kurz vornweg, meine Kenntnisse betreffs IPsec sind nahe null. Ich versuche, von einem Linuxrechner mit OpenSwan zu einen Lancom 1611+ eine Verbindung aufzubauen. Das scheint auch fast zu klappen, aber dannn hat der Lancom doch was zu meckern: invalid next payload type <Unknown 55> in payload of type 8
Leider weiß ich nicht, wie ich rausfinde, was ihn stört. Habt ihr ev. eine Idee?
Hier ein Trace des Verbindungsaufbaus:
Code: Alles auswählen
| LANCOM 1611+
| Ver. 6.06.0012 / 27.03.2006
| SN. XXXXXXXXXXXX
| Copyright (c) LANCOM Systems
root@router:/
> trace # vpn-status
VPN-Status ON
root@router:/
> trace # vpn-packet
VPN-Packet ON
root@router:/
>
[VPN-Status] 2009/08/27 13:36:13,380
IKE info: The remote server xxx.xx.xxx.xxx:500 peer def-aggr-peer id <no_id> negotiated rfc-3706-dead-peer-detection
IKE info: The remote server xxx.xx.xxx.xxx:500 peer def-aggr-peer id <no_id> supports NAT-T in mode rfc
IKE info: The remote server xxx.xx.xxx.xxx:500 peer def-aggr-peer id <no_id> supports NAT-T in mode rfc
IKE info: The remote server xxx.xx.xxx.xxx:500 peer def-aggr-peer id <no_id> supports NAT-T in mode rfc
IKE info: The remote server xxx.xx.xxx.xxx:500 peer def-aggr-peer id <no_id> supports NAT-T in mode rfc
IKE info: The remote server xxx.xx.xxx.xxx:500 peer def-aggr-peer id <no_id> supports NAT-T in mode rfc
[VPN-Status] 2009/08/27 13:36:13,380
IKE info: Phase-1 remote proposal 1 for peer def-aggr-peer matched with local proposal 1
[VPN-Status] 2009/08/27 13:36:13,900
IKE log: 133613 Default message_parse_payloads: invalid next payload type <Unknown 55> in payload of type 8
[VPN-Status] 2009/08/27 13:36:13,910
IKE log: 133613 Default dropped message from xxx.xx.xxx.xxx port 500 due to notification type INVALID_PAYLOAD_TYPE
[VPN-Status] 2009/08/27 13:36:13,910
IKE info: dropped message from peer unknown xxx.xx.xxx.xxx port 500 due to notification type INVALID_PAYLOAD_TYPE
[VPN-Status] 2009/08/27 13:36:14,200
IKE log: 133614 Default ipsec_get_keystate: no keystate in ISAKMP SA 009d8e40
[VPN-Status] 2009/08/27 13:36:24,300
IKE log: 133624 Default ipsec_get_keystate: no keystate in ISAKMP SA 009d8e40
[VPN-Status] 2009/08/27 13:36:45,080
IKE log: 133645 Default message_recv: invalid cookie(s) 3ff4a03987818a1d 74beebe88bd8ff17
[VPN-Status] 2009/08/27 13:36:45,080
IKE log: 133645 Default dropped message from xxx.xx.xxx.xxx port 500 due to notification type INVALID_COOKIE
[VPN-Status] 2009/08/27 13:36:45,080
IKE info: dropped message from peer unknown xxx.xx.xxx.xxx port 500 due to notification type INVALID_COOKIE
[VPN-Status] 2009/08/27 13:37:01,280
IKE log: 133701 Default message_recv: invalid cookie(s) 3ff4a03987818a1d 74beebe88bd8ff17
[VPN-Status] 2009/08/27 13:37:01,280
IKE log: 133701 Default dropped message from xxx.xx.xxx.xxx port 500 due to notification type INVALID_COOKIE
[VPN-Status] 2009/08/27 13:37:01,280
IKE info: dropped message from peer unknown xxx.xx.xxx.xxx port 500 due to notification type INVALID_COOKIE
Code: Alles auswählen
version 2.0 # conforms to second version of ipsec.conf specification
# basic configuration
config setup
# NAT-TRAVERSAL support, see README.NAT-Traversal
nat_traversal=yes
nhelpers=0
plutodebug="all"
klipsdebug="all"
# Add connections here
conn server
authby=secret
pfs=yes
rekey=yes
keyingtries=3
type=transport
left=%defaultroute
leftprotoport=17/1701
right=yyy.yy.yyy.yyy
rightprotoport=17/1701
leftid=abcd@xyz.ag
rightid=abcd@xyz.ag
auto=ignore
aggrmode=yes
ike=aes-md5-modp1024
forceencaps=yes
#leftmodecfgclient=yes
compress=yes
#Disable Opportunistic Encryption
include /etc/ipsec.d/examples/no_oe.conf
Jan