Quantcast
Channel: openSUSE Forums
Viewing all articles
Browse latest Browse all 40713

openswan -> AZURE and too many INVALID_PAYLOAD_TYPE

$
0
0
opensuse13.1(i386) with openswan:
Code:

ipsec01:~ # rpm -qa | grep -i openswanopenswan-2.6.41-62.1.i586
Configured and UP connect to the MS AZURE NetWork. OK
I can ping hosts from the our local lan all hosts in the Azure NetWork.
But:
1. from time to time i need stop and start ipsec ( connection UP, but ping - lost )
2. in the /var/log/messages i see to many this error records:
Code:

2014-07-01T21:57:30.876903+03:00 ipsec01 pluto[11213]: "dntskazure/6x1" #1: received and ignored informational message2014-07-01T21:57:40.884153+03:00 ipsec01 pluto[11213]: "dntskazure/6x1" #16: initiating Quick Mode PSK+ENCRYPT+TUNNEL+UP+IKEv2ALLOW+SAREFTRACK to replace #15 {using isakmp#1 msgid:923de997 proposal=AES(12)_128-SHA1(2)_160 pfsgroup=no-pfs}
2014-07-01T21:57:40.885117+03:00 ipsec01 pluto[11213]: "dntskazure/5x1" #17: initiating Quick Mode PSK+ENCRYPT+TUNNEL+UP+IKEv2ALLOW+SAREFTRACK to replace #14 {using isakmp#1 msgid:32475da1 proposal=AES(12)_128-SHA1(2)_160 pfsgroup=no-pfs}
2014-07-01T21:57:40.885936+03:00 ipsec01 pluto[11213]: "dntskazure/4x1" #18: initiating Quick Mode PSK+ENCRYPT+TUNNEL+UP+IKEv2ALLOW+SAREFTRACK to replace #13 {using isakmp#1 msgid:ef66d0a2 proposal=AES(12)_128-SHA1(2)_160 pfsgroup=no-pfs}
2014-07-01T21:57:40.886510+03:00 ipsec01 pluto[11213]: "dntskazure/3x1" #19: initiating Quick Mode PSK+ENCRYPT+TUNNEL+UP+IKEv2ALLOW+SAREFTRACK to replace #12 {using isakmp#1 msgid:0664ae17 proposal=AES(12)_128-SHA1(2)_160 pfsgroup=no-pfs}
2014-07-01T21:57:40.955710+03:00 ipsec01 pluto[11213]: "dntskazure/6x1" #16: IKE message has the Commit Flag set but Pluto doesn't implement this feature; ignoring flag
2014-07-01T21:57:40.956043+03:00 ipsec01 pluto[11213]: "dntskazure/6x1" #16: transition from state STATE_QUICK_I1 to state STATE_QUICK_I2
2014-07-01T21:57:40.956305+03:00 ipsec01 pluto[11213]: "dntskazure/6x1" #16: STATE_QUICK_I2: sent QI2, IPsec SA established tunnel mode {ESP=>0x6ba60c66 <0xdb2fd03e xfrm=AES_128-HMAC_SHA1 NATOA=none NATD=none DPD=none}
2014-07-01T21:57:40.957202+03:00 ipsec01 pluto[11213]: "dntskazure/5x1" #17: IKE message has the Commit Flag set but Pluto doesn't implement this feature; ignoring flag
2014-07-01T21:57:40.957566+03:00 ipsec01 pluto[11213]: "dntskazure/5x1" #17: transition from state STATE_QUICK_I1 to state STATE_QUICK_I2
2014-07-01T21:57:40.957863+03:00 ipsec01 pluto[11213]: "dntskazure/5x1" #17: STATE_QUICK_I2: sent QI2, IPsec SA established tunnel mode {ESP=>0xd230daa8 <0x3bc31329 xfrm=AES_128-HMAC_SHA1 NATOA=none NATD=none DPD=none}
2014-07-01T21:57:40.958111+03:00 ipsec01 pluto[11213]: "dntskazure/4x1" #18: IKE message has the Commit Flag set but Pluto doesn't implement this feature; ignoring flag
2014-07-01T21:57:40.958353+03:00 ipsec01 pluto[11213]: "dntskazure/4x1" #18: transition from state STATE_QUICK_I1 to state STATE_QUICK_I2
2014-07-01T21:57:40.958601+03:00 ipsec01 pluto[11213]: "dntskazure/4x1" #18: STATE_QUICK_I2: sent QI2, IPsec SA established tunnel mode {ESP=>0xeeaed1ee <0x4ff317b8 xfrm=AES_128-HMAC_SHA1 NATOA=none NATD=none DPD=none}
2014-07-01T21:57:40.958840+03:00 ipsec01 pluto[11213]: "dntskazure/3x1" #19: IKE message has the Commit Flag set but Pluto doesn't implement this feature; ignoring flag
2014-07-01T21:57:40.959112+03:00 ipsec01 pluto[11213]: "dntskazure/3x1" #19: transition from state STATE_QUICK_I1 to state STATE_QUICK_I2
2014-07-01T21:57:40.959359+03:00 ipsec01 pluto[11213]: "dntskazure/3x1" #19: STATE_QUICK_I2: sent QI2, IPsec SA established tunnel mode {ESP=>0xe5366f6c <0xf7e1e956 xfrm=AES_128-HMAC_SHA1 NATOA=none NATD=none DPD=none}
2014-07-01T21:57:41.027503+03:00 ipsec01 pluto[11213]: "dntskazure/6x1" #16: IKE message has the Commit Flag set but Pluto doesn't implement this feature; ignoring flag
2014-07-01T21:57:41.028226+03:00 ipsec01 pluto[11213]: "dntskazure/6x1" #16: message ignored because it contains an unexpected payload type (ISAKMP_NEXT_HASH)
2014-07-01T21:57:41.028847+03:00 ipsec01 pluto[11213]: "dntskazure/6x1" #16: sending encrypted notification INVALID_PAYLOAD_TYPE to 23.100.62.146:500
2014-07-01T21:57:41.029467+03:00 ipsec01 pluto[11213]: "dntskazure/5x1" #17: IKE message has the Commit Flag set but Pluto doesn't implement this feature; ignoring flag
2014-07-01T21:57:41.030160+03:00 ipsec01 pluto[11213]: "dntskazure/5x1" #17: message ignored because it contains an unexpected payload type (ISAKMP_NEXT_HASH)
2014-07-01T21:57:41.030725+03:00 ipsec01 pluto[11213]: "dntskazure/5x1" #17: sending encrypted notification INVALID_PAYLOAD_TYPE to 23.100.62.146:500
2014-07-01T21:57:41.031259+03:00 ipsec01 pluto[11213]: "dntskazure/4x1" #18: IKE message has the Commit Flag set but Pluto doesn't implement this feature; ignoring flag
2014-07-01T21:57:41.031795+03:00 ipsec01 pluto[11213]: "dntskazure/4x1" #18: message ignored because it contains an unexpected payload type (ISAKMP_NEXT_HASH)
2014-07-01T21:57:41.032335+03:00 ipsec01 pluto[11213]: "dntskazure/4x1" #18: sending encrypted notification INVALID_PAYLOAD_TYPE to 23.100.62.146:500
2014-07-01T21:57:41.032749+03:00 ipsec01 pluto[11213]: "dntskazure/3x1" #19: IKE message has the Commit Flag set but Pluto doesn't implement this feature; ignoring flag
2014-07-01T21:57:41.032919+03:00 ipsec01 pluto[11213]: "dntskazure/3x1" #19: message ignored because it contains an unexpected payload type (ISAKMP_NEXT_HASH)
2014-07-01T21:57:41.033067+03:00 ipsec01 pluto[11213]: "dntskazure/3x1" #19: sending encrypted notification INVALID_PAYLOAD_TYPE to 23.100.62.146:500
ipsec01:~ #

This is my config file:
Code:

ipsec01:~ # cat /etc/ipsec.conf


version        2.0        # conforms to second version of ipsec.conf specification
# basic configuration
config setup
        dumpdir=/var/run/pluto/
        nat_traversal=yes
        virtual_private=%v4:172.16.0.0/16,%v4:172.17.0.0/16,%v4:192.168.0.0/16,%v4:10.8.0.0/24,%v4:10.0.2.0/24,%v4:10.4.0.0/16
        oe=off
        protostack=auto


# default settings for connections
conn %default
        leftrsasigkey=%cert
        rightrsasigkey=%cert


conn dntskazure
    authby=secret
    auto=start
    type=tunnel
    left=92.242.127.22
    leftsubnets={172.16.0.0/16,172.17.0.0/16,192.168.0.0/16,10.8.0.0/24,10.0.2.0/24,10.4.0.0/16}
    right=23.100.62.146
    rightsubnets={172.18.1.0/24}
    ike=aes128-sha1-modp1024
    esp=aes128-sha1
    pfs=no
    ikelifetime=8h
    keylife=1h


ipsec01:~ #


Please, help me resolved problem with INVALID_PAYLOAD_TYPE
(
left - my local lan
right - azure network
)
Serg

Viewing all articles
Browse latest Browse all 40713

Trending Articles



<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>