Skip to content
This repository has been archived by the owner on Aug 7, 2020. It is now read-only.

Problem with the final step #6

Open
fed17 opened this issue May 6, 2017 · 7 comments
Open

Problem with the final step #6

fed17 opened this issue May 6, 2017 · 7 comments

Comments

@fed17
Copy link

fed17 commented May 6, 2017

I'm running
root@test:/home/soc/ikeforce# python ikeforce.py 192.168.1.9 -b -i 3000 -k abc123 -u fed -w t.txt -t 5 2 65001 2
After that the final debug message is
--------------------Received Packet Number: 2--------------------

Duplicate of packet 1, discarding
Duplicate packet count: 1

I'm testing my openswan server with config and secrets
ipsec.secrets
192.168.1.9 %any : PSK "abc123"
192.168.1.9 @3000: PSK "abc123"
@fed : XAUTH "aaa"
ipsec.config
conn iketest
leftxauthserver=yes
pfs=yes
#rekey=no
leftmodecfgserver=yes
rightmodecfgclient=yes
#modecfgpull=yes

    rightid=@3000
    rightxauthclient=yes
    left=192.168.1.9
    leftid=@moon.strongswan.org
    leftsubnet=10.1.0.0/24
    right=%any
    authby=secret
    ike=3des-sha;modp1024
    aggrmode=yes
    auth=esp
    esp=3des-sha1
    auto=add

Ikeforce is working while searching for groupID, correct ID was found but it doesn't work with the password
Could you help me?
Thank you

@f0cker
Copy link
Contributor

f0cker commented May 9, 2017

can you paste the output with debugging enabled using -d?

@fed17
Copy link
Author

fed17 commented May 9, 2017

out.txt

@f0cker
Copy link
Contributor

f0cker commented May 9, 2017

anything in the strongswan logs? it should be sending an xauth authentication request from the strongswan side next. Maybe xauth is not setup correctly in the strongswan config.

@fed17
Copy link
Author

fed17 commented May 9, 2017

2017-05-09 13 54 59

@fed17
Copy link
Author

fed17 commented May 9, 2017

as I understood from different tutorials, I should only enable leftxauthserver, rightxauthclient and add @username : XAUTH "pass" in secrets' file

@f0cker
Copy link
Contributor

f0cker commented May 9, 2017

the strongswan logs will be your best bet, let me know if I can help any further. you can also test a connection with -c which should do all of the IKE negotiation and provide you with the details to use for ESP. however, bear in mind it's just for testing so there's limited capabilities without adding to the code

@3000
Copy link

3000 commented May 10, 2017 via email

Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
None yet
Projects
None yet
Development

No branches or pull requests

3 participants