Brad Rubenstein
2004-08-05 20:55:50 UTC
I'm seeing an error I don't see anyone else getting:
I have two Fedora Core 2 boxes running IPSEC 0.3.3, each behind a Linksys
router with NAT, and I want to bridge the two private networks together.
Seemed pretty straightforward, I thought.
HOST1 LINKSYS ROUTER+NAT LINKSYS ROUTER+NAT
HOST2
192.168.1.2 -> 192.168.1.1+24.6.117.151 ->...->
66.108.19.182+192.168.2.1 -> 192.168.2.3
When the SPD policies are set and racoon is started on both sides, and I try
to ping host2 from host1, I get this in the error log:
2004-08-05 13:52:45: ERROR: the length in the isakmp header is too big.
The rest of the negotiation is error-free (I'm not going to post volumes of
log info yet, but if anyone thinks it might help, I'm happy to do so).
IPSEC-passthru is disabled on both LINKSYS boxes.
I'm stuck there. Can anyone help me?
Brad Rubenstein
***@BradRubenstein.com
========================== setkey and racoon.conf for each host
=====================
Host 1: 192.168.1.2
Kernel on host 1: kernel-2.6.7-1.494.2.2 (fedora core 2)
Host 1 has these policies:
spdadd 192.168.1.0/24 192.168.2.0/24 any -P out ipsec
esp/tunnel/192.168.1.2-66.108.19.182/require;
spdadd 192.168.2.0/24 192.168.1.0/24 any -P in ipsec
esp/tunnel/66.108.19.182-192.168.1.2/require;
Host 2: 192.168.2.3
Kernel 2.6.6-1.435.2.3 (from fedora core 2)
Host 2 has these policies:
spdadd 192.168.1.0/24 192.168.2.0/24 any -P in ipsec
esp/tunnel/24.6.117.151-192.168.2.3/require;
spdadd 192.168.2.0/24 192.168.1.0/24 any -P out ipsec
esp/tunnel/192.168.2.3-24.6.117.151/require;
racoon.conf on Host 1 and Host 2 are identical:
===================================================
path include "/etc/racoon";
path certificate "/usr/share/ssl/certs";
timer
{
natt_keepalive 10 sec;
}
remote anonymous
{
exchange_mode main,base,aggressive;
my_identifier asn1dn;
certificate_type x509 "www.unclebrad.com.pem" "www.unclebrad.com.pem
";
nat_traversal on;
proposal {
authentication_method rsasig;
encryption_algorithm 3des;
hash_algorithm sha1;
dh_group 2;
}
proposal_check obey;
}
sainfo anonymous
{
pfs_group 2;
lifetime time 12 hour;
encryption_algorithm 3des, rijndael;
authentication_algorithm hmac_sha1;
compression_algorithm deflate;
}
=====================================================
I have two Fedora Core 2 boxes running IPSEC 0.3.3, each behind a Linksys
router with NAT, and I want to bridge the two private networks together.
Seemed pretty straightforward, I thought.
HOST1 LINKSYS ROUTER+NAT LINKSYS ROUTER+NAT
HOST2
192.168.1.2 -> 192.168.1.1+24.6.117.151 ->...->
66.108.19.182+192.168.2.1 -> 192.168.2.3
When the SPD policies are set and racoon is started on both sides, and I try
to ping host2 from host1, I get this in the error log:
2004-08-05 13:52:45: ERROR: the length in the isakmp header is too big.
The rest of the negotiation is error-free (I'm not going to post volumes of
log info yet, but if anyone thinks it might help, I'm happy to do so).
IPSEC-passthru is disabled on both LINKSYS boxes.
I'm stuck there. Can anyone help me?
Brad Rubenstein
***@BradRubenstein.com
========================== setkey and racoon.conf for each host
=====================
Host 1: 192.168.1.2
Kernel on host 1: kernel-2.6.7-1.494.2.2 (fedora core 2)
Host 1 has these policies:
spdadd 192.168.1.0/24 192.168.2.0/24 any -P out ipsec
esp/tunnel/192.168.1.2-66.108.19.182/require;
spdadd 192.168.2.0/24 192.168.1.0/24 any -P in ipsec
esp/tunnel/66.108.19.182-192.168.1.2/require;
Host 2: 192.168.2.3
Kernel 2.6.6-1.435.2.3 (from fedora core 2)
Host 2 has these policies:
spdadd 192.168.1.0/24 192.168.2.0/24 any -P in ipsec
esp/tunnel/24.6.117.151-192.168.2.3/require;
spdadd 192.168.2.0/24 192.168.1.0/24 any -P out ipsec
esp/tunnel/192.168.2.3-24.6.117.151/require;
racoon.conf on Host 1 and Host 2 are identical:
===================================================
path include "/etc/racoon";
path certificate "/usr/share/ssl/certs";
timer
{
natt_keepalive 10 sec;
}
remote anonymous
{
exchange_mode main,base,aggressive;
my_identifier asn1dn;
certificate_type x509 "www.unclebrad.com.pem" "www.unclebrad.com.pem
";
nat_traversal on;
proposal {
authentication_method rsasig;
encryption_algorithm 3des;
hash_algorithm sha1;
dh_group 2;
}
proposal_check obey;
}
sainfo anonymous
{
pfs_group 2;
lifetime time 12 hour;
encryption_algorithm 3des, rijndael;
authentication_algorithm hmac_sha1;
compression_algorithm deflate;
}
=====================================================