Issue #461
[5.1.1]Why maching a conn but selected another conn
Description
11[IKE] <9> 124.78.108.xxx is initiating a Aggressive Mode IKE_SA 11[IKE] <9> IKE_SA (unnamed)[9] state change: CREATED => CONNECTING 11[CFG] <9> looking for XAuthInitPSK peer configs *matching xxx.253.165.yyy ...124.78.108.xxx[android]* 11[CFG] <9> selected peer config "CiscoIPSec" 11[IKE] <CiscoIPSec|9> sending XAuth vendor ID 11[IKE] <CiscoIPSec|9> sending DPD vendor ID 11[IKE] <CiscoIPSec|9> sending NAT-T (RFC 3947) vendor ID
attention at above text , "*matching xxx.253.165.yyy ...124.78.108.xxx[android]*",but "*selected peer config "CiscoIPSec"* ".
where is the wrong ? below is my ipsec.conf
config setup # strictcrlpolicy=yes uniqueids = no charondebug=no conn %default ikelifetime=60m keylife=20m rekey=no keyingtries=1 #keyexchange=ike #aggressive=yes left=%defaultroute right=%any #leftsubnet=%modeconfig rightsourceip=192.168.99.128/25 dpdaction=clear dpddelay=300s dpdtimeout=30m conn android type=tunnel authby=xauthpsk xauth=server #mode=main keyexchange=ikev1 ike=aes128-md5-modp1024 esp=aes128-md5 auto=add compress=yes leftid=android leftauth=psk rightauth=psk rightauth2=xauth conn IPSec-IKEv2 keyexchange=ikev2 auto=add leftauth=pubkey leftcert=serverCert.pem rightauth=eap-radius rightsendcert=never eap_identity=%identity conn CiscoIPSec keyexchange=ikev1 auto=add aggressive=yes ike=aes256-sha1-modp1024! esp=aes256-sha1! leftid=blackberry type=tunnel xauth=server leftauth=psk rightauth=psk rightauth2=xauth-eap #rightauth2=eap-radius #leftfirewall=yes modeconfig=push
and below is my ipsec.secret
%any %any : PSK "heibang" test : XAUTH "test" : RSA serverKey.pem
So,what should I do ?
History
#1 Updated by Folke Ashberg almost 12 years ago
For me it looks like CiscoIPSec is the only aggressive conn.
124.78.108.xxx[android] is right-side. In the conn-CiscoIPSec there is only leftid=blackberry.
The clients sends it's id (android) and because your rightid=%any this one matches.
Leftid is not checked, the request only includes the initiator-id and not the expected id of the server, but in the reply the bleckberry is sent out, so maybe this is the reason why your connection fails: the client is confused about your id "blackberry"
Try
conn android type=tunnel aggressive=yes keyexchange=ikev1 ike=aes128-md5-modp1024 esp=aes128-md5 auto=add compress=yes rightid=android leftauth=psk rightauth=psk rightauth2=xauth
#2 Updated by Tyrael Wang almost 12 years ago
thx,but did not work ~~~ config as you given , but selected the conn Cisco-IPSec as the same......
#3 Updated by Tobias Brunner about 10 years ago
- Status changed from New to Closed
Closing some old tickets. Please open a new ticket if the issue persists.