http://www.securepoint.de/dokumente/How ... ior_R3.pdf
http://www.securepoint.de/dokumente/How ... ior_R3.pdf
Zuerst habe ich versucht die Verbindung über L2TP mit PSK herzustellen, dann über PPT2. Beide Methoden schlagen leider fehl.
Hier das Log zu Versuch 1 (L2TP):
Code: Alles auswählen
Aug 24 16:47:48 1.2.3.4 IPSEC Server "firewall.foo.local__GT__Roadwarrior_1"[13] 80.187.109.129:39752 #19: only OAKLEY_GROUP_MODP1024 and OAKLEY_GROUP_MODP1536 supported. Attribute OAKLEY_GROUP_DESCRIPTION
Aug 24 16:47:48 1.2.3.4 IPSEC Server "firewall.foo.local__GT__Roadwarrior_1"[13] 80.187.109.129:39752 #19: only OAKLEY_GROUP_MODP1024 and OAKLEY_GROUP_MODP1536 supported. Attribute OAKLEY_GROUP_DESCRIPTION
Aug 24 16:47:48 1.2.3.4 IPSEC Server "firewall.foo.local__GT__Roadwarrior_1"[13] 80.187.109.129:39752 #19: Oakley Transform [OAKLEY_3DES_CBC (192), OAKLEY_SHA, OAKLEY_GROUP_MODP2048] refused due to strict flag
Aug 24 16:47:48 1.2.3.4 IPSEC Server "firewall.foo.local__GT__Roadwarrior_1"[13] 80.187.109.129:39752 #19: NAT-Traversal: Result using RFC 3947: peer is NATed
Aug 24 16:47:48 1.2.3.4 IPSEC Server "firewall.foo.local__GT__Roadwarrior_1"[13] 80.187.109.129:39752 #19: next payload type of ISAKMP Identification Payload has an unknown value: 146
Aug 24 16:47:48 1.2.3.4 Firewall ACCEPT IN=ppp0 OUT= MAC= SRC=80.187.109.129 DST=1.2.3.4 LEN=100 TOS=0x00 PREC=0x00 TTL=111 ID=4056 PROTO=UDP SPT=26011 DPT=4500 LEN=80
Aug 24 16:47:48 1.2.3.4 IPSEC Server "firewall.foo.local__GT__Roadwarrior_1"[13] 80.187.109.129:39752 #19: probable authentication failure (mismatch of preshared secrets?): malformed payload in packet
Aug 24 16:47:48 1.2.3.4 IPSEC Server "firewall.foo.local__GT__Roadwarrior_1"[13] 80.187.109.129:39752 #19: sending encrypted notification PAYLOAD_MALFORMED to 80.187.109.129:39752
Aug 24 16:47:49 1.2.3.4 IPSEC Server "firewall.foo.local__GT__Roadwarrior_1"[13] 80.187.109.129:39752 #19: next payload type of ISAKMP Identification Payload has an unknown value: 146
Aug 24 16:47:49 1.2.3.4 Firewall ACCEPT IN=ppp0 OUT= MAC= SRC=80.187.109.129 DST=1.2.3.4 LEN=100 TOS=0x00 PREC=0x00 TTL=111 ID=4061 PROTO=UDP SPT=26011 DPT=4500 LEN=80
Aug 24 16:47:49 1.2.3.4 IPSEC Server "firewall.foo.local__GT__Roadwarrior_1"[13] 80.187.109.129:39752 #19: probable authentication failure (mismatch of preshared secrets?): malformed payload in packet
Aug 24 16:47:49 1.2.3.4 IPSEC Server "firewall.foo.local__GT__Roadwarrior_1"[13] 80.187.109.129:39752 #19: sending encrypted notification PAYLOAD_MALFORMED to 80.187.109.129:39752
Aug 24 16:47:51 1.2.3.4 IPSEC Server "firewall.foo.local__GT__Roadwarrior_1"[13] 80.187.109.129:39752 #19: next payload type of ISAKMP Identification Payload has an unknown value: 146
... refused due to strict flag
--> Strict ist aber nicht angehackt
... probable authentication failure (mismatch of preshared secrets?): malformed payload in packet
--> Ich habs 3 Mal gegengecheckt, das Secret ist identisch.
Log zu Versuch 2 (PPTP):
Code: Alles auswählen
Aug 24 16:50:00 1.2.3.4 PPTP Server CTRL: Client 80.187.109.171 control connection started
Aug 24 16:50:00 1.2.3.4 Firewall ACCEPT IN=ppp0 OUT= MAC= SRC=80.187.109.171 DST=1.2.3.4 LEN=52 TOS=0x00 PREC=0x00 TTL=111 ID=4282 DF PROTO=TCP SPT=48857 DPT=1723 WINDOW=8192 RES=0x00 SYN URGP=0
Aug 24 16:50:00 1.2.3.4 PPTP Server CTRL: Starting call (launching pppd, opening GRE)
Aug 24 16:50:00 1.2.3.4 Point-To-Point Server pppd 2.4.4 started by root, uid 0
Aug 24 16:50:00 1.2.3.4 Point-To-Point Server Using interface ppp1
Aug 24 16:50:00 1.2.3.4 Point-To-Point Server Connect: ppp1 <--> /dev/pts/4
Aug 24 16:50:00 1.2.3.4 Security Server DEBUG: changes on ppp1: -link -interface (tunnel)
Aug 24 16:50:30 1.2.3.4 Point-To-Point Server LCP: timeout sending Config-Requests
Aug 24 16:50:30 1.2.3.4 Point-To-Point Server Connection terminated.
Aug 24 16:50:30 1.2.3.4 Point-To-Point Server Modem hangup
Aug 24 16:50:30 1.2.3.4 PPTP Server GRE: read(fd=21,buffer=80588a0,len=8196) from PTY failed: status = -1 error = Input/output error, usually caused by unexpected termination of pppd, check option syntax and pppd logs
Aug 24 16:50:30 1.2.3.4 PPTP Server CTRL: PTY read or GRE write failed (pty,gre)=(21,24)
Aug 24 16:50:30 1.2.3.4 PPTP Server CTRL: Reaping child PPP[21518]
Aug 24 16:50:30 1.2.3.4 PPTP Server CTRL: Client 80.187.109.171 control connection finished
Aug 24 16:50:30 1.2.3.4 Security Server DEBUG: changes on ppp1: -link -interface (tunnel)
Hat irgendwer eine Idee? Keiner der VPN/Vista Beiträge hier im Forum scheint zu helfen (Ach ja, IPSec/IKE Dienste laufen auch).
P.S. Ich hab leider gerade keinen Windows Client zur Hand mit dem ich das testen könnte.