Navigation

    Netgate Discussion Forum
    • Register
    • Login
    • Search
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search

    Racoon: []: ERROR: the length in the isakmp header is too big.

    2.0-RC Snapshot Feedback and Problems - RETIRED
    3
    3
    9454
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • R
      rsingh last edited by

      i'm trying to move from 1.2.3-RC1 to 2.0. i'm using the same config as with 1.2.3-RC1. I didn't do an upgrade but manually re-did all of the config for 2.0. everything looks good but when i try to send data from the client, this message starts to repeat in the ipsec log:

      racoon: []: ERROR: the length in the isakmp header is too big.

      i've tried:
      decreasing the MTU in the client to 1360
      enabling/disabling ike fragmentation to 580 bytes
      enabling/disabling dead peer detection, deflate, ike failure notifications
      i tried both of my wan links incase it was something specific to one of them, same issue.

      here's the full log:

      
      Feb 21 20:34:22 	racoon: []: ERROR: the length in the isakmp header is too big.
      Feb 21 20:34:15 	racoon: []: ERROR: such policy does not already exist: "192.168.1.0/24[0] 192.168.2.160/32[0] proto=any dir=out"
      Feb 21 20:34:15 	racoon: []: ERROR: such policy does not already exist: "192.168.2.160/32[0] 192.168.1.0/24[0] proto=any dir=in"
      Feb 21 20:34:15 	racoon: []: INFO: IPsec-SA established: ESP 216.x.y.z[500]->67.x.y.z[500] spi=4286720205(0xff8228cd)
      Feb 21 20:34:15 	racoon: []: INFO: IPsec-SA established: ESP 216.x.y.z[500]->67.x.y.z[500] spi=226942663(0xd86dec7)
      Feb 21 20:34:15 	racoon: []: INFO: Adjusting peer's encmode UDP-Tunnel(3)->Tunnel(1)
      Feb 21 20:34:15 	racoon: []: INFO: Adjusting my encmode UDP-Tunnel->Tunnel
      Feb 21 20:34:15 	racoon: []: INFO: no policy found, try to generate the policy : 192.168.2.160/32[0] 192.168.1.0/24[0] proto=any dir=in
      Feb 21 20:34:15 	racoon: []: INFO: respond new phase 2 negotiation: 216.x.y.z[4500]<=>67.x.y.z[54334]
      Feb 21 20:34:08 	racoon: []: INFO: purging spi=205254126.
      Feb 21 20:34:08 	racoon: []: INFO: received INITIAL-CONTACT
      Feb 21 20:34:08 	racoon: []: INFO: ISAKMP-SA established 216.x.y.z[4500]-67.x.y.z[54334] spi:5dbea7b9f13e9c7e:cab641bd65788698
      Feb 21 20:34:08 	racoon: []: INFO: NAT detected: ME PEER
      Feb 21 20:34:08 	racoon: []: INFO: NAT-D payload #1 doesn't match
      Feb 21 20:34:08 	racoon: []: INFO: Hashing 67.x.y.z[54334] with algo #2
      Feb 21 20:34:08 	racoon: []: INFO: NAT-D payload #0 doesn't match
      Feb 21 20:34:08 	racoon: []: INFO: Hashing 216.x.y.z[4500] with algo #2
      Feb 21 20:34:08 	racoon: []: INFO: NAT-T: ports changed to: 67.x.y.z[54334]<->216.x.y.z[4500]
      Feb 21 20:34:08 	racoon: []: INFO: Hashing 216.x.y.z[500] with algo #2
      Feb 21 20:34:08 	racoon: []: INFO: Hashing 67.x.y.z[54335] with algo #2
      Feb 21 20:34:08 	racoon: []: INFO: Adding remote and local NAT-D payloads.
      Feb 21 20:34:08 	racoon: []: INFO: Selected NAT-T version: RFC 3947
      Feb 21 20:34:08 	racoon: []: INFO: received Vendor ID: CISCO-UNITY
      Feb 21 20:34:08 	racoon: []: INFO: received Vendor ID: DPD
      Feb 21 20:34:08 	racoon: []: INFO: received Vendor ID: RFC 3947
      Feb 21 20:34:08 	racoon: []: INFO: received Vendor ID: draft-ietf-ipsec-nat-t-ike-03
      Feb 21 20:34:08 	racoon: []: INFO: received Vendor ID: draft-ietf-ipsec-nat-t-ike-02
      Feb 21 20:34:08 	racoon: []: INFO: received Vendor ID: draft-ietf-ipsec-nat-t-ike-01
      Feb 21 20:34:08 	racoon: []: INFO: received Vendor ID: draft-ietf-ipsec-nat-t-ike-00
      Feb 21 20:34:08 	racoon: []: INFO: begin Aggressive mode.
      Feb 21 20:34:08 	racoon: []: INFO: respond new phase 1 negotiation: 216.x.y.z[500]<=>67.x.y.z[54335]
      
      
      1 Reply Last reply Reply Quote 0
      • C
        cmb last edited by

        Have you tried without NAT-T? That appears to be related, from some searching, would be good to confirm or deny that.

        1 Reply Last reply Reply Quote 0
        • D
          DukeSniper last edited by

          Not my original post, but I have the same symtoms. Confirming resolution: disabling NAT-T makes errors go away and packets flow thru the tunnel.

          Edit: Running 2010-03-24 snapshot, fresh install

          1 Reply Last reply Reply Quote 0
          • First post
            Last post