Je rencontre un problème de connexion d'une liaison VPN IPSEC entre deux IPCOP.
Je passe par le module RPVs.
Mes deux IPCOP sont en version 1.4.21 et sont tout deux en IP Publique fixe sur le port eth1.
Mes deux sous réseau sont bien différent l'un de l'autre 192.168.1.0/24 et 192.168.0.0/24.
Sur mes deux IPCOP dans ETAT/CONNEXIONS je vois bien la connexion IPCOP-->IP DISTANTE sur le port 500 comme ASSURED.
Sur mes deux IPCOP dans LOG/PAREFEU je vois bien la connexion INPUT IP DISTANTE sur le port 500(ISAKMP).
Je précise que le tunnel utilise des certificats qui ont bien été contrôlé même réinitialisé, que l'Encryptage IKE, Intégrité IKE... sont bien similaires des deux côtés. Que les liaison internet sont deux SDSL avec BUSINESS PRO 1000 (orange business) en mode bridge (normalement).
Mon problème est que, malgré tout cela, mon tunnel reste FERMÉ.
Est-ce un problème de NAT-Transversal lié à BUSINESS PRO 1000?
Dois-je faire une translation de port 500,4500...?
Pour les plus experts, voici le log IPSEC (chronologique inverse)
08:59:08 ipsec__plutorun ...could not start conn "OPHLMtoGIELL"
08:59:08 ipsec__plutorun 000 "OPHLMtoGIELL" #2: starting keying attempt 2 of an unlimited number, but rel easing whack
08:59:08 ipsec__plutorun 031 "OPHLMtoGIELL" #2: max number of retransmissions (2) reached STATE_QUICK_I1. No acceptable response to our first Quick Mode message: perhaps peer likes no proposal
08:59:08 ipsec__plutorun 010 "OPHLMtoGIELL" #2: STATE_QUICK_I1: retransmission; will wait 40s for respons e
08:59:08 ipsec__plutorun 010 "OPHLMtoGIELL" #2: STATE_QUICK_I1: retransmission; will wait 20s for respons e
08:59:08 ipsec__plutorun 122 "OPHLMtoGIELL" #2: STATE_QUICK_I1: initiate
08:59:08 ipsec__plutorun 004 "OPHLMtoGIELL" #1: STATE_MAIN_I4: ISAKMP SA established
08:59:08 ipsec__plutorun 108 "OPHLMtoGIELL" #1: STATE_MAIN_I3: sent MI3, expecting MR3
08:59:08 ipsec__plutorun 003 "OPHLMtoGIELL" #1: NAT-Traversal: Result using RFC 3947: no NAT detected
08:59:08 ipsec__plutorun 106 "OPHLMtoGIELL" #1: STATE_MAIN_I2: sent MI2, expecting MR2
08:59:08 ipsec__plutorun 003 "OPHLMtoGIELL" #1: received Vendor ID payload [Dead Peer Detection]
08:59:08 ipsec__plutorun 003 "OPHLMtoGIELL" #1: received Vendor ID payload [RFC 3947]
08:59:08 ipsec__plutorun 104 "OPHLMtoGIELL" #1: STATE_MAIN_I1: initiate
08:59:08 pluto[20468] "OPHLMtoGIELL" #3: initiating Quick Mode RSASIG+ENCRYPT+TUNNEL+PFS to replace #2
08:59:08 pluto[20468] "OPHLMtoGIELL" #2: starting keying attempt 2 of an unlimited number, but releasi ng whack
08:59:08 pluto[20468] "OPHLMtoGIELL" #2: max number of retransmissions (2) reached STATE_QUICK_I1. No acceptable response to our first Quick Mode message: perhaps peer likes no prop osal
08:59:00 pluto[20468] "OPHLMtoGIELL" #1: sending encrypted notification INVALID_ID_INFORMATION to 217.217.217.217:500
08:59:00 pluto[20468] "OPHLMtoGIELL" #1: cannot respond to IPsec SA request because no connection is k nown for 192.168.0.0/24===194.206.245.237[C=FR, O=GIELL, CN=199.199.199.199]:17/ 1701...217.108.178.245[C=FR, O=OPHLM, CN=217.217.217.217]:17/1701
08:58:28 pluto[20468] "OPHLMtoGIELL" #1: received and ignored informational message
08:58:28 pluto[20468] "OPHLMtoGIELL" #1: ignoring informational payload, type INVALID_MESSAGE_ID
08:58:20 pluto[20468] packet from 217.217.217.217:500: Quick Mode message is for a non-existent (expir ed?) ISAKMP SA
08:58:08 pluto[20468] "OPHLMtoGIELL" #1: received and ignored informational message
08:58:08 pluto[20468] "OPHLMtoGIELL" #1: ignoring informational payload, type INVALID_MESSAGE_ID
08:58:01 pluto[20468] packet from 217.217.217.217:500: Quick Mode message is for a non-existent (expir ed?) ISAKMP SA
08:57:58 pluto[20468] "OPHLMtoGIELL" #1: received and ignored informational message
08:57:58 pluto[20468] "OPHLMtoGIELL" #1: ignoring informational payload, type INVALID_ID_INFORMATION
08:57:58 pluto[20468] "OPHLMtoGIELL" #2: initiating Quick Mode RSASIG+ENCRYPT+TUNNEL+PFS
08:57:58 pluto[20468] "OPHLMtoGIELL" #1: ISAKMP SA established
08:57:58 pluto[20468] "OPHLMtoGIELL" #1: transition from state STATE_MAIN_I3 to state STATE_MAIN_I4
08:57:58 pluto[20468] "OPHLMtoGIELL" #1: Issuer CRL not found
08:57:58 pluto[20468] "OPHLMtoGIELL" #1: Issuer CRL not found
08:57:58 pluto[20468] "OPHLMtoGIELL" #1: Main mode peer ID is ID_DER_ASN1_DN: 'C=FR, O=OPHLM, CN=217.217.217.217'
08:57:57 pluto[20468] "OPHLMtoGIELL" #1: transition from state STATE_MAIN_I2 to state STATE_MAIN_I3
08:57:57 pluto[20468] "OPHLMtoGIELL" #1: NAT-Traversal: Result using RFC 3947: no NAT detected
08:57:57 pluto[20468] "OPHLMtoGIELL" #1: transition from state STATE_MAIN_I1 to state STATE_MAIN_I2
08:57:57 pluto[20468] "OPHLMtoGIELL" #1: received Vendor ID payload [Dead Peer Detection]
08:57:57 pluto[20468] "OPHLMtoGIELL" #1: received Vendor ID payload [RFC 3947]
08:57:57 pluto[20468] "OPHLMtoGIELL" #1: initiating Main Mode
08:57:57 pluto[20468] loaded private key file '/var/ipcop/certs/hostkey.pem' (887 bytes)
08:57:57 pluto[20468] loading secrets from "/etc/ipsec.secrets"
08:57:57 pluto[20468] adding interface ipsec0/eth1 199.199.199.199:4500
08:57:57 pluto[20468] adding interface ipsec0/eth1 199.199.199.199
08:57:57 pluto[20468] listening for IKE messages
08:57:57 pluto[20468] added connection description "OPHLMtoGIELL"
08:57:57 pluto[20468] loaded host cert file '/var/ipcop/certs/OPHLMtoGIELLcert.pem' (1139 bytes)
08:57:57 pluto[20468] loaded host cert file '/var/ipcop/certs/hostcert.pem' (1139 bytes)
08:57:57 pluto[20468] | from whack: got --ike=aes256-sha2_512-modp1536,aes256-sha2_256-modp1536,aes256 -sha-modp1536,aes128-sha2_512-modp1536,aes128-sha2_256-modp1536,aes128-sha-modp1 536!
08:57:57 pluto[20468] | from whack: got --esp=aes256-sha2_512,aes256-sha2_256,aes256-sha1,aes128-sha2_ 512,aes128-sha2_256,aes128-sha1!;modp1536
08:57:57 pluto[20468] OpenPGP certificate file '/etc/pgpcert.pgp' not found
08:57:57 pluto[20468] loaded crl file 'cacrl.pem' (560 bytes)
08:57:57 pluto[20468] Changing to directory '/etc/ipsec.d/crls'
08:57:57 pluto[20468] loaded cacert file 'OPHLMcert.pem' (1261 bytes)
08:57:57 pluto[20468] loaded cacert file 'cacert.pem' (1261 bytes)
08:57:57 ipsec_setup ...Openswan IPsec started
08:57:57 pluto[20468] Changing to directory '/etc/ipsec.d/cacerts'
08:57:57 pluto[20468] ike_alg_register_enc(): Activating OAKLEY_SSH_PRIVATE_65289: Ok (ret=0)
08:57:57 pluto[20468] ike_alg_register_enc(): Activating OAKLEY_TWOFISH_CBC: Ok (ret=0)
08:57:57 pluto[20468] ike_alg_register_hash(): Activating OAKLEY_SHA2_512: Ok (ret=0)
08:57:57 pluto[20468] ike_alg_register_hash(): Activating OAKLEY_SHA2_256: Ok (ret=0)
08:57:57 pluto[20468] ike_alg_register_enc(): Activating OAKLEY_SERPENT_CBC: Ok (ret=0)
08:57:57 pluto[20468] ike_alg_register_enc(): Activating OAKLEY_CAST_CBC: Ok (ret=0)
08:57:57 pluto[20468] ike_alg_register_enc(): Activating OAKLEY_BLOWFISH_CBC: Ok (ret=0)
08:57:57 pluto[20468] ike_alg_register_enc(): Activating OAKLEY_AES_CBC: Ok (ret=0)
08:57:57 pluto[20468] including NAT-Traversal patch (Version 0.6)
08:57:57 pluto[20468] including X.509 patch with traffic selectors (Version 0.9.42)
08:57:57 pluto[20468] Starting Pluto (Openswan Version 1.0.10)
08:57:57 ipsec__plutorun Starting Pluto subsystem...
08:57:57 ipsec_setup KLIPS ipsec0 on eth1 199.199.199.199/255.255.255.248 broadcast 199.199.199.200
08:57:57 ipsec_setup KLIPS debug `none'
08:57:57 ipsec_setup Starting Openswan IPsec 1.0.10...