18 00:53:58 pfSense racoon: DEBUG: pad length = 8
May 18 00:53:58 pfSense racoon: DEBUG: 0b000018 ec630f5f cd50249e 6bf469d8 eac01234 3d9c50b7 00000020 00000001 01108d29 d02d7505 994c3a77 17abc41b 30d5f9cb 00000d70 98ff92b3 8ec19b07
May 18 00:53:58 pfSense racoon: DEBUG: encryption(aes)
May 18 00:53:58 pfSense racoon: DEBUG: with key:
May 18 00:53:58 pfSense racoon: DEBUG: a1e7f77c 6e221db6 b5b319bb b18c223a 6a4288c7 811293a7 e5201056 4e647fdb
May 18 00:53:58 pfSense racoon: DEBUG: encrypted payload by IV:
May 18 00:53:58 pfSense racoon: DEBUG: 5a253a10 cb6ea9df 6c7b522c 50d0beca
May 18 00:53:58 pfSense racoon: DEBUG: save IV for next:
May 18 00:53:58 pfSense racoon: DEBUG: e72dc322 c3f7acb9 e7dbd3bc 52f8557b
May 18 00:53:58 pfSense racoon: DEBUG: encrypted.
May 18 00:53:58 pfSense racoon: DEBUG: 92 bytes from 192.168.1.17[500] to 192.168.1.7[500]
May 18 00:53:58 pfSense racoon: DEBUG: sockname 192.168.1.17[500]
May 18 00:53:58 pfSense racoon: DEBUG: send packet from 192.168.1.17[500]
May 18 00:53:58 pfSense racoon: DEBUG: send packet to 192.168.1.7[500]
May 18 00:53:58 pfSense racoon: DEBUG: 1 times of 92 bytes message will be sent to 192.168.1.7[500]
May 18 00:53:58 pfSense racoon: DEBUG: d02d7505 994c3a77 17abc41b 30d5f9cb 08100501 806b0404 0000005c 6ba8cc84 74b1b7dc 40fd50f5 ad0b7147 4d9d5c82 d06ced8b dd38b5f7 8b3d04fe d52d5505 35f7f2bb 18ce3982 75c46c2e e72dc322 c3f7acb9 e7dbd3bc 52f8557b
May 18 00:53:58 pfSense racoon: DEBUG: sendto Information notify.
May 18 00:53:58 pfSense racoon: DEBUG: IV freed
May 18 00:53:58 pfSense racoon: DEBUG: received a valid R-U-THERE, ACK sent
May 18 00:54:05 pfSense racoon: DEBUG: DPD monitoring….
May 18 00:54:05 pfSense racoon: DEBUG: compute IV for phase2
May 18 00:54:05 pfSense racoon: DEBUG: phase1 last IV:
May 18 00:54:05 pfSense racoon: DEBUG: 191bba75 9d7f37f7 9b5799d6 1b161b98 9239ec5f
May 18 00:54:05 pfSense racoon: DEBUG: hash(sha1)
May 18 00:54:05 pfSense racoon: DEBUG: encryption(aes)
May 18 00:54:05 pfSense racoon: DEBUG: phase2 IV computed:
May 18 00:54:05 pfSense racoon: DEBUG: e98c7c0c 819eb286 42aecd96 56ec3226
May 18 00:54:05 pfSense racoon: DEBUG: HASH with:
May 18 00:54:05 pfSense racoon: DEBUG: 9239ec5f 00000020 00000001 01108d28 d02d7505 994c3a77 17abc41b 30d5f9cb 000001fc
May 18 00:54:05 pfSense racoon: DEBUG: hmac(hmac_sha1)
May 18 00:54:05 pfSense racoon: DEBUG: HASH computed:
May 18 00:54:05 pfSense racoon: DEBUG: 01b5957d ad75245c 47bfcb19 8c29fdb8 df455b04
May 18 00:54:05 pfSense racoon: DEBUG: begin encryption.
May 18 00:54:05 pfSense racoon: DEBUG: encryption(aes)
May 18 00:54:05 pfSense racoon: DEBUG: pad length = 8
May 18 00:54:05 pfSense racoon: DEBUG: 0b000018 01b5957d ad75245c 47bfcb19 8c29fdb8 df455b04 00000020 00000001 01108d28 d02d7505 994c3a77 17abc41b 30d5f9cb 000001fc f5b1a39c 859dc607
May 18 00:54:05 pfSense racoon: DEBUG: encryption(aes)
May 18 00:54:05 pfSense racoon: DEBUG: with key:
May 18 00:54:05 pfSense racoon: DEBUG: a1e7f77c 6e221db6 b5b319bb b18c223a 6a4288c7 811293a7 e5201056 4e647fdb
May 18 00:54:05 pfSense racoon: DEBUG: encrypted payload by IV:
May 18 00:54:05 pfSense racoon: DEBUG: e98c7c0c 819eb286 42aecd96 56ec3226
May 18 00:54:05 pfSense racoon: DEBUG: save IV for next:
May 18 00:54:05 pfSense racoon: DEBUG: 0e60760b ff98e10a 2b0cadba 5f0f82ad
May 18 00:54:05 pfSense racoon: DEBUG: encrypted.
May 18 00:54:05 pfSense racoon: DEBUG: 92 bytes from 192.168.1.17[500] to 192.168.1.7[500]
May 18 00:54:05 pfSense racoon: DEBUG: sockname 192.168.1.17[500]
May 18 00:54:05 pfSense racoon: DEBUG: send packet from 192.168.1.17[500]
May 18 00:54:05 pfSense racoon: DEBUG: send packet to 192.168.1.7[500]
May 18 00:54:05 pfSense racoon: DEBUG: 1 times of 92 bytes message will be sent to 192.168.1.7[500]
May 18 00:54:05 pfSense racoon: DEBUG: d02d7505 994c3a77 17abc41b 30d5f9cb 08100501 9239ec5f 0000005c 96fae9c6 33acdc4f aee486cb b2adc42c 9c1133f5 27db3bb6 a7899e8b 66c19dc0 38b2e53c b0f060b7 dd921690 68d2271b 0e60760b ff98e10a 2b0cadba 5f0f82ad
May 18 00:54:05 pfSense racoon: DEBUG: sendto Information notify.
May 18 00:54:05 pfSense racoon: DEBUG: IV freed
May 18 00:54:05 pfSense racoon: DEBUG: DPD R-U-There sent (0)
May 18 00:54:05 pfSense racoon: DEBUG: rescheduling send_r_u (5).
May 18 00:54:06 pfSense racoon: DEBUG: ===
May 18 00:54:06 pfSense racoon: DEBUG: 92 bytes message received from 192.168.1.7[500] to 192.168.1.17[500]
May 18 00:54:06 pfSense racoon: DEBUG: d02d7505 994c3a77 17abc41b 30d5f9cb 08100501 f778304f 0000005c 06ac5e88 bc38acf5 27eaab3c 7751ff04 08f7e2f4 c216c470 13ab5255 a0586764 ebfda43d 4a460ace 73df710b 084a9d19 2970b257 14190e96 94b0b513 7b6f5878
May 18 00:54:06 pfSense racoon: DEBUG: receive Information.
May 18 00:54:06 pfSense racoon: DEBUG: compute IV for phase2
May 18 00:54:06 pfSense racoon: DEBUG: phase1 last IV:
May 18 00:54:06 pfSense racoon: DEBUG: 191bba75 9d7f37f7 9b5799d6 1b161b98 f778304f
May 18 00:54:06 pfSense racoon: DEBUG: hash(sha1)
May 18 00:54:06 pfSense racoon: DEBUG: encryption(aes)
May 18 00:54:06 pfSense racoon: DEBUG: phase2 IV computed:
May 18 00:54:06 pfSense racoon: DEBUG: 35ba9547 45d4ac75 5a61f5e2 c865503d
May 18 00:54:06 pfSense racoon: DEBUG: begin decryption.
May 18 00:54:06 pfSense racoon: DEBUG: encryption(aes)
May 18 00:54:06 pfSense racoon: DEBUG: IV was saved for next processing:
May 18 00:54:06 pfSense racoon: DEBUG: 2970b257 14190e96 94b0b513 7b6f5878
May 18 00:54:06 pfSense racoon: DEBUG: encryption(aes)
May 18 00:54:06 pfSense racoon: DEBUG: with key:
May 18 00:54:06 pfSense racoon: DEBUG: a1e7f77c 6e221db6 b5b319bb b18c223a 6a4288c7 811293a7 e5201056 4e647fdb
May 18 00:54:06 pfSense racoon: DEBUG: decrypted payload by IV:
May 18 00:54:06 pfSense racoon: DEBUG: 35ba9547 45d4ac75 5a61f5e2 c865503d
May 18 00:54:06 pfSense racoon: DEBUG: decrypted payload, but not trimed.
May 18 00:54:06 pfSense racoon: DEBUG: 0b000018 6cfb3ec8 d36490bc d0ac7d66 f1a207b3 6c6748fa 00000020 00000001 01108d29 d02d7505 994c3a77 17abc41b 30d5f9cb 000001fc 00000000 00000008
May 18 00:54:06 pfSense racoon: DEBUG: padding len=9
May 18 00:54:06 pfSense racoon: DEBUG: skip to trim padding.
May 18 00:54:06 pfSense racoon: DEBUG: decrypted.
May 18 00:54:06 pfSense racoon: DEBUG: d02d7505 994c3a77 17abc41b 30d5f9cb 08100501 f778304f 0000005c 0b000018 6cfb3ec8 d36490bc d0ac7d66 f1a207b3 6c6748fa 00000020 00000001 01108d29 d02d7505 994c3a77 17abc41b 30d5f9cb 000001fc 00000000 00000008
May 18 00:54:06 pfSense racoon: DEBUG: IV freed
May 18 00:54:06 pfSense racoon: DEBUG: HASH with:
May 18 00:54:06 pfSense racoon: DEBUG: f778304f 00000020 00000001 01108d29 d02d7505 994c3a77 17abc41b 30d5f9cb 000001fc
May 18 00:54:06 pfSense racoon: DEBUG: hmac(hmac_sha1)
May 18 00:54:06 pfSense racoon: DEBUG: HASH computed:
May 18 00:54:06 pfSense racoon: DEBUG: 6cfb3ec8 d36490bc d0ac7d66 f1a207b3 6c6748fa
May 18 00:54:06 pfSense racoon: DEBUG: hash validated.
May 18 00:54:06 pfSense racoon: DEBUG: begin.
May 18 00:54:06 pfSense racoon: DEBUG: seen nptype=8(hash)
May 18 00:54:06 pfSense racoon: DEBUG: seen nptype=11(notify)
May 18 00:54:06 pfSense racoon: DEBUG: succeed.
May 18 00:54:06 pfSense racoon: DEBUG: DPD R-U-There-Ack received
May 18 00:54:06 pfSense racoon: DEBUG: received an R-U-THERE-ACK
May 18 00:54:16 pfSense racoon: INFO: @(#)ipsec-tools 0.8-alpha20090903 (http://ipsec-tools.sourceforge.net)
May 18 00:54:16 pfSense racoon: INFO: @(#)This product linked OpenSSL 0.9.8k 25 Mar 2009 (http://www.openssl.org/)
May 18 00:54:16 pfSense racoon: INFO: Reading configuration from "/var/etc/racoon.conf"
May 18 00:54:16 pfSense racoon: INFO: Resize address pool from 0 to 253
May 18 00:54:16 pfSense racoon: INFO: 192.168.1.17[4500] used for NAT-T
May 18 00:54:16 pfSense racoon: INFO: 192.168.1.17[4500] used as isakmp port (fd=14)
May 18 00:54:16 pfSense racoon: INFO: 192.168.1.17[500] used for NAT-T
May 18 00:54:16 pfSense racoon: INFO: 192.168.1.17[500] used as isakmp port (fd=15)
May 18 00:54:16 pfSense racoon: INFO: unsupported PF_KEY message REGISTER
May 18 00:54:18 pfSense racoon: ERROR: unknown Informational exchange received.
May 18 00:54:38 pfSense last message repeated 4 times
May 18 00:56:09 pfSense racoon: INFO: respond new phase 1 negotiation: 192.168.1.17[500]<=>192.168.1.7[500]single very interesting lines of log: view attachment
sorry for the ridiculous long posts…
-
Dont really see anything in those logs that would stand-out right away. Try to connect from iPhone several times in a row after it fails; it happened few times to me where I was able to login only from third or fourth attempt.
I setup a 32 bit virtual machine with full pfSense install (20100517-1144) and was able to successfully establish tunnel to VM from iPhone via 3G and access hosts on internal network so I think this must be working now.
-
install, setup lan&wan interfaces, config fw-rules, setup ipsec like yours, add user and go..
i386-live on virtual machine, tunnel established, no traffic..
did i forget something?
-
I was also able to get mobile IPSEC working, no tweaking necessary. I attached a windows 7 machine via the shrewsoft ipsec client and was able to access both the firewall and machines on the lan.
Used the 20100514-2225 iso on an old Pentium III.
-
eazydor, are you trying to connect to pfsense from the same machine that is hosting vm? If that is the case you might need a static route for road warrior traffic to be sent back to vm and not to your default gateway. What interfaces do you have on vm and how are they attached to your net? When you say that tunnel is established how do you know that? From the log that you posted earlier it seems that tunnel is deleted right after it is established.
-
Yes and no.
I tried from the vm-host & iphone to connect.
VMHosts spd's are getting deleted, but the ones from the iphone stays and seems to be correct..
So, i tried to access pfsense's lan ip from the iphone connected to the same network than vmhost, which has 2 bridged interfaces on 1 physical interface. Since bridging is happening on layer2, i don't see the interference..
But still, the routing tip is correct, i din't mentioned that on a mac, you have to priorise connections in order to have automated routing (interface with higher prio gets the lower weight in the routing table).
After all, you are right about the vmhost routing problem, cause my mac keeps trying to connect via lan and not ipsec.
But still, i don't get why my phone can't pass traffic..
I believe to client is connected, because client and pfsense's log says, that iphone established the connection, recieved an ip and spd's are were created..
Btw, thanks for your patience.. -
It's seems to me that your setup is quite complex and it's very likely that you might have missed something somewhere. I would suggest you to setup a bit simpler environment to eliminate some of the complexity.
This is how I test with VM: VM is running on my desktop and has 2 interfaces. First interface shares hosts LAN access (VM has it's own IP on physical network so you can say it's attached to my physical pfSense box LAN). Second interface is host-only so traffic is being passed only between my desktop and VM. I then forward ports 500 and 4500 from WAN on my physical pfSense box (gateway) to virtual machine and try to connect to VPN from iPhone using 3G. Once tunnel is up and running I can access VM and my desktop pc from iPhone. The only thing I need to do is setup a static route on my desktop to pass all traffic coming from iPhone back to VM via host-only network.
You can try to troubleshoot this by running tcpdump on various machines/interfaces and see where traffic is being blocked. You should see ESP traffic coming into VM and TCP traffic leaving VM, then TCP traffic coming and leaving your mac and finally TCP traffic from mac coming into VM and leaving as ESP traffic to your iPhone.
-
i thought too.. adding complexity to ipsec is never a good idea..
but thank you for your setup. i will give it a try..
you see, if you could get traffic over your tunnel, it´s obvious that it´s fixed and works. So i can't lay down until it works and i understood what was going on..
these forum´s are awesome.. even if i couldn't fix the problem, i learn so much here..
-
so you don't connect directly to pfsense's wan interface, you go via nat over the vm-host?
or how do you speak from iphone to pfsense's wan, when you have a host-only connection on that interface.. (host-only= virtual interface?)
-
When using my physical pfSense box I use wan interface but when I am testing with vm I forward IPSec ports to VMs wan interface which is connected to my physical network.
-
allright, to test with 2 independent networks..
but that´s mainly the problem when testing networking-stuff, at least to me.. because a virtualized test-environment is almost always coupled with unforeseen behavior (routing, loopbacks, bridged or virtual interfaces&devices, etc..)
i think, i'm gonna order an alix- or atom-board for testing purposes…
but you see, that´s why i love my job, it´s almost always the fault of humans, in this case, my fault..
anyhow, good to know that this part (spd's) has been fixed..
-
The SPD problem is still present, but maybe not in his specific case.
-
does somebody know where i can monitor the changes regarding this problem?